Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\050211-9438-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c06000 PsLoadedModuleList = 0xfffff800`02e43e50
Debug session time: Mon May 2 04:37:06.230 2011 (UTC - 4:00)
System Uptime: 0 days 0:34:30.152
Loading Kernel Symbols
...............................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41287, 38, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+42ba5 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041287, The subtype of the bugcheck.
Arg2: 0000000000000038
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41287
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: Steam.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88005eb3090 -- (.trap 0xfffff88005eb3090)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=f8a0090530080000
rdx=fffff6fcc00a6208 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002d7cd25 rsp=fffff88005eb3220 rbp=0000000000000000
r8=fffff98014c41001 r9=0000000000001801 r10=fffff780c0000488
r11=fffff780c0000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!MiLogPageAccess+0xe5:
fffff800`02d7cd25 410fba64243814 bt dword ptr [r12+38h],14h ds:00000000`00000038=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c22b7a to fffff80002c76740
STACK_TEXT:
fffff880`05eb2f28 fffff800`02c22b7a : 00000000`0000001a 00000000`00041287 00000000`00000038 00000000`00000000 : nt!KeBugCheckEx
fffff880`05eb2f30 fffff800`02c7482e : 00000000`00000000 fffffa80`0746d000 fffff800`02e02e00 fffffa80`064e1fb0 : nt! ?? ::FNODOBFM::`string'+0x42ba5
fffff880`05eb3090 fffff800`02d7cd25 : 00000000`00000000 fffffa80`0746d000 fffff8a0`09052ff8 fffffa80`07427530 : nt!KiPageFault+0x16e
fffff880`05eb3220 fffff800`02c1a1ab : 00000003`00000000 00000000`00001801 fffffa80`064e52e0 fffff880`05eb3308 : nt!MiLogPageAccess+0xe5
fffff880`05eb3270 fffff800`02f8aff5 : fffff980`14c41000 fffff8a0`08f7dda0 00000000`00000001 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x2bee8
fffff880`05eb3550 fffff800`02c8f567 : 00000000`03a00000 fffffa80`066e2ad0 00000000`00000000 00000000`03b00000 : nt!CcUnmapVacb+0x5d
fffff880`05eb3590 fffff800`02c953b5 : fffff980`14d78001 00000000`03300000 fffffa80`073ece10 00000000`03b00001 : nt!CcUnmapVacbArray+0x1b7
fffff880`05eb3620 fffff800`02f91762 : 00000000`03300000 00000000`03b00000 fffff880`05eb36f0 fffff880`05eb3780 : nt!CcGetVirtualAddress+0x2c5
fffff880`05eb36b0 fffff880`012b1d28 : 00000000`00000000 00000000`00000005 fffff880`05eb3b00 fffffa80`07300401 : nt!CcCopyRead+0x132
fffff880`05eb3770 fffff880`010900c8 : fffffa80`07300470 fffffa80`070e5bd8 00000000`00000000 fffffa80`07300401 : Ntfs!NtfsCopyReadA+0x1a8
fffff880`05eb3940 fffff880`01093c2a : fffff880`05eb3a10 00000000`0f3f4f03 00000000`0f3f4f00 fffffa80`07300400 : fltmgr!FltpPerformFastIoCall+0x88
fffff880`05eb39a0 fffff880`010b15f0 : fffffa80`07300470 00000000`00000000 fffff880`05eb3b00 00000000`00008000 : fltmgr!FltpPassThroughFastIo+0xda
fffff880`05eb39e0 fffff800`02f920c9 : fffffa80`07300470 fffffa80`00000001 fffffa80`06700080 fffffa80`07300470 : fltmgr!FltpFastIoRead+0x1d0
fffff880`05eb3a80 fffff800`02c75993 : 00000000`74f32450 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x417
fffff880`05eb3b70 00000000`74f32dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0824f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74f32dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+42ba5
fffff800`02c22b7a cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+42ba5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
FAILURE_BUCKET_ID: X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+42ba5
BUCKET_ID: X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+42ba5
Followup: MachineOwner
---------