Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 6.2.8400.0 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\Minidump\062812-3697-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
- Executable search path is:
- Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
- Machine Name:
- Kernel base = 0xfffff800`0325e000 PsLoadedModuleList = 0xfffff800`034a2670
- Debug session time: Thu Jun 28 23:55:32.960 2012 (UTC - 4:00)
- System Uptime: 0 days 0:00:16.645
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ..................................
- Loading User Symbols
- Loading unloaded module list
- ......
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck D6, {fffff9800eba3000, 0, fffffa800e12a19b, 0}
- Could not read faulting driver name
- Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+456df )
- Followup: MachineOwner
- ---------
- 5: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DRIVER_PAGE_FAULT_BEYOND_END_OF_ALLOCATION (d6)
- N bytes of memory was allocated and more than N bytes are being referenced.
- This cannot be protected by try-except.
- When possible, the guilty driver's name (Unicode string) is printed on
- the bugcheck screen and saved in KiBugCheckDriver.
- Arguments:
- Arg1: fffff9800eba3000, memory referenced
- Arg2: 0000000000000000, value 0 = read operation, 1 = write operation
- Arg3: fffffa800e12a19b, if non-zero, the address which referenced memory.
- Arg4: 0000000000000000, (reserved)
- Debugging Details:
- ------------------
- Could not read faulting driver name
- READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000350c100
- GetUlongFromAddress: unable to read from fffff8000350c1c0
- fffff9800eba3000
- FAULTING_IP:
- +0
- fffffa80`0e12a19b 66f2af repne scas word ptr [rdi]
- MM_INTERNAL_CODE: 0
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
- BUGCHECK_STR: 0xD6
- PROCESS_NAME: LMIGuardianSvc
- CURRENT_IRQL: 0
- TRAP_FRAME: fffff88008b952a0 -- (.trap 0xfffff88008b952a0)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000000 rbx=0000000000000000 rcx=ffffffffffffffc3
- rdx=fffff9800eba2f88 rsi=0000000000000000 rdi=0000000000000000
- rip=fffffa800e12a19b rsp=fffff88008b95430 rbp=fffffa800f448d5d
- r8=0000000000000096 r9=00000000000000ce r10=0000000000000006
- r11=fffff9800eba2f88 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz na po nc
- fffffa80`0e12a19b 66f2af repne scas word ptr [rdi]
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff8000328554c to fffff800032dd1c0
- STACK_TEXT:
- fffff880`08b95138 fffff800`0328554c : 00000000`00000050 fffff980`0eba3000 00000000`00000000 fffff880`08b952a0 : nt!KeBugCheckEx
- fffff880`08b95140 fffff800`032db2ee : 00000000`00000000 fffff980`0eba3000 00000000`00000000 fffff880`08b956c0 : nt! ?? ::FNODOBFM::`string'+0x456df
- fffff880`08b952a0 fffffa80`0e12a19b : fffff980`0cceefc8 fffff800`03397c7b 00000000`00000002 fffffa80`0e14444d : nt!KiPageFault+0x16e
- fffff880`08b95430 fffff980`0cceefc8 : fffff800`03397c7b 00000000`00000002 fffffa80`0e14444d fffff980`0eb86f28 : 0xfffffa80`0e12a19b
- fffff880`08b95438 fffff800`03397c7b : 00000000`00000002 fffffa80`0e14444d fffff980`0eb86f28 fffff980`0eba2f88 : 0xfffff980`0cceefc8
- fffff880`08b95440 00000000`000000ce : 00000000`00000010 fffffa80`0dde6010 fffff980`020c6e58 00000000`00000001 : nt!RtlCaptureStackBackTrace+0x4b
- fffff880`08b95470 00000000`00000010 : fffffa80`0dde6010 fffff980`020c6e58 00000000`00000001 fffff880`08b956c0 : 0xce
- fffff880`08b95478 fffffa80`0dde6010 : fffff980`020c6e58 00000000`00000001 fffff880`08b956c0 00000000`00000001 : 0x10
- fffff880`08b95480 fffff980`020c6e58 : 00000000`00000001 fffff880`08b956c0 00000000`00000001 00000000`00000000 : 0xfffffa80`0dde6010
- fffff880`08b95488 00000000`00000001 : fffff880`08b956c0 00000000`00000001 00000000`00000000 00000000`00000001 : 0xfffff980`020c6e58
- fffff880`08b95490 fffff880`08b956c0 : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000000 : 0x1
- fffff880`08b95498 00000000`00000001 : 00000000`00000000 00000000`00000001 00000000`00000000 fffffa80`0e12a31b : 0xfffff880`08b956c0
- fffff880`08b954a0 00000000`00000000 : 00000000`00000001 00000000`00000000 fffffa80`0e12a31b fffff980`0eb94db8 : 0x1
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- nt! ?? ::FNODOBFM::`string'+456df
- fffff800`0328554c cc int 3
- SYMBOL_STACK_INDEX: 1
- SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+456df
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 4fa390f3
- FAILURE_BUCKET_ID: X64_0xD6_nt!_??_::FNODOBFM::_string_+456df
- BUCKET_ID: X64_0xD6_nt!_??_::FNODOBFM::_string_+456df
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement