Od pewnego czasu mojemu znajomemu co pewien czas robi się BSOD.
Jako że ja za dużo wiedzy nie mam jak chodzi o pliki dmp więc sam nie potrafię wykryć czemu tak się dzieje.
Płyta główna Gigabyte GA-965P-DS3/S3
Karta graficzna NVDIA GeForce 9600 GSO 512
Intel Core 2 Duo E4500
co dokładnie ma za kosci pamięci ram to nie powiem w tym momencie jedynie co wiem że ma 2 kości po 512Mb i jedną kość 2Mb nową więc możliwe że to ona problemy może robić.
System Windows Windows XP SP3 (przynajmniej tak pisze w pliku dmp)
dysk wrzucę jak tylko mi znajomy podeśle model jak by jeszcze coś dodać to piszcie co.
odczyt pliku dmp:
Microsoft ® Windows Debugger Version 6.11.0001.402 X86
Copyright © Microsoft Corporation. All rights reserved.Loading Dump File [C:\Users\Admin\Downloads\Mini120613-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are availableSymbol search path is: SRVc:\symbolshttp://msdl.microsoft.com/download/symbols;C:\symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 2600.xpsp_sp3_qfe.130704-0421
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Thu Dec 5 23:13:47.281 2013 (GMT+1)
System Uptime: 0 days 4:57:59.024
Loading Kernel Symbols
…
…
Loading User Symbols
Loading unloaded module list
…
*
Bugcheck Analysis *
*
Use !analyze -v to get detailed debugging information.
BugCheck 100000D1, {c7, 2, 1, b83e26e3}
Probably caused by : usbuhci.sys ( usbuhci!UhciUnlinkQh+3b )
Followup: MachineOwner
1: kd> !analyze -v
*
Bugcheck Analysis *
*
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000c7, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, value 0 = read operation, 1 = write operation
Arg4: b83e26e3, address which referenced memoryDebugging Details:
WRITE_ADDRESS: 000000c7
CURRENT_IRQL: 2
FAULTING_IP:
usbuhci!UhciUnlinkQh+3b
b83e26e3 897b18 mov dword ptr [ebx+18h],ediCUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: INTEL_CPU_MICROCODE_ZERO
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
LAST_CONTROL_TRANSFER: from b83e2ec1 to b83e26e3
STACK_TEXT:
b856fbfc b83e2ec1 8a1199dc 8a074000 8a1190e0 usbuhci!UhciUnlinkQh+0x3b
b856fc14 b83e0ffe 8a1199dc 89f4b2d0 00000002 usbuhci!UhciSetAsyncEndpointState+0x4b
b856fc2c b72ddb79 8a1199dc 89f4b2d0 00000002 usbuhci!UhciSetEndpointState+0x3c
b856fc50 b72d9850 02746573 00000002 80546bec USBPORT!USBPORT_SetEndpointState+0x1cf
b856fc7c b72dbb40 8a119028 80546bec 89f4b158 USBPORT!USBPORT_DmaEndpointWorker+0x282
b856fca4 b72de1c8 8a119028 00000003 80546bec USBPORT!USBPORT_CoreEndpointWorker+0x6d2
b856fd04 b72deec0 00f4b158 ffffffff 80546bec USBPORT!USBPORT_FlushPendingList+0x2dc
b856fd3c b72df4ba 8a119028 8a119028 8a1190e0 USBPORT!USBPORT_FlushAllEndpoints+0x294
b856fd7c b72d816e 8a119028 00000000 89d9d848 USBPORT!USBPORT_Worker+0x11e
b856fdac 805cffee 8a119028 00000000 00000000 USBPORT!USBPORT_WorkerThread+0x12a
b856fddc 8054620e b72d8044 8a119028 00000000 nt!PspSystemThreadStartup+0x34
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16STACK_COMMAND: kb
FOLLOWUP_IP:
usbuhci!UhciUnlinkQh+3b
b83e26e3 897b18 mov dword ptr [ebx+18h],ediSYMBOL_STACK_INDEX: 0
SYMBOL_NAME: usbuhci!UhciUnlinkQh+3b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: usbuhci
IMAGE_NAME: usbuhci.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 480254ce
FAILURE_BUCKET_ID: 0xD1_usbuhci!UhciUnlinkQh+3b
BUCKET_ID: 0xD1_usbuhci!UhciUnlinkQh+3b
Followup: MachineOwner
plik dmp z którego jest to wyczytane: