*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff8a010cd9012, 0, fffff8800982820a, 0}
Unable to load image \SystemRoot\System32\Drivers\N360x64\0501000.01D\SRTSP64.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for SRTSP64.SYS
*** ERROR: Module load completed but symbols could not be loaded for SRTSP64.SYS
Could not read faulting driver name
Probably caused by : SRTSP64.SYS ( SRTSP64+620a )
Followup: MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a010cd9012, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8800982820a, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032f20e0
fffff8a010cd9012
FAULTING_IP:
SRTSP64+620a
fffff880`0982820a 6683791200 cmp word ptr [rcx+12h],0
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff88008c94590 -- (.trap 0xfffff88008c94590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa80185ffb60 rbx=0000000000000000 rcx=fffff8a010cd9000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800982820a rsp=fffff88008c94720 rbp=0000000000000009
r8=fffff8a010cdb7f6 r9=0000000000000000 r10=fffffa80142736c0
r11=fffff8a002fe9cc0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
SRTSP64+0x620a:
fffff880`0982820a 6683791200 cmp word ptr [rcx+12h],0 ds:4814:fffff8a0`10cd9012=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000313b024 to fffff800030ba700
STACK_TEXT:
fffff880`08c94428 fffff800`0313b024 : 00000000`00000050 fffff8a0`10cd9012 00000000`00000000 fffff880`08c94590 : nt!KeBugCheckEx
fffff880`08c94430 fffff800`030b87ee : 00000000`00000000 00000000`00000048 fffff8a0`02118900 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x427f7
fffff880`08c94590 fffff880`0982820a : 00000000`8000001a fffff880`0984d110 fffff8a0`10cdb000 fffff880`08c94814 : nt!KiPageFault+0x16e
fffff880`08c94720 00000000`8000001a : fffff880`0984d110 fffff8a0`10cdb000 fffff880`08c94814 fffff780`00000320 : SRTSP64+0x620a
fffff880`08c94728 fffff880`0984d110 : fffff8a0`10cdb000 fffff880`08c94814 fffff780`00000320 346dc5d6`3886594b : 0x8000001a
fffff880`08c94730 fffff8a0`10cdb000 : fffff880`08c94814 fffff780`00000320 346dc5d6`3886594b fffffa80`17cf4480 : SRTSP64+0x2b110
fffff880`08c94738 fffff880`08c94814 : fffff780`00000320 346dc5d6`3886594b fffffa80`17cf4480 fffff8a0`01e0af30 : 0xfffff8a0`10cdb000
fffff880`08c94740 fffff780`00000320 : 346dc5d6`3886594b fffffa80`17cf4480 fffff8a0`01e0af30 fffff8a0`01d0f67c : 0xfffff880`08c94814
fffff880`08c94748 346dc5d6`3886594b : fffffa80`17cf4480 fffff8a0`01e0af30 fffff8a0`01d0f67c fffff880`0986d3f8 : 0xfffff780`00000320
fffff880`08c94750 fffffa80`17cf4480 : fffff8a0`01e0af30 fffff8a0`01d0f67c fffff880`0986d3f8 fffff8a0`10cdb7f6 : 0x346dc5d6`3886594b
fffff880`08c94758 fffff8a0`01e0af30 : fffff8a0`01d0f67c fffff880`0986d3f8 fffff8a0`10cdb7f6 00000000`00000000 : 0xfffffa80`17cf4480
fffff880`08c94760 fffff8a0`01d0f67c : fffff880`0986d3f8 fffff8a0`10cdb7f6 00000000`00000000 fffff880`0984d110 : 0xfffff8a0`01e0af30
fffff880`08c94768 fffff880`0986d3f8 : fffff8a0`10cdb7f6 00000000`00000000 fffff880`0984d110 fffff8a0`01e0af30 : 0xfffff8a0`01d0f67c
fffff880`08c94770 fffff8a0`10cdb7f6 : 00000000`00000000 fffff880`0984d110 fffff8a0`01e0af30 00000000`0012019f : SRTSP64+0x4b3f8
fffff880`08c94778 00000000`00000000 : fffff880`0984d110 fffff8a0`01e0af30 00000000`0012019f 00000000`00000080 : 0xfffff8a0`10cdb7f6
STACK_COMMAND: kb
FOLLOWUP_IP:
SRTSP64+620a
fffff880`0982820a 6683791200 cmp word ptr [rcx+12h],0
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: SRTSP64+620a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: SRTSP64
IMAGE_NAME: SRTSP64.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4d929974
FAILURE_BUCKET_ID: X64_0x50_SRTSP64+620a
BUCKET_ID: X64_0x50_SRTSP64+620a
Followup: MachineOwner
---------