Přidat otázku mezi oblíbenéZasílat nové odpovědi e-mailemVyřešeno Samovolné restartováni PC s chybou Sysdata.xml

Loading User Symbols
Loading unloaded module list
.............
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************

Use !analyze -v to get detailed debugging information.

BugCheck 100000D1, {4863604, 2, 0, f717851c}

Probably caused by : memory_corruption

Followup: memory_corruption
---------

kd> !analyze -v
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 04863604, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: f717851c, address which referenced memory


Debugging Details:
------------------


READ_ADDRESS: 04863604

CURRENT_IRQL: 2
FAULTING_IP:
USBPORT!USBPORT_FlushCancelList+366
f717851c 837b1400 cmp dword ptr [ebx+14h],0

DEFAULT_BUCKET_ID: CODE_CORRUPTION

BUGCHECK_STR: 0xD1

PROCESS_NAME: System

LAST_CONTROL_TRANSFER: from f7181afc to f717851c

STACK_TEXT:
f7aadce8 f7181afc 0209a008 804e2eb4 8609a008 USBPORT!USBPORT_FlushCancelList+0x366
f7aadd10 f7177b7c 85fc4008 804e2eb4 8609a008 USBPORT!USBPORT_RootHub_EndpointWorker+0x516
f7aadd38 f717b5ea 8635f028 00000003 8635f028 USBPORT!USBPORT_CoreEndpointWorker+0x6d2
f7aadd7c f71741b0 8635f028 00000000 86222bc0 USBPORT!USBPORT_Worker+0x212
f7aaddac 8057aeff 8635f028 00000000 00000000 USBPORT!USBPORT_WorkerThread+0x12a
f7aadddc 804f88ea f7174086 8635f028 00000000 nt!PspSystemThreadStartup+0x34
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16


STACK_COMMAND: kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
804e26f4-804e26f7 4 bytes - nt!KiServiceTable+4c
[ ba 24 5a 80:10 b6 ea ee ]
804e278c-804e278f 4 bytes - nt!KiServiceTable+e4 (+0x98)
[ cd b1 65 80:10 bc ea ee ]
804e27b8-804e27bb 4 bytes - nt!KiServiceTable+110 (+0x2c)
[ e0 15 57 80:30 b7 ea ee ]
804e2890-804e2893 4 bytes - nt!KiServiceTable+1e8 (+0xd8)
[ c7 17 57 80:b0 b4 ea ee ]
804e28a8-804e28ab 4 bytes - nt!KiServiceTable+200 (+0x18)
[ bd a1 58 80:70 b5 ea ee ]
804e28cc-804e28cf 4 bytes - nt!KiServiceTable+224 (+0x24)
[ b1 1c 57 80:d0 b6 ea ee ]
804e29fc-804e29ff 4 bytes - nt!KiServiceTable+354 (+0x130)
[ df dc 62 80:90 b6 ea ee ]
804e2a3c-804e2a3f 4 bytes - nt!KiServiceTable+394 (+0x40)
[ 76 55 57 80:50 b6 ea ee ]
804e2a5c-804e2a5f 4 bytes - nt!KiServiceTable+3b4 (+0x20)
[ 9b b1 59 80:d0 b7 ea ee ]
804e2a9c-804e2aa3 8 bytes - nt!KiServiceTable+3f4 (+0x40)
[ c1 f8 62 80 5e 04 5e 80:10 b5 ea ee 90 b5 ea ee ]
804e2aac-804e2ab3 8 bytes - nt!KiServiceTable+404 (+0x10)
[ e0 22 58 80 85 b8 57 80:d0 b4 ea ee d0 b5 ea ee ]
804e2afc-804e2aff 4 bytes - nt!KiServiceTable+454 (+0x50)
[ 20 e4 57 80:50 b7 ea ee ]
56 errors : !nt (804e26f4-804e2aff)

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

FOLLOWUP_NAME: memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP: 0

MEMORY_CORRUPTOR: LARGE

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE

BUCKET_ID: MEMORY_CORRUPTION_LARGE

Followup: memory_corruption
---------

Reakce na odpověď

1 Zadajte svou přezdívku:
2 Napište svou odpověď:
3 Pokud chcete dostat ban, zadejte libovolný text:

Zpět do poradny