Advertisement
Guest User

BSOD\081714-10920-01.dmp

a guest
Aug 31st, 2014
223
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.25 KB | None | 0 0
  1. *******************************************************************************
  2. * *
  3. * Bugcheck Analysis *
  4. * *
  5. *******************************************************************************
  6.  
  7. PAGE_FAULT_IN_NONPAGED_AREA (50)
  8. Invalid system memory was referenced. This cannot be protected by try-except,
  9. it must be protected by a Probe. Typically the address is just plain bad or it
  10. is pointing at freed memory.
  11. Arguments:
  12. Arg1: fffff900c3181cf0, memory referenced.
  13. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
  14. Arg3: fffff9600027c69d, If non-zero, the instruction address which referenced the bad memory
  15. address.
  16. Arg4: 0000000000000000, (reserved)
  17.  
  18. Debugging Details:
  19. ------------------
  20.  
  21.  
  22. Could not read faulting driver name
  23.  
  24. READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032f60e0
  25. GetUlongFromAddress: unable to read from fffff800032f6198
  26. fffff900c3181cf0
  27.  
  28. FAULTING_IP:
  29. +0
  30. fffff960`0027c69d ?? ???
  31.  
  32. MM_INTERNAL_CODE: 0
  33.  
  34. CUSTOMER_CRASH_COUNT: 1
  35.  
  36. DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
  37.  
  38. BUGCHECK_STR: 0x50
  39.  
  40. PROCESS_NAME: System
  41.  
  42. CURRENT_IRQL: 0
  43.  
  44. LAST_CONTROL_TRANSFER: from fffff800030cda3a to fffff88005bb1c61
  45.  
  46. STACK_TEXT:
  47. fffff800`00b9cc58 fffff800`030cda3a : 00000000`00328c23 fffffa80`0b10e2d0 00000000`00000000 00000000`00000000 : 0xfffff880`05bb1c61
  48. fffff800`00b9cc60 fffff800`030c86cc : fffff800`03238e80 fffff800`00000001 00000000`00000000 fffff880`00000000 : nt!PoIdle+0x53a
  49. fffff800`00b9cd40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x2c
  50.  
  51.  
  52. STACK_COMMAND: kb
  53.  
  54. FOLLOWUP_IP:
  55. nt!PoIdle+53a
  56. fffff800`030cda3a 0fba2506fc17000f bt dword ptr [nt!PerfGlobalGroupMask+0x8 (fffff800`0324d648)],0Fh
  57.  
  58. SYMBOL_STACK_INDEX: 1
  59.  
  60. SYMBOL_NAME: nt!PoIdle+53a
  61.  
  62. FOLLOWUP_NAME: MachineOwner
  63.  
  64. MODULE_NAME: nt
  65.  
  66. IMAGE_NAME: ntkrnlmp.exe
  67.  
  68. DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
  69.  
  70. FAILURE_BUCKET_ID: X64_0x50_nt!PoIdle+53a
  71.  
  72. BUCKET_ID: X64_0x50_nt!PoIdle+53a
  73.  
  74. Followup: MachineOwner
  75. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement