daily pastebin goal
12%
SHARE
TWEET

w3bd3vil

a guest Dec 22nd, 2011 598 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. PAGE_FAULT_IN_NONPAGED_AREA (50)
  2. Invalid system memory was referenced.  This cannot be protected by try-except,
  3. it must be protected by a Probe.  Typically the address is just plain bad or it
  4. is pointing at freed memory.
  5. Arguments:
  6. Arg1: fffff904c2730258, memory referenced.
  7. Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
  8. Arg3: fffff96000164e2e, If non-zero, the instruction address which referenced the bad memory
  9.         address.
  10. Arg4: 0000000000000005, (reserved)
  11.  
  12. Debugging Details:
  13. ------------------
  14.  
  15.  
  16. Could not read faulting driver name
  17.  
  18. WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003516100
  19.  fffff904c2730258
  20.  
  21. FAULTING_IP:
  22. win32k!memmove+25e
  23. fffff960`00164e2e 48894118        mov     qword ptr [rcx+18h],rax
  24.  
  25. MM_INTERNAL_CODE:  5
  26.  
  27. CUSTOMER_CRASH_COUNT:  1
  28.  
  29. DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
  30.  
  31. BUGCHECK_STR:  0x50
  32.  
  33. PROCESS_NAME:  WebKit2WebProc
  34.  
  35. CURRENT_IRQL:  0
  36.  
  37. TRAP_FRAME:  fffff88008b510e0 -- (.trap 0xfffff88008b510e0)
  38. NOTE: The trap frame does not contain all registers.
  39. Some register values may be zeroed or incorrect.
  40. rax=ffefefeffff0f0f0 rbx=0000000000000000 rcx=fffff904c2730240
  41. rdx=fffffffbff932a40 rsi=0000000000000000 rdi=0000000000000000
  42. rip=fffff96000164e2e rsp=fffff88008b51278 rbp=00000000000001dc
  43.  r8=0000000000000028  r9=0000000000000001 r10=ffefefefffefefef
  44. r11=fffff904c2730238 r12=0000000000000000 r13=0000000000000000
  45. r14=0000000000000000 r15=0000000000000000
  46. iopl=0         nv up ei ng nz na pe nc
  47. win32k!memmove+0x25e:
  48. fffff960`00164e2e 48894118        mov     qword ptr [rcx+18h],rax ds:fffff904`c2730258=????????????????
  49. Resetting default scope
  50.  
  51. LAST_CONTROL_TRANSFER:  from fffff8000328e3bf to fffff800032e3c40
  52.  
  53. STACK_TEXT:  
  54. fffff880`08b50f78 fffff800`0328e3bf : 00000000`00000050 fffff904`c2730258 00000000`00000001 fffff880`08b510e0 : nt!KeBugCheckEx
  55. fffff880`08b50f80 fffff800`032e1d6e : 00000000`00000001 fffff904`c2730258 00000000`00002700 fffff880`08b51380 : nt! ?? ::FNODOBFM::`string'+0x44791
  56. fffff880`08b510e0 fffff960`00164e2e : fffff960`00280a11 fffff900`c1f11320 fffff900`c273fe38 00000000`28451d38 : nt!KiPageFault+0x16e
  57. fffff880`08b51278 fffff960`00280a11 : fffff900`c1f11320 fffff900`c273fe38 00000000`28451d38 00000011`00000001 : win32k!memmove+0x25e
  58. fffff880`08b51280 fffff960`00280ca2 : fffff880`08b51380 00000000`000001dc fffff900`c2062c78 fffff904`c2730238 : win32k!NtGdiUpdateTransform+0x161
  59. fffff880`08b512b0 fffff960`002815e4 : 00000000`000001dc fffff902`c2734638 00000000`0009f580 00000000`00000000 : win32k!NtGdiUpdateTransform+0x3f2
  60. fffff880`08b51310 fffff960`00281854 : fffff900`c2730018 fffff900`c2062978 00000000`fffffff2 fffff900`00000001 : win32k!NtGdiUpdateTransform+0xd34
  61. fffff880`08b514f0 fffff960`0028208e : fffff900`c1d1a028 00000000`00000000 fffff900`c2730018 00000000`00000000 : win32k!NtGdiUpdateTransform+0xfa4
  62. fffff880`08b515b0 fffff960`002821fd : fffff900`c1d1a028 fffff900`c2062978 00000000`0009f580 fffff900`c1f11320 : win32k!NtGdiUpdateTransform+0x17de
  63. fffff880`08b516d0 fffff960`002823bc : fffff900`c00c0010 00000000`0000003c fffff880`08b51b20 fffff900`c1d1a010 : win32k!EngNineGrid+0xb1
  64. fffff880`08b51770 fffff960`00282879 : 00000000`00000000 fffff900`c2062978 00000000`00000000 fffff900`c1d1a010 : win32k!EngDrawStream+0x1a0
  65. fffff880`08b51820 fffff960`002831cb : fffff880`08b51938 00000000`00000000 fffff900`c2062960 fffff900`c1f11320 : win32k!NtGdiDrawStreamInternal+0x47d
  66. fffff880`08b518d0 fffff960`0029e93c : 00000000`3f010ad8 00000000`00000000 fffff880`08b51af0 fffff960`00000000 : win32k!GreDrawStream+0x917
  67. fffff880`08b51ac0 fffff800`032e2ed3 : fffffa80`09777b60 00000000`00010000 00000000`000309c0 00000000`7efdb000 : win32k!NtGdiDrawStream+0x9c
  68. fffff880`08b51c20 00000000`73f003fa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  69. 00000000`0021dd78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x73f003fa
  70.  
  71.  
  72. STACK_COMMAND:  kb
  73.  
  74. FOLLOWUP_IP:
  75. win32k!memmove+25e
  76. fffff960`00164e2e 48894118        mov     qword ptr [rcx+18h],rax
  77.  
  78. SYMBOL_STACK_INDEX:  3
  79.  
  80. SYMBOL_NAME:  win32k!memmove+25e
  81.  
  82. FOLLOWUP_NAME:  MachineOwner
  83.  
  84. MODULE_NAME: win32k
  85.  
  86. IMAGE_NAME:  win32k.sys
  87.  
  88. DEBUG_FLR_IMAGE_TIMESTAMP:  4e83edf6
  89.  
  90. FAILURE_BUCKET_ID:  X64_0x50_win32k!memmove+25e
  91.  
  92. BUCKET_ID:  X64_0x50_win32k!memmove+25e
  93.  
  94. Followup: MachineOwner
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top