BSOD, någon som kan tyda mina dumpfiles?

Permalänk

BSOD, någon som kan tyda mina dumpfiles?

Har nyligen uppgraderat till SB genom att byta moderkort, processor och minnen. Får dock BSOD nu lite titt som tätt och tänkte kolla här om någon hade lust att tyda mina dumpfiles. http://data.fuskbugg.se/skalman02/818a16e8_101711-9032-01.dmp

Tack

Visa signatur

i7 2600K@4,6ghz - ASUS GTX 670 DC2 - MSI P67A-GD55 - Corsair Vengeance 8GB - Samsung 830-Series 256 GB
Corsair H80 - Xonar Essence STX - XFX XXX 750W - Fractal Design XL - DELL U2412m

Var snäll mot nördar. Det är stor risk att du får en som chef en dag.

Permalänk

återkommer strax, ska bara äta upp mina chips;)

Visa signatur

Lian Li PC-B25FB | Gigabyte P67A-D3-B3 | i5 2500k @ 4.3GHz | Vengeance 8GB | Asus 970 Strix DirectCu II | Corsair AX 750W | Crucial m4 64GB | DarkRock Pro C1 | O2+ODAC portable mod | Beyerdynamic DT 880 Pro 600Ω

Permalänk

Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [c:\ARNE.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: symsrv*symsrv.dll*e:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`02a56000 PsLoadedModuleList = 0xfffff800`02c9b670 Debug session time: Mon Oct 17 14:05:36.167 2011 (UTC + 2:00) System Uptime: 0 days 0:52:23.995 Loading Kernel Symbols ............................................................... ................................................................ ............. Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {ffffffffffffffff, 2, 1, fffff80002b043a2} Probably caused by : win32k.sys ( win32k!SURFACE::bDeleteSurface+3a2 ) Followup: MachineOwnerProcessing initial command '!analyze -v' --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: ffffffffffffffff, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80002b043a2, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d05100 ffffffffffffffff CURRENT_IRQL: 2 FAULTING_IP: nt!KxWaitForLockOwnerShip+12 fffff800`02b043a2 48890a mov qword ptr [rdx],rcx DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: chrome.exe TRAP_FRAME: fffff88002178ee0 -- (.trap 0xfffff88002178ee0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=fffff88002179120 rdx=ffffffffffffffff rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002b043a2 rsp=fffff88002179070 rbp=fffff88002179100 r8=0000000000000000 r9=0000000000000000 r10=fffffa80077f4690 r11=fffff80002d08a80 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc nt!KxWaitForLockOwnerShip+0x12: fffff800`02b043a2 48890a mov qword ptr [rdx],rcx ds:0202:ffffffff`ffffffff=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002ad21e9 to fffff80002ad2c40 STACK_TEXT: fffff880`02178d98 fffff800`02ad21e9 : 00000000`0000000a ffffffff`ffffffff 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff880`02178da0 fffff800`02ad0e60 : fffff880`02170000 fffff960`00120000 ff002f00`ff00fe4e fffffa80`00212e20 : nt!KiBugCheckDispatch+0x69 fffff880`02178ee0 fffff800`02b043a2 : 00000000`00000000 00000000`00000001 fffffa80`078f96b8 00000000`00000001 : nt!KiPageFault+0x260 fffff880`02179070 fffff800`02ae326d : fffffa80`00212e20 00000000`00000000 fffff880`02179100 fffffa80`078f95b0 : nt!KxWaitForLockOwnerShip+0x12 fffff880`021790a0 fffff800`02b06e66 : fffffa80`00212e20 fffff6fb`82200040 fffffa80`00982860 fffffa80`009824d0 : nt!MiInsertPageInFreeOrZeroedList+0x55d fffff880`021791b0 fffff800`02b07188 : 0000007f`fffffff8 00000000`00000000 80000000`0b0f6863 00000000`0000001c : nt!MiDeleteValidSystemPte+0x136 fffff880`021792b0 fffff800`02b063bd : fffffa80`084df3f8 fffffa80`0029c010 00000000`00000000 00000008`0000001c : nt!MiDeletePteRange+0x291 fffff880`02179330 fffff800`02b04f03 : 00000000`01fa4045 00000000`00003468 00000000`00002d07 00000000`00000001 : nt!MiUpdateWsleHash+0x2be fffff880`021793a0 fffff800`02b06569 : 00000000`00000000 00000000`01fa4fff 00000000`00000000 00000001`00000001 : nt!MiDeleteVirtualAddresses+0x76b fffff880`02179560 fffff800`02dea221 : fffffa80`09500740 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9 fffff880`02179680 fffff800`02dea623 : fffffa80`00000000 00000000`01f70000 fffffa80`00000001 00000000`7efdf100 : nt!MiUnmapViewOfSection+0x1b1 fffff880`02179740 fffff800`02ad1ed3 : 00000000`00ffffff fffff960`0013a925 fffffa80`084df060 00000000`00000000 : nt!NtUnmapViewOfSection+0x5f fffff880`02179790 fffff800`02ace470 : fffff960`001759be 00000000`00000001 fffff900`c00bf010 fffff900`c3415cc0 : nt!KiSystemServiceCopyEnd+0x13 fffff880`02179928 fffff960`001759be : 00000000`00000001 fffff900`c00bf010 fffff900`c3415cc0 00000000`00000000 : nt!KiServiceLinkage fffff880`02179930 fffff960`00175d34 : ffffffff`00000000 fffff880`00000000 fffff900`c3415cc0 00000000`00000000 : win32k!SURFACE::bDeleteSurface+0x3a2 fffff880`02179a80 fffff960`001368e9 : ffffffff`cc050da7 fffff900`c3415cc0 00000000`00000da7 fffff960`0012736c : win32k!bDeleteSurface+0x34 fffff880`02179ab0 fffff800`02ad1ed3 : fffffa80`099cbb60 fffff900`c00bf010 00000000`00000018 00000000`7efdb000 : win32k!NtGdiDeleteObjectApp+0xd5 fffff880`02179ae0 00000000`74782e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`000be5c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74782e09 STACK_COMMAND: kb FOLLOWUP_IP: win32k!SURFACE::bDeleteSurface+3a2 fffff960`001759be e9d6010000 jmp win32k!SURFACE::bDeleteSurface+0x57d (fffff960`00175b99) SYMBOL_STACK_INDEX: e SYMBOL_NAME: win32k!SURFACE::bDeleteSurface+3a2 FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32k IMAGE_NAME: win32k.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4e658d5a FAILURE_BUCKET_ID: X64_0xA_win32k!SURFACE::bDeleteSurface+3a2 BUCKET_ID: X64_0xA_win32k!SURFACE::bDeleteSurface+3a2 Followup: MachineOwner ---------

Här är en översatt fil:) verkar peka mot chrome, så testa att ominstallera det och om inte det funkar så kör memtest i ett par timmar.

Visa signatur

Lian Li PC-B25FB | Gigabyte P67A-D3-B3 | i5 2500k @ 4.3GHz | Vengeance 8GB | Asus 970 Strix DirectCu II | Corsair AX 750W | Crucial m4 64GB | DarkRock Pro C1 | O2+ODAC portable mod | Beyerdynamic DT 880 Pro 600Ω

Permalänk
Skrivet av erikssonown:

Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [c:\ARNE.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: symsrv*symsrv.dll*e:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`02a56000 PsLoadedModuleList = 0xfffff800`02c9b670 Debug session time: Mon Oct 17 14:05:36.167 2011 (UTC + 2:00) System Uptime: 0 days 0:52:23.995 Loading Kernel Symbols ............................................................... ................................................................ ............. Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {ffffffffffffffff, 2, 1, fffff80002b043a2} Probably caused by : win32k.sys ( win32k!SURFACE::bDeleteSurface+3a2 ) Followup: MachineOwnerProcessing initial command '!analyze -v' --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: ffffffffffffffff, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80002b043a2, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d05100 ffffffffffffffff CURRENT_IRQL: 2 FAULTING_IP: nt!KxWaitForLockOwnerShip+12 fffff800`02b043a2 48890a mov qword ptr [rdx],rcx DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: chrome.exe TRAP_FRAME: fffff88002178ee0 -- (.trap 0xfffff88002178ee0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=fffff88002179120 rdx=ffffffffffffffff rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002b043a2 rsp=fffff88002179070 rbp=fffff88002179100 r8=0000000000000000 r9=0000000000000000 r10=fffffa80077f4690 r11=fffff80002d08a80 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc nt!KxWaitForLockOwnerShip+0x12: fffff800`02b043a2 48890a mov qword ptr [rdx],rcx ds:0202:ffffffff`ffffffff=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002ad21e9 to fffff80002ad2c40 STACK_TEXT: fffff880`02178d98 fffff800`02ad21e9 : 00000000`0000000a ffffffff`ffffffff 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff880`02178da0 fffff800`02ad0e60 : fffff880`02170000 fffff960`00120000 ff002f00`ff00fe4e fffffa80`00212e20 : nt!KiBugCheckDispatch+0x69 fffff880`02178ee0 fffff800`02b043a2 : 00000000`00000000 00000000`00000001 fffffa80`078f96b8 00000000`00000001 : nt!KiPageFault+0x260 fffff880`02179070 fffff800`02ae326d : fffffa80`00212e20 00000000`00000000 fffff880`02179100 fffffa80`078f95b0 : nt!KxWaitForLockOwnerShip+0x12 fffff880`021790a0 fffff800`02b06e66 : fffffa80`00212e20 fffff6fb`82200040 fffffa80`00982860 fffffa80`009824d0 : nt!MiInsertPageInFreeOrZeroedList+0x55d fffff880`021791b0 fffff800`02b07188 : 0000007f`fffffff8 00000000`00000000 80000000`0b0f6863 00000000`0000001c : nt!MiDeleteValidSystemPte+0x136 fffff880`021792b0 fffff800`02b063bd : fffffa80`084df3f8 fffffa80`0029c010 00000000`00000000 00000008`0000001c : nt!MiDeletePteRange+0x291 fffff880`02179330 fffff800`02b04f03 : 00000000`01fa4045 00000000`00003468 00000000`00002d07 00000000`00000001 : nt!MiUpdateWsleHash+0x2be fffff880`021793a0 fffff800`02b06569 : 00000000`00000000 00000000`01fa4fff 00000000`00000000 00000001`00000001 : nt!MiDeleteVirtualAddresses+0x76b fffff880`02179560 fffff800`02dea221 : fffffa80`09500740 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9 fffff880`02179680 fffff800`02dea623 : fffffa80`00000000 00000000`01f70000 fffffa80`00000001 00000000`7efdf100 : nt!MiUnmapViewOfSection+0x1b1 fffff880`02179740 fffff800`02ad1ed3 : 00000000`00ffffff fffff960`0013a925 fffffa80`084df060 00000000`00000000 : nt!NtUnmapViewOfSection+0x5f fffff880`02179790 fffff800`02ace470 : fffff960`001759be 00000000`00000001 fffff900`c00bf010 fffff900`c3415cc0 : nt!KiSystemServiceCopyEnd+0x13 fffff880`02179928 fffff960`001759be : 00000000`00000001 fffff900`c00bf010 fffff900`c3415cc0 00000000`00000000 : nt!KiServiceLinkage fffff880`02179930 fffff960`00175d34 : ffffffff`00000000 fffff880`00000000 fffff900`c3415cc0 00000000`00000000 : win32k!SURFACE::bDeleteSurface+0x3a2 fffff880`02179a80 fffff960`001368e9 : ffffffff`cc050da7 fffff900`c3415cc0 00000000`00000da7 fffff960`0012736c : win32k!bDeleteSurface+0x34 fffff880`02179ab0 fffff800`02ad1ed3 : fffffa80`099cbb60 fffff900`c00bf010 00000000`00000018 00000000`7efdb000 : win32k!NtGdiDeleteObjectApp+0xd5 fffff880`02179ae0 00000000`74782e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`000be5c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74782e09 STACK_COMMAND: kb FOLLOWUP_IP: win32k!SURFACE::bDeleteSurface+3a2 fffff960`001759be e9d6010000 jmp win32k!SURFACE::bDeleteSurface+0x57d (fffff960`00175b99) SYMBOL_STACK_INDEX: e SYMBOL_NAME: win32k!SURFACE::bDeleteSurface+3a2 FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32k IMAGE_NAME: win32k.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4e658d5a FAILURE_BUCKET_ID: X64_0xA_win32k!SURFACE::bDeleteSurface+3a2 BUCKET_ID: X64_0xA_win32k!SURFACE::bDeleteSurface+3a2 Followup: MachineOwner ---------

Här är en översatt fil:) verkar peka mot chrome, så testa att ominstallera det och om inte det funkar så kör memtest i ett par timmar.

Chrome? Ser man på. Får pröva det. Tack så mycket för din hjälp

Visa signatur

i7 2600K@4,6ghz - ASUS GTX 670 DC2 - MSI P67A-GD55 - Corsair Vengeance 8GB - Samsung 830-Series 256 GB
Corsair H80 - Xonar Essence STX - XFX XXX 750W - Fractal Design XL - DELL U2412m

Var snäll mot nördar. Det är stor risk att du får en som chef en dag.