Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\040511-10202-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c62000 PsLoadedModuleList = 0xfffff800`02ea7e90
Debug session time: Tue Apr 5 12:40:42.105 2011 (UTC - 4:00)
System Uptime: 0 days 0:16:15.010
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {3452, 17d0f000, fffff700010c87f8, 86e000011c6928a4}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+36103 )
Followup: MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000003452, The subtype of the bugcheck.
Arg2: 0000000017d0f000
Arg3: fffff700010c87f8
Arg4: 86e000011c6928a4
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_3452
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: iexplore.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002d500b3 to fffff80002ce2640
STACK_TEXT:
fffff880`0a18e028 fffff800`02d500b3 : 00000000`0000001a 00000000`00003452 00000000`17d0f000 fffff700`010c87f8 : nt!KeBugCheckEx
fffff880`0a18e030 fffff800`02cb3f16 : fffffa80`069cbb30 fffffa80`00000008 fffff880`00003ee3 fffff800`00000000 : nt! ?? ::FNODOBFM::`string'+0x36103
fffff880`0a18e8e0 fffff800`02fb809a : fffff8a0`03094060 fffff880`0a18ec20 00000000`00000000 fffffa80`06aaf700 : nt!MmCleanProcessAddressSpace+0x96
fffff880`0a18e930 fffff800`02f9d37d : 00000000`000000ff fffff880`0a18eb01 00000000`7efa1000 fffffa80`099d1b60 : nt!PspExitThread+0x56a
fffff880`0a18ea30 fffff800`02cd5dfa : 00000000`00000001 fffff880`0a18eba8 00000000`00000001 00000000`00000000 : nt!PsExitSpecialApc+0x1d
fffff880`0a18ea60 fffff800`02cd6140 : 00000000`1a1cfba8 fffff880`0a18eae0 fffff800`02f9d2f0 00000000`00000001 : nt!KiDeliverApc+0x2ca
fffff880`0a18eae0 fffff800`02ce1977 : fffffa80`06aaf700 00000000`7efa1000 00000000`000000c0 00000000`00000020 : nt!KiInitiateUserApc+0x70
fffff880`0a18ec20 00000000`776f2c1a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`02f0e3d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x776f2c1a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+36103
fffff800`02d500b3 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+36103
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
FAILURE_BUCKET_ID: X64_0x1a_3452_nt!_??_::FNODOBFM::_string_+36103
BUCKET_ID: X64_0x1a_3452_nt!_??_::FNODOBFM::_string_+36103
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031811-10218-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c15000 PsLoadedModuleList = 0xfffff800`02e5ae90
Debug session time: Fri Mar 18 02:40:21.486 2011 (UTC - 4:00)
System Uptime: 0 days 0:13:16.392
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {1c340400, 1, 6b5268c0, 8}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+469e5 )
Followup: MachineOwner
---------
7: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: 000000001c340400, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: 000000006b5268c0, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000008, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec60e8
000000001c340400
FAULTING_IP:
+3239373230343964
00000000`6b5268c0 ?? ???
MM_INTERNAL_CODE: 8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: iexplore.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002c28a2b to fffff80002c95640
STACK_TEXT:
fffff880`0b243ab8 fffff800`02c28a2b : 00000000`00000050 00000000`1c340400 00000000`00000001 fffff880`0b243c20 : nt!KeBugCheckEx
fffff880`0b243ac0 fffff800`02c9376e : 00000000`00000001 00000000`1c340400 fffff880`0b243b01 00000000`1a7fad30 : nt! ?? ::FNODOBFM::`string'+0x469e5
fffff880`0b243c20 00000000`6b5268c0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`036daa8c 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6b5268c0
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+469e5
fffff800`02c28a2b cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+469e5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
FAILURE_BUCKET_ID: X64_0x50_nt!_??_::FNODOBFM::_string_+469e5
BUCKET_ID: X64_0x50_nt!_??_::FNODOBFM::_string_+469e5
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\042211-10405-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c17000 PsLoadedModuleList = 0xfffff800`02e5ce90
Debug session time: Fri Apr 22 13:57:46.209 2011 (UTC - 4:00)
System Uptime: 0 days 0:34:04.115
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff80002cb6505, 0, ffffffffffffffff}
Probably caused by : memory_corruption ( nt!MiCheckVirtualAddress+155 )
Followup: MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002cb6505, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiCheckVirtualAddress+155
fffff800`02cb6505 483b4118 cmp rax,qword ptr [rcx+18h]
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec80e8
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002ce3028 to fffff80002c97640
STACK_TEXT:
fffff880`0a403078 fffff800`02ce3028 : 00000000`0000001e ffffffff`c0000005 fffff800`02cb6505 00000000`00000000 : nt!KeBugCheckEx
fffff880`0a403080 fffff800`02c96cc2 : fffff880`0a403858 00000000`00000000 fffff880`0a403900 fffff880`0a403ba8 : nt! ?? ::FNODOBFM::`string'+0x4987d
fffff880`0a403720 fffff800`02c955ca : 00000000`00000006 fffff900`00000000 fffff900`00000000 fffff900`c2256f20 : nt!KiExceptionDispatch+0xc2
fffff880`0a403900 fffff800`02cb6505 : 00000000`00000000 fffff880`00000006 fffff880`009ce180 fffffa80`0974fb60 : nt!KiGeneralProtectionFault+0x10a
fffff880`0a403a90 fffff800`02ca4869 : 00000000`00000000 00000000`00000000 fffff880`0a403bf8 00000000`00000000 : nt!MiCheckVirtualAddress+0x155
fffff880`0a403ac0 fffff800`02c9576e : 00000000`00000000 00000000`002a6bc0 fffff880`0a403b01 00000000`080149c0 : nt!MmAccessFault+0x249
fffff880`0a403c20 00000000`6b6ab43c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0029c838 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6b6ab43c
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiCheckVirtualAddress+155
fffff800`02cb6505 483b4118 cmp rax,qword ptr [rcx+18h]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!MiCheckVirtualAddress+155
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!MiCheckVirtualAddress+155
BUCKET_ID: X64_0x1E_c0000005_nt!MiCheckVirtualAddress+155
Followup: MachineOwner
---------