Pozdr
Kod: Zaznacz cały
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\040311-17347-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols;SRV*c:/symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e53000 PsLoadedModuleList = 0xfffff800`03098e90
Debug session time: Sun Apr 3 13:08:12.922 2011 (GMT+2)
System Uptime: 0 days 2:12:36.070
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {ffffda80279d4fb6, 1, fffff80002eaa970, 7}
Could not read faulting driver name
Probably caused by : hardware ( nt!KiOpFetchBytes+20 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffda80279d4fb6, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff80002eaa970, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000007, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800031040e8
ffffda80279d4fb6
FAULTING_IP:
nt!KiOpFetchBytes+20
fffff800`02eaa970 db4c8bc6 fisttp dword ptr [rbx+rcx*4-3Ah]
MM_INTERNAL_CODE: 7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88007ec4100 -- (.trap 0xfffff88007ec4100)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88007ec42b8 rbx=0000000000000000 rcx=fffff88007ec4330
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002eaa970 rsp=fffff88007ec4290 rbp=fffff88007ec48d0
r8=fffff88007ec4320 r9=0000000000000000 r10=fffff88007ec43d0
r11=000007fef7641378 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiOpFetchBytes+0x20:
fffff800`02eaa970 db4c8bc6 fisttp dword ptr [rbx+rcx*4-3Ah] ds:ffffe200`1fb10c86=????????
Resetting default scope
EXCEPTION_RECORD: fffff88007ec4b78 -- (.exr 0xfffff88007ec4b78)
ExceptionAddress: 000007fef7641378
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0
MISALIGNED_IP:
nt!KiOpFetchBytes+20
fffff800`02eaa970 db4c8bc6 fisttp dword ptr [rbx+rcx*4-3Ah]
LAST_CONTROL_TRANSFER: from fffff80002e7dbf7 to fffff80002ed3640
STACK_TEXT:
fffff880`07ec3f98 fffff800`02e7dbf7 : 00000000`00000050 ffffda80`279d4fb6 00000000`00000001 fffff880`07ec4100 : nt!KeBugCheckEx
fffff880`07ec3fa0 fffff800`02ed176e : 00000000`00000001 ffffda80`279d4fb6 fffff880`00000000 fffff880`07ec4330 : nt! ?? ::FNODOBFM::`string'+0x44811
fffff880`07ec4100 fffff800`02eaa970 : fffffa80`07400370 fffff880`0f23a9a0 fffffa80`00000000 fffffa80`00000000 : nt!KiPageFault+0x16e
fffff880`07ec4290 fffff800`02eaabd0 : fffff880`07ec4330 fffffa80`00000001 fffff880`07ec4330 fffff880`07ec4c01 : nt!KiOpFetchBytes+0x20
fffff880`07ec42c0 fffff800`02f0ebb7 : fffff880`07ec4b78 fffffa80`073f5e28 fffff880`07ec4500 00000000`00000000 : nt!KiOpDecode+0x68
fffff880`07ec4310 fffff800`02f0ed7c : fffff880`07ec4b78 fffff880`07ec4c20 fffff880`07ec4c20 00000000`00000000 : nt!KiPreprocessFault+0x53
fffff880`07ec43a0 fffff800`02ed2cc2 : fffff880`07ec4b78 00000000`00381a70 fffff880`07ec4c20 00000000`00000000 : nt!KiDispatchException+0xf0
fffff880`07ec4a40 fffff800`02ed0e1f : fffff880`07ec4c20 fffffa80`071ee300 000007fe`00000001 fffffa80`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`07ec4c20 000007fe`f7641378 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInvalidOpcodeFault+0x11f
00000000`03a6f8e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`f7641378
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiOpFetchBytes+20
fffff800`02eaa970 db4c8bc6 fisttp dword ptr [rbx+rcx*4-3Ah]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiOpFetchBytes+20
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED
BUCKET_ID: X64_IP_MISALIGNED
Followup: MachineOwner
---------