Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- PAGE_FAULT_IN_NONPAGED_AREA (50)
- Invalid system memory was referenced. This cannot be protected by try-except,
- it must be protected by a Probe. Typically the address is just plain bad or it
- is pointing at freed memory.
- Arguments:
- Arg1: fffff904c2730258, memory referenced.
- Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
- Arg3: fffff96000164e2e, If non-zero, the instruction address which referenced the bad memory
- address.
- Arg4: 0000000000000005, (reserved)
- Debugging Details:
- ------------------
- Could not read faulting driver name
- WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003516100
- fffff904c2730258
- FAULTING_IP:
- win32k!memmove+25e
- fffff960`00164e2e 48894118 mov qword ptr [rcx+18h],rax
- MM_INTERNAL_CODE: 5
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
- BUGCHECK_STR: 0x50
- PROCESS_NAME: WebKit2WebProc
- CURRENT_IRQL: 0
- TRAP_FRAME: fffff88008b510e0 -- (.trap 0xfffff88008b510e0)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=ffefefeffff0f0f0 rbx=0000000000000000 rcx=fffff904c2730240
- rdx=fffffffbff932a40 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff96000164e2e rsp=fffff88008b51278 rbp=00000000000001dc
- r8=0000000000000028 r9=0000000000000001 r10=ffefefefffefefef
- r11=fffff904c2730238 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz na pe nc
- win32k!memmove+0x25e:
- fffff960`00164e2e 48894118 mov qword ptr [rcx+18h],rax ds:fffff904`c2730258=????????????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff8000328e3bf to fffff800032e3c40
- STACK_TEXT:
- fffff880`08b50f78 fffff800`0328e3bf : 00000000`00000050 fffff904`c2730258 00000000`00000001 fffff880`08b510e0 : nt!KeBugCheckEx
- fffff880`08b50f80 fffff800`032e1d6e : 00000000`00000001 fffff904`c2730258 00000000`00002700 fffff880`08b51380 : nt! ?? ::FNODOBFM::`string'+0x44791
- fffff880`08b510e0 fffff960`00164e2e : fffff960`00280a11 fffff900`c1f11320 fffff900`c273fe38 00000000`28451d38 : nt!KiPageFault+0x16e
- fffff880`08b51278 fffff960`00280a11 : fffff900`c1f11320 fffff900`c273fe38 00000000`28451d38 00000011`00000001 : win32k!memmove+0x25e
- fffff880`08b51280 fffff960`00280ca2 : fffff880`08b51380 00000000`000001dc fffff900`c2062c78 fffff904`c2730238 : win32k!NtGdiUpdateTransform+0x161
- fffff880`08b512b0 fffff960`002815e4 : 00000000`000001dc fffff902`c2734638 00000000`0009f580 00000000`00000000 : win32k!NtGdiUpdateTransform+0x3f2
- fffff880`08b51310 fffff960`00281854 : fffff900`c2730018 fffff900`c2062978 00000000`fffffff2 fffff900`00000001 : win32k!NtGdiUpdateTransform+0xd34
- fffff880`08b514f0 fffff960`0028208e : fffff900`c1d1a028 00000000`00000000 fffff900`c2730018 00000000`00000000 : win32k!NtGdiUpdateTransform+0xfa4
- fffff880`08b515b0 fffff960`002821fd : fffff900`c1d1a028 fffff900`c2062978 00000000`0009f580 fffff900`c1f11320 : win32k!NtGdiUpdateTransform+0x17de
- fffff880`08b516d0 fffff960`002823bc : fffff900`c00c0010 00000000`0000003c fffff880`08b51b20 fffff900`c1d1a010 : win32k!EngNineGrid+0xb1
- fffff880`08b51770 fffff960`00282879 : 00000000`00000000 fffff900`c2062978 00000000`00000000 fffff900`c1d1a010 : win32k!EngDrawStream+0x1a0
- fffff880`08b51820 fffff960`002831cb : fffff880`08b51938 00000000`00000000 fffff900`c2062960 fffff900`c1f11320 : win32k!NtGdiDrawStreamInternal+0x47d
- fffff880`08b518d0 fffff960`0029e93c : 00000000`3f010ad8 00000000`00000000 fffff880`08b51af0 fffff960`00000000 : win32k!GreDrawStream+0x917
- fffff880`08b51ac0 fffff800`032e2ed3 : fffffa80`09777b60 00000000`00010000 00000000`000309c0 00000000`7efdb000 : win32k!NtGdiDrawStream+0x9c
- fffff880`08b51c20 00000000`73f003fa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000000`0021dd78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x73f003fa
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- win32k!memmove+25e
- fffff960`00164e2e 48894118 mov qword ptr [rcx+18h],rax
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: win32k!memmove+25e
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: win32k
- IMAGE_NAME: win32k.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 4e83edf6
- FAILURE_BUCKET_ID: X64_0x50_win32k!memmove+25e
- BUCKET_ID: X64_0x50_win32k!memmove+25e
- Followup: MachineOwner
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement