Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\031511-17893-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a15000 PsLoadedModuleList = 0xfffff800`02c52e50
Debug session time: Tue Mar 15 12:36:09.879 2011 (UTC - 4:00)
System Uptime: 0 days 0:07:18.910
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff80002aaad18, 0, ffffffffffffffff}
Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+2a2 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002aaad18, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiReplenishPageSlist+2a2
fffff800`02aaad18 48897b08 mov qword ptr [rbx+8],rdi
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cbd0e0
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff880091f3188 -- (.exr 0xfffff880091f3188)
ExceptionAddress: fffff80002aaad18 (nt!MiReplenishPageSlist+0x00000000000002a2)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff880091f3230 -- (.trap 0xfffff880091f3230)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00004b000008841b rbx=0000000000000000 rcx=fdffffffffffffff
rdx=000000000000004b rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002aaad18 rsp=fffff880091f33c0 rbp=fffffa8005400438
r8=fffff80002cbf400 r9=fffffa8005400000 r10=fffffa8005400458
r11=fffff880091f3418 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiReplenishPageSlist+0x2a2:
fffff800`02aaad18 48897b08 mov qword ptr [rbx+8],rdi ds:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002abfa39 to fffff80002a85740
STACK_TEXT:
fffff880`091f29b8 fffff800`02abfa39 : 00000000`0000001e ffffffff`c0000005 fffff800`02aaad18 00000000`00000000 : nt!KeBugCheckEx
fffff880`091f29c0 fffff800`02a84d82 : fffff880`091f3188 000e0a80`0198c510 fffff880`091f3230 00000000`0000000b : nt!KiDispatchException+0x1b9
fffff880`091f3050 fffff800`02a8368a : ffff0000`0839917e fffff880`091f3360 fffffa80`058ffc60 fffffa80`058ffcd8 : nt!KiExceptionDispatch+0xc2
fffff880`091f3230 fffff800`02aaad18 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a
fffff880`091f33c0 fffff800`02aab0af : fffff800`02cbf400 00000000`0000001b fffffa80`0199fd10 fffffa80`0199cd10 : nt!MiReplenishPageSlist+0x2a2
fffff880`091f3420 fffff800`02a4973d : fa80085e`990004c0 00000000`00000000 00000000`000001b0 00000000`00000000 : nt!MiRemoveAnyPage+0x24f
fffff880`091f3540 fffff800`02ce4fca : fffffa80`057140d0 fffffa80`00000000 00000000`00000000 00000000`00000001 : nt!MiPfPutPagesInTransition+0x764
fffff880`091f36b0 fffff800`02ee39fd : 00000000`000000a8 00000000`0000033b fffffa80`074e2180 fffff880`091f3778 : nt!MmPrefetchPages+0xda
fffff880`091f3710 fffff800`02eeba1e : fffff8a0`00000000 fffff8a0`00000320 fffff8a0`0000002b 00000000`00000001 : nt!PfpPrefetchFilesTrickle+0x21d
fffff880`091f3810 fffff800`02eec5b7 : 00000000`00000000 fffff880`091f3ca0 fffff880`091f3a08 fffff8a0`02270060 : nt!PfpPrefetchRequestPerform+0x30e
fffff880`091f3960 fffff800`02ef8b8e : fffff880`091f3a08 fffff880`091f3a01 fffffa80`081aa060 00000000`00000000 : nt!PfpPrefetchRequest+0x176
fffff880`091f39d0 fffff800`02efd2be : 00000000`00000000 00000000`022efbf0 00000000`0000004f 00000000`08928001 : nt!PfSetSuperfetchInformation+0x1ad
fffff880`091f3ab0 fffff800`02a84993 : fffffa80`07a47760 00000000`00000000 00000000`0000002e 00000000`0940bbf0 : nt!NtSetSystemInformation+0xb91
fffff880`091f3c20 00000000`76f90daa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`022efbc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76f90daa
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiReplenishPageSlist+2a2
fffff800`02aaad18 48897b08 mov qword ptr [rbx+8],rdi
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!MiReplenishPageSlist+2a2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!MiReplenishPageSlist+2a2
BUCKET_ID: X64_0x1E_c0000005_nt!MiReplenishPageSlist+2a2
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\031511-18626-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a1e000 PsLoadedModuleList = 0xfffff800`02c5be50
Debug session time: Tue Mar 15 12:27:50.976 2011 (UTC - 4:00)
System Uptime: 0 days 0:05:06.007
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002ad4e1e, fffff880094b2850, 0}
Probably caused by : memory_corruption ( nt!MiDeletePteList+18e )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002ad4e1e, Address of the instruction which caused the bugcheck
Arg3: fffff880094b2850, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiDeletePteList+18e
fffff800`02ad4e1e f00fba6b1000 lock bts dword ptr [rbx+10h],0
CONTEXT: fffff880094b2850 -- (.cxr 0xfffff880094b2850)
rax=0000000000000200 rbx=000a7a8001b0c450 rcx=000fffffffffffff
rdx=0000000000000001 rsi=fffffa800198c150 rdi=0000000000000000
rip=fffff80002ad4e1e rsp=fffff880094b3220 rbp=0000380000090417
r8=0000007ffffffff8 r9=0000000000000000 r10=0000000000000002
r11=0000058000000000 r12=fffff6800001ee20 r13=0000000003dc403b
r14=0000000000000001 r15=fffffa80059aeb30
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!MiDeletePteList+0x18e:
fffff800`02ad4e1e f00fba6b1000 lock bts dword ptr [rbx+10h],0 ds:002b:000a7a80`01b0c460=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002ad4e1e
STACK_TEXT:
fffff880`094b3220 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeletePteList+0x18e
FOLLOWUP_IP:
nt!MiDeletePteList+18e
fffff800`02ad4e1e f00fba6b1000 lock bts dword ptr [rbx+10h],0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiDeletePteList+18e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
STACK_COMMAND: .cxr 0xfffff880094b2850 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MiDeletePteList+18e
BUCKET_ID: X64_0x3B_nt!MiDeletePteList+18e
Followup: MachineOwner
---------