Page_fault_in_nonpaged_area

Recep Baltaş

Technopat
Yönetici
Katılım
14 Ağustos 2010
Mesajlar
67.632
En iyi cevaplar
742
Beğeniler
89.176
Yer
İstanbul
Genelde bozuk RAM'den kaynaklanan bir mavi ekran hatası.

Kod:
Windows 8 Kernel Version 9200 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 9200.16581.amd64fre.win8_gdr.130410-1505
Machine Name:
Kernel base = 0xfffff801`5ba04000 PsLoadedModuleList = 0xfffff801`5bcd0a20
Debug session time: Tue May 28 19:28:16.320 2013 (UTC - 4:00)
System Uptime: 4 days 16:58:31.622
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffd0, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff8015baa2ba3, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8015bd5c168
GetUlongFromAddress: unable to read from fffff8015bd5c1f8
 ffffffffffffffd0 

FAULTING_IP: 
nt!ObfDereferenceObject+23
fffff801`5baa2ba3 f0480fc15ed0    lock xadd qword ptr [rsi-30h],rbx

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  taskhostex.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88018ced420 -- (.trap 0xfffff88018ced420)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88018ced620 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8801bdd9620 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015baa2ba3 rsp=fffff88018ced5b0 rbp=0000000000000001
 r8=fffff88018ced620  r9=fffffa8007703450 r10=fffff880047cfa00
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!ObfDereferenceObject+0x23:
fffff801`5baa2ba3 f0480fc15ed0    lock xadd qword ptr [rsi-30h],rbx ds:ffffffff`ffffffd0=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8015bb1f3f1 to fffff8015ba5e440

STACK_TEXT:  
fffff880`18ced238 fffff801`5bb1f3f1 : 00000000`00000050 ffffffff`ffffffd0 00000000`00000001 fffff880`18ced420 : nt!KeBugCheckEx
fffff880`18ced240 fffff801`5ba98acb : 00000000`00000001 ffffffff`ffffffd0 fffffa80`08fb7240 fffffa80`0af7f800 : nt! ?? ::FNODOBFM::`string'+0x33c2b
fffff880`18ced2e0 fffff801`5ba5beee : 00000000`00000001 ffffffff`ffffffff 00000000`00000000 fffff880`18ced420 : nt!MmAccessFault+0x55b
fffff880`18ced420 fffff801`5baa2ba3 : 00000000`00000001 fffffa80`076f31b0 fffffa80`076f31b0 fffffa80`08fb7240 : nt!KiPageFault+0x16e
fffff880`18ced5b0 fffff880`188d715d : fffffa80`04554b00 00000000`00001240 00000000`00000002 fffff880`188d13c7 : nt!ObfDereferenceObject+0x23
fffff880`18ced5f0 fffffa80`04554b00 : 00000000`00001240 00000000`00000002 fffff880`188d13c7 fffffa80`04554b28 : idmwfp+0x815d
fffff880`18ced5f8 00000000`00001240 : 00000000`00000002 fffff880`188d13c7 fffffa80`04554b28 fffff880`01f70000 : 0xfffffa80`04554b00
fffff880`18ced600 00000000`00000002 : fffff880`188d13c7 fffffa80`04554b28 fffff880`01f70000 00000000`00000000 : 0x1240
fffff880`18ced608 fffff880`188d13c7 : fffffa80`04554b28 fffff880`01f70000 00000000`00000000 fffffa80`04554b28 : 0x2
fffff880`18ced610 fffffa80`04554b28 : fffff880`01f70000 00000000`00000000 fffffa80`04554b28 fffff880`188f1300 : idmwfp+0x23c7
fffff880`18ced618 fffff880`01f6ffff : 00000000`00000000 fffffa80`04554b28 fffff880`188f1300 fffff880`188f13a8 : 0xfffffa80`04554b28
fffff880`18ced620 00000000`00000000 : fffffa80`04554b28 fffff880`188f1300 fffff880`188f13a8 00000000`00000000 : fltmgr!FltpGetNormalizedFileNameCallout 
 (fltmgr+0xfff)


STACK_COMMAND:  kb

FOLLOWUP_IP: 
idmwfp+815d
fffff880`188d715d ??              ???

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  idmwfp+815d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: idmwfp

IMAGE_NAME:  idmwfp.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  50640934

FAILURE_BUCKET_ID:  X64_AV_idmwfp+815d

BUCKET_ID:  X64_AV_idmwfp+815d
 




Yeni konular

Yukarı