Daha fazla
- Cinsiyet
- Erkek
- Profil Kapağı
- 1522743131
Genelde bozuk RAM'den kaynaklanan bir mavi ekran hatası.
Kod:
Windows 8 Kernel Version 9200 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 9200.16581.amd64fre.win8_gdr.130410-1505
Machine Name:
Kernel base = 0xfffff801`5ba04000 PsLoadedModuleList = 0xfffff801`5bcd0a20
Debug session time: Tue May 28 19:28:16.320 2013 (UTC - 4:00)
System Uptime: 4 days 16:58:31.622
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffd0, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff8015baa2ba3, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8015bd5c168
GetUlongFromAddress: unable to read from fffff8015bd5c1f8
ffffffffffffffd0
FAULTING_IP:
nt!ObfDereferenceObject+23
fffff801`5baa2ba3 f0480fc15ed0 lock xadd qword ptr [rsi-30h],rbx
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: taskhostex.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88018ced420 -- (.trap 0xfffff88018ced420)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88018ced620 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8801bdd9620 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015baa2ba3 rsp=fffff88018ced5b0 rbp=0000000000000001
r8=fffff88018ced620 r9=fffffa8007703450 r10=fffff880047cfa00
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ObfDereferenceObject+0x23:
fffff801`5baa2ba3 f0480fc15ed0 lock xadd qword ptr [rsi-30h],rbx ds:ffffffff`ffffffd0=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8015bb1f3f1 to fffff8015ba5e440
STACK_TEXT:
fffff880`18ced238 fffff801`5bb1f3f1 : 00000000`00000050 ffffffff`ffffffd0 00000000`00000001 fffff880`18ced420 : nt!KeBugCheckEx
fffff880`18ced240 fffff801`5ba98acb : 00000000`00000001 ffffffff`ffffffd0 fffffa80`08fb7240 fffffa80`0af7f800 : nt! ?? ::FNODOBFM::`string'+0x33c2b
fffff880`18ced2e0 fffff801`5ba5beee : 00000000`00000001 ffffffff`ffffffff 00000000`00000000 fffff880`18ced420 : nt!MmAccessFault+0x55b
fffff880`18ced420 fffff801`5baa2ba3 : 00000000`00000001 fffffa80`076f31b0 fffffa80`076f31b0 fffffa80`08fb7240 : nt!KiPageFault+0x16e
fffff880`18ced5b0 fffff880`188d715d : fffffa80`04554b00 00000000`00001240 00000000`00000002 fffff880`188d13c7 : nt!ObfDereferenceObject+0x23
fffff880`18ced5f0 fffffa80`04554b00 : 00000000`00001240 00000000`00000002 fffff880`188d13c7 fffffa80`04554b28 : idmwfp+0x815d
fffff880`18ced5f8 00000000`00001240 : 00000000`00000002 fffff880`188d13c7 fffffa80`04554b28 fffff880`01f70000 : 0xfffffa80`04554b00
fffff880`18ced600 00000000`00000002 : fffff880`188d13c7 fffffa80`04554b28 fffff880`01f70000 00000000`00000000 : 0x1240
fffff880`18ced608 fffff880`188d13c7 : fffffa80`04554b28 fffff880`01f70000 00000000`00000000 fffffa80`04554b28 : 0x2
fffff880`18ced610 fffffa80`04554b28 : fffff880`01f70000 00000000`00000000 fffffa80`04554b28 fffff880`188f1300 : idmwfp+0x23c7
fffff880`18ced618 fffff880`01f6ffff : 00000000`00000000 fffffa80`04554b28 fffff880`188f1300 fffff880`188f13a8 : 0xfffffa80`04554b28
fffff880`18ced620 00000000`00000000 : fffffa80`04554b28 fffff880`188f1300 fffff880`188f13a8 00000000`00000000 : fltmgr!FltpGetNormalizedFileNameCallout
(fltmgr+0xfff)
STACK_COMMAND: kb
FOLLOWUP_IP:
idmwfp+815d
fffff880`188d715d ?? ???
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: idmwfp+815d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: idmwfp
IMAGE_NAME: idmwfp.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 50640934
FAILURE_BUCKET_ID: X64_AV_idmwfp+815d
BUCKET_ID: X64_AV_idmwfp+815d