Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\050311-16567-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c1f000 PsLoadedModuleList = 0xfffff800`02e5ce50
Debug session time: Tue May 3 18:26:04.368 2011 (UTC - 4:00)
System Uptime: 0 days 13:40:54.101
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
..........................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {3993, 2, 1, fffff80002d41b1f}
Probably caused by : memory_corruption ( nt!MiIdentifyPfn+26f )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000003993, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002d41b1f, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec70e0
0000000000003993
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiIdentifyPfn+26f
fffff800`02d41b1f f0410fba6e481f lock bts dword ptr [r14+48h],1Fh
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff880035d24f0 -- (.trap 0xfffff880035d24f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0200000000000020
rdx=000000000001b227 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002d41b1f rsp=fffff880035d2680 rbp=fffffa8005b26930
r8=000000000001b22a r9=0000000000000001 r10=0000000000000042
r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!MiIdentifyPfn+0x26f:
fffff800`02d41b1f f0410fba6e481f lock bts dword ptr [r14+48h],1Fh ds:00000000`00000048=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c8eca9 to fffff80002c8f740
STACK_TEXT:
fffff880`035d23a8 fffff800`02c8eca9 : 00000000`0000000a 00000000`00003993 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`035d23b0 fffff800`02c8d920 : 00000000`42506650 02000000`00091518 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`035d24f0 fffff800`02d41b1f : 00000000`00000000 02000000`000a05f0 00000000`000018c0 fffff800`02f5404b : nt!KiPageFault+0x260
fffff880`035d2680 fffff800`02d427cb : 00000000`00000000 00000000`00000004 fffffa80`03d89330 fffffa80`03d88000 : nt!MiIdentifyPfn+0x26f
fffff880`035d2720 fffff800`030a1ed5 : fffffa80`03d88000 fffff880`035d2ca0 fffff880`035d27f8 00000000`00000000 : nt!MmQueryPfnList+0xbb
fffff880`035d2760 fffff800`02fe71f8 : 00000000`00000006 00000000`00000000 fffffa80`03d88000 fffff800`02c1f001 : nt!PfpPfnPrioRequest+0x115
fffff880`035d27b0 fffff800`02f8b0c3 : 00000000`00000000 fffff800`02c1f000 fffffa80`03cee000 00000000`00000001 : nt! ?? ::NNGAKEGL::`string'+0x46ddd
fffff880`035d2840 fffff800`02f8bee5 : 00000000`0179bda8 fffff800`02c9c618 00000000`0179be00 00000000`0179bdc8 : nt!ExpQuerySystemInformation+0x11c2
fffff880`035d2be0 fffff800`02c8e993 : 00000000`057630a6 fffff880`035d2ca0 00000000`033da030 00000000`08e56760 : nt!NtQuerySystemInformation+0x4d
fffff880`035d2c20 00000000`77b0fa1a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0179bcd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b0fa1a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiIdentifyPfn+26f
fffff800`02d41b1f f0410fba6e481f lock bts dword ptr [r14+48h],1Fh
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiIdentifyPfn+26f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiIdentifyPfn+26f
BUCKET_ID: X64_0xA_nt!MiIdentifyPfn+26f
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\050511-23041-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c61000 PsLoadedModuleList = 0xfffff800`02e9ee50
Debug session time: Thu May 5 11:22:41.005 2011 (UTC - 4:00)
System Uptime: 0 days 8:36:09.737
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
..................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002d83b1f, fffff8800389acb0, 0}
Probably caused by : memory_corruption ( nt!MiIdentifyPfn+26f )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002d83b1f, Address of the instruction which caused the bugcheck
Arg3: fffff8800389acb0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiIdentifyPfn+26f
fffff800`02d83b1f f0410fba6e481f lock bts dword ptr [r14+48h],1Fh
CONTEXT: fffff8800389acb0 -- (.cxr 0xfffff8800389acb0)
rax=0000000000000001 rbx=020000000010121b rcx=0800000000000020
rdx=000000000001b227 rsi=0000000000000000 rdi=fffffa80043ea330
rip=fffff80002d83b1f rsp=fffff8800389b680 rbp=fffffa8005136d40
r8=000000000001b2ed r9=0000000000000001 r10=0000000000000042
r11=0000058000000000 r12=fffff88002fd3180 r13=0000000000000000
r14=2072656500000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!MiIdentifyPfn+0x26f:
fffff800`02d83b1f f0410fba6e481f lock bts dword ptr [r14+48h],1Fh ds:002b:20726565`00000048=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002d83b1f
STACK_TEXT:
fffff880`0389b680 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiIdentifyPfn+0x26f
FOLLOWUP_IP:
nt!MiIdentifyPfn+26f
fffff800`02d83b1f f0410fba6e481f lock bts dword ptr [r14+48h],1Fh
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiIdentifyPfn+26f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
STACK_COMMAND: .cxr 0xfffff8800389acb0 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MiIdentifyPfn+26f
BUCKET_ID: X64_0x3B_nt!MiIdentifyPfn+26f
Followup: MachineOwner
---------