Windows 8 Kernel Version 16299 MP (8 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTS PersonalBuilt by: 16299.15.amd64fre.rs3_release.170928-1534Machine Name:Kernel base = 0xfffff800`0fc9d000 PsLoadedModuleList = 0xfffff800`10004110Debug session time: Wed Apr 4 09:34:17.621 2018 (UTC - 4:00)System Uptime: 2 days 2:56:39.297******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************PAGE_FAULT_IN_NONPAGED_AREA (50)Invalid system memory was referenced. This cannot be protected by try-except,it must be protected by a Probe. Typically the address is just plain bad or itis pointing at freed memory.Arguments:Arg1: ffffeb598b48926c, memory referenced.Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.Arg3: ffffeb308b7380b0, If non-zero, the instruction address which referenced the bad memory address.Arg4: 0000000000000002, (reserved)Debugging Details:------------------FAULTING_IP: win32kfull!EditionStopSonar+0ffffeb30`8b7380b0 4883ec28 sub rsp,28hMM_INTERNAL_CODE: 2DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULTBUGCHECK_STR: AVPROCESS_NAME: csrss.exeCURRENT_IRQL: 0TRAP_FRAME: ffffee06e0777340 -- (.trap 0xffffee06e0777340)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=0000000000000000 rbx=0000000000000000… rcx=ffffeb5a00067010rdx=ffff860b698530b0 rsi=0000000000000000 rdi=0000000000000000rip=ffffeb308b7380b0 rsp=ffffee06e07774d8 rbp=ffffee06e07775c1 r8=ffffeb5a000069c8 r9=0000000000000018 r10=7ffffffffffffffcr11=ffffc2076c7f7800 r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0 nv up ei pl zr na po ncwin32kfull!EditionStopSonar:ffffeb30`8b7380b0 4883ec28 sub rsp,28hResetting default scopeLAST_CONTROL_TRANSFER: from fffff8000fe4850b to fffff8000fe12510STACK_TEXT: ffffee06`e07770c8 fffff800`0fe4850b : 00000000`00000050 ffffeb59`8b48926c 00000000`00000000 ffffee06`e0777340 : nt!KeBugCheckExffffee06`e07770d0 fffff800`0fd06fad : 00000000`00000000 ffffeb59`8b48926c ffffee06`e0777340 ffffee06`e0777270 : nt!MiSystemFault+0x142f1bffffee06`e0777170 fffff800`0fe2154e : 00000000`00000010 00000000`00000082 ffffee06`e0777368 00000000`00000000 : nt!MmAccessFault+0x23dffffee06`e0777340 ffffeb30`8b7380b0 : ffffeb30`8ba48fb5 00000000`00000001 ffffeb30`8bb05d78 00000000`00000000 : nt!KiPageFault+0x40effffee06`e07774d8 ffffeb30`8ba48fb5 : 00000000`00000001 ffffeb30`8bb05d78 00000000`00000000 ffffeb5a`00066500 : win32kfull!EditionStopSonarffffee06`e07774e0 ffffeb30`8ba48d8f : ffffeb5a`00006980 ffff860b`69853070 00000000`00000001 ffffeb5a`00006980 : win32kbase!CMouseProcessor::ProcessInput+0x89ffffee06`e0777620 ffffeb30`8ba493de : ffffeb5a`00006980 00000000`00000003 ffffeb5a`000069c8 ffff860b`76da0230 : win32kbase!CMouseSensor::ProcessInput+0x6fffffee06`e0777670 ffffeb30`8ba1f787 : ffff860b`75bab700 00000000`00000000 00000000`00000003 ffffeb5a`00006980 : win32kbase!CBaseInput::OnReadNotification+0x4effffee06`e07776b0 ffffeb30`8ba1f4a2 : ffffeb30`8bb33ee8 ffffee06`e0777920 00000000`00000000 ffffeb5a`00066520 : win32kbase!CBaseInput::OnDispatcherObjectSignaled+0x123ffffee06`e07776f0 ffffeb30`8ba1b664 : 00000000`00000000 ffffeb5a`00066520 00000000`00000000 00000000`00000000 : win32kbase!CBaseInput::_OnDispatcherObjectSignaled+0x12ffffee06`e0777720 ffffeb30`8ba1b789 : ffffeb30`0000000b ffff860b`6f0418f0 ffffeb30`8bb33ee8 ffffeb5a`0000000d : win32kbase!LegacyInputDispatcher::Dispatch+0x2cffffee06`e0777750 ffffeb30`8b6aaaa1 : ffffeb5a`00066860 00000000`00000003 00000000`00000003 ffffeb30`8bb35700 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x119ffffee06`e07777a0 ffffeb30`8b6aa7ef : 00000000`00000000 00000000`00000001 00000000`00000001 ffffeb30`8bb35700 : win32kfull!xxxDesktopThreadWaiter+0x11dffffee06`e0777820 ffffeb30`8b9cd5f9 : ffff860b`75bab700 ffff860b`75bab700 00000000`00000000 00000000`00000005 : win32kfull!xxxDesktopThread+0x37fffffee06`e0777990 ffffeb30`8b63c62e : ffff860b`00000001 ffffeb30`8bb35700 ffff860b`75bab700 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0x69ffffee06`e07779d0 fffff800`0fe25003 : ffff860b`75bab700 00000000`00000005 00000210`74a043d0 00000000`00002014 : win32kfull!NtUserCallNoParam+0x5effffee06`e0777a00 00007ffe`28131124 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x1300000054`e13ffab8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7ffe`28131124STACK_COMMAND: kbFOLLOWUP_IP: win32kfull!EditionStopSonar+0ffffeb30`8b7380b0 4883ec28 sub rsp,28hSYMBOL_STACK_INDEX: 4SYMBOL_NAME: win32kfull!EditionStopSonar+0FOLLOWUP_NAME: MachineOwnerMODULE_NAME: win32kfullIMAGE_NAME: win32kfull.sysDEBUG_FLR_IMAGE_TIMESTAMP: 0FAILURE_BUCKET_ID: X64_AV_win32kfull!EditionStopSonar+0BUCKET_ID: X64_AV_win32kfull!EditionStopSonar+0Followup: MachineOwner--------- Ukázat celý příspěvek