none
Windows 2008: BSOD - PAGE_FAULT_IN_NONPAGED_AREA (50) RRS feed

  • Frage

  • Hallo!

    Wir betreiben mehrere Windows 2008 Server (SP2, x86). Seit dem letzten vollständigen Patchen dieser Server haben wir auf allen Servern Probleme mit Bluescreens. Gibt es eventuell einen Hotfix für das Problem?

    WinDbg Ausgabe:

    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: de62ebf0, memory referenced.
    Arg2: 00000000, value 0 = read operation, 1 = write operation.
    Arg3: 81d872bd, If non-zero, the instruction address which referenced the bad memory
    address.
    Arg4: 00000000, (reserved)

    Debugging Details:
    ------------------


    READ_ADDRESS:  de62ebf0 

    FAULTING_IP: 
    nt!CmpCheckKey+61b
    81d872bd 394724          cmp     dword ptr [edi+24h],eax

    MM_INTERNAL_CODE:  0

    CUSTOMER_CRASH_COUNT:  1

    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT_SERVER

    BUGCHECK_STR:  0x50

    PROCESS_NAME:  System

    CURRENT_IRQL:  0

    ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre

    TRAP_FRAME:  9ada79ec -- (.trap 0xffffffff9ada79ec)
    ErrCode = 00000000
    eax=00000000 ebx=e59f4024 ecx=3fe53616 edx=00000035 esi=dd81fa20 edi=de62ebcc
    eip=81d872bd esp=9ada7a60 ebp=9ada7a8c iopl=0         nv up ei pl zr na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
    nt!CmpCheckKey+0x61b:
    81d872bd 394724          cmp     dword ptr [edi+24h],eax ds:0023:de62ebf0=????????
    Resetting default scope

    LAST_CONTROL_TRANSFER:  from 81c58d94 to 81ca3242

    STACK_TEXT:  
    9ada79d4 81c58d94 00000000 de62ebf0 00000000 nt!MmAccessFault+0x10b
    9ada79d4 81d872bd 00000000 de62ebf0 00000000 nt!KiTrap0E+0xdc
    9ada7a8c 81d8d818 01000001 00cedbc8 009c3f70 nt!CmpCheckKey+0x61b
    9ada7abc 81d8de46 dd81fa20 01000001 00000006 nt!CmpCheckRegistry2+0x8c
    9ada7b04 81d8886c 01000001 9ada7c60 80003d94 nt!CmCheckRegistry+0xf5
    9ada7b60 81d8afdb 9ada7bb4 00000005 00000000 nt!CmpInitializeHive+0x4c1
    9ada7bd8 81d8d27b 9ada7c60 00000000 9ada7c4c nt!CmpInitHiveFromFile+0x19e
    9ada7c18 81d834c3 9ada7c60 00000000 9ada7c7b nt!CmpCmdHiveOpen+0x36
    9ada7d14 81d836f8 00000002 81d035a0 00000002 nt!CmpFlushBackupHive+0x2fd
    9ada7d38 81e62d4d 81d0d13c 9188dad0 81cb0cca nt!CmpSyncBackupHives+0x90
    9ada7d44 81cb0cca 00000000 00000000 9188dad0 nt!CmpPeriodicBackupFlushWorker+0x32
    9ada7d7c 81de1018 00000000 a53f4bd6 00000000 nt!ExpWorkerThread+0xfd
    9ada7dc0 81c49f0e 81cb0bcd 00000001 00000000 nt!PspSystemThreadStartup+0x9d
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16


    STACK_COMMAND:  kb

    FOLLOWUP_IP: 
    nt!CmpCheckKey+61b
    81d872bd 394724          cmp     dword ptr [edi+24h],eax

    SYMBOL_STACK_INDEX:  2

    SYMBOL_NAME:  nt!CmpCheckKey+61b

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: nt

    IMAGE_NAME:  ntkrpamp.exe

    DEBUG_FLR_IMAGE_TIMESTAMP:  55022ae2

    IMAGE_VERSION:  6.0.6002.19346

    FAILURE_BUCKET_ID:  0x50_nt!CmpCheckKey+61b

    BUCKET_ID:  0x50_nt!CmpCheckKey+61b

    ANALYSIS_SOURCE:  KM

    FAILURE_ID_HASH_STRING:  km:0x50_nt!cmpcheckkey+61b

    FAILURE_ID_HASH:  {b0c48432-dfba-c9e0-33fc-874f17d1f0e6}

    Followup: MachineOwner

    Danke & Gruß


    Montag, 3. August 2015 07:53

Alle Antworten