Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\050911-14289-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03261000 PsLoadedModuleList = 0xfffff800`0349ee50
Debug session time: Mon May 9 09:48:19.397 2011 (UTC - 4:00)
System Uptime: 0 days 0:22:29.427
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
.................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffffd7ffd000000, 0, fffff800033023fa, 7}
Could not read faulting driver name
Probably caused by : memory_corruption ( nt!MiDeleteVirtualAddresses+481 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffd7ffd000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800033023fa, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000007, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800035090e0
fffffd7ffd000000
FAULTING_IP:
nt!MiDeleteVirtualAddresses+481
fffff800`033023fa 448b2b mov r13d,dword ptr [rbx]
MM_INTERNAL_CODE: 7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: MsMpEng.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88005de26a0 -- (.trap 0xfffff88005de26a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000ffff00000 rbx=0000000000000000 rcx=0000058000000000
rdx=0000000010a93fff rsi=0000000000000000 rdi=0000000000000000
rip=fffff800033023fa rsp=fffff88005de2830 rbp=0000000010a89000
r8=0000000000000000 r9=fffffa80098ea730 r10=0000000fffffffff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!MiDeleteVirtualAddresses+0x481:
fffff800`033023fa 448b2b mov r13d,dword ptr [rbx] ds:aac8:00000000`00000000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003350849 to fffff800032d1740
STACK_TEXT:
fffff880`05de2538 fffff800`03350849 : 00000000`00000050 fffffd7f`fd000000 00000000`00000000 fffff880`05de26a0 : nt!KeBugCheckEx
fffff880`05de2540 fffff800`032cf82e : 00000000`00000000 fffffd7f`fd000000 fffffa80`06601c00 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x40e0b
fffff880`05de26a0 fffff800`033023fa : fffffa80`098ea730 55555555`55555555 00000000`00000000 b1f00000`80bf9025 : nt!KiPageFault+0x16e
fffff880`05de2830 fffff800`03304df9 : 00000000`00000000 00000000`10a93fff fffff8a0`00000000 fffff800`00000000 : nt!MiDeleteVirtualAddresses+0x481
fffff880`05de29f0 fffff800`035e8010 : fffffa80`068a1010 0007ffff`00000000 fffffa80`0a085b90 fffffa80`0a085b90 : nt!MiRemoveMappedView+0xd9
fffff880`05de2b10 fffff800`035e841b : 00000000`00000000 00000000`10710000 fffffa80`00000001 00000000`00000601 : nt!MiUnmapViewOfSection+0x1b0
fffff880`05de2bd0 fffff800`032d0993 : fffffa80`08887a90 fffff880`05de2ca0 fffffa80`098ea730 fffffa80`00008000 : nt!NtUnmapViewOfSection+0x5f
fffff880`05de2c20 00000000`7748f95a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0521d788 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7748f95a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiDeleteVirtualAddresses+481
fffff800`033023fa 448b2b mov r13d,dword ptr [rbx]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiDeleteVirtualAddresses+481
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x50_nt!MiDeleteVirtualAddresses+481
BUCKET_ID: X64_0x50_nt!MiDeleteVirtualAddresses+481
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\050711-16364-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0324f000 PsLoadedModuleList = 0xfffff800`0348ce50
Debug session time: Sat May 7 06:14:40.089 2011 (UTC - 4:00)
System Uptime: 0 days 0:01:39.119
Loading Kernel Symbols
...............................................................
................................................................
...............................
Loading User Symbols
Loading unloaded module list
.............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff6c6f7800088, 0, fffff80003293d83, 5}
Could not read faulting driver name
Probably caused by : memory_corruption ( nt!MiDeleteAddressesInWorkingSet+468 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff6c6f7800088, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80003293d83, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800034f70e0
fffff6c6f7800088
FAULTING_IP:
nt!MiDeleteAddressesInWorkingSet+468
fffff800`03293d83 488b0408 mov rax,qword ptr [rax+rcx]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88008acfee0 -- (.trap 0xfffff88008acfee0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000046f7800088 rbx=0000000000000000 rcx=fffff68000000000
rdx=00000000000089b2 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003293d83 rsp=fffff88008ad0070 rbp=fffff700010c7408
r8=fffffa80092afec8 r9=0000000000000000 r10=00000000000070ac
r11=fffff70001080000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!MiDeleteAddressesInWorkingSet+0x468:
fffff800`03293d83 488b0408 mov rax,qword ptr [rax+rcx] ds:0290:fffff6c6`f7800088=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000333e8c1 to fffff800032bf740
STACK_TEXT:
fffff880`08acfd78 fffff800`0333e8c1 : 00000000`00000050 fffff6c6`f7800088 00000000`00000000 fffff880`08acfee0 : nt!KeBugCheckEx
fffff880`08acfd80 fffff800`032bd82e : 00000000`00000000 0000000f`ffffffff fffff680`0007fb00 00000000`0ff62000 : nt! ?? ::FNODOBFM::`string'+0x40e8b
fffff880`08acfee0 fffff800`03293d83 : fffffa80`0a81a010 fffffa80`0a6c4001 00000000`00000000 fffff880`01856380 : nt!KiPageFault+0x16e
fffff880`08ad0070 fffff800`0329268a : fffffa80`092afb30 fffffa80`00000008 fffff8a0`000070ac fffff880`00000000 : nt!MiDeleteAddressesInWorkingSet+0x468
fffff880`08ad0920 fffff800`035a4dcf : fffff8a0`00f7d060 fffff880`08ad0c20 00000000`00000000 fffffa80`094f8b60 : nt!MmCleanProcessAddressSpace+0x96
fffff880`08ad0970 fffff800`0357d635 : 00000000`000000ff fffff8a0`0112b801 000007ff`fffa0000 fffffa80`07c0cb60 : nt!PspExitThread+0x92f
fffff880`08ad0a30 fffff800`0329c1db : 00000000`00000000 fffffa80`09297820 00000000`00000000 00000000`00000000 : nt!PsExitSpecialApc+0x1d
fffff880`08ad0a60 fffff800`0329c620 : 00000000`774e4298 fffff880`08ad0ae0 fffff800`0357d74c 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`08ad0ae0 fffff800`032bea37 : fffffa80`094f8b60 00000000`774e4270 00000000`000000c0 00000000`00412340 : nt!KiInitiateUserApc+0x70
fffff880`08ad0c20 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiDeleteAddressesInWorkingSet+468
fffff800`03293d83 488b0408 mov rax,qword ptr [rax+rcx]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiDeleteAddressesInWorkingSet+468
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x50_nt!MiDeleteAddressesInWorkingSet+468
BUCKET_ID: X64_0x50_nt!MiDeleteAddressesInWorkingSet+468
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\050711-18720-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03253000 PsLoadedModuleList = 0xfffff800`03490e50
Debug session time: Sat May 7 06:22:36.540 2011 (UTC - 4:00)
System Uptime: 0 days 0:06:54.571
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
..................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1904fb, fffff88007b8d828, fffff88007b8d090, fffff800033f80f3}
Probably caused by : Ntfs.sys ( Ntfs!NtfsCommonClose+949 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88007b8d828
Arg3: fffff88007b8d090
Arg4: fffff800033f80f3
Debugging Details:
------------------
EXCEPTION_RECORD: fffff88007b8d828 -- (.exr 0xfffff88007b8d828)
ExceptionAddress: fffff800033f80f3 (nt!ExFreePoolWithTag+0x0000000000000043)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff88007b8d090 -- (.cxr 0xfffff88007b8d090)
rax=0000000000000000 rbx=fffffa8006f49a40 rcx=08fffff8a00d5775
rdx=0000000000000000 rsi=fffff8a00e973010 rdi=fffff88007b8dc38
rip=fffff800033f80f3 rsp=fffff88007b8da60 rbp=fffff800034685a0
r8=fffff8a00d5ef470 r9=00000000000000a0 r10=fffff880009b3960
r11=fffff8a00f33c5a0 r12=fffffa80079f7180 r13=08fffff8a00d5775
r14=fffff8a00e973450 r15=0000000000000001
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!ExFreePoolWithTag+0x43:
fffff800`033f80f3 418b45f0 mov eax,dword ptr [r13-10h] ds:002b:08fffff8`a00d5765=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800034fb0e0
ffffffffffffffff
FOLLOWUP_IP:
Ntfs!NtfsCommonClose+949
fffff880`012e3e0c e914fbffff jmp Ntfs!NtfsCommonClose+0x465 (fffff880`012e3925)
FAULTING_IP:
nt!ExFreePoolWithTag+43
fffff800`033f80f3 418b45f0 mov eax,dword ptr [r13-10h]
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from fffff880012e3e0c to fffff800033f80f3
STACK_TEXT:
fffff880`07b8da60 fffff880`012e3e0c : fffffa80`079f7180 fffff800`034685a0 fffff8a0`4946744e 00000000`00000009 : nt!ExFreePoolWithTag+0x43
fffff880`07b8db10 fffff880`012bd38f : fffffa80`06f49a40 fffff8a0`0e973140 fffff8a0`0e973010 fffffa80`079f7180 : Ntfs!NtfsCommonClose+0x949
fffff880`07b8dbe0 fffff800`032d0961 : 00000000`00000000 fffff880`016a9000 fffff800`03468501 fffffa80`00000003 : Ntfs!NtfsFspClose+0x15f
fffff880`07b8dcb0 fffff800`03567c06 : 00000000`05d076eb fffffa80`0a3c6040 00000000`00000080 fffffa80`06714040 : nt!ExpWorkerThread+0x111
fffff880`07b8dd40 fffff800`032a1c26 : fffff800`0343de80 fffffa80`0a3c6040 fffff800`0344bc40 fffff880`01247534 : nt!PspSystemThreadStartup+0x5a
fffff880`07b8dd80 00000000`00000000 : fffff880`07b8e000 fffff880`07b88000 fffff880`07b8d700 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: Ntfs!NtfsCommonClose+949
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f
STACK_COMMAND: .cxr 0xfffff88007b8d090 ; kb
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsCommonClose+949
BUCKET_ID: X64_0x24_Ntfs!NtfsCommonClose+949
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88007b8d828
Arg3: fffff88007b8d090
Arg4: fffff800033f80f3
Debugging Details:
------------------
EXCEPTION_RECORD: fffff88007b8d828 -- (.exr 0xfffff88007b8d828)
ExceptionAddress: fffff800033f80f3 (nt!ExFreePoolWithTag+0x0000000000000043)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff88007b8d090 -- (.cxr 0xfffff88007b8d090)
rax=0000000000000000 rbx=fffffa8006f49a40 rcx=08fffff8a00d5775
rdx=0000000000000000 rsi=fffff8a00e973010 rdi=fffff88007b8dc38
rip=fffff800033f80f3 rsp=fffff88007b8da60 rbp=fffff800034685a0
r8=fffff8a00d5ef470 r9=00000000000000a0 r10=fffff880009b3960
r11=fffff8a00f33c5a0 r12=fffffa80079f7180 r13=08fffff8a00d5775
r14=fffff8a00e973450 r15=0000000000000001
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!ExFreePoolWithTag+0x43:
fffff800`033f80f3 418b45f0 mov eax,dword ptr [r13-10h] ds:002b:08fffff8`a00d5765=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: ffffffffffffffff
FOLLOWUP_IP:
Ntfs!NtfsCommonClose+949
fffff880`012e3e0c e914fbffff jmp Ntfs!NtfsCommonClose+0x465 (fffff880`012e3925)
FAULTING_IP:
nt!ExFreePoolWithTag+43
fffff800`033f80f3 418b45f0 mov eax,dword ptr [r13-10h]
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from fffff880012e3e0c to fffff800033f80f3
STACK_TEXT:
fffff880`07b8da60 fffff880`012e3e0c : fffffa80`079f7180 fffff800`034685a0 fffff8a0`4946744e 00000000`00000009 : nt!ExFreePoolWithTag+0x43
fffff880`07b8db10 fffff880`012bd38f : fffffa80`06f49a40 fffff8a0`0e973140 fffff8a0`0e973010 fffffa80`079f7180 : Ntfs!NtfsCommonClose+0x949
fffff880`07b8dbe0 fffff800`032d0961 : 00000000`00000000 fffff880`016a9000 fffff800`03468501 fffffa80`00000003 : Ntfs!NtfsFspClose+0x15f
fffff880`07b8dcb0 fffff800`03567c06 : 00000000`05d076eb fffffa80`0a3c6040 00000000`00000080 fffffa80`06714040 : nt!ExpWorkerThread+0x111
fffff880`07b8dd40 fffff800`032a1c26 : fffff800`0343de80 fffffa80`0a3c6040 fffff800`0344bc40 fffff880`01247534 : nt!PspSystemThreadStartup+0x5a
fffff880`07b8dd80 00000000`00000000 : fffff880`07b8e000 fffff880`07b88000 fffff880`07b8d700 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: Ntfs!NtfsCommonClose+949
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f
STACK_COMMAND: .cxr 0xfffff88007b8d090 ; kb
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsCommonClose+949
BUCKET_ID: X64_0x24_Ntfs!NtfsCommonClose+949
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\050811-10873-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0325a000 PsLoadedModuleList = 0xfffff800`03497e50
Debug session time: Sun May 8 07:18:31.664 2011 (UTC - 4:00)
System Uptime: 0 days 2:00:00.694
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
.................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {6e81000, 1, 73f7500a, 8}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+43017 )
Followup: MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: 0000000006e81000, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: 0000000073f7500a, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000008, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800035020e0
0000000006e81000
FAULTING_IP:
+6266396537393863
00000000`73f7500a ?? ???
MM_INTERNAL_CODE: 8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: League of Lege
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80003276f89 to fffff800032ca740
STACK_TEXT:
fffff880`07b64ab8 fffff800`03276f89 : 00000000`00000050 00000000`06e81000 00000000`00000001 fffff880`07b64c20 : nt!KeBugCheckEx
fffff880`07b64ac0 fffff800`032c882e : 00000000`00000001 00000000`0018ed28 fffff880`07b64b01 fffffa80`06b86780 : nt! ?? ::FNODOBFM::`string'+0x43017
fffff880`07b64c20 00000000`73f7500a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0018ecc4 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x73f7500a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+43017
fffff800`03276f89 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+43017
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
FAILURE_BUCKET_ID: X64_0x50_nt!_??_::FNODOBFM::_string_+43017
BUCKET_ID: X64_0x50_nt!_??_::FNODOBFM::_string_+43017
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\050911-17066-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03267000 PsLoadedModuleList = 0xfffff800`034a4e50
Debug session time: Mon May 9 09:50:33.618 2011 (UTC - 4:00)
System Uptime: 0 days 0:01:36.648
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {5003, fffff70001080000, 97f7, 97f900012fef}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+21b46 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 00000000000097f7
Arg4: 000097f900012fef
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_5003
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: Skype.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff8000333f986 to fffff800032d7740
STACK_TEXT:
fffff880`09012a68 fffff800`0333f986 : 00000000`0000001a 00000000`00005003 fffff700`01080000 00000000`000097f7 : nt!KeBugCheckEx
fffff880`09012a70 fffff800`032f204c : fffff680`000afb90 fffff880`09012b40 00000000`00000000 ffffffff`ffffffff : nt! ?? ::FNODOBFM::`string'+0x21b46
fffff880`09012ac0 fffff800`032d582e : 00000000`00000001 00000000`1588a800 00000000`14a90001 00000000`11210b02 : nt!MmAccessFault+0xc4c
fffff880`09012c20 00000000`76849b60 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`00189f2c 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76849b60
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+21b46
fffff800`0333f986 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+21b46
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
FAILURE_BUCKET_ID: X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+21b46
BUCKET_ID: X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+21b46
Followup: MachineOwner
---------