Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121010-18501-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c1f000 PsLoadedModuleList = 0xfffff800`02e5ce50
Debug session time: Fri Dec 10 15:36:23.842 2010 (UTC - 5:00)
System Uptime: 0 days 3:22:57.528
Loading Kernel Symbols
...............................................................
................................................................
.................................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff88102e497ff, 0, fffff88004411260, 5}
Unable to load image \SystemRoot\system32\DRIVERS\ngvpn.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ngvpn.sys
*** ERROR: Module load completed but symbols could not be loaded for ngvpn.sys
Could not read faulting driver name
Probably caused by : ngvpn.sys ( ngvpn+11260 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff88102e497ff, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff88004411260, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec70e0
fffff88102e497ff
FAULTING_IP:
ngvpn+11260
fffff880`04411260 803c282e cmp byte ptr [rax+rbp],2Eh
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff88002e495e0 -- (.trap 0xfffff88002e495e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffff rbx=0000000000000000 rcx=0000000000000001
rdx=fffffa800682320c rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004411260 rsp=fffff88002e49770 rbp=fffff88002e49800
r8=0000000000000018 r9=fffff88002e49800 r10=0000000000000155
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
ngvpn+0x11260:
fffff880`04411260 803c282e cmp byte ptr [rax+rbp],2Eh ds:fffff881`02e497ff=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002d0e8c1 to fffff80002c8f740
STACK_TEXT:
fffff880`02e49478 fffff800`02d0e8c1 : 00000000`00000050 fffff881`02e497ff 00000000`00000000 fffff880`02e495e0 : nt!KeBugCheckEx
fffff880`02e49480 fffff800`02c8d82e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000000c : nt! ?? ::FNODOBFM::`string'+0x40e8b
fffff880`02e495e0 fffff880`04411260 : 00000000`00000000 fffff880`02e49800 fffffa80`0682320c fffffa80`06823200 : nt!KiPageFault+0x16e
fffff880`02e49770 00000000`00000000 : fffff880`02e49800 fffffa80`0682320c fffffa80`06823200 00000000`00000100 : ngvpn+0x11260
STACK_COMMAND: kb
FOLLOWUP_IP:
ngvpn+11260
fffff880`04411260 803c282e cmp byte ptr [rax+rbp],2Eh
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: ngvpn+11260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ngvpn
IMAGE_NAME: ngvpn.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4b678716
FAILURE_BUCKET_ID: X64_0x50_ngvpn+11260
BUCKET_ID: X64_0x50_ngvpn+11260
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121010-17721-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c15000 PsLoadedModuleList = 0xfffff800`02e52e50
Debug session time: Fri Dec 10 19:21:25.503 2010 (UTC - 5:00)
System Uptime: 0 days 3:43:49.439
Loading Kernel Symbols
...............................................................
................................................................
..................................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff88102e9a7ff, 0, fffff8800441a260, 5}
Unable to load image \SystemRoot\system32\DRIVERS\ngvpn.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ngvpn.sys
*** ERROR: Module load completed but symbols could not be loaded for ngvpn.sys
Could not read faulting driver name
Probably caused by : ngvpn.sys ( ngvpn+11260 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff88102e9a7ff, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8800441a260, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ebd0e0
fffff88102e9a7ff
FAULTING_IP:
ngvpn+11260
fffff880`0441a260 803c282e cmp byte ptr [rax+rbp],2Eh
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff88002e9a5e0 -- (.trap 0xfffff88002e9a5e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffff rbx=0000000000000000 rcx=0000000000000001
rdx=fffffa80066aa60c rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800441a260 rsp=fffff88002e9a770 rbp=fffff88002e9a800
r8=0000000000000018 r9=fffff88002e9a800 r10=000000000000dfff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
ngvpn+0x11260:
fffff880`0441a260 803c282e cmp byte ptr [rax+rbp],2Eh ds:fffff881`02e9a7ff=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002d048c1 to fffff80002c85740
STACK_TEXT:
fffff880`02e9a478 fffff800`02d048c1 : 00000000`00000050 fffff881`02e9a7ff 00000000`00000000 fffff880`02e9a5e0 : nt!KeBugCheckEx
fffff880`02e9a480 fffff800`02c8382e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000000c : nt! ?? ::FNODOBFM::`string'+0x40e8b
fffff880`02e9a5e0 fffff880`0441a260 : 00000000`00000000 fffff880`02e9a800 fffffa80`066aa60c fffffa80`066aa600 : nt!KiPageFault+0x16e
fffff880`02e9a770 00000000`00000000 : fffff880`02e9a800 fffffa80`066aa60c fffffa80`066aa600 00000000`00000100 : ngvpn+0x11260
STACK_COMMAND: kb
FOLLOWUP_IP:
ngvpn+11260
fffff880`0441a260 803c282e cmp byte ptr [rax+rbp],2Eh
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: ngvpn+11260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ngvpn
IMAGE_NAME: ngvpn.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4b678716
FAILURE_BUCKET_ID: X64_0x50_ngvpn+11260
BUCKET_ID: X64_0x50_ngvpn+11260
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121010-20092-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c54000 PsLoadedModuleList = 0xfffff800`02e91e50
Debug session time: Fri Dec 10 12:11:56.133 2010 (UTC - 5:00)
System Uptime: 0 days 21:56:21.068
Loading Kernel Symbols
...............................................................
................................................................
..................................................
Loading User Symbols
Loading unloaded module list
...............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff88102e4c7ff, 0, fffff88004411260, 5}
Unable to load image \SystemRoot\system32\DRIVERS\ngvpn.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ngvpn.sys
*** ERROR: Module load completed but symbols could not be loaded for ngvpn.sys
Could not read faulting driver name
Probably caused by : ngvpn.sys ( ngvpn+11260 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff88102e4c7ff, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff88004411260, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002efc0e0
fffff88102e4c7ff
FAULTING_IP:
ngvpn+11260
fffff880`04411260 803c282e cmp byte ptr [rax+rbp],2Eh
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff88002e4c5e0 -- (.trap 0xfffff88002e4c5e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffff rbx=0000000000000000 rcx=0000000000000001
rdx=fffffa800404d9cc rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004411260 rsp=fffff88002e4c770 rbp=fffff88002e4c800
r8=0000000000000018 r9=fffff88002e4c800 r10=0000000000002c1d
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
ngvpn+0x11260:
fffff880`04411260 803c282e cmp byte ptr [rax+rbp],2Eh ds:fffff881`02e4c7ff=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002d438c1 to fffff80002cc4740
STACK_TEXT:
fffff880`02e4c478 fffff800`02d438c1 : 00000000`00000050 fffff881`02e4c7ff 00000000`00000000 fffff880`02e4c5e0 : nt!KeBugCheckEx
fffff880`02e4c480 fffff800`02cc282e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000000c : nt! ?? ::FNODOBFM::`string'+0x40e8b
fffff880`02e4c5e0 fffff880`04411260 : 00000000`00000000 fffff880`02e4c800 fffffa80`0404d9cc fffffa80`0404d9c0 : nt!KiPageFault+0x16e
fffff880`02e4c770 00000000`00000000 : fffff880`02e4c800 fffffa80`0404d9cc fffffa80`0404d9c0 00000000`00000100 : ngvpn+0x11260
STACK_COMMAND: kb
FOLLOWUP_IP:
ngvpn+11260
fffff880`04411260 803c282e cmp byte ptr [rax+rbp],2Eh
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: ngvpn+11260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ngvpn
IMAGE_NAME: ngvpn.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4b678716
FAILURE_BUCKET_ID: X64_0x50_ngvpn+11260
BUCKET_ID: X64_0x50_ngvpn+11260
Followup: MachineOwner
---------