From: ePAc <ep...@ko...> - 2004-02-03 01:34:52
|
> and i'm on my way to get this working.. :o) and this is the output of "r" "kv" and "!analyze -v" ... anyone want to take a stab at this ? :o) (and optionally i can run this with the pdb files, if they are available somewhere :o) Thanks, Jok ------------------------------8<-------------------------------- Microsoft (R) Windows Debugger Version 6.2.0013.1 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\colinux\memory1.dmp] Kernel Dump File: Full address space is available Symbol search path is: SRV*C:\websymbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows XP Kernel Version 2600 (Service Pack 1) UP Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Built by: 2600.xpsp2.030422-1633 Kernel base = 0x804d4000 PsLoadedModuleList = 0x80543530 Debug session time: Mon Feb 02 14:34:10 2004 System Uptime: 0 days 0:06:55.211 Loading Kernel Symbols ......................................................................................................................................... Loading unloaded module list ............. Loading User Symbols ......... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck BE, {eea5e000, 81ec1b38, eebe0aa8, e} *** ERROR: Module load completed but symbols could not be loaded for linux.sys *** ERROR: Module load completed but symbols could not be loaded for colinux-daemon.exe *** ERROR: Symbol file could not be found. Defaulted to export symbols for cygwin1.dll - Probably caused by : linux.sys ( linux+1926 ) Followup: MachineOwner --------- kd> r eax=ffdff13c ebx=000000be ecx=00000000 edx=40000000 esi=c03ba978 edi=806abfac eip=804f4103 esp=eebe0a2c ebp=eebe0a44 iopl=0 nv up ei ng nz na po nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00000286 nt!KeBugCheckEx+0x19: 804f4103 5d pop ebp kd> KV ChildEBP RetAddr Args to Child eebe0a44 80511b47 000000be eea5e000 81ec1b38 nt!KeBugCheckEx+0x19 (FPO: [Non-Fpo]) eebe0a90 80530140 00000001 eea5e000 00000000 nt!MmAccessFault+0x6cf (FPO: [Non-Fpo]) eebe0a90 eeda2926 00000001 eea5e000 00000000 nt!KiTrap0E+0xb8 (FPO: [0,0] TrapFrame @ eebe0aa8) WARNING: Stack unwind information not available. Following frames may be wrong. eebe0b24 eeda32c7 ef28c000 00000000 00000000 linux+0x1926 eebe0b44 eeda3b31 ef28c000 00000000 00000000 linux+0x22c7 eebe0b64 eeda513e ef28c000 001f03ff 00000000 linux+0x2b31 eebe0ba4 eeda5675 ef28c000 81e89938 00000000 linux+0x413e eebe0be4 eeda5da4 81d8a9e8 00000013 81e89938 linux+0x4675 eebe0c34 804ea221 81d8a930 81ca6930 806abfe0 linux+0x4da4 eebe0c44 8055d0fe 81ca69a0 81d54d60 81ca6930 nt!IopfCallDriver+0x31 (FPO: [0,0,1]) eebe0c58 8055de46 81d8a930 81ca6930 81d54d60 nt!IopSynchronousServiceTail+0x5e (FPO: [Non-Fpo]) eebe0d00 80556cea 0000072c 00000000 00000000 nt!IopXxxControlFile+0x5c2 eebe0d34 8052d571 0000072c 00000000 00000000 nt!NtDeviceIoControlFile+0x28 (FPO: [Non-Fpo]) eebe0d34 7ffe0304 0000072c 00000000 00000000 nt!KiSystemService+0xc4 (FPO: [0,0] TrapFrame @ eebe0d64) 0022fba4 77f5b864 77e75630 0000072c 00000000 SharedUserData!SystemCallStub+0x4 (FPO: [0,0,0]) 0022fba8 77e75630 0000072c 00000000 00000000 ntdll!ZwDeviceIoControlFile+0xc (FPO: [10,0,0]) 0022fc08 00402f27 0000072c 8300004c 0022fcc0 kernel32!DeviceIoControl+0xdd (FPO: [Non-Fpo]) 0022fc38 00401b7e 0a040458 00000013 0022fcc0 colinux_daemon+0x2f27 0022fc68 00401bb0 0a040458 00000000 00000002 colinux_daemon+0x1b7e 0022fc98 0040158d 0a040458 00000000 00000002 colinux_daemon+0x1bb0 kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* ATTEMPTED_WRITE_TO_READONLY_MEMORY (be) An attempt was made to write to readonly memory. The guilty driver is on the stack trace (and is typically the current instruction pointer). When possible, the guilty driver's name (Unicode string) is printed on the bugcheck screen and saved in KiBugCheckDriver. Arguments: Arg1: eea5e000, Virtual address for the attempted write. Arg2: 81ec1b38, PTE contents. Arg3: eebe0aa8, (reserved) Arg4: 0000000e, (reserved) Debugging Details: ------------------ DEFAULT_BUCKET_ID: DRIVER_FAULT BUGCHECK_STR: 0xBE TRAP_FRAME: eebe0aa8 -- (.trap ffffffffeebe0aa8) ErrCode = 00000002 eax=ee9df000 ebx=ef28c000 ecx=00000000 edx=0001fc00 esi=00000000 edi=00000000 eip=eeda2926 esp=eebe0b1c ebp=eebe0b24 iopl=0 nv up ei ng nz na po cy cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010287 linux+0x1926: eeda2926 c7049000000000 mov dword ptr [eax+edx*4],0x0 ds:0023:eea5e000=???????? Resetting default scope LAST_CONTROL_TRANSFER: from eeda32c7 to eeda2926 STACK_TEXT: WARNING: Stack unwind information not available. Following frames may be wrong. eebe0b24 eeda32c7 ef28c000 00000000 00000000 linux+0x1926 eebe0b44 eeda3b31 ef28c000 00000000 00000000 linux+0x22c7 eebe0b64 eeda513e ef28c000 001f03ff 00000000 linux+0x2b31 eebe0ba4 eeda5675 ef28c000 81e89938 00000000 linux+0x413e eebe0be4 eeda5da4 81d8a9e8 00000013 81e89938 linux+0x4675 eebe0c34 804ea221 81d8a930 81ca6930 806abfe0 linux+0x4da4 eebe0c44 8055d0fe 81ca69a0 81d54d60 81ca6930 nt!IopfCallDriver+0x31 eebe0c58 8055de46 81d8a930 81ca6930 81d54d60 nt!IopSynchronousServiceTail+0x5e eebe0d00 80556cea 0000072c 00000000 00000000 nt!IopXxxControlFile+0x5c2 eebe0d34 8052d571 0000072c 00000000 00000000 nt!NtDeviceIoControlFile+0x28 eebe0d34 7ffe0304 0000072c 00000000 00000000 nt!KiSystemService+0xc4 0022fba4 77f5b864 77e75630 0000072c 00000000 SharedUserData!SystemCallStub+0x4 0022fba8 77e75630 0000072c 00000000 00000000 ntdll!ZwDeviceIoControlFile+0xc 0022fc08 00402f27 0000072c 8300004c 0022fcc0 kernel32!DeviceIoControl+0xdd 0022fc38 00401b7e 0a040458 00000013 0022fcc0 colinux_daemon+0x2f27 0022fc68 00401bb0 0a040458 00000000 00000002 colinux_daemon+0x1b7e 0022fc98 0040158d 0a040458 00000000 00000002 colinux_daemon+0x1bb0 0022fcd8 00401767 0a040458 00000000 00000002 colinux_daemon+0x158d 0022fcf8 0040401a 0a040448 0022fd18 0022fe58 colinux_daemon+0x1767 0022fe58 00407400 00400000 00000000 00242372 colinux_daemon+0x401a 0022fed0 61005018 00000001 0a040418 0a040330 colinux_daemon+0x7400 0022ff40 610052ed 610cfee0 fffffffe 000007d0 cygwin1!forkpty+0x3688 0022ff90 00407453 00000000 00000000 00000001 cygwin1!dll_crt0+0x1ad 0022ffb0 0040103c 00407380 037f0009 0022fff0 colinux_daemon+0x7453 0022ffc0 77e814c7 00000000 00000002 7ffdf000 colinux_daemon+0x103c 0022fff0 00000000 00401000 00000000 78746341 kernel32!BaseProcessStart+0x23 FOLLOWUP_IP: linux+1926 eeda2926 c7049000000000 mov dword ptr [eax+edx*4],0x0 FOLLOWUP_NAME: MachineOwner SYMBOL_NAME: linux+1926 MODULE_NAME: linux IMAGE_NAME: linux.sys DEBUG_FLR_IMAGE_TIMESTAMP: 401becfb STACK_COMMAND: .trap ffffffffeebe0aa8 ; kb BUCKET_ID: 0xBE_linux+1926 Followup: MachineOwner --------- --- Nothing is foolproof to a sufficiently talented fool... oo ,(..)\ ~~ |