iNsTaBiL
Freizeitschrauber(in)
hallo
ich werde seit neuestem wieder von bluescreens verfolgt. habe mal die dump datei mit windebug ausgewertet.
das einzige, was ich am pc geändert habe ist das ne neue soka reinkam...
freue mich, wenn mir jemand helfen kann.
lg
hier der text, der ausgespuckt wird:
ich werde seit neuestem wieder von bluescreens verfolgt. habe mal die dump datei mit windebug ausgewertet.
das einzige, was ich am pc geändert habe ist das ne neue soka reinkam...
freue mich, wenn mir jemand helfen kann.
lg
hier der text, der ausgespuckt wird:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\071911-21715-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
Machine Name:
Kernel base = 0xfffff800`02e61000 PsLoadedModuleList = 0xfffff800`0309ee50
Debug session time: Tue Jul 19 13:09:00.258 2011 (GMT+2)
System Uptime: 0 days 0:07:03.694
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc000001d, fffff80002ed5683, 0, fffffa8003a04800}
Probably caused by : hardware ( volmgr!memcpy+2d0 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff80002ed5683, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: fffffa8003a04800, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {AUSNAHME} Ung ltige Anweisung Es wurde versucht, eine ung ltige Anweisung auszuf hren.
FAULTING_IP:
nt!PspReturnQuota+133
fffff800`02ed5683 ff ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: fffffa8003a04800
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x1E
PROCESS_NAME: System
CURRENT_IRQL: 0
EXCEPTION_RECORD: fffff8800a257f48 -- (.exr 0xfffff8800a257f48)
ExceptionAddress: fffff80002ed5683 (nt!PspReturnQuota+0x0000000000000133)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0
TRAP_FRAME: fffff8800a257ff0 -- (.trap 0xfffff8800a257ff0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8003bd2b00 rbx=0000000000000000 rcx=fffff8800a258360
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ed5683 rsp=fffff8800a258188 rbp=0000000000000000
r8=0000000000000000 r9=fffff8800a2582a8 r10=fffffa8003a04810
r11=fffff8800a258298 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!PspReturnQuota+0x133:
fffff800`02ed5683 ff ???
Resetting default scope
MISALIGNED_IP:
nt!PspReturnQuota+133
fffff800`02ed5683 ff ???
LAST_CONTROL_TRANSFER: from fffff80002f0bab9 to fffff80002ed1700
FAILED_INSTRUCTION_ADDRESS:
nt!PspReturnQuota+133
fffff800`02ed5683 ff ???
STACK_TEXT:
fffff880`0a257778 fffff800`02f0bab9 : 00000000`0000001e ffffffff`c000001d fffff800`02ed5683 00000000`00000000 : nt!KeBugCheckEx
fffff880`0a257780 fffff800`02ed0d42 : fffff880`0a257f48 fffffa80`03bd2b2b fffff880`0a257ff0 fffffa80`04a29210 : nt!KiDispatchException+0x1b9
fffff880`0a257e10 fffff800`02ecee9f : fffff880`0a257ff0 00000000`00000000 00000000`00000000 fffffa80`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`0a257ff0 fffff800`02ed5683 : fffff880`01555382 fffffa80`00100080 fffffa80`04a29210 00000014`00000000 : nt!KiInvalidOpcodeFault+0x11f
fffff880`0a258188 fffffa80`03c84670 : fffff800`031c892a 00000000`00000000 00000000`00000000 00000000`00000001 : nt!PspReturnQuota+0x133
fffff880`0a2581e8 fffff800`031c892a : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000011 : 0xfffffa80`03c84670
fffff880`0a2581f0 fffff880`01106200 : fffffa80`03bd2860 00000000`00000000 fffffa80`03bd2860 fffff880`015a9285 : nt!ObpIncrementHandleCountEx+0x16a
fffff880`0a2582b0 fffffa80`03bd2860 : 00000000`00000000 fffffa80`03bd2860 fffff880`015a9285 fffffa80`03b1ac00 : volmgr!memcpy+0x2d0
fffff880`0a2582b8 00000000`00000000 : fffffa80`03bd2860 fffff880`015a9285 fffffa80`03b1ac00 00000000`00000240 : 0xfffffa80`03bd2860
STACK_COMMAND: kb
FOLLOWUP_IP:
volmgr!memcpy+2d0
fffff880`01106200 0fc351f0 movnti dword ptr [rcx-10h],edx
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: volmgr!memcpy+2d0
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED
BUCKET_ID: X64_IP_MISALIGNED
Followup: MachineOwner
---------
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\071911-21715-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
Machine Name:
Kernel base = 0xfffff800`02e61000 PsLoadedModuleList = 0xfffff800`0309ee50
Debug session time: Tue Jul 19 13:09:00.258 2011 (GMT+2)
System Uptime: 0 days 0:07:03.694
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc000001d, fffff80002ed5683, 0, fffffa8003a04800}
Probably caused by : hardware ( volmgr!memcpy+2d0 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff80002ed5683, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: fffffa8003a04800, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {AUSNAHME} Ung ltige Anweisung Es wurde versucht, eine ung ltige Anweisung auszuf hren.
