rbu333
Junior Member | Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору Microsoft (R) Windows Debugger Version 6.6.0003.5 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\WINDOWS\Minidump\Mini042106-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Built by: 2600.xpsp_sp2_gdr.050301-1519 Kernel base = 0x804d7000 PsLoadedModuleList = 0x805531a0 Debug session time: Fri Apr 21 12:52:07.546 2006 (GMT+2) System Uptime: 0 days 14:44:45.121 Loading Kernel Symbols ........................................................................................................................................ Loading User Symbols Loading unloaded module list ............................. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 100000D1, {14, 2, 0, abd239c6} *** WARNING: Unable to verify timestamp for SYMEVENT.SYS *** ERROR: Module load completed but symbols could not be loaded for SYMEVENT.SYS Unable to load image a347bus.sys, Win32 error 2 *** WARNING: Unable to verify timestamp for a347bus.sys *** ERROR: Module load completed but symbols could not be loaded for a347bus.sys Probably caused by : Cdfs.SYS ( Cdfs!CdCheckForDismount+82 ) Followup: MachineOwner --------- kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 00000014, memory referenced Arg2: 00000002, IRQL Arg3: 00000000, value 0 = read operation, 1 = write operation Arg4: abd239c6, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: 00000014 CURRENT_IRQL: 2 FAULTING_IP: Cdfs!CdCheckForDismount+82 abd239c6 83781401 cmp dword ptr [eax+0x14],0x1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: DRIVER_FAULT BUGCHECK_STR: 0xD1 LAST_CONTROL_TRANSFER: from abd23b00 to abd239c6 STACK_TEXT: 8b46e488 abd23b00 89932370 8873f301 00000000 Cdfs!CdCheckForDismount+0x82 8b46e4d0 abd227dc 89932370 87e4b008 89979030 Cdfs!CdPerformVerify+0xde 8b46e514 abd22611 89932370 87e4b008 80000016 Cdfs!CdProcessException+0x15b 8b46e568 804eddf9 8873f290 87e4b008 8b46e5c8 Cdfs!CdFsdDispatch+0x164 8b46e578 b5998f33 8b46e5c8 8b04e500 00000000 nt!IopfCallDriver+0x31 WARNING: Stack unwind information not available. Following frames may be wrong. 8b46e6d4 805b3642 89979030 00000000 88d1ce10 SYMEVENT+0xaf33 8b46e75c 805afb23 00000000 8b46e79c 00000040 nt!ObpLookupObjectName+0x56a 8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb 8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407 8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e 8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27 8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b 8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c 8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014 8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb 8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407 8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e 8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27 8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b 8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c 8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014 8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb 8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407 8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e 8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27 8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b 8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c 8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014 8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb 8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407 8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e 8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27 8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b 8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c 8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014 8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb 8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407 8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e 8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27 8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b 8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c 8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014 8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb 8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407 8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e 8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27 8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b 8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c 8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014 8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb 8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407 8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e 8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27 8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b 8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c 8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014 8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb 8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407 8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e 8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27 8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b 8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c 8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014 8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb 8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407 8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e 8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27 8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b 8b46e71c 89979014 8052d812 8b46e738 88d1cec4 nt!NtOpenKey+0x31c 8b46e75c 805afb23 00000000 8b46e79c 00000040 0x89979014 8b46e7b0 8056a11d 00000000 00000000 52ddfc01 nt!ObOpenObjectByName+0xeb 8b46e82c 8056aa94 0152dd48 00100001 0152dd14 nt!IopCreateFile+0x407 8b46e888 8056e27b 0152dd48 00100001 0152dd14 nt!IoCreateFile+0x8e 8b46e8c8 ba780c2b 0152dd48 00100001 0152dd14 nt!NtOpenFile+0x27 8b46e900 8061a28c ffffffff 80535010 804d9c30 a347bus+0x1c2b STACK_COMMAND: .bugcheck ; kb FOLLOWUP_IP: Cdfs!CdCheckForDismount+82 abd239c6 83781401 cmp dword ptr [eax+0x14],0x1 FAULTING_SOURCE_CODE: SYMBOL_STACK_INDEX: 0 FOLLOWUP_NAME: MachineOwner SYMBOL_NAME: Cdfs!CdCheckForDismount+82 MODULE_NAME: Cdfs IMAGE_NAME: Cdfs.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 41107eb1 FAILURE_BUCKET_ID: 0xD1_Cdfs!CdCheckForDismount+82 BUCKET_ID: 0xD1_Cdfs!CdCheckForDismount+82 Followup: MachineOwner --------- | Всего записей: 57 | Зарегистр. 09-09-2005 | Отправлено: 19:14 21-04-2006 | Исправлено: rbu333, 19:20 21-04-2006 |
|