Gå til innhold
Trenger du hjelp med PCen? Still spørsmål her! ×

Hjelp med feilsøking etter utallige krasj


Anbefalte innlegg

Hei

 

Jeg har en laptop som jeg har brukt i godt over et år med en ikke genuin windows, fant ut her om dagen at jeg skulle ta meg bryet å fikse opp i dette å installere en skikkelig windows ;)

 

Etter format og reinstall og install av alle driverne som hører til, fra multicom.no, maskinen er en Multicom Kunshan X8100 -18.4", i7 prossessor, 2stk geforce gtx 285m skjermkort osv. så har maskinen begynt med plutselige bluescreens.

 

Først trodde jeg at det var HDD, en 64 gb SSD disk, der jeg fikk noen feilmeldinger da jeg kjørte chkdsk på. Jeg fikk derfor tak i en ny SSD disk, 120 GB, og installerte windows på nytt på denne. Windows 7 64 bit versjon om det har noe å si. Og har brukt den i 8-10 timer, så krasjer den på nytt :(

 

Leste gjennom den sticky tråden om feilsøking og har kjørt sånn debugg program på MEMORY.DMP fila etter krasjet. Jeg er usikker på hvordan jeg skal tolke resultatet av denne:

 

 

Microsoft ® Windows Debugger Version 6.12.0002.633 AMD64

Copyright © Microsoft Corporation. All rights reserved.

 

 

Loading Dump File [C:\Users\ROar\Desktop\MEMORY.DMP]

Kernel Summary Dump File: Only kernel address space is available

 

Symbol search path is: srv*c:\symboler*http://msdl.microsoft.com/download/symbols

Executable search path is: srv*c:\symboler*http://msdl.microsoft.com/download/symbols

Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS

Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506

Machine Name:

Kernel base = 0xfffff800`02a59000 PsLoadedModuleList = 0xfffff800`02c9e670

Debug session time: Thu Oct 13 23:17:21.057 2011 (UTC + 2:00)

System Uptime: 0 days 11:05:50.072

Loading Kernel Symbols

...............................................................

................................................................

............................

Loading User Symbols

PEB is paged out (Peb.Ldr = 00000000`7efdf018). Type ".hh dbgerr001" for details

Loading unloaded module list

............................

*** ERROR: Module load completed but symbols could not be loaded for NETw5s64.sys

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

 

Use !analyze -v to get detailed debugging information.

 

BugCheck DEADDEAD, {14e, 0, 0, 0}

 

Probably caused by : NETw5s64.sys ( NETw5s64+a6c257 )

 

Followup: MachineOwner

---------

 

4: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

 

MANUALLY_INITIATED_CRASH1 (deaddead)

The user manually initiated this crash dump.

Arguments:

Arg1: 000000000000014e

Arg2: 0000000000000000

Arg3: 0000000000000000

Arg4: 0000000000000000

 

Debugging Details:

------------------

 

 

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

 

BUGCHECK_STR: 0xDEADDEAD

 

PROCESS_NAME: Launcher.exe

 

CURRENT_IRQL: 0

 

LAST_CONTROL_TRANSFER: from fffff8800fcd9257 to fffff80002ad5c40

 

STACK_TEXT:

fffff880`0e7920b8 fffff880`0fcd9257 : 00000000`deaddead 00000000`0000014e 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx

fffff880`0e7920c0 fffff880`0fd67275 : fffffa80`065f1e94 fffffa80`06e5a220 00000000`00000000 00000000`00000000 : NETw5s64+0xa6c257

fffff880`0e792120 fffff880`017d4753 : fffffa80`065f1e94 fffffa80`06e5a220 fffffa80`00000000 fffff880`016dd2f7 : NETw5s64+0xafa275

fffff880`0e792170 fffff880`017d481d : fffffa80`06e5a220 fffffa80`0658d010 00000000`00000000 00000000`00000002 : vwififlt!FilterReturnNetBufferListsCommon+0xb7

fffff880`0e7921c0 fffff880`0debf5bb : fffffa80`073a46d0 fffffa80`05b40810 00000000`00000000 fffffa80`07b15050 : vwififlt!FilterReturnNetBufferLists+0x79

