Перейти из форума на сайт.

НовостиФайловые архивы
ПоискАктивные темыТоп лист
ПравилаКто в on-line?
Вход Забыли пароль? Первый раз на этом сайте? Регистрация
Компьютерный форум Ru.Board » Hardware » Общие вопросы » Перезагрузка компа, рекомендации

Модерирует : Akam1, Dr_StandBy, vertex4

Dekker (28-09-2011 12:06): http://forum.ru-board.com/topic.cgi?forum=27&topic=18539  Версия для печати • ПодписатьсяДобавить в закладки
На первую страницук этому сообщениюк последнему сообщению

   

rbu333

Junior Member
Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору

Microsoft (R) Windows Debugger  Version 6.6.0003.5
Copyright (c) Microsoft Corporation. All rights reserved.
 
 
Loading Dump File [C:\WINDOWS\Minidump\Mini042106-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
 
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:  
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp2_gdr.050301-1519
Kernel base = 0x804d7000 PsLoadedModuleList = 0x805531a0
Debug session time: Fri Apr 21 12:52:07.546 2006 (GMT+2)
System Uptime: 0 days 14:44:45.121
Loading Kernel Symbols
........................................................................................................................................
Loading User Symbols
Loading unloaded module list
.............................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
 
Use !analyze -v to get detailed debugging information.
 
BugCheck 100000D1, {14, 2, 0, abd239c6}
 
*** WARNING: Unable to verify timestamp for SYMEVENT.SYS
*** ERROR: Module load completed but symbols could not be loaded for SYMEVENT.SYS
Unable to load image a347bus.sys, Win32 error 2
*** WARNING: Unable to verify timestamp for a347bus.sys
*** ERROR: Module load completed but symbols could not be loaded for a347bus.sys
Probably caused by : Cdfs.SYS ( Cdfs!CdCheckForDismount+82 )
 
Followup: MachineOwner
---------
 
kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
 
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000014, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: abd239c6, address which referenced memory
 
Debugging Details:
------------------
 
 
READ_ADDRESS:  00000014  
 
CURRENT_IRQL:  2
 
FAULTING_IP:  
Cdfs!CdCheckForDismount+82
abd239c6 83781401         cmp     dword ptr [eax+0x14],0x1
 
CUSTOMER_CRASH_COUNT:  1
 
DEFAULT_BUCKET_ID:  DRIVER_FAULT
 
BUGCHECK_STR:  0xD1
 
LAST_CONTROL_TRANSFER:  from abd23b00 to abd239c6
 
STACK_TEXT:  
8b46e488 abd23b00 89932370 8873f301 00000000 Cdfs!CdCheckForDismount+0x82
8b46e4d0 abd227dc 89932370 87e4b008 89979030 Cdfs!CdPerformVerify+0xde
8b46e514 abd22611 89932370 87e4b008 80000016 Cdfs!CdProcessException+0x15b
8b46e568 804eddf9 8873f290 87e4b008 8b46e5c8 Cdfs!CdFsdDispatch+0x164
8b46e578 b5998f33 8b46e5c8 8b04e500 00000000 nt!IopfCallDriver+0x31
WARNING: Stack unwind information not available. Following frames may be wrong.
8b46e6d4 805b3642 89979030 00000000 88d1ce10 SYMEVENT+0xaf33
8b46e75c 805afb23 00000000 8b46e79c 00000040 nt!ObpLookupObjectName+0x56a
8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb
8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407
8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e
8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27
8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b
8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c
8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014
8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb
8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407
8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e
8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27
8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b
8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c
8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014
8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb
8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407
8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e
8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27
8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b
8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c
8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014
8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb
8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407
8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e
8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27
8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b
8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c
8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014
8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb
8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407
8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e
8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27
8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b
8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c
8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014
8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb
8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407
8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e
8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27
8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b
8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c
8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014
8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb
8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407
8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e
8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27
8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b
8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c
8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014
8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb
8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407
8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e
8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27
8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b
8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c
8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014
8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb
8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407
8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e
8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27
8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b
8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c
8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014
8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb
8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407
8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e
8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27
8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b
 
 
STACK_COMMAND:  .bugcheck ; kb
 
FOLLOWUP_IP:  
Cdfs!CdCheckForDismount+82
abd239c6 83781401         cmp     dword ptr [eax+0x14],0x1
 
FAULTING_SOURCE_CODE:  
 
 
SYMBOL_STACK_INDEX:  0
 
FOLLOWUP_NAME:  MachineOwner
 
SYMBOL_NAME:  Cdfs!CdCheckForDismount+82
 
MODULE_NAME:  Cdfs
 
IMAGE_NAME:  Cdfs.SYS
 
DEBUG_FLR_IMAGE_TIMESTAMP:  41107eb1
 
FAILURE_BUCKET_ID:  0xD1_Cdfs!CdCheckForDismount+82
 
BUCKET_ID:  0xD1_Cdfs!CdCheckForDismount+82
 
Followup: MachineOwner
---------

Всего записей: 57 | Зарегистр. 09-09-2005 | Отправлено: 19:14 21-04-2006 | Исправлено: rbu333, 19:20 21-04-2006
   

На первую страницук этому сообщениюк последнему сообщению

Компьютерный форум Ru.Board » Hardware » Общие вопросы » Перезагрузка компа, рекомендации
Dekker (28-09-2011 12:06): http://forum.ru-board.com/topic.cgi?forum=27&topic=18539


Реклама на форуме Ru.Board.

Powered by Ikonboard "v2.1.7b" © 2000 Ikonboard.com
Modified by Ru.B0ard
© Ru.B0ard 2000-2024

BitCoin: 1NGG1chHtUvrtEqjeerQCKDMUi6S6CG4iC

Рейтинг.ru