Hareide Skrevet 29. desember 2013 Del Skrevet 29. desember 2013 (endret) Når maskina min ikke har vært i bruk på (ca) nøyaktig 35 minutter, kommer det en blåskjerm. Dumpfil blir generert: IRQL_NOT_LESS_OR_EQUAL 0x0000000a 00000000`00000000 00000000`00000002 00000000`00000000 fffff800`030XXXXX ntoskrnl.exe+75bc0 Kjørte memtest86+ i et døgn tidligere, men fikk ikke på skjermen når jeg skulle sjekke resultatet. (Har hatt litt problemer med dette lenge, har en teori om at det er relatert til bruk av displayport. Oppstått kun utenfor 'Windows', slik som memtest og spinrite). Har et veldig godt eksempel fra at maskina stod på over natta i forrigårs (event viewer): Level: Date and Time: Source: EvtID: TaskGr: Time between: Information 12.28.13 10:46 Kernel-General 12 None 00:35 Information 12.28.13 10:10 Kernel-General 12 None 00:35 Information 12.28.13 9:35 Kernel-General 12 None 00:35 Information 12.28.13 8:59 Kernel-General 12 None 00:35 Information 12.28.13 8:23 Kernel-General 12 None 00:35 Information 12.28.13 7:48 Kernel-General 12 None 00:37 Information 12.28.13 7:10 Kernel-General 12 None 00:35 Information 12.28.13 6:35 Kernel-General 12 None 00:35 Information 12.28.13 5:59 Kernel-General 12 None 00:35 Information 12.28.13 5:24 Kernel-General 12 None 00:35 Information 12.28.13 4:48 Kernel-General 12 None 00:35 Information 12.28.13 4:12 Kernel-General 12 None 00:35 Information 12.28.13 3:37 Kernel-General 12 None 00:35 Information 12.28.13 3:01 Kernel-General 12 None 00:35 Information 12.28.13 2:25 Kernel-General 12 None 00:35 Information 12.28.13 1:50 Kernel-General 12 None 00:35 Information 12.28.13 1:14 Kernel-General 12 None (Finner ingen spor av hva som skjer før restarten, kun spor av at windows bootes på nytt) Har nylig spillt gjennom et lass med spill, ingen problemer da (eller når maskina brukes). Hardware: CPU: Intel i5 2500k HK: P8Z77-V LE PLUS (Bios version 0905) PSU: Newton R3 600W (kjøpt for 2 mnd siden, semi passiv vifte) GPU: Sapphire HD 5870 1GB RAM: 2x 4GB SSD: Corsair Force Series GT 120GB (OS, ca 1 år gammel) HD: Hitachi 2TB (HDS722020ALA330) (alt er over 2 år gammelt, med unntak av SSD og PSU) OS: Windows 7 64bit Ser at jeg oppdaterte GPU driver 01.12.2013: Driver Packaging Version 13.152.1.8-131008a-163824C-ATI Catalyst Version 13.9 Provider Advanced Micro Devices, Inc. 2D Driver Version 8.01.01.1331 Direct3D Version 9.14.10.0984 OpenGL Version 6.14.10.12430 AMD Catalyst Control Center Version 2013.1008.932.15229 Windbg Minidump: Microsoft ® Windows Debugger Version 6.12.0002.633 AMD64Copyright © Microsoft Corporation. All rights reserved.Loading Dump File [C:\Users\PKH\Desktop\Blåskjerm\121813-15818-01.dmp]Mini Kernel Dump File: Only registers and stack trace are availableSymbol search path is: srv*c:\symboler*http://msdl.microsoft.com/download/symbolsExecutable search path is:Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSBuilt by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532Machine Name:Kernel base = 0xfffff800`03012000 PsLoadedModuleList = 0xfffff800`032556d0Debug session time: Wed Dec 18 08:55:09.533 2013 (UTC + 1:00)System Uptime: 0 days 0:24:50.735Loading Kernel Symbols.........................................................................................................................................................................Loading User SymbolsLoading unloaded module list.....******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck A, {0, 2, 0, fffff8000309ca55}Probably caused by : CLFS.SYS ( CLFS!CClfsLogFcbPhysical::MapCacheData+105 )Followup: MachineOwner---------0: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************IRQL_NOT_LESS_OR_EQUAL (a)An attempt was made to access a pageable (or completely invalid) address at aninterrupt request level (IRQL) that is too high. This is usuallycaused by drivers using improper addresses.If a kernel debugger is available get the stack backtrace.Arguments:Arg1: 0000000000000000, memory referencedArg2: 0000000000000002, IRQLArg3: 0000000000000000, bitfield :bit 0 : value 0 = read operation, 1 = write operationbit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)Arg4: fffff8000309ca55, address which referenced memoryDebugging Details:------------------READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032bf1000000000000000000CURRENT_IRQL: 2FAULTING_IP:nt!IopCompleteRequest+ae5fffff800`0309ca55 488b09 mov rcx,qword ptr [rcx]CUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTBUGCHECK_STR: 0xAPROCESS_NAME: TrustedInstallIRP_ADDRESS: ffffffffffffff89TRAP_FRAME: fffff880042f85b0 -- (.trap 0xfffff880042f85b0)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=000000000000000f rbx=0000000000000000 rcx=000000000000003frdx=fffff980450c0000 rsi=0000000000000000 rdi=0000000000000000rip=fffff80003384c07 rsp=fffff880042f8740 rbp=fffffa80148be9b8r8=000000000000000f r9=fffffa8006663540 r10=fffffa8006663008r11=0000000000000000 r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0 nv up ei pl nz na po ncnt!CcMapData+0x117:fffff800`03384c07 0fb602 movzx eax,byte ptr [rdx] ds:fffff980`450c0000=??Resetting default scopeLAST_CONTROL_TRANSFER: from fffff80003087169 to fffff80003087bc0STACK_TEXT:fffff880`042f7ff8 fffff800`03087169 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckExfffff880`042f8000 fffff800`03085de0 : fffff880`0cb04000 00000000`00000000 fffffa80`06fe6990 fffffa80`0a8c3260 : nt!KiBugCheckDispatch+0x69fffff880`042f8140 fffff800`0309ca55 : 00000000`00000001 fffff800`030b6687 fffffa80`20206f49 fffffa80`010f1460 : nt!KiPageFault+0x260fffff880`042f82d0 fffff800`0307a5f7 : 00000000`00000001 fffffa80`1367b2f0 fffff880`042f8300 fffff800`00000000 : nt!IopCompleteRequest+0xae5fffff880`042f83a0 fffff800`03035ec9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1c7fffff880`042f8420 fffff800`0309585c : 00000000`00000000 00000000`00000000 ffffffff`ffffffff 00000000`00000000 : nt!KiCheckForKernelApcDelivery+0x25fffff880`042f8450 fffff800`03085cee : 00000000`00000000 fffff980`450c0000 00000000`00000000 00000000`0000000e : nt!MmAccessFault+0x1a3cfffff880`042f85b0 fffff800`03384c07 : 00000000`00000000 00000000`00000000 fffff880`042f8808 fffff880`042f8800 : nt!KiPageFault+0x16efffff880`042f8740 fffff880`00d1db19 : 00000000`00040000 fffffa80`144be010 fffffa80`148be9b8 00000000`0000000e : nt!CcMapData+0x117fffff880`042f8800 fffff880`00d4bd1f : fffffa80`0c146000 fffffa80`148be9b8 fffff880`042f8970 fffff8a0`00040000 : CLFS!CClfsLogFcbPhysical::MapCacheData+0x105fffff880`042f88b0 fffff880`00d17454 : fffffa80`0c146000 fffffa80`072a64f0 fffff880`00000100 00000000`00000000 : CLFS!CClfsLogFcbPhysical::FindEndOfLog+0x257fffff880`042f89e0 