Przepraszam, że tak długo, ale święta spędzałem po za domem. Przesyłam plik
http://wyslijto.pl/plik/0pz3m0gr80
Zrobiłem analizę pliku dmp i mam taki wynik..co mam robić dalej?
Kod:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\Przemek\Documents\032913-17503-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
WARNING: Whitespace at start of path element
Symbol search path is: SRV*c: \symbole*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.17207.amd64fre.win7_gdr.130104-1435
Machine Name:
Kernel base = 0xfffff800`0365b000 PsLoadedModuleList = 0xfffff800`03897e70
Debug session time: Fri Mar 29 12: 30: 43.807 2013 (GMT+2)
System Uptime: 0 days 0: 02: 00.352
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 19, {21, fffff900c225d000, 35f0, 1fa000001f9}
Probably caused by : win32k.sys ( win32k!EngFreeMem+21 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000021, the data following the pool block being freed is corrupt. Typically this means the consumer (call stack ) has overrun the block.
Arg2: fffff900c225d000, The pool pointer being freed.
Arg3: 00000000000035f0, The number of bytes allocated for the pool block.
Arg4: 000001fa000001f9, The corrupted value found following the pool block.
Debugging Details:
------------------
BUGCHECK_STR: 0x19_21
POOL_ADDRESS: GetPointerFromAddress: unable to read from fffff800039020e0
fffff900c225d000
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800037fd3cd to fffff800036ca840
STACK_TEXT:
fffff880`08124fd8 fffff800`037fd3cd : 00000000`00000019 00000000`00000021 fffff900`c225d000 00000000`000035f0 : nt!KeBugCheckEx
fffff880`08124fe0 fffff960`000e93d1 : 00000000`045aa928 00000000`00000000 fffff880`64667454 fffff880`00000001 : nt!ExDeferredFreePool+0xf8a
fffff880`08125090 fffff960`000f1dcc : 00000000`045aa928 fffff880`08125140 00000000`0000040d 00000000`045a06e9 : win32k!EngFreeMem+0x21
fffff880`081250c0 fffff960`000e910b : fffff900`c00b9ce0 00000000`00000001 00000000`00000001 00000000`00000000 : win32k!bLoadGlyphSet+0x104
fffff880`081250f0 fffff960`000e92b6 : fffff900`c00b9ce0 fffff900`00000001 fffff900`c00b9ce0 fffff960`0025bf80 : win32k!bReloadGlyphSet+0x24b
fffff880`081257b0 fffff960`000e9202 : 00000000`00000000 fffff900`c00b9ce0 fffff900`00000001 00000000`000e7882 : win32k!ttfdQueryFontTree+0x66
fffff880`08125800 fffff960`00135f4b : fffff960`000e91a8 fffff900`c01251e0 00000000`00000001 00000000`00000000 : win32k!ttfdSemQueryFontTree+0x5a
fffff880`08125840 fffff960`00135df7 : fffff880`08125950 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!PDEVOBJ: QueryFontTree+0x63
fffff880`081258c0 fffff960`000f0026 : fffff900`c008a010 00000000`00000000 00000000`00000002 00000000`00000000 : win32k!PFEOBJ: pfdg+0xa3
fffff880`08125920 fffff960`0014a638 : fffff900`c222bd80 fffff880`08125bb0 fffff880`08125ab0 fffff880`08125b80 : win32k!RFONTOBJ: bRealizeFont+0x46
fffff880`08125a40 fffff960`000ebfbc : 00000000`10018000 fffff900`00000000 00000000`00000000 00000000`00000002 : win32k!RFONTOBJ: bInit+0x548
fffff880`08125b60 fffff960`000f6f9f : 00000000`00000000 fffff960`000f6f80 00000000`00000000 00000000`00000000 : win32k!GreGetTextMetricsW+0x4c
fffff880`08125ba0 fffff800`036c9a93 : 00000000`00000044 00000000`05967e90 fffff960`0012dd14 00000000`00000001 : win32k!NtGdiGetTextMetricsW+0x1f
fffff880`08125c20 00000000`750d2dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0560eeb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x750d2dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!EngFreeMem+21
fffff960`000e93d1 4883c420 add rsp,20h
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: win32k!EngFreeMem+21
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 50e64aeb
FAILURE_BUCKET_ID: X64_0x19_21_win32k!EngFreeMem+21
BUCKET_ID: X64_0x19_21_win32k!EngFreeMem+21
Followup: MachineOwner
---------