Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\021811-24273-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03256000 PsLoadedModuleList = 0xfffff800`03493e50
Debug session time: Fri Feb 18 13:07:05.665 2011 (UTC - 5:00)
System Uptime: 0 days 0:03:20.600
Loading Kernel Symbols
...............................................................
................................................................
...............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffffa8604b531db, 0, fffff800032da53b, 5}
Could not read faulting driver name
Probably caused by : memory_corruption ( nt!MiAgeWorkingSet+41b )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa8604b531db, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800032da53b, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800034fe0e0
fffffa8604b531db
FAULTING_IP:
nt!MiAgeWorkingSet+41b
fffff800`032da53b 410fb65f1b movzx ebx,byte ptr [r15+1Bh]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff880033e77a0 -- (.trap 0xfffff880033e77a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000058000000000 rbx=0000000000000000 rcx=fffff6fcb0000960
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032da53b rsp=fffff880033e7930 rbp=007ffffcb0000960
r8=0000000000000001 r9=fffff880089fcc00 r10=0000000000000005
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiAgeWorkingSet+0x41b:
fffff800`032da53b 410fb65f1b movzx ebx,byte ptr [r15+1Bh] ds:00000000`0000001b=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800033458c1 to fffff800032c6740
STACK_TEXT:
fffff880`033e7638 fffff800`033458c1 : 00000000`00000050 fffffa86`04b531db 00000000`00000000 fffff880`033e77a0 : nt!KeBugCheckEx
fffff880`033e7640 fffff800`032c482e : 00000000`00000000 0bd00201`91bb4001 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x40e8b
fffff880`033e77a0 fffff800`032da53b : 00000000`000000c4 00000000`00000001 00000000`00000002 00000000`000000a9 : nt!KiPageFault+0x16e
fffff880`033e7930 fffff800`03348a5e : fffff880`089fcc00 fffff880`00000001 00000000`00000001 fffff880`033e7bb0 : nt!MiAgeWorkingSet+0x41b
fffff880`033e7ae0 fffff800`032daee2 : 00000000`000000c8 00000000`00000000 fffffa80`00000000 00000000`00000002 : nt! ?? ::FNODOBFM::`string'+0x496d6
fffff880`033e7b80 fffff800`032db173 : 00000000`00000008 fffff880`033e7c10 00000000`00000001 fffffa80`00000000 : nt!MmWorkingSetManager+0x6e
fffff880`033e7bd0 fffff800`035697c6 : fffffa80`05213720 00000000`00000080 fffffa80`051f0b30 00000000`00000001 : nt!KeBalanceSetManager+0x1c3
fffff880`033e7d40 fffff800`032a4c26 : fffff880`009b2180 fffffa80`05213720 fffff880`009bd0c0 4800101e`66306804 : nt!PspSystemThreadStartup+0x5a
fffff880`033e7d80 00000000`00000000 : fffff880`033e8000 fffff880`033e2000 fffff880`033e7710 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiAgeWorkingSet+41b
fffff800`032da53b 410fb65f1b movzx ebx,byte ptr [r15+1Bh]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiAgeWorkingSet+41b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x50_nt!MiAgeWorkingSet+41b
BUCKET_ID: X64_0x50_nt!MiAgeWorkingSet+41b
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\022111-24476-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0320b000 PsLoadedModuleList = 0xfffff800`03448e50
Debug session time: Mon Feb 21 02:50:34.286 2011 (UTC - 5:00)
System Uptime: 0 days 0:01:51.332
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck F4, {3, fffffa80077d4b30, fffffa80077d4e10, fffff800035842d0}
Probably caused by : csrss.exe
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_OBJECT_TERMINATION (f4)
A process or thread crucial to system operation has unexpectedly exited or been
terminated.
Several processes and threads are necessary for the operation of the
system; when they are terminated (for any reason), the system can no
longer function.
Arguments:
Arg1: 0000000000000003, Process
Arg2: fffffa80077d4b30, Terminating object
Arg3: fffffa80077d4e10, Process image file name
Arg4: fffff800035842d0, Explanatory message (ascii)
Debugging Details:
------------------
PROCESS_OBJECT: fffffa80077d4b30
IMAGE_NAME: csrss.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: csrss
FAULTING_MODULE: 0000000000000000
PROCESS_NAME: csrss.exe
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
BUGCHECK_STR: 0xF4_C0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
CURRENT_IRQL: 0
STACK_TEXT:
fffff880`089a0b08 fffff800`03607f62 : 00000000`000000f4 00000000`00000003 fffffa80`077d4b30 fffffa80`077d4e10 : nt!KeBugCheckEx
fffff880`089a0b10 fffff800`035afa23 : ffffffff`ffffffff fffffa80`07d84360 fffffa80`077d4b30 fffffa80`077d4b30 : nt!PspCatchCriticalBreak+0x92
fffff880`089a0b50 fffff800`0353790c : ffffffff`ffffffff 00000000`00000001 fffffa80`077d4b30 000007fe`00000008 : nt! ?? ::NNGAKEGL::`string'+0x17666
fffff880`089a0ba0 fffff800`0327a993 : fffffa80`077d4b30 fffff880`c0000005 ffffffff`ee1e5d00 fffffa80`07d84360 : nt!NtTerminateProcess+0x20c
fffff880`089a0c20 00000000`77c6f97a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0060e0c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77c6f97a
STACK_COMMAND: kb
FOLLOWUP_NAME: MachineOwner
FAILURE_BUCKET_ID: X64_0xF4_C0000005_IMAGE_csrss.exe
BUCKET_ID: X64_0xF4_C0000005_IMAGE_csrss.exe
Followup: MachineOwner
---------