问题描述
大家好,
因为我以前的线程再次被重定向到错误的部分:
Because my previous thread was redirected to the wrong section once again:
由于我在计算机和新的内存中内置了新的主板,因此系统显示了很多BSoD.通常每天一次.与操作系统无关(7/Vista/XP -32/64位)
Since that I built in a new motherboard into my computer and new memory, my system displays a lot BSoD's. Mostly once a day. OS independent (7/Vista/XP -32/64-bit)
因此,我使用WinDbg调试了最后一个minidump文件,结果如下:
So I debugged the last minidump file using WinDbg, with the following results:
加载转储文件[C:\ WINDOWS \ Minidump \ Mini052411-01.dmp]
Loading Dump File [C:\WINDOWS\Minidump\Mini052411-01.dmp]
迷你内核转储文件:仅寄存器和堆栈跟踪可用
Mini Kernel Dump File: Only registers and stack trace are available
符号搜索路径为:SRV * i:\ localsymbols * http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*i:\localsymbols*http://msdl.microsoft.com/download/symbols
可执行搜索路径为:
***警告:无法验证ntkrnlmp.exe的校验和
*** WARNING: Unable to verify checksum for ntkrnlmp.exe
Windows Server 2003内核版本3790(Service Pack 2)MP(2个进程)免费x64
Windows Server 2003 Kernel Version 3790 (Service Pack 2) MP (2 procs) Free x64
产品:WinNt,套件:TerminalServer SingleUserTS
Product: WinNt, suite: TerminalServer SingleUserTS
构建于:3790.srv03_sp2_gdr.101019-0340
Built by: 3790.srv03_sp2_gdr.101019-0340
机器名称:
内核基数= 0xfffff800`01000000 PsLoadedModuleList = 0xfffff800`011d4140
Kernel base = 0xfffff800`01000000 PsLoadedModuleList = 0xfffff800`011d4140
调试会话时间:2011年5月24日星期二21:32:30.390(UTC + 2:00)
Debug session time: Tue May 24 21:32:30.390 2011 (UTC + 2:00)
系统正常运行时间:0天3:22:35.260
System Uptime: 0 days 3:22:35.260
***警告:无法验证ntkrnlmp.exe的校验和
*** WARNING: Unable to verify checksum for ntkrnlmp.exe
加载内核符号
............................................... ................
...............................................................
............................................... ........
.......................................................
加载用户符号
正在加载已卸载的模块列表
Loading unloaded module list
.........
.........
*************************************************** ************************************
*******************************************************************************
* *
* *
* Bugcheck分析 *
* Bugcheck Analysis *
* *
* *
*************************************************** ************************************
*******************************************************************************
使用!analyze -v获取详细的调试信息.
Use !analyze -v to get detailed debugging information.
BugCheck 3B,{c0000005,fffff97fff0c72c8,fffffadf90421f80、0}
BugCheck 3B, {c0000005, fffff97fff0c72c8, fffffadf90421f80, 0}
可能是由于:win32k.sys(win32k!vCleanupSurfaces + bf)
Probably caused by : win32k.sys ( win32k!vCleanupSurfaces+bf )
后续行动:MachineOwner
Followup: MachineOwner
---------
---------
1:kd> !分析-v
1: kd> !analyze -v
*************************************************** ************************************
*******************************************************************************
* *
* *
* Bugcheck分析 *
* Bugcheck Analysis *
* *
* *
*************************************************** ************************************
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION(3b)
SYSTEM_SERVICE_EXCEPTION (3b)
在执行系统服务例程时发生了异常.
An exception happened while executing a system service routine.
参数:
Arg1:00000000c0000005,导致错误检查的异常代码
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2:fffff97fff0c72c8,引起错误检查的指令的地址
Arg2: fffff97fff0c72c8, Address of the instruction which caused the bugcheck
Arg3:fffffadf90421f80,导致错误检查的异常的上下文记录的地址
Arg3: fffffadf90421f80, Address of the context record for the exception that caused the bugcheck
Arg4:0000000000000000,零.
Arg4: 0000000000000000, zero.
调试详细信息:
------------------
------------------
EXCEPTION_CODE:(NTSTATUS)0xc0000005-在"0x%08lx"处的指令为:在"0x%081x"处的参考存储器.内存不能为%s".
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
FAULTING_IP:
FAULTING_IP:
win32k!vCleanupSurfaces + bf
win32k!vCleanupSurfaces+bf
fffff97f`ff0c72c8 8b4070 mov eax,dword ptr [rax + 70h]
fffff97f`ff0c72c8 8b4070 mov eax,dword ptr [rax+70h]
上下文: fffffadf90421f80-(.cxr 0xfffffadf90421f80)
CONTEXT: fffffadf90421f80 -- (.cxr 0xfffffadf90421f80)
rax = 0000000000000000 rbx = 0000000000000000 rcx = fffffadf9ad7e2b0
rax=0000000000000000 rbx=0000000000000000 rcx=fffffadf9ad7e2b0
rdx = 0000000000000450 rsi = fffff97ff5800000 rdi = 0000000000000018
rdx=0000000000000450 rsi=fffff97ff5800000 rdi=0000000000000018
rip = fffff97fff0c72c8 rsp = fffffadf90422790 rbp = 000000000d05235e
rip=fffff97fff0c72c8 rsp=fffffadf90422790 rbp=000000000d05235e
r8 = fffffadf9ad7e2b0 r9 = 0000000000000000 r10 = 0000000000000000
r8=fffffadf9ad7e2b0 r9=0000000000000000 r10=0000000000000000
r11 = fffffadf90422788 r12 = 0000000000000450 r13 = 0000000000000001
r11=fffffadf90422788 r12=0000000000000450 r13=0000000000000001
r14 = 0000000000000001 r15 = 0000000000000000
r14=0000000000000001 r15=0000000000000000
iopl = 0 nv up ei ng nz na po nc
iopl=0 nv up ei ng nz na po nc
cs = 0010 ss = 0018 ds = 002b es = 002b fs = 0053 gs = 002b efl = 00010286
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
win32k!vCleanupSurfaces + 0xbf:
win32k!vCleanupSurfaces+0xbf:
fffff97f`ff0c72c8 8b4070 mov eax,dword ptr [rax + 70h] ds:002b:00000000`00000070 = ????????
fffff97f`ff0c72c8 8b4070 mov eax,dword ptr [rax+70h] ds:002b:00000000`00000070=????????
重置默认范围
CUSTOMER_CRASH_COUNT: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0x3B
BUGCHECK_STR: 0x3B
PROCESS_NAME: iexplore.exe
PROCESS_NAME: iexplore.exe
CURRENT_IRQL: 0
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER:从fffff97fff0c7bd2到fffff97fff0c72c8
LAST_CONTROL_TRANSFER: from fffff97fff0c7bd2 to fffff97fff0c72c8
STACK_TEXT:
STACK_TEXT:
fffffadf`90422790 fffff97f`ff0c7bd2:00000000`00042570 00000000`00002c3a fffff97f`f5800000 00000000`00000018:win32k!vCleanupSurfaces + 0xbf
fffffadf`90422790 fffff97f`ff0c7bd2 : 00000000`00042570 00000000`00002c3a fffff97f`f5800000 00000000`00000018 : win32k!vCleanupSurfaces+0xbf
fffffadf`904227f0 fffff97f`ff0c7c6c:00000000`00000000 00000000`c0000005 fffffa80`05287d40 00000000`00000000:win32k!NtGdiCloseProcess + 0x412
fffffadf`904227f0 fffff97f`ff0c7c6c : 00000000`00000000 00000000`c0000005 fffffa80`05287d40 00000000`00000000 : win32k!NtGdiCloseProcess+0x412
fffffadf`90422890 fffff97f`ff0c8b9f:00000000`00000000 00000000`c0000005 fffffa80`05287d40 00000000`00000000:win32k!GdiProcessCallout + 0x17b
