Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\010511-19218-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e4b000 PsLoadedModuleList = 0xfffff800`03088e50
Debug session time: Wed Jan 5 18:51:25.859 2011 (UTC - 5:00)
System Uptime: 0 days 1:22:52.187
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff80000ec924a, 8, fffff80000ec924a, 2}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+40ec0 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff80000ec924a, memory referenced.
Arg2: 0000000000000008, value 0 = read operation, 1 = write operation.
Arg3: fffff80000ec924a, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800030f30e0
fffff80000ec924a
FAULTING_IP:
+6433323962373964
fffff800`00ec924a ?? ???
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800311bb10 -- (.trap 0xfffff8800311bb10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000002531b rbx=0000000000000000 rcx=fffffa8006f9cc00
rdx=fffffa8006fdca08 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80000ec924a rsp=fffff8800311bca0 rbp=0000000000000000
r8=0000000000000000 r9=0000000323429fcf r10=000000000001d8b7
r11=00000000002f9d01 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
fffff800`00ec924a ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002f3a8f2 to fffff80002ebb740
STACK_TEXT:
fffff880`0311b9a8 fffff800`02f3a8f2 : 00000000`00000050 fffff800`00ec924a 00000000`00000008 fffff880`0311bb10 : nt!KeBugCheckEx
fffff880`0311b9b0 fffff800`02eb982e : 00000000`00000008 00000000`00000000 fffff880`009ee100 00001f80`00000001 : nt! ?? ::FNODOBFM::`string'+0x40ec0
fffff880`0311bb10 fffff800`00ec924a : 00000000`002e7e1f fffffa80`06f7fb38 fffff880`009f8fc0 00000000`00000001 : nt!KiPageFault+0x16e
fffff880`0311bca0 00000000`002e7e1f : fffffa80`06f7fb38 fffff880`009f8fc0 00000000`00000001 fffff880`009ee180 : 0xfffff800`00ec924a
fffff880`0311bca8 fffffa80`06f7fb38 : fffff880`009f8fc0 00000000`00000001 fffff880`009ee180 fffff800`02ec6cb7 : 0x2e7e1f
fffff880`0311bcb0 fffff880`009f8fc0 : 00000000`00000001 fffff880`009ee180 fffff800`02ec6cb7 00000003`872b6284 : 0xfffffa80`06f7fb38
fffff880`0311bcb8 00000000`00000001 : fffff880`009ee180 fffff800`02ec6cb7 00000003`872b6284 00000003`0004db0b : 0xfffff880`009f8fc0
fffff880`0311bcc0 fffff880`009ee180 : fffff800`02ec6cb7 00000003`872b6284 00000003`0004db0b 00000003`872b6284 : 0x1
fffff880`0311bcc8 fffff800`02ec6cb7 : 00000003`872b6284 00000003`0004db0b 00000003`872b6284 00000000`0000000b : 0xfffff880`009ee180
fffff880`0311bcd0 fffff800`02ec3ebc : fffff880`009ee180 fffff880`00000000 00000000`00000000 fffff800`02fdbda0 : nt!KiRetireDpcList+0x277
fffff880`0311bd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x2c
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+40ec0
fffff800`02f3a8f2 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+40ec0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x50_nt!_??_::FNODOBFM::_string_+40ec0
BUCKET_ID: X64_0x50_nt!_??_::FNODOBFM::_string_+40ec0
Followup: MachineOwner
---------