fffff880`0e7921f0 fffff880`0dec1643 : fffffa80`073a46d0 fffffa80`073a46d0 fffffa80`07b15050 00000000`00000000 : nwifi!WPP_SF_dll+0x3ab

fffff880`0e792230 fffff880`017638d4 : fffffa80`05a4f1a0 00000000`00000000 00000000`00000000 00000000`00000000 : nwifi!MP6ReturnNBL+0x4b

fffff880`0e792260 fffff880`0179a17b : fffffa80`07156550 fffffa80`05a4f1a0 00000000`00000000 fffffa80`0485e980 : ndis!ndisReturnNetBufferListsInternal+0x94

fffff880`0e7922a0 fffff880`01879d86 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!NdisReturnNetBufferLists+0x3b

fffff880`0e7922e0 fffff880`01602892 : fffff880`0e792790 00000000`00000001 00000000`00000001 fffff880`0e7924b0 : tcpip!FlpReturnNetBufferListChain+0x96

fffff880`0e792330 fffff880`0189df81 : 00000000`000005b4 fffffa80`07f1fb00 fffff880`0e7923b4 00000000`00000000 : NETIO!NetioDereferenceNetBufferListChain+0x132

fffff880`0e792400 fffff880`0137144d : fffff880`0e792790 fffffa80`073a46d0 fffff880`0e792ca0 fffffa80`075f3010 : tcpip!TcpTlProviderReleaseIndicationList+0x81

fffff880`0e792430 fffff880`013b28a1 : fffff880`0e792970 fffff880`0e792790 fffff880`0e792790 00000000`00000000 : afd!AfdTLReleaseIndications+0x2d

fffff880`0e792480 fffff880`0139a7bb : fffffa80`07b2e9d0 fffff880`0e7927d0 00000000`00000014 fffffa80`04010000 : afd!AfdFastConnectionReceive+0x8d1

fffff880`0e7926a0 fffff800`02df0803 : 00000000`00004000 fffffa80`077765b0 00000000`0a21fbb8 00000000`0969f101 : afd!AfdFastIoDeviceControl+0x7ab

fffff880`0e792a10 fffff800`02df12f6 : fffff880`009b1180 00000000`00000a50 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x373

fffff880`0e792b40 fffff800`02ad4ed3 : 00000000`00000000 fffff800`02dbeb5c fffff880`0e792ca0 00000000`00000000 : nt!NtDeviceIoControlFile+0x56

fffff880`0e792bb0 00000000`74db2e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13

00000000`0969f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74db2e09

 

 

STACK_COMMAND: kb

 

FOLLOWUP_IP:

NETw5s64+a6c257

fffff880`0fcd9257 e9a1000000 jmp NETw5s64+0xa6c2fd (fffff880`0fcd92fd)

 

SYMBOL_STACK_INDEX: 1

 

SYMBOL_NAME: NETw5s64+a6c257

 

FOLLOWUP_NAME: MachineOwner

 

MODULE_NAME: NETw5s64

 

IMAGE_NAME: NETw5s64.sys

 

DEBUG_FLR_IMAGE_TIMESTAMP: 4aefdff9

 

FAILURE_BUCKET_ID: X64_0xDEADDEAD_NETw5s64+a6c257

 

BUCKET_ID: X64_0xDEADDEAD_NETw5s64+a6c257

 

Followup: MachineOwner

---------

 

4: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

 

MANUALLY_INITIATED_CRASH1 (deaddead)

The user manually initiated this crash dump.

Arguments:

Arg1: 000000000000014e

Arg2: 0000000000000000

Arg3: 0000000000000000

Arg4: 0000000000000000

 

Debugging Details:

------------------

 

 

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

 

BUGCHECK_STR: 0xDEADDEAD

 

PROCESS_NAME: Launcher.exe

 

CURRENT_IRQL: 0

 

LAST_CONTROL_TRANSFER: from fffff8800fcd9257 to fffff80002ad5c40

 

STACK_TEXT:

fffff880`0e7920b8 fffff880`0fcd9257 : 00000000`deaddead 00000000`0000014e 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx

fffff880`0e7920c0 fffff880`0fd67275 : fffffa80`065f1e94 fffffa80`06e5a220 00000000`00000000 00000000`00000000 : NETw5s64+0xa6c257

fffff880`0e792120 fffff880`017d4753 : fffffa80`065f1e94 fffffa80`06e5a220 fffffa80`00000000 fffff880`016dd2f7 : NETw5s64+0xafa275

fffff880`0e792170 fffff880`017d481d : fffffa80`06e5a220 fffffa80`0658d010 00000000`00000000 00000000`00000002 : vwififlt!FilterReturnNetBufferListsCommon+0xb7

fffff880`0e7921c0 fffff880`0debf5bb : fffffa80`073a46d0 fffffa80`05b40810 00000000`00000000 fffffa80`07b15050 : vwififlt!FilterReturnNetBufferLists+0x79

fffff880`0e7921f0 fffff880`0dec1643 : fffffa80`073a46d0 fffffa80`073a46d0 fffffa80`07b15050 00000000`00000000 : nwifi!WPP_SF_dll+0x3ab

fffff880`0e792230 fffff880`017638d4 : fffffa80`05a4f1a0 00000000`00000000 00000000`00000000 00000000`00000000 : nwifi!MP6ReturnNBL+0x4b

fffff880`0e792260 fffff880`0179a17b : fffffa80`07156550 fffffa80`05a4f1a0 00000000`00000000 fffffa80`0485e980 : ndis!ndisReturnNetBufferListsInternal+0x94

fffff880`0e7922a0 fffff880`01879d86 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!NdisReturnNetBufferLists+0x3b

fffff880`0e7922e0 fffff880`01602892 : fffff880`0e792790 00000000`00000001 00000000`00000001 fffff880`0e7924b0 : tcpip!FlpReturnNetBufferListChain+0x96

fffff880`0e792330 fffff880`0189df81 : 00000000`000005b4 fffffa80`07f1fb00 fffff880`0e7923b4 00000000`00000000 : NETIO!NetioDereferenceNetBufferListChain+0x132

fffff880`0e792400 fffff880`0137144d : fffff880`0e792790 fffffa80`073a46d0 fffff880`0e792ca0 fffffa80`075f3010 : tcpip!TcpTlProviderReleaseIndicationList+0x81

fffff880`0e792430 fffff880`013b28a1 : fffff880`0e792970 fffff880`0e792790 fffff880`0e792790 00000000`00000000 : afd!AfdTLReleaseIndications+0x2d

fffff880`0e792480 fffff880`0139a7bb : fffffa80`07b2e9d0 fffff880`0e7927d0 00000000`00000014 fffffa80`04010000 : afd!AfdFastConnectionReceive+0x8d1

fffff880`0e7926a0 fffff800`02df0803 : 00000000`00004000 fffffa80`077765b0 00000000`0a21fbb8 00000000`0969f101 : afd!AfdFastIoDeviceControl+0x7ab

fffff880`0e792a10 fffff800`02df12f6 : fffff880`009b1180 00000000`00000a50 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x373

fffff880`0e792b40 fffff800`02ad4ed3 : 00000000`00000000 fffff800`02dbeb5c fffff880`0e792ca0 00000000`00000000 : nt!NtDeviceIoControlFile+0x56

fffff880`0e792bb0 00000000`74db2e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13

00000000`0969f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74db2e09

 

 

STACK_COMMAND: kb

 

FOLLOWUP_IP:

NETw5s64+a6c257

fffff880`0fcd9257 e9a1000000 jmp NETw5s64+0xa6c2fd (fffff880`0fcd92fd)

 

SYMBOL_STACK_INDEX: 1

 

SYMBOL_NAME: NETw5s64+a6c257

 

FOLLOWUP_NAME: MachineOwner

 

MODULE_NAME: NETw5s64

 

IMAGE_NAME: NETw5s64.sys

 

DEBUG_FLR_IMAGE_TIMESTAMP: 4aefdff9

 

FAILURE_BUCKET_ID: X64_0xDEADDEAD_NETw5s64+a6c257

 

