kroegtijger schreef op donderdag 16 augustus 2012 @ 23:37:
[...]
Niet dat ik weet... Het doet wel redelijk wat het zegt... niets meer, niets minder
[...]
Als je dan weer dezelfde drivers installeert kan je weer hetzelfde krijgen. Voor hetzelfde geldt heeft je MoBo-fabrikant een nieuwe versie uitgebracht waar een bug in zit icm drivers van bijvoorbeeld je videokaart... Dan blijft het probleem net zo hard weer terug komen. Kijk het indien mogelijk eerst even aan met de drivers van Microsoft zelf.. Als dat goed loopt pak je een voor een de drivers van de fabrikanten en dan zie je vanzelf waar het mis loopt
Windows drivers helpen me niet echt ver, maar ik heb wel het aantal drivers geminimaliseerd tot alles werkt, dat wil in deze zeggen Video, Chipset en Netwerk waarvan alleen netwerk drivers van Mobo cd en de rest van interpret.
Nadat ik deze geinstalleerd had was alles prima....totdat ik die backlog van 70 windows updates binnenkreeg en ik weer BSODS krijg bij een reboot...
Vooralsnog niet gehad tijdens gebruik. Maar ik realiseerde me kortgeleden ook dat mijn computer door mijn fantastische virusscanner wel eens een reboot geforceerd kon krijgen zomaar. Eén of andere gare update die ge forcefed werd.
Deze heb ik dus ook niet opnieuw geinstalleerd, maar een andere voor gepakt die dat soort geintjes hopelijk niet gaat uithalen.
081812-19328-01.dmp 18-8-2012 11:54:15 IRQL_NOT_LESS_OR_EQUAL 0x0000000a 00000000`4f444648 00000000`00000002 00000000`00000000 fffff800`02eefff5 ntoskrnl.exe ntoskrnl.exe+7f1c0 NT Kernel & System Microsoft® Windows® Operating System Microsoft Corporation 6.1.7601.17835 (win7sp1_gdr.120503-2030) x64 ntoskrnl.exe+7f1c0 C:\Windows\Minidump\081812-19328-01.dmp 4 15 7601 283.640
Ik gaat even kijken. Thanks.
Edit:
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000004f444648, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002eefff5, address which referenced memory
Debugging Details:
------------------
***** Kernel symbols are WRONG. Please fix symbols to do analysis.
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
ADDITIONAL_DEBUG_TEXT:
Use '!findthebuild' command to search for the target build information.
If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols.
MODULE_NAME: nt
FAULTING_MODULE: fffff80002e5c000 nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4fa390f3
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPoolCodeStart
unable to get nt!MmPoolCodeEnd
000000004f444648
CURRENT_IRQL: 0
FAULTING_IP:
nt+93ff5
fffff800`02eefff5 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
LAST_CONTROL_TRANSFER: from fffff80002eda769 to fffff80002edb1c0
STACK_TEXT:
fffff880`031a8248 fffff800`02eda769 : 00000000`0000000a 00000000`4f444648 00000000`00000002 00000000`00000000 : nt+0x7f1c0
fffff880`031a8250 00000000`0000000a : 00000000`4f444648 00000000`00000002 00000000`00000000 fffff800`02eefff5 : nt+0x7e769
fffff880`031a8258 00000000`4f444648 : 00000000`00000002 00000000`00000000 fffff800`02eefff5 00000300`00000550 : 0xa
fffff880`031a8260 00000000`00000002 : 00000000`00000000 fffff800`02eefff5 00000300`00000550 00000000`00000000 : 0x4f444648
fffff880`031a8268 00000000`00000000 : fffff800`02eefff5 00000300`00000550 00000000`00000000 00000000`00000000 : 0x2
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
nt+93ff5
fffff800`02eefff5 488b09 mov rcx,qword ptr [rcx]
SYMBOL_NAME: nt+93ff5
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: ntoskrnl.exe
BUCKET_ID: WRONG_SYMBOLS
Followup: MachineOwner
---------
ntokrnl.exe, deze geeft Nirsoft me ook terug. Iets te generiek denk ik.
[
Voor 178% gewijzigd door
Verwijderd op 18-08-2012 12:35
]