Himmelsrand
Newbie
- Registriert
- Nov. 2011
- Beiträge
- 7
Hallo,
ich habe mir einige Themen zu Minidump gelesen und bin soweit, dass ich es öffnen kann. Nur weiß ich einfach nicht weiter. Kann einer mir vllt. helfen?
Hier der Auszug:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\111411-27175-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02c17000 PsLoadedModuleList = 0xfffff800`02e5c670
Debug session time: Mon Nov 14 09:49:25.926 2011 (UTC + 1:00)
System Uptime: 0 days 0:16:52.441
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1904fb, fffff88008f37c78, fffff88008f374d0, fffff880012fa527}
Probably caused by : Ntfs.sys ( Ntfs!NtfsFindPrefixHashEntry+1fe )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88008f37c78
Arg3: fffff88008f374d0
Arg4: fffff880012fa527
Debugging Details:
------------------
EXCEPTION_RECORD: fffff88008f37c78 -- (.exr 0xfffff88008f37c78)
ExceptionAddress: fffff880012fa527 (Ntfs!NtfsFindPrefixHashEntry+0x00000000000001fe)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff88008f374d0 -- (.cxr 0xfffff88008f374d0)
rax=fffff8a0048d3000 rbx=3f3b90fa3f800000 rcx=0000000000000044
rdx=0000000000000002 rsi=fffff8a000284bc0 rdi=fffffa8004acc350
rip=fffff880012fa527 rsp=fffff88008f37eb0 rbp=0000000000000002
r8=000000002ede1422 r9=0000000000000000 r10=0000000000000005
r11=fffff88008f37ef8 r12=fffff88008f381b0 r13=fffff88008f38460
r14=0000000000000022 r15=0000000000001422
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
Ntfs!NtfsFindPrefixHashEntry+0x1fe:
fffff880`012fa527 44394310 cmp dword ptr [rbx+10h],r8d ds:002b:3f3b90fa`3f800010=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: rundll32.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec6100
ffffffffffffffff
FOLLOWUP_IP:
Ntfs!NtfsFindPrefixHashEntry+1fe
fffff880`012fa527 44394310 cmp dword ptr [rbx+10h],r8d
FAULTING_IP:
Ntfs!NtfsFindPrefixHashEntry+1fe
fffff880`012fa527 44394310 cmp dword ptr [rbx+10h],r8d
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from fffff880012f8fd2 to fffff880012fa527
STACK_TEXT:
fffff880`08f37eb0 fffff880`012f8fd2 : fffffa80`0441f010 fffffa80`04acc350 fffff8a0`00284bc0 00000000`00000001 : Ntfs!NtfsFindPrefixHashEntry+0x1fe
fffff880`08f37fe0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsFindStartingNode+0x452
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: Ntfs!NtfsFindPrefixHashEntry+1fe
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d79997b
STACK_COMMAND: .cxr 0xfffff88008f374d0 ; kb
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsFindPrefixHashEntry+1fe
BUCKET_ID: X64_0x24_Ntfs!NtfsFindPrefixHashEntry+1fe
Followup: MachineOwner
---------
ich habe mir einige Themen zu Minidump gelesen und bin soweit, dass ich es öffnen kann. Nur weiß ich einfach nicht weiter. Kann einer mir vllt. helfen?
Hier der Auszug:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\111411-27175-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02c17000 PsLoadedModuleList = 0xfffff800`02e5c670
Debug session time: Mon Nov 14 09:49:25.926 2011 (UTC + 1:00)
System Uptime: 0 days 0:16:52.441
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1904fb, fffff88008f37c78, fffff88008f374d0, fffff880012fa527}
Probably caused by : Ntfs.sys ( Ntfs!NtfsFindPrefixHashEntry+1fe )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88008f37c78
Arg3: fffff88008f374d0
Arg4: fffff880012fa527
Debugging Details:
------------------
EXCEPTION_RECORD: fffff88008f37c78 -- (.exr 0xfffff88008f37c78)
ExceptionAddress: fffff880012fa527 (Ntfs!NtfsFindPrefixHashEntry+0x00000000000001fe)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff88008f374d0 -- (.cxr 0xfffff88008f374d0)
rax=fffff8a0048d3000 rbx=3f3b90fa3f800000 rcx=0000000000000044
rdx=0000000000000002 rsi=fffff8a000284bc0 rdi=fffffa8004acc350
rip=fffff880012fa527 rsp=fffff88008f37eb0 rbp=0000000000000002
r8=000000002ede1422 r9=0000000000000000 r10=0000000000000005
r11=fffff88008f37ef8 r12=fffff88008f381b0 r13=fffff88008f38460
r14=0000000000000022 r15=0000000000001422
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
Ntfs!NtfsFindPrefixHashEntry+0x1fe:
fffff880`012fa527 44394310 cmp dword ptr [rbx+10h],r8d ds:002b:3f3b90fa`3f800010=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: rundll32.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec6100
ffffffffffffffff
FOLLOWUP_IP:
Ntfs!NtfsFindPrefixHashEntry+1fe
fffff880`012fa527 44394310 cmp dword ptr [rbx+10h],r8d
FAULTING_IP:
Ntfs!NtfsFindPrefixHashEntry+1fe
fffff880`012fa527 44394310 cmp dword ptr [rbx+10h],r8d
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from fffff880012f8fd2 to fffff880012fa527
STACK_TEXT:
fffff880`08f37eb0 fffff880`012f8fd2 : fffffa80`0441f010 fffffa80`04acc350 fffff8a0`00284bc0 00000000`00000001 : Ntfs!NtfsFindPrefixHashEntry+0x1fe
fffff880`08f37fe0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsFindStartingNode+0x452
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: Ntfs!NtfsFindPrefixHashEntry+1fe
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d79997b
STACK_COMMAND: .cxr 0xfffff88008f374d0 ; kb
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsFindPrefixHashEntry+1fe
BUCKET_ID: X64_0x24_Ntfs!NtfsFindPrefixHashEntry+1fe
Followup: MachineOwner
---------