Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\123110-28563-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03003000 PsLoadedModuleList = 0xfffff800`03240e50
Debug session time: Fri Dec 31 23:03:51.754 2010 (UTC - 5:00)
System Uptime: 0 days 0:41:36.517
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff7fff90cd030, 8, fffff7fff90cd030, 2}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+40ec0 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff7fff90cd030, memory referenced.
Arg2: 0000000000000008, value 0 = read operation, 1 = write operation.
Arg3: fffff7fff90cd030, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032ab0e0
fffff7fff90cd030
FAULTING_IP:
+6263333739363534
fffff7ff`f90cd030 ?? ???
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: MassEffect2.ex
CURRENT_IRQL: 0
TRAP_FRAME: fffff88006c8f920 -- (.trap 0xfffff88006c8f920)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8006fcaec8
rdx=000000000008fd34 rsi=0000000000000000 rdi=0000000000000000
rip=fffff7fff90cd030 rsp=fffff88006c8fab8 rbp=fffff88006c8fb40
r8=0000000000000001 r9=fffff68000188180 r10=0000000000000000
r11=fffff6fb40000c40 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
fffff7ff`f90cd030 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030f28f2 to fffff80003073740
STACK_TEXT:
fffff880`06c8f7b8 fffff800`030f28f2 : 00000000`00000050 fffff7ff`f90cd030 00000000`00000008 fffff880`06c8f920 : nt!KeBugCheckEx
fffff880`06c8f7c0 fffff800`0307182e : 00000000`00000008 fffff6fb`7da00000 fffffa80`06b7cb00 fffff800`030795da : nt! ?? ::FNODOBFM::`string'+0x40ec0
fffff880`06c8f920 fffff7ff`f90cd030 : fffff800`0308d9d3 fffff680`00188178 fffffa80`06b7cc68 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`06c8fab8 fffff800`0308d9d3 : fffff680`00188178 fffffa80`06b7cc68 00000000`00000000 00000000`00000000 : 0xfffff7ff`f90cd030
fffff880`06c8fac0 fffff800`0307182e : 00000000`00000001 00000000`31050000 00000000`00000001 fffffa80`07395e90 : nt!MmAccessFault+0x5d3
fffff880`06c8fc20 00000000`00d50b98 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0414ff04 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xd50b98
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+40ec0
fffff800`030f28f2 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+40ec0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x50_nt!_??_::FNODOBFM::_string_+40ec0
BUCKET_ID: X64_0x50_nt!_??_::FNODOBFM::_string_+40ec0
Followup: MachineOwner
---------