2008/03/22

MEMORY.DMP - DRIVER_VERIFIER_DETECTED_VIOLATION (c4)

Loading Dump File [C:\WINNT\MEMORY.DMP]
Kernel Complete Dump File: Full address space is available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols;C:\WINDDK\pmdnf\objchk\i386
Executable search path is:
Windows 2000 Kernel Version 2195 (Service Pack 4) MP (4 procs) Free x86 compatible
Product: Server, suite: TerminalServer SingleUserTS
Kernel base = 0x80400000 PsLoadedModuleList = 0x80485b80
Debug session time: Sat Mar 22 03:39:46.828 2008 (GMT+9)
System Uptime: 0 days 0:00:39.671

Use !analyze -v to get detailed debugging information.

BugCheck C4, {0, 0, 1, 0}

*** ERROR: Module load completed but symbols could not be loaded for aw_host5.sys
*** ERROR: Module load completed but symbols could not be loaded for ati2drad.DLL
*** ERROR: Module load completed but symbols could not be loaded for awvid5.dll
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for winsrv.dll -
Probably caused by : aw_host5.sys ( aw_host5+1f30 )

Followup: MachineOwner

DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
A device driver attempting to corrupt the system has been caught.  This is
because the driver was specified in the registry as being suspect (by the
administrator) and the kernel has enabled substantial checking of this driver.
If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
be among the most commonly seen crashes.
        Parameter 1 = 0x1000 .. 0x1020 - deadlock verifier error codes.
               Typically the code is 0x1001 (deadlock detected) and you can
               issue a '!deadlock' KD command to get more information.
Arguments:
Arg1: 00000000, caller is trying to allocate zero bytes
Arg2: 00000000, current IRQL
Arg3: 00000001, pool type
Arg4: 00000000, number of bytes

Debugging Details:
------------------


BUGCHECK_STR:  0xc4_0

CURRENT_IRQL:  0

DEFAULT_BUCKET_ID:  INTEL_CPU_MICROCODE_ZERO

PROCESS_NAME:  csrss.exe

LAST_CONTROL_TRANSFER:  from 805329d0 to 8052d1ec

STACK_TEXT: 
f652f2f4 805329d0 00000001 00000000 746e7741 nt!ExAllocatePoolSanityChecks+0x2c
f652f314 8053239a 00000001 00000000 746e7741 nt!VeAllocatePoolWithTagPriority+0x14
f652f338 f6731f30 00000001 00000000 746e7741 nt!VerifierAllocatePoolWithTag+0x44
WARNING: Stack unwind information not available. Following frames may be wrong.
f652f380 8052d926 88ea65f0 baf79f20 00000000 aw_host5+0x1f30
f652f3cc 8052d563 00000000 baf79f38 88e800f0 nt!IovSpecialIrpCompleteRequest+0x18c
f652f3e4 f6447889 88e80038 80064d18 88ea8530 nt!IovCompleteRequest+0x27
f652f428 8052dcd6 88e80038 baf79f20 baf79f20 VIDEOPRT!pVideoPortDispatch+0x53d
f652f474 8052d4cf 88ea66a8 baf79ff4 baf79f20 nt!IovSpecialIrpCallDriver+0xcd
f652f490 f6731bf7 88ea65f0 baf79f20 88ea65f0 nt!IovCallDriver+0x31
f652f4a4 f67306eb 88ea65f0 88ea66a8 88ea65f0 aw_host5+0x1bf7
f652f508 8052d4cf baf79f20 80064d18 00000000 aw_host5+0x6eb
f652f524 a005d6af f652f5ec f652f5c0 00000000 nt!IovCallDriver+0x31
f652f554 a005d712 88ea65f0 00230400 f652f5a4 win32k!GreDeviceIoControl+0xa5
f652f578 a0198527 88ea65f0 00230400 f652f5a4 win32k!EngDeviceIoControl+0x1d
f652f5a8 a01978a9 88ea65f0 f652f5c0 f652f5bc ati2drad+0x3527
f652f5c8 a01924c5 88ea65f0 00000000 00000000 ati2drad+0x28a9
f652f5f0 a0191e6e a0191db8 baebffd0 00000000 awvid5+0x14c5
f652f608 a00c34b4 88ea65f0 00000000 00000000 awvid5+0xe6e
f652f62c a00c56c9 baec5e78 88ea65f0 f652f650 win32k!ldevGetDriverModes+0x33
f652f65c a00c5ef0 00000000 00000000 f652fb44 win32k!DrvBuildDevmodeList+0xa4
f652f6ec a00c898e badf9f88 f652fbf4 f652fbc0 win32k!DrvProbeAndCaptureDevmode+0x3ac
f652fbf8 a00c94e2 00000000 00000000 00000001 win32k!DrvCreateMDEV+0x3bd
f652fcf4 a007cbe5 00000000 00000000 00000000 win32k!DrvChangeDisplaySettings+0x279
f652fd34 a0071d55 00000000 f652fd64 0015fd9c win32k!InitVideo+0x27
f652fd48 a007d12b f652fd64 80468389 889c2008 win32k!UserInitialize+0x9a
f652fd50 80468389 889c2008 00000068 0000006c win32k!NtUserInitialize+0x99
f652fd50 5ffcd789 889c2008 00000068 0000006c nt!KiSystemService+0xc9
0015fdb4 5ff833f3 00163cf0 00162a33 00162a4f winsrv!UserSoundSentry+0x1ed15
0015fe2c 5ff823ff 00162a2c 00162a33 00000003 CSRSRV!CsrLoadServerDll+0x1bf
0015ff78 5ff82035 0000000a 00162800 00000000 CSRSRV!CsrParseServerCommandLine+0x27f
0015ff94 5fff1107 0000000a 001627e8 0016285c CSRSRV!CsrServerInitialization+0x95
0015ffb4 5fff12bd 0000000a 001627e8 00162814 csrss!main+0x4d
0015fff4 00000000 7ffdf000 000000c8 00000100 csrss!NtProcessStartup+0x18d


STACK_COMMAND:  kb

FOLLOWUP_IP:
aw_host5+1f30
f6731f30 894370          mov     dword ptr [ebx+70h],eax

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  aw_host5+1f30

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: aw_host5

IMAGE_NAME:  aw_host5.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  3bd478a0

FAILURE_BUCKET_ID:  0xc4_0_VRF_aw_host5+1f30

BUCKET_ID:  0xc4_0_VRF_aw_host5+1f30

Followup: MachineOwner
---------

2: kd> lmvm aw_host5
start    end        module name
f6730000 f6737280   aw_host5   (no symbols)          
    Loaded symbol image file: aw_host5.sys
    Image path: \SystemRoot\system32\drivers\aw_host5.sys
    Image name: aw_host5.sys
    Timestamp:        Tue Oct 23 04:50:56 2001 (3BD478A0)
    CheckSum:         00012985
    ImageSize:        00007280
    File version:     10.5.0.469
    Product version:  5.0.2195.1620
    File flags:       8 (Mask 3F) Private
    File OS:          40004 NT Win32
    File type:        3.7 Driver
    File date:        00000000.00000000
    Translations:     0000.04b0
    CompanyName:      Symantec Corporation
    ProductName:      pcAnywhere
    InternalName:     AW_HOST5.SYS
    OriginalFilename: AW_HOST5.SYS
    ProductVersion:   10.5.0
    FileVersion:      10.5.0
    FileDescription:  pcAnywhere Host Driver for Windows 2000
    LegalCopyright:   Copyright (c) 1991-2000 Symantec Corporation


댓글 없음:

댓글 쓰기

가장 많이 본 글