本帖最后由 via_affect 于 2014-4-18 00:08 编辑
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [E:\041714-19890-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff800`03e14000 PsLoadedModuleList = 0xfffff800`040576d0
Debug session time: Thu Apr 17 22:32:21.196 2014 (UTC + 8:00)
System Uptime: 0 days 0:00:24.663
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffffffffffffffc, 0, fffff8800562ff39, 0}
Unable to load image \SystemRoot\system32\drivers\aswSP.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswSP.sys
*** ERROR: Module load completed but symbols could not be loaded for aswSP.sys
Could not read faulting driver name
Probably caused by : aswSP.sys ( aswSP+2ff39 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffffffffffffc, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8800562ff39, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800040c1100
fffffffffffffffc
FAULTING_IP:
aswSP+2ff39
fffff880`0562ff39 410fb700 movzx eax,word ptr [r8]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: AvastSvc.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880087975f0 -- (.trap 0xfffff880087975f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff800040c1010 rbx=0000000000000000 rcx=f8800565b0800000
rdx=fffff8800879775a rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800562ff39 rsp=fffff88008797780 rbp=fffffa8008ff85c0
r8=fffffffffffffffc r9=fffffa8007b1356a r10=0000000000000074
r11=fffffa8007b1356a r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe nc
aswSP+0x2ff39:
fffff880`0562ff39 410fb700 movzx eax,word ptr [r8] ds:002a:ffffffff`fffffffc=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003f07bf0 to fffff80003e89bc0
STACK_TEXT:
fffff880`08797488 fffff800`03f07bf0 : 00000000`00000050 ffffffff`fffffffc 00000000`00000000 fffff880`087975f0 : nt!KeBugCheckEx
fffff880`08797490 fffff800`03e87cee : 00000000`00000000 ffffffff`fffffffc fffffa80`08642800 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4518f
fffff880`087975f0 fffff880`0562ff39 : fffffa80`08e99200 00000000`00000000 00000000`00000000 fffff800`041629c5 : nt!KiPageFault+0x16e
fffff880`08797780 fffffa80`08e99200 : 00000000`00000000 00000000`00000000 fffff800`041629c5 fffff880`08797b00 : aswSP+0x2ff39
fffff880`08797788 00000000`00000000 : 00000000`00000000 fffff800`041629c5 fffff880`08797b00 fffffa80`00100001 : 0xfffffa80`08e99200
STACK_COMMAND: kb
FOLLOWUP_IP:
aswSP+2ff39
fffff880`0562ff39 410fb700 movzx eax,word ptr [r8]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: aswSP+2ff39
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: aswSP
IMAGE_NAME: aswSP.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5328af5b
FAILURE_BUCKET_ID: X64_0x50_aswSP+2ff39
BUCKET_ID: X64_0x50_aswSP+2ff39
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffffffffffffc, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8800562ff39, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: fffffffffffffffc
FAULTING_IP:
aswSP+2ff39
fffff880`0562ff39 410fb700 movzx eax,word ptr [r8]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: AvastSvc.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880087975f0 -- (.trap 0xfffff880087975f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff800040c1010 rbx=0000000000000000 rcx=f8800565b0800000
rdx=fffff8800879775a rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800562ff39 rsp=fffff88008797780 rbp=fffffa8008ff85c0
r8=fffffffffffffffc r9=fffffa8007b1356a r10=0000000000000074
r11=fffffa8007b1356a r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe nc
aswSP+0x2ff39:
fffff880`0562ff39 410fb700 movzx eax,word ptr [r8] ds:002a:ffffffff`fffffffc=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003f07bf0 to fffff80003e89bc0
STACK_TEXT:
fffff880`08797488 fffff800`03f07bf0 : 00000000`00000050 ffffffff`fffffffc 00000000`00000000 fffff880`087975f0 : nt!KeBugCheckEx
fffff880`08797490 fffff800`03e87cee : 00000000`00000000 ffffffff`fffffffc fffffa80`08642800 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4518f
fffff880`087975f0 fffff880`0562ff39 : fffffa80`08e99200 00000000`00000000 00000000`00000000 fffff800`041629c5 : nt!KiPageFault+0x16e
fffff880`08797780 fffffa80`08e99200 : 00000000`00000000 00000000`00000000 fffff800`041629c5 fffff880`08797b00 : aswSP+0x2ff39
fffff880`08797788 00000000`00000000 : 00000000`00000000 fffff800`041629c5 fffff880`08797b00 fffffa80`00100001 : 0xfffffa80`08e99200
STACK_COMMAND: kb
FOLLOWUP_IP:
aswSP+2ff39
fffff880`0562ff39 410fb700 movzx eax,word ptr [r8]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: aswSP+2ff39
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: aswSP
IMAGE_NAME: aswSP.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5328af5b
FAILURE_BUCKET_ID: X64_0x50_aswSP+2ff39
BUCKET_ID: X64_0x50_aswSP+2ff39
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffffffffffffc, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8800562ff39, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: fffffffffffffffc
FAULTING_IP:
aswSP+2ff39
fffff880`0562ff39 410fb700 movzx eax,word ptr [r8]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: AvastSvc.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880087975f0 -- (.trap 0xfffff880087975f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff800040c1010 rbx=0000000000000000 rcx=f8800565b0800000
rdx=fffff8800879775a rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800562ff39 rsp=fffff88008797780 rbp=fffffa8008ff85c0
r8=fffffffffffffffc r9=fffffa8007b1356a r10=0000000000000074
r11=fffffa8007b1356a r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe nc
aswSP+0x2ff39:
fffff880`0562ff39 410fb700 movzx eax,word ptr [r8] ds:002a:ffffffff`fffffffc=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003f07bf0 to fffff80003e89bc0
STACK_TEXT:
fffff880`08797488 fffff800`03f07bf0 : 00000000`00000050 ffffffff`fffffffc 00000000`00000000 fffff880`087975f0 : nt!KeBugCheckEx
fffff880`08797490 fffff800`03e87cee : 00000000`00000000 ffffffff`fffffffc fffffa80`08642800 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4518f
fffff880`087975f0 fffff880`0562ff39 : fffffa80`08e99200 00000000`00000000 00000000`00000000 fffff800`041629c5 : nt!KiPageFault+0x16e
fffff880`08797780 fffffa80`08e99200 : 00000000`00000000 00000000`00000000 fffff800`041629c5 fffff880`08797b00 : aswSP+0x2ff39
fffff880`08797788 00000000`00000000 : 00000000`00000000 fffff800`041629c5 fffff880`08797b00 fffffa80`00100001 : 0xfffffa80`08e99200
STACK_COMMAND: kb
FOLLOWUP_IP:
aswSP+2ff39
fffff880`0562ff39 410fb700 movzx eax,word ptr [r8]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: aswSP+2ff39
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: aswSP
IMAGE_NAME: aswSP.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5328af5b
FAILURE_BUCKET_ID: X64_0x50_aswSP+2ff39
BUCKET_ID: X64_0x50_aswSP+2ff39
Followup: MachineOwner
---------
|