Автор: rbu333
Дата сообщения: 21.04.2006 18:14
Иногда (вероятность около 30%) перезагружается комп, когда вставляю диски в дисковод.
конфигурация
AMD Athlon 64 4000+ 2.4GHz Socket 939
ECS NFORCE4-A939, nForce4, Socket-939
Gainward GeForce 7800GT 512MB,1,4ns DDR3
NorthQ 4775-400BULK, ATX 400W, 120mm
Samsung SpinPoint P120S 250GB SATA2
NEC DVD-brenner ND-3550 IDE Black OEM
В журнале событий пишут что то вроде
Тип события: Уведомление
Источник события: Save Dump
Категория события: Отсутствует
Код события: 1001
Дата: 21.04.2006
Время: 12:54:16
Пользователь: Н/Д
Компьютер: COMP
Описание:
Компьютер был перезагружен после критической ошибки: 0x100000d1 (0x00000014, 0x00000002, 0x00000000, 0xabd239c6). Копия памяти сохранена: C:\WINDOWS\Minidump\Mini042106-01.dmp.
[more=Сам минидамп...]Microsoft (R) Windows Debugger Version 6.6.0003.5
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\Mini042006-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp2_gdr.050301-1519
Kernel base = 0x804d7000 PsLoadedModuleList = 0x805531a0
Debug session time: Thu Apr 20 22:06:43.359 2006 (GMT+2)
System Uptime: 0 days 1:46:47.958
Loading Kernel Symbols
........................................................................................................................................
Loading User Symbols
Loading unloaded module list
.................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000000A, {4000063, 2, 0, 80531464}
*** WARNING: Unable to verify timestamp for SYMEVENT.SYS
*** ERROR: Module load completed but symbols could not be loaded for SYMEVENT.SYS
Unable to load image a347bus.sys, Win32 error 2
*** WARNING: Unable to verify timestamp for a347bus.sys
*** ERROR: Module load completed but symbols could not be loaded for a347bus.sys
Probably caused by : Cdfs.SYS ( Cdfs!CdAcquireResource+4b )
Followup: MachineOwner
---------
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 04000063, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 80531464, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 04000063
CURRENT_IRQL: 2
FAULTING_IP:
nt!ExpBoostOwnerThread+2e
80531464 8a4063 mov al,[eax+0x63]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
LAST_CONTROL_TRANSFER: from 805314f7 to 80531464
STACK_TEXT:
b09fe85c 805314f7 00000001 89aef6e0 89c68930 nt!ExpBoostOwnerThread+0x2e
b09fe884 80531ab0 00000000 88cfc858 89c68930 nt!ExpWaitForResource+0x85
b09fe898 abcd7deb 89c68930 00000001 89c688e0 nt!ExAcquireResourceSharedLite+0xb2
b09fe8b4 abccdaa1 88cfc858 89c68930 00000000 Cdfs!CdAcquireResource+0x4b
b09fe900 abccc7dc 88cfc858 888f5e28 89c49b50 Cdfs!CdPerformVerify+0x7f
b09fe944 abccc611 88cfc858 888f5e28 80000016 Cdfs!CdProcessException+0x15b
b09fe998 804eddf9 89c68810 888f5e28 b09fe9f8 Cdfs!CdFsdDispatch+0x164
b09fe9a8 b587bf33 b09fe9f8 b004e900 00000000 nt!IopfCallDriver+0x31
WARNING: Stack unwind information not available. Following frames may be wrong.
b09feb04 805b3642 89c49b50 00000000 88b0f408 SYMEVENT+0xaf33
b09feb8c 805afb23 00000000 b09febcc 00000040 nt!ObpLookupObjectName+0x56a
b09febe0 8056a11d 00000000 00000000 b4ef7801 nt!ObOpenObjectByName+0xeb
b09fec5c 8056aa94 008efdb0 00100001 008efd60 nt!IopCreateFile+0x407
b09fecb8 8056e27b 008efdb0 00100001 008efd60 nt!IoCreateFile+0x8e
b09fecf8 ba780c2b 008efdb0 00100001 008efd60 nt!NtOpenFile+0x27
b09fed34 8053c808 00000dcc 00000000 00000000 a347bus+0x1c2b
b09fed34 7c90eb94 00000dcc 00000000 00000000 nt!KiFastCallEntry+0xf8
008efdcc 00000000 00000000 00000000 00000000 0x7c90eb94
STACK_COMMAND: kb
FOLLOWUP_IP:
Cdfs!CdAcquireResource+4b
abcd7deb eb0c jmp Cdfs!CdAcquireResource+0x59 (abcd7df9)
FAULTING_SOURCE_CODE:
SYMBOL_STACK_INDEX: 3
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: Cdfs!CdAcquireResource+4b
MODULE_NAME: Cdfs
IMAGE_NAME: Cdfs.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 41107eb1
FAILURE_BUCKET_ID: 0xA_Cdfs!CdAcquireResource+4b
BUCKET_ID: 0xA_Cdfs!CdAcquireResource+4b
Followup: MachineOwner[/more]
[more=И ещё один]
Microsoft (R) Windows Debugger Version 6.6.0003.5
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\Mini042106-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp2_gdr.050301-1519
Kernel base = 0x804d7000 PsLoadedModuleList = 0x805531a0
Debug session time: Fri Apr 21 12:52:07.546 2006 (GMT+2)
System Uptime: 0 days 14:44:45.121
Loading Kernel Symbols
........................................................................................................................................
Loading User Symbols
Loading unloaded module list
.............................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 100000D1, {14, 2, 0, abd239c6}
*** WARNING: Unable to verify timestamp for SYMEVENT.SYS
*** ERROR: Module load completed but symbols could not be loaded for SYMEVENT.SYS
Unable to load image a347bus.sys, Win32 error 2
*** WARNING: Unable to verify timestamp for a347bus.sys
*** ERROR: Module load completed but symbols could not be loaded for a347bus.sys
Probably caused by : Cdfs.SYS ( Cdfs!CdCheckForDismount+82 )
Followup: MachineOwner
---------
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000014, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: abd239c6, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 00000014
CURRENT_IRQL: 2
FAULTING_IP:
Cdfs!CdCheckForDismount+82
abd239c6 83781401 cmp dword ptr [eax+0x14],0x1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xD1
LAST_CONTROL_TRANSFER: from abd23b00 to abd239c6
STACK_TEXT:
8b46e488 abd23b00 89932370 8873f301 00000000 Cdfs!CdCheckForDismount+0x82
8b46e4d0 abd227dc 89932370 87e4b008 89979030 Cdfs!CdPerformVerify+0xde
8b46e514 abd22611 89932370 87e4b008 80000016 Cdfs!CdProcessException+0x15b
8b46e568 804eddf9 8873f290 87e4b008 8b46e5c8 Cdfs!CdFsdDispatch+0x164
8b46e578 b5998f33 8b46e5c8 8b04e500 00000000 nt!IopfCallDriver+0x31
WARNING: Stack unwind information not available. Following frames may be wrong.
8b46e6d4 805b3642 89979030 00000000 88d1ce10 SYMEVENT+0xaf33
8b46e75c 805afb23 00000000 8b46e79c 00000040 nt!ObpLookupObjectName+0x56a
8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb
8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407
8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e
8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27
8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b
8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c
8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014
8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb
8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407
8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e
8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27
8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b
8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c
8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014
8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb
8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407
8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e
8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27
8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b
8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c
8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014
8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb
8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407
8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e
8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27
8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b
8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c
8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014
8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb
8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407
8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e
8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27
8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b
8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c
8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014
8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb
8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407
8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e
8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27
8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b
8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c
8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014
8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb
8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407
8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e
8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27
8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b
8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c
8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014
8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb
8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407
8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e
8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27
8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b
8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c
8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014
8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb
8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407
8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e
8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27
8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b
8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c
8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014
8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb
8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407
8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e
8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27
8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
Cdfs!CdCheckForDismount+82
abd239c6 83781401 cmp dword ptr [eax+0x14],0x1
FAULTING_SOURCE_CODE:
SYMBOL_STACK_INDEX: 0
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: Cdfs!CdCheckForDismount+82
MODULE_NAME: Cdfs
IMAGE_NAME: Cdfs.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 41107eb1
FAILURE_BUCKET_ID: 0xD1_Cdfs!CdCheckForDismount+82
BUCKET_ID: 0xD1_Cdfs!CdCheckForDismount+82
Followup: MachineOwner
---------[/more]