Hallo Leute,
Ich habe das Problem das bei einem Kunden von mir ständig ein und derselbe Bluescreen auftaucht.
System: Dell Latitude D630, Win7 Enterp. 64Bit, 4Gb Ram usw.
Hier ein auszug aus dem WinDBG Tool von Microsoft.
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\rle\Desktop\102111-21106-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02a4a000 PsLoadedModuleList = 0xfffff800`02c8f670
Debug session time: Fri Oct 21 08:01:08.307 2011 (GMT+2)
System Uptime: 0 days 0:04:19.054
Loading Kernel Symbols
...............................................................
................................................................
............................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff88009cb7d60, 0, fffff80002ac5edb, 2}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceExit+0 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff88009cb7d60, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002ac5edb, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf9100
fffff88009cb7d60
FAULTING_IP:
nt!KiSystemServiceExit+0
fffff800`02ac5edb 488b9dc0000000 mov rbx,qword ptr [rbp+0C0h]
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: SearchIndexer.
CURRENT_IRQL: 0
TRAP_FRAME: fffff88008d47a90 -- (.trap 0xfffff88008d47a90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800216f990
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ac5edb rsp=fffff88008d47c20 rbp=fffff88008d47ca0
r8=fffff78000000008 r9=0000000000000000 r10=fffff80002a4a001
r11=fffff880009e9180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiSystemServiceExit:
fffff800`02ac5edb 488b9dc0000000 mov rbx,qword ptr [rbp+0C0h] ss:0018:fffff880`08d47d60=0000000000000000
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a713f0 to fffff80002ac6c40
STACK_TEXT:
fffff880`08d47928 fffff800`02a713f0 : 00000000`00000050 fffff880`09cb7d60 00000000`00000000 fffff880`08d47a90 : nt!KeBugCheckEx
fffff880`08d47930 fffff800`02ac4d6e : 00000000`00000000 fffff880`09cb7d60 fffff880`08d47c00 fffffa80`0191fb60 : nt! ?? ::FNODOBFM::`string'+0x447c6
fffff880`08d47a90 fffff800`02ac5edb : fffffa80`0191fb60 00000000`ffffffff 00000000`00000000 fffffa80`0216f990 : nt!KiPageFault+0x16e
fffff880`08d47c20 00000000`7772135a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit
00000000`04f5f2e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7772135a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiSystemServiceExit+0
fffff800`02ac5edb 488b9dc0000000 mov rbx,qword ptr [rbp+0C0h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiSystemServiceExit+0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
FAILURE_BUCKET_ID: X64_0x50_nt!KiSystemServiceExit+0
BUCKET_ID: X64_0x50_nt!KiSystemServiceExit+0
Followup: MachineOwner
---------
Ich habe das Problem das bei einem Kunden von mir ständig ein und derselbe Bluescreen auftaucht.
System: Dell Latitude D630, Win7 Enterp. 64Bit, 4Gb Ram usw.
Hier ein auszug aus dem WinDBG Tool von Microsoft.
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\rle\Desktop\102111-21106-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02a4a000 PsLoadedModuleList = 0xfffff800`02c8f670
Debug session time: Fri Oct 21 08:01:08.307 2011 (GMT+2)
System Uptime: 0 days 0:04:19.054
Loading Kernel Symbols
...............................................................
................................................................
............................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff88009cb7d60, 0, fffff80002ac5edb, 2}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceExit+0 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff88009cb7d60, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002ac5edb, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf9100
fffff88009cb7d60
FAULTING_IP:
nt!KiSystemServiceExit+0
fffff800`02ac5edb 488b9dc0000000 mov rbx,qword ptr [rbp+0C0h]
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: SearchIndexer.
CURRENT_IRQL: 0
TRAP_FRAME: fffff88008d47a90 -- (.trap 0xfffff88008d47a90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800216f990
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ac5edb rsp=fffff88008d47c20 rbp=fffff88008d47ca0
r8=fffff78000000008 r9=0000000000000000 r10=fffff80002a4a001
r11=fffff880009e9180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiSystemServiceExit:
fffff800`02ac5edb 488b9dc0000000 mov rbx,qword ptr [rbp+0C0h] ss:0018:fffff880`08d47d60=0000000000000000
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a713f0 to fffff80002ac6c40
STACK_TEXT:
fffff880`08d47928 fffff800`02a713f0 : 00000000`00000050 fffff880`09cb7d60 00000000`00000000 fffff880`08d47a90 : nt!KeBugCheckEx
fffff880`08d47930 fffff800`02ac4d6e : 00000000`00000000 fffff880`09cb7d60 fffff880`08d47c00 fffffa80`0191fb60 : nt! ?? ::FNODOBFM::`string'+0x447c6
fffff880`08d47a90 fffff800`02ac5edb : fffffa80`0191fb60 00000000`ffffffff 00000000`00000000 fffffa80`0216f990 : nt!KiPageFault+0x16e
fffff880`08d47c20 00000000`7772135a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit
00000000`04f5f2e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7772135a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiSystemServiceExit+0
fffff800`02ac5edb 488b9dc0000000 mov rbx,qword ptr [rbp+0C0h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiSystemServiceExit+0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
FAILURE_BUCKET_ID: X64_0x50_nt!KiSystemServiceExit+0
BUCKET_ID: X64_0x50_nt!KiSystemServiceExit+0
Followup: MachineOwner
---------