fffffadf`90422890 fffff97f`ff0c8b9f : 00000000`00000000 00000000`c0000005 fffffa80`05287d40 00000000`00000000 : win32k!GdiProcessCallout+0x17b
fffffadf`90422910 fffff800`0128d711:00000000`c0000005 00000000`00000001 00000000`00000000 fffffadf`9ad7e2b0:win32k!W32pProcessCallout + 0x88
fffffadf`90422910 fffff800`0128d711 : 00000000`c0000005 00000000`00000001 00000000`00000000 fffffadf`9ad7e2b0 : win32k!W32pProcessCallout+0x88
fffffadf`90422940 fffff800`01288d1b:fffffadf`c0000005 fffffadf`9ab387d0 00000000`00000001 fffffadf`9ad7e2b0:nt!PspExitThread + 0x7cc
fffffadf`90422940 fffff800`01288d1b : fffffadf`c0000005 fffffadf`9ab387d0 00000000`00000001 fffffadf`9ad7e2b0 : nt!PspExitThread+0x7cc
fffffadf`90422bd0 fffff800`0102e33d:fffffadf`9ad7e201 fffffadf`c0000005 fffffadf`9ad7e2b0 fffffadf`90422cf0:nt!NtTerminateProcess + 0x362
fffffadf`90422bd0 fffff800`0102e33d : fffffadf`9ad7e201 fffffadf`c0000005 fffffadf`9ad7e2b0 fffffadf`90422cf0 : nt!NtTerminateProcess+0x362
fffffadf`90422c70 00000000`77ef06fa:00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000:nt!KiSystemServiceCopyEnd + 0x3
fffffadf`90422c70 00000000`77ef06fa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x3
00000000`08b0e828 00000000`00000000:00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000:0x77ef06fa
00000000`08b0e828 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77ef06fa
FOLLOWUP_IP:
FOLLOWUP_IP:
win32k!vCleanupSurfaces + bf
win32k!vCleanupSurfaces+bf
fffff97f`ff0c72c8 8b4070 mov eax,dword ptr [rax + 70h]
fffff97f`ff0c72c8 8b4070 mov eax,dword ptr [rax+70h]
SYMBOL_STACK_INDEX: 0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32k!vCleanupSurfaces + bf
SYMBOL_NAME: win32k!vCleanupSurfaces+bf
FOLLOWUP_NAME: MachineOwner
FOLLOWUP_NAME: MachineOwner
MODULE_NAME:win32k
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d6fa550
DEBUG_FLR_IMAGE_TIMESTAMP: 4d6fa550
STACK_COMMAND: .cxr 0xfffffadf90421f80; kb
STACK_COMMAND: .cxr 0xfffffadf90421f80 ; kb
FAILURE_BUCKET_ID: X64_0x3B_win32k!vCleanupSurfaces + bf
FAILURE_BUCKET_ID: X64_0x3B_win32k!vCleanupSurfaces+bf
BUCKET_ID: X64_0x3B_win32k!vCleanupSurfaces + bf
BUCKET_ID: X64_0x3B_win32k!vCleanupSurfaces+bf
后续行动:MachineOwner
Followup: MachineOwner
---------
---------
我希望有人可以帮助我解决这个问题.我有大约6个月的时间有这个问题,对此我已经感到厌倦了.
I hope that someone can help me figure this out. I have this problem for like 6 months now and I'm getting tired of it.
感谢所有输入!
PS:我也使用了MEMTest,没有错误,并且所有驱动程序都是最新的
PS: I also used MEMTest, no errors, and all the drivers are up-to-date
推荐答案
用手机拍一张照片:
http://s1123.photobucket.com/albums/l552/joostvanderlinden/?action=view¤t=IMG_20110529_133330.jpg
这篇关于Windows XP蓝屏已调试(与OS无关)的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持!