Hallo Zusammen,
und zwar habe ich mir vor ca 2 Monaten einen PC gekauft und erhalte in unregelmäígen abständen einen BlueScreen.
Nun habe ich mich schon soweit schlau gemacht, dass ein .dmp file erstellt wird und man durch dieses erfahren kann wodurch dieser BlueScreen ausgelöst wird.
Soweit, so gut.
Habe alles wie beschrieben gemacht, aber steige nun gar nicht mehr durch was in diesem File überhaupt drin steht. Vielleicht kann mir ja hier jemand weiterhelfen.
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\tommY\Desktop\021410-16442-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
WARNING: Whitespace at start of path element
WARNING: Whitespace at start of path element
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: c:\windows\System32; c:\windows\system\System32; http://www.alexander.com/SymServe
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a5b000 PsLoadedModuleList = 0xfffff800`02c98e50
Debug session time: Sun Feb 14 20:52:37.848 2010 (GMT+1)
System Uptime: 0 days 7:06:16.269
Loading Kernel Symbols
...............................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 109, {a3a039d898c1c6e3, b3b7465eeb3e9911, fffff80002f02970, 1}
*** WARNING: Unable to verify checksum for win32k.sys
Probably caused by : memory_corruption
Followup: memory_corruption
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
debugger that was not attached when the system was booted. Normal breakpoints,
"bp", can only be set if the debugger is attached at boot time. Hardware
breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a3a039d898c1c6e3, Reserved
Arg2: b3b7465eeb3e9911, Reserved
Arg3: fffff80002f02970, Failure type dependent information
Arg4: 0000000000000001, Type of corrupted region, can be
0 : A generic data region
1 : Modification of a function or .pdata
2 : A processor IDT
3 : A processor GDT
4 : Type 1 process list corruption
5 : Type 2 process list corruption
6 : Debug routine modification
7 : Critical MSR modification
Debugging Details:
------------------
BUGCHECK_STR: 0x109
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002accf00
STACK_TEXT:
fffff880`031cb5d8 00000000`00000000 : 00000000`00000109 a3a039d8`98c1c6e3 b3b7465e`eb3e9911 fffff800`02f02970 : nt!KeBugCheckEx
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff80002f02a9c - nt!IopConnectLineBasedInterrupt+12c
[ 4c:0c ]
1 error : !nt (fffff80002f02a9c)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
Followup: memory_corruption
Was sagt das denn nun aus?
MEMORY_CORRUPTOR: ONE_BIT --> das ein Riegel vom Arbeitsspeicher den Fehler verursacht?
Gruß
tommY
-edit-
Habe eben einen Memtest durchlaufen lassen und dieser hat keinen Fehler festgestellt.. jetzt bin ich noch ratloser.
und zwar habe ich mir vor ca 2 Monaten einen PC gekauft und erhalte in unregelmäígen abständen einen BlueScreen.
Nun habe ich mich schon soweit schlau gemacht, dass ein .dmp file erstellt wird und man durch dieses erfahren kann wodurch dieser BlueScreen ausgelöst wird.
Soweit, so gut.
Habe alles wie beschrieben gemacht, aber steige nun gar nicht mehr durch was in diesem File überhaupt drin steht. Vielleicht kann mir ja hier jemand weiterhelfen.
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\tommY\Desktop\021410-16442-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
WARNING: Whitespace at start of path element
WARNING: Whitespace at start of path element
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: c:\windows\System32; c:\windows\system\System32; http://www.alexander.com/SymServe
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a5b000 PsLoadedModuleList = 0xfffff800`02c98e50
Debug session time: Sun Feb 14 20:52:37.848 2010 (GMT+1)
System Uptime: 0 days 7:06:16.269
Loading Kernel Symbols
...............................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 109, {a3a039d898c1c6e3, b3b7465eeb3e9911, fffff80002f02970, 1}
*** WARNING: Unable to verify checksum for win32k.sys
Probably caused by : memory_corruption
Followup: memory_corruption
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
debugger that was not attached when the system was booted. Normal breakpoints,
"bp", can only be set if the debugger is attached at boot time. Hardware
breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a3a039d898c1c6e3, Reserved
Arg2: b3b7465eeb3e9911, Reserved
Arg3: fffff80002f02970, Failure type dependent information
Arg4: 0000000000000001, Type of corrupted region, can be
0 : A generic data region
1 : Modification of a function or .pdata
2 : A processor IDT
3 : A processor GDT
4 : Type 1 process list corruption
5 : Type 2 process list corruption
6 : Debug routine modification
7 : Critical MSR modification
Debugging Details:
------------------
BUGCHECK_STR: 0x109
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002accf00
STACK_TEXT:
fffff880`031cb5d8 00000000`00000000 : 00000000`00000109 a3a039d8`98c1c6e3 b3b7465e`eb3e9911 fffff800`02f02970 : nt!KeBugCheckEx
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff80002f02a9c - nt!IopConnectLineBasedInterrupt+12c
[ 4c:0c ]
1 error : !nt (fffff80002f02a9c)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
Followup: memory_corruption
Was sagt das denn nun aus?
MEMORY_CORRUPTOR: ONE_BIT --> das ein Riegel vom Arbeitsspeicher den Fehler verursacht?
Gruß
tommY
-edit-
Habe eben einen Memtest durchlaufen lassen und dieser hat keinen Fehler festgestellt.. jetzt bin ich noch ratloser.
Zuletzt bearbeitet: