Ich weis einfach nicht mehr weiter, ich bekomm die ganze Zeit Bluescreens
DRIVER_IRQL_NOT_LESS_OR_EQUAL
das ist meine dump file
Microsoft (R) Windows Debugger Version 6.6.0007.5
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Logfiles\MEMORY4.DMP]
Kernel Complete Dump File: Full address space is available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 2) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 2600.xpsp_sp2_gdr.070227-2254
Kernel base = 0x804d7000 PsLoadedModuleList = 0x805624a0
Debug session time: Fri Jun 29 14:11:43.296 2007 (GMT+2)
System Uptime: 0 days 0:25:57.030
Loading Kernel Symbols
..................................................................... ..................................................................
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {1a00, 2, 1, 80700a2a}
Probably caused by : ntkrnlmp.exe ( nt!KiTrap0E+238 )
Followup: MachineOwner
---------
0: kd> .reload
Loading Kernel Symbols
..................................................................... ..................................................................
Loading User Symbols
Loading unloaded module list
..........
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00001a00, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, value 0 = read operation, 1 = write operation
Arg4: 80700a2a, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: 00001a00
CURRENT_IRQL: 2
FAULTING_IP:
hal!KeAcquireInStackQueuedSpinLock+3a
80700a2a 8902 mov dword ptr [edx],eax
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: f2747438 -- (.trap fffffffff2747438)
ErrCode = 00000002
eax=f27474bc ebx=869d8008 ecx=86d6a62d edx=00001a00 esi=86d6a5f8 edi=86a434c8
eip=80700a2a esp=f27474ac ebp=f27474c8 iopl=0 nv up ei ng nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286
hal!KeAcquireInStackQueuedSpinLock+0x3a:
80700a2a 8902 mov dword ptr [edx],eax ds:0023:00001a00=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 80700a2a to 804e0aac
STACK_TEXT:
f2747438 80700a2a badb0d00 00001a00 f728a170 nt!KiTrap0E+0x238
f27474c8 f725e849 86d6a5f8 869d8001 f27474fc hal!KeAcquireInStackQueuedSpinLock+0x3a
f27474c8 f725e849 86d6a5f8 869d8001 f27474fc Ntfs!NtfsAcquireResourceExclusive+0x20
f27474d8 f727e5b1 869d8008 e1b63cc8 869d8001 Ntfs!NtfsAcquireResourceExclusive+0x20
f27474fc f72a16df 869d8001 e1b63cc8 00000000 Ntfs!NtfsAcquireExclusiveFcb+0x42
f2747580 f72a1b0a 869d8008 86e61440 00000001 Ntfs!NtfsFlushVolume+0x113
f2747620 f728ee37 869d8008 86aa5e28 f2740000 Ntfs!NtfsCommonVolumeOpen+0x341
f27476fc 804e13d9 86e61360 86aa5e28 86e11028 Ntfs!NtfsFsdCreate+0x14d
f274770c f731a876 00000000 86e95630 86bb0970 nt!IopfCallDriver+0x31
f2747758 804e13d9 86e61cc8 00000001 86aa5e28 sr!SrCreate+0x150
f2747768 f732ae9b 00000000 86aa5e28 86aa5fdc nt!IopfCallDriver+0x31
f274778c f7337448 f27477ac 8699e020 00000000 fltMgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x20b
f27477c8 804e13d9 8699e020 86aa5e28 86aa5e28 fltMgr!FltpCreate+0x26a
f27477d8 8057cc89 86f0c8e8 86903b54 f2747970 nt!IopfCallDriver+0x31
f27478b8 8056c063 86f0c900 00000000 86903ab0 nt!IopParseDevice+0xa12
f2747930 8056f2a8 00000000 f2747970 00000240 nt!ObpLookupObjectName+0x53c
f2747984 8057d2e2 00000000 00000000 56f3ef00 nt!ObOpenObjectByName+0xea
f2747a00 8057d3b1 f2747ba4 00100003 f2747b8c nt!IopCreateFile+0x407
f2747a5c 8057d3f4 f2747ba4 00100003 f2747b8c nt!IoCreateFile+0x8e
f2747a9c 804dd99f f2747ba4 00100003 f2747b8c nt!NtCreateFile+0x30
f2747a9c 804e3577 f2747ba4 00100003 f2747b8c nt!KiFastCallEntry+0xfc
f2747b40 80631b8e f2747ba4 00100003 f2747b8c nt!ZwCreateFile+0x11
f2747dac 80574128 f75a0604 00000000 00000000 nt!PopFlushVolumeWorker+0xe3
f2747ddc 804ec781 80631aab f75a0604 00000000 nt!PspSystemThreadStartup+0x34
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiTrap0E+238
804e0aac f7457000000200 test dword ptr [ebp+70h],20000h
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KiTrap0E+238
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 45e54690
FAILURE_BUCKET_ID: 0xA_W_nt!KiTrap0E+238
BUCKET_ID: 0xA_W_nt!KiTrap0E+238
Followup: MachineOwner
---------
456 Gast |