*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41790, fffffa80001c0530, ffff, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+36024 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa80001c0530
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41790
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: devenv.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002d54e40 to fffff80002ce6d00
STACK_TEXT:
fffff880`0a9f5828 fffff800`02d54e40 : 00000000`0000001a 00000000`00041790 fffffa80`001c0530 00000000`0000ffff : nt!KeBugCheckEx
fffff880`0a9f5830 fffff800`02d1a5d9 : fffff900`00000000 00000000`0779cfff fffff880`00000000 fffff800`00000000 : nt! ?? ::FNODOBFM::`string'+0x36024
fffff880`0a9f59f0 fffff800`02ffd8b1 : fffffa80`1105c0d0 00000000`00000000 fffffa80`1324dd80 fffffa80`1324dd80 : nt!MiRemoveMappedView+0xd9
fffff880`0a9f5b10 fffff800`02ffdcb3 : 00000028`00000000 00000000`075f0000 fffffa80`00000001 00000000`00000001 : nt!MiUnmapViewOfSection+0x1b1
fffff880`0a9f5bd0 fffff800`02ce5f93 : fffffa80`13224060 00000000`001ddbc0 fffffa80`13372b30 00000000`001ddbb0 : nt!NtUnmapViewOfSection+0x5f
fffff880`0a9f5c20 00000000`770715ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`001ddc58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x770715ba
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+36024
fffff800`02d54e40 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+36024
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fdd5b
FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+36024
BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+36024
Followup: MachineOwner
---------