slorenc Posted October 11, 2008 Posted October 11, 2008 I'm hoping someone can help me. In the last few days my computer just started blue screening. I think it's a driver but can figure out which one. Can someone help me interpret the dump file? Thanks.Microsoft ® Windows Debugger Version 6.9.0003.113 X86Copyright © Microsoft Corporation. All rights reserved.Loading Dump File [f:\mini101008-10.dmp]Mini Kernel Dump File: Only registers and stack trace are availableSymbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbolsExecutable search path is: c:\windows\i386Windows Server 2008 Kernel Version 6001 (Service Pack 1) MP (4 procs) Free x86 compatibleProduct: WinNt, suite: TerminalServer SingleUserTS PersonalBuilt by: 6001.18063.x86fre.vistasp1_gdr.080425-1930Kernel base = 0x81e3b000 PsLoadedModuleList = 0x81f52c70Debug session time: Fri Oct 10 22:42:41.605 2008 (GMT-4)System Uptime: 0 days 0:00:51.714Loading Kernel Symbols.....................................................................................................................................................Loading User SymbolsLoading unloaded module list.******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck 50, {ffffffff, 8, ffffffff, 0}Probably caused by : Unknown_Image ( PAGE_NOT_ZERO_VISTA )Followup: MachineOwner--------- *** Memory manager detected 4 instance(s) of page corruption, target is likely to have memory corruption.0: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************PAGE_FAULT_IN_NONPAGED_AREA (50)Invalid system memory was referenced. This cannot be protected by try-except,it must be protected by a Probe. Typically the address is just plain bad or itis pointing at freed memory.Arguments:Arg1: ffffffff, memory referenced.Arg2: 00000008, value 0 = read operation, 1 = write operation.Arg3: ffffffff, If non-zero, the instruction address which referenced the bad memory address.Arg4: 00000000, (reserved)Debugging Details:------------------WRITE_ADDRESS: GetPointerFromAddress: unable to read from 81f72868Unable to read MiSystemVaType memory at 81f52420 ffffffff FAULTING_IP: +ffffffffffffffffffffffff ?? ???MM_INTERNAL_CODE: 0CUSTOMER_CRASH_COUNT: 10DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULTBUGCHECK_STR: 0x50PROCESS_NAME: SystemCURRENT_IRQL: 0BAD_PAGES_DETECTED: 4TRAP_FRAME: 8b7b3a70 -- (.trap 0xffffffff8b7b3a70)ErrCode = 00000010eax=ffffffff ebx=00000000 ecx=99b0d670 edx=00000000 esi=99b0d640 edi=85380b18eip=ffffffff esp=8b7b3ae4 ebp=8b7b3afc iopl=0 nv up ei ng nz na pe nccs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286ffffffff ?? ???Resetting default scopeLAST_CONTROL_TRANSFER: from 81e95bb4 to 81ee0155STACK_TEXT: 8b7b3a58 81e95bb4 00000008 ffffffff 00000000 nt!MmAccessFault+0x10a8b7b3a58 ffffffff 00000008 ffffffff 00000000 nt!KiTrap0E+0xdcWARNING: Frame IP not in any known module. Following frames may be wrong.8b7b3ae0 805a5211 99b0d670 0000ffff 87bb6c90 0xffffffff8b7b3afc 805a53de 99b0d640 99b0d640 8b7b3b20 fltmgr!DoFreeContext+0x578b7b3b0c 805b569d 99b0d640 87bb6c68 99b0f12c fltmgr!DoReleaseContext+0x428b7b3b20 805c2195 87bb6c94 99b0d64c ffffffff fltmgr!FltpDeleteContextList+0x1258b7b3b40 805c23b6 87bb6c68 99b0f0f8 00000000 fltmgr!CleanupStreamListCtrl+0x1b8b7b3b54 82061cdc 87bb6c6c 807e6734 00000000 fltmgr!DeleteStreamListCtrlCallback+0x5a8b7b3b94 8ab03d9b 99b0f0f8 99b0f008 99b0f0f8 nt!FsRtlTeardownPerStreamContexts+0x1358b7b3bb0 8aaeee6c 00000705 99b0f030 99b0f008 Ntfs!NtfsDeleteScb+0x1f48b7b3bc8 8aa7515a 8832f2f0 99b0f0f8 00000000 Ntfs!NtfsRemoveScb+0xc08b7b3be4 8aaeec55 8832f2f0 99b0f008 00000000 Ntfs!NtfsPrepareFcbForRemoval+0x598b7b3c28 8aa76bde 8832f2f0 99b0f0f8 99b0f298 Ntfs!NtfsTeardownStructures+0x628b7b3c50 8aaf4b66 8832f2f0 99b0f0f8 99b0f298 Ntfs!NtfsDecrementCloseCounts+0xad8b7b3cb0 8ab031d4 8832f2f0 99b0f0f8 99b0f008 Ntfs!NtfsCommonClose+0x4da8b7b3d44 81e7341d 00000000 00000000 84556d78 Ntfs!NtfsFspClose+0x1178b7b3d7c 82010b18 00000000 807e6160 00000000 nt!ExpWorkerThread+0xfd8b7b3dc0 81e69a3e 81e73320 00000000 00000000 nt!PspSystemThreadStartup+0x9d00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16STACK_COMMAND: kbSYMBOL_NAME: PAGE_NOT_ZERO_VISTAFOLLOWUP_NAME: MachineOwnerMODULE_NAME: Unknown_ModuleIMAGE_NAME: Unknown_ImageDEBUG_FLR_IMAGE_TIMESTAMP: 0BUCKET_ID: PAGE_NOT_ZERO_VISTAFollowup: MachineOwner--------- *** Memory manager detected 4 instance(s) of page corruption, target is likely to have memory corruption.
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now