Gå til innhold
Trenger du hjelp med PCen? Still spørsmål her! ×

Hjelp til å analysere dmp filer.


Anbefalte innlegg

Trenger hjelp til å analysere disse dmp filene.

 

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

 

PFN_LIST_CORRUPT (4e)

Typically caused by drivers passing bad memory descriptor lists (ie: calling

MmUnlockPages twice with the same list, etc). If a kernel debugger is

available get the stack trace.

Arguments:

Arg1: 0000008f, The free or zeroed page listhead is corrupt

Arg2: 00021808, new page

Arg3: 0002187b, old page

Arg4: 00000000, 0

 

Debugging Details:

------------------

 

 

 

 

BUGCHECK_STR: 0x4E_8f

 

CUSTOMER_CRASH_COUNT: 1

 

DEFAULT_BUCKET_ID: DRIVER_FAULT

 

PROCESS_NAME: System

 

LAST_CONTROL_TRANSFER: from 8051bd12 to 804f9c37

 

STACK_TEXT:

f79f77f8 8051bd12 0000004e 0000008f 00021808 nt!KeBugCheckEx+0x1b

f79f7840 80696b94 865c4618 00000000 00000044 nt!MmZeroPageThread+0x250

f79f7dac 805ce794 80087000 00000000 00000000 nt!Phase1Initialization+0x1288

f79f7ddc 805450ce 8069590c 80087000 00000000 nt!PspSystemThreadStartup+0x34

00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16

 

 

STACK_COMMAND: kb

 

FOLLOWUP_IP:

nt!MmZeroPageThread+250

8051bd12 cc int 3

 

SYMBOL_STACK_INDEX: 1

 

SYMBOL_NAME: nt!MmZeroPageThread+250

 

FOLLOWUP_NAME: MachineOwner

 

MODULE_NAME: nt

 

DEBUG_FLR_IMAGE_TIMESTAMP: 41107b0d

 

IMAGE_NAME: memory_corruption

 

FAILURE_BUCKET_ID: 0x4E_8f_nt!MmZeroPageThread+250

 

BUCKET_ID: 0x4E_8f_nt!MmZeroPageThread+250

 

Followup: MachineOwner

---------

 

 

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

 

UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)

This means a trap occurred in kernel mode, and it's a trap of a kind

that the kernel isn't allowed to have/catch (bound trap) or that

is always instant death (double fault). The first number in the

bugcheck params is the number of the trap (8 = double fault, etc)

Consult an Intel x86 family manual to learn more about what these

traps are. Here is a *portion* of those codes:

If kv shows a taskGate

use .tss on the part before the colon, then kv.

Else if kv shows a trapframe

use .trap on that value

Else

.trap on the appropriate frame will show where the trap was taken

(on x86, this will be the ebp that goes with the procedure KiTrap)

Endif

kb will then show the corrected stack.

Arguments:

Arg1: 00000008, EXCEPTION_DOUBLE_FAULT

Arg2: 80042000

Arg3: 00000000

Arg4: 00000000

 

Debugging Details:

------------------

 

 

 

 

BUGCHECK_STR: 0x7f_8

 

CUSTOMER_CRASH_COUNT: 2

 

DEFAULT_BUCKET_ID: DRIVER_FAULT

 

PROCESS_NAME: iw3mp.exe

 

LAST_CONTROL_TRANSFER: from 00000030 to 8054371b

 

STACK_TEXT:

ba8e2084 00000030 00000000 80001118 00000000 nt!KiTrap0E+0x23

WARNING: Frame IP not in any known module. Following frames may be wrong.

ba8e20f4 80001118 ba8e215c 00000000 8051ee33 0x30

00000000 00000000 00000000 00000000 00000000 0x80001118

 

 

STACK_COMMAND: kb

 

FOLLOWUP_IP:

nt!KiTrap0E+23

8054371b 1e push ds

 

SYMBOL_STACK_INDEX: 0

 

SYMBOL_NAME: nt!KiTrap0E+23

 

FOLLOWUP_NAME: MachineOwner

 

MODULE_NAME: nt

 

IMAGE_NAME: ntkrpamp.exe

 

DEBUG_FLR_IMAGE_TIMESTAMP: 45e53f9d

 

FAILURE_BUCKET_ID: 0x7f_8_nt!KiTrap0E+23

 

BUCKET_ID: 0x7f_8_nt!KiTrap0E+23

 

Followup: MachineOwner

 

 

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

 

UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)

This means a trap occurred in kernel mode, and it's a trap of a kind

that the kernel isn't allowed to have/catch (bound trap) or that

is always instant death (double fault). The first number in the

bugcheck params is the number of the trap (8 = double fault, etc)

Consult an Intel x86 family manual to learn more about what these

traps are. Here is a *portion* of those codes:

If kv shows a taskGate

use .tss on the part before the colon, then kv.

Else if kv shows a trapframe

use .trap on that value

Else

.trap on the appropriate frame will show where the trap was taken

(on x86, this will be the ebp that goes with the procedure KiTrap)

Endif

kb will then show the corrected stack.

Arguments:

Arg1: 00000008, EXCEPTION_DOUBLE_FAULT

Arg2: 80042000

Arg3: 00000000

Arg4: 00000000

 

Debugging Details:

------------------

 

 

 

 

BUGCHECK_STR: 0x7f_8

 

CUSTOMER_CRASH_COUNT: 2

 

DEFAULT_BUCKET_ID: DRIVER_FAULT

 

PROCESS_NAME: WoW.exe

 

TRAP_FRAME: b9a041e4 -- (.trap 0xffffffffb9a041e4)

ErrCode = 00000000

eax=00000000 ebx=b9a042f4 ecx=101e07c0 edx=00000000 esi=ba000003 edi=00000000

eip=8051ecae esp=b9a04258 ebp=b9a0426c iopl=0 nv up ei pl zr na pe nc

cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246

nt!MmAccessFault:

8051ecae 8bff mov edi,edi

Resetting default scope

 

LAST_CONTROL_TRANSFER: from 8051ecae to 8054371b

 

STACK_TEXT:

b9a0404c 8051ecae badb0d00 00000000 00000000 nt!KiTrap0E+0x23

b9a040bc 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a040bc 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a04144 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a04144 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a041cc 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a041cc 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a04254 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a04254 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a042dc 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a042dc 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a04364 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a04364 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a043ec 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a043ec 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a04474 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a04474 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a044fc 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a044fc 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a04584 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a04584 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a0460c 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a0460c 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a04694 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a04694 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a0471c 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a0471c 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a047a4 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a047a4 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a0482c 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a0482c 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a048b4 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a048b4 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a0493c 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a0493c 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a049c4 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a049c4 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a04a4c 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a04a4c 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a04ad4 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a04ad4 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a04b5c 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a04b5c 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a04be4 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a04be4 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a04c6c 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a04c6c 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a04cf4 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a04cf4 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a04d7c 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a04d7c 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a04e04 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a04e04 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a04e8c 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a04e8c 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a04f14 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a04f14 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a04f9c 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a04f9c 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a05024 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a05024 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a050ac 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a050ac 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a05134 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a05134 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a051bc 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a051bc 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a05244 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a05244 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a052cc 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a052cc 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a05354 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a05354 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

b9a053dc 805437c8 00000000 00000000 00000000 nt!MmAccessFault

b9a053dc 8051ecae 00000000 00000000 00000000 nt!KiTrap0E+0xd0

 

 

STACK_COMMAND: kb

 

MODULE_NAME: nt

 

IMAGE_NAME: ntkrpamp.exe

 

FOLLOWUP_NAME: MachineOwner

 

DEBUG_FLR_IMAGE_TIMESTAMP: 45e53f9d

 

FOLLOWUP_IP:

nt!KiTrap0E+23

8054371b 1e push ds

 

SYMBOL_STACK_INDEX: 0

 

SYMBOL_NAME: nt!KiTrap0E+23

 

FAILURE_BUCKET_ID: TRAP_FRAME_RECURSION

 

BUCKET_ID: TRAP_FRAME_RECURSION

 

Followup: MachineOwner

------------------

 

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

 

BAD_POOL_CALLER (c2)

The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.

Arguments:

Arg1: 00000002, Pool header has been corrupted

Arg2: 866cd440, Pointer to pool header

Arg3: 866cd000, First part of pool header contents

Arg4: 86452b40, 0

 

Debugging Details:

------------------

 

 

 

 

BUGCHECK_STR: 0xc2_2

 

CUSTOMER_CRASH_COUNT: 1

 

DEFAULT_BUCKET_ID: DRIVER_FAULT

 

PROCESS_NAME: Idle

 

LAST_CONTROL_TRANSFER: from f4706da5 to 804f9deb

 

STACK_TEXT:

80550048 f4706da5 000000c2 00000002 866cd440 nt!KeBugCheckEx+0x1b

80550074 f46dcd36 86452b00 805500bc 85c754c8 tcpip!MdpAllocateAtDpcLevel+0xeb

80550088 f46dd74f 805500bc 85c754c8 00000000 tcpip!GetTCPHeaderAtDpcLevel+0x15

8055009c f46dd449 805500bc 85c754cc 8673d4d8 tcpip!GetTCPHeader+0x17

805500c0 f46e1247 85c754c8 00000000 00000000 tcpip!SendACK+0x1f

805500e0 f46d9a08 00000002 00000002 8055010c tcpip!ProcessPerCpuTCBDelayQ+0xc6

80550114 f46d994f 00000002 f46d9901 f46d93d6 tcpip!ProcessTCBDelayQ+0xc4

80550120 f46d93d6 00000000 865df208 f46d97f2 tcpip!TCPRcvComplete+0x20

8055012c f46d97f2 f735ed40 865d0968 f6a32b40 tcpip!IPRcvComplete+0x21

80550130 f735ed40 865d0968 f6a32b40 86548670 tcpip!ARPRcvComplete+0x5

80550180 f6a2d01d 016b5800 8647d2e8 00000001 NDIS!ethFilterDprIndicateReceivePacket+0x5a4

80550194 f6a2d1b4 865df208 8647d2e8 00000001 psched!PsFlushReceiveQueue+0x15

805501b8 f6a2d5f9 86548678 00000000 865df208 psched!PsEnqueueReceivePacket+0xda

805501d0 f735ed40 86548670 00000001 861ac394 psched!ClReceiveComplete+0x13

80550220 f6b1f93c 006b5800 80550240 00000001 NDIS!ethFilterDprIndicateReceivePacket+0x5a4

WARNING: Stack unwind information not available. Following frames may be wrong.

805503d8 f6b19017 861ac004 861ac394 865adad0 yk51x86+0xf93c

80550404 f6b1a608 601ac004 80550428 f7354f09 yk51x86+0x9017

80550410 f7354f09 861ac004 8055b0a0 ffdff9c0 yk51x86+0xa608

80550428 805450bf 861ac094 861ac080 00000000 NDIS!ndisMDpcX+0x21

80550440 8055ae40 ffdffc50 00000000 8055ae40 nt!KiRetireDpcList+0x61

80550450 80544fa4 00000000 0000000e 00000000 nt!KiIdleThread0

80550454 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x28

 

 

STACK_COMMAND: kb

 

FOLLOWUP_IP:

yk51x86+f93c

f6b1f93c ?? ???

 

SYMBOL_STACK_INDEX: f

 

SYMBOL_NAME: yk51x86+f93c

 

FOLLOWUP_NAME: MachineOwner

 

MODULE_NAME: yk51x86

 

IMAGE_NAME: yk51x86.sys

 

DEBUG_FLR_IMAGE_TIMESTAMP: 454a1b09

 

FAILURE_BUCKET_ID: 0xc2_2_yk51x86+f93c

 

BUCKET_ID: 0xc2_2_yk51x86+f93c

 

Followup: MachineOwner

---------

Lenke til kommentar

Opprett en konto eller logg inn for å kommentere

Du må være et medlem for å kunne skrive en kommentar

Opprett konto

Det er enkelt å melde seg inn for å starte en ny konto!

Start en konto

Logg inn

Har du allerede en konto? Logg inn her.

Logg inn nå
  • Hvem er aktive   0 medlemmer

    • Ingen innloggede medlemmer aktive
×
×
  • Opprett ny...