i've been having a lot of bsods, and never tied to one driver, ntfs.sys, win.sys kfil.sys
here's what ive found thus far but i don t know what step to take next.
help
Loading Dump File [C:\WINDOWS\Minidump\Mini013108-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 2) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp2_gdr.070227-2254
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700
Debug session time: Thu Jan 31 15:06:05.859 2008 (GMT-8)
System Uptime: 0 days 0:00:39.562
Loading Kernel Symbols
...................................................................................................................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c000001d, 805232b6, b9ee7a20, 0}
Probably caused by : memory_corruption ( nt!MiDeleteVirtualAddresses+196 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c000001d, The exception code that was not handled
Arg2: 805232b6, The address that the exception occurred at
Arg3: b9ee7a20, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
FAULTING_IP:
nt!MiDeleteVirtualAddresses+196
805232b6 0f861dffffff jbe nt!MiDeleteVirtualAddresses+0xb9 (805231d9)
TRAP_FRAME: b9ee7a20 -- (.trap 0xffffffffb9ee7a20)
ErrCode = 00000000
eax=00000000 ebx=c0010588 ecx=c0883000 edx=2de17867 esi=c0600080 edi=020b1000
eip=805232b6 esp=b9ee7a94 ebp=b9ee7b3c iopl=0 nv up ei ng nz ac po cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010293
nt!MiDeleteVirtualAddresses+0x196:
805232b6 0f861dffffff jbe nt!MiDeleteVirtualAddresses+0xb9 (805231d9) [br=1]
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: svchost.exe
LAST_CONTROL_TRANSFER: from 80519954 to 805232b6
FAILED_INSTRUCTION_ADDRESS:
nt!MiDeleteVirtualAddresses+196
805232b6 0f861dffffff jbe nt!MiDeleteVirtualAddresses+0xb9 (805231d9)
STACK_TEXT:
b9ee7b3c 80519954 00000008 020effff 00000000 nt!MiDeleteVirtualAddresses+0x196
b9ee7b58 805b1e24 020b0000 020effff b9ee7c10 nt!MiDeleteFreeVm+0x20
b9ee7bf8 8054086c ffffffff b9ee7cd4 b9ee7cd8 nt!NtFreeVirtualMemory+0x42e
b9ee7bf8 804ff8e1 ffffffff b9ee7cd4 b9ee7cd8 nt!KiFastCallEntry+0xfc
b9ee7c80 805d0e4e ffffffff b9ee7cd4 b9ee7cd8 nt!ZwFreeVirtualMemory+0x11
b9ee7d14 805d1150 00000000 00000000 861f1370 nt!PspExitThread+0x4e2
b9ee7d34 805d1490 861f1370 00000000 b9ee7d64 nt!PspTerminateThreadByPointer+0x52
b9ee7d54 8054086c 00000000 00000000 020effb4 nt!NtTerminateThread+0x70
b9ee7d54 7c90eb94 00000000 00000000 020effb4 nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
020effb4 00000000 00000000 00000000 00000000 0x7c90eb94
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiDeleteVirtualAddresses+196
805232b6 0f861dffffff jbe nt!MiDeleteVirtualAddresses+0xb9 (805231d9)
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiDeleteVirtualAddresses+196
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 45e53f9d
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0x8E_BAD_IP_nt!MiDeleteVirtualAddresses+196
BUCKET_ID: 0x8E_BAD_IP_nt!MiDeleteVirtualAddresses+196
Followup: MachineOwner
---------
here's what ive found thus far but i don t know what step to take next.
help
Loading Dump File [C:\WINDOWS\Minidump\Mini013108-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 2) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp2_gdr.070227-2254
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700
Debug session time: Thu Jan 31 15:06:05.859 2008 (GMT-8)
System Uptime: 0 days 0:00:39.562
Loading Kernel Symbols
...................................................................................................................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c000001d, 805232b6, b9ee7a20, 0}
Probably caused by : memory_corruption ( nt!MiDeleteVirtualAddresses+196 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c000001d, The exception code that was not handled
Arg2: 805232b6, The address that the exception occurred at
Arg3: b9ee7a20, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
FAULTING_IP:
nt!MiDeleteVirtualAddresses+196
805232b6 0f861dffffff jbe nt!MiDeleteVirtualAddresses+0xb9 (805231d9)
TRAP_FRAME: b9ee7a20 -- (.trap 0xffffffffb9ee7a20)
ErrCode = 00000000
eax=00000000 ebx=c0010588 ecx=c0883000 edx=2de17867 esi=c0600080 edi=020b1000
eip=805232b6 esp=b9ee7a94 ebp=b9ee7b3c iopl=0 nv up ei ng nz ac po cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010293
nt!MiDeleteVirtualAddresses+0x196:
805232b6 0f861dffffff jbe nt!MiDeleteVirtualAddresses+0xb9 (805231d9) [br=1]
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: svchost.exe
LAST_CONTROL_TRANSFER: from 80519954 to 805232b6
FAILED_INSTRUCTION_ADDRESS:
nt!MiDeleteVirtualAddresses+196
805232b6 0f861dffffff jbe nt!MiDeleteVirtualAddresses+0xb9 (805231d9)
STACK_TEXT:
b9ee7b3c 80519954 00000008 020effff 00000000 nt!MiDeleteVirtualAddresses+0x196
b9ee7b58 805b1e24 020b0000 020effff b9ee7c10 nt!MiDeleteFreeVm+0x20
b9ee7bf8 8054086c ffffffff b9ee7cd4 b9ee7cd8 nt!NtFreeVirtualMemory+0x42e
b9ee7bf8 804ff8e1 ffffffff b9ee7cd4 b9ee7cd8 nt!KiFastCallEntry+0xfc
b9ee7c80 805d0e4e ffffffff b9ee7cd4 b9ee7cd8 nt!ZwFreeVirtualMemory+0x11
b9ee7d14 805d1150 00000000 00000000 861f1370 nt!PspExitThread+0x4e2
b9ee7d34 805d1490 861f1370 00000000 b9ee7d64 nt!PspTerminateThreadByPointer+0x52
b9ee7d54 8054086c 00000000 00000000 020effb4 nt!NtTerminateThread+0x70
b9ee7d54 7c90eb94 00000000 00000000 020effb4 nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
020effb4 00000000 00000000 00000000 00000000 0x7c90eb94
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiDeleteVirtualAddresses+196
805232b6 0f861dffffff jbe nt!MiDeleteVirtualAddresses+0xb9 (805231d9)
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiDeleteVirtualAddresses+196
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 45e53f9d
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0x8E_BAD_IP_nt!MiDeleteVirtualAddresses+196
BUCKET_ID: 0x8E_BAD_IP_nt!MiDeleteVirtualAddresses+196
Followup: MachineOwner
---------
