BSOD, kan probleem niet achterhalen

  • Onderwerp starter Onderwerp starter Jups
  • Startdatum Startdatum
Status
Niet open voor verdere reacties.

Jups

Nieuwe gebruiker
Lid geworden
29 apr 2009
Berichten
2
Ik heb sinds een week problemen met mijn PC. Ik krijg geregeld BSOD's met verschillende foutcodes. Ik krijg de BSOD's vaak als ik een spel opstart, maar soms ook bij het instaleren van programma's. Omdat ik eerst dacht dat het misschien aan een driver lag, heb de drivers van mijn mobo en grafische kaart opnieuw geinstalleerd. Geen resultaat.
Ik heb ook mijn HD geformat en windows helemaal opnieuw geinstalleerd, maar ook nu krijg ik nog BSOD's.
Ik heb een MEMtest uitgevoerd tijdens het opstarten van mijn PC, geen problemen.
Ik heb een uur lang de NVidia stresstest gedraait, geen problemen.
Ik heb de stabiliteitstest van furmark een half uur gedraait. Daar hing mijn pc 2x voor een korte tijd. Volgens furmark bleef ik wel een FPS van 2 houden. De temperatuur kwam niet boven de 90 graden uit.

Ik heb de laatste BSOD door winDdb gehaald, met het volgende resultaat.

Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Code:
Loading Dump File [C:\WINDOWS\Minidump\Mini042909-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: *** Invalid ***
****************************************************************************
* Symbol loading may be unreliable without a symbol search path.           *
* Use .symfix to have the debugger choose a symbol path.                   *
* After setting your symbol path, use .reload to refresh symbol locations. *
****************************************************************************
Executable search path is: 
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
*                                                                   *
* The Symbol Path can be set by:                                    *
*   using the _NT_SYMBOL_PATH environment variable.                 *
*   using the -y <symbol_path> argument when starting the debugger. *
*   using .sympath and .sympath+                                    *
*********************************************************************
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
*** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Wed Apr 29 15:28:38.328 2009 (GMT+2)
System Uptime: 0 days 0:05:20.031
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
*                                                                   *
* The Symbol Path can be set by:                                    *
*   using the _NT_SYMBOL_PATH environment variable.                 *
*   using the -y <symbol_path> argument when starting the debugger. *
*   using .sympath and .sympath+                                    *
*********************************************************************
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
*** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe
Loading Kernel Symbols
...............................................................
....................................................
Loading User Symbols
Loading unloaded module list
...........
Unable to load image win32k.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007F, {d, 0, 0, 0}

***** Kernel symbols are WRONG. Please fix symbols to do analysis.

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Your debugger is not using the correct symbols                 ***
***                                                                   ***
***    In order for this command to work properly, your symbol path   ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: nt!_KPRCB                                     ***
***                                                                   ***
*************************************************************************
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Your debugger is not using the correct symbols                 ***
***                                                                   ***
***    In order for this command to work properly, your symbol path   ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: nt!_KPRCB                                     ***
***                                                                   ***
*************************************************************************
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
*                                                                   *
* The Symbol Path can be set by:                                    *
*   using the _NT_SYMBOL_PATH environment variable.                 *
*   using the -y <symbol_path> argument when starting the debugger. *
*   using .sympath and .sympath+                                    *
*********************************************************************
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
*                                                                   *
* The Symbol Path can be set by:                                    *
*   using the _NT_SYMBOL_PATH environment variable.                 *
*   using the -y <symbol_path> argument when starting the debugger. *
*   using .sympath and .sympath+                                    *
*********************************************************************
Probably caused by : hardware ( win32k+16e6 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000d, EXCEPTION_GP_FAULT
Arg2: 00000000
Arg3: 00000000
Arg4: 00000000

Debugging Details:
------------------

***** Kernel symbols are WRONG. Please fix symbols to do analysis.

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Your debugger is not using the correct symbols                 ***
***                                                                   ***
***    In order for this command to work properly, your symbol path   ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: nt!_KPRCB                                     ***
***                                                                   ***
*************************************************************************
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Your debugger is not using the correct symbols                 ***
***                                                                   ***
***    In order for this command to work properly, your symbol path   ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: nt!_KPRCB                                     ***
***                                                                   ***
*************************************************************************
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
*                                                                   *
* The Symbol Path can be set by:                                    *
*   using the _NT_SYMBOL_PATH environment variable.                 *
*   using the -y <symbol_path> argument when starting the debugger. *
*   using .sympath and .sympath+                                    *
*********************************************************************
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
*                                                                   *
* The Symbol Path can be set by:                                    *
*   using the _NT_SYMBOL_PATH environment variable.                 *
*   using the -y <symbol_path> argument when starting the debugger. *
*   using .sympath and .sympath+                                    *
*********************************************************************

ADDITIONAL_DEBUG_TEXT:  
Use '!findthebuild' command to search for the target build information.
If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols.

FAULTING_MODULE: 804d7000 nt

DEBUG_FLR_IMAGE_TIMESTAMP:  0

BUGCHECK_STR:  0x7f_d

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  DRIVER_FAULT

MISALIGNED_IP: 
win32k+16e6
bf8016e6 9a8b4638660958  call    5809:6638468B

LAST_CONTROL_TRANSFER:  from bf801242 to bf8016e6

STACK_TEXT:  
WARNING: Stack unwind information not available. Following frames may be wrong.
b7eabaac bf801242 e118b5a0 00000010 80500264 win32k+0x16e6
b7eabad4 bf89fc25 00000022 006efff4 bf801087 win32k+0x1242
b7eabd30 bf884635 b7edb490 00000002 b7eabd54 win32k+0x9fc25
b7eabd40 bf8010aa b7edb490 b7eabd64 006efff4 win32k+0x84635
b7eabd54 8054162c 00000000 00000022 00000000 win32k+0x10aa
b7eabd64 7c90e514 badb0d00 006effec 00000000 nt+0x6a62c
00000000 00000000 00000000 00000000 00000000 0x7c90e514


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k+16e6
bf8016e6 9a8b4638660958  call    5809:6638468B

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  win32k+16e6

FOLLOWUP_NAME:  MachineOwner

IMAGE_NAME:  hardware

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED

BUCKET_ID:  IP_MISALIGNED

Followup: MachineOwner
---------


Kan iemand mij helpen de oorzaak te achterhalen. Ik vrees namelijk dat het nu hardwarematig is. BVD.
 
Laatst bewerkt door een moderator:
90 graden!!!, dat is veel te hoog.
Is deze tmp van je gpu of van je cpu. in beide gevallen is deze waarschijnlijk zeer gevaarlijk dicht in de buurt voor zijn reis naar de eeuwige jachtvelden.

Ik kreeg onlangs ook van die rare bsod's en last van onverklaarbare uitvallers van software, toen bleek ook mijn cpu naar z'n grootje.
 
Dat is de temperatuur van mijn GPU. Mijn CPU zat volgens mij rond de 50.
 
Dat is de temperatuur van mijn GPU. Mijn CPU zat volgens mij rond de 50.

beetje laat :P
maar ziet er naaruit dat het nog neit opgelost is....
een GPU hoort geen 90 graden te zijn, je zult je vingers er aan verbranden :confused:
mijn GPU komt stressed niet boven de 60 graden, hierbij is de case temp dan ook rond de 36 graden
 
Status
Niet open voor verdere reacties.
Terug
Bovenaan Onderaan