Zdravím známemu jsem dával dohromady PC z následujících komponent - https://www.alfa.cz/basket.php?items...011KXK0118BE01. Mělo to být svižné PC na procházení internetu, nějaké to video. Hry nehraje, takže systém používá integrovanou Intel grafiku.
Instalovány jsou Windows 7 x64 SP1 se všemi updaty, plus minimum programů - Kaspersky AV, MediaPlayer, 7-zip, Firefox ...

Pc náhodně padá do BSOD - přikládám výstup analýzy z několika minidumpů z WinDbg
Kód:
Loading Dump File [C:\Users\Michal\Desktop\032315-47783-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       http://msdl.microsoft.com/download/symbols
Symbol search path is: http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18741.amd64fre.win7sp1_gdr.150202-1526
Machine Name:
Kernel base = 0xfffff800`0305d000 PsLoadedModuleList = 0xfffff800`032a1890
Debug session time: Mon Mar 23 21:23:03.336 2015 (UTC + 1:00)
System Uptime: 0 days 0:02:54.429
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
......................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {ffffffffffffffff, 2, 1, fffff800031035a2}

Probably caused by : ntkrnlmp.exe ( nt!KxWaitForLockOwnerShip+12 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffffffffffff, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800031035a2, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000330b100
GetUlongFromAddress: unable to read from fffff8000330b1c0
 ffffffffffffffff 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KxWaitForLockOwnerShip+12
fffff800`031035a2 48890a          mov     qword ptr [rdx],rcx

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  avpui.exe

ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre

TRAP_FRAME:  fffff8800bae04a0 -- (.trap 0xfffff8800bae04a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff8800bae06e0
rdx=ffffffffffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff800031035a2 rsp=fffff8800bae0630 rbp=fffff8800bae06c0
 r8=0000000000000000  r9=0000000000000000 r10=fffffa80035d1a28
r11=fffff8000330eac0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KxWaitForLockOwnerShip+0x12:
fffff800`031035a2 48890a          mov     qword ptr [rdx],rcx ds:ffffffff`ffffffff=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800030d1469 to fffff800030d1ec0

STACK_TEXT:  
fffff880`0bae0358 fffff800`030d1469 : 00000000`0000000a ffffffff`ffffffff 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0bae0360 fffff800`030d00e0 : 00000001`00000000 fffff8a0`00000014 00000000`00000000 fffffa80`0208ca70 : nt!KiBugCheckDispatch+0x69
fffff880`0bae04a0 fffff800`031035a2 : 00000000`00000000 00000000`00000000 fffff880`0bae0740 00000000`00000001 : nt!KiPageFault+0x260
fffff880`0bae0630 fffff800`030e244d : fffffa80`0208ca70 331c1e1e`33333333 334d334d`334d334d 334d1c31`1e2f1e95 : nt!KxWaitForLockOwnerShip+0x12
fffff880`0bae0660 fffff800`03104b57 : 00000000`00000000 fffff680`0008db90 00000000`00000000 00000000`00000011 : nt!MiInsertPageInFreeOrZeroedList+0x55d
fffff880`0bae0770 fffff800`03103da7 : 00000000`00000000 fffff680`0008dff8 fffffa80`090d8b30 fffff680`00062688 : nt!MiDeletePteRun+0x4ed
fffff880`0bae0920 fffff800`030bf3cf : fffffa80`00000000 00000000`11c7afff 00000000`00000000 00000000`00000000 : nt!MiDeleteVirtualAddresses+0x41f
fffff880`0bae0ae0 fffff800`030d1153 : ffffffff`ffffffff 00000000`0b8be3b0 00000000`0b8be3a8 00000000`00008000 : nt!NtFreeVirtualMemory+0x61f
fffff880`0bae0be0 00000000`76e4149a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0b8be378 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76e4149a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KxWaitForLockOwnerShip+12
fffff800`031035a2 48890a          mov     qword ptr [rdx],rcx

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KxWaitForLockOwnerShip+12

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  54d0317d

IMAGE_VERSION:  6.1.7601.18741

FAILURE_BUCKET_ID:  X64_0xA_nt!KxWaitForLockOwnerShip+12

BUCKET_ID:  X64_0xA_nt!KxWaitForLockOwnerShip+12

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0xa_nt!kxwaitforlockownership+12

FAILURE_ID_HASH:  {69f619cc-5abb-1c14-4270-8e17efbcd182}

Followup: MachineOwner
---------
Kód:
Loading Dump File [C:\Users\Michal\Desktop\032315-48079-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       http://msdl.microsoft.com/download/symbols
Symbol search path is: http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18741.amd64fre.win7sp1_gdr.150202-1526
Machine Name:
Kernel base = 0xfffff800`0304a000 PsLoadedModuleList = 0xfffff800`0328e890
Debug session time: Mon Mar 23 20:49:04.000 2015 (UTC + 1:00)
System Uptime: 0 days 4:19:57.427
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
.........................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {41284, 384e9001, 173ce, fffff70001080000}

*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+53 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041284, A PTE or the working set list is corrupt.
Arg2: 00000000384e9001
Arg3: 00000000000173ce
Arg4: fffff70001080000

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_41284

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  firefox.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre

LAST_CONTROL_TRANSFER:  from fffff800031169e7 to fffff800030beec0

STACK_TEXT:  
fffff880`050ade88 fffff800`031169e7 : 00000000`0000001a 00000000`00041284 00000000`384e9001 00000000`000173ce : nt!KeBugCheckEx
fffff880`050ade90 fffff800`030f0e70 : fffff700`01080000 bce00000`cae1580d 88600001`165eac0c 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4ad3
fffff880`050aded0 fffff800`030ac3cf : fffffa80`00000000 00000000`3857ffff 00000000`00000000 00000000`00000000 : nt!MiDeleteVirtualAddresses+0x4e8
fffff880`050ae090 fffff800`030be153 : ffffffff`ffffffff fffff8a0`0b0dc7f0 fffff8a0`0b0dc7f8 00000000`00008000 : nt!NtFreeVirtualMemory+0x61f
fffff880`050ae190 fffff800`030ba710 : fffff880`085b334b fffff8a0`0b5a7570 fffff8a0`0b0dc7d0 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff880`050ae328 fffff880`085b334b : fffff8a0`0b5a7570 fffff8a0`0b0dc7d0 00000000`00000000 fffffa80`0b0a0cb0 : nt!KiServiceLinkage
fffff880`050ae330 fffff880`085b27b8 : fffff8a0`0090e9e0 fffff8a0`0090e9e0 fffff8a0`006ee610 fffff8a0`0d8effc0 : dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+0x53
fffff880`050ae360 fffff880`085b26c6 : fffffa80`00000000 fffffa80`09389b30 fffffa80`0b0a0cb0 fffffa80`083d2a50 : dxgmms1!VIDMM_PROCESS_HEAP::FreeSmallAllocation+0xdc
fffff880`050ae390 fffff880`0859dc93 : fffff880`050ae3b8 fffff8a0`008bf170 00000000`00000001 00000000`00000000 : dxgmms1!VIDMM_PROCESS_HEAP::Free+0x13a
fffff880`050ae3c0 fffff880`08598637 : fffffa80`08ff3b00 00000000`00000000 fffff8a0`0b5a7570 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x11b
fffff880`050ae470 fffff880`0857eecc : fffff8a0`00000000 fffffa80`00000000 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x19b
fffff880`050ae540 fffff880`084bfccc : 00000000`00000000 fffff8a0`051eb000 fffff8a0`051eb000 00000000`00000001 : dxgmms1!VidMmCloseAllocation+0x44
fffff880`050ae570 fffff880`084d28b8 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff8a0`00000799 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x248
fffff880`050ae660 fffff880`084b7815 : 00000000`fffffeda fffff8a0`00bcb600 fffff8a0`051eb000 fffffa80`08530000 : dxgkrnl!DXGDEVICE::~DXGDEVICE+0x19c
fffff880`050ae6d0 fffff880`084f5fee : 00000000`00000000 fffffa80`08530000 fffff8a0`00bcb600 fffff8a0`00bcb680 : dxgkrnl!DXGADAPTER::DestroyDevice+0x1c9
fffff880`050ae700 fffff880`084f5984 : fffff900`c317a270 00000000`00000000 00000000`00000001 fffff900`c317a270 : dxgkrnl!DXGPROCESS::Destroy+0xba
fffff880`050ae7b0 fffff960`00157914 : 00000000`00000ebc fffff900`c317a270 00000000`00000000 fffff900`c317a270 : dxgkrnl!DxgkProcessCallout+0x268
fffff880`050ae840 00000000`00000ebc : fffff900`c317a270 00000000`00000000 fffff900`c317a270 fffffa80`09389b30 : win32k+0xc7914
fffff880`050ae848 fffff900`c317a270 : 00000000`00000000 fffff900`c317a270 fffffa80`09389b30 fffff960`00156f90 : 0xebc
fffff880`050ae850 00000000`00000000 : fffff900`c317a270 fffffa80`09389b30 fffff960`00156f90 fffff900`c317a270 : 0xfffff900`c317a270


STACK_COMMAND:  kb

FOLLOWUP_IP: 
dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+53
fffff880`085b334b 488b0f          mov     rcx,qword ptr [rdi]

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+53

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5164dc13

IMAGE_VERSION:  6.1.7601.18126

FAILURE_BUCKET_ID:  X64_0x1a_41284_dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+53

BUCKET_ID:  X64_0x1a_41284_dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+53

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x1a_41284_dxgmms1!vidmm_process_heap::freeblock+53

FAILURE_ID_HASH:  {937d6813-fe78-6a22-92af-52033ecb35ef}

Followup: MachineOwner
---------
Kód:
Loading Dump File [C:\Users\Michal\Desktop\032415-15802-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       http://msdl.microsoft.com/download/symbols
Symbol search path is: http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18741.amd64fre.win7sp1_gdr.150202-1526
Machine Name:
Kernel base = 0xfffff800`03004000 PsLoadedModuleList = 0xfffff800`03248890
Debug session time: Tue Mar 24 20:17:44.672 2015 (UTC + 1:00)
System Uptime: 0 days 1:23:59.765
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {41201, fffff6800036ca80, 65800000ad23a005, fffffa800946f590}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+13702 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041201, The subtype of the bugcheck.
Arg2: fffff6800036ca80
Arg3: 65800000ad23a005
Arg4: fffffa800946f590

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_41201

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  firefox.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre

LAST_CONTROL_TRANSFER:  from fffff800030d5cbe to fffff80003078ec0

STACK_TEXT:  
fffff880`0bdbe978 fffff800`030d5cbe : 00000000`0000001a 00000000`00041201 fffff680`0036ca80 65800000`ad23a005 : nt!KeBugCheckEx
fffff880`0bdbe980 fffff800`03044b41 : ffffe0a6`746c6600 fffffa80`089dbb50 00000000`00000000 65800000`ad23a005 : nt! ?? ::FNODOBFM::`string'+0x13702
fffff880`0bdbe9c0 fffff800`030447da : fffffa80`0946f590 fffffa80`09617b30 fffffa80`09617b30 00000000`6d950000 : nt!MiQueryAddressState+0x2b1
fffff880`0bdbea10 fffff800`03355524 : 00000000`00000020 00000000`6d951000 fffffa80`0946f590 00000000`00000000 : nt!MiQueryAddressSpan+0xaa
fffff880`0bdbea80 fffff800`03078153 : ffffffff`ffffffff fffffa80`089dbb50 00000000`13d6eb80 00000000`08cae4d8 : nt!NtQueryVirtualMemory+0x382
fffff880`0bdbeb70 00000000`772e14ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`08cae4b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x772e14ea


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+13702
fffff800`030d5cbe cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+13702

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  54d0317d

IMAGE_VERSION:  6.1.7601.18741

FAILURE_BUCKET_ID:  X64_0x1a_41201_nt!_??_::FNODOBFM::_string_+13702

BUCKET_ID:  X64_0x1a_41201_nt!_??_::FNODOBFM::_string_+13702

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x1a_41201_nt!_??_::fnodobfm::_string_+13702

FAILURE_ID_HASH:  {33abc661-1365-aa2c-af0a-1cbd6aa986f2}

Followup: MachineOwner
---------
Nejdříve jsem myslel že je problém ve starém harddisku, nakonec jsme totiž v sestavě použili disk ze staršího All-in-one Lenova, kterému odešel MXM modul s grafikou. Po koupi nového HDD a obnovení bitové kopie - ten samý problém.
Mám podezření že je něco špatně s pamětí - konkrétně sdílení paměti s integrovanou grafikou. Udělal jsem update BIOSu, několikrát zkontroloval nastavení BIOSu jak u ram tak u integrované grafiky. Memtest běžel na PC celou noc bez jiné chyby. A nakonec zátěžový test v Linuxu PC absolvovalo bez potíží. Už mě moc nenapadá co s tím, buď je to nějaká obskurní HW závada, kterou bude sranda prokázat, nebo je něco špatně s instalací Windows. Mohl bych je zkusit ještě jednou komplet nainstalovat a udělat zátěžové testy po instalaci jednotlivých ovladačů. Nevím. Pokud máte někdo nějaké nápady budu moc rád za pomoc.

Starší minidumpy už bohužel nemám ale všechny obsahovaly následující Stop kódy, IRQL_NOT_LESS_OR_EQUAL, MEMORY_MANAGEMENT, DRIVER_IRQL_NOT_LESS_OR_EQUAL a možná (ale tím už si nejsem 100% jistý) ještě SYSTEM_THREAD_EXCEPTION_NOT_HANDLED.