BUCKET_ID: X64_0xDEADDEAD_NETw5s64+a6c257

 

Followup: MachineOwner

---------

 

 

 

 

Kanskje noen kan være så vennlige å se om det som står der gir noen mening, eventuelt gi meg noe tips til hva jeg kan prøve

 

mvh

 

Roar

Endret av Aardal
Lenke til kommentar
Videoannonse
Annonse

krasjet igjen ca 10 minutter senere, bluescreen

 

her er debugg tingen fra minidump elns

 

 

Microsoft ® Windows Debugger Version 6.12.0002.633 AMD64

Copyright © Microsoft Corporation. All rights reserved.

 

 

Loading Dump File [C:\Users\ROar\Desktop\101311-16567-01.dmp]

Mini Kernel Dump File: Only registers and stack trace are available

 

Symbol search path is: srv*c:\symboler*http://msdl.microsoft.com/download/symbols

Executable search path is: srv*c:\symboler*http://msdl.microsoft.com/download/symbols

Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS

Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506

Machine Name:

Kernel base = 0xfffff800`02a53000 PsLoadedModuleList = 0xfffff800`02c98670

Debug session time: Thu Oct 13 23:30:43.108 2011 (UTC + 2:00)

System Uptime: 0 days 0:12:48.123

Loading Kernel Symbols

...............................................................

................................................................

...........................

Loading User Symbols

Loading unloaded module list

.........

Unable to load image \SystemRoot\system32\DRIVERS\NETw5s64.sys, Win32 error 0n2

*** WARNING: Unable to verify timestamp for NETw5s64.sys

*** ERROR: Module load completed but symbols could not be loaded for NETw5s64.sys

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

 

Use !analyze -v to get detailed debugging information.

 

BugCheck DEADDEAD, {14e, 0, 0, 0}

 

Probably caused by : NETw5s64.sys ( NETw5s64+a6c257 )

 

Followup: MachineOwner

---------

 

4: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

 

MANUALLY_INITIATED_CRASH1 (deaddead)

The user manually initiated this crash dump.

Arguments:

Arg1: 000000000000014e

Arg2: 0000000000000000

Arg3: 0000000000000000

Arg4: 0000000000000000

 

Debugging Details:

------------------

 

 

CUSTOMER_CRASH_COUNT: 1

 

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

 

BUGCHECK_STR: 0xDEADDEAD

 

PROCESS_NAME: Launcher.exe

 

CURRENT_IRQL: 0

 

LAST_CONTROL_TRANSFER: from fffff8800fd2b257 to fffff80002acfc40

 

STACK_TEXT:

fffff880`0ca620b8 fffff880`0fd2b257 : 00000000`deaddead 00000000`0000014e 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx

fffff880`0ca620c0 00000000`deaddead : 00000000`0000014e 00000000`00000000 00000000`00000000 00000000`00000000 : NETw5s64+0xa6c257

fffff880`0ca620c8 00000000`0000014e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xdeaddead

fffff880`0ca620d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`064eb014 : 0x14e

 

 

STACK_COMMAND: kb

 

FOLLOWUP_IP:

NETw5s64+a6c257

fffff880`0fd2b257 ?? ???

 

SYMBOL_STACK_INDEX: 1

 

SYMBOL_NAME: NETw5s64+a6c257

 

FOLLOWUP_NAME: MachineOwner

 

MODULE_NAME: NETw5s64

 

IMAGE_NAME: NETw5s64.sys

 

DEBUG_FLR_IMAGE_TIMESTAMP: 4aefdff9

 

FAILURE_BUCKET_ID: X64_0xDEADDEAD_NETw5s64+a6c257

 

BUCKET_ID: X64_0xDEADDEAD_NETw5s64+a6c257

 

Followup: MachineOwner

---------

Lenke til kommentar

Opprett en konto eller logg inn for å kommentere

Du må være et medlem for å kunne skrive en kommentar

Opprett konto

Det er enkelt å melde seg inn for å starte en ny konto!

Start en konto

Logg inn

Har du allerede en konto? Logg inn her.

Logg inn nå
×
×
  • Opprett ny...