none
블루스크린 관련. RRS feed

  • 질문

  • 블루스크린 덤프 관련 분석 부탁드립니다..

    윈도우 2008 32bit 서버가 계속 리부팅 됩니다..

    ---------------------------------------------------

    23: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: f8585048, memory referenced.
    Arg2: 00000000, value 0 = read operation, 1 = write operation.
    Arg3: 825b42dc, If non-zero, the instruction address which referenced the bad memory
    address.
    Arg4: 00000000, (reserved)

    Debugging Details:
    ------------------


    READ_ADDRESS:  f8585048 

    FAULTING_IP: 
    nt!CmpCheckKey+630
    825b42dc 394724          cmp     dword ptr [edi+24h],eax

    MM_INTERNAL_CODE:  0

    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

    BUGCHECK_STR:  0x50

    PROCESS_NAME:  System

    CURRENT_IRQL:  0

    ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre

    TRAP_FRAME:  9b9b39e4 -- (.trap 0xffffffff9b9b39e4)
    ErrCode = 00000000
    eax=00000000 ebx=f883c024 ecx=9d9e2e0b edx=00000035 esi=a4d75a20 edi=f8585024
    eip=825b42dc esp=9b9b3a58 ebp=9b9b3a8c iopl=0         nv up ei pl zr na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
    nt!CmpCheckKey+0x630:
    825b42dc 394724          cmp     dword ptr [edi+24h],eax ds:0023:f8585048=????????
    Resetting default scope

    LAST_CONTROL_TRANSFER:  from 82484db4 to 824cf2ae

    STACK_TEXT:  
    9b9b39cc 82484db4 00000000 f8585048 00000000 nt!MmAccessFault+0x10b
    9b9b39cc 825b42dc 00000000 f8585048 00000000 nt!KiTrap0E+0xdc
    9b9b3a8c 825ba844 01000001 009c4020 009c3f70 nt!CmpCheckKey+0x630
    9b9b3abc 825bae72 a4d75a20 01000001 00000006 nt!CmpCheckRegistry2+0x8c
    9b9b3b04 825b5898 01000001 9b9b3c60 80000e18 nt!CmCheckRegistry+0xf5
    9b9b3b60 825b8007 9b9b3bb4 00000005 00000000 nt!CmpInitializeHive+0x4c1
    9b9b3bd8 825ba2a7 9b9b3c60 00000000 9b9b3c4c nt!CmpInitHiveFromFile+0x19e
    9b9b3c18 825b04cd 9b9b3c60 00000000 9b9b3c7b nt!CmpCmdHiveOpen+0x36
    9b9b3d14 825b0702 00000002 825305a0 00000002 nt!CmpFlushBackupHive+0x2fd
    9b9b3d38 8269068b 8253a13c 9269dad0 824dcdf2 nt!CmpSyncBackupHives+0x90
    9b9b3d44 824dcdf2 00000000 00000000 9269dad0 nt!CmpPeriodicBackupFlushWorker+0x32
    9b9b3d7c 8260e25e 00000000 060513cb 00000000 nt!ExpWorkerThread+0xfd
    9b9b3dc0 82475f4e 824dccf5 00000001 00000000 nt!PspSystemThreadStartup+0x9d
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16


    STACK_COMMAND:  kb

    FOLLOWUP_IP: 
    nt!CmpCheckKey+630
    825b42dc 394724          cmp     dword ptr [edi+24h],eax

    SYMBOL_STACK_INDEX:  2

    SYMBOL_NAME:  nt!CmpCheckKey+630

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: nt

    IMAGE_NAME:  ntkrpamp.exe

    DEBUG_FLR_IMAGE_TIMESTAMP:  589c8b38

    IMAGE_VERSION:  6.0.6002.19741

    FAILURE_BUCKET_ID:  0x50_nt!CmpCheckKey+630

    BUCKET_ID:  0x50_nt!CmpCheckKey+630

    ANALYSIS_SOURCE:  KM

    FAILURE_ID_HASH_STRING:  km:0x50_nt!cmpcheckkey+630

    FAILURE_ID_HASH:  {a6e9ed11-e155-b5b9-de78-448d5095bcde}

    Followup: MachineOwner
    ---------

    2017년 7월 25일 화요일 오전 3:22

답변