locked
藍畫面問題 RRS feed

  • 問題

  • 最近我的電腦在上網時突然發生藍畫面。藍畫面的CODE是0x00000fc。

    重新開機後的訊息

    問題簽章:
      問題事件名稱: BlueScreen
      作業系統版本: 6.1.7601.2.1.0.256.1
      地區設定識別碼: 3076

    與問題相關的其他資訊:
      BCCode: fc
      BCP1: FFFFF88008430A38
      BCP2: 8000000188598963
      BCP3: FFFFF8800842FF60
      BCP4: 0000000000000002
      OS Version: 6_1_7601
      Service Pack: 1_0
      Product: 256_1

    協助說明問題的檔案:
      C:\Windows\Minidump\121313-9531-01.dmp
      C:\Users\db\AppData\Local\Temp\WER-11232-0.sysdata.xml

    閱讀我們的線上隱私權聲明:
      http://go.microsoft.com/fwlink/?linkid=104288&clcid=0x0c04

     ------------------------------

    以下是DUMP的下載

    http://www.sendspace.com/file/m2qctp

    請問是什麼原因導致呢?

    2013年12月13日 上午 09:40

解答

  • Hi saiyangoku

    找到問題了BitCometServic這服務,應該是P2P的軟體所導致的

    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
    An attempt was made to execute non-executable memory.  The guilty driver
    is on the stack trace (and is typically the current instruction pointer).
    When possible, the guilty driver's name (Unicode string) is printed on
    the bugcheck screen and saved in KiBugCheckDriver.
    Arguments:
    Arg1: fffff88008430a38, Virtual address for the attempted execute.
    Arg2: 8000000188598963, PTE contents.
    Arg3: fffff8800842ff60, (reserved)
    Arg4: 0000000000000002, (reserved)
    
    Debugging Details:
    ------------------
    
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    BUGCHECK_STR:  0xFC
    
    PROCESS_NAME:  BitCometServic
    
    CURRENT_IRQL:  0
    
    ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) x86fre
    
    TRAP_FRAME:  fffff8800842ff60 -- (.trap 0xfffff8800842ff60)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffff88008430220
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88008430a38 rsp=fffff880084300f8 rbp=fffff88008430ae0
     r8=fffffa8009813e20  r9=fffff88008430440 r10=000000000010005f
    r11=fffff88008430120 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    fffff880`08430a38 0400            add     al,0
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002227214 to fffff8000227f1c0
    
    STACK_TEXT:  
    fffff880`0842fdf8 fffff800`02227214 : 00000000`000000fc fffff880`08430a38 80000001`88598963 fffff880`0842ff60 : nt!KeBugCheckEx
    fffff880`0842fe00 fffff800`0227d2ee : 00000000`00000008 fffff880`08430a38 fffffa80`0a9b2d00 fffff880`08430790 : nt! ?? ::FNODOBFM::`string'+0x4534c
    fffff880`0842ff60 fffff880`08430a38 : fffff880`08430790 fffff880`08430ae0 00000000`009ffa60 fffff880`084301b0 : nt!KiPageFault+0x16e
    fffff880`084300f8 fffff880`08430790 : fffff880`08430ae0 00000000`009ffa60 fffff880`084301b0 fffff880`04e7f13f : 0xfffff880`08430a38
    fffff880`08430100 fffff880`08430ae0 : 00000000`009ffa60 fffff880`084301b0 fffff880`04e7f13f fffffa80`08bec040 : 0xfffff880`08430790
    fffff880`08430108 00000000`009ffa60 : fffff880`084301b0 fffff880`04e7f13f fffffa80`08bec040 fffffa80`08c70000 : 0xfffff880`08430ae0
    fffff880`08430110 fffff880`084301b0 : fffff880`04e7f13f fffffa80`08bec040 fffffa80`08c70000 fffffa80`099c6f30 : 0x9ffa60
    fffff880`08430118 fffff880`04e7f13f : fffffa80`08bec040 fffffa80`08c70000 fffffa80`099c6f30 fffff880`0435719e : 0xfffff880`084301b0
    fffff880`08430120 fffff880`03502fbf : 00001f80`0010005f 0053002b`002b0023 00010297`002b002b 00000000`00000000 : dxgkrnl!DxgNotifyInterruptCB+0x83
    fffff880`08430150 0000ffff`00001f80 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : atikmpag+0x43fbf
    fffff880`08430240 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0000ffff`00001f80
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    dxgkrnl!DxgNotifyInterruptCB+83
    fffff880`04e7f13f 488b5c2438      mov     rbx,qword ptr [rsp+38h]
    
    SYMBOL_STACK_INDEX:  8
    
    SYMBOL_NAME:  dxgkrnl!DxgNotifyInterruptCB+83
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: dxgkrnl
    
    IMAGE_NAME:  dxgkrnl.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce799fa
    
    FAILURE_BUCKET_ID:  X64_0xFC_dxgkrnl!DxgNotifyInterruptCB+83
    
    BUCKET_ID:  X64_0xFC_dxgkrnl!DxgNotifyInterruptCB+83
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:x64_0xfc_dxgkrnl!dxgnotifyinterruptcb+83
    
    FAILURE_ID_HASH:  {428fac99-977f-0f0c-150a-019c27212ba8}
    
    Followup: MachineOwner
    ---------
    
    2: kd> lmvm dxgkrnl
    start             end                 module name
    fffff880`04e7c000 fffff880`04f70000   dxgkrnl    (pdb symbols)          c:\windows\symbols\dxgkrnl.pdb\A8224A3006F9476AB12ED5FA72ED178D1\dxgkrnl.pdb
        Loaded symbol image file: dxgkrnl.sys
        Image path: \SystemRoot\System32\drivers\dxgkrnl.sys
        Image name: dxgkrnl.sys
        Timestamp:        Sat Nov 20 17:50:50 2010 (4CE799FA)
        CheckSum:         000FA948
        ImageSize:        000F4000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    

    2013年12月19日 上午 03:10

所有回覆

  • Hi saiyangoku

    你的這一個錯誤只能說明有當機的狀況,因為dmp也是最小的mini的版本

    另外沒有詳細的其他資訊可以追尋所以,假如可以的話再提供一下事件檢視器中的系統跟程式的紀錄

    MODULE_NAME: nt
    
    FAULTING_MODULE: fffff80002200000 nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4fa390f3
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    BUGCHECK_STR:  0xFC
    
    CURRENT_IRQL:  0
    
    ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre
    
    LAST_CONTROL_TRANSFER:  from fffff80002227214 to fffff8000227f1c0
    
    STACK_TEXT:  
    fffff880`0842fdf8 fffff800`02227214 : 00000000`000000fc fffff880`08430a38 80000001`88598963 fffff880`0842ff60 : nt+0x7f1c0
    fffff880`0842fe00 00000000`000000fc : fffff880`08430a38 80000001`88598963 fffff880`0842ff60 00000000`00000002 : nt+0x27214
    fffff880`0842fe08 fffff880`08430a38 : 80000001`88598963 fffff880`0842ff60 00000000`00000002 fffff800`0228481a : 0xfc
    fffff880`0842fe10 80000001`88598963 : fffff880`0842ff60 00000000`00000002 fffff800`0228481a fffff800`023f1e80 : 0xfffff880`08430a38
    fffff880`0842fe18 fffff880`0842ff60 : 00000000`00000002 fffff800`0228481a fffff800`023f1e80 fffffa80`06506840 : 0x80000001`88598963
    fffff880`0842fe20 00000000`00000002 : fffff800`0228481a fffff800`023f1e80 fffffa80`06506840 fffff880`08430400 : 0xfffff880`0842ff60
    fffff880`0842fe28 fffff800`0228481a : fffff800`023f1e80 fffffa80`06506840 fffff880`08430400 fffff800`02270f40 : 0x2
    fffff880`0842fe30 fffff800`023f1e80 : fffffa80`06506840 fffff880`08430400 fffff800`02270f40 fffffa80`06506800 : nt+0x8481a
    fffff880`0842fe38 fffffa80`06506840 : fffff880`08430400 fffff800`02270f40 fffffa80`06506800 00000000`0000000b : nt+0x1f1e80
    fffff880`0842fe40 fffff880`08430400 : fffff800`02270f40 fffffa80`06506800 00000000`0000000b 00000000`00000000 : 0xfffffa80`06506840
    fffff880`0842fe48 fffff800`02270f40 : fffffa80`06506800 00000000`0000000b 00000000`00000000 00000000`0000000f : 0xfffff880`08430400
    fffff880`0842fe50 fffffa80`06506800 : 00000000`0000000b 00000000`00000000 00000000`0000000f 00000000`00000000 : nt+0x70f40
    fffff880`0842fe58 00000000`0000000b : 00000000`00000000 00000000`0000000f 00000000`00000000 ffffe738`5914227c : 0xfffffa80`06506800
    fffff880`0842fe60 00000000`00000000 : 00000000`0000000f 00000000`00000000 ffffe738`5914227c fffff6fc`40042180 : 0xb
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt+7f1c0
    fffff800`0227f1c0 48894c2408      mov     qword ptr [rsp+8],rcx
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt+7f1c0
    
    FOLLOWUP_NAME:  MachineOwner
    
    IMAGE_NAME:  ntoskrnl.exe
    
    BUCKET_ID:  WRONG_SYMBOLS
    
    FAILURE_BUCKET_ID:  WRONG_SYMBOLS
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:wrong_symbols
    
    FAILURE_ID_HASH:  {70b057e8-2462-896f-28e7-ac72d4d365f8}
    
    Followup: MachineOwner
    ---------
    

    2013年12月13日 上午 10:28
  • 我已把其中一次HANG機時產生的錯誤,在系統及程式中的事件儲存了FILE,不知以下是否你希望我提供的資訊。如果不是的話,請詳細說一下是哪一部分。

    http://www.sendspace.com/file/p4i663

    http://www.sendspace.com/file/1mpl3e

    2013年12月13日 下午 12:42
  • Hi saiyangoku

    我需要的是流水記錄,可是你卻給我兩個檔案都是一筆記錄

    這樣子沒有辦法替你確認是哪一項的驅動出問題

    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT


    2013年12月16日 上午 02:50
  • 你好,

    請到你的電腦位置C:\Windows\Minidump\

    找出名為121313-9531-01.dmp的文件放上來讓我們分析

    謝謝


    邊幫助, 邊鍛鍊

    2013年12月16日 上午 03:13
  • 抱歉不太明白...即是具體要提供的資料是如何找出來呢?


    • 已編輯 saiyangoku 2013年12月18日 下午 01:41
    2013年12月18日 下午 01:40
  • 我在主樓提供的檔案就是了你所說的檔案了。

    另外,我還找到了一個MEMORY.DMP,不知有沒有幫助

    http://pan.baidu.com/s/1cQGtK

    2013年12月18日 下午 01:41
  • Hi saiyangoku

    找到問題了BitCometServic這服務,應該是P2P的軟體所導致的

    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
    An attempt was made to execute non-executable memory.  The guilty driver
    is on the stack trace (and is typically the current instruction pointer).
    When possible, the guilty driver's name (Unicode string) is printed on
    the bugcheck screen and saved in KiBugCheckDriver.
    Arguments:
    Arg1: fffff88008430a38, Virtual address for the attempted execute.
    Arg2: 8000000188598963, PTE contents.
    Arg3: fffff8800842ff60, (reserved)
    Arg4: 0000000000000002, (reserved)
    
    Debugging Details:
    ------------------
    
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    BUGCHECK_STR:  0xFC
    
    PROCESS_NAME:  BitCometServic
    
    CURRENT_IRQL:  0
    
    ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) x86fre
    
    TRAP_FRAME:  fffff8800842ff60 -- (.trap 0xfffff8800842ff60)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffff88008430220
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88008430a38 rsp=fffff880084300f8 rbp=fffff88008430ae0
     r8=fffffa8009813e20  r9=fffff88008430440 r10=000000000010005f
    r11=fffff88008430120 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    fffff880`08430a38 0400            add     al,0
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002227214 to fffff8000227f1c0
    
    STACK_TEXT:  
    fffff880`0842fdf8 fffff800`02227214 : 00000000`000000fc fffff880`08430a38 80000001`88598963 fffff880`0842ff60 : nt!KeBugCheckEx
    fffff880`0842fe00 fffff800`0227d2ee : 00000000`00000008 fffff880`08430a38 fffffa80`0a9b2d00 fffff880`08430790 : nt! ?? ::FNODOBFM::`string'+0x4534c
    fffff880`0842ff60 fffff880`08430a38 : fffff880`08430790 fffff880`08430ae0 00000000`009ffa60 fffff880`084301b0 : nt!KiPageFault+0x16e
    fffff880`084300f8 fffff880`08430790 : fffff880`08430ae0 00000000`009ffa60 fffff880`084301b0 fffff880`04e7f13f : 0xfffff880`08430a38
    fffff880`08430100 fffff880`08430ae0 : 00000000`009ffa60 fffff880`084301b0 fffff880`04e7f13f fffffa80`08bec040 : 0xfffff880`08430790
    fffff880`08430108 00000000`009ffa60 : fffff880`084301b0 fffff880`04e7f13f fffffa80`08bec040 fffffa80`08c70000 : 0xfffff880`08430ae0
    fffff880`08430110 fffff880`084301b0 : fffff880`04e7f13f fffffa80`08bec040 fffffa80`08c70000 fffffa80`099c6f30 : 0x9ffa60
    fffff880`08430118 fffff880`04e7f13f : fffffa80`08bec040 fffffa80`08c70000 fffffa80`099c6f30 fffff880`0435719e : 0xfffff880`084301b0
    fffff880`08430120 fffff880`03502fbf : 00001f80`0010005f 0053002b`002b0023 00010297`002b002b 00000000`00000000 : dxgkrnl!DxgNotifyInterruptCB+0x83
    fffff880`08430150 0000ffff`00001f80 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : atikmpag+0x43fbf
    fffff880`08430240 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0000ffff`00001f80
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    dxgkrnl!DxgNotifyInterruptCB+83
    fffff880`04e7f13f 488b5c2438      mov     rbx,qword ptr [rsp+38h]
    
    SYMBOL_STACK_INDEX:  8
    
    SYMBOL_NAME:  dxgkrnl!DxgNotifyInterruptCB+83
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: dxgkrnl
    
    IMAGE_NAME:  dxgkrnl.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce799fa
    
    FAILURE_BUCKET_ID:  X64_0xFC_dxgkrnl!DxgNotifyInterruptCB+83
    
    BUCKET_ID:  X64_0xFC_dxgkrnl!DxgNotifyInterruptCB+83
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:x64_0xfc_dxgkrnl!dxgnotifyinterruptcb+83
    
    FAILURE_ID_HASH:  {428fac99-977f-0f0c-150a-019c27212ba8}
    
    Followup: MachineOwner
    ---------
    
    2: kd> lmvm dxgkrnl
    start             end                 module name
    fffff880`04e7c000 fffff880`04f70000   dxgkrnl    (pdb symbols)          c:\windows\symbols\dxgkrnl.pdb\A8224A3006F9476AB12ED5FA72ED178D1\dxgkrnl.pdb
        Loaded symbol image file: dxgkrnl.sys
        Image path: \SystemRoot\System32\drivers\dxgkrnl.sys
        Image name: dxgkrnl.sys
        Timestamp:        Sat Nov 20 17:50:50 2010 (4CE799FA)
        CheckSum:         000FA948
        ImageSize:        000F4000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    

    2013年12月19日 上午 03:10