Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\ebi\AppData\Local\Temp\Temp1_GeneralRepor t_2.zip\Output\BSOD\071611-28516-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbol*
کد:
برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
Machine Name:
Kernel base = 0xfffff800`01c12000 PsLoadedModuleList = 0xfffff800`01e4fe50
Debug session time: Sat Jul 16 1449.004 2011 (UTC + 4:30)
System Uptime: 0 days 0:53:38.629
Loading Kernel Symbols
.................................................. .............
.................................................. ..............
..........................................
Loading User Symbols
Loading unloaded module list
......................
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff900c275f8c0, 0, fffff9600033f1cd, 0}
Could not read faulting driver name
Probably caused by : win32k.sys ( win32k!SFMLOGICALSURFACE::OwnsSurfaceCleanup+2d )
Followup: MachineOwner
---------
0: kd> !analyze -v
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff900c275f8c0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff9600033f1cd, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001eba0e0
fffff900c275f8c0
FAULTING_IP:
win32k!SFMLOGICALSURFACE::OwnsSurfaceCleanup+2d
fffff960`0033f1cd 488b4f20 mov rcx,qword ptr [rdi+20h]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800678b8e0 -- (.trap 0xfffff8800678b8e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000010 rbx=0000000000000000 rcx=fffff900c2889240
rdx=0000000002121dab rsi=0000000000000000 rdi=0000000000000000
rip=fffff9600033f1cd rsp=fffff8800678ba70 rbp=0000000000000001
r8=0000000000000000 r9=0000000000000410 r10=fffff80001c12000
r11=000000000000001e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
win32k!SFMLOGICALSURFACE::OwnsSurfaceCleanup+0x2d:
fffff960`0033f1cd 488b4f20 mov rcx,qword ptr [rdi+20h] ds:9240:00000000`00000020=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80001d03024 to fffff80001c82700
STACK_TEXT:
fffff880`0678b778 fffff800`01d03024 : 00000000`00000050 fffff900`c275f8c0 00000000`00000000 fffff880`0678b8e0 : nt!KeBugCheckEx
fffff880`0678b780 fffff800`01c807ee : 00000000`00000000 fffff900`c2889240 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x427f7
fffff880`0678b8e0 fffff960`0033f1cd : 00000000`0000001b 00000000`02121dab 00000000`02121dab 00000000`00000001 : nt!KiPageFault+0x16e
fffff880`0678ba70 fffff960`0033e6de : fffff900`c2889240 00000000`00000000 00001dab`624d4653 00000000`0000001d : win32k!SFMLOGICALSURFACE::OwnsSurfaceCleanup+0x2d
fffff880`0678baa0 fffff960`0033f5e3 : 00000000`00000000 00000000`02121dab fffff900`c2889240 00000000`041857dc : win32k!SFMLOGICALSURFACE:
.gif)
eInitialize+0x4e
fffff880`0678bae0 fffff960`0029c06f : 00000000`00000000 fffff900`c00c0010 fffff900`c2889240 00000000`00000020 : win32k!bhLSurfDestroyLogicalSurfaceObject+0x4b
fffff880`0678bb20 fffff960`002bd2fc : 00000000`00000001 00000000`00000001 fffff880`0678bc60 00000000`00000000 : win32k!GreSfmCloseCompositorRef+0x10f
fffff880`0678bb60 fffff800`01c81953 : fffffa80`053a0b60 fffffa80`05391b30 00000000`0025bd41 fffffa80`05391b30 : win32k!NtGdiHLSurfSetInformation+0x1a8
fffff880`0678bbe0 000007fe`fdd54efa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`023cf518 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fdd54efa
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!SFMLOGICALSURFACE::OwnsSurfaceCleanup+2d
fffff960`0033f1cd 488b4f20 mov rcx,qword ptr [rdi+20h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: win32k!SFMLOGICALSURFACE::OwnsSurfaceCleanup+2d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4de066b5
FAILURE_BUCKET_ID: X64_0x50_win32k!SFMLOGICALSURFACE::OwnsSurfaceClea nup+2d
BUCKET_ID: X64_0x50_win32k!SFMLOGICALSURFACE::OwnsSurfaceClea nup+2d
Followup: MachineOwner
---------
0: kd> lmvm win32k
start end module name
fffff960`000c0000 fffff960`003d2000 win32k (pdb symbols) c:\symbol\win32k.pdb\A1F80E12734040FFA1B72E91215BB 0D02\win32k.pdb
Loaded symbol image file: win32k.sys
Mapped memory image file: c:\symbol\win32k.sys\4DE066B5312000\win32k.sys
Image path: \SystemRoot\System32\win32k.sys
Image name: win32k.sys
Timestamp: Sat May 28 0729 2011 (4DE066B5)
CheckSum: 003065EA
ImageSize: 00312000
File version: 6.1.7600.16821
Product version: 6.1.7600.16821
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: win32k.sys
OriginalFilename: win32k.sys
ProductVersion: 6.1.7600.16821
FileVersion: 6.1.7600.16821 (win7_gdr.110527-1503)
FileDescription: Multi-User Win32 Driver
LegalCopyright: © Microsoft Corporation. All rights reserved.