4
Microsoft (R) Windows Debugger Version 6.8.0004.0 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini010308-04.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\debug*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Vista Kernel Version 6000 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6000.16575.amd64fre.vista_gdr.071009-1548
Kernel base = 0xfffff800`01c00000 PsLoadedModuleList = 0xfffff800`01d9af70
Debug session time: Thu Jan 3 14:13:24.734 2008 (GMT-8)
System Uptime: 0 days 0:03:25.593
Loading Kernel Symbols
............................................................................................................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {2, 125ece, 7fedf, ffff}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+19f8 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000002, A list entry was corrupt
Arg2: 0000000000125ece, entry in list being removed
Arg3: 000000000007fedf, highest physical page number
Arg4: 000000000000ffff, reference count of entry being removed
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_2
CUSTOMER_CRASH_COUNT: 4
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
PROCESS_NAME: VSSVC.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80001caff58 to fffff80001c4dc90
STACK_TEXT:
fffff980`1242b388 fffff800`01caff58 : 00000000`0000004e 00000000`00000002 00000000`00125ece 00000000`0007fedf : nt!KeBugCheckEx
fffff980`1242b390 fffff800`01c61505 : fffff980`00505611 00000000`00000009 00000000`00000001 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x19f8
fffff980`1242b3d0 fffff800`01c9a160 : fffff880`03079000 fffff880`0307bb38 fffffa80`022cc440 fffffa80`022cc440 : nt!MiFlushSectionInternal+0x5f2
fffff980`1242b5d0 fffff800`01c6077c : 00000000`00000000 fffffa80`047aca70 fffffa80`0279d180 00000000`00000000 : nt!MmFlushSection+0x110
fffff980`1242b680 fffff980`00915dbf : fffffa80`0456eca0 00000000`00000000 fffffa80`00000000 00000000`00000001 : nt!CcFlushCache+0x27c
fffff980`1242b770 fffff980`009e4e58 : 00000000`00000000 fffff880`02531460 00000000`00000000 00000000`00000001 : Ntfs!NtfsFlushUserStream+0x8f
fffff980`1242b7e0 fffff980`009152a9 : fffffa80`047aca70 fffffa80`0279d180 fffffa80`025b5801 fffff880`01593400 : Ntfs!NtfsFlushVolume+0x318
fffff980`1242b910 fffff980`00915bdd : fffffa80`047aca70 fffffa80`02807010 fffffa80`0257dd40 00000000`00000000 : Ntfs!NtfsCommonFlushBuffers+0x4c9
fffff980`1242b9e0 fffff980`0050421a : fffffa80`02807368 fffffa80`02807010 fffffa80`047aca70 fffff980`1242ba08 : Ntfs!NtfsFsdFlushBuffers+0x10d
fffff980`1242ba50 fffff980`00504691 : fffffa80`02aa0960 fffffa80`0257dd40 00000000`00000300 fffff980`1242bc20 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x20a
fffff980`1242bac0 fffff800`01ebdd3f : fffffa80`02aa0960 fffff800`01c5d536 fffff880`0012019f fffff880`03c9df60 : fltmgr!FltpDispatch+0xd1
fffff980`1242bb20 fffff800`01ec1d36 : 00000000`00000000 00000000`00000000 fffffa80`0257dd40 fffff800`01c4d733 : nt!IopSynchronousServiceTail+0x12f
fffff980`1242bb90 fffff800`01c4d733 : fffffa80`02482bb0 00000000`ff080970 fffffa80`02aa0960 fffffa80`0257dd40 : nt!NtFlushBuffersFile+0x176
fffff980`1242bc20 00000000`775a072a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0429f598 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775a072a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+19f8
fffff800`01caff58 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+19f8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 470c35b4
FAILURE_BUCKET_ID: X64_0x4E_2_nt!_??_::FNODOBFM::_string_+19f8
BUCKET_ID: X64_0x4E_2_nt!_??_::FNODOBFM::_string_+19f8
Followup: MachineOwner
---------
[/b][/b][/i][/i]
5
Microsoft (R) Windows Debugger Version 6.8.0004.0 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini010308-06.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\debug*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Vista Kernel Version 6000 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6000.16575.amd64fre.vista_gdr.071009-1548
Kernel base = 0xfffff800`01c00000 PsLoadedModuleList = 0xfffff800`01d9af70
Debug session time: Thu Jan 3 21:40:21.882 2008 (GMT-8)
System Uptime: 0 days 0:04:45.755
Loading Kernel Symbols
............................................................................................................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck DE, {2, fffff88002d422a8, 0, 135b198c0}
Probably caused by : memory_corruption ( nt!MmPurgeSection+7c5 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
POOL_CORRUPTION_IN_FILE_AREA (de)
A driver corrupted pool memory used for holding pages destined for disk.
This was discovered by the memory manager when dereferencing the file.
Arguments:
Arg1: 0000000000000002
Arg2: fffff88002d422a8
Arg3: 0000000000000000
Arg4: 0000000135b198c0
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 6
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
BUGCHECK_STR: 0xDE
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80001c83a18 to fffff80001c4dc90
STACK_TEXT:
fffff980`11ddc588 fffff800`01c83a18 : 00000000`000000de 00000000`00000002 fffff880`02d422a8 00000000`00000000 : nt!KeBugCheckEx
fffff980`11ddc590 fffff800`01c83bec : 00000000`00000000 fffffa80`021f8401 00000000`00000000 00000000`00000000 : nt!MmPurgeSection+0x7c5
fffff980`11ddc610 fffff980`009e4f9e : 00000000`00000000 00000000`00000001 fffffa80`01fc9010 00000000`00000000 : nt!CcPurgeCacheSection+0x13c
fffff980`11ddc660 fffff980`008cb5b9 : fffffa80`01fc9010 fffffa80`024d1180 fffffa80`024d1101 fffff980`0089ec01 : Ntfs!NtfsFlushVolume+0x45e
fffff980`11ddc790 fffff980`00958a3b : fffffa80`01fc9010 fffffa80`02205010 00000000`00000001 fffff980`11ddc8d8 : Ntfs!NtfsDismountVolume+0x2c8
fffff980`11ddc840 fffff980`0093912d : fffffa80`01fc9010 00000000`c0000188 fffffa80`c0000188 00000000`00000001 : Ntfs! ?? ::NNGAKEGL::`string'+0xeedd
fffff980`11ddc880 fffff980`0050421a : fffffa80`02205000 fffffa80`02205010 00000000`00000101 fffffa80`01fc9010 : Ntfs!NtfsFsdFileSystemControl+0x14d
fffff980`11ddc930 fffff980`005209e2 : fffffa80`024d0040 fffffa80`0208cf20 fffffa80`022d4000 00000000`20206f49 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x20a
fffff980`11ddc9a0 fffff800`01e8dee7 : fffffa80`02205301 fffffa80`024d0040 fffffa80`02205368 fffff800`01ee1a29 : fltmgr!FltpFsControl+0x102
fffff980`11ddca00 fffff800`01eab906 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x626
fffff980`11ddcb40 fffff800`01c4d733 : ffffffff`ffffffff 00000000`01dfe0c0 00000000`01dfe0b8 00000000`00000004 : nt!NtFsControlFile+0x56
fffff980`11ddcbb0 00000000`779f060a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`01dfe3c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x779f060a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MmPurgeSection+7c5
fffff800`01c83a18 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MmPurgeSection+7c5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 470c35b4
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xDE_nt!MmPurgeSection+7c5
BUCKET_ID: X64_0xDE_nt!MmPurgeSection+7c5
Followup: MachineOwner
6
Microsoft (R) Windows Debugger Version 6.8.0004.0 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini010308-07.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\debug*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Vista Kernel Version 6000 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6000.16575.amd64fre.vista_gdr.071009-1548
Kernel base = 0xfffff800`01c00000 PsLoadedModuleList = 0xfffff800`01d9af70
Debug session time: Thu Jan 3 21:52:55.704 2008 (GMT-8)
System Uptime: 0 days 0:08:51.592
Loading Kernel Symbols
...........................................................................................................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff88103ba2b5c, 0, fffff980004fcd28, 5}
Could not read faulting driver name
Probably caused by : fileinfo.sys ( fileinfo!FIPfStringFind+48 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff88103ba2b5c, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff980004fcd28, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001dfa0b0
fffff88103ba2b5c
FAULTING_IP:
fileinfo!FIPfStringFind+48
fffff980`004fcd28 410fb70c24 movzx ecx,word ptr [r12]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 7
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff980119c02b0 -- (.trap 0xfffff980119c02b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff980004f24b0 rbx=fffffa8001861600 rcx=fffff980119c0718
rdx=fffff980004f2760 rsi=0000000000000000 rdi=fffffa8002432bb0
rip=fffff980004fcd28 rsp=fffff980119c0440 rbp=fffff980004f24b0
r8=0000000000000000 r9=0000000000000000 r10=fffffa8001804000
r11=fffffa80021d06a8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
fileinfo!FIPfStringFind+0x48:
fffff980`004fcd28 410fb70c24 movzx ecx,word ptr [r12] ds:9200:00000000`00000000=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80001c53962 to fffff80001c4dc90
STACK_TEXT:
fffff980`119c01a8 fffff800`01c53962 : 00000000`00000050 fffff881`03ba2b5c 00000000`00000000 fffff980`119c02b0 : nt!KeBugCheckEx
fffff980`119c01b0 fffff800`01c4c819 : 00000000`00000000 fffff881`03ba2b5c fffffa80`03fd1b00 fffffa80`02533510 : nt!MmAccessFault+0x4c2
fffff980`119c02b0 fffff980`004fcd28 : ffffffff`80000800 00000000`00000000 00000000`00000000 fffff980`119c0620 : nt!KiPageFault+0x119
fffff980`119c0440 fffff980`004f9d6e : 00000000`00000000 fffff980`004f4478 00000000`00000001 00000000`00000030 : fileinfo!FIPfStringFind+0x48
fffff980`119c0480 fffff800`01f303b7 : fffff880`055bdd01 fffff880`055bdd01 00000000`00000004 00000000`00000000 : fileinfo!FIPfInterfaceOpen+0x24a
fffff980`119c0600 fffff800`01fd6827 : 00000000`00000081 ffffffff`ffe91ca0 fffff980`119c0718 00000000`00000000 : nt!PfpOpenHandleCreate+0x117
fffff980`119c06d0 fffff800`01fdc8a6 : 00000000`00000000 fffff880`03b70288 fffff880`03b6a000 fffff980`00000060 : nt!PfpFileBuildReadSupport+0xe7
fffff980`119c07c0 fffff800`01fdeb89 : fffff880`00000000 00000000`00000003 fffffa80`0000020a 00000000`00000000 : nt!PfpPrefetchFilesTrickle+0x126
fffff980`119c08c0 fffff800`01fdee42 : 00000000`00000000 fffff980`119c0ca0 fffff980`119c0a08 fffff880`03b6a000 : nt!PfpPrefetchRequestPerform+0x2f9
fffff980`119c0960 fffff800`01fe1466 : fffff980`119c0a08 00000000`00000001 fffffa80`01e46880 00000000`00000000 : nt!PfpPrefetchRequest+0x171
fffff980`119c09d0 fffff800`01ff1ca2 : 00000000`00000000 00000000`00000004 00000000`00000000 00000000`00000001 : nt!PfSetSuperfetchInformation+0x1a5
fffff980`119c0ab0 fffff800`01c4d733 : fffffa80`02432bb0 00000000`00000000 00000000`00000000 fffff980`119c0ca0 : nt!NtSetSystemInformation+0x8f5
fffff980`119c0c20 00000000`7732194a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`01a8f7e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7732194a
STACK_COMMAND: kb
FOLLOWUP_IP:
fileinfo!FIPfStringFind+48
fffff980`004fcd28 410fb70c24 movzx ecx,word ptr [r12]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: fileinfo!FIPfStringFind+48
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: fileinfo
IMAGE_NAME: fileinfo.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4549b693
FAILURE_BUCKET_ID: X64_0x50_fileinfo!FIPfStringFind+48
BUCKET_ID: X64_0x50_fileinfo!FIPfStringFind+48
Followup: MachineOwner
---------
7
Microsoft (R) Windows Debugger Version 6.8.0004.0 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini010308-08.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\debug*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Vista Kernel Version 6000 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6000.16575.amd64fre.vista_gdr.071009-1548
Kernel base = 0xfffff800`01c00000 PsLoadedModuleList = 0xfffff800`01d9af70
Debug session time: Thu Jan 3 22:58:53.136 2008 (GMT-8)
System Uptime: 0 days 0:05:59.024
Loading Kernel Symbols
...........................................................................................................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff98115ed6008, 0, fffff80001ecb870, 5}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!HvpGetCellMapped+120 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff98115ed6008, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80001ecb870, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001dfa0b0
fffff98115ed6008
FAULTING_IP:
nt!HvpGetCellMapped+120
fffff800`01ecb870 3b4108 cmp eax,dword ptr [rcx+8]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 8
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff98000cac4a0 -- (.trap 0xfffff98000cac4a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000050 rbx=fffff98015ed5eac rcx=fffff98115ed6000
rdx=0000000000000010 rsi=fffff88003f40010 rdi=0000000000814ea8
rip=fffff80001ecb870 rsp=fffff98000cac630 rbp=0000000000000fff
r8=fffff98015ed6000 r9=0000000000000000 r10=fffff98115ed6005
r11=000000000000bb58 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!HvpGetCellMapped+0x120:
fffff800`01ecb870 3b4108 cmp eax,dword ptr [rcx+8] ds:5000:fffff981`15ed6008=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80001c53962 to fffff80001c4dc90
STACK_TEXT:
fffff980`00cac398 fffff800`01c53962 : 00000000`00000050 fffff981`15ed6008 00000000`00000000 fffff980`00cac4a0 : nt!KeBugCheckEx
fffff980`00cac3a0 fffff800`01c4c819 : 00000000`00000000 fffff880`0407c2a0 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x4c2
fffff980`00cac4a0 fffff800`01ecb870 : fffff880`00000018 fffff980`15ed6000 fffff980`15ed5000 fffff980`15ed5ee0 : nt!KiPageFault+0x119
fffff980`00cac630 fffff800`01e4ce9c : fffff880`03f40010 fffff800`01e3344c fffff880`03f24de0 fffff880`0407c2a0 : nt!HvpGetCellMapped+0x120
fffff980`00cac6b0 fffff800`01e334bc : 00000000`00814ef0 fffff800`01e33f43 fffff880`03f40010 00000000`007f67d0 : nt!HvpGetHCell+0xc
fffff980`00cac6e0 fffff800`01e35a50 : fffff880`03f40010 00000000`00815040 fffff880`03f40010 fffff880`0407bec0 : nt!HvIsCellAllocated+0xdc
fffff980`00cac720 fffff800`01e34038 : 00000000`00000000 fffff880`01000001 fffff880`00000000 fffff880`007f67d0 : nt!CmpCheckKey+0x5e2
fffff980`00cac7d0 fffff800`01e32b52 : 00000000`00814ef0 00000000`01000001 00000000`0016f400 00000000`00000000 : nt!CmpCheckRegistry2+0xc8
fffff980`00cac850 fffff800`01e36650 : 00000000`00000000 00000000`00000000 fffff980`0016f400 00000000`00000005 : nt!CmCheckRegistry+0x122
fffff980`00cac8c0 fffff800`01e30756 : fffff980`00caca40 ffffffff`80000794 fffffa80`00000000 fffff980`00cacb60 : nt!CmpInitializeHive+0x670
fffff980`00cac9b0 fffff800`01e30c36 : fffff880`0407a2c8 00000000`00000000 fffff980`00cacb80 fffff980`00cacb51 : nt!CmpInitHiveFromFile+0x286
fffff980`00cacab0 fffff800`01e33207 : fffff880`0407a2c8 00000000`00000005 fffff880`00033010 fffff880`20204d43 : nt!CmpCmdHiveOpen+0x66
fffff980`00cacb20 fffff800`01e31c58 : fffffa80`00000008 00000000`00000003 00000000`00000007 00000000`00000000 : nt!CmpFlushBackupHive+0x2e8
fffff980`00cacc60 fffff800`01e31d0e : fffff800`01dd2640 fffff800`01d689d8 fffffa80`0187e720 fffffa80`0187e720 : nt!CmpSyncBackupHives+0x98
fffff980`00caccb0 fffff800`01c59da3 : fffff800`01d665e0 fffff800`01d68901 fffffa80`04376800 00000000`00000000 : nt!CmpFirstBackupFlushWorker+0xe
fffff980`00cacce0 fffff800`01ee196b : fffff800`01dd2640 00000000`00000000 fffffa80`0187e720 00000000`00000001 : nt!ExpWorkerThread+0x12a
fffff980`00cacd50 fffff800`01c34656 : fffff980`00a63180 fffffa80`0187e720 fffff980`00a6cc40 fffffa80`0187ebb0 : nt!PspSystemThreadStartup+0x5b
fffff980`00cacd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!HvpGetCellMapped+120
fffff800`01ecb870 3b4108 cmp eax,dword ptr [rcx+8]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!HvpGetCellMapped+120
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 470c35b4
FAILURE_BUCKET_ID: X64_0x50_nt!HvpGetCellMapped+120
BUCKET_ID: X64_0x50_nt!HvpGetCellMapped+120
Followup: MachineOwner
---------
8
Microsoft (R) Windows Debugger Version 6.8.0004.0 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini010308-09.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\debug*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Vista Kernel Version 6000 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6000.16575.amd64fre.vista_gdr.071009-1548
Kernel base = 0xfffff800`01c00000 PsLoadedModuleList = 0xfffff800`01d9af70
Debug session time: Thu Jan 3 23:18:06.888 2008 (GMT-8)
System Uptime: 0 days 0:15:33.776
Loading Kernel Symbols
.............................................................................................................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 111746, 4, fffffa8003345d20}
Probably caused by : memory_corruption ( nt!MiBadShareCount+4b )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000111746, page frame number
Arg3: 0000000000000004, current page state
Arg4: fffffa8003345d20, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 9
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80001cc328b to fffff80001c4dc90
STACK_TEXT:
fffff980`11154118 fffff800`01cc328b : 00000000`0000004e 00000000`00000099 00000000`00111746 00000000`00000004 : nt!KeBugCheckEx
fffff980`11154120 fffff800`01c8507e : ffffffff`ffffffff ed100001`11746863 fffffa80`049635a0 fffff900`c3055000 : nt!MiBadShareCount+0x4b
fffff980`11154160 fffff800`01e44ded : fffff900`c3055000 fffff900`0000015b fffffa80`02427010 fffff980`01216c00 : nt!MiRemoveMappedPtes+0x80e
fffff980`111542a0 fffff800`01e4466b : fffff880`036e4060 00000000`00000011 00000000`00000001 000001eb`0000036c : nt!MiRemoveFromSystemSpace+0x14d
fffff980`11154300 fffff960`001eb3c4 : fffff900`00000ab5 fffff960`000c2ad5 00000000`00000000 00000000`00000000 : nt!MmUnmapViewInSystemSpace+0x6b
fffff980`11154330 fffff960`000c35f4 : 00000000`00000576 fffff900`c3000010 00000000`00000011 00000000`00000001 : win32k!vFreeKernelSection+0x34
fffff980`11154370 fffff960`000c37d1 : fffff900`c3000010 fffff980`00000000 fffff900`c0085010 00000000`00000000 : win32k!SURFACE::bDeleteSurface+0x344
fffff980`11154450 fffff960`00086994 : ffffffff`e4050576 fffff900`c1d6a010 00000000`00000576 00000000`7efdb000 : win32k!bDeleteSurface+0x31
fffff980`11154480 fffff800`01c4d733 : fffffa80`049635a0 fffff980`11154530 00000000`03a909c0 fffff900`00000000 : win32k!NtGdiDeleteObjectApp+0x94
fffff980`111544b0 00000000`750b3cf9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0007ded8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x750b3cf9
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+4b
fffff800`01cc328b cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+4b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 470c35b4
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4b
BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4b
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000111746, page frame number
Arg3: 0000000000000004, current page state
Arg4: fffffa8003345d20, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 9
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80001cc328b to fffff80001c4dc90
STACK_TEXT:
fffff980`11154118 fffff800`01cc328b : 00000000`0000004e 00000000`00000099 00000000`00111746 00000000`00000004 : nt!KeBugCheckEx
fffff980`11154120 fffff800`01c8507e : ffffffff`ffffffff ed100001`11746863 fffffa80`049635a0 fffff900`c3055000 : nt!MiBadShareCount+0x4b
fffff980`11154160 fffff800`01e44ded : fffff900`c3055000 fffff900`0000015b fffffa80`02427010 fffff980`01216c00 : nt!MiRemoveMappedPtes+0x80e
fffff980`111542a0 fffff800`01e4466b : fffff880`036e4060 00000000`00000011 00000000`00000001 000001eb`0000036c : nt!MiRemoveFromSystemSpace+0x14d
fffff980`11154300 fffff960`001eb3c4 : fffff900`00000ab5 fffff960`000c2ad5 00000000`00000000 00000000`00000000 : nt!MmUnmapViewInSystemSpace+0x6b
fffff980`11154330 fffff960`000c35f4 : 00000000`00000576 fffff900`c3000010 00000000`00000011 00000000`00000001 : win32k!vFreeKernelSection+0x34
fffff980`11154370 fffff960`000c37d1 : fffff900`c3000010 fffff980`00000000 fffff900`c0085010 00000000`00000000 : win32k!SURFACE::bDeleteSurface+0x344
fffff980`11154450 fffff960`00086994 : ffffffff`e4050576 fffff900`c1d6a010 00000000`00000576 00000000`7efdb000 : win32k!bDeleteSurface+0x31
fffff980`11154480 fffff800`01c4d733 : fffffa80`049635a0 fffff980`11154530 00000000`03a909c0 fffff900`00000000 : win32k!NtGdiDeleteObjectApp+0x94
fffff980`111544b0 00000000`750b3cf9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0007ded8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x750b3cf9
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+4b
fffff800`01cc328b cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+4b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 470c35b4
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4b
BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4b
Followup: MachineOwner
9
Microsoft (R) Windows Debugger Version 6.8.0004.0 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini010308-09.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\debug*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Vista Kernel Version 6000 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6000.16575.amd64fre.vista_gdr.071009-1548
Kernel base = 0xfffff800`01c00000 PsLoadedModuleList = 0xfffff800`01d9af70
Debug session time: Thu Jan 3 23:18:06.888 2008 (GMT-8)
System Uptime: 0 days 0:15:33.776
Loading Kernel Symbols
.............................................................................................................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 111746, 4, fffffa8003345d20}
Probably caused by : memory_corruption ( nt!MiBadShareCount+4b )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000111746, page frame number
Arg3: 0000000000000004, current page state
Arg4: fffffa8003345d20, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 9
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80001cc328b to fffff80001c4dc90
STACK_TEXT:
fffff980`11154118 fffff800`01cc328b : 00000000`0000004e 00000000`00000099 00000000`00111746 00000000`00000004 : nt!KeBugCheckEx
fffff980`11154120 fffff800`01c8507e : ffffffff`ffffffff ed100001`11746863 fffffa80`049635a0 fffff900`c3055000 : nt!MiBadShareCount+0x4b
fffff980`11154160 fffff800`01e44ded : fffff900`c3055000 fffff900`0000015b fffffa80`02427010 fffff980`01216c00 : nt!MiRemoveMappedPtes+0x80e
fffff980`111542a0 fffff800`01e4466b : fffff880`036e4060 00000000`00000011 00000000`00000001 000001eb`0000036c : nt!MiRemoveFromSystemSpace+0x14d
fffff980`11154300 fffff960`001eb3c4 : fffff900`00000ab5 fffff960`000c2ad5 00000000`00000000 00000000`00000000 : nt!MmUnmapViewInSystemSpace+0x6b
fffff980`11154330 fffff960`000c35f4 : 00000000`00000576 fffff900`c3000010 00000000`00000011 00000000`00000001 : win32k!vFreeKernelSection+0x34
fffff980`11154370 fffff960`000c37d1 : fffff900`c3000010 fffff980`00000000 fffff900`c0085010 00000000`00000000 : win32k!SURFACE::bDeleteSurface+0x344
fffff980`11154450 fffff960`00086994 : ffffffff`e4050576 fffff900`c1d6a010 00000000`00000576 00000000`7efdb000 : win32k!bDeleteSurface+0x31
fffff980`11154480 fffff800`01c4d733 : fffffa80`049635a0 fffff980`11154530 00000000`03a909c0 fffff900`00000000 : win32k!NtGdiDeleteObjectApp+0x94
fffff980`111544b0 00000000`750b3cf9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0007ded8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x750b3cf9
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+4b
fffff800`01cc328b cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+4b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 470c35b4
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4b
BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4b
Followup: MachineOwner
---------
1B
Microsoft (R) Windows Debugger Version 6.8.0004.0 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini010408-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\debug*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Vista Kernel Version 6000 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6000.16575.amd64fre.vista_gdr.071009-1548
Kernel base = 0xfffff800`01c00000 PsLoadedModuleList = 0xfffff800`01d9af70
Debug session time: Fri Jan 4 00:09:22.816 2008 (GMT-8)
System Uptime: 0 days 0:05:34.704
Loading Kernel Symbols
..............................................................................................................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff960000ed261, fffff9800d1fe9c0, 0}
Probably caused by : win32k.sys ( win32k!xxxSetParent+1d1 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff960000ed261, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff9800d1fe9c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
win32k!xxxSetParent+1d1
fffff960`000ed261 845030 test byte ptr [rax+30h],dl
CONTEXT: fffff9800d1fe9c0 -- (.cxr 0xfffff9800d1fe9c0)
rax=0000000100000000 rbx=fffff900c0859240 rcx=0000000000000000
rdx=fffff900c0800b08 rsi=fffff900c0857b70 rdi=fffff900c0800b60
rip=fffff960000ed261 rsp=fffff9800d1ff220 rbp=0000000000000000
r8=000000000000000b r9=fffff900c0800b60 r10=fffff900c0857bc0
r11=fffffa80042db8f0 r12=0000000000000000 r13=0000000000000000
r14=000000000000003c r15=00000000040b2ae8
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
win32k!xxxSetParent+0x1d1:
fffff960`000ed261 845030 test byte ptr [rax+30h],dl ds:002b:00000001`00000030=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: windbg.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff960000d9dcf to fffff960000ed261
STACK_TEXT:
fffff980`0d1ff220 fffff960`000d9dcf : 00000000`00000000 fffff900`c0859240 00000000`00000000 00000000`00000000 : win32k!xxxSetParent+0x1d1
fffff980`0d1ff2c0 fffff800`01c4d733 : fffffa80`01ecb4d0 fffff980`0d1ff3a0 00000000`03ffc310 00000000`00000020 : win32k!NtUserSetParent+0xef
fffff980`0d1ff320 00000000`7735fd4a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0025a818 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7735fd4a
FOLLOWUP_IP:
win32k!xxxSetParent+1d1
fffff960`000ed261 845030 test byte ptr [rax+30h],dl
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32k!xxxSetParent+1d1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 45d3d32c
STACK_COMMAND: .cxr 0xfffff9800d1fe9c0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_win32k!xxxSetParent+1d1
BUCKET_ID: X64_0x3B_win32k!xxxSetParent+1d1
Followup: MachineOwner
---------
2b
Microsoft (R) Windows Debugger Version 6.8.0004.0 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini010408-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\debug*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Vista Kernel Version 6000 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6000.16575.amd64fre.vista_gdr.071009-1548
Kernel base = 0xfffff800`01c00000 PsLoadedModuleList = 0xfffff800`01d9af70
Debug session time: Fri Jan 4 11:28:37.049 2008 (GMT-8)
System Uptime: 0 days 0:01:56.937
Loading Kernel Symbols
.............................................................................................................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffffa82029610f8, 0, fffff80001c59899, 5}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+119 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa82029610f8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80001c59899, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001dfa0b0
fffffa82029610f8
FAULTING_IP:
nt!IoGetRelatedDeviceObject+4b
fffff800`01c59899 488b4008 mov rax,qword ptr [rax+8]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff98000c97520 -- (.trap 0xfffff98000c97520)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa82029610f0 rbx=fffffa800456f280 rcx=fffffa80045f7d40
rdx=0000000000001fc4 rsi=0000000000000000 rdi=fffff80001ea7939
rip=fffff80001c59899 rsp=fffff98000c976b8 rbp=fffff88002f92000
r8=0000000000000009 r9=fffff88002f92000 r10=0057005c0030002e
r11=fffffa8001fce000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!IoGetRelatedDeviceObject+0x4b:
fffff800`01c59899 488b4008 mov rax,qword ptr [rax+8] ds:fffffa82`029610f8=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80001c53962 to fffff80001c4dc90
STACK_TEXT:
fffff980`00c97418 fffff800`01c53962 : 00000000`00000050 fffffa82`029610f8 00000000`00000000 fffff980`00c97520 : nt!KeBugCheckEx
fffff980`00c97420 fffff800`01c4c819 : 00000000`00000000 fffff880`02f92000 fffff980`00c97800 00000000`00000000 : nt!MmAccessFault+0x4c2
fffff980`00c97520 fffff800`01c59899 : fffff800`01e89b59 00000000`00000004 00000000`00000040 fffff880`000056d0 : nt!KiPageFault+0x119
fffff980`00c976b8 fffff800`01e89b59 : 00000000`00000004 00000000`00000040 fffff880`000056d0 fffffa80`02961aa0 : nt!IoGetRelatedDeviceObject+0x4b
fffff980`00c976c0 fffff800`01e897e9 : 00000000`00000004 fffffa80`0456f280 fffff880`02f92000 fffff980`00c97800 : nt!IopGetFileInformation+0x59
fffff980`00c97740 fffff800`01e89936 : fffffa80`045f7d40 00000000`00000001 00000000`00000000 fffffa80`01fce000 : nt!IopQueryNameInternal+0x319
fffff980`00c977e0 fffff800`01ea71f7 : fffff880`02f8e5a0 00000000`00000000 00000000`00000002 fffffa80`041c3b20 : nt!IopQueryName+0x26
fffff980`00c97830 fffff800`01f9ee3e : fffffa80`045f7d40 fffffa80`01fce000 fffff880`00002000 fffff980`00c97958 : nt!ObpQueryNameString+0x137
fffff980`00c97900 fffff800`01f9f075 : fffffa80`0456f280 fffffa80`0000007a fffff980`00c97a20 fffff980`00c97a00 : nt!EtwpEnumerateImages+0x7e
fffff980`00c97950 fffff800`01f7c666 : fffffa80`0456d760 fffffa80`0456f280 fffff800`01f9eeb0 fffff980`00c97a20 : nt!EtwpProcessEnumCallback+0x1c5
fffff980`00c979d0 fffff800`01f9f1a3 : fffff980`00c97af8 00000000`00000001 fffff800`01d67300 fffff800`01d67300 : nt!PsEnumProcesses+0x26
fffff980`00c97a00 fffff800`01fddb47 : 00000000`00000000 fffffa80`027a5310 00000000`00000000 fffff800`01d67370 : nt!EtwpProcessThreadImageRundown+0x33
fffff980`00c97a40 fffff800`01fef139 : 00000000`00000418 00000000`00000002 fffff800`01d67370 00000001`00000000 : nt!EtwpKernelTraceRundown+0x47
fffff980`00c97a70 fffff800`01fef1ef : fffffa80`027a5310 fffff880`02f73740 fffffa80`027a5310 00000000`00000001 : nt!EtwpUpdateLoggerGroupMasks+0x229
fffff980`00c97b60 fffff800`01fef7c2 : 00000000`00000000 00000000`00000000 00000000`00000002 00000000`00000000 : nt!EtwpStopLoggerInstance+0x4f
fffff980`00c97ba0 fffff800`01f0dd34 : 00000000`00000000 fffff980`00c97ce0 fffffa80`027a5310 ffffffff`88ca6c00 : nt!EtwpStopTrace+0x112
fffff980`00c97c30 fffff800`01ff08f5 : ffffffff`ffffffff fffffa80`0187d720 fffff800`000000b4 fffffa80`64465250 : nt! ?? ::NNGAKEGL::`string'+0x3d778
fffff980`00c97ca0 fffff800`01c59da3 : fffffa80`01fec640 fffffa80`01e59920 fffffa80`01fec600 00000000`00000000 : nt!PerfDiagpProxyWorker+0x1a5
fffff980`00c97ce0 fffff800`01ee196b : fffffa80`01e59920 002f0072`0062003c fffffa80`0187d720 003c0020`00200001 : nt!ExpWorkerThread+0x12a
fffff980`00c97d50 fffff800`01c34656 : fffff980`00a63180 fffffa80`0187d720 fffff980`00a6cc40 fffffa80`0187dbb0 : nt!PspSystemThreadStartup+0x5b
fffff980`00c97d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+119
fffff800`01c4c819 85c0 test eax,eax
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+119
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 470c35b4
FAILURE_BUCKET_ID: X64_0x50_nt!KiPageFault+119
BUCKET_ID: X64_0x50_nt!KiPageFault+119
Followup: MachineOwner
---------
3b
Microsoft (R) Windows Debugger Version 6.8.0004.0 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini010408-03.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\debug*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Vista Kernel Version 6000 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6000.16575.amd64fre.vista_gdr.071009-1548
Kernel base = 0xfffff800`01c00000 PsLoadedModuleList = 0xfffff800`01d9af70
Debug session time: Fri Jan 4 11:30:24.586 2008 (GMT-8)
System Uptime: 0 days 0:01:18.321
Loading Kernel Symbols
............................................................................................................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffffa8202ce61d8, 2, 0, fffff9800061205a}
Probably caused by : ecache.sys ( ecache!EcCacheManagerPurgeCacheForDevice+86 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffffa8202ce61d8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff9800061205a, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001dfa0b0
fffffa8202ce61d8
CURRENT_IRQL: 2
FAULTING_IP:
ecache!EcCacheManagerPurgeCacheForDevice+86
fffff980`0061205a 48235308 and rdx,qword ptr [rbx+8]
CUSTOMER_CRASH_COUNT: 3
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: Idle
TRAP_FRAME: fffff98000a4d7b0 -- (.trap 0xfffff98000a4d7b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000100000 rbx=0000000000000001 rcx=0000000000007fff
rdx=ffffffffffffffff rsi=fffffa80027e84b0 rdi=fffffa8002a62102
rip=fffff9800061205a rsp=fffff98000a4d940 rbp=fffffa8002a62190
r8=0000000000000103 r9=0000000000008000 r10=0000000000000001
r11=fffffa8002e77d60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po nc
ecache!EcCacheManagerPurgeCacheForDevice+0x86:
fffff980`0061205a 48235308 and rdx,qword ptr [rbx+8] ds:00000000`00000009=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80001c4da33 to fffff80001c4dc90
STACK_TEXT:
fffff980`00a4d668 fffff800`01c4da33 : 00000000`0000000a fffffa82`02ce61d8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff980`00a4d670 fffff800`01c4c90b : 00000000`00000000 fffffa82`02ce61d0 00000000`0e93b100 fffff980`00a4d830 : nt!KiBugCheckDispatch+0x73
fffff980`00a4d7b0 fffff980`0061205a : 00000000`00852738 fffffa82`02ce61d0 fffffa80`02a62190 fffffa80`02e77d50 : nt!KiPageFault+0x20b
fffff980`00a4d940 fffff980`0060f42a : 00000000`00852738 fffffa80`0471a010 fffffa80`0471a010 fffff980`00551379 : ecache!EcCacheManagerPurgeCacheForDevice+0x86
fffff980`00a4d980 fffff800`01c5b9e9 : fffffa80`02a62040 00000000`00000034 fffffa80`028da120 fffffa80`0471a1bb : ecache!EcDispatchReadWriteCompletion+0x102
fffff980`00a4da20 fffff980`00bcff8f : fffffa80`02a5e060 fffffa80`02a5e060 fffffa80`02a5f560 fffffa80`04846e70 : nt!IopfCompleteRequest+0x1a9
fffff980`00a4da90 fffff800`01c5b9e9 : fffffa80`046d5010 00000000`00000000 00000000`00000000 00000000`00000000 : CLASSPNP!TransferPktComplete+0x36f
fffff980`00a4dae0 fffff980`0054ca84 : 00000000`00000000 00000000`00000000 fffffa80`027741b0 fffffa80`046d5010 : nt!IopfCompleteRequest+0x1a9
fffff980`00a4db50 fffff980`0054c8b2 : fffffa80`01b89b80 00000000`00000000 fffffa80`01b89b80 00000000`737f5ffa : ataport!IdeCompleteScsiIrp+0x60
fffff980`00a4db80 fffff980`0054eee9 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff980`0453ada9 : ataport!IdeCommonCrbCompletion+0x5a
fffff980`00a4dbb0 fffff980`0054e961 : fffffa80`027551a0 00000000`00000000 fffffa80`02755050 00000000`00000001 : ataport!IdeProcessCompletedRequests+0x409
fffff980`00a4dc60 fffff800`01c50512 : 00000019`1e102b8b 00000000`34776400 00000000`00000000 fffffa80`02755050 : ataport!IdePortCompletionDpc+0x15d
fffff980`00a4dd10 fffff800`01c4fc2f : fffff980`0054e804 fffff980`00a63180 00000000`00000000 fffff980`00a6cc40 : nt!KiRetireDpcList+0x155
fffff980`00a4dd80 fffff800`01e00724 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5f
fffff980`00a4ddb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemStartup+0x1d4
STACK_COMMAND: kb
FOLLOWUP_IP:
ecache!EcCacheManagerPurgeCacheForDevice+86
fffff980`0061205a 48235308 and rdx,qword ptr [rbx+8]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: ecache!EcCacheManagerPurgeCacheForDevice+86
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ecache
IMAGE_NAME: ecache.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4549bcfb
FAILURE_BUCKET_ID: X64_0xD1_ecache!EcCacheManagerPurgeCacheForDevice+86
BUCKET_ID: X64_0xD1_ecache!EcCacheManagerPurgeCacheForDevice+86
Followup: MachineOwner
---------
4B
Microsoft (R) Windows Debugger Version 6.8.0004.0 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini010408-04.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\debug*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Vista Kernel Version 6000 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6000.16575.amd64fre.vista_gdr.071009-1548
Kernel base = 0xfffff800`01c00000 PsLoadedModuleList = 0xfffff800`01d9af70
Debug session time: Fri Jan 4 11:47:00.902 2008 (GMT-8)
System Uptime: 0 days 0:15:13.806
Loading Kernel Symbols
.............................................................................................................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffffa8006416e0b, 0, fffff80001ce9a82, 2}
Could not read faulting driver name
Probably caused by : memory_corruption ( nt!MiAgeWorkingSet+2b2 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa8006416e0b, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80001ce9a82, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001dfa0b0
fffffa8006416e0b
FAULTING_IP:
nt!MiAgeWorkingSet+2b2
fffff800`01ce9a82 8a411b mov al,byte ptr [rcx+1Bh]
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 4
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff98000c587f0 -- (.trap 0xfffff98000c587f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000001c754 rbx=0000000000000000 rcx=fffffa8006416df0
rdx=fffff80001d9b3e0 rsi=0000000000000000 rdi=fffff80001d45bf0
rip=fffff80001ce9a82 rsp=fffff98000c58980 rbp=000000000000003d
r8=fffffa800350bf00 r9=0000000000000003 r10=000000000000001b
r11=00000000071d7000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiAgeWorkingSet+0x2b2:
fffff800`01ce9a82 8a411b mov al,byte ptr [rcx+1Bh] ds:fffffa80`06416e0b=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80001c539a9 to fffff80001c4dc90
STACK_TEXT:
fffff980`00c586e8 fffff800`01c539a9 : 00000000`00000050 fffffa80`06416e0b 00000000`00000000 fffff980`00c587f0 : nt!KeBugCheckEx
fffff980`00c586f0 fffff800`01c4c819 : 00000000`00000000 fffff800`01d45b40 00000000`00000000 fffff800`01d3debd : nt!MmAccessFault+0x509
fffff980`00c587f0 fffff800`01ce9a82 : fffff700`00081488 e3e00000`2db8e867 00000003`00000000 00000000`00000001 : nt!KiPageFault+0x119
fffff980`00c58980 fffff800`01d07c77 : fffffa80`0350bf00 00000000`00000001 fffff980`00c58bb0 fffff980`00c58be0 : nt!MiAgeWorkingSet+0x2b2
fffff980`00c58b40 fffff800`01c679b7 : fffffa80`000001b1 00000000`00000002 fffff800`01d86508 00000000`00000000 : nt!MiProcessWorkingSets+0x217
fffff980`00c58bb0 fffff800`01c67782 : fffffa80`00c90900 00000000`00000001 00000000`00000004 00000000`00000008 : nt!MmWorkingSetManager+0x1d7
fffff980`00c58c10 fffff800`01ee196b : fffffa80`00c909b0 00000000`00000080 00000000`00000000 00000000`00000001 : nt!KeBalanceSetManager+0x11f
fffff980`00c58d50 fffff800`01c34656 : fffff800`01d4a980 fffffa80`00c909b0 fffff800`01d4fc80 fffff800`01d500d0 : nt!PspSystemThreadStartup+0x5b
fffff980`00c58d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiAgeWorkingSet+2b2
fffff800`01ce9a82 8a411b mov al,byte ptr [rcx+1Bh]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiAgeWorkingSet+2b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 470c35b4
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x50_nt!MiAgeWorkingSet+2b2
BUCKET_ID: X64_0x50_nt!MiAgeWorkingSet+2b2
Followup: MachineOwner
---------