Selam herkese. Bilgisayarım 1 ay kadar bir süredir durup dururken mavi ekran ve "Driver_irql_not_less_or_equal" hatası vermeye başladı. Windows debuggerla aşağıdaki dump verilerine ulaştım ama nasıl yorumlayacağım hakkında hiçbir fikrim yok. Bilgili arkadaşlardan çok rica ediyorum, bi el atın nolur.
Selam herkese. Bilgisayarım 1 ay kadar bir süredir durup dururken mavi ekran ve "Driver_irql_not_less_or_equal" hatası vermeye başladı. Windows debuggerla aşağıdaki dump verilerine ulaştım ama nasıl yorumlayacağım hakkında hiçbir fikrim yok. Bilgili arkadaşlardan çok rica ediyorum, bi el atın nolur.
Microsoft (R) Windows Debugger Version 6.2.9200.20512 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\New folder\070613-42229-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Symbols*
msdl.microsoft.comExecutable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.18113.amd64fre.win7sp1_gdr.130318-1533
Machine Name:
Kernel base = 0xfffff800
0344c000 PsLoadedModuleList = 0xfffff8000368f670
Debug session time: Sat Jul 6 20:30:17.456 2013 (UTC + 3:00)
System Uptime: 0 days 2:42:35.377
Loading Kernel Symbols
...............................................................
................................................................
...........................................................
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {28, 2, 0, fffff880016106fd}
Probably caused by : NETIO.SYS ( NETIO!RtlCopyBufferToMdl+1d )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880016106fd, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036f9100
GetUlongFromAddress: unable to read from fffff800036f91c0
0000000000000028 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
NETIO!RtlCopyBufferToMdl+1d
fffff880016106fd 448b5228 mov r10d,dword ptr [rdx+28h]
CUSTOMER_CRASH_COUNT
*016106fd 448b5228 mov r10d,dword ptr [rdx+28h] ds:0000000000000028=????????
Resetting default scope
LAST_CONTROL_TRANSFER
*035615a8 fffff800034c11a9
*0000000a 00000000
00000028 0000000000000002 0000000000000000
*035615b0 fffff800034bfe20
*035629e8 fffff880
03561768 fffffa8008950170 0000000000000044
*035616f0 fffff880016106fd
*00000075 fffff880
018169ec 000000000000000a fffffa8004600bc8
*03561880 fffff880018a55fc
*00000000 fffff880
01874756 0000000000000000 0000000000000000
*035618e0 fffff88001872273
*07b61b00 00000000
00000000 fffffa80042b3840 000000008ed55a53
*string'+0x1cc2f
fffff880
03561950 fffff88001863204 : fffff880
03561e08 0000000000000029 fffffa80
042b3840 0000000000000000 : tcpip!TcpTcbCarefulDatagram+0x1aa3
fffff880
03561b00 fffff8800186269a : fffffa80
04fbea00 fffff8800185b544 fffffa80
04f595b0 0000000000000000 : tcpip!TcpTcbReceive+0x694
fffff880
03561cb0 fffff88001863c3b : fffff880
09f7706c fffffa80050e9000 00000000
00000000 fffff88003562000 : tcpip!TcpMatchReceive+0x1fa
fffff880
03561e00 fffff8800185bbd7 : fffffa80
04fbea00 fffffa8004fbd3eb fffffa80
0000199f 000000000000199f : tcpip!TcpPreValidatedReceive+0x36b
fffff880
03561ed0 fffff8800185b74a : 00000000
00000000 fffff88001969800 fffff880
03562090 00001f8000a00049 : tcpip!IppDeliverListToProtocol+0x97
fffff880
03561f90 fffff8800185ad49 : 00000000
00000000 0000000000000000 00000000
00000000 fffff88003562080 : tcpip!IppProcessDeliverList+0x5a
fffff880
03562030 fffff880018589ef : 00000000
00000000 0000000007505b00 fffff880
01969800 fffff88001969800 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880
03562110 fffff88001857fc2 : fffffa80
07506260 0000000000000000 fffffa80
07505b00 0000000000000001 : tcpip!IpFlcReceivePackets+0x64f
fffff880
03562310 fffff880018ca68a : fffffa80
00000000 fffffa80085cdce0 fffffa80
07505ba0 fffff88003562400 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880
035623f0 fffff800034cd878 : fffffa80
085cdce0 fffffa8004fabcec fffffa80
04075730 0000000000000001 : tcpip! ?? ::FNODOBFM::
string'+0x4e922
fffff88003562440 fffff88001857ae2
*01857310 fffffa80
0954cf10 fffffa800948f500 fffffa800537c501
*03562520 fffff880017960eb
*075025f0 00000000
00000000 fffffa800546b1a0 0000000000000000
*03562590 0000000000000000
*00000000 00000000
00000000 0000000000000000 0000000000000000
*016106fd 448b5228 mov r10d,dword ptr [rdx+28h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: NETIO!RtlCopyBufferToMdl+1d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 5034f6a0
FAILURE_BUCKET_ID: X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
BUCKET_ID: X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
Followup: MachineOwner
Şimdiden çok teşekkür ederim