BSOD aber kein ersichtlicher Fehlercode


Forum: Allgemeine Fragen und Probleme (Windows 7)

Alle Windows 7 Themen, die nicht in die anderen Foren passen.

Schlagworte:
  1. Khazad

    Khazad Neuling

    Hallo zusammen,

    in der Hoffnung das mir vielleicht jemand weiterhelfen kann, habe ich mich hier angemeldet.
    Seit gestern stürzt mein Arbeits-PC immer wieder unvermittelt ab. Der Bildschirm friert ein oder
    wird schwarz. Es erfolgt bis auf ein einziges mal aber kein Neustart. Und bei diesem einzigen mal
    wurde folgendes Minidump aufgezeichnet.

    Es passiert auch nicht nur im normalen Windows-Betrieb, sondern auch im abgesicherten Modus.

    Ich werde daraus leider nicht schlau... Vielleicht weiß ja jemand von Euch Rat?

    Code:
    Microsoft (R) Windows Debugger Version 6.2.9200.16384 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\091212-5101-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*C:\Windows\Symbols*http://msdl.microsoft.com/downloads/symbols
    Executable search path is: C:\windows\system32
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.17803.x86fre.win7sp1_gdr.120330-1504
    Machine Name:
    Kernel base = 0xe2c0d000 PsLoadedModuleList = 0xe2d564d0
    Debug session time: Wed Sep 12 17:53:26.642 2012 (UTC + 2:00)
    System Uptime: 0 days 0:03:31.000
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 10001, {b6d7, 2, 0, e2c8697d}
    
    Probably caused by : ntkrpamp.exe ( nt!KiTrap0E+2cf )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Unknown bugcheck code (10001)
    Unknown bugcheck description
    Arguments:
    Arg1: 0000b6d7
    Arg2: 00000002
    Arg3: 00000000
    Arg4: e2c8697d
    
    Debugging Details:
    ------------------
    
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    BUGCHECK_STR:  0x10001
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    TAG_NOT_DEFINED_c000000f:  FFFFFFFFBFB4D000
    
    TRAP_FRAME:  bfb48ae4 -- (.trap 0xffffffffbfb48ae4)
    ErrCode = 00000000
    eax=0000003e ebx=00000001 ecx=bfb2c120 edx=00000001 esi=0000b6c0 edi=b84c374c
    eip=e2c8697d esp=bfb48b58 ebp=bfb48b64 iopl=0         nv up ei pl nz ac pe cy
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010217
    nt!KiUnlinkWaitBlocks+0xb:
    e2c8697d 8a4617          mov     al,byte ptr [esi+17h]      ds:0023:0000b6d7=??
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from e2c8697d to e2c4e65b
    
    STACK_TEXT:  
    bfb48ae4 e2c8697d badb0d00 00000001 b6c03ef8 nt!KiTrap0E+0x2cf
    bfb48b64 e2c8a5f2 b6c03342 bfb48ba4 bfb2c120 nt!KiUnlinkWaitBlocks+0xb
    bfb48b80 e2c86fa5 00000000 00000000 bfb2da80 nt!KiProcessThreadWaitList+0x26
    bfb48c68 e2c86e7a bfb2c120 bfb48ca8 00000000 nt!KiProcessExpiredTimerList+0xe9
    bfb48cdc e2c8500e 000034d5 b897d300 bfb31800 nt!KiTimerExpiration+0x25c
    bfb48d20 e2c84e38 00000000 0000000e 00000000 nt!KiRetireDpcList+0xcb
    bfb48d24 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x38
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiTrap0E+2cf
    e2c4e65b 833d4417d7e200  cmp     dword ptr [nt!KiFreezeFlag (e2d71744)],0
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!KiTrap0E+2cf
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4f766ae5
    
    FAILURE_BUCKET_ID:  0x10001_nt!KiTrap0E+2cf
    
    BUCKET_ID:  0x10001_nt!KiTrap0E+2cf
    
    Followup: MachineOwner
    ---------
    
    
    Vielen Dank und viele Grüße

    Khazad
     
  2. Werbung
  3. Khazad

    Khazad Neuling

    AW: BSOD aber kein ersichtlicher Fehlercode

    Hallo nochmal,

    heute kamen noch zwei weitere Dumps dazu:

    Code:
    Microsoft (R) Windows Debugger Version 6.2.9200.16384 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\091312-11700-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*C:\Windows\Symbols*http://msdl.microsoft.com/downloads/symbols
    Executable search path is: C:\windows\system32
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.17803.x86fre.win7sp1_gdr.120330-1504
    Machine Name:
    Kernel base = 0xe2c1e000 PsLoadedModuleList = 0xe2d674d0
    Debug session time: Thu Sep 13 11:32:24.327 2012 (UTC + 2:00)
    System Uptime: 0 days 0:03:45.060
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck FC, {c818e2c9, 72a7b121, dc82aa9e, 2}
    
    Probably caused by : ntkrpamp.exe ( nt!KiTrap0E+dc )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
    An attempt was made to execute non-executable memory.  The guilty driver
    is on the stack trace (and is typically the current instruction pointer).
    When possible, the guilty driver's name (Unicode string) is printed on
    the bugcheck screen and saved in KiBugCheckDriver.
    Arguments:
    Arg1: c818e2c9, Virtual address for the attempted execute.
    Arg2: 72a7b121, PTE contents.
    Arg3: dc82aa9e, (reserved)
    Arg4: 00000002, (reserved)
    
    Debugging Details:
    ------------------
    
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    BUGCHECK_STR:  0xFC
    
    PROCESS_NAME:  firefox.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  dc82aa9e -- (.trap 0xffffffffdc82aa9e)
    ErrCode = 00000011
    eax=00000000 ebx=b887c9e0 ecx=00000000 edx=00000000 esi=b887c818 edi=b887c8d8
    eip=c818e2c9 esp=dc82ab12 ebp=50cfdc82 iopl=0         nv up ei pl zr na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
    c818e2c9 0032            add     byte ptr [edx],dh          ds:0023:00000000=??
    Resetting default scope
    
    UNALIGNED_STACK_POINTER:  dc82ab12
    
    LAST_CONTROL_TRANSFER:  from e2c5f468 to e2cac3bf
    
    STACK_TEXT:  
    dc82aa86 e2c5f468 00000008 c818e2c9 00000000 nt!MmAccessFault+0x106
    dc82aa86 c818e2c9 00000008 c818e2c9 00000000 nt!KiTrap0E+0xdc
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    dc82ab0e c9acb887 5b48b887 1900e303 00000007 0xc818e2c9
    dc82ab12 5b48b887 1900e303 00000007 c8780000 0xc9acb887
    dc82ab16 1900e303 00000007 c8780000 c120b887 0x5b48b887
    dc82ab1a 00000000 c8780000 c120b887 0000bfb2 0x1900e303
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiTrap0E+dc
    e2c5f468 85c0            test    eax,eax
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!KiTrap0E+dc
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4f766ae5
    
    FAILURE_BUCKET_ID:  0xFC_nt!KiTrap0E+dc
    
    BUCKET_ID:  0xFC_nt!KiTrap0E+dc
    
    Followup: MachineOwner
    ---------
    
    
    und

    Code:
    Microsoft (R) Windows Debugger Version 6.2.9200.16384 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\091312-6240-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Mini Kernel Dump does not have process information
    Symbol search path is: SRV*C:\Windows\Symbols*http://msdl.microsoft.com/downloads/symbols
    Executable search path is: C:\windows\system32
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.17803.x86fre.win7sp1_gdr.120330-1504
    Machine Name:
    Kernel base = 0xe2c1c000 PsLoadedModuleList = 0xe2d654d0
    Debug session time: Thu Sep 13 11:35:33.104 2012 (UTC + 2:00)
    System Uptime: 0 days 0:02:07.836
    Loading Kernel Symbols
    ....................................................Unable to load image Unknown_Module_00000000, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for Unknown_Module_00000000
    Unable to add module at 00000000
    
    Loading User Symbols
    Loading unloaded module list
    .
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {d, 0, 0, 0}
    
    Probably caused by : ntkrpamp.exe ( nt!KiSystemFatalException+f )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000d, EXCEPTION_GP_FAULT
    Arg2: 00000000
    Arg3: 00000000
    Arg4: 00000000
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_d
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from c4ad00cf to e2c5dd9b
    
    STACK_TEXT:  
    c247ac18 c4ad00cf badb0d00 0000005f b831f638 nt!KiSystemFatalException+0xf
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    c247ac88 c247ad18 00000014 b83944aa 00000000 0xc4ad00cf
    c247acd4 e2c2a904 b704116c c247ad1c 00000004 0xc247ad18
    c247ad50 e2e25056 c4f8e364 f0050302 00000000 nt!EtwpCCSwapTrace+0x433
    c247ad90 e2ccd1a9 c4a97520 c4f8e364 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiSystemFatalException+f
    e2c5dd9b c3              ret
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!KiSystemFatalException+f
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4f766ae5
    
    FAILURE_BUCKET_ID:  0x7f_d_nt!KiSystemFatalException+f
    
    BUCKET_ID:  0x7f_d_nt!KiSystemFatalException+f
    
    Followup: MachineOwner
    ---------
    
    
    Die Windows-Reperatur hat keine Fehler gefunden. Weder bei der Installation noch beim Start-Up oder Memory...
     
  • Werbung
  • Die Seite wird geladen...
    Hier genannte Produkt- und Firmennamen sowie deren Logos koennen eingetragene Warenzeichen der jeweiligen Unternehmen sein.