kai1991
Ensign
- Registriert
- Juli 2013
- Beiträge
- 210
Und hier ist schon der nächste Bluescreen -.-
Microsoft (R) Windows Debugger Version 6.2.9200.20512 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\102213-14913-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff800`0305b000 PsLoadedModuleList = 0xfffff800`0329e6d0
Debug session time: Tue Oct 22 16:40:26.359 2013 (UTC + 2:00)
System Uptime: 0 days 1:01:21.217
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, 0, fffff880065ed2b0, 0}
Probably caused by : win32k.sys ( win32k!GreUpdateSpriteDevLockEnd+444 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: 0000000000000000, Address of the instruction which caused the bugcheck
Arg3: fffff880065ed2b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
FAULTING_IP:
+0
00000000`00000000 ?? ???
CONTEXT: fffff880065ed2b0 -- (.cxr 0xfffff880065ed2b0)
rax=0000000000000001 rbx=0000000000000001 rcx=0000000000000000
rdx=fffffa800a238730 rsi=fffff900c00c0010 rdi=0000000000000000
rip=0000000000000000 rsp=fffff880065edc98 rbp=fffff880065ee0f0
r8=0000000000000000 r9=0000000000000000 r10=0000000000002aab
r11=fffffa800a238730 r12=fffff900c00c0010 r13=0000000000000000
r14=fffff960003bb2d0 r15=0000000000000001
iopl=0 nv up ei ng nz ac po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010296
00000000`00000000 ?? ???
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff960002b8cd4 to 0000000000000000
STACK_TEXT:
fffff880`065edc98 fffff960`002b8cd4 : fffff900`c00c0010 00000000`001101fc ffffffff`e80f0db3 00000000`00000000 : 0x0
fffff880`065edca0 fffff960`00169a9f : fffff880`065ee0a0 00000000`00000000 0000041a`00000690 fffff900`c00c0010 : win32k!GreUpdateSpriteDevLockEnd+0x444
fffff880`065edf50 fffff960`002da290 : fffff900`c2727010 fffff900`c069a7b0 fffff900`746c7847 fffff900`c069a7b0 : win32k!DEVLOCKBLTOBJ::~DEVLOCKBLTOBJ+0x4b
fffff880`065edf80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!NtGdiBitBltInternal+0xdd8
FOLLOWUP_IP:
win32k!GreUpdateSpriteDevLockEnd+444
fffff960`002b8cd4 448bf0 mov r14d,eax
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: win32k!GreUpdateSpriteDevLockEnd+444
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 521d506d
STACK_COMMAND: .cxr 0xfffff880065ed2b0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_win32k!GreUpdateSpriteDevLockEnd+444
BUCKET_ID: X64_0x3B_win32k!GreUpdateSpriteDevLockEnd+444
Followup: MachineOwner
---------
MemTest86 lief ca 10std lang. War das am Ende nicht lang genug?
Ok, dann lass ich heute Nacht nochmal Memtest mit einem Riegel laufen.
Kann man die CPU auch irgendwie testen?
Microsoft (R) Windows Debugger Version 6.2.9200.20512 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\102213-14913-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff800`0305b000 PsLoadedModuleList = 0xfffff800`0329e6d0
Debug session time: Tue Oct 22 16:40:26.359 2013 (UTC + 2:00)
System Uptime: 0 days 1:01:21.217
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, 0, fffff880065ed2b0, 0}
Probably caused by : win32k.sys ( win32k!GreUpdateSpriteDevLockEnd+444 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: 0000000000000000, Address of the instruction which caused the bugcheck
Arg3: fffff880065ed2b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
FAULTING_IP:
+0
00000000`00000000 ?? ???
CONTEXT: fffff880065ed2b0 -- (.cxr 0xfffff880065ed2b0)
rax=0000000000000001 rbx=0000000000000001 rcx=0000000000000000
rdx=fffffa800a238730 rsi=fffff900c00c0010 rdi=0000000000000000
rip=0000000000000000 rsp=fffff880065edc98 rbp=fffff880065ee0f0
r8=0000000000000000 r9=0000000000000000 r10=0000000000002aab
r11=fffffa800a238730 r12=fffff900c00c0010 r13=0000000000000000
r14=fffff960003bb2d0 r15=0000000000000001
iopl=0 nv up ei ng nz ac po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010296
00000000`00000000 ?? ???
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff960002b8cd4 to 0000000000000000
STACK_TEXT:
fffff880`065edc98 fffff960`002b8cd4 : fffff900`c00c0010 00000000`001101fc ffffffff`e80f0db3 00000000`00000000 : 0x0
fffff880`065edca0 fffff960`00169a9f : fffff880`065ee0a0 00000000`00000000 0000041a`00000690 fffff900`c00c0010 : win32k!GreUpdateSpriteDevLockEnd+0x444
fffff880`065edf50 fffff960`002da290 : fffff900`c2727010 fffff900`c069a7b0 fffff900`746c7847 fffff900`c069a7b0 : win32k!DEVLOCKBLTOBJ::~DEVLOCKBLTOBJ+0x4b
fffff880`065edf80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!NtGdiBitBltInternal+0xdd8
FOLLOWUP_IP:
win32k!GreUpdateSpriteDevLockEnd+444
fffff960`002b8cd4 448bf0 mov r14d,eax
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: win32k!GreUpdateSpriteDevLockEnd+444
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 521d506d
STACK_COMMAND: .cxr 0xfffff880065ed2b0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_win32k!GreUpdateSpriteDevLockEnd+444
BUCKET_ID: X64_0x3B_win32k!GreUpdateSpriteDevLockEnd+444
Followup: MachineOwner
---------
Ergänzung ()
MemTest86 lief ca 10std lang. War das am Ende nicht lang genug?
Ergänzung ()
Ok, dann lass ich heute Nacht nochmal Memtest mit einem Riegel laufen.
Kann man die CPU auch irgendwie testen?