tak som spravil to, čo som mal spraviť asi ako prvé :) Dal som to na inu zástrčku (notebook ne nej nič takéto nerobil), a vyzerá to zatiaľ v pohode. Dnes mi to reštartovalo vždy po cca 5 min. práce v Pro contractor Studio (Spftware republic). Cez Windows debugging tools som zistil, že mi robí problém Avira (avipbb.sys)+ PCS. Odinštaloval som Avira rootkit detection a zatiaľ to funguje. Uvidíme časom.
edit: tak po dopísaní som sa vrátil k práci a znova reštart.
tak to je na mňa veľa. viete mi poradiť čo robiť?
Neviem či mám založiť novú tému v inej sekcii.
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\Mini042110-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
WARNING: Whitespace at start of path element
WARNING: Whitespace at start of path element
WARNING: Whitespace at start of path element
Symbol search path is: C:\WINDOWS\Symbols;
http://msdl.microsoft.com/download/symbolsExecutable search path is: C:\WINDOWS; C:\WINDOWS\system32; C:\WINDOWS\system32\drivers
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_qfe.100216-1510
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Wed Apr 21 20:30:07.265 2010 (GMT+2)
System Uptime: 0 days 0:37:48.798
Loading Kernel Symbols
...............................................................
..........................................................
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007F, {8, 80042000, 0, 0}
*** ERROR: Module load completed but symbols could not be loaded for avipbb.sys
*** ERROR: Symbol file could not be found. Defaulted to export symbols for igxpmp32.sys -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for igxpdv32.DLL -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for igxpdx32.DLL -
Probably caused by : avipbb.sys ( avipbb+d6fd )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
Arg2: 80042000
Arg3: 00000000
Arg4: 00000000
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: DRIVER_FAULT
PROCESS_NAME: Pro Contractor
LAST_CONTROL_TRANSFER: from 806140c2 to 80547056
STACK_TEXT:
a85640b4 806140c2 c0000005 80615b3d a8564100 nt!ExRaiseStatus+0xa
a85640bc 80615b3d a8564100 a7e946fd a8564208 nt!ExRaiseAccessViolation+0xa
a85640c4 a7e946fd a8564208 00000004 00000001 nt!ProbeForRead+0x33
WARNING: Stack unwind information not available. Following frames may be wrong.
a8564100 a7e8d13d a8564208 00000004 0000000b avipbb+0xd6fd
a856411c a7e8f65f a8564208 a856420c a8564224 avipbb+0x613d
a8564164 8054163c a8564208 001f0fff a856420c avipbb+0x865f
a8564164 805006d5 a8564208 001f0fff a856420c nt!KiFastCallEntry+0xfc
a85641ec b970d174 a8564208 001f0fff a856420c nt!ZwOpenProcess+0x11
a856422c b96f764f 89bda358 00000890 002320cc igxpmp32+0x20174
a8564dc4 b96f2084 89bda358 a8564df4 00000000 igxpmp32+0xa64f
a8564dd8 b96e7729 89bda358 a8564df4 0000000c igxpmp32+0x5084
a8564e9c 804ef19f 89bda040 890c0008 00000004 VIDEOPRT!pVideoPortDispatch+0xabf
a8564eac bf8af907 e204b000 e21a32b0 00000001 nt!IopfCallDriver+0x31
a8564edc bf8af981 89bda040 002320cc a8564f40 win32k!GreDeviceIoControl+0x93
a8564f00 bf05701e 89bda040 002320cc a8564f40 win32k!EngDeviceIoControl+0x1f
a8564f48 bf057283 89981000 e21a32b0 00000000 igxpdv32!GmmGetFctTable+0x3c2e
a8564f64 bf057dc7 e204b000 e1165e40 a8565124 igxpdv32!GmmGetFctTable+0x3e93
a8564f80 bf2582be 89981000 00000000 04000221 igxpdv32!GmmGetFctTable+0x49d7
a8564fa4 8054c127 00000000 a8565010 89e58000 igxpdx32!DrvEnableDirectDraw+0x6c71e
a8565064 8053619d 00000024 a8565088 00000000 nt!ExAllocatePoolWithTag+0x7bf
a8565094 bf801934 bf84cc8a a85650b8 bf84ccf4 nt!ExAcquireResourceExclusiveLite+0x67
a85650a0 bf84ccf4 e3b23198 00000000 e3a2b08c win32k!GreReleaseSemaphore+0xa
a85650b8 bf1ecd85 00000000 00000014 43544e49 win32k!EngAllocMem+0x5f
a85650d4 bf3f4571 00000021 ffffffff 00000001 igxpdx32!DrvEnableDirectDraw+0x11e5
a85650ec bf2f8957 a8565150 00000000 bf234ffe igxpdx32!DrvEnableDirectDraw+0x2089d1
a85650f8 bf234ffe 89981000 e21a1de8 f0000000 igxpdx32!DrvEnableDirectDraw+0x10cdb7
00000000 00000000 00000000 00000000 00000000 igxpdx32!DrvEnableDirectDraw+0x4945e
STACK_COMMAND: kb
FOLLOWUP_IP:
avipbb+d6fd
a7e946fd 6afe push 0FFFFFFFEh
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: avipbb+d6fd
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: avipbb
IMAGE_NAME: avipbb.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 49c9008b
FAILURE_BUCKET_ID: 0x7f_8_avipbb+d6fd
BUCKET_ID: 0x7f_8_avipbb+d6fd
Followup: MachineOwner
---------