fffff880`00d3cd9e : fffffa80`0c146000 fffffa80`148be9b8 fffffa80`148be820 00000000`0012019f : CLFS!CClfsLogFcbPhysical::Initialize+0xa4cfffff880`042f8b30 fffff880`00d3c4e6 : fffffa80`0a8a6680 fffff880`042f8d01 00000000`00000007 fffffa80`06750100 : CLFS!CClfsRequest::Create+0x406fffff880`042f8c70 fffff880`00d58657 : fffffa80`0a8a6680 fffffa80`06a09000 00000000`00000000 00000000`000007ff : CLFS!CClfsRequest::Dispatch+0x12afffff880`042f8ce0 fffff880`00d30a09 : fffffa80`133d2930 fffffa80`0c135a60 fffffa80`133d2930 fffffa80`1396e230 : CLFS!ClfsDispatchIoRequest+0x1cbfffff880`042f8d30 fffff800`0338743c : 00000000`00000004 fffffa80`148be9b8 fffffa80`0c135a60 fffffa80`0c135af8 : CLFS!CClfsDriver::LogIoDispatch+0x21fffff880`042f8d60 fffff800`03382db8 : fffffa80`06a09060 fffff800`00000000 fffffa80`148be800 fffff8a0`00000000 : nt!IopParseDevice+0x14d3fffff880`042f8ec0 fffff800`03383fd6 : 00000000`00000000 fffffa80`148be800 fffffa80`00000060 fffffa80`067543f0 : nt!ObpLookupObjectName+0x588fffff880`042f8fb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByName+0x306STACK_COMMAND: kbFOLLOWUP_IP:CLFS!CClfsLogFcbPhysical::MapCacheData+105fffff880`00d1db19 448ae8 mov r13b,alSYMBOL_STACK_INDEX: 9SYMBOL_NAME: CLFS!CClfsLogFcbPhysical::MapCacheData+105FOLLOWUP_NAME: MachineOwnerMODULE_NAME: CLFSIMAGE_NAME: CLFS.SYSDEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc11dFAILURE_BUCKET_ID: X64_0xA_CLFS!CClfsLogFcbPhysical::MapCacheData+105BUCKET_ID: X64_0xA_CLFS!CClfsLogFcbPhysical::MapCacheData+105Followup: MachineOwner---------0: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************IRQL_NOT_LESS_OR_EQUAL (a)An attempt was made to access a pageable (or completely invalid) address at aninterrupt request level (IRQL) that is too high. This is usuallycaused by drivers using improper addresses.If a kernel debugger is available get the stack backtrace.Arguments:Arg1: 0000000000000000, memory referencedArg2: 0000000000000002, IRQLArg3: 0000000000000000, bitfield :bit 0 : value 0 = read operation, 1 = write operationbit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)Arg4: fffff8000309ca55, address which referenced memoryDebugging Details:------------------READ_ADDRESS: 0000000000000000CURRENT_IRQL: 2FAULTING_IP:nt!IopCompleteRequest+ae5fffff800`0309ca55 488b09 mov rcx,qword ptr [rcx]CUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTBUGCHECK_STR: 0xAPROCESS_NAME: TrustedInstallIRP_ADDRESS: ffffffffffffff89TRAP_FRAME: fffff880042f85b0 -- (.trap 0xfffff880042f85b0)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=000000000000000f rbx=0000000000000000 rcx=000000000000003frdx=fffff980450c0000 rsi=0000000000000000 rdi=0000000000000000rip=fffff80003384c07 rsp=fffff880042f8740 rbp=fffffa80148be9b8r8=000000000000000f r9=fffffa8006663540 r10=fffffa8006663008r11=0000000000000000 r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0 nv up ei pl nz na po ncnt!CcMapData+0x117:fffff800`03384c07 0fb602 movzx eax,byte ptr [rdx] ds:fffff980`450c0000=??Resetting default scopeLAST_CONTROL_TRANSFER: from fffff80003087169 to fffff80003087bc0STACK_TEXT:fffff880`042f7ff8 fffff800`03087169 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckExfffff880`042f8000 fffff800`03085de0 : fffff880`0cb04000 00000000`00000000 fffffa80`06fe6990 fffffa80`0a8c3260 : nt!KiBugCheckDispatch+0x69fffff880`042f8140 fffff800`0309ca55 : 00000000`00000001 fffff800`030b6687 fffffa80`20206f49 fffffa80`010f1460 : nt!KiPageFault+0x260fffff880`042f82d0 fffff800`0307a5f7 : 00000000`00000001 fffffa80`1367b2f0 fffff880`042f8300 fffff800`00000000 : nt!IopCompleteRequest+0xae5fffff880`042f83a0 fffff800`03035ec9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1c7fffff880`042f8420 fffff800`0309585c : 00000000`00000000 00000000`00000000 ffffffff`ffffffff 00000000`00000000 : nt!KiCheckForKernelApcDelivery+0x25fffff880`042f8450 fffff800`03085cee : 00000000`00000000 fffff980`450c0000 00000000`00000000 00000000`0000000e : nt!MmAccessFault+0x1a3cfffff880`042f85b0 fffff800`03384c07 : 00000000`00000000 00000000`00000000 fffff880`042f8808 fffff880`042f8800 : nt!KiPageFault+0x16efffff880`042f8740 fffff880`00d1db19 : 00000000`00040000 fffffa80`144be010 fffffa80`148be9b8 00000000`0000000e : nt!CcMapData+0x117fffff880`042f8800 fffff880`00d4bd1f : fffffa80`0c146000 fffffa80`148be9b8 fffff880`042f8970 fffff8a0`00040000 : CLFS!CClfsLogFcbPhysical::MapCacheData+0x105fffff880`042f88b0 fffff880`00d17454 : fffffa80`0c146000 fffffa80`072a64f0 fffff880`00000100 00000000`00000000 : CLFS!CClfsLogFcbPhysical::FindEndOfLog+0x257fffff880`042f89e0 fffff880`00d3cd9e : fffffa80`0c146000 fffffa80`148be9b8 fffffa80`148be820 00000000`0012019f : CLFS!CClfsLogFcbPhysical::Initialize+0xa4cfffff880`042f8b30 fffff880`00d3c4e6 : fffffa80`0a8a6680 fffff880`042f8d01 00000000`00000007 fffffa80`06750100 : CLFS!CClfsRequest::Create+0x406fffff880`042f8c70 fffff880`00d58657 : fffffa80`0a8a6680 fffffa80`06a09000 00000000`00000000 00000000`000007ff : CLFS!CClfsRequest::Dispatch+0x12afffff880`042f8ce0 fffff880`00d30a09 : fffffa80`133d2930 fffffa80`0c135a60 fffffa80`133d2930 fffffa80`1396e230 : CLFS!ClfsDispatchIoRequest+0x1cbfffff880`042f8d30 fffff800`0338743c : 00000000`00000004 fffffa80`148be9b8 fffffa80`0c135a60 fffffa80`0c135af8 : CLFS!CClfsDriver::LogIoDispatch+0x21fffff880`042f8d60 fffff800`03382db8 : fffffa80`06a09060 fffff800`00000000 fffffa80`148be800 fffff8a0`00000000 : nt!IopParseDevice+0x14d3fffff880`042f8ec0 fffff800`03383fd6 : 00000000`00000000 fffffa80`148be800 fffffa80`00000060 fffffa80`067543f0 : nt!ObpLookupObjectName+0x588fffff880`042f8fb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByName+0x306STACK_COMMAND: kbFOLLOWUP_IP:CLFS!CClfsLogFcbPhysical::MapCacheData+105fffff880`00d1db19 448ae8 mov r13b,alSYMBOL_STACK_INDEX: 9SYMBOL_NAME: CLFS!CClfsLogFcbPhysical::MapCacheData+105FOLLOWUP_NAME: MachineOwnerMODULE_NAME: CLFSIMAGE_NAME: CLFS.SYSDEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc11dFAILURE_BUCKET_ID: X64_0xA_CLFS!CClfsLogFcbPhysical::MapCacheData+105BUCKET_ID: X64_0xA_CLFS!CClfsLogFcbPhysical::MapCacheData+105Followup: MachineOwner--------- Fulldump: Microsoft ® Windows Debugger Version 6.12.0002.633 AMD64Copyright © Microsoft Corporation. All rights reserved.Loading Dump File [C:\Users\PKH\Desktop\Blåskjerm\MEMORY.DMP]Kernel Summary Dump File: Only kernel address space is availableSymbol search path is: srv*c:\symboler*http://msdl.microsoft.com/download/symbolsExecutable search path is:Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSBuilt by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532Machine Name:Kernel base = 0xfffff800`03012000 PsLoadedModuleList = 0xfffff800`032556d0Debug session time: Wed Dec 18 08:55:09.533 2013 (UTC + 1:00)System Uptime: 0 days 0:24:50.735Loading Kernel Symbols.........................................................................................................................................................................Loading User SymbolsPEB is paged out (Peb.Ldr = 000007ff`fffd5018). Type ".hh dbgerr001" for detailsLoading unloaded module list.....******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck A, {0, 2, 0, fffff8000309ca55}Probably caused by : CLFS.SYS ( CLFS!CClfsLogFcbPhysical::MapCacheData+105 )Followup: MachineOwner---------0: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************IRQL_NOT_LESS_OR_EQUAL (a)An attempt was made to access a pageable (or completely invalid) address at aninterrupt request level (IRQL) that is too high. This is usuallycaused by drivers using improper addresses.If a kernel debugger is available get the stack backtrace.Arguments:Arg1: 0000000000000000, memory referencedArg2: 0000000000000002, IRQLArg3: 0000000000000000, bitfield :bit 0 : value 0 = read operation, 1 = write operationbit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)Arg4: fffff8000309ca55, address which referenced memoryDebugging Details:------------------READ_ADDRESS: 0000000000000000CURRENT_IRQL: 2FAULTING_IP:nt!IopCompleteRequest+ae5fffff800`0309ca55 488b09 mov rcx,qword ptr [rcx]DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTBUGCHECK_STR: 0xAPROCESS_NAME: TrustedInstallIRP_ADDRESS: ffffffffffffff89TRAP_FRAME: fffff880042f85b0 -- (.trap 0xfffff880042f85b0)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=000000000000000f rbx=0000000000000000 rcx=000000000000003frdx=fffff980450c0000 rsi=0000000000000000 rdi=0000000000000000rip=fffff80003384c07 rsp=fffff880042f8740 rbp=fffffa80148be9b8r8=000000000000000f r9=fffffa8006663540 r10=fffffa8006663008r11=0000000000000000 r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0 nv up ei pl nz na po ncnt!CcMapData+0x117:Page 5e2b3 not present in the dump file. Type ".hh dbgerr004" for detailsfffff800`03384c07 0fb602 movzx eax,byte ptr [rdx] ds:fffff980`450c0000=??Resetting default scopeLAST_CONTROL_TRANSFER: from fffff80003087169 to fffff80003087bc0STACK_TEXT:fffff880`042f7ff8 fffff800`03087169 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckExfffff880`042f8000 fffff800`03085de0 : fffff880`0cb04000 00000000`00000000 fffffa80`06fe6990 fffffa80`0a8c3260 : nt!KiBugCheckDispatch+0x69fffff880`042f8140 fffff800`0309ca55 : 00000000`00000001 fffff800`030b6687 fffffa80`20206f49 fffffa80`010f1460 : nt!KiPageFault+0x260fffff880`042f82d0 fffff800`0307a5f7 : 00000000`00000001 fffffa80`1367b2f0 fffff880`042f8300 fffff800`00000000 : nt!IopCompleteRequest+0xae5fffff880`042f83a0 fffff800`03035ec9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1c7fffff880`042f8420 fffff800`0309585c : 00000000`00000000 00000000`00000000 ffffffff`ffffffff 00000000`00000000 : nt!KiCheckForKernelApcDelivery+0x25fffff880`042f8450 fffff800`03085cee : 00000000`00000000 fffff980`450c0000 00000000`00000000 00000000`0000000e : nt!MmAccessFault+0x1a3cfffff880`042f85b0 fffff800`03384c07 : 00000000`00000000 00000000`00000000 fffff880`042f8808 fffff880`042f8800 : nt!KiPageFault+0x16efffff880`042f8740 fffff880`00d1db19 : 00000000`00040000 fffffa80`144be010 fffffa80`148be9b8 00000000`0000000e : nt!CcMapData+0x117fffff880`042f8800 fffff880`00d4bd1f : fffffa80`0c146000 fffffa80`148be9b8 fffff880`042f8970 fffff8a0`00040000 : CLFS!CClfsLogFcbPhysical::MapCacheData+0x105fffff880`042f88b0 fffff880`00d17454 : fffffa80`0c146000 fffffa80`072a64f0 fffff880`00000100 00000000`00000000 : CLFS!CClfsLogFcbPhysical::FindEndOfLog+0x257fffff880`042f89e0 fffff880`00d3cd9e : fffffa80`0c146000 fffffa80`148be9b8 fffffa80`148be820 00000000`0012019f : CLFS!CClfsLogFcbPhysical::Initialize+0xa4cfffff880`042f8b30 fffff880`00d3c4e6 : fffffa80`0a8a6680 fffff880`042f8d01 00000000`00000007 fffffa80`06750100 : CLFS!CClfsRequest::Create+0x406fffff880`042f8c70 fffff880`00d58657 : fffffa80`0a8a6680 fffffa80`06a09000 00000000`00000000 00000000`000007ff : CLFS!CClfsRequest::Dispatch+0x12afffff880`042f8ce0 fffff880`00d30a09 : fffffa80`133d2930 fffffa80`0c135a60 fffffa80`133d2930 fffffa80`1396e230 : CLFS!ClfsDispatchIoRequest+0x1cbfffff880`042f8d30 fffff800`0338743c : 00000000`00000004 fffffa80`148be9b8 fffffa80`0c135a60 fffffa80`0c135af8 : CLFS!CClfsDriver::LogIoDispatch+0x21fffff880`042f8d60 fffff800`03382db8 : fffffa80`06a09060 fffff800`00000000 fffffa80`148be800 fffff8a0`00000000 : nt!IopParseDevice+0x14d3fffff880`042f8ec0 fffff800`03383fd6 : 00000000`00000000 fffffa80`148be800 fffffa80`00000060 fffffa80`067543f0 : nt!ObpLookupObjectName+0x588fffff880`042f8fb0 fffff800`033858dc : fffffa80`135be900 00000000`00000000 fffff8a0`052aea00 00000000`000007ff : nt!ObOpenObjectByName+0x306fffff880`042f9080 fffff800`0332dcab : fffff880`042f9308 00000000`c0000000 fffff880`042f9390 fffff880`042f9370 : nt!IopCreateFile+0x2bcfffff880`042f9120 fffff800`033058d5 : fffff880`042f9370 fffff880`042f9308 00000000`c0000000 fffff880`042f9390 : nt!IoCreateFileEx+0xfbfffff880`042f91c0 fffff880`00d58fcd : 00000000`00000000 00000000`00000010 fffff880`00d64ee0 00000000`00000001 : nt!IoCreateFileSpecifyDeviceObjectHint+0xe5fffff880`042f9270 fffff800`03304622 : fffff880`042f9500 00000000`00000074 00000000`00000010 fffff8a0`1983b250 : CLFS!ClfsCreateLogFile+0x901fffff880`042f9460 fffff800`0330548a : 00000000`00000000 fffff8a0`2144b010 00000000`00000001 fffff800`0328e5e0 : nt!CmpInitCmRM+0x372fffff880`042f9640 fffff800`03304f17 : fffff8a0`00000020 fffff880`042f9960 00000000`00000000 00000000`00000021 : nt!CmLoadKey+0x452fffff880`042f9830 fffff800`03305a60 : 0000007f`fffffff8 00000000`00d7de00 00000000`00000000 00000000`00000000 : nt!NtLoadKeyEx+0x4c5fffff880`042f9a90 fffff800`03086e53 : 00000000`00000008 00000000`76fd46bb 00000000`00000001 00000000`00000000 : nt!NtLoadKey+0x24fffff880`042f9ae0 00000000`770020ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x1300000000`00d7dda8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x770020baSTACK_COMMAND: kbFOLLOWUP_IP:CLFS!CClfsLogFcbPhysical::MapCacheData+105fffff880`00d1db19 448ae8 mov r13b,alSYMBOL_STACK_INDEX: 9SYMBOL_NAME: CLFS!CClfsLogFcbPhysical::MapCacheData+105FOLLOWUP_NAME: MachineOwnerMODULE_NAME: CLFSIMAGE_NAME: CLFS.SYSDEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc11dFAILURE_BUCKET_ID: X64_0xA_CLFS!CClfsLogFcbPhysical::MapCacheData+105BUCKET_ID: X64_0xA_CLFS!CClfsLogFcbPhysical::MapCacheData+105Followup: MachineOwner--------- Har litt problemer med hvor en bør starte feilsøking (driver > 1xRAM > PSU > memtest > test idle i BIOS ..). Noen som har et godt tips? Forsøkt: Kjørt maskina med kun 1 rambrikke (prøvd begge 2, i forskjellige slotter) Sleep/hibernate/screen saver/display off/hd shutdown = deaktivert Idle i BIOS (får da ikke blåskjem) Resatt bios Edit: Ser nå at jeg har endra fra minidump til fulldump ved blåskjerm. Derfor det ikke kom fram i bluescreenview 'plutselig'. Har dermed trolig fått blåskjerm hele tiden, har endra på posten til å gjenspeile dette. Endret 30. desember 2013 av Hareide Lenke til kommentar
SteinarN Skrevet 29. desember 2013 Del Skrevet 29. desember 2013 Ser det går 35 min mellom hver gang. Hva har du i tidsinnstillinger for sleep/dvale osv? Jeg har vært borti noe lignende hvor maskinen gikk ut av sleep nesten med en gang pga noe som jeg aldri fant ordentlig ut av. Kanskje prøve å slå av sleep/dvale og se om maskinen restarter da når den får stå for seg selv ubrukt. Lenke til kommentar
Hareide Skrevet 29. desember 2013 Forfatter Del Skrevet 29. desember 2013 Ser det går 35 min mellom hver gang. Hva har du i tidsinnstillinger for sleep/dvale osv? Jeg har vært borti noe lignende hvor maskinen gikk ut av sleep nesten med en gang pga noe som jeg aldri fant ordentlig ut av. Kanskje prøve å slå av sleep/dvale og se om maskinen restarter da når den får stå for seg selv ubrukt. Takk for tipset, men jeg sjekka dette tidligere i dag. Har dobbelsjekka det nå, og alt slikt er deaktivert. Gjorde noen små endringer inni der nå, men har ikke store håpet om bedringer: 'Allow hybrid sleep: On -> Off' 'Turn off hard disk after: 20 min => Never' 'Turn off display after: 1 min => Never' Lenke til kommentar
Hareide Skrevet 30. desember 2013 Forfatter Del Skrevet 30. desember 2013 (endret) Googla litt etter infoen i Windbg, kom fram til at jeg opplever det samme som i denne tråden om: ("windbg clfs TrustedInstall IRQL_NOT_LESS_OR_EQUAL") IRQ_NOT_LESS_OR_EQUAL (a) Der skyldes det på 'Software Certification Toolkit' versjon 3.5.0.0 (eller bare 'Certification Tool'), som jeg "tilfeldigvis" installerte dette 11.12.2013. Skal nå prøve å avinstallere certification tool og gjøre følgende endring i regedit: " I would suggest to stop the Systrace.sys driver from loading by doing the following: Open regedit and navigate to the following registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SysTrace At that key in the right window double-click Start and change the Value data to 4 which should disable Systrace. Create a System Restore Point beforehand and restart the computer afterward. Hopefully that should prevent any further BSODs. " Endret 30. desember 2013 av Hareide Lenke til kommentar
Hareide Skrevet 30. desember 2013 Forfatter Del Skrevet 30. desember 2013 (endret) Uninstall av MS 'Software Certification Toolkit' var ikke nok, måtte inn i regedit å gjøre endringen ovenfor. Men nå har maskina vært påslått uten reboot i over 10 timer, IDLE. Da er vel denne løst. Mye takk til: Hvordan DU kan feilsøke Windows! (Guider) Endret 30. desember 2013 av Hareide Lenke til kommentar
Anbefalte innlegg
Opprett en konto eller logg inn for å kommentere
Du må være et medlem for å kunne skrive en kommentar
Opprett konto
Det er enkelt å melde seg inn for å starte en ny konto!
Start en kontoLogg inn
Har du allerede en konto? Logg inn her.
Logg inn nå