icrosoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\richc46\AppData\Local\Temp\Temp1_Windows_NT6_BSOD_jcgriff2 (7).zip\Windows_NT6_BSOD_jcgriff2\Mini101611-03.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6001.18427.amd64fre.vistasp1_gdr.100218-0019
Machine Name:
Kernel base = 0xfffff800`01c10000 PsLoadedModuleList = 0xfffff800`01dd5db0
Debug session time: Sun Oct 16 21:24:46.729 2011 (GMT-4)
System Uptime: 0 days 2:57:28.921
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffffa400bde3d60, 0, fffff80001c6413b, 5}
Could not read faulting driver name
Probably caused by : [B]ntkrnlmp.exe[/B] ( nt!KiSystemServiceExit+0 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa400bde3d60, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80001c6413b, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001e39080
fffffa400bde3d60
FAULTING_IP:
nt!KiSystemServiceExit+0
fffff800`01c6413b 488b9dc0000000 mov rbx,qword ptr [rbp+0C0h]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 3
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffffa600bde3a20 -- (.trap 0xfffffa600bde3a20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000103 rbx=0000000000000000 rcx=fffffa8004959050
rdx=0000000000006c00 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80001c6413b rsp=fffffa600bde3bb0 rbp=fffffa400bde3ca0
r8=0000000000000000 r9=0000000000000040 r10=0000000000000001
r11=fffffa600bde39f0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiSystemServiceExit:
fffff800`01c6413b 488b9dc0000000 mov rbx,qword ptr [rbp+0C0h] ss:0018:fffffa40`0bde3d60=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80001c727e2 to fffff80001c64690
STACK_TEXT:
fffffa60`0bde3928 fffff800`01c727e2 : 00000000`00000050 fffffa40`0bde3d60 00000000`00000000 fffffa60`0bde3a20 : nt!KeBugCheckEx
fffffa60`0bde3930 fffff800`01c63219 : 00000000`00000000 fffffa80`0431d890 fffffa80`0431d800 fffffa80`0752c160 : nt!MmAccessFault+0x4f2
fffffa60`0bde3a20 fffff800`01c6413b : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00d48004 : nt!KiPageFault+0x119
fffffa60`0bde3bb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiSystemServiceExit+0
fffff800`01c6413b 488b9dc0000000 mov rbx,qword ptr [rbp+0C0h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiSystemServiceExit+0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4b7d26b9
FAILURE_BUCKET_ID: X64_0x50_nt!KiSystemServiceExit+0
BUCKET_ID: X64_0x50_nt!KiSystemServiceExit+0
Followup: MachineOwner
---------