Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\123110-18111-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02863000 PsLoadedModuleList = 0xfffff800`02aa0e50
Debug session time: Fri Dec 31 06:37:36.693 2010 (UTC - 5:00)
System Uptime: 0 days 0:10:46.675
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff8a20f191010, 0, fffff80002a06f8c, 5}
Could not read faulting driver name
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+100 )
Followup: Pool_corruption
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a20f191010, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002a06f8c, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b0b0e0
fffff8a20f191010
FAULTING_IP:
nt!ExDeferredFreePool+100
fffff800`02a06f8c 4c8b02 mov r8,qword ptr [rdx]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: lsass.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880027206f0 -- (.trap 0xfffff880027206f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8003c5eca0 rbx=0000000000000000 rcx=fffffa8003c5eca0
rdx=fffff8a20f191010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a06f8c rsp=fffff88002720880 rbp=0000000000000000
r8=fffff8a20f191010 r9=0000000000000000 r10=fffff8a00f1915e0
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ExDeferredFreePool+0x100:
fffff800`02a06f8c 4c8b02 mov r8,qword ptr [rdx] ds:0898:fffff8a2`0f191010=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800029528c1 to fffff800028d3740
STACK_TEXT:
fffff880`02720588 fffff800`029528c1 : 00000000`00000050 fffff8a2`0f191010 00000000`00000000 fffff880`027206f0 : nt!KeBugCheckEx
fffff880`02720590 fffff800`028d182e : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x40e8b
fffff880`027206f0 fffff800`02a06f8c : fffff8a0`0efc44c0 fffff800`02a082dd fffff8a0`0f193a70 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`02720880 fffff800`02a084c1 : 00000000`00000000 fffff8a0`0f193a10 fffff8a0`0efc44d0 fffff800`02a83b00 : nt!ExDeferredFreePool+0x100
fffff880`02720910 fffff800`028d88bc : fffffa80`03edcb60 00000000`00000000 fffff880`656b6f54 fffffa80`03c6fa00 : nt!ExFreePoolWithTag+0x411
fffff880`027209c0 fffff800`02ba3735 : fffff880`02720c60 00000000`00000000 fffff8a0`0f193a70 00000000`00000001 : nt!ObfDereferenceObject+0xdc
fffff880`02720a20 fffff800`028d2993 : 00000000`0129eb2c fffffa80`03edcb60 00000000`003c9570 00000000`003c9570 : nt!NtSetInformationThread+0x254
fffff880`02720be0 00000000`774bfe2a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0129ea38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x774bfe2a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+100
fffff800`02a06f8c 4c8b02 mov r8,qword ptr [rdx]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!ExDeferredFreePool+100
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: X64_0x50_nt!ExDeferredFreePool+100
BUCKET_ID: X64_0x50_nt!ExDeferredFreePool+100
Followup: Pool_corruption
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\123110-17581-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02817000 PsLoadedModuleList = 0xfffff800`02a54e50
Debug session time: Fri Dec 31 08:45:24.633 2010 (UTC - 5:00)
System Uptime: 0 days 0:01:22.615
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1904fb, fffff88005a380b8, fffff88005a37920, fffff800028b0fcb}
Probably caused by : Ntfs.sys ( Ntfs!NtfsCachedRead+180 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88005a380b8
Arg3: fffff88005a37920
Arg4: fffff800028b0fcb
Debugging Details:
------------------
EXCEPTION_RECORD: fffff88005a380b8 -- (.exr 0xfffff88005a380b8)
ExceptionAddress: fffff800028b0fcb (nt!MmMapViewInSystemCache+0x000000000000021b)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000001
Parameter[1]: 0000000000000018
Attempt to write to address 0000000000000018
CONTEXT: fffff88005a37920 -- (.cxr 0xfffff88005a37920)
rax=0000000000000000 rbx=fffff6fc00000000 rcx=0000000000000000
rdx=0000000000000040 rsi=fffff8a00232ec00 rdi=fffff8a00232ea00
rip=fffff800028b0fcb rsp=fffff88005a382f0 rbp=fffff6fc00000200
r8=fffffa8000000020 r9=fffffa8003c5d520 r10=fffffa8003c5d008
r11=0000000000000000 r12=fffffa8006910430 r13=0000000000000000
r14=fffffa8003cd0b40 r15=fffffa80069104b0
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!MmMapViewInSystemCache+0x21b:
fffff800`028b0fcb 4d897d18 mov qword ptr [r13+18h],r15 ds:002b:00000000`00000018=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: msnmsgr.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: 0000000000000018
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002abf0e0
0000000000000018
FOLLOWUP_IP:
Ntfs!NtfsCachedRead+180
fffff880`01261fc0 84c0 test al,al
FAULTING_IP:
nt!MmMapViewInSystemCache+21b
fffff800`028b0fcb 4d897d18 mov qword ptr [r13+18h],r15
BUGCHECK_STR: 0x24
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
LAST_CONTROL_TRANSFER: from fffff800028b0407 to fffff800028b0fcb
STACK_TEXT:
fffff880`05a382f0 fffff800`028b0407 : fffff8a0`026ce1e0 fffff800`02a02530 fffff880`05a38498 fffff8a0`026d0c90 : nt!MmMapViewInSystemCache+0x21b
fffff880`05a38460 fffff800`028a62a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CcGetVacbMiss+0x177
fffff880`05a38520 fffff800`02ba4922 : 00000000`00000000 00000000`00000000 fffff880`05a385f0 fffff880`05a38680 : nt!CcGetVirtualAddress+0x1b0
fffff880`05a385b0 fffff880`01261fc0 : fffff8a0`00000000 fffff880`00000005 fffffa80`0688a010 fffff880`012b5001 : nt!CcCopyRead+0x132
fffff880`05a38670 fffff880`01266303 : 00000000`00000000 fffff8a0`026d3140 fffff880`05a388a0 fffff880`05a38798 : Ntfs!NtfsCachedRead+0x180
fffff880`05a386d0 fffff880`01268f78 : fffffa80`0688a010 fffffa80`0669a010 fffff880`05a38801 fffffa80`051ca400 : Ntfs!NtfsCommonRead+0x583
fffff880`05a38870 fffff880`010c623f : fffffa80`0669a368 fffffa80`0669a010 fffffa80`051ca450 00000000`00000001 : Ntfs!NtfsFsdRead+0x1b8
fffff880`05a38920 fffff880`010c46df : fffffa80`04cdb040 00000000`00000001 fffffa80`04cdb000 fffffa80`0669a010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`05a389b0 fffff800`02b9dca9 : 00000000`00000000 fffffa80`0694fdd0 00000000`00000001 fffffa80`0669a010 : fltmgr!FltpDispatch+0xcf
fffff880`05a38a10 fffff800`02ba54a3 : fffffa80`0694fdd0 fffffa80`0694fdd0 fffffa80`0694fdd0 fffff800`02a01e80 : nt!IopSynchronousServiceTail+0xf9
fffff880`05a38a80 fffff800`02886993 : ffffffff`ffffffff 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x631
fffff880`05a38b70 00000000`74a22dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`086deb78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74a22dd9
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: Ntfs!NtfsCachedRead+180
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f
STACK_COMMAND: .cxr 0xfffff88005a37920 ; kb
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsCachedRead+180
BUCKET_ID: X64_0x24_Ntfs!NtfsCachedRead+180
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\123110-26208-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02855000 PsLoadedModuleList = 0xfffff800`02a92e50
Debug session time: Fri Dec 31 08:56:45.961 2010 (UTC - 5:00)
System Uptime: 0 days 0:10:56.943
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {5003, fffff70001080000, 9a0, 9a400001344}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+21b46 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 00000000000009a0
Arg4: 000009a400001344
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_5003
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88006bf6d60 -- (.trap 0xfffff88006bf6d60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000fffe
rdx=000000000000020a rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002b93a6b rsp=fffff88006bf6ef0 rbp=fffffa80051ad060
r8=fffffa800570cb30 r9=0000000000000000 r10=fffffa8003f75b60
r11=fffffa80048290e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!MmCreateTeb+0x11b:
fffff800`02b93a6b 830eff or dword ptr [rsi],0FFFFFFFFh ds:0001:00000000`00000000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000292d986 to fffff800028c5740
STACK_TEXT:
fffff880`06bf6ba8 fffff800`0292d986 : 00000000`0000001a 00000000`00005003 fffff700`01080000 00000000`000009a0 : nt!KeBugCheckEx
fffff880`06bf6bb0 fffff800`028e004c : fffff680`003f7d48 fffff880`06bf6c80 00000000`00000000 ffffffff`ffffffff : nt! ?? ::FNODOBFM::`string'+0x21b46
fffff880`06bf6c00 fffff800`028c382e : 00000000`00000001 00000000`7efa7000 00000000`7efaa000 fffffa80`051ad060 : nt!MmAccessFault+0xc4c
fffff880`06bf6d60 fffff800`02b93a6b : fffffa80`051ad060 00000000`00000000 00000000`00002fe4 fffff880`06bf6f80 : nt!KiPageFault+0x16e
fffff880`06bf6ef0 fffff800`02b904bc : 00000000`7efa7000 00000000`00001000 00000000`00000000 00000000`00000000 : nt!MmCreateTeb+0x11b
fffff880`06bf6f80 fffff800`02b93d12 : fffffa80`051ad060 00000000`00000000 fffffa80`03c6ad01 fffff880`06bf79d0 : nt!PspAllocateThread+0x364
fffff880`06bf71a0 fffff800`02b9408b : 00000000`00000000 00000000`00000000 00000000`00000001 fffff880`06bf79d0 : nt!PspCreateThread+0x1d2
fffff880`06bf7420 fffff800`028c4993 : fffffa80`061cd060 00000000`0017e258 fffff880`06bf7b88 00000000`00000000 : nt!NtCreateThreadEx+0x243
fffff880`06bf7b70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+21b46
fffff800`0292d986 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+21b46
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+21b46
BUCKET_ID: X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+21b46
Followup: MachineOwner
---------