Имя пользователя:
Пароль:  
Помощь | Регистрация | Забыли пароль?  

Название темы: BSOD 0x8e
Показать сообщение отдельно

Новый участник


Сообщения: 9
Благодарности: 0

Профиль | Отправить PM | Цитировать


Решил потестить видяху программой vmt, так как весит лог 12 метров пришлось выложить на обменник : http://ifolder.ru/30961325

при это тест дошел до конца, я открыл FF и у меня вылетел синий экран.

сделал полный дамп (257 мб)

Вот лог дампа сделаный через Kdfe (модераторы, не ругайтесь, искал долго как спрятать лог под спойлер так и не нашел... только так)
читать дальше »

C:\Users\Ден>Kdfe -v "D:\MEMORY.DMP"


Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [D:\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available

Symbol search path is: srv*c:\symbols *http://msdl.microsoft.com/download/symbol
s
Executable search path is: srv*c:\symbols *http://msdl.microsoft.com/download/s
ymbols
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17727.x86fre.win7sp1_gdr.111118-2330
Machine Name:
Kernel base = 0x8304b000 PsLoadedModuleList = 0x831944d0
Debug session time: Fri Apr 6 20:05:46.968 2012 (UTC + 6:00)
System Uptime: 0 days 0:08:49.140
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols

Loading unloaded module list
..............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {8000, ff, 8, 8000}

*** ERROR: Module load completed but symbols could not be loaded for intelppm.sy
s
Probably caused by : hardware

Followup: MachineOwner
---------
*** Possible invalid call from 9392ff19 ( intelppm+0x2f19 )
*** Expected target 9392f6e6 ( intelppm+0x26e6 )

1: kd> kd: Reading initial command '!analyze -v; q'
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00008000, memory referenced
Arg2: 000000ff, IRQL
Arg3: 00000008, value 0 = read operation, 1 = write operation
Arg4: 00008000, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: 00008000

CURRENT_IRQL: 2

FAULTING_IP:
+624e2faf000ed904
00008000 ?? ???

PROCESS_NAME: System

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0xD1

TRAP_FRAME: 807e7c14 -- (.trap 0xffffffff807e7c14)
ErrCode = 00000010
eax=00000001 ebx=859462b8 ecx=85dd9c60 edx=85dfe8f0 esi=93932a1c edi=807cb120
eip=00008000 esp=807e7c88 ebp=9392f708 iopl=0 nv up di ng nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010082
00008000 ?? ???
Resetting default scope

LAST_CONTROL_TRANSFER: from 9392ff1e to 00008000

FAILED_INSTRUCTION_ADDRESS:
+624e2faf000ed904
00008000 ?? ???

POSSIBLE_INVALID_CONTROL_TRANSFER: from 9392ff19 to 9392f6e6

STACK_TEXT:
WARNING: Frame IP not in any known module. Following frames may be wrong.
807e7c84 9392ff1e 93932a1c 859462b8 807cb120 0x8000
807e7c98 830cb308 85e01030 807d0800 807cb000 intelppm+0x2f1e
807e7d20 830c2e0d 00000000 0000000e 000000a0 nt!PoIdle+0x4d3
807e7d24 00000000 0000000e 000000a0 11000026 nt!KiIdleLoop+0xd


STACK_COMMAND: .trap 0xffffffff807e7c14 ; kb

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: hardware

IMAGE_NAME: hardware

DEBUG_FLR_IMAGE_TIMESTAMP: 0

BUCKET_ID: CPU_CALL_ERROR

Followup: MachineOwner
---------
*** Possible invalid call from 9392ff19 ( intelppm+0x2f19 )
*** Expected target 9392f6e6 ( intelppm+0x26e6 )

quit:

при необходимости выложу дамп файл.

Отправлено: 19:22, 06-06-2012 | #20

Название темы: BSOD 0x8e