פורסם 2006 באפריל 1619 שנים Microsoft ® Windows Debugger Version 6.5.0003.7Copyright © Microsoft Corporation. All rights reserved.Loading Dump File [C:\WINDOWS\Minidump\Mini041606-01.dmp]Mini Kernel Dump File: Only registers and stack trace are availableSymbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbolsExecutable search path is: Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatibleProduct: WinNt, suite: TerminalServer SingleUserTSBuilt by: 2600.xpsp_sp2_gdr.050301-1519Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055a420Debug session time: Sun Apr 16 01:43:30.984 2006 (GMT+2)System Uptime: 0 days 5:27:30.569Loading Kernel Symbols...................................................................................................................................Loading unloaded module list.................Loading User Symbols******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck 10000050, {e27a4ffc, 0, 804d9da8, 1}Could not read faulting driver nameProbably caused by : win32k.sys ( win32k!vSrcCopyS32D32Identity+5b )Followup: MachineOwner---------kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************PAGE_FAULT_IN_NONPAGED_AREA (50)Invalid system memory was referenced. This cannot be protected by try-except,it must be protected by a Probe. Typically the address is just plain bad or itis pointing at freed memory.Arguments:Arg1: e27a4ffc, memory referenced.Arg2: 00000000, value 0 = read operation, 1 = write operation.Arg3: 804d9da8, If non-zero, the instruction address which referenced the bad memory address.Arg4: 00000001, (reserved)Debugging Details:------------------Could not read faulting driver nameREAD_ADDRESS: e27a4ffc FAULTING_IP: nt!memmove+33804d9da8 f3a5 rep movsdMM_INTERNAL_CODE: 1CUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: DRIVER_FAULTBUGCHECK_STR: 0x50LAST_CONTROL_TRANSFER: from bf83a167 to 804d9da8STACK_TEXT: b953b24c bf83a167 139f9fd4 e27a4ffc 00000080 nt!memmove+0x33b953b270 bf839e20 0001ff40 00000000 12a00054 win32k!vSrcCopyS32D32Identity+0x5bb953b484 bf847c49 e28ba880 00000000 00000000 win32k!EngCopyBits+0x51ab953b540 bf8482a4 00000000 e27ab000 00020020 win32k!GreGetDIBitsInternal+0x795b953b5d8 804de7ec 080104a0 c1051c70 00000000 win32k!NtGdiGetDIBitsInternal+0x27eb953b5d8 7c95eb94 080104a0 c1051c70 00000000 nt!KiFastCallEntry+0xf8WARNING: Frame IP not in any known module. Following frames may be wrong.013bf21c 00000000 00000000 00000000 00000000 0x7c95eb94FOLLOWUP_IP: win32k!vSrcCopyS32D32Identity+5bbf83a167 83c40c add esp,0xcSYMBOL_STACK_INDEX: 1FOLLOWUP_NAME: MachineOwnerSYMBOL_NAME: win32k!vSrcCopyS32D32Identity+5bMODULE_NAME: win32kIMAGE_NAME: win32k.sysDEBUG_FLR_IMAGE_TIMESTAMP: 43446a58STACK_COMMAND: kbFAILURE_BUCKET_ID: 0x50_win32k!vSrcCopyS32D32Identity+5bBUCKET_ID: 0x50_win32k!vSrcCopyS32D32Identity+5bFollowup: MachineOwner---------
פורסם 2006 באפריל 2019 שנים תעיין פה ותעלה תקבצי דאמפ..http://hwzone.co.il/community/index.php?topic=124642.0
ארכיון
דיון זה הועבר לארכיון ולא ניתן להוסיף בו תגובות חדשות.