FAULTING_IP:
nt!PspReturnQuota+133
fffff800`02ed5683 ff ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: fffffa8003a04800
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x1E
PROCESS_NAME: System
CURRENT_IRQL: 0
EXCEPTION_RECORD: fffff8800a257f48 -- (.exr 0xfffff8800a257f48)
ExceptionAddress: fffff80002ed5683 (nt!PspReturnQuota+0x0000000000000133)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0
TRAP_FRAME: fffff8800a257ff0 -- (.trap 0xfffff8800a257ff0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8003bd2b00 rbx=0000000000000000 rcx=fffff8800a258360
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ed5683 rsp=fffff8800a258188 rbp=0000000000000000
r8=0000000000000000 r9=fffff8800a2582a8 r10=fffffa8003a04810
r11=fffff8800a258298 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!PspReturnQuota+0x133:
fffff800`02ed5683 ff ???
Resetting default scope
MISALIGNED_IP:
nt!PspReturnQuota+133
fffff800`02ed5683 ff ???
LAST_CONTROL_TRANSFER: from fffff80002f0bab9 to fffff80002ed1700
FAILED_INSTRUCTION_ADDRESS:
nt!PspReturnQuota+133
fffff800`02ed5683 ff ???
STACK_TEXT:
fffff880`0a257778 fffff800`02f0bab9 : 00000000`0000001e ffffffff`c000001d fffff800`02ed5683 00000000`00000000 : nt!KeBugCheckEx
fffff880`0a257780 fffff800`02ed0d42 : fffff880`0a257f48 fffffa80`03bd2b2b fffff880`0a257ff0 fffffa80`04a29210 : nt!KiDispatchException+0x1b9
fffff880`0a257e10 fffff800`02ecee9f : fffff880`0a257ff0 00000000`00000000 00000000`00000000 fffffa80`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`0a257ff0 fffff800`02ed5683 : fffff880`01555382 fffffa80`00100080 fffffa80`04a29210 00000014`00000000 : nt!KiInvalidOpcodeFault+0x11f
fffff880`0a258188 fffffa80`03c84670 : fffff800`031c892a 00000000`00000000 00000000`00000000 00000000`00000001 : nt!PspReturnQuota+0x133
fffff880`0a2581e8 fffff800`031c892a : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000011 : 0xfffffa80`03c84670
fffff880`0a2581f0 fffff880`01106200 : fffffa80`03bd2860 00000000`00000000 fffffa80`03bd2860 fffff880`015a9285 : nt!ObpIncrementHandleCountEx+0x16a
fffff880`0a2582b0 fffffa80`03bd2860 : 00000000`00000000 fffffa80`03bd2860 fffff880`015a9285 fffffa80`03b1ac00 : volmgr!memcpy+0x2d0
fffff880`0a2582b8 00000000`00000000 : fffffa80`03bd2860 fffff880`015a9285 fffffa80`03b1ac00 00000000`00000240 : 0xfffffa80`03bd2860
STACK_COMMAND: kb
FOLLOWUP_IP:
volmgr!memcpy+2d0
fffff880`01106200 0fc351f0 movnti dword ptr [rcx-10h],edx
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: volmgr!memcpy+2d0
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED
BUCKET_ID: X64_IP_MISALIGNED
Followup: MachineOwner
---------
Zuletzt bearbeitet: