Advertisement
cashBandicoochie

(odd?) Talic's 12th BSOD Debug info: 06/28/12-3697-01.dmp

Jun 28th, 2012
41
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.87 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 6.2.8400.0 AMD64
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4.  
  5. Loading Dump File [C:\Windows\Minidump\062812-3697-01.dmp]
  6. Mini Kernel Dump File: Only registers and stack trace are available
  7.  
  8. Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
  9. Executable search path is:
  10. Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
  11. Product: WinNt, suite: TerminalServer SingleUserTS
  12. Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
  13. Machine Name:
  14. Kernel base = 0xfffff800`0325e000 PsLoadedModuleList = 0xfffff800`034a2670
  15. Debug session time: Thu Jun 28 23:55:32.960 2012 (UTC - 4:00)
  16. System Uptime: 0 days 0:00:16.645
  17. Loading Kernel Symbols
  18. ...............................................................
  19. ................................................................
  20. ..................................
  21. Loading User Symbols
  22. Loading unloaded module list
  23. ......
  24. *******************************************************************************
  25. * *
  26. * Bugcheck Analysis *
  27. * *
  28. *******************************************************************************
  29.  
  30. Use !analyze -v to get detailed debugging information.
  31.  
  32. BugCheck D6, {fffff9800eba3000, 0, fffffa800e12a19b, 0}
  33.  
  34.  
  35. Could not read faulting driver name
  36. Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+456df )
  37.  
  38. Followup: MachineOwner
  39. ---------
  40.  
  41. 5: kd> !analyze -v
  42. *******************************************************************************
  43. * *
  44. * Bugcheck Analysis *
  45. * *
  46. *******************************************************************************
  47.  
  48. DRIVER_PAGE_FAULT_BEYOND_END_OF_ALLOCATION (d6)
  49. N bytes of memory was allocated and more than N bytes are being referenced.
  50. This cannot be protected by try-except.
  51. When possible, the guilty driver's name (Unicode string) is printed on
  52. the bugcheck screen and saved in KiBugCheckDriver.
  53. Arguments:
  54. Arg1: fffff9800eba3000, memory referenced
  55. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation
  56. Arg3: fffffa800e12a19b, if non-zero, the address which referenced memory.
  57. Arg4: 0000000000000000, (reserved)
  58.  
  59. Debugging Details:
  60. ------------------
  61.  
  62.  
  63. Could not read faulting driver name
  64.  
  65. READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000350c100
  66. GetUlongFromAddress: unable to read from fffff8000350c1c0
  67. fffff9800eba3000
  68.  
  69. FAULTING_IP:
  70. +0
  71. fffffa80`0e12a19b 66f2af repne scas word ptr [rdi]
  72.  
  73. MM_INTERNAL_CODE: 0
  74.  
  75. CUSTOMER_CRASH_COUNT: 1
  76.  
  77. DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
  78.  
  79. BUGCHECK_STR: 0xD6
  80.  
  81. PROCESS_NAME: LMIGuardianSvc
  82.  
  83. CURRENT_IRQL: 0
  84.  
  85. TRAP_FRAME: fffff88008b952a0 -- (.trap 0xfffff88008b952a0)
  86. NOTE: The trap frame does not contain all registers.
  87. Some register values may be zeroed or incorrect.
  88. rax=0000000000000000 rbx=0000000000000000 rcx=ffffffffffffffc3
  89. rdx=fffff9800eba2f88 rsi=0000000000000000 rdi=0000000000000000
  90. rip=fffffa800e12a19b rsp=fffff88008b95430 rbp=fffffa800f448d5d
  91. r8=0000000000000096 r9=00000000000000ce r10=0000000000000006
  92. r11=fffff9800eba2f88 r12=0000000000000000 r13=0000000000000000
  93. r14=0000000000000000 r15=0000000000000000
  94. iopl=0 nv up ei ng nz na po nc
  95. fffffa80`0e12a19b 66f2af repne scas word ptr [rdi]
  96. Resetting default scope
  97.  
  98. LAST_CONTROL_TRANSFER: from fffff8000328554c to fffff800032dd1c0
  99.  
  100. STACK_TEXT:
  101. fffff880`08b95138 fffff800`0328554c : 00000000`00000050 fffff980`0eba3000 00000000`00000000 fffff880`08b952a0 : nt!KeBugCheckEx
  102. fffff880`08b95140 fffff800`032db2ee : 00000000`00000000 fffff980`0eba3000 00000000`00000000 fffff880`08b956c0 : nt! ?? ::FNODOBFM::`string'+0x456df
  103. fffff880`08b952a0 fffffa80`0e12a19b : fffff980`0cceefc8 fffff800`03397c7b 00000000`00000002 fffffa80`0e14444d : nt!KiPageFault+0x16e
  104. fffff880`08b95430 fffff980`0cceefc8 : fffff800`03397c7b 00000000`00000002 fffffa80`0e14444d fffff980`0eb86f28 : 0xfffffa80`0e12a19b
  105. fffff880`08b95438 fffff800`03397c7b : 00000000`00000002 fffffa80`0e14444d fffff980`0eb86f28 fffff980`0eba2f88 : 0xfffff980`0cceefc8
  106. fffff880`08b95440 00000000`000000ce : 00000000`00000010 fffffa80`0dde6010 fffff980`020c6e58 00000000`00000001 : nt!RtlCaptureStackBackTrace+0x4b
  107. fffff880`08b95470 00000000`00000010 : fffffa80`0dde6010 fffff980`020c6e58 00000000`00000001 fffff880`08b956c0 : 0xce
  108. fffff880`08b95478 fffffa80`0dde6010 : fffff980`020c6e58 00000000`00000001 fffff880`08b956c0 00000000`00000001 : 0x10
  109. fffff880`08b95480 fffff980`020c6e58 : 00000000`00000001 fffff880`08b956c0 00000000`00000001 00000000`00000000 : 0xfffffa80`0dde6010
  110. fffff880`08b95488 00000000`00000001 : fffff880`08b956c0 00000000`00000001 00000000`00000000 00000000`00000001 : 0xfffff980`020c6e58
  111. fffff880`08b95490 fffff880`08b956c0 : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000000 : 0x1
  112. fffff880`08b95498 00000000`00000001 : 00000000`00000000 00000000`00000001 00000000`00000000 fffffa80`0e12a31b : 0xfffff880`08b956c0
  113. fffff880`08b954a0 00000000`00000000 : 00000000`00000001 00000000`00000000 fffffa80`0e12a31b fffff980`0eb94db8 : 0x1
  114.  
  115.  
  116. STACK_COMMAND: kb
  117.  
  118. FOLLOWUP_IP:
  119. nt! ?? ::FNODOBFM::`string'+456df
  120. fffff800`0328554c cc int 3
  121.  
  122. SYMBOL_STACK_INDEX: 1
  123.  
  124. SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+456df
  125.  
  126. FOLLOWUP_NAME: MachineOwner
  127.  
  128. MODULE_NAME: nt
  129.  
  130. IMAGE_NAME: ntkrnlmp.exe
  131.  
  132. DEBUG_FLR_IMAGE_TIMESTAMP: 4fa390f3
  133.  
  134. FAILURE_BUCKET_ID: X64_0xD6_nt!_??_::FNODOBFM::_string_+456df
  135.  
  136. BUCKET_ID: X64_0xD6_nt!_??_::FNODOBFM::_string_+456df
  137.  
  138. Followup: MachineOwner
  139. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement