Переодически вылетает BSOD раз 5 в день.
При легком анализе пишет файлы: ntoskrnl.exe и win32k.sys
При сложном анализе выдает вот что:
Microsoft ® Windows Debugger Version 6.11.0001.404 X86
Copyright © Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\Mini080110-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: srv*C:\symbols*http://msdl.microsoft.com/download/symbols
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp.080413-2111
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Sun Aug 1 13:30:06.359 2010 (GMT+6)
System Uptime: 0 days 1:53:06.089
Loading Kernel Symbols
...............................................................
.....................................................
Loading User Symbols
Loading unloaded module list
..............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000000A, {7dc087fc, 2, 1, 80522727}
Probably caused by : memory_corruption ( nt!MiRemovePageByColor+a5 )
Followup: MachineOwner
---------
1: kd> kd: Reading initial command '!analyze -v; q'
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 7dc087fc, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 80522727, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: 7dc087fc
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiRemovePageByColor+a5
80522727 891c01 mov dword ptr [ecx+eax],ebx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: Installer.exe
LAST_CONTROL_TRANSFER: from 80522a80 to 80522727
STACK_TEXT:
b3f8a8ac 80522a80 00000000 c00d09f8 0000000d nt!MiRemovePageByColor+0xa5
b3f8a8c8 80520875 1a13f000 067cf024 0012fa24 nt!MiRemoveZeroPage+0x8a
b3f8a91c 80544578 00000001 1a13f000 00000001 nt!MmAccessFault+0xeb3
b3f8a91c 00507d2a 00000001 1a13f000 00000001 nt!KiTrap0E+0xd0
WARNING: Frame IP not in any known module. Following frames may be wrong.
0012fa24 00000000 00000000 00000000 00000000 0x507d2a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiRemovePageByColor+a5
80522727 891c01 mov dword ptr [ecx+eax],ebx
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiRemovePageByColor+a5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4802516a
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0xA_nt!MiRemovePageByColor+a5
BUCKET_ID: 0xA_nt!MiRemovePageByColor+a5
Followup: MachineOwner
---------
Заранее говорю огромное спасибо!
Очень надеюсь на вашу помощь и поддержку.