Ecran bleu pendant nettoyage disque

Ecran bleu pendant nettoyage disque - Win NT/2K/XP - Windows & Software

Marsh Posté le 04-04-2009 à 17:54:36    

Bonjour,
 
Suite à mes problèmes de redémarrage intempestif du PC, j'ai récupérer les fichiers Minidump du PC en question.
Au début j'ai trouvé un problème de pilote de carte graphique. J'ai mis le pilote à jour et le PC redémarre un peu moins souvent.
 
Ensuite j'ai désinstaller Avast et là, encore un peu d'amélioration.
 
Maintenant j'ai encore des redémarrage (surtout en lancant le nettoyage de disque quand j'essaye de compresser les fichiers non utilisés) et le Minidump me dit ceci (j'ai beau chercher mais je ne trouve rien à faire....je deviens  :pt1cable: ):
 
Merci pour vos lumières @+
 

Code :
  1. Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3. Loading Dump File [I:\Mini040409-11.dmp]
  4. Mini Kernel Dump File: Only registers and stack trace are available
  5. Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols
  6. Executable search path is:
  7. Windows XP Kernel Version 2600 (Service Pack 3) UP Free x86 compatible
  8. Product: WinNt, suite: TerminalServer SingleUserTS
  9. Built by: 2600.xpsp_sp3_gdr.080814-1236
  10. Machine Name:
  11. Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055b1c0
  12. Debug session time: Sat Apr  4 16:19:13.515 2009 (GMT+2)
  13. System Uptime: 0 days 0:08:40.121
  14. Loading Kernel Symbols
  15. ...............................................................
  16. .................................................
  17. Loading User Symbols
  18. Loading unloaded module list
  19. ..........
  20. *******************************************************************************
  21. *                                                                             *
  22. *                        Bugcheck Analysis                                    *
  23. *                                                                             *
  24. *******************************************************************************
  25. Use !analyze -v to get detailed debugging information.
  26. BugCheck 1000008E, {c0000005, 804f0efe, b929bcec, 0}
  27. Probably caused by : ntoskrnl.exe ( nt!NtYieldExecution+54 )
  28. Followup: MachineOwner
  29. ---------
  30. kd> !analyze -v
  31. *******************************************************************************
  32. *                                                                             *
  33. *                        Bugcheck Analysis                                    *
  34. *                                                                             *
  35. *******************************************************************************
  36. KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
  37. This is a very common bugcheck.  Usually the exception address pinpoints
  38. the driver/function that caused the problem.  Always note this address
  39. as well as the link date of the driver/image that contains this address.
  40. Some common problems are exception code 0x80000003.  This means a hard
  41. coded breakpoint or assertion was hit, but this system was booted
  42. /NODEBUG.  This is not supposed to happen as developers should never have
  43. hardcoded breakpoints in retail code, but ...
  44. If this happens, make sure a debugger gets connected, and the
  45. system is booted /DEBUG.  This will let us see why this breakpoint is
  46. happening.
  47. Arguments:
  48. Arg1: c0000005, The exception code that was not handled
  49. Arg2: 804f0efe, The address that the exception occurred at
  50. Arg3: b929bcec, Trap Frame
  51. Arg4: 00000000
  52. Debugging Details:
  53. ------------------
  54. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'instruction   "0x%08lx" emploie l'adresse m moire "0x%08lx". La m moire ne peut pas  tre "%s".
  55. FAULTING_IP:
  56. nt!NtYieldExecution+54
  57. 804f0efe 8a4063          mov     al,byte ptr [eax+63h]
  58. TRAP_FRAME:  b929bcec -- (.trap 0xffffffffb929bcec)
  59. ErrCode = 00000000
  60. eax=0000012e ebx=804f0ea6 ecx=00000000 edx=00f8ff58 esi=00f8ff58 edi=b929bd64
  61. eip=804f0efe esp=b929bd60 ebp=b929bd64 iopl=0         nv up ei ng nz na pe cy
  62. cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010287
  63. nt!NtYieldExecution+0x54:
  64. 804f0efe 8a4063          mov     al,byte ptr [eax+63h]      ds:0023:00000191=??
  65. Resetting default scope
  66. CUSTOMER_CRASH_COUNT:  11
  67. DEFAULT_BUCKET_ID:  COMMON_SYSTEM_FAULT
  68. BUGCHECK_STR:  0x8E
  69. PROCESS_NAME:  cleanmgr.exe
  70. LAST_CONTROL_TRANSFER:  from badb0d00 to 804f0efe
  71. STACK_TEXT: 
  72. b929bd68 badb0d00 00f8ff58 ff7b7b7b ffb6b6b6 nt!NtYieldExecution+0x54
  73. WARNING: Frame IP not in any known module. Following frames may be wrong.
  74. b929bd6c 00f8ff58 ff7b7b7b ffb6b6b6 00000000 0xbadb0d00
  75. b929bd70 ff7b7b7b ffb6b6b6 00000000 00000000 0xf8ff58
  76. b929bd74 ffb6b6b6 00000000 00000000 00000000 0xff7b7b7b
  77. b929bd78 00000000 00000000 00000000 00000000 0xffb6b6b6
  78. STACK_COMMAND:  kb
  79. FOLLOWUP_IP:
  80. nt!NtYieldExecution+54
  81. 804f0efe 8a4063          mov     al,byte ptr [eax+63h]
  82. SYMBOL_STACK_INDEX:  0
  83. SYMBOL_NAME:  nt!NtYieldExecution+54
  84. FOLLOWUP_NAME:  MachineOwner
  85. MODULE_NAME: nt
  86. IMAGE_NAME:  ntoskrnl.exe
  87. DEBUG_FLR_IMAGE_TIMESTAMP:  48a404ab
  88. FAILURE_BUCKET_ID:  0x8E_nt!NtYieldExecution+54
  89. BUCKET_ID:  0x8E_nt!NtYieldExecution+54
  90. Followup: MachineOwner
  91. ---------


Message édité par yucki68 le 04-04-2009 à 18:49:24
Reply

Marsh Posté le 04-04-2009 à 17:54:36   

Reply

Sujets relatifs:

Leave a Replay

Make sure you enter the(*)required information where indicate.HTML code is not allowed