Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\030411-29905-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02a00000 PsLoadedModuleList = 0xfffff800`02c45e90
Debug session time: Fri Mar 4 14:05:01.301 2011 (UTC - 5:00)
System Uptime: 0 days 0:47:42.503
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff3000dae4138, 0, fffff80002aa0ef5, 7}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!FsFilterPerformCallbacks+105 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff3000dae4138, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002aa0ef5, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000007, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb10e8
fffff3000dae4138
FAULTING_IP:
nt!FsFilterPerformCallbacks+105
fffff800`02aa0ef5 488b5c2468 mov rbx,qword ptr [rsp+68h]
MM_INTERNAL_CODE: 7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff88008dc7f40 -- (.trap 0xfffff88008dc7f40)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa8003a901b0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002aa0ef5 rsp=fffff88008dc80d0 rbp=fffffa8004d1c000
r8=0000000000000000 r9=fffff88008dc8130 r10=fffffa8003a90af0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!FsFilterPerformCallbacks+0x105:
fffff800`02aa0ef5 488b5c2468 mov rbx,qword ptr [rsp+68h] ss:0018:fffff880`08dc8138=0000000000000000
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a2abf7 to fffff80002a80640
STACK_TEXT:
fffff880`08dc7dd8 fffff800`02a2abf7 : 00000000`00000050 fffff300`0dae4138 00000000`00000000 fffff880`08dc7f40 : nt!KeBugCheckEx
fffff880`08dc7de0 fffff800`02a7e76e : 00000000`00000000 fffff300`0dae4138 fffff880`009e9100 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x44811
fffff880`08dc7f40 fffff800`02aa0ef5 : 00000000`00000000 00000000`000007ff 00000000`00000000 00000000`00000009 : nt!KiPageFault+0x16e
fffff880`08dc80d0 fffff800`02d56654 : 00000000`00000000 00000000`00000000 fffffa80`04d1c030 00000000`00000000 : nt!FsFilterPerformCallbacks+0x105
fffff880`08dc8130 fffff800`02ac2d07 : fffff880`08dc86c0 fffff880`08dc8600 fffffa80`04d2bf10 00000000`00000000 : nt!FsRtlAcquireFileForCcFlushEx+0xd0
fffff880`08dc83d0 fffff800`02ac20c9 : fffffa80`04d294b8 00000000`00000000 00000000`00001000 fffff880`08dc8680 : nt!MmFlushSection+0x1c3
fffff880`08dc8490 fffff880`010d66e1 : fffffa80`04d294b8 fffff800`00000000 fffff8a0`00001000 fffff880`00001000 : nt!CcFlushCache+0x5e9
fffff880`08dc8590 fffff880`010d98db : fffff880`08dc8ab0 fffffa80`04d1c180 00000000`00000000 fffff880`08dc8c00 : Ntfs!NtfsCheckpointVolume+0xbc1
fffff880`08dc8990 fffff880`010d827b : fffff880`08dc8ab0 fffffa80`04d1c180 fffffa80`04d1c188 fffffa80`048df188 : Ntfs!NtfsCheckpointAllVolumesWorker+0x4b
fffff880`08dc89e0 fffff880`010da398 : fffff880`08dc8ab0 00000000`00000000 fffff880`010d9890 fffff880`08dc8cb8 : Ntfs!NtfsForEachVcb+0x167
fffff880`08dc8a80 fffff800`02a8aa21 : 00000000`00000000 fffff800`02d76f01 fffff800`02c7f100 fffffa80`00000002 : Ntfs!NtfsCheckpointAllVolumes+0xb8
fffff880`08dc8cb0 fffff800`02d1dcce : fffff880`0334cdf8 fffffa80`03c09570 00000000`00000080 fffffa80`039d4b30 : nt!ExpWorkerThread+0x111
fffff880`08dc8d40 fffff800`02a71fe6 : fffff880`009e9180 fffffa80`03c09570 fffffa80`03ad0040 fffff880`01024384 : nt!PspSystemThreadStartup+0x5a
fffff880`08dc8d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!FsFilterPerformCallbacks+105
fffff800`02aa0ef5 488b5c2468 mov rbx,qword ptr [rsp+68h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!FsFilterPerformCallbacks+105
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
FAILURE_BUCKET_ID: X64_0x50_nt!FsFilterPerformCallbacks+105
BUCKET_ID: X64_0x50_nt!FsFilterPerformCallbacks+105
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\030511-30232-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c11000 PsLoadedModuleList = 0xfffff800`02e56e90
Debug session time: Fri Mar 4 18:52:57.092 2011 (UTC - 5:00)
System Uptime: 0 days 4:02:44.294
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff80002fa8aab, 1, 1e6}
Probably caused by : memory_corruption ( nt!MiUnmapViewOfSection+52b )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002fa8aab, The address that the exception occurred at
Arg3: 0000000000000001, Parameter 0 of the exception
Arg4: 00000000000001e6, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiUnmapViewOfSection+52b
fffff800`02fa8aab 6601afc6010000 add word ptr [rdi+1C6h],bp
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: 00000000000001e6
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec20e8
00000000000001e6
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: TrustedInstall
CURRENT_IRQL: 0
TRAP_FRAME: fffff88009726910 -- (.trap 0xfffff88009726910)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000005580000 rbx=0000000000000000 rcx=00000000058e0500
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002fa8aab rsp=fffff88009726aa0 rbp=000000000000002c
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffff7000108002c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!MiUnmapViewOfSection+0x52b:
fffff800`02fa8aab 6601afc6010000 add word ptr [rdi+1C6h],bp ds:e230:00000000`000001c6=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cdd028 to fffff80002c91640
STACK_TEXT:
fffff880`09726088 fffff800`02cdd028 : 00000000`0000001e ffffffff`c0000005 fffff800`02fa8aab 00000000`00000001 : nt!KeBugCheckEx
fffff880`09726090 fffff800`02c90cc2 : fffff880`09726868 00000000`0000058e fffff880`09726910 00000000`0000002c : nt! ?? ::FNODOBFM::`string'+0x4987d
fffff880`09726730 fffff800`02c8f83a : 00000000`00000001 00000000`000001e6 fffff680`0002d000 00000000`0000058e : nt!KiExceptionDispatch+0xc2
fffff880`09726910 fffff800`02fa8aab : 00000000`0000058e 00000000`0000002c 00000000`0000002c fffff800`02c80b84 : nt!KiPageFault+0x23a
fffff880`09726aa0 fffffa80`06a903f8 : fffffa80`050780d0 00000000`00000000 fffffa80`04980950 00000000`00000000 : nt!MiUnmapViewOfSection+0x52b
fffff880`09726b60 fffffa80`050780d0 : 00000000`00000000 fffffa80`04980950 00000000`00000000 00000000`058e0000 : 0xfffffa80`06a903f8
fffff880`09726b68 00000000`00000000 : fffffa80`04980950 00000000`00000000 00000000`058e0000 00000000`058e0000 : 0xfffffa80`050780d0
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiUnmapViewOfSection+52b
fffff800`02fa8aab 6601afc6010000 add word ptr [rdi+1C6h],bp
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!MiUnmapViewOfSection+52b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!MiUnmapViewOfSection+52b
BUCKET_ID: X64_0x1E_c0000005_nt!MiUnmapViewOfSection+52b
Followup: MachineOwner
---------