Archiv Windows 2000 Workstation 748 Themen, 3.842 Beiträge

feherhafte Treibert auffinden

Siggi23 / 3 Antworten / Flachansicht Nickles

Mein Rechner stürtzt immer wieder ab. In der Anlage schicke ich mal das Ergebnis von Minidump mit. Meint ihr, daß Ihr mir helfen könnt?

Ich bin hier hoffnungslos überfordert.

Hier das Dumpfile:

Microsoft (R) Windows Debugger Version 6.4.0007.2
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINNT\Minidump\Mini020409-10.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: C:\symbols\symbols
Executable search path is:
Unable to load image ntoskrnl.exe, Win32 error 2
Windows 2000 Kernel Version 2195 (Service Pack 4) UP Free x86 compatible
Kernel base = 0x80400000 PsLoadedModuleList = 0x804814c0
Debug session time: Wed Feb 4 17:22:11.813 2009 (GMT+1)
System Uptime: not available
Unable to load image ntoskrnl.exe, Win32 error 2
Loading Kernel Symbols
......................................................................................................................................
Loading unloaded module list
........
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 0, 0, 0}

Probably caused by : ntoskrnl.exe ( nt!KiTrap08+3e )

Followup: MachineOwner
---------

kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
Arg2: 00000000
Arg3: 00000000
Arg4: 00000000

Debugging Details:
------------------


OVERLAPPED_MODULE: s3nb

BUGCHECK_STR: 0x7f_8

TSS: 00000000 -- (.tss 0)

CUSTOMER_CRASH_COUNT: 10

DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT

LAST_CONTROL_TRANSFER: from 00000000 to 80466d69

STACK_TEXT:
00000000 00000000 00000000 00000000 00000000 nt!KiTrap08+0x3e


FOLLOWUP_IP:
nt!KiTrap08+3e
80466d69 ?? ???

SYMBOL_STACK_INDEX: 0

FOLLOWUP_NAME: MachineOwner

SYMBOL_NAME: nt!KiTrap08+3e

MODULE_NAME: nt

IMAGE_NAME: ntoskrnl.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 427b58bb

STACK_COMMAND: .tss 0 ; kb

FAILURE_BUCKET_ID: 0x7f_8_nt!KiTrap08+3e

BUCKET_ID: 0x7f_8_nt!KiTrap08+3e

Followup: MachineOwner
---------

Ende des Dumpfiles


Für eure Hilfe wäre ich euch sehr dankbar

Siegfried