flode
Lt. Commander
- Registriert
- Dez. 2008
- Beiträge
- 1.316
Hallo,
da ich "noch" kein Experte bin im Debuggen wollte ich gerne Wissen ob hier das Problem am Ram liegt oder doch an der M4 SSD? Bind für jede Hilfe sehr Dankbar!
Grüße flode
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Flori\Desktop\091912-12760-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbolsdebug*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
Machine Name:
Kernel base = 0xfffff800`02e1c000 PsLoadedModuleList = 0xfffff800`03060670
Debug session time: Wed Sep 19 20:23:03.752 2012 (UTC + 2:00)
System Uptime: 0 days 1:03:57.876
Loading Kernel Symbols
...............................................................
................................................................
...............................................................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff80002fc7a9b, fffff88003353768, fffff88003352fc0}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+1df )
Followup: Pool_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002fc7a9b, The address that the exception occurred at
Arg3: fffff88003353768, Exception Record Address
Arg4: fffff88003352fc0, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
FAULTING_IP:
nt!ExDeferredFreePool+1df
fffff800`02fc7a9b 4c395808 cmp qword ptr [rax+8],r11
EXCEPTION_RECORD: fffff88003353768 -- (.exr 0xfffff88003353768)
ExceptionAddress: fffff80002fc7a9b (nt!ExDeferredFreePool+0x00000000000001df)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff88003352fc0 -- (.cxr 0xfffff88003352fc0)
rax=000100000000b513 rbx=0000000000000004 rcx=fffffa800cd0f6e0
rdx=fffff8a02b5cb720 rsi=0000000000000000 rdi=fffff8a0185202f0
rip=fffff80002fc7a9b rsp=fffff880033539a0 rbp=0000000000000000
r8=fffff8a02b8ed4d0 r9=fffff8a02b5cb670 r10=0000000000000001
r11=fffff8a02b5cb680 r12=fffffa800cd0f500 r13=0000000000000000
r14=000000000000001a r15=0000000000000001
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!ExDeferredFreePool+0x1df:
fffff800`02fc7a9b 4c395808 cmp qword ptr [rax+8],r11 ds:002b:00010000`0000b51b=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030ca100
ffffffffffffffff
FOLLOWUP_IP:
nt!ExDeferredFreePool+1df
fffff800`02fc7a9b 4c395808 cmp qword ptr [rax+8],r11
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff80002fc71a1 to fffff80002fc7a9b
STACK_TEXT:
fffff880`033539a0 fffff800`02fc71a1 : fffffa80`1a05d538 fffff8a0`2b5900e0 00000000`00000000 fffff800`02ea0315 : nt!ExDeferredFreePool+0x1df
fffff880`03353a30 fffff800`02e82941 : fffff8a0`18497cb0 fffff8a0`18497cf0 fffff800`6d695346 fffff8a0`2b984cf0 : nt!ExFreePoolWithTag+0x411
fffff880`03353ae0 fffff880`01446176 : fffff880`01446080 00000000`00000001 fffff880`01446080 fffffa80`0ce88040 : nt!FsRtlUninitializeBaseMcb+0x41
fffff880`03353b10 fffff800`02ea4841 : fffffa80`0ce88040 fffff880`03353b40 00000000`00000000 00000000`00000004 : Ntfs!NtfsMcbCleanupLruQueue+0xf6
fffff880`03353cb0 fffff800`03131e6a : 00000000`00000000 fffffa80`0ce88040 00000000`00000080 fffffa80`0cd81040 : nt!ExpWorkerThread+0x111
fffff880`03353d40 fffff800`02e8bec6 : fffff880`03288180 fffffa80`0ce88040 fffff880`03293040 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03353d80 00000000`00000000 : fffff880`03354000 fffff880`0334e000 fffff880`033539e0 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExDeferredFreePool+1df
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xfffff88003352fc0 ; kb
FAILURE_BUCKET_ID: X64_0x7E_nt!ExDeferredFreePool+1df
BUCKET_ID: X64_0x7E_nt!ExDeferredFreePool+1df
Followup: Pool_corruption
---------
hier noch der Bluescreenview Auszug:
==================================================
Dump File : 091912-12760-01.dmp
Crash Time : 19.09.2012 20:24:10
Bug Check String : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code : 0x1000007e
Parameter 1 : ffffffff`c0000005
Parameter 2 : fffff800`02fc7a9b
Parameter 3 : fffff880`03353768
Parameter 4 : fffff880`03352fc0
Caused By Driver : ntoskrnl.exe
Caused By Address : ntoskrnl.exe+1aba9b
File Description : NT Kernel & System
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.1.7601.17835 (win7sp1_gdr.120503-2030)
Processor : x64
Crash Address : ntoskrnl.exe+1aba9b
Stack Address 1 :
Stack Address 2 :
Stack Address 3 :
Computer Name :
Full Path : C:\Windows\Minidump\091912-12760-01.dmp
Processors Count : 6
Major Version : 15
Minor Version : 7601
Dump File Size : 280.096
==================================================
da ich "noch" kein Experte bin im Debuggen wollte ich gerne Wissen ob hier das Problem am Ram liegt oder doch an der M4 SSD? Bind für jede Hilfe sehr Dankbar!
Grüße flode
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Flori\Desktop\091912-12760-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbolsdebug*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
Machine Name:
Kernel base = 0xfffff800`02e1c000 PsLoadedModuleList = 0xfffff800`03060670
Debug session time: Wed Sep 19 20:23:03.752 2012 (UTC + 2:00)
System Uptime: 0 days 1:03:57.876
Loading Kernel Symbols
...............................................................
................................................................
...............................................................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff80002fc7a9b, fffff88003353768, fffff88003352fc0}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+1df )
Followup: Pool_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002fc7a9b, The address that the exception occurred at
Arg3: fffff88003353768, Exception Record Address
Arg4: fffff88003352fc0, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
FAULTING_IP:
nt!ExDeferredFreePool+1df
fffff800`02fc7a9b 4c395808 cmp qword ptr [rax+8],r11
EXCEPTION_RECORD: fffff88003353768 -- (.exr 0xfffff88003353768)
ExceptionAddress: fffff80002fc7a9b (nt!ExDeferredFreePool+0x00000000000001df)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff88003352fc0 -- (.cxr 0xfffff88003352fc0)
rax=000100000000b513 rbx=0000000000000004 rcx=fffffa800cd0f6e0
rdx=fffff8a02b5cb720 rsi=0000000000000000 rdi=fffff8a0185202f0
rip=fffff80002fc7a9b rsp=fffff880033539a0 rbp=0000000000000000
r8=fffff8a02b8ed4d0 r9=fffff8a02b5cb670 r10=0000000000000001
r11=fffff8a02b5cb680 r12=fffffa800cd0f500 r13=0000000000000000
r14=000000000000001a r15=0000000000000001
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!ExDeferredFreePool+0x1df:
fffff800`02fc7a9b 4c395808 cmp qword ptr [rax+8],r11 ds:002b:00010000`0000b51b=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030ca100
ffffffffffffffff
FOLLOWUP_IP:
nt!ExDeferredFreePool+1df
fffff800`02fc7a9b 4c395808 cmp qword ptr [rax+8],r11
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff80002fc71a1 to fffff80002fc7a9b
STACK_TEXT:
fffff880`033539a0 fffff800`02fc71a1 : fffffa80`1a05d538 fffff8a0`2b5900e0 00000000`00000000 fffff800`02ea0315 : nt!ExDeferredFreePool+0x1df
fffff880`03353a30 fffff800`02e82941 : fffff8a0`18497cb0 fffff8a0`18497cf0 fffff800`6d695346 fffff8a0`2b984cf0 : nt!ExFreePoolWithTag+0x411
fffff880`03353ae0 fffff880`01446176 : fffff880`01446080 00000000`00000001 fffff880`01446080 fffffa80`0ce88040 : nt!FsRtlUninitializeBaseMcb+0x41
fffff880`03353b10 fffff800`02ea4841 : fffffa80`0ce88040 fffff880`03353b40 00000000`00000000 00000000`00000004 : Ntfs!NtfsMcbCleanupLruQueue+0xf6
fffff880`03353cb0 fffff800`03131e6a : 00000000`00000000 fffffa80`0ce88040 00000000`00000080 fffffa80`0cd81040 : nt!ExpWorkerThread+0x111
fffff880`03353d40 fffff800`02e8bec6 : fffff880`03288180 fffffa80`0ce88040 fffff880`03293040 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03353d80 00000000`00000000 : fffff880`03354000 fffff880`0334e000 fffff880`033539e0 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExDeferredFreePool+1df
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xfffff88003352fc0 ; kb
FAILURE_BUCKET_ID: X64_0x7E_nt!ExDeferredFreePool+1df
BUCKET_ID: X64_0x7E_nt!ExDeferredFreePool+1df
Followup: Pool_corruption
---------
Ergänzung ()
hier noch der Bluescreenview Auszug:
==================================================
Dump File : 091912-12760-01.dmp
Crash Time : 19.09.2012 20:24:10
Bug Check String : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code : 0x1000007e
Parameter 1 : ffffffff`c0000005
Parameter 2 : fffff800`02fc7a9b
Parameter 3 : fffff880`03353768
Parameter 4 : fffff880`03352fc0
Caused By Driver : ntoskrnl.exe
Caused By Address : ntoskrnl.exe+1aba9b
File Description : NT Kernel & System
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.1.7601.17835 (win7sp1_gdr.120503-2030)
Processor : x64
Crash Address : ntoskrnl.exe+1aba9b
Stack Address 1 :
Stack Address 2 :
Stack Address 3 :
Computer Name :
Full Path : C:\Windows\Minidump\091912-12760-01.dmp
Processors Count : 6
Major Version : 15
Minor Version : 7601
Dump File Size : 280.096
==================================================