Už jsem na to přišel, po BOSD musím počkat až se výpis na RAM dokončí, což se ukazuje dole, nepočkal jsem (vypisovalo se cca 25 vteřin ???) a tak nebylo, teď ale spadl systém znovu, výpis přikládám . . .
umíte to někdo přeložit do srozumitelnosti ???
Díky předem
zadal jsem parametr win32k!RFONTOBJ::vXlatGlyphArray+5a
do googlu a našel spoustu odkazů popisující stejný problém, co je však na tom zarážející, že jsem nikde nenašel odpověď, kde je chyba a co je třeba popř. udělat
začíná to být problém a zdá se , že ho nemám zdaleka sám, tak přátelé, co vy na to ???
zde je výpis minidumpu
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\Mini112211-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
WARNING: Whitespace at start of path element
Symbol search path is:
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt
Built by: 2600.xpsp_sp3_qfe.101209-1646
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Tue Nov 22 01:12:34.859 2011 (GMT+1)
System Uptime: 0 days 1:31:12.561
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
..................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {e2bfd01c, 0, bf82ee1f, 1}
Could not read faulting driver name
Probably caused by : win32k.sys ( win32k!RFONTOBJ::vXlatGlyphArray+5a )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: e2bfd01c, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: bf82ee1f, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000001, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: e2bfd01c
FAULTING_IP:
win32k!RFONTOBJ::vXlatGlyphArray+5a
bf82ee1f 8b470c mov eax,dword ptr [edi+0Ch]
MM_INTERNAL_CODE: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0x50
TRAP_FRAME: f5ebcb74 -- (.trap 0xfffffffff5ebcb74)
ErrCode = 00000000
eax=e2d9a4e0 ebx=f5ebcccc ecx=00000001 edx=00000000 esi=f5ebcccc edi=e2bfd010
eip=bf82ee1f esp=f5ebcbe8 ebp=f5ebcc08 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
win32k!RFONTOBJ::vXlatGlyphArray+0x5a:
bf82ee1f 8b470c mov eax,dword ptr [edi+0Ch] ds

e2bfd01c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 8052039c to 804f9f43
STACK_TEXT:
f5ebcaf4 8052039c 00000050 e2bfd01c 00000000 nt!KeBugCheckEx+0x1b
f5ebcb5c 805445f0 00000000 e2bfd01c 00000000 nt!MmAccessFault+0x9aa
f5ebcb5c bf82ee1f 00000000 e2bfd01c 00000000 nt!KiTrap0E+0xd0
f5ebcc08 bf83aa74 f5ebcc30 00000001 f5ebcc24 win32k!RFONTOBJ::vXlatGlyphArray+0x5a
f5ebcc28 bf95495e 00000078 00000000 f5ebcd1c win32k!RFONTOBJ::hgXlat+0x19
f5ebccc4 bf94b77a e2d9a4e0 00000078 00000000 win32k!GreGetGlyphOutlineInternal+0xa9
f5ebcd3c 8054167c be0109af 00000078 00000000 win32k!NtGdiGetGlyphOutline+0x85
f5ebcd3c 7c90e514 be0109af 00000078 00000000 nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
0013e9b4 00000000 00000000 00000000 00000000 0x7c90e514
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!RFONTOBJ::vXlatGlyphArray+5a
bf82ee1f 8b470c mov eax,dword ptr [edi+0Ch]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: win32k!RFONTOBJ::vXlatGlyphArray+5a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4e661e29
FAILURE_BUCKET_ID: 0x50_win32k!RFONTOBJ::vXlatGlyphArray+5a
BUCKET_ID: 0x50_win32k!RFONTOBJ::vXlatGlyphArray+5a
Followup: MachineOwner
---------