מסך כחול מזה תקופה ארוכה - עמוד 2 - תמיכה טכנית למחשבים - HWzone פורומים
עבור לתוכן
  • צור חשבון

מסך כחול מזה תקופה ארוכה


zoriza

Recommended Posts

אנליזה לא טובה בגלל לא נטען SYMBOLE TABLE

תריץ עוד פעם נכון.

שגיאה IRQL_NOT_LESS_OR_EQUAL בגלל דרייבר

איזה ? אי אפשר לדעת.

לחשוד בדריבר בלי חתימה. לריץ הפקודה

sigverif

ותקבל רשימה של דריברים לא חתומים. אולי 1 מהם סיבה. לנסות

לעדכן אותם. ולעדכן חלונות בכל עידכונים קריטים שיש.


Microsoft (R) Windows Debugger Version 6.10.0003.233 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\Mini011209-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: C:\WINDOWS\Symbols
Executable search path is:
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 3.3264) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Mon Jan 12 19:15:13.750 2009 (GMT+2)
System Uptime: 0 days 0:02:07.484
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Loading Kernel Symbols
...............................................................
.........................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000000A, {24, 2, 0, 80515da9}

Probably caused by : ntoskrnl.exe ( nt!FsRtlAcquireFileForModWriteEx+26b )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000024, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 80515da9, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: 00000024

CURRENT_IRQL: 2

FAULTING_IP:
nt!FsRtlAcquireFileForModWriteEx+26b
80515da9 395e24 cmp dword ptr [esi+24h],ebx

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: IEXPLORE.EXE

LAST_CONTROL_TRANSFER: from 00000000 to 80515da9

STACK_TEXT:
b706dd88 00000000 00000000 00000000 00000023 nt!FsRtlAcquireFileForModWriteEx+0x26b


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!FsRtlAcquireFileForModWriteEx+26b
80515da9 395e24 cmp dword ptr [esi+24h],ebx

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!FsRtlAcquireFileForModWriteEx+26b

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntoskrnl.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 474ffa09

FAILURE_BUCKET_ID: 0xA_nt!FsRtlAcquireFileForModWriteEx+26b

BUCKET_ID: 0xA_nt!FsRtlAcquireFileForModWriteEx+26b

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 6.10.0003.233 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\Mini011209-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: C:\WINDOWS\Symbols
Executable search path is:
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 3.3264) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Mon Jan 12 19:18:07.875 2009 (GMT+2)
System Uptime: 0 days 0:02:28.597
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Loading Kernel Symbols
...............................................................
.........................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000000A, {1c, 2, 1, 80525789}

Probably caused by : ntoskrnl.exe ( nt!PoCallDriver+139 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000001c, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 80525789, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: 0000001c

CURRENT_IRQL: 2

FAULTING_IP:
nt!PoCallDriver+139
80525789 ff4b1c dec dword ptr [ebx+1Ch]

CUSTOMER_CRASH_COUNT: 2

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: rundll32.exe

LAST_CONTROL_TRANSFER: from 80523d1c to 80525789

STACK_TEXT:
b6a2bb40 80523d1c 00000000 00000000 898e6c28 nt!PoCallDriver+0x139
b6a2bb7c 80523fa0 00000000 01233000 00000000 nt!MiFreeNonPagedPool+0xb5
b6a2bc44 8051a1c5 e2a453a0 012b1fff 00000000 nt!MmAccessFault+0x156
b6a2bc48 e2a453a0 012b1fff 00000000 89880df8 nt!CcGetVacbMiss+0x3f2
WARNING: Frame IP not in any known module. Following frames may be wrong.
b6a2bcf4 805b2d71 898e6c28 89880df8 b6a2bd64 0xe2a453a0
b6a2bd38 805b2e60 87cb9588 881bc6e8 00000000 nt!CcPfBootWorker+0x74
b6a2bd54 8054161c ffffffff 898e6c28 00e5bca4 nt!CcPfBootWorker+0x16d
b6a2bd64 7c90e4f4 badb0d00 00e5bc94 00000000 nt!RtlIpv4StringToAddressExW+0x9d
b6a2bd78 00000000 00000000 00000000 00000000 0x7c90e4f4


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!PoCallDriver+139
80525789 ff4b1c dec dword ptr [ebx+1Ch]

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!PoCallDriver+139

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntoskrnl.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 474ffa09

FAILURE_BUCKET_ID: 0xA_nt!PoCallDriver+139

BUCKET_ID: 0xA_nt!PoCallDriver+139

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 6.10.0003.233 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\Mini011309-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: C:\WINDOWS\Symbols
Executable search path is:
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 3.5657) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Tue Jan 13 09:32:15.546 2009 (GMT+2)
System Uptime: 0 days 0:04:24.265
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Loading Kernel Symbols
...............................................................
.........................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 4E, {99, 2d810, 1, 0}

Probably caused by : ntoskrnl.exe ( nt!_woutput+414 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 00000099, A PTE or PFN is corrupt
Arg2: 0002d810, page frame number
Arg3: 00000001, current page state
Arg4: 00000000, 0

Debugging Details:
------------------


BUGCHECK_STR: 0x4E_99

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

PROCESS_NAME: .exe

LAST_CONTROL_TRANSFER: from 00000000 to 804f9f43

STACK_TEXT:
b6addbc0 00000000 0000004e 00000099 0002d810 nt!_woutput+0x414


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!_woutput+414
804f9f43 5d pop ebp

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!_woutput+414

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntoskrnl.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 48a3fbd9

FAILURE_BUCKET_ID: 0x4E_99_nt!_woutput+414

BUCKET_ID: 0x4E_99_nt!_woutput+414

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 6.10.0003.233 X86
Copyright (c) Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\Mini011309-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: C:\WINDOWS\Symbols
Executable search path is:
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 3.5657) MP (2 procs) Free compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Tue Jan 13 09:34:21.625 2009 (GMT+2)
System Uptime: 0 days 0:01:40.359
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Loading Kernel Symbols
...............................................................
.........................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000000A, {1c, 2, 1, 805257a1}

*** WARNING: Unable to verify timestamp for win32k.sys
Probably caused by : win32k.sys ( win32k!vCleanupBrushes+13 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000001c, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 805257a1, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: 0000001c

CURRENT_IRQL: 2

FAULTING_IP:
nt!PoCallDriver+14e
805257a1 ff4b1c dec dword ptr [ebx+1Ch]

CUSTOMER_CRASH_COUNT: 2

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: dwwin.exe

LAST_CONTROL_TRANSFER: from 80523d34 to 805257a1

STACK_TEXT:
b6d4b894 80523d34 00000000 00000000 889f1bc8 nt!PoCallDriver+0x14e
b6d4b8d0 80523fb8 00000000 00831000 00000000 nt!MiFreeNonPagedPool+0xe3
b6d4b998 8051a1dc e1db5248 008effff 00000000 nt!MmAccessFault+0x18a
b6d4b99c e1db5248 008effff 00000000 87f2c6e8 nt!CcGetVacbMiss+0x409
WARNING: Frame IP not in any known module. Following frames may be wrong.
b6d4ba48 805b2d79 889f1bc8 87f2c6e8 89893ce8 0xe1db5248
b6d4ba8c 805b2e0a 87f266e8 87f2d6e8 00000000 nt!CcPfBootWorker+0x7c
b6d4baa0 bf8c0a9b 889f1bc8 005f0000 89893ce8 nt!CcPfBootWorker+0x10d
b6d4bad4 bf8c0b84 889f1bc8 00000000 89893cd0 win32k!vCleanupBrushes+0x13
b6d4baf0 8060cd9c b6d4bb34 89893cd0 00000000 win32k!OkayToCloseDesktop+0x15
b6d4bb1c 8060ce5e bf8c0b42 b6d4bb34 00000000 nt!CmpDoOpen+0x1a0
b6d4bb48 805bca16 889f1bc8 89893ce8 000f01ff nt!CmpAddInfoAfterParseFailure+0x330
b6d4bb7c 805bc33f 889f1bc8 00000001 89db6730 nt!PopCreateHiberFile+0x9b
b6d4bba4 805bc3dd e1c46c60 89893ce8 000007d0 nt!NtCreatePagingFile+0x6d4
b6d4bbec 805bc4ee 000007d0 00000001 00000001 nt!MiZeroPageFileFirstPage+0x59
b6d4bc00 bf8c0e42 000007d0 00000001 00000000 nt!IopCompleteDumpInitialization+0xbc
b6d4bc20 bf8bc7e3 e10e4e68 e10e4e68 8983e8e8 win32k!DestroyProcessInfo+0xc9
b6d4bc48 bf8bc88b e10e4e68 00000000 8983e8e8 win32k!xxxUserProcessCallout+0x53
b6d4bc64 805d249b 889f1bc8 00000000 8983e8e8 win32k!xxxUserProcessCallout+0xa9
b6d4bd08 805d28d4 00000000 8983e8e8 00000000 nt!IopCombineCmResourceList+0x2f
b6d4bd28 805d2aaf 8983e8e8 00000000 b6d4bd64 nt!NtPowerInformation+0x413
b6d4bd54 8054162c 00000000 00000000 0013ff5c nt!WmipStartLogger+0x16
b6d4bd64 7c90e4f4 badb0d00 0013fe68 00000000 nt!RtlIpv4StringToAddressExW+0xad
b6d4bd78 00000000 00000000 00000000 00000000 0x7c90e4f4


STACK_COMMAND: kb

FOLLOWUP_IP:
win32k!vCleanupBrushes+13
bf8c0a9b ?? ???

SYMBOL_STACK_INDEX: 7

SYMBOL_NAME: win32k!vCleanupBrushes+13

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: win32k

IMAGE_NAME: win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 48ce513a

FAILURE_BUCKET_ID: 0xA_win32k!vCleanupBrushes+13

BUCKET_ID: 0xA_win32k!vCleanupBrushes+13

Followup: MachineOwner
---------

הקבצים אשר לא עברו חתימה :

sfcfiles.dll

uxtheme.dll

קישור לתוכן
שתף באתרים אחרים

תסיר את הקבצים הלא חתומים. כמה סטיקים של זיכרון יש לך?

במידה ויש לך 2, תסיר אחד מהם (ולחליפין) ותבדוק אם הבעייה נפתרה.

באיזה memtest השתמשת?

Memtest86+ V2.11 ויש לי 4 סטיקים .

הסרתי אך לצערי זה לא עזר .

פירוט קובץ dump חדש :


Microsoft (R) Windows Debugger Version 6.10.0003.233 X86
Copyright (c) Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\Mini011409-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: C:\WINDOWS\Symbols
Executable search path is:
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Wed Jan 14 10:57:21.828 2009 (GMT+2)
System Uptime: 0 days 0:05:02.559
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Loading Kernel Symbols
...............................................................
.....................................
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7A, {2, c0000005, 8987dda0, 0}

Probably caused by : ntoskrnl.exe ( nt!_woutput+414 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in. Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: 00000002, lock type that was held (value 1,2,3, or PTE address)
Arg2: c0000005, error status (normally i/o status code)
Arg3: 8987dda0, current process (virtual address for lock type 3, or PTE)
Arg4: 00000000, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)

Debugging Details:
------------------


ERROR_CODE: (NTSTATUS) 0xc0000005 - ההוראה ב- " 0x%08lx" ביצעה הפניה לזיכרון ב- " 0x%08lx" . לזיכרון לא היתה אפשרות להיות "%s" .

BUGCHECK_STR: 0x7a_c0000005

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

PROCESS_NAME: explorer.exe

LAST_CONTROL_TRANSFER: from 00090000 to 804f9f43

STACK_TEXT:
b5e79fc8 00090000 7c960202 00000003 00090718 nt!_woutput+0x414
WARNING: Frame IP not in any known module. Following frames may be wrong.
b5e79fd8 00090000 000c0948 0007fc50 0007fcbc 0x90000
b5e79fdc 000c0948 0007fc50 0007fcbc 0007fe94 0x90000
b5e79fe0 0007fc50 0007fcbc 0007fe94 006f006c 0xc0948
b5e79fe4 0007fcbc 0007fe94 006f006c 00490077 0x7fc50
b5e79fe8 0007fe94 006f006c 00490077 00000000 0x7fcbc
b5e79fec 006f006c 00490077 00000000 00000000 0x7fe94
b5e79ff0 00490077 00000000 00000000 00000000 0x6f006c
b5e79ff4 00000000 00000000 00000000 00000000 0x490077


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!_woutput+414
804f9f43 5d pop ebp

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!_woutput+414

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntoskrnl.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 48a3fbd9

FAILURE_BUCKET_ID: 0x7a_c0000005_nt!_woutput+414

BUCKET_ID: 0x7a_c0000005_nt!_woutput+414

Followup: MachineOwner
---------

קישור לתוכן
שתף באתרים אחרים

תשמע

עכשיו זה בגלל קונן קשיח שלך. צריך להריץ תיקון שגיות מלא עליו.

אני חושב הגיע זמן לעשות התקנה REPAIR למערכת שלך.

התקנתי אתמול חדשה ובכל זאת ישנם מסכים כחולים . איך אני מריץ תיקון תשגיאות ?

קישור לתוכן
שתף באתרים אחרים

עם פקודה

chkdsk /r

ב RECOVERY CONSOLE

הרצתי ובסופו של דבר היה כתוב שכל השגיאות תוקנו , בכל מקרה זה לא עזר .

פירוט 2 קבצי דאמפ' האחרונים :


Microsoft (R) Windows Debugger Version 6.10.0003.233 X86
Copyright (c) Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\Mini011709-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: C:\WINDOWS\Symbols
Executable search path is:
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Sat Jan 17 10:37:02.203 2009 (GMT+2)
System Uptime: 0 days 0:04:08.943
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Loading Kernel Symbols
...............................................................
......................................
Loading User Symbols
Loading unloaded module list
..............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000000A, {1c, 2, 1, 805257a1}

Probably caused by : ntoskrnl.exe ( nt!PoCallDriver+14e )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000001c, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 805257a1, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: 0000001c

CURRENT_IRQL: 2

FAULTING_IP:
nt!PoCallDriver+14e
805257a1 ff4b1c dec dword ptr [ebx+1Ch]

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: update.exe

LAST_CONTROL_TRANSFER: from 80523d34 to 805257a1

STACK_TEXT:
b4a3eb8c 80523d34 00000000 00000000 87c60da0 nt!PoCallDriver+0x14e
b4a3ebc8 80523fb8 00000000 00e33000 00000000 nt!MiFreeNonPagedPool+0xe3
b4a3ec90 8051a628 00000018 00e3ffff 00000000 nt!MmAccessFault+0x18a
b4a3ecac 805b33ac 00e30000 00e3ffff b4a3ed64 nt!FsRtlAddLargeMcbEntry+0x390
b4a3eccc 8150f308 00000000 c0600038 c0007180 nt!RtlStringFromGUID+0x87
WARNING: Frame IP not in any known module. Following frames may be wrong.
b4a3ed4c 8054162c ffffffff 00dfcf3c 00dfcf40 0x8150f308
b4a3ed64 7c95e4f4 badb0d00 00dfcf18 00000000 nt!RtlIpv4StringToAddressExW+0xad
b4a3ed78 00000000 00000000 00000000 00000000 0x7c95e4f4


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!PoCallDriver+14e
805257a1 ff4b1c dec dword ptr [ebx+1Ch]

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!PoCallDriver+14e

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntoskrnl.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 48a3fbd9

FAILURE_BUCKET_ID: 0xA_nt!PoCallDriver+14e

BUCKET_ID: 0xA_nt!PoCallDriver+14e

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.10.0003.233 X86
Copyright (c) Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\Mini011709-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: C:\WINDOWS\Symbols
Executable search path is:
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Sat Jan 17 10:38:05.625 2009 (GMT+2)
System Uptime: 0 days 0:00:36.359
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Loading Kernel Symbols
...............................................................
......................................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000000A, {1c, 2, 1, 805257a1}

Probably caused by : ntoskrnl.exe ( nt!PoCallDriver+14e )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000001c, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 805257a1, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: 0000001c

CURRENT_IRQL: 2

FAULTING_IP:
nt!PoCallDriver+14e
805257a1 ff4b1c dec dword ptr [ebx+1Ch]

CUSTOMER_CRASH_COUNT: 2

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: dwwin.exe

LAST_CONTROL_TRANSFER: from 80523d34 to 805257a1

STACK_TEXT:
b59c3b40 80523d34 00000000 00000000 87b123f0 nt!PoCallDriver+0x14e
b59c3b7c 80523fb8 00000000 00e31000 00000000 nt!MiFreeNonPagedPool+0xe3
b59c3c44 8051a1dc e16da9a0 00e6dfff 00000000 nt!MmAccessFault+0x18a
b59c3c48 e16da9a0 00e6dfff 00000000 884dc718 nt!CcGetVacbMiss+0x409
WARNING: Frame IP not in any known module. Following frames may be wrong.
b59c3cf4 805b2d79 87b123f0 884dc718 b59c3d64 0xe16da9a0
b59c3d38 805b2e68 884db718 884f36e8 00000000 nt!CcPfBootWorker+0x7c
b59c3d54 8054162c ffffffff 87b123f0 00d8d654 nt!CcPfBootWorker+0x175
b59c3d64 7c95e4f4 badb0d00 00d8d3a4 02104583 nt!RtlIpv4StringToAddressExW+0xad
b59c3d78 00000000 00000000 00000000 00000000 0x7c95e4f4


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!PoCallDriver+14e
805257a1 ff4b1c dec dword ptr [ebx+1Ch]

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!PoCallDriver+14e

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntoskrnl.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 48a3fbd9

FAILURE_BUCKET_ID: 0xA_nt!PoCallDriver+14e

BUCKET_ID: 0xA_nt!PoCallDriver+14e

Followup: MachineOwner
---------

קישור לתוכן
שתף באתרים אחרים

ארכיון

דיון זה הועבר לארכיון ולא ניתן להוסיף בו תגובות חדשות.

×
  • צור חדש...