Skocz do zawartości

wilgotny_karzel

Użytkownik
  • Postów

    1
  • Dołączył

  • Ostatnia wizyta

Osiągnięcia wilgotny_karzel

Newbie

Newbie (1/14)

0

Reputacja

  1. witam, jak w temacie mam problem z niebieskim ekranem. Jesli zalozylem temat w zlym miejscu to prosze o przeniesienie. cytuje opis problemu: zrobilem debuggerem test i mam nastepujacy log , ktory niestety mi nic nie mowi moze ktos mi podpowie ocb? Microsoft ® Windows Debugger Version 6.3.9600.17029 AMD64 Copyright © Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\060814-3494-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Symbol Path validation summary ************** Response Time (ms) Location Deferred SRV*C:\Users\artek\Desktop\[gluteus maximus]*http://msdl.microsoft.com/download/symbols Symbol search path is: SRV*C:\Users\artek\Desktop\[gluteus maximus]*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16385.amd64fre.win7_rtm.090713-1255 Machine Name: Kernel base = 0xfffff800`02c1b000 PsLoadedModuleList = 0xfffff800`02e58e50 Debug session time: Sun Jun 8 00:46:34.584 2014 (UTC + 2:00) System Uptime: 0 days 0:00:48.521 Loading Kernel Symbols . Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. .............................................................. ................................................................ .................. Loading User Symbols Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {fffff8a002b66000, 0, fffff80002f51079, 0} Could not read faulting driver name Probably caused by : memory_corruption ( nt!MiCompressRelocations+70 ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffff8a002b66000, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff80002f51079, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000000, (reserved) Debugging Details: ------------------ Could not read faulting driver name READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec30e0 GetUlongFromAddress: unable to read from fffff80002ec3198 fffff8a002b66000 Paged pool FAULTING_IP: nt!MiCompressRelocations+70 fffff800`02f51079 410fb701 movzx eax,word ptr [r9] MM_INTERNAL_CODE: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: explorer.exe CURRENT_IRQL: 0 ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) amd64fre TRAP_FRAME: fffff880088c3590 -- (.trap 0xfffff880088c3590) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002f51079 rsp=fffff880088c3720 rbp=000000000008fc28 r8=000000007ffff960 r9=fffff8a002b66000 r10=000000000006ed2c r11=0000000000000008 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc nt!MiCompressRelocations+0x70: fffff800`02f51079 410fb701 movzx eax,word ptr [r9] ds:fffff8a0`02b66000=???? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002d0c1e4 to fffff80002c8cf00 STACK_TEXT: fffff880`088c3428 fffff800`02d0c1e4 : 00000000`00000050 fffff8a0`02b66000 00000000`00000000 fffff880`088c3590 : nt!KeBugCheckEx fffff880`088c3430 fffff800`02c8afee : 00000000`00000000 00000000`00000003 fffff800`02e42a00 fffff800`02cb3e00 : nt! ?? ::FNODOBFM::`string'+0x42907 fffff880`088c3590 fffff800`02f51079 : 00000000`01000000 fffff800`02f51461 fffffa80`09362b10 fffff800`02f515a4 : nt!KiPageFault+0x16e fffff880`088c3720 fffff800`02f4f932 : 00000000`000d56a0 00000000`01000000 00000000`00000001 00000000`00000004 : nt!MiCompressRelocations+0x70 fffff880`088c3770 fffff800`02f855d1 : fffff8a0`0293a000 fffff880`088c3980 00000000`00000095 00000000`00000000 : nt!MiRelocateImage+0x4a2 fffff880`088c38e0 fffff800`02f7a893 : fffff880`088c3b40 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MmCreateSection+0x825 fffff880`088c3af0 fffff800`02c8c153 : fffffa80`092e0060 00000000`059ae8c8 fffff880`088c3b88 00000000`059aeb78 : nt!NtCreateSection+0x162 fffff880`088c3b70 00000000`775a035a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`059ae8a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775a035a STACK_COMMAND: kb FOLLOWUP_IP: nt!MiCompressRelocations+70 fffff800`02f51079 410fb701 movzx eax,word ptr [r9] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!MiCompressRelocations+70 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600 IMAGE_VERSION: 6.1.7600.16385 IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x50_nt!MiCompressRelocations+70 BUCKET_ID: X64_0x50_nt!MiCompressRelocations+70 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x50_nt!micompressrelocations+70 FAILURE_ID_HASH: {90c79c81-a817-2366-53af-400839fd88f1} Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffff8a002b66000, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff80002f51079, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000000, (reserved) Debugging Details: ------------------ Could not read faulting driver name READ_ADDRESS: fffff8a002b66000 Paged pool FAULTING_IP: nt!MiCompressRelocations+70 fffff800`02f51079 410fb701 movzx eax,word ptr [r9] MM_INTERNAL_CODE: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: explorer.exe CURRENT_IRQL: 0 ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) amd64fre TRAP_FRAME: fffff880088c3590 -- (.trap 0xfffff880088c3590) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002f51079 rsp=fffff880088c3720 rbp=000000000008fc28 r8=000000007ffff960 r9=fffff8a002b66000 r10=000000000006ed2c r11=0000000000000008 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc nt!MiCompressRelocations+0x70: fffff800`02f51079 410fb701 movzx eax,word ptr [r9] ds:fffff8a0`02b66000=???? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002d0c1e4 to fffff80002c8cf00 STACK_TEXT: fffff880`088c3428 fffff800`02d0c1e4 : 00000000`00000050 fffff8a0`02b66000 00000000`00000000 fffff880`088c3590 : nt!KeBugCheckEx fffff880`088c3430 fffff800`02c8afee : 00000000`00000000 00000000`00000003 fffff800`02e42a00 fffff800`02cb3e00 : nt! ?? ::FNODOBFM::`string'+0x42907 fffff880`088c3590 fffff800`02f51079 : 00000000`01000000 fffff800`02f51461 fffffa80`09362b10 fffff800`02f515a4 : nt!KiPageFault+0x16e fffff880`088c3720 fffff800`02f4f932 : 00000000`000d56a0 00000000`01000000 00000000`00000001 00000000`00000004 : nt!MiCompressRelocations+0x70 fffff880`088c3770 fffff800`02f855d1 : fffff8a0`0293a000 fffff880`088c3980 00000000`00000095 00000000`00000000 : nt!MiRelocateImage+0x4a2 fffff880`088c38e0 fffff800`02f7a893 : fffff880`088c3b40 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MmCreateSection+0x825 fffff880`088c3af0 fffff800`02c8c153 : fffffa80`092e0060 00000000`059ae8c8 fffff880`088c3b88 00000000`059aeb78 : nt!NtCreateSection+0x162 fffff880`088c3b70 00000000`775a035a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`059ae8a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775a035a STACK_COMMAND: kb FOLLOWUP_IP: nt!MiCompressRelocations+70 fffff800`02f51079 410fb701 movzx eax,word ptr [r9] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!MiCompressRelocations+70 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600 IMAGE_VERSION: 6.1.7600.16385 IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x50_nt!MiCompressRelocations+70 BUCKET_ID: X64_0x50_nt!MiCompressRelocations+70 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x50_nt!micompressrelocations+70 FAILURE_ID_HASH: {90c79c81-a817-2366-53af-400839fd88f1} Followup: MachineOwner ---------
×
×
  • Dodaj nową pozycję...