Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041311-23181-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c15000 PsLoadedModuleList = 0xfffff800`02e5ae90
Debug session time: Wed Apr 13 18:10:29.549 2011 (UTC - 4:00)
System Uptime: 1 days 20:00:26.923
Loading Kernel Symbols
...............................................................
................................................................
.................................................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002c66f77, fffff8800a250e90, 0}
Probably caused by : memory_corruption ( nt!MmCleanProcessAddressSpace+f7 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002c66f77, Address of the instruction which caused the bugcheck
Arg3: fffff8800a250e90, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MmCleanProcessAddressSpace+f7
fffff800`02c66f77 498b442420 mov rax,qword ptr [r12+20h]
CONTEXT: fffff8800a250e90 -- (.cxr 0xfffff8800a250e90)
rax=fffffa8003da8110 rbx=ffffffffffffffff rcx=fffffa8007173e71
rdx=8000000000000000 rsi=fffffa8007bdc840 rdi=fffffa8005115b60
rip=fffff80002c66f77 rsp=fffff8800a251870 rbp=fffff8800a251c20
r8=0007ffffffffffff r9=0000000000000050 r10=fffff80002e08880
r11=fffffa8007173e70 r12=0000000000000000 r13=0000000000000001
r14=0000000000010fff r15=fffffa8007bdc901
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!MmCleanProcessAddressSpace+0xf7:
fffff800`02c66f77 498b442420 mov rax,qword ptr [r12+20h] ds:002b:00000000`00000020=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002c66f77
STACK_TEXT:
fffff880`0a251870 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmCleanProcessAddressSpace+0xf7
FOLLOWUP_IP:
nt!MmCleanProcessAddressSpace+f7
fffff800`02c66f77 498b442420 mov rax,qword ptr [r12+20h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MmCleanProcessAddressSpace+f7
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
STACK_COMMAND: .cxr 0xfffff8800a250e90 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MmCleanProcessAddressSpace+f7
BUCKET_ID: X64_0x3B_nt!MmCleanProcessAddressSpace+f7
Followup: MachineOwner
---------
Loading Dump File [F:\DMP\042011-23524-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c4e000 PsLoadedModuleList = 0xfffff800`02e93e90
Debug session time: Wed Apr 20 15:33:49.895 2011 (UTC - 4:00)
System Uptime: 0 days 0:06:27.268
Loading Kernel Symbols
...............................................................
................................................................
................................................
Loading User Symbols
Loading unloaded module list
....................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff68400000000, 1, fffff80002d00a59, 5}
Could not read faulting driver name
Probably caused by : memory_corruption
Followup: memory_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff68400000000, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff80002d00a59, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eff0e8
fffff68400000000
FAULTING_IP:
nt!MiDeleteVirtualAddresses+858
fffff800`02d00a59 48ab stos qword ptr [rdi]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x50
PROCESS_NAME: audiodg.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880021a25e0 -- (.trap 0xfffff880021a25e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff70001080488 rbx=0000000000000000 rcx=0000000000000000
rdx=000007fefd85efff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002d00a59 rsp=fffff880021a2770 rbp=fffff6fb7da10000
r8=0000000fffffffff r9=fffffa8004ebfb30 r10=fffff6fb40000000
r11=fffffa800000001c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po nc
nt!MiDeleteVirtualAddresses+0x858:
fffff800`02d00a59 48ab stos qword ptr [rdi] ds:e000:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c78c6f to fffff80002cce640
STACK_TEXT:
fffff880`021a2478 fffff800`02c78c6f : 00000000`00000050 fffff684`00000000 00000000`00000001 fffff880`021a25e0 : nt!KeBugCheckEx
fffff880`021a2480 fffff800`02ccc76e : 00000000`00000001 fffff684`00000000 00000000`00000000 000007fe`fd850002 : nt! ?? ::FNODOBFM::`string'+0x44891
fffff880`021a25e0 fffff800`02d00a59 : fffffa80`04ebfb30 000007fe`fd2f6000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`021a2770 fffff800`02d01fd9 : fffffa80`00000000 000007fe`fd85efff 00000000`00000000 fffffa80`04984d48 : nt!MiDeleteVirtualAddresses+0x858
fffff880`021a2930 fffff800`02ca00a8 : ffffffff`ffffffff 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`021a2a50 fffff800`02fa409a : fffff8a0`01d4e060 00000000`00000001 00000000`00000000 fffffa80`05e3e7a0 : nt!MmCleanProcessAddressSpace+0x228
fffff880`021a2aa0 fffff800`02f876dc : 00000000`c000004b 00000000`00000001 000007ff`fffdc000 00000000`00000000 : nt!PspExitThread+0x56a
fffff880`021a2ba0 fffff800`02ccd8d3 : fffffa80`04ebfb30 fffff880`c000004b fffffa80`05e3e7a0 00000000`00000001 : nt!NtTerminateProcess+0x138
fffff880`021a2c20 00000000`77a215da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0022f0a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77a215da
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff80002d00a5a - nt!MiDeleteVirtualAddresses+859
[ 8b:ab ]
1 error : !nt (fffff80002d00a5a)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
Followup: memory_corruption
---------