Lord_Bernet
Herzlich willkommen
Hi Community, mir scheint ich wäre nicht der einzigste mit den ganzen Problemen.
Viele Probleme konnte ich bereits mit dem super DebugTool ausmerzen, aber jetzt stehe ich vor einem Rätsel.
Folgende Meldung:
Bitte um Hilfe !
Viele Probleme konnte ich bereits mit dem super DebugTool ausmerzen, aber jetzt stehe ich vor einem Rätsel.
Folgende Meldung:
Microsoft (R) Windows Debugger Version 6.9.0003.113 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available
Symbol search path is: SRV*C:\symbols*Symbol information
Executable search path is:
Windows Server 2008 Kernel Version 6001 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6001.18145.amd64fre.vistasp1_gdr.080917-1612
Kernel base = 0xfffff800`01e03000 PsLoadedModuleList = 0xfffff800`01fc8db0
Debug session time: Thu Nov 13 11:33:23.955 2008 (GMT+1)
System Uptime: 0 days 1:10:11.892
Loading Kernel Symbols
...........................................................................................................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000007ff`fffdf018). Type ".hh dbgerr001" for details
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff68008002f28, 0, fffff80001efe7ed, 2}
PEB is paged out (Peb.Ldr = 000007ff`fffdf018). Type ".hh dbgerr001" for details
PEB is paged out (Peb.Ldr = 000007ff`fffdf018). Type ".hh dbgerr001" for details
Probably caused by : memory_corruption ( nt!MiAgeWorkingSet+22d )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff68008002f28, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80001efe7ed, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
PEB is paged out (Peb.Ldr = 000007ff`fffdf018). Type ".hh dbgerr001" for details
PEB is paged out (Peb.Ldr = 000007ff`fffdf018). Type ".hh dbgerr001" for details
READ_ADDRESS: fffff68008002f28
FAULTING_IP:
nt!MiAgeWorkingSet+22d
fffff800`01efe7ed 498b1f mov rbx,qword ptr [r15]
MM_INTERNAL_CODE: 2
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffffa6001d087e0 -- (.trap 0xfffffa6001d087e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000098000000000 rbx=fffff80001f73b88 rcx=0000000fffffffff
rdx=00000010005e5d09 rsi=fffff683ff7ecc18 rdi=fffff80001f73bb0
rip=fffff80001efe7ed rsp=fffffa6001d08970 rbp=000000000000000c
r8=0000000000000005 r9=0000000000000003 r10=0000000000000005
r11=00000000000008cb r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!MiAgeWorkingSet+0x22d:
fffff800`01efe7ed 498b1f mov rbx,qword ptr [r15] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80001e66524 to fffff80001e58350
STACK_TEXT:
fffffa60`01d086e8 fffff800`01e66524 : 00000000`00000050 fffff680`08002f28 00000000`00000000 fffffa60`01d087e0 : nt!KeBugCheckEx
fffffa60`01d086f0 fffff800`01e56ed9 : 00000000`00000000 fffffa60`0196f000 00000000`00000800 fffff700`01080498 : nt!MmAccessFault+0x534
fffffa60`01d087e0 fffff800`01efe7ed : 00000000`00000000 00000000`00000001 00000000`00000407 fffff700`01080498 : nt!KiPageFault+0x119
fffffa60`01d08970 fffff800`01f20e61 : fffffa80`05002480 00000000`00000001 fffffa60`01d08ba0 fffffa60`01d08bd0 : nt!MiAgeWorkingSet+0x22d
fffffa60`01d08b30 fffff800`01ec5424 : fffffa80`0000035a 00000000`00000002 fffff800`01fb4390 00000000`00000000 : nt!MiProcessWorkingSets+0x231
fffffa60`01d08ba0 fffff800`01e47b10 : fffffa80`018a1b00 00000000`00000001 00000000`00000007 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x326b8
fffffa60`01d08c10 fffff800`0207aff3 : fffffa80`018a1bb0 00000000`00000080 00000000`00000000 00000000`00000001 : nt!KeBalanceSetManager+0x120
fffffa60`01d08d50 fffff800`01e92546 : fffffa60`01963180 fffffa80`018a1bb0 fffffa60`0196cd40 00000000`00000001 : nt!PspSystemThreadStartup+0x57
fffffa60`01d08d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiAgeWorkingSet+22d
fffff800`01efe7ed 498b1f mov rbx,qword ptr [r15]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiAgeWorkingSet+22d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 48d1ba35
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x50_nt!MiAgeWorkingSet+22d
BUCKET_ID: X64_0x50_nt!MiAgeWorkingSet+22d
Followup: MachineOwner
---------
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available
Symbol search path is: SRV*C:\symbols*Symbol information
Executable search path is:
Windows Server 2008 Kernel Version 6001 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6001.18145.amd64fre.vistasp1_gdr.080917-1612
Kernel base = 0xfffff800`01e03000 PsLoadedModuleList = 0xfffff800`01fc8db0
Debug session time: Thu Nov 13 11:33:23.955 2008 (GMT+1)
System Uptime: 0 days 1:10:11.892
Loading Kernel Symbols
...........................................................................................................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000007ff`fffdf018). Type ".hh dbgerr001" for details
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff68008002f28, 0, fffff80001efe7ed, 2}
PEB is paged out (Peb.Ldr = 000007ff`fffdf018). Type ".hh dbgerr001" for details
PEB is paged out (Peb.Ldr = 000007ff`fffdf018). Type ".hh dbgerr001" for details
Probably caused by : memory_corruption ( nt!MiAgeWorkingSet+22d )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff68008002f28, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80001efe7ed, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
PEB is paged out (Peb.Ldr = 000007ff`fffdf018). Type ".hh dbgerr001" for details
PEB is paged out (Peb.Ldr = 000007ff`fffdf018). Type ".hh dbgerr001" for details
READ_ADDRESS: fffff68008002f28
FAULTING_IP:
nt!MiAgeWorkingSet+22d
fffff800`01efe7ed 498b1f mov rbx,qword ptr [r15]
MM_INTERNAL_CODE: 2
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffffa6001d087e0 -- (.trap 0xfffffa6001d087e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000098000000000 rbx=fffff80001f73b88 rcx=0000000fffffffff
rdx=00000010005e5d09 rsi=fffff683ff7ecc18 rdi=fffff80001f73bb0
rip=fffff80001efe7ed rsp=fffffa6001d08970 rbp=000000000000000c
r8=0000000000000005 r9=0000000000000003 r10=0000000000000005
r11=00000000000008cb r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!MiAgeWorkingSet+0x22d:
fffff800`01efe7ed 498b1f mov rbx,qword ptr [r15] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80001e66524 to fffff80001e58350
STACK_TEXT:
fffffa60`01d086e8 fffff800`01e66524 : 00000000`00000050 fffff680`08002f28 00000000`00000000 fffffa60`01d087e0 : nt!KeBugCheckEx
fffffa60`01d086f0 fffff800`01e56ed9 : 00000000`00000000 fffffa60`0196f000 00000000`00000800 fffff700`01080498 : nt!MmAccessFault+0x534
fffffa60`01d087e0 fffff800`01efe7ed : 00000000`00000000 00000000`00000001 00000000`00000407 fffff700`01080498 : nt!KiPageFault+0x119
fffffa60`01d08970 fffff800`01f20e61 : fffffa80`05002480 00000000`00000001 fffffa60`01d08ba0 fffffa60`01d08bd0 : nt!MiAgeWorkingSet+0x22d
fffffa60`01d08b30 fffff800`01ec5424 : fffffa80`0000035a 00000000`00000002 fffff800`01fb4390 00000000`00000000 : nt!MiProcessWorkingSets+0x231
fffffa60`01d08ba0 fffff800`01e47b10 : fffffa80`018a1b00 00000000`00000001 00000000`00000007 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x326b8
fffffa60`01d08c10 fffff800`0207aff3 : fffffa80`018a1bb0 00000000`00000080 00000000`00000000 00000000`00000001 : nt!KeBalanceSetManager+0x120
fffffa60`01d08d50 fffff800`01e92546 : fffffa60`01963180 fffffa80`018a1bb0 fffffa60`0196cd40 00000000`00000001 : nt!PspSystemThreadStartup+0x57
fffffa60`01d08d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiAgeWorkingSet+22d
fffff800`01efe7ed 498b1f mov rbx,qword ptr [r15]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiAgeWorkingSet+22d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 48d1ba35
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x50_nt!MiAgeWorkingSet+22d
BUCKET_ID: X64_0x50_nt!MiAgeWorkingSet+22d
Followup: MachineOwner
---------
Zuletzt bearbeitet von einem Moderator: