Advertisement
Guest User

w3bd3vil

a guest
Dec 22nd, 2011
716
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.34 KB | None | 0 0
  1. PAGE_FAULT_IN_NONPAGED_AREA (50)
  2. Invalid system memory was referenced. This cannot be protected by try-except,
  3. it must be protected by a Probe. Typically the address is just plain bad or it
  4. is pointing at freed memory.
  5. Arguments:
  6. Arg1: fffff904c2730258, memory referenced.
  7. Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
  8. Arg3: fffff96000164e2e, If non-zero, the instruction address which referenced the bad memory
  9. address.
  10. Arg4: 0000000000000005, (reserved)
  11.  
  12. Debugging Details:
  13. ------------------
  14.  
  15.  
  16. Could not read faulting driver name
  17.  
  18. WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003516100
  19. fffff904c2730258
  20.  
  21. FAULTING_IP:
  22. win32k!memmove+25e
  23. fffff960`00164e2e 48894118 mov qword ptr [rcx+18h],rax
  24.  
  25. MM_INTERNAL_CODE: 5
  26.  
  27. CUSTOMER_CRASH_COUNT: 1
  28.  
  29. DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
  30.  
  31. BUGCHECK_STR: 0x50
  32.  
  33. PROCESS_NAME: WebKit2WebProc
  34.  
  35. CURRENT_IRQL: 0
  36.  
  37. TRAP_FRAME: fffff88008b510e0 -- (.trap 0xfffff88008b510e0)
  38. NOTE: The trap frame does not contain all registers.
  39. Some register values may be zeroed or incorrect.
  40. rax=ffefefeffff0f0f0 rbx=0000000000000000 rcx=fffff904c2730240
  41. rdx=fffffffbff932a40 rsi=0000000000000000 rdi=0000000000000000
  42. rip=fffff96000164e2e rsp=fffff88008b51278 rbp=00000000000001dc
  43. r8=0000000000000028 r9=0000000000000001 r10=ffefefefffefefef
  44. r11=fffff904c2730238 r12=0000000000000000 r13=0000000000000000
  45. r14=0000000000000000 r15=0000000000000000
  46. iopl=0 nv up ei ng nz na pe nc
  47. win32k!memmove+0x25e:
  48. fffff960`00164e2e 48894118 mov qword ptr [rcx+18h],rax ds:fffff904`c2730258=????????????????
  49. Resetting default scope
  50.  
  51. LAST_CONTROL_TRANSFER: from fffff8000328e3bf to fffff800032e3c40
  52.  
  53. STACK_TEXT:
  54. fffff880`08b50f78 fffff800`0328e3bf : 00000000`00000050 fffff904`c2730258 00000000`00000001 fffff880`08b510e0 : nt!KeBugCheckEx
  55. fffff880`08b50f80 fffff800`032e1d6e : 00000000`00000001 fffff904`c2730258 00000000`00002700 fffff880`08b51380 : nt! ?? ::FNODOBFM::`string'+0x44791
  56. fffff880`08b510e0 fffff960`00164e2e : fffff960`00280a11 fffff900`c1f11320 fffff900`c273fe38 00000000`28451d38 : nt!KiPageFault+0x16e
  57. fffff880`08b51278 fffff960`00280a11 : fffff900`c1f11320 fffff900`c273fe38 00000000`28451d38 00000011`00000001 : win32k!memmove+0x25e
  58. fffff880`08b51280 fffff960`00280ca2 : fffff880`08b51380 00000000`000001dc fffff900`c2062c78 fffff904`c2730238 : win32k!NtGdiUpdateTransform+0x161
  59. fffff880`08b512b0 fffff960`002815e4 : 00000000`000001dc fffff902`c2734638 00000000`0009f580 00000000`00000000 : win32k!NtGdiUpdateTransform+0x3f2
  60. fffff880`08b51310 fffff960`00281854 : fffff900`c2730018 fffff900`c2062978 00000000`fffffff2 fffff900`00000001 : win32k!NtGdiUpdateTransform+0xd34
  61. fffff880`08b514f0 fffff960`0028208e : fffff900`c1d1a028 00000000`00000000 fffff900`c2730018 00000000`00000000 : win32k!NtGdiUpdateTransform+0xfa4
  62. fffff880`08b515b0 fffff960`002821fd : fffff900`c1d1a028 fffff900`c2062978 00000000`0009f580 fffff900`c1f11320 : win32k!NtGdiUpdateTransform+0x17de
  63. fffff880`08b516d0 fffff960`002823bc : fffff900`c00c0010 00000000`0000003c fffff880`08b51b20 fffff900`c1d1a010 : win32k!EngNineGrid+0xb1
  64. fffff880`08b51770 fffff960`00282879 : 00000000`00000000 fffff900`c2062978 00000000`00000000 fffff900`c1d1a010 : win32k!EngDrawStream+0x1a0
  65. fffff880`08b51820 fffff960`002831cb : fffff880`08b51938 00000000`00000000 fffff900`c2062960 fffff900`c1f11320 : win32k!NtGdiDrawStreamInternal+0x47d
  66. fffff880`08b518d0 fffff960`0029e93c : 00000000`3f010ad8 00000000`00000000 fffff880`08b51af0 fffff960`00000000 : win32k!GreDrawStream+0x917
  67. fffff880`08b51ac0 fffff800`032e2ed3 : fffffa80`09777b60 00000000`00010000 00000000`000309c0 00000000`7efdb000 : win32k!NtGdiDrawStream+0x9c
  68. fffff880`08b51c20 00000000`73f003fa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  69. 00000000`0021dd78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x73f003fa
  70.  
  71.  
  72. STACK_COMMAND: kb
  73.  
  74. FOLLOWUP_IP:
  75. win32k!memmove+25e
  76. fffff960`00164e2e 48894118 mov qword ptr [rcx+18h],rax
  77.  
  78. SYMBOL_STACK_INDEX: 3
  79.  
  80. SYMBOL_NAME: win32k!memmove+25e
  81.  
  82. FOLLOWUP_NAME: MachineOwner
  83.  
  84. MODULE_NAME: win32k
  85.  
  86. IMAGE_NAME: win32k.sys
  87.  
  88. DEBUG_FLR_IMAGE_TIMESTAMP: 4e83edf6
  89.  
  90. FAILURE_BUCKET_ID: X64_0x50_win32k!memmove+25e
  91.  
  92. BUCKET_ID: X64_0x50_win32k!memmove+25e
  93.  
  94. Followup: MachineOwner
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement