Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041811-62125-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a4a000 PsLoadedModuleList = 0xfffff800`02c87e50
Debug session time: Mon Apr 18 23:21:25.451 2011 (UTC - 4:00)
System Uptime: 0 days 12:45:47.029
Loading Kernel Symbols
...............................................................
................................................................
...........................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41790, fffffa8000250a70, ffff, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+339d6 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa8000250a70
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41790
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: SearchProtocol
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002b2e26e to fffff80002abbf00
STACK_TEXT:
fffff880`079e5758 fffff800`02b2e26e : 00000000`0000001a 00000000`00041790 fffffa80`00250a70 00000000`0000ffff : nt!KeBugCheckEx
fffff880`079e5760 fffff800`02aef5d9 : fffffa80`00000000 000007fe`ee345fff 00000000`00000000 fffffa80`07f33d18 : nt! ?? ::FNODOBFM::`string'+0x339d6
fffff880`079e5920 fffff800`02a8f080 : ffffffff`ffffffff 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`079e5a40 fffff800`02d9e7af : fffff8a0`0371a530 00000000`00000001 00000000`00000000 fffffa80`03f18a10 : nt!MmCleanProcessAddressSpace+0x228
fffff880`079e5a90 fffff800`02d77cb8 : 00000000`00000000 00000000`00000001 000007ff`fffde000 00000000`00000000 : nt!PspExitThread+0x47f
fffff880`079e5b60 fffff800`02abb153 : fffffa80`043adb30 00000000`00000000 fffffa80`03f18a10 fffffa80`07d65690 : nt!NtTerminateProcess+0x138
fffff880`079e5be0 00000000`776c15da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`000efac8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x776c15da
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+339d6
fffff800`02b2e26e cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+339d6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+339d6
BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+339d6
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\042011-39593-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a12000 PsLoadedModuleList = 0xfffff800`02c4fe50
Debug session time: Wed Apr 20 22:59:15.021 2011 (UTC - 4:00)
System Uptime: 0 days 9:29:47.599
Loading Kernel Symbols
...............................................................
................................................................
...............................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050031, 406f8, fffff80002a8a609}
Probably caused by : memory_corruption
Followup: memory_corruption
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000406f8
Arg4: fffff80002a8a609
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: sidebar.exe
CURRENT_IRQL: 5c
LAST_CONTROL_TRANSFER: from fffff80002a83469 to fffff80002a83f00
STACK_TEXT:
fffff880`009efc68 fffff800`02a83469 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000406f8 : nt!KeBugCheckEx
fffff880`009efc70 fffff800`02a81932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`009efdb0 fffff800`02a8a609 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`02f1cfc0 fffff800`02a899e4 : 0020000a`000d003e fffff880`02f1d2e0 fffff880`02f1d2e0 00640061`003c0020 : nt!SepNormalAccessCheck+0x29
fffff880`02f1d050 fffff800`02a89410 : fffff880`02f1d2c0 00000000`00000000 fffff880`02f1d2c0 fffff880`02f1d2e0 : nt!SepAccessCheck+0x1d4
fffff880`02f1d180 fffff800`02a4c842 : fffffa80`0472df60 00000000`00000001 00000000`00000000 fffffa80`05ecc7c8 : nt!SeAccessCheckWithHint+0x180
fffff880`02f1d260 fffff880`01405a4a : 00200020`00200020 003c0020`00200020 00650072`00690064 006f0069`00740063 : nt!SeAccessCheckFromState+0x102
fffff880`02f1d950 fffff880`014052af : 00720070`00000000 0063006f`00000000 00760020`006c006f 00650075`006c0061 : NETIO!CompareSecurityContexts+0x6a
fffff880`02f1d9c0 fffff880`01405444 : 00200020`00200020 00200020`00200020 00700072`003c0020 fffff880`014c2999 : NETIO!MatchValues+0xef
fffff880`02f1da10 fffff880`014057c1 : fffffa80`07053270 fffffa80`076e35d0 fffff880`02f1e290 fffff880`02f1dc50 : NETIO!FilterMatch+0x94
fffff880`02f1da60 fffff880`014066fc : fffff880`02f10003 00000000`00000000 fffff880`02f1e290 fffff880`02f1dc50 : NETIO!IndexHashClassify+0x151
fffff880`02f1db10 fffff880`0173f819 : fffff880`02f1e290 fffff880`02f1dfc8 fffff880`02f1ede0 fffffa80`05158950 : NETIO!KfdClassify+0xa4e
fffff880`02f1de80 fffff880`017076f8 : fffffa80`053fe850 fffff880`02f1ed08 fffff880`018057a0 fffff880`02f1ede0 : tcpip!WfpAleClassify+0x49
fffff880`02f1ded0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeReceive+0x818
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff80002a8a105 - nt!SwapContext_PatchXSave+2
[ 01:21 ]
fffff80002a8a1e8 - nt!SwapContext_PatchXRstor+2 (+0xe3)
[ 09:29 ]
fffff80002a8a3a5 - nt!EnlightenedSwapContext_PatchXSave+2 (+0x1bd)
[ 01:21 ]
fffff80002a8a48a - nt!EnlightenedSwapContext_PatchXRstor+2 (+0xe5)
[ 09:29 ]
4 errors : !nt (fffff80002a8a105-fffff80002a8a48a)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT_LARGE
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT_LARGE
BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT_LARGE
Followup: memory_corruption
---------