Advertisement
Guest User

bsod#2

a guest
Sep 5th, 2013
57
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.53 KB | None | 0 0
  1. *******************************************************************************
  2. * *
  3. * Bugcheck Analysis *
  4. * *
  5. *******************************************************************************
  6.  
  7. Use !analyze -v to get detailed debugging information.
  8.  
  9. BugCheck 1A, {41284, fffff980323a6001, d283, fffff780c0000000}
  10.  
  11. Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4ac3 )
  12.  
  13. Followup: MachineOwner
  14. ---------
  15.  
  16. 4: kd> !analyze -v
  17. *******************************************************************************
  18. * *
  19. * Bugcheck Analysis *
  20. * *
  21. *******************************************************************************
  22.  
  23. MEMORY_MANAGEMENT (1a)
  24. # Any other values for parameter 1 must be individually examined.
  25. Arguments:
  26. Arg1: 0000000000041284, A PTE or the working set list is corrupt.
  27. Arg2: fffff980323a6001
  28. Arg3: 000000000000d283
  29. Arg4: fffff780c0000000
  30.  
  31. Debugging Details:
  32. ------------------
  33.  
  34.  
  35. BUGCHECK_STR: 0x1a_41284
  36.  
  37. CUSTOMER_CRASH_COUNT: 1
  38.  
  39. DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
  40.  
  41. PROCESS_NAME: System
  42.  
  43. CURRENT_IRQL: 0
  44.  
  45. LAST_CONTROL_TRANSFER: from fffff80003adc5d7 to fffff80003a84d00
  46.  
  47. STACK_TEXT:
  48. fffff880`033546f8 fffff800`03adc5d7 : 00000000`0000001a 00000000`00041284 fffff980`323a6001 00000000`0000d283 : nt!KeBugCheckEx
  49. fffff880`03354700 fffff800`03aa8947 : 00000000`0000d283 fffff880`03354900 00000000`00000000 fffffa80`0746c860 : nt! ?? ::FNODOBFM::`string'+0x4ac3
  50. fffff880`03354740 fffff800`03d952c9 : fffff980`323a6000 fffff8a0`0c3ffc00 00000000`00000000 00000000`00000000 : nt!MmUnmapViewInSystemCache+0x208
  51. fffff880`03354a20 fffff800`03aa848b : 00000000`00040000 fffffa80`079dde90 00000000`00000000 00000000`00140000 : nt!CcUnmapVacb+0x5d
  52. fffff880`03354a60 fffff800`03ac9a44 : 00000000`00000001 fffffa80`0746c860 fffffa80`09b4bc00 fffffa80`0746c800 : nt!CcUnmapVacbArray+0x1bb
  53. fffff880`03354af0 fffff800`03aca32e : fffffa80`09b4bc40 fffffa80`09b4bc40 fffff880`009b1180 fffffa80`0746c800 : nt!CcDeleteSharedCacheMap+0x154
  54. fffff880`03354b50 fffff800`03aca968 : fffff880`009b1700 fffff880`03354c58 fffffa80`08dca170 fffff800`03c83898 : nt!CcWriteBehind+0x54e
  55. fffff880`03354c00 fffff800`03a8f021 : fffffa80`04f877d0 fffff800`03d7b001 fffff800`03c838a0 fffff800`00000000 : nt!CcWorkerThread+0x1c8
  56. fffff880`03354cb0 fffff800`03d2132e : 61e461e4`1f661f66 fffffa80`04f4fb60 00000000`00000080 fffffa80`04eeb040 : nt!ExpWorkerThread+0x111
  57. fffff880`03354d40 fffff800`03a76666 : fffff880`03167180 fffffa80`04f4fb60 fffff880`031720c0 d968d968`12511251 : nt!PspSystemThreadStartup+0x5a
  58. fffff880`03354d80 00000000`00000000 : fffff880`03355000 fffff880`0334f000 fffff880`03353d40 00000000`00000000 : nt!KiStartSystemThread+0x16
  59.  
  60.  
  61. STACK_COMMAND: kb
  62.  
  63. FOLLOWUP_IP:
  64. nt! ?? ::FNODOBFM::`string'+4ac3
  65. fffff800`03adc5d7 cc int 3
  66.  
  67. SYMBOL_STACK_INDEX: 1
  68.  
  69. SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+4ac3
  70.  
  71. FOLLOWUP_NAME: MachineOwner
  72.  
  73. MODULE_NAME: nt
  74.  
  75. IMAGE_NAME: ntkrnlmp.exe
  76.  
  77. DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fdd5b
  78.  
  79. FAILURE_BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4ac3
  80.  
  81. BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4ac3
  82.  
  83. Followup: MachineOwner
  84. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement