Windows XP蓝屏已调试(与OS无关) [英] Windows XP Blue screens debugged (OS independent)

查看:104
本文介绍了Windows XP蓝屏已调试(与OS无关)的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

 

大家好,

因为我以前的线程再次被重定向到错误的部分:

Because my previous thread was redirected to the wrong section once again:

由于我在计算机和新的内存中内置了新的主板,因此系统显示了很多BSoD.通常每天一次.与操作系统无关(7/Vista/XP -32/64位)

Since that I built in a new motherboard into my computer and new memory, my system displays a lot BSoD's. Mostly once a day. OS independent (7/Vista/XP -32/64-bit)

因此,我使用WinDbg调试了最后一个minidump文件,结果如下:

So I debugged the last minidump file using WinDbg, with the following results:

 

 

 

加载转储文件[C:\ WINDOWS \ Minidump \ Mini052411-01.dmp]

Loading Dump File [C:\WINDOWS\Minidump\Mini052411-01.dmp]

迷你内核转储文件:仅寄存器和堆栈跟踪可用

Mini Kernel Dump File: Only registers and stack trace are available

 

符号搜索路径为:SRV * i:\ localsymbols * http://msdl.microsoft.com/download/symbols

Symbol search path is: SRV*i:\localsymbols*http://msdl.microsoft.com/download/symbols

可执行搜索路径为:

***警告:无法验证ntkrnlmp.exe的校验和

*** WARNING: Unable to verify checksum for ntkrnlmp.exe

Windows Server 2003内核版本3790(Service Pack 2)MP(2个进程)免费x64

Windows Server 2003 Kernel Version 3790 (Service Pack 2) MP (2 procs) Free x64

产品:WinNt,套件:TerminalServer SingleUserTS

Product: WinNt, suite: TerminalServer SingleUserTS

构建于:3790.srv03_sp2_gdr.101019-0340

Built by: 3790.srv03_sp2_gdr.101019-0340

机器名称:

内核基数= 0xfffff800`01000000 PsLoadedModuleList = 0xfffff800`011d4140

Kernel base = 0xfffff800`01000000 PsLoadedModuleList = 0xfffff800`011d4140

调试会话时间:2011年5月24日星期二21:32:30.390(UTC + 2:00)

Debug session time: Tue May 24 21:32:30.390 2011 (UTC + 2:00)

系统正常运行时间:0天3:22:35.260

System Uptime: 0 days 3:22:35.260

***警告:无法验证ntkrnlmp.exe的校验和

*** WARNING: Unable to verify checksum for ntkrnlmp.exe

加载内核符号

............................................... ................

...............................................................

............................................... ........

.......................................................

加载用户符号

正在加载已卸载的模块列表

Loading unloaded module list

.........

.........

*************************************************** ************************************

*******************************************************************************

*                                                                            *

*                                                                             *

*                        Bugcheck分析                                    *

*                        Bugcheck Analysis                                    *

*                                                                            *

*                                                                             *

*************************************************** ************************************

*******************************************************************************

 

使用!analyze -v获取详细的调试信息.

Use !analyze -v to get detailed debugging information.

 

BugCheck 3B,{c0000005,fffff97fff0c72c8,fffffadf90421f80、0}

BugCheck 3B, {c0000005, fffff97fff0c72c8, fffffadf90421f80, 0}

 

可能是由于:win32k.sys(win32k!vCleanupSurfaces + bf)

Probably caused by : win32k.sys ( win32k!vCleanupSurfaces+bf )

 

后续行动:MachineOwner

Followup: MachineOwner

---------

---------

 

1:kd> !分析-v

1: kd> !analyze -v

*************************************************** ************************************

*******************************************************************************

*                                                                            *

*                                                                             *

*                        Bugcheck分析                                    *

*                        Bugcheck Analysis                                    *

*                                                                            *

*                                                                             *

*************************************************** ************************************

*******************************************************************************

 

SYSTEM_SERVICE_EXCEPTION(3b)

SYSTEM_SERVICE_EXCEPTION (3b)

在执行系统服务例程时发生了异常.

An exception happened while executing a system service routine.

参数:

Arg1:00000000c0000005,导致错误检查的异常代码

Arg1: 00000000c0000005, Exception code that caused the bugcheck

Arg2:fffff97fff0c72c8,引起错误检查的指令的地址

Arg2: fffff97fff0c72c8, Address of the instruction which caused the bugcheck

Arg3:fffffadf90421f80,导致错误检查的异常的上下文记录的地址

Arg3: fffffadf90421f80, Address of the context record for the exception that caused the bugcheck

Arg4:0000000000000000,零.

Arg4: 0000000000000000, zero.

 

调试详细信息:

------------------

------------------

 

 

EXCEPTION_CODE:(NTSTATUS)0xc0000005-在"0x%08lx"处的指令为:在"0x%081x"处的参考存储器.内存不能为%s".

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

 

FAULTING_IP:

FAULTING_IP: 

win32k!vCleanupSurfaces + bf

win32k!vCleanupSurfaces+bf

fffff97f`ff0c72c8 8b4070          mov    eax,dword ptr [rax + 70h]

fffff97f`ff0c72c8 8b4070          mov     eax,dword ptr [rax+70h]

 

上下文:  fffffadf90421f80-(.cxr 0xfffffadf90421f80)

CONTEXT:  fffffadf90421f80 -- (.cxr 0xfffffadf90421f80)

rax = 0000000000000000 rbx = 0000000000000000 rcx = fffffadf9ad7e2b0

rax=0000000000000000 rbx=0000000000000000 rcx=fffffadf9ad7e2b0

rdx = 0000000000000450 rsi = fffff97ff5800000 rdi = 0000000000000018

rdx=0000000000000450 rsi=fffff97ff5800000 rdi=0000000000000018

rip = fffff97fff0c72c8 rsp = fffffadf90422790 rbp = 000000000d05235e

rip=fffff97fff0c72c8 rsp=fffffadf90422790 rbp=000000000d05235e

r8 = fffffadf9ad7e2b0  r9 = 0000000000000000 r10 = 0000000000000000

 r8=fffffadf9ad7e2b0  r9=0000000000000000 r10=0000000000000000

r11 = fffffadf90422788 r12 = 0000000000000450 r13 = 0000000000000001

r11=fffffadf90422788 r12=0000000000000450 r13=0000000000000001

r14 = 0000000000000001 r15 = 0000000000000000

r14=0000000000000001 r15=0000000000000000

iopl = 0        nv up ei ng nz na po nc

iopl=0         nv up ei ng nz na po nc

cs = 0010  ss = 0018  ds = 002b  es = 002b  fs = 0053  gs = 002b            efl = 00010286

cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286

win32k!vCleanupSurfaces + 0xbf:

win32k!vCleanupSurfaces+0xbf:

fffff97f`ff0c72c8 8b4070          mov    eax,dword ptr [rax + 70h] ds:002b:00000000`00000070 = ????????

fffff97f`ff0c72c8 8b4070          mov     eax,dword ptr [rax+70h] ds:002b:00000000`00000070=????????

重置默认范围

 

CUSTOMER_CRASH_COUNT:  1

CUSTOMER_CRASH_COUNT:  1

 

DEFAULT_BUCKET_ID:  DRIVER_FAULT

DEFAULT_BUCKET_ID:  DRIVER_FAULT

 

BUGCHECK_STR:  0x3B

BUGCHECK_STR:  0x3B

 

PROCESS_NAME:  iexplore.exe

PROCESS_NAME:  iexplore.exe

 

CURRENT_IRQL:  0

CURRENT_IRQL:  0

 

LAST_CONTROL_TRANSFER:从fffff97fff0c7bd2到fffff97fff0c72c8

LAST_CONTROL_TRANSFER:  from fffff97fff0c7bd2 to fffff97fff0c72c8

 

STACK_TEXT: 

STACK_TEXT:  

fffffadf`90422790 fffff97f`ff0c7bd2:00000000`00042570 00000000`00002c3a fffff97f`f5800000 00000000`00000018:win32k!vCleanupSurfaces + 0xbf

fffffadf`90422790 fffff97f`ff0c7bd2 : 00000000`00042570 00000000`00002c3a fffff97f`f5800000 00000000`00000018 : win32k!vCleanupSurfaces+0xbf

fffffadf`904227f0 fffff97f`ff0c7c6c:00000000`00000000 00000000`c0000005 fffffa80`05287d40 00000000`00000000:win32k!NtGdiCloseProcess + 0x412

fffffadf`904227f0 fffff97f`ff0c7c6c : 00000000`00000000 00000000`c0000005 fffffa80`05287d40 00000000`00000000 : win32k!NtGdiCloseProcess+0x412

fffffadf`90422890 fffff97f`ff0c8b9f:00000000`00000000 00000000`c0000005 fffffa80`05287d40 00000000`00000000:win32k!GdiProcessCallout + 0x17b

fffffadf`90422890 fffff97f`ff0c8b9f : 00000000`00000000 00000000`c0000005 fffffa80`05287d40 00000000`00000000 : win32k!GdiProcessCallout+0x17b

fffffadf`90422910 fffff800`0128d711:00000000`c0000005 00000000`00000001 00000000`00000000 fffffadf`9ad7e2b0:win32k!W32pProcessCallout + 0x88

fffffadf`90422910 fffff800`0128d711 : 00000000`c0000005 00000000`00000001 00000000`00000000 fffffadf`9ad7e2b0 : win32k!W32pProcessCallout+0x88

fffffadf`90422940 fffff800`01288d1b:fffffadf`c0000005 fffffadf`9ab387d0 00000000`00000001 fffffadf`9ad7e2b0:nt!PspExitThread + 0x7cc

fffffadf`90422940 fffff800`01288d1b : fffffadf`c0000005 fffffadf`9ab387d0 00000000`00000001 fffffadf`9ad7e2b0 : nt!PspExitThread+0x7cc

fffffadf`90422bd0 fffff800`0102e33d:fffffadf`9ad7e201 fffffadf`c0000005 fffffadf`9ad7e2b0 fffffadf`90422cf0:nt!NtTerminateProcess + 0x362

fffffadf`90422bd0 fffff800`0102e33d : fffffadf`9ad7e201 fffffadf`c0000005 fffffadf`9ad7e2b0 fffffadf`90422cf0 : nt!NtTerminateProcess+0x362

fffffadf`90422c70 00000000`77ef06fa:00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000:nt!KiSystemServiceCopyEnd + 0x3

fffffadf`90422c70 00000000`77ef06fa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x3

00000000`08b0e828 00000000`00000000:00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000:0x77ef06fa

00000000`08b0e828 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77ef06fa

 

 

FOLLOWUP_IP:

FOLLOWUP_IP: 

win32k!vCleanupSurfaces + bf

win32k!vCleanupSurfaces+bf

fffff97f`ff0c72c8 8b4070          mov    eax,dword ptr [rax + 70h]

fffff97f`ff0c72c8 8b4070          mov     eax,dword ptr [rax+70h]

 

SYMBOL_STACK_INDEX:  0

SYMBOL_STACK_INDEX:  0

 

SYMBOL_NAME:  win32k!vCleanupSurfaces + bf

SYMBOL_NAME:  win32k!vCleanupSurfaces+bf

 

FOLLOWUP_NAME:  MachineOwner

FOLLOWUP_NAME:  MachineOwner

 

MODULE_NAME:win32k

MODULE_NAME: win32k

 

IMAGE_NAME:  win32k.sys

IMAGE_NAME:  win32k.sys

 

DEBUG_FLR_IMAGE_TIMESTAMP:  4d6fa550

DEBUG_FLR_IMAGE_TIMESTAMP:  4d6fa550

 

STACK_COMMAND:  .cxr 0xfffffadf90421f80; kb

STACK_COMMAND:  .cxr 0xfffffadf90421f80 ; kb

 

FAILURE_BUCKET_ID:  X64_0x3B_win32k!vCleanupSurfaces + bf

FAILURE_BUCKET_ID:  X64_0x3B_win32k!vCleanupSurfaces+bf

 

BUCKET_ID:  X64_0x3B_win32k!vCleanupSurfaces + bf

BUCKET_ID:  X64_0x3B_win32k!vCleanupSurfaces+bf

 

后续行动:MachineOwner

Followup: MachineOwner

---------

---------

 

 

我希望有人可以帮助我解决这个问题.我有大约6个月的时间有这个问题,对此我已经感到厌倦了.

I hope that someone can help me figure this out. I have this problem for like 6 months now and I'm getting tired of it.

感谢所有输入!

 

PS:我也使用了MEMTest,没有错误,并且所有驱动程序都是最新的

PS: I also used MEMTest, no errors, and all the drivers are up-to-date

推荐答案

刚得到另一个

用手机拍一张照片:

 

 

http://s1123.photobucket.com/albums/l552/joostvanderlinden/?action=view&current=IMG_20110529_133330.jpg


这篇关于Windows XP蓝屏已调试(与OS无关)的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