Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- PAGE_FAULT_IN_NONPAGED_AREA (50)
- Invalid system memory was referenced. This cannot be protected by try-except,
- it must be protected by a Probe. Typically the address is just plain bad or it
- is pointing at freed memory.
- Arguments:
- Arg1: ffffffff000000ce, memory referenced.
- Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
- Arg3: fffff96000656cf9, If non-zero, the instruction address which referenced the bad memory
- address.
- Arg4: 0000000000000005, (reserved)
- Debugging Details:
- ------------------
- Could not read faulting driver name
- READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032f10e0
- GetUlongFromAddress: unable to read from fffff800032f1198
- ffffffff000000ce
- FAULTING_IP:
- cdd!DrvAssociateSharedSurface+35
- fffff960`00656cf9 44394e10 cmp dword ptr [rsi+10h],r9d
- MM_INTERNAL_CODE: 5
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
- BUGCHECK_STR: 0x50
- PROCESS_NAME: dwm.exe
- CURRENT_IRQL: 0
- TRAP_FRAME: fffff88007e25920 -- (.trap 0xfffff88007e25920)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=fffff96000656cc4 rbx=0000000000000000 rcx=fffff900c072ace8
- rdx=00000000c0000480 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff96000656cf9 rsp=fffff88007e25ab0 rbp=fffff900c072ace8
- r8=000000007a121830 r9=ffffffffffffffff r10=0000000001e7f3f0
- r11=fffff88007e25b08 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz na po nc
- cdd!DrvAssociateSharedSurface+0x35:
- fffff960`00656cf9 44394e10 cmp dword ptr [rsi+10h],r9d ds:00000000`00000010=????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff80003138b91 to fffff800030baf00
- STACK_TEXT:
- fffff880`07e257b8 fffff800`03138b91 : 00000000`00000050 ffffffff`000000ce 00000000`00000000 fffff880`07e25920 : nt!KeBugCheckEx
- fffff880`07e257c0 fffff800`030b8fee : 00000000`00000000 00000000`00000000 00000000`80000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x40f5b
- fffff880`07e25920 fffff960`00656cf9 : 00000000`00000658 00000000`00000000 00000000`7a121812 00000000`00000020 : nt!KiPageFault+0x16e
- fffff880`07e25ab0 fffff960`002477bd : 00000000`00000000 fffff900`c57d8460 00000000`01e7f490 ffffffff`ffffffff : cdd!DrvAssociateSharedSurface+0x35
- fffff880`07e25b10 fffff960`0026a969 : 00000000`00000001 fffff880`07e25c60 00000000`01e7f490 00000000`0000a623 : win32k!GreSetRedirectionSurfaceSignaling+0x125
- fffff880`07e25b60 fffff800`030ba153 : fffffa80`0b1fc060 00000000`00000000 00000000`00000020 00000000`00000000 : win32k!NtGdiHLSurfSetInformation+0x209
- fffff880`07e25be0 000007fe`fd654efa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000000`01e7f3c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007fe`fd654efa
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- cdd!DrvAssociateSharedSurface+35
- fffff960`00656cf9 44394e10 cmp dword ptr [rsi+10h],r9d
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: cdd!DrvAssociateSharedSurface+35
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: cdd
- IMAGE_NAME: cdd.dll
- DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bde94
- FAILURE_BUCKET_ID: X64_0x50_cdd!DrvAssociateSharedSurface+35
- BUCKET_ID: X64_0x50_cdd!DrvAssociateSharedSurface+35
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement