Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*
Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02851000 PsLoadedModuleList = 0xfffff800`02a8ee50
Debug session time: Mon Mar 22 00:50:40.568 2010 (GMT+5)
System Uptime: 0 days 0:04:09.802
Loading Kernel Symbols
...............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff6fcc504d568, 0, fffff800028d6ae2, 2}
Could not read faulting driver name
Probably caused by : memory_corruption ( nt!MiAgeWorkingSet+1c2 )
Followup: MachineOwner
---------
1: kd> !analyze -ve
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff6fcc504d568, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800028d6ae2, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002af90e0
fffff6fcc504d568
FAULTING_IP:
nt!MiAgeWorkingSet+1c2
fffff800`028d6ae2 488b19 mov rbx,qword ptr [rcx]
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff880031397a0 -- (.trap 0xfffff880031397a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000007ffffffff8 rbx=0000000000000000 rcx=fffff6fcc504d568
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800028d6ae2 rsp=fffff88003139930 rbp=007ffffcc504d568
r8=0000000000000001 r9=fffff80002a4de00 r10=0000000000000005
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!MiAgeWorkingSet+0x1c2:
fffff800`028d6ae2 488b19 mov rbx,qword ptr [rcx] ds:08f0:fffff6fc`c504d568=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002940bc2 to fffff800028c2f00
STACK_TEXT:
fffff880`03139638 fffff800`02940bc2 : 00000000`00000050 fffff6fc`c504d568 00000000`00000000 fffff880`031397a0 : nt!KeBugCheckEx
fffff880`03139640 fffff800`028c0fee : 00000000`00000000 00000980`00000000 00000000`00000000 fffff800`029f5bfe : nt! ??
::FNODOBFM::`string'+0x40f90
fffff880`031397a0 fffff800`028d6ae2 : 00000000`0005e000 04f00000`c083b921 00000000`00000000 00000000`0000104f : nt!KiPageFault
+0x16e
fffff880`03139930 fffff800`02943a0e : fffff800`02a4de00 fffff880`00000001 00000000`00000001 fffff880`03139bb0 : nt!
MiAgeWorkingSet+0x1c2
fffff880`03139ae0 fffff800`028d76e2 : 00000000`000000fa 00000000`00000000 fffffa80`00000000 00000000`00000001 : nt! ??
::FNODOBFM::`string'+0x49926
fffff880`03139b80 fffff800`028d796f : 00000000`00000008 fffff880`03139c10 00000000`00000001 fffffa80`00000000 : nt!
MmWorkingSetManager+0x6e
fffff880`03139bd0 fffff800`02b66166 : fffffa80`039ed040 00000000`00000080 fffffa80`039cd040 00000000`00000001 : nt!
KeBalanceSetManager+0x1c3
fffff880`03139d40 fffff800`028a1486 : fffff800`02a3be80 fffffa80`039ed040 fffff800`02a49c40 00000000`00000000 : nt!
PspSystemThreadStartup+0x5a
fffff880`03139d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!
KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiAgeWorkingSet+1c2
fffff800`028d6ae2 488b19 mov rbx,qword ptr [rcx]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiAgeWorkingSet+1c2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x50_nt!MiAgeWorkingSet+1c2
BUCKET_ID: X64_0x50_nt!MiAgeWorkingSet+1c2
Followup: MachineOwner