Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121010-21184-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a14000 PsLoadedModuleList = 0xfffff800`02c51e50
Debug session time: Fri Dec 10 18:50:09.526 2010 (UTC - 5:00)
System Uptime: 0 days 0:04:36.915
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff683fd7e60e8, 0, fffff80002ab49fa, 2}
Could not read faulting driver name
Probably caused by : memory_corruption ( nt!MiSwapWslEntries+6a )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff683fd7e60e8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002ab49fa, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cbc0e0
fffff683fd7e60e8
FAULTING_IP:
nt!MiSwapWslEntries+6a
fffff800`02ab49fa 498b00 mov rax,qword ptr [r8]
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880081c3630 -- (.trap 0xfffff880081c3630)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000098000000000 rbx=0000000000000000 rcx=0000000fffffffff
rdx=00000000000005bf rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ab49fa rsp=fffff880081c37c0 rbp=fffffa8005adac18
r8=fffff683fd7e60e8 r9=000007fafcc1d049 r10=fffff70001080488
r11=000000000000076e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!MiSwapWslEntries+0x6a:
fffff800`02ab49fa 498b00 mov rax,qword ptr [r8] ds:fffff683`fd7e60e8=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002b038f2 to fffff80002a84740
STACK_TEXT:
fffff880`081c34c8 fffff800`02b038f2 : 00000000`00000050 fffff683`fd7e60e8 00000000`00000000 fffff880`081c3630 : nt!KeBugCheckEx
fffff880`081c34d0 fffff800`02a8282e : 00000000`00000000 fffffa80`00000028 fffffa80`05d8ef00 fffffa80`05d8ec10 : nt! ?? ::FNODOBFM::`string'+0x40ec0
fffff880`081c3630 fffff800`02ab49fa : fffff700`01080000 fffffa80`030f92a0 fffff683`ff7d5650 fffffa80`05adac18 : nt!KiPageFault+0x16e
fffff880`081c37c0 fffff800`02aa01d2 : 00000000`00000000 000007fe`faaea001 fffff700`01080000 00000000`00000000 : nt!MiSwapWslEntries+0x6a
fffff880`081c3820 fffff800`02aab1fd : 00000000`000005bf 00000000`00000000 00000000`00000000 0000000f`ffffffff : nt!MiUpdateWsle+0xd2
fffff880`081c3880 fffff800`02aaab83 : dbf00001`051cc025 80000001`051cc121 fffff880`081c3a10 fffffa80`05adac18 : nt!MiCompleteProtoPteFault+0x2cd
fffff880`081c3910 fffff800`02aa05be : 00000000`00000000 000007fe`faaea000 fffff683`ff7d5750 fffffa80`05adac18 : nt!MiResolveProtoPteFault+0x1d3
fffff880`081c39b0 fffff800`02a9e743 : 00000000`00000000 000007fe`faaea000 00000000`00000000 00000000`00000000 : nt!MiDispatchFault+0x1de
fffff880`081c3ac0 fffff800`02a8282e : 00000000`00000000 00000000`77440000 00000000`77573501 fffffa80`c0000034 : nt!MmAccessFault+0x343
fffff880`081c3c20 00000000`77496d1c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`01b7dff0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77496d1c
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiSwapWslEntries+6a
fffff800`02ab49fa 498b00 mov rax,qword ptr [r8]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiSwapWslEntries+6a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x50_nt!MiSwapWslEntries+6a
BUCKET_ID: X64_0x50_nt!MiSwapWslEntries+6a
Followup: MachineOwner
---------