1
Windows Vista Forum / Bluescreen bei Vista 32
« am: 02. Juni 2009, 09:23:34 »
Habe seit ein paar wochen ab und zu einen Bluesceen nur ich weiß nicht wieso
Amd Phenom 9500 Quad Core 2.2
Ram 2GB
MSI BOard
Gforce 8600 GT
Fehler :
Problemsignatur:
Problemereignisname: BlueScreen
Betriebsystemversion: 6.0.6002.2.2.0.256.1
Gebietsschema-ID: 1031
Zusatzinformationen zum Problem:
BCCode: 1000007e
BCP1: C0000005
BCP2: 20646156
BCP3: 8719BBC0
BCP4: 8719B8BC
OS Version: 6_0_6002
Service Pack: 2_0
Product: 256_1
Dateien, die bei der Beschreibung des Problems hilfreich sind:
C:\Windows\Minidump\Mini060209-01.dmp
C:\Users\Hilbert\AppData\Local\Temp\WER-158781-0.sysdata.xml
C:\Users\Hilbert\AppData\Local\Temp\WER7C1.tmp.version.txt
VIelleicht weiß einer von euch was er bedeutet.
VIelen dank im vorraus
-------------
hab die dump datei ausgewertet viuelleicht könnt ihr damit was anfangen.
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini060209-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: „SRV*c:\windows\symbols*http://msdl.microsoft.com/download/symbols“
Executable search path is:
Unable to load image \SystemRoot\system32\ntkrnlpa.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntkrnlpa.exe
*** ERROR: Module load completed but symbols could not be loaded for ntkrnlpa.exe
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0x81e37000 PsLoadedModuleList = 0x81f4ec70
Debug session time: Mon Jun 1 22:50:53.677 2009 (GMT+2)
System Uptime: 0 days 2:18:50.468
Unable to load image \SystemRoot\system32\ntkrnlpa.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntkrnlpa.exe
*** ERROR: Module load completed but symbols could not be loaded for ntkrnlpa.exe
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
..........
Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {c0000005, 20646156, 8719bbc0, 8719b8bc}
***** Kernel symbols are WRONG. Please fix symbols to do analysis.
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
Probably caused by : nvlddmkm.sys ( nvlddmkm+4b4090 )
Followup: MachineOwner
---------
0: kd> „!analyze -v“
^ Syntax error in '„!analyze -v“'
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 20646156, The address that the exception occurred at
Arg3: 8719bbc0, Exception Record Address
Arg4: 8719b8bc, Context Record Address
Debugging Details:
------------------
***** Kernel symbols are WRONG. Please fix symbols to do analysis.
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
ADDITIONAL_DEBUG_TEXT:
Use '!findthebuild' command to search for the target build information.
If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols.
FAULTING_MODULE: 81e37000 nt
DEBUG_FLR_IMAGE_TIMESTAMP: 49fa9243
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
FAULTING_IP:
+3eefe
20646156 ?? ???
EXCEPTION_RECORD: 8719bbc0 -- (.exr 0xffffffff8719bbc0)
ExceptionAddress: 20646156
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000008
Parameter[1]: 20646156
Attempt to execute non-executable address 20646156
CONTEXT: 8719b8bc -- (.cxr 0xffffffff8719b8bc)
eax=8719bca4 ebx=93881750 ecx=20646156 edx=8eabe070 esi=00000000 edi=93872ab0
eip=20646156 esp=8719bc88 ebp=8719bca8 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
20646156 ?? ???
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x7E
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 8eabe090 to 20646156
STACK_TEXT:
WARNING: Frame IP not in any known module. Following frames may be wrong.
8719bc84 8eabe090 93881750 93872ab0 8719bca4 0x20646156
8719bca8 8e79ca1e 93881750 93872ab0 8719bcd8 nvlddmkm+0x4b4090
8719bd08 8e79d2c0 84de4730 81f3913c 8719bd2c nvlddmkm+0x192a1e
8719bd18 8e704803 00000000 98856b70 85b4ef38 nvlddmkm+0x1932c0
8719bd2c 8204486f 85b4ef38 84de4730 846fd8b0 nvlddmkm+0xfa803
8719bd44 81edce22 846fd8b0 00000000 83993d78 nt+0x20d86f
8719bd7c 8200cc42 846fd8b0 9e36b428 00000000 nt+0xa5e22
8719bdc0 81e75efe 81edcd25 00000001 00000000 nt+0x1d5c42
00000000 00000000 00000000 00000000 00000000 nt+0x3eefe
FOLLOWUP_IP:
nvlddmkm+4b4090
8eabe090 85c0 test eax,eax
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nvlddmkm+4b4090
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr 0xffffffff8719b8bc ; kb
BUCKET_ID: WRONG_SYMBOLS
Followup: MachineOwner
---------
Amd Phenom 9500 Quad Core 2.2
Ram 2GB
MSI BOard
Gforce 8600 GT
Fehler :
Problemsignatur:
Problemereignisname: BlueScreen
Betriebsystemversion: 6.0.6002.2.2.0.256.1
Gebietsschema-ID: 1031
Zusatzinformationen zum Problem:
BCCode: 1000007e
BCP1: C0000005
BCP2: 20646156
BCP3: 8719BBC0
BCP4: 8719B8BC
OS Version: 6_0_6002
Service Pack: 2_0
Product: 256_1
Dateien, die bei der Beschreibung des Problems hilfreich sind:
C:\Windows\Minidump\Mini060209-01.dmp
C:\Users\Hilbert\AppData\Local\Temp\WER-158781-0.sysdata.xml
C:\Users\Hilbert\AppData\Local\Temp\WER7C1.tmp.version.txt
VIelleicht weiß einer von euch was er bedeutet.
VIelen dank im vorraus
-------------
hab die dump datei ausgewertet viuelleicht könnt ihr damit was anfangen.
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini060209-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: „SRV*c:\windows\symbols*http://msdl.microsoft.com/download/symbols“
Executable search path is:
Unable to load image \SystemRoot\system32\ntkrnlpa.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntkrnlpa.exe
*** ERROR: Module load completed but symbols could not be loaded for ntkrnlpa.exe
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0x81e37000 PsLoadedModuleList = 0x81f4ec70
Debug session time: Mon Jun 1 22:50:53.677 2009 (GMT+2)
System Uptime: 0 days 2:18:50.468
Unable to load image \SystemRoot\system32\ntkrnlpa.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntkrnlpa.exe
*** ERROR: Module load completed but symbols could not be loaded for ntkrnlpa.exe
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
..........
Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {c0000005, 20646156, 8719bbc0, 8719b8bc}
***** Kernel symbols are WRONG. Please fix symbols to do analysis.
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
Probably caused by : nvlddmkm.sys ( nvlddmkm+4b4090 )
Followup: MachineOwner
---------
0: kd> „!analyze -v“
^ Syntax error in '„!analyze -v“'
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 20646156, The address that the exception occurred at
Arg3: 8719bbc0, Exception Record Address
Arg4: 8719b8bc, Context Record Address
Debugging Details:
------------------
***** Kernel symbols are WRONG. Please fix symbols to do analysis.
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
ADDITIONAL_DEBUG_TEXT:
Use '!findthebuild' command to search for the target build information.
If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols.
FAULTING_MODULE: 81e37000 nt
DEBUG_FLR_IMAGE_TIMESTAMP: 49fa9243
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
FAULTING_IP:
+3eefe
20646156 ?? ???
EXCEPTION_RECORD: 8719bbc0 -- (.exr 0xffffffff8719bbc0)
ExceptionAddress: 20646156
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000008
Parameter[1]: 20646156
Attempt to execute non-executable address 20646156
CONTEXT: 8719b8bc -- (.cxr 0xffffffff8719b8bc)
eax=8719bca4 ebx=93881750 ecx=20646156 edx=8eabe070 esi=00000000 edi=93872ab0
eip=20646156 esp=8719bc88 ebp=8719bca8 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
20646156 ?? ???
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x7E
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 8eabe090 to 20646156
STACK_TEXT:
WARNING: Frame IP not in any known module. Following frames may be wrong.
8719bc84 8eabe090 93881750 93872ab0 8719bca4 0x20646156
8719bca8 8e79ca1e 93881750 93872ab0 8719bcd8 nvlddmkm+0x4b4090
8719bd08 8e79d2c0 84de4730 81f3913c 8719bd2c nvlddmkm+0x192a1e
8719bd18 8e704803 00000000 98856b70 85b4ef38 nvlddmkm+0x1932c0
8719bd2c 8204486f 85b4ef38 84de4730 846fd8b0 nvlddmkm+0xfa803
8719bd44 81edce22 846fd8b0 00000000 83993d78 nt+0x20d86f
8719bd7c 8200cc42 846fd8b0 9e36b428 00000000 nt+0xa5e22
8719bdc0 81e75efe 81edcd25 00000001 00000000 nt+0x1d5c42
00000000 00000000 00000000 00000000 00000000 nt+0x3eefe
FOLLOWUP_IP:
nvlddmkm+4b4090
8eabe090 85c0 test eax,eax
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nvlddmkm+4b4090
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr 0xffffffff8719b8bc ; kb
BUCKET_ID: WRONG_SYMBOLS
Followup: MachineOwner
---------