Hallo!
Wir betreiben mehrere Windows 2008 Server (SP2, x86). Seit dem letzten vollständigen Patchen dieser Server haben wir auf allen Servern Probleme mit Bluescreens. Gibt es eventuell einen Hotfix für das Problem?
WinDbg Ausgabe:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: de62ebf0, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 81d872bd, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
------------------
READ_ADDRESS: de62ebf0
FAULTING_IP:
nt!CmpCheckKey+61b
81d872bd 394724 cmp dword ptr [edi+24h],eax
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT_SERVER
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre
TRAP_FRAME: 9ada79ec -- (.trap 0xffffffff9ada79ec)
ErrCode = 00000000
eax=00000000 ebx=e59f4024 ecx=3fe53616 edx=00000035 esi=dd81fa20 edi=de62ebcc
eip=81d872bd esp=9ada7a60 ebp=9ada7a8c iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!CmpCheckKey+0x61b:
81d872bd 394724 cmp dword ptr [edi+24h],eax ds:0023:de62ebf0=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 81c58d94 to 81ca3242
STACK_TEXT:
9ada79d4 81c58d94 00000000 de62ebf0 00000000 nt!MmAccessFault+0x10b
9ada79d4 81d872bd 00000000 de62ebf0 00000000 nt!KiTrap0E+0xdc
9ada7a8c 81d8d818 01000001 00cedbc8 009c3f70 nt!CmpCheckKey+0x61b
9ada7abc 81d8de46 dd81fa20 01000001 00000006 nt!CmpCheckRegistry2+0x8c
9ada7b04 81d8886c 01000001 9ada7c60 80003d94 nt!CmCheckRegistry+0xf5
9ada7b60 81d8afdb 9ada7bb4 00000005 00000000 nt!CmpInitializeHive+0x4c1
9ada7bd8 81d8d27b 9ada7c60 00000000 9ada7c4c nt!CmpInitHiveFromFile+0x19e
9ada7c18 81d834c3 9ada7c60 00000000 9ada7c7b nt!CmpCmdHiveOpen+0x36
9ada7d14 81d836f8 00000002 81d035a0 00000002 nt!CmpFlushBackupHive+0x2fd
9ada7d38 81e62d4d 81d0d13c 9188dad0 81cb0cca nt!CmpSyncBackupHives+0x90
9ada7d44 81cb0cca 00000000 00000000 9188dad0 nt!CmpPeriodicBackupFlushWorker+0x32
9ada7d7c 81de1018 00000000 a53f4bd6 00000000 nt!ExpWorkerThread+0xfd
9ada7dc0 81c49f0e 81cb0bcd 00000001 00000000 nt!PspSystemThreadStartup+0x9d
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!CmpCheckKey+61b
81d872bd 394724 cmp dword ptr [edi+24h],eax
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!CmpCheckKey+61b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 55022ae2
IMAGE_VERSION: 6.0.6002.19346
FAILURE_BUCKET_ID: 0x50_nt!CmpCheckKey+61b
BUCKET_ID: 0x50_nt!CmpCheckKey+61b
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x50_nt!cmpcheckkey+61b
FAILURE_ID_HASH: {b0c48432-dfba-c9e0-33fc-874f17d1f0e6}
Followup: MachineOwner
Danke & Gruß