GizmoBoy
Lieutenant
- Registriert
- Okt. 2006
- Beiträge
- 927
Moin,
habe den Dump vom Kumpel und bin mir nicht mehr ganz sicher was der Fehler ist... Habe schon lange keine Dumps mehr durchforstet.
Danke für jede Hilfe.
habe den Dump vom Kumpel und bin mir nicht mehr ganz sicher was der Fehler ist... Habe schon lange keine Dumps mehr durchforstet.
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\tj\Desktop\110210-18938-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\Windows\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a13000 PsLoadedModuleList = 0xfffff800`02c50e50
Debug session time: Tue Nov 2 08:07:10.414 2010 (GMT+1)
System Uptime: 0 days 22:42:15.381
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
..................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {9, 2, 0, fffff88002d38680}
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : memory_corruption
Followup: memory_corruption
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000009, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88002d38680, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cbb0e0
0000000000000009
CURRENT_IRQL: 2
FAULTING_IP:
afd!AfdDerefPollInfoFileObjects+30
fffff880`02d38680 ff14d2 call qword ptr [rdx+rdx*8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88002fd9420 -- (.trap 0xfffff88002fd9420)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000bfffff01 rbx=0000000000000000 rcx=fffffa8007845ba0
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88002d38680 rsp=fffff88002fd95b0 rbp=ffffffffffffffff
r8=fffff80002a13000 r9=0000000000000000 r10=fffffa800646afa0
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
afd!AfdDerefPollInfoFileObjects+0x30:
fffff880`02d38680 ff14d2 call qword ptr [rdx+rdx*8] ds:8100:00000000`00000009=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a82ca9 to fffff80002a83740
STACK_TEXT:
fffff880`02fd92d8 fffff800`02a82ca9 : 00000000`0000000a 00000000`00000009 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02fd92e0 fffff800`02a81920 : 00000000`00000000 fffffa80`0738c2a0 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02fd9420 fffff880`02d38680 : 00000000`00000002 00000000`00000000 fffffa80`0738c2a0 fffffa80`0450dcc0 : nt!KiPageFault+0x260
fffff880`02fd95b0 fffff880`02d3860a : 00000000`00000000 fffffa80`0738c2a0 fffffa80`03e0d220 fffff880`02d386e5 : afd!AfdDerefPollInfoFileObjects+0x30
fffff880`02fd95e0 fffff880`02d2d448 : 00000000`00000000 00000000`00000000 fffffa80`0450dcc0 00000000`00000001 : afd!AfdCompletePollIrp+0x9a
fffff880`02fd9630 fffff880`02cf188c : fffffa80`0738c3d0 00000000`00000000 00000000`00001000 fffffa80`0431bde0 : afd!AfdIndicatePollEvent+0x138
fffff880`02fd9680 fffff880`02d380f9 : 00000000`00000000 00000000`00000001 fffffa80`04c44080 00000000`00000000 : afd!AfdReceiveDatagramEventCommonHandler+0x35c
fffff880`02fd9720 fffff880`0183f395 : fffffa80`04ecdb70 fffffa80`04c01830 00000000`00000000 fffffa80`04ecdb70 : afd!AfdTLDgramReceiveEventHandler+0xe9
fffff880`02fd97b0 fffff880`0183f76d : fffffa80`00000028 fffffa80`04ecdb70 fffffa80`00000000 fffffa80`0501af68 : tcpip!UdpDeliverDatagrams+0x155
fffff880`02fd9940 fffff880`0185d727 : fffffa80`04c039c0 fffffa80`0640c000 00000000`00000017 fffff880`049c1080 : tcpip!UdpReceiveDatagrams+0x1ed
fffff880`02fd9a30 fffff880`0185d799 : fffff880`02fd9bb0 fffff880`01966800 fffff880`02fd9bc0 00000000`00000000 : tcpip!IppDeliverListToProtocol+0xf7
fffff880`02fd9af0 fffff880`0185dc90 : 00000000`00000000 fffff800`02a8a992 00000000`0000001d fffff880`02fd9bb0 : tcpip!IppProcessDeliverList+0x59
fffff880`02fd9b60 fffff880`018347c2 : fffffa80`03d01b60 fffff880`049b8ab1 00000000`00000000 fffffa80`04bcc800 : tcpip!IppReceiveHeaderBatch+0x231
fffff880`02fd9c40 fffff800`02d7fc43 : fffffa80`04bcc800 fffff800`02c285f8 fffffa80`03d01b60 fffffa80`04c00cd0 : tcpip!IppLoopbackTransmit+0x72
fffff880`02fd9c80 fffff800`02a90961 : fffff800`02c28500 fffff800`02d7fc20 fffffa80`03d01b60 00000000`00000000 : nt!IopProcessWorkItem+0x23
fffff880`02fd9cb0 fffff800`02d27c06 : 30303031`30302e30 fffffa80`03d01b60 00000000`00000080 fffffa80`03cedb30 : nt!ExpWorkerThread+0x111
fffff880`02fd9d40 fffff800`02a61c26 : fffff880`009e7180 fffffa80`03d01b60 fffff880`009f1f40 4230312e`2a7b2020 : nt!PspSystemThreadStartup+0x5a
fffff880`02fd9d80 00000000`00000000 : fffff880`02fda000 fffff880`02fd4000 fffff880`02fd99f0 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -db !afd
2 errors : !afd (fffff88002d38481-fffff88002d38681)
fffff88002d38480 44 *2e 28 41 8b 44 24 08 89 44 24 20 41 b9 01 00 D.(A.D$..D$ A...
...
fffff88002d38680 ff *14 d2 8e fc ff 48 c7 07 00 00 00 00 ff c6 48 ......H........H
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
Followup: memory_corruption
---------
0: kd> .trap 0xfffff88002fd9420
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000bfffff01 rbx=0000000000000000 rcx=fffffa8007845ba0
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88002d38680 rsp=fffff88002fd95b0 rbp=ffffffffffffffff
r8=fffff80002a13000 r9=0000000000000000 r10=fffffa800646afa0
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
afd!AfdDerefPollInfoFileObjects+0x30:
fffff880`02d38680 ff14d2 call qword ptr [rdx+rdx*8] ds:8100:00000000`00000009=????????????????
Danke für jede Hilfe.