none
Windows 8 BSOD - Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+344e2 ) RRS feed

  • Allgemeine Diskussion

  • Hallo Leute,

    ich habe seite ca 2 Wochen einen Acer Aspire V3-772G mit vorinstallierten Windows 8.

    Leider hatte bis jetzt ca 6 x BSODs

    So wie ist nun das Debug File zu interpretieren?

    Bitte um Hilfe.

    danke

    lg Dieter


    Loading Dump File [C:\Windows\Minidump\082513-8187-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: C:\symbols
    Executable search path is: 
    Windows 8 Kernel Version 9200 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 9200.16628.amd64fre.win8_gdr.130531-1504
    Machine Name:
    Kernel base = 0xfffff802`51c07000 PsLoadedModuleList = 0xfffff802`51ed3a20
    Debug session time: Sun Aug 25 00:45:57.430 2013 (UTC + 2:00)
    System Uptime: 0 days 3:11:47.078
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .................................................
    Loading User Symbols
    Loading unloaded module list
    .................................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck FC, {fffff80252a858d8, 8000000003e85163, fffff80252a856c0, 0}

    Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+344e2 )

    Followup: MachineOwner
    ---------

    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
    An attempt was made to execute non-executable memory.  The guilty driver
    is on the stack trace (and is typically the current instruction pointer).
    When possible, the guilty driver's name (Unicode string) is printed on
    the bugcheck screen and saved in KiBugCheckDriver.
    Arguments:
    Arg1: fffff80252a858d8, Virtual address for the attempted execute.
    Arg2: 8000000003e85163, PTE contents.
    Arg3: fffff80252a856c0, (reserved)
    Arg4: 0000000000000000, (reserved)

    Debugging Details:
    ------------------


    CUSTOMER_CRASH_COUNT:  1

    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

    BUGCHECK_STR:  0xFC

    PROCESS_NAME:  System

    CURRENT_IRQL:  2

    TAG_NOT_DEFINED_c000000f:  FFFFF80252A8BFB0

    TRAP_FRAME:  fffff80252a856c0 -- (.trap 0xfffff80252a856c0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000001 rbx=0000000000000000 rcx=fffffa801d9878d8
    rdx=0000000075657502 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80252a858d8 rsp=fffff80252a85850 rbp=fffff80252a858e0
     r8=0000000000000a0a  r9=fffff880010b2260 r10=fffffa8019400000
    r11=fffff80252a85820 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    fffff802`52a858d8 70e6            jo      fffff802`52a858c0              [br=0]
    Resetting default scope

    LAST_CONTROL_TRANSFER:  from fffff80251df3306 to fffff80251c61440

    STACK_TEXT:  
    fffff802`52a854f8 fffff802`51df3306 : 00000000`000000fc fffff802`52a858d8 80000000`03e85163 fffff802`52a856c0 : nt!KeBugCheckEx
    fffff802`52a85500 fffff802`51c0e319 : 0000057f`e2678b18 fffff880`010ec8c7 fffffa80`1dc50802 fffffa80`1d9874e0 : nt! ?? ::FNODOBFM::`string'+0x344e2
    fffff802`52a85540 fffff802`51c9bffb : 00000000`00040000 fffff802`52a85600 00000000`00000004 fffff802`52a856c0 : nt!MiRaisedIrqlFault+0xf5
    fffff802`52a85580 fffff802`51c5eeee : 00000000`00000008 00000000`00040000 00000000`00000000 fffff802`52a856c0 : nt!MmAccessFault+0xa8b
    fffff802`52a856c0 fffff802`52a858d8 : 00000000`00040000 fffff802`52a858e0 00000000`00000004 fffff802`52a858e8 : nt!KiPageFault+0x16e
    fffff802`52a85850 00000000`00040000 : fffff802`52a858e0 00000000`00000004 fffff802`52a858e8 fffffa80`1ca35810 : 0xfffff802`52a858d8
    fffff802`52a85858 fffff802`52a858e0 : 00000000`00000004 fffff802`52a858e8 fffffa80`1ca35810 fffffa80`1ca621a0 : 0x40000
    fffff802`52a85860 00000000`00000004 : fffff802`52a858e8 fffffa80`1ca35810 fffffa80`1ca621a0 0000057f`e35caa38 : 0xfffff802`52a858e0
    fffff802`52a85868 fffff802`52a858e8 : fffffa80`1ca35810 fffffa80`1ca621a0 0000057f`e35caa38 00000000`00000000 : 0x4
    fffff802`52a85870 fffffa80`1ca35810 : fffffa80`1ca621a0 0000057f`e35caa38 00000000`00000000 fffffa80`1ca35780 : 0xfffff802`52a858e8
    fffff802`52a85878 fffffa80`1ca621a0 : 0000057f`e35caa38 00000000`00000000 fffffa80`1ca35780 fffffa80`1cb3d030 : 0xfffffa80`1ca35810
    fffff802`52a85880 0000057f`e35caa38 : 00000000`00000000 fffffa80`1ca35780 fffffa80`1cb3d030 00000000`00000780 : 0xfffffa80`1ca621a0
    fffff802`52a85888 00000000`00000000 : fffffa80`1ca35780 fffffa80`1cb3d030 00000000`00000780 fffff880`064cef31 : 0x0000057f`e35caa38


    STACK_COMMAND:  kb

    FOLLOWUP_IP: 
    nt! ?? ::FNODOBFM::`string'+344e2
    fffff802`51df3306 cc              int     3

    SYMBOL_STACK_INDEX:  1

    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+344e2

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: nt

    IMAGE_NAME:  ntkrnlmp.exe

    DEBUG_FLR_IMAGE_TIMESTAMP:  51a966cd

    BUCKET_ID_FUNC_OFFSET:  344e2

    FAILURE_BUCKET_ID:  0xFC_nt!_??_::FNODOBFM::_string_

    BUCKET_ID:  0xFC_nt!_??_::FNODOBFM::_string_

    Followup: MachineOwner
    ---------

    • Typ geändert Alex Pitulice Montag, 26. August 2013 07:54 Off Topic: MS Answers Frage
    • Verschoben Alex Pitulice Montag, 26. August 2013 07:54 Verschoben: MS Community Frage
    Samstag, 24. August 2013 23:41

Alle Antworten