keddepryhsel
New Member
- Joined
- Apr 3, 2011
- Messages
- 26
- Thread Author
- #1
Help BSOD
Oversættelse fra Dansk til Engelsk
Hello everyone
is there anyone who can help me my computer keeps making BSOD
My computer is
motherbord asus m4a89gtd pro/usb3
cpu amd 1090t
kingston ram 4gb
graphics card Pov gtx275
psu corsair tx850w..
HELP!!!!!!!!!!
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\040311-28797-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*c:\mss*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02806000 PsLoadedModuleList = 0xfffff800`02a43e50
Debug session time: Sun Apr 3 10:14:32.792 2011 (UTC + 2:00)
System Uptime: 0 days 1:14:42.852
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffffc604b3fa980, 2, 1, fffff80002897cf9}
Probably caused by : memory_corruption ( nt!MiUnlinkPageFromLockedList+6c9 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffc604b3fa980, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002897cf9, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002aae0e0
fffffc604b3fa980
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiUnlinkPageFromLockedList+6c9
fffff800`02897cf9 488914c1 mov qword ptr [rcx+rax*8],rdx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: avgnsa.exe
TRAP_FRAME: fffff8800c9fd700 -- (.trap 0xfffff8800c9fd700)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000003c0967f530 rbx=0000000000000000 rcx=fffffa8000000000
rdx=0000000000047a36 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002897cf9 rsp=fffff8800c9fd890 rbp=fffff80002ab01e0
r8=0000058000000000 r9=fffffa8000000008 r10=0000000000000000
r11=2aaaaaaaaaaaaaab r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po nc
nt!MiUnlinkPageFromLockedList+0x6c9:
fffff800`02897cf9 488914c1 mov qword ptr [rcx+rax*8],rdx ds:0460:fffffc60`4b3fa980=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002875ca9 to fffff80002876740
STACK_TEXT:
fffff880`0c9fd5b8 fffff800`02875ca9 : 00000000`0000000a fffffc60`4b3fa980 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0c9fd5c0 fffff800`02874920 : 00000000`001196cb fffffa80`01f96bc0 00000014`00000000 fffff6fb`831fdfd0 : nt!KiBugCheckDispatch+0x69
fffff880`0c9fd700 fffff800`02897cf9 : fffffa80`01f8e670 0000000f`ffffffff 7ff00000`00000000 00000000`03d5598f : nt!KiPageFault+0x260
fffff880`0c9fd890 fffff800`028a8587 : 0000000a`01964790 fffff680`00000000 0000007f`00000000 fffff680`0500cb20 : nt!MiUnlinkPageFromLockedList+0x6c9
fffff880`0c9fd920 fffff800`02892d26 : 00000000`00000000 0000000a`01964790 fffff680`0500c448 fffffa80`069cf998 : nt!MiResolveTransitionFault+0x167
fffff880`0c9fd9b0 fffff800`02890743 : ffffffff`ffffffff 0000000a`01889760 00000a8b`00000080 fffff880`00000000 : nt!MiDispatchFault+0x946
fffff880`0c9fdac0 fffff800`0287482e : 00000000`00000000 00000000`00000000 00000000`00000001 fffffa80`06fa3ae0 : nt!MmAccessFault+0x343
fffff880`0c9fdc20 0000000a`017886d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`017bd6e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xa`017886d4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiUnlinkPageFromLockedList+6c9
fffff800`02897cf9 488914c1 mov qword ptr [rcx+rax*8],rdx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiUnlinkPageFromLockedList+6c9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiUnlinkPageFromLockedList+6c9
BUCKET_ID: X64_0xA_nt!MiUnlinkPageFromLockedList+6c9
Followup: MachineOwner
---------
Oversættelse fra Dansk til Engelsk
Hello everyone
is there anyone who can help me my computer keeps making BSOD
My computer is
motherbord asus m4a89gtd pro/usb3
cpu amd 1090t
kingston ram 4gb
graphics card Pov gtx275
psu corsair tx850w..
HELP!!!!!!!!!!
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\040311-28797-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*c:\mss*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02806000 PsLoadedModuleList = 0xfffff800`02a43e50
Debug session time: Sun Apr 3 10:14:32.792 2011 (UTC + 2:00)
System Uptime: 0 days 1:14:42.852
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffffc604b3fa980, 2, 1, fffff80002897cf9}
Probably caused by : memory_corruption ( nt!MiUnlinkPageFromLockedList+6c9 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffc604b3fa980, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002897cf9, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002aae0e0
fffffc604b3fa980
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiUnlinkPageFromLockedList+6c9
fffff800`02897cf9 488914c1 mov qword ptr [rcx+rax*8],rdx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: avgnsa.exe
TRAP_FRAME: fffff8800c9fd700 -- (.trap 0xfffff8800c9fd700)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000003c0967f530 rbx=0000000000000000 rcx=fffffa8000000000
rdx=0000000000047a36 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002897cf9 rsp=fffff8800c9fd890 rbp=fffff80002ab01e0
r8=0000058000000000 r9=fffffa8000000008 r10=0000000000000000
r11=2aaaaaaaaaaaaaab r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po nc
nt!MiUnlinkPageFromLockedList+0x6c9:
fffff800`02897cf9 488914c1 mov qword ptr [rcx+rax*8],rdx ds:0460:fffffc60`4b3fa980=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002875ca9 to fffff80002876740
STACK_TEXT:
fffff880`0c9fd5b8 fffff800`02875ca9 : 00000000`0000000a fffffc60`4b3fa980 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0c9fd5c0 fffff800`02874920 : 00000000`001196cb fffffa80`01f96bc0 00000014`00000000 fffff6fb`831fdfd0 : nt!KiBugCheckDispatch+0x69
fffff880`0c9fd700 fffff800`02897cf9 : fffffa80`01f8e670 0000000f`ffffffff 7ff00000`00000000 00000000`03d5598f : nt!KiPageFault+0x260
fffff880`0c9fd890 fffff800`028a8587 : 0000000a`01964790 fffff680`00000000 0000007f`00000000 fffff680`0500cb20 : nt!MiUnlinkPageFromLockedList+0x6c9
fffff880`0c9fd920 fffff800`02892d26 : 00000000`00000000 0000000a`01964790 fffff680`0500c448 fffffa80`069cf998 : nt!MiResolveTransitionFault+0x167
fffff880`0c9fd9b0 fffff800`02890743 : ffffffff`ffffffff 0000000a`01889760 00000a8b`00000080 fffff880`00000000 : nt!MiDispatchFault+0x946
fffff880`0c9fdac0 fffff800`0287482e : 00000000`00000000 00000000`00000000 00000000`00000001 fffffa80`06fa3ae0 : nt!MmAccessFault+0x343
fffff880`0c9fdc20 0000000a`017886d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`017bd6e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xa`017886d4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiUnlinkPageFromLockedList+6c9
fffff800`02897cf9 488914c1 mov qword ptr [rcx+rax*8],rdx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiUnlinkPageFromLockedList+6c9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiUnlinkPageFromLockedList+6c9
BUCKET_ID: X64_0xA_nt!MiUnlinkPageFromLockedList+6c9
Followup: MachineOwner
---------