Появиха ми се два сини екрана:
-от миналата седмица
-и от тази седмица друг
Пуснах създадените MEMORY.DMP файлове в дебъгера Windbg, само че не мога да разбера анализите, които ми дава. Ако някой може да ми помогне, ще съм му благодарен.
Първия анализ е
Use !analyze -v to get detailed debugging information.
BugCheck 50, {80a42038, 1, 20003, 0}
Probably caused by : win32k.sys ( win32k!GenerateNlsVkKey+26 )
Followup: MachineOwner
---------
kd> .reload
Loading Kernel Symbols
...
Loading User Symbols
PEB is paged out (Peb.Ldr = 7ffdf00c). Type ".hh dbgerr001" for details
Loading unloaded module list
................
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: 80a42038, memory referenced.
Arg2: 00000001, value 0 = read operation, 1 = write operation.
Arg3: 00020003, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
------------------
WRITE_ADDRESS: 80a42038
FAULTING_IP:
+20003
00020003 ?? ???
MM_INTERNAL_CODE: 0
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: csrss.exe
TRAP_FRAME: f74a98c8 -- (.trap fffffffff74a98c8)
ErrCode = 00000002
eax=80a42038 ebx=bf990000 ecx=00000040 edx=00000004 esi=00868278 edi=f74a99d0
eip=00020003 esp=f74a993c ebp=f74a994c iopl=0 nv up ei ng nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010282
00020003 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from 80523f44 to 8053331e
STACK_TEXT:
f74a9864 80523f44 00000050 80a42038 00000001 nt!KeBugCheckEx+0x1b
f74a98b0 804e1718 00000001 80a42038 00000000 nt!MmAccessFault+0x6f5
f74a98b0 00020003 00000001 80a42038 00000000 nt!KiTrap0E+0xcc
WARNING: Frame IP not in any known module. Following frames may be wrong.
f74a9938 bf930fbd f74a99d0 00000000 00000000 0x20003
f74a994c bf9310bf 00868278 bf990000 f74a99d0 win32k!GenerateNlsVkKey+0x26
f74a9974 bf8b712a 00868278 f74a99d0 00000000 win32k!KbdNlsFuncTypeAlt+0x85
f74a9990 bf8b85e1 f74a99d0 00000000 f74a99e8 win32k!xxxKENLSProcs+0x67
f74a99ac bf873940 f74a9912 00000000 00000000 win32k!xxxProcessKeyEvent+0x1f9
f74a99ec bf874449 e1ef8100 a4ef8180 00000001 win32k!ProcessKeyboardInputWorker+0x24d
f74a9a0c bf86dcb0 e1ef8180 8204bd58 f74a9a64 win32k!ProcessKeyboardInput+0x68
f74a9a1c 804f18b8 e1ef8180 e1ef81a8 00000000 win32k!InputApc+0x4e
f74a9a64 804f02c1 00000000 00000000 00000000 nt!KiDeliverApc+0x124
f74a9a7c 804e3b7d 804dcbe4 00000001 00000000 nt!KiSwapThread+0x64
f74a9ab4 bf888cc2 00000007 82108e20 00000001 nt!KeWaitForMultipleObjects+0x284
f74a9d30 bf86d09c f74b94a8 00000002 f74a9d54 win32k!RawInputThread+0x4f3
f74a9d40 bf8010ca f74b94a8 f74a9d64 006dfff4 win32k!xxxCreateSystemThreads+0x60
f74a9d54 804de7ec 00000000 00000022 00000000 win32k!NtUserCallOneParam+0x23
f74a9d54 7c90eb94 00000000 00000022 00000000 nt!KiFastCallEntry+0xf8
00000000 00000000 00000000 00000000 00000000 0x7c90eb94
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!GenerateNlsVkKey+26
bf930fbd 5d pop ebp
SYMBOL_STACK_INDEX: 4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 43446a58
SYMBOL_NAME: win32k!GenerateNlsVkKey+26
FAILURE_BUCKET_ID: 0x50_W_win32k!GenerateNlsVkKey+26
BUCKET_ID: 0x50_W_win32k!GenerateNlsVkKey+26
Followup: MachineOwner
---------
Вторият е
Use !analyze -v to get detailed debugging information.
BugCheck 50, {e34415e7, 0, bf887eef, 1}
Probably caused by : win32k.sys ( win32k!ReadLayoutFile+22c )
Followup: MachineOwner
---------
kd> .reload
Loading Kernel Symbols
...
Loading User Symbols
PEB is paged out (Peb.Ldr = 7ffdf00c). Type ".hh dbgerr001" for details
Loading unloaded module list
.................
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: e34415e7, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: bf887eef, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000001, (reserved)
Debugging Details:
------------------
READ_ADDRESS: e34415e7 Paged pool
FAULTING_IP:
win32k!ReadLayoutFile+22c
bf887eef 397808 cmp dword ptr [eax+8],edi
MM_INTERNAL_CODE: 1
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 43446a58
MODULE_NAME: win32k
FAULTING_MODULE: bf800000 win32k
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: winlogon.exe
TRAP_FRAME: f7cd18b4 -- (.trap fffffffff7cd18b4)
ErrCode = 00000000
eax=e34415df ebx=e343b7c8 ecx=e343a008 edx=e34415df esi=e343b5b4 edi=00000000
eip=bf887eef esp=f7cd1928 ebp=f7cd1944 iopl=0 nv up ei ng nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010282
win32k!ReadLayoutFile+0x22c:
bf887eef 397808 cmp dword ptr [eax+8],edi ds:0023:e34415e7=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 80523f44 to 8053331e
STACK_TEXT:
f7cd1850 80523f44 00000050 e34415e7 00000000 nt!KeBugCheckEx+0x1b
f7cd189c 804e1718 00000000 e34415e7 00000000 nt!MmAccessFault+0x6f5
f7cd189c bf887eef 00000000 e34415e7 00000000 nt!KiTrap0E+0xcc
f7cd1944 bf887c93 e16c64a8 00a40178 00000858 win32k!ReadLayoutFile+0x22c
f7cd1964 bf87126f 00000920 000017c0 000075d7 win32k!LoadKeyboardLayoutFile+0x6a
f7cd19f0 bf870d72 82225120 00000920 00000000 win32k!xxxLoadKeyboardLayoutEx+0x1be
f7cd1d40 804de7ec 00000920 75d717c0 0006e1b4 win32k!NtUserLoadKeyboardLayoutEx+0x152
f7cd1d40 7c90eb94 00000920 75d717c0 0006e1b4 nt!KiFastCallEntry+0xf8
WARNING: Frame IP not in any known module. Following frames may be wrong.
0006e17c 00000000 00000000 00000000 00000000 0x7c90eb94
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!ReadLayoutFile+22c
bf887eef 397808 cmp dword ptr [eax+8],edi
SYMBOL_STACK_INDEX: 3
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: win32k!ReadLayoutFile+22c
FAILURE_BUCKET_ID: 0x50_win32k!ReadLayoutFile+22c
BUCKET_ID: 0x50_win32k!ReadLayoutFile+22c
Followup: MachineOwner
---------