Loading Dump File [F:\DMP\031711-18657-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c08000 PsLoadedModuleList = 0xfffff800`02e4de90
Debug session time: Thu Mar 17 22:01:48.383 2011 (UTC - 4:00)
System Uptime: 0 days 21:01:53.381
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffffffffffffff6, 0, fffff80002f553de, 0}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!CmpKcbCacheLookup+1de )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffffffffffff6, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002f553de, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb90e8
fffffffffffffff6
FAULTING_IP:
nt!CmpKcbCacheLookup+1de
fffff800`02f553de 418b45f4 mov eax,dword ptr [r13-0Ch]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: Cleaner_Valida
CURRENT_IRQL: 0
TRAP_FRAME: fffff88005faef70 -- (.trap 0xfffff88005faef70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=00000000000003bd
rdx=00000000006b3424 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002f553de rsp=fffff88005faf100 rbp=fffff8a000cda010
r8=0000000000000008 r9=0000000000000000 r10=0000000000000002
r11=fffff88005faf280 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!CmpKcbCacheLookup+0x1de:
fffff800`02f553de 418b45f4 mov eax,dword ptr [r13-0Ch] ds:ffffffff`fffffff4=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c342ac to fffff80002c88640
STACK_TEXT:
fffff880`05faee08 fffff800`02c342ac : 00000000`00000050 ffffffff`fffffff6 00000000`00000000 fffff880`05faef70 : nt!KeBugCheckEx
fffff880`05faee10 fffff800`02c8676e : 00000000`00000000 ffffffff`fffffff6 fffff880`05faf300 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4621f
fffff880`05faef70 fffff800`02f553de : fffffa80`0622b060 00000000`00000000 fffffa80`06633950 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`05faf100 fffff800`02f560e5 : fffff880`05faf280 fffff880`00000001 fffff880`05faf698 fffff880`05faf690 : nt!CmpKcbCacheLookup+0x1de
fffff880`05faf1f0 fffff800`02f52794 : fffff8a0`099006a0 fffff880`05faf690 fffff880`05faf6e0 fffff880`05faf6c0 : nt!CmpBuildHashStackAndLookupCache+0x335
fffff880`05faf5d0 fffff800`02f82d38 : fffffa80`0431d3f8 fffffa80`00000000 fffffa80`0431d240 00000000`00000001 : nt!CmpParseKey+0x294
fffff880`05faf8d0 fffff800`02f83f56 : 00000000`000124c0 fffffa80`0431d240 00000000`00000000 fffffa80`03d08510 : nt!ObpLookupObjectName+0x588
fffff880`05faf9c0 fffff800`02f5782c : 00000000`0ab20400 00000000`00000000 fffff8a0`09900601 fffff880`05fafaa8 : nt!ObOpenObjectByName+0x306
fffff880`05fafa90 fffff800`02f59c9f : 00000000`0228d2d0 00000000`000f003f 00000000`0228d358 00000000`00000000 : nt!CmOpenKey+0x28a
fffff880`05fafbe0 fffff800`02c878d3 : fffffa80`06633950 fffff880`05fafca0 00000000`00000000 00000000`00000000 : nt!NtOpenKeyEx+0xf
fffff880`05fafc20 00000000`7734226a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0228d268 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7734226a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!CmpKcbCacheLookup+1de
fffff800`02f553de 418b45f4 mov eax,dword ptr [r13-0Ch]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!CmpKcbCacheLookup+1de
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
FAILURE_BUCKET_ID: X64_0x50_nt!CmpKcbCacheLookup+1de
BUCKET_ID: X64_0x50_nt!CmpKcbCacheLookup+1de
Followup: MachineOwner
---------