Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Jonathan\AppData\Local\Temp\Temp1_Mini062610-01.zip\Mini062610-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6002.18209.amd64fre.vistasp2_gdr.100218-0019
Machine Name:
Kernel base = 0xfffff800`0265f000 PsLoadedModuleList = 0xfffff800`02823dd0
Debug session time: Sat Jun 26 20:01:38.901 2010 (UTC - 4:00)
System Uptime: 0 days 4:58:06.303
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff8000276eda5, fffffa6001d396e8, fffffa6001d390c0}
Probably caused by : memory_corruption ( nt!MiLogPageAccess+255 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8000276eda5, The address that the exception occurred at
Arg3: fffffa6001d396e8, Exception Record Address
Arg4: fffffa6001d390c0, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiLogPageAccess+255
fffff800`0276eda5 488901 mov qword ptr [rcx],rax
EXCEPTION_RECORD: fffffa6001d396e8 -- (.exr 0xfffffa6001d396e8)
ExceptionAddress: fffff8000276eda5 (nt!MiLogPageAccess+0x0000000000000255)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffffa6001d390c0 -- (.cxr 0xfffffa6001d390c0)
rax=f680000015f00000 rbx=fffb4000000af800 rcx=bfdffdbfdffdbfdf
rdx=fffff680000015f0 rsi=fffff800027ceb90 rdi=fffffa8006d49000
rip=fffff8000276eda5 rsp=fffffa6001d39920 rbp=0000000000000008
r8=fffffa800950ff00 r9=0000000000000003 r10=0000000000000005
r11=0000000000000569 r12=0000000000000430 r13=0000000000000430
r14=0000000000000000 r15=fffff680000015f0
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010287
nt!MiLogPageAccess+0x255:
fffff800`0276eda5 488901 mov qword ptr [rcx],rax ds:002b:bfdffdbf`dffdbfdf=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: lsm.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002886080
ffffffffffffffff
FOLLOWUP_IP:
nt!MiLogPageAccess+255
fffff800`0276eda5 488901 mov qword ptr [rcx],rax
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff80002756e33 to fffff8000276eda5
STACK_TEXT:
fffffa60`01d39920 fffff800`02756e33 : fffff700`01080498 c3000000`82623867 00000003`00000000 fffff800`73576d4d : nt!MiLogPageAccess+0x255
fffffa60`01d39980 fffff800`0277ab41 : fffffa80`0950ff00 00000000`00000001 fffffa60`01d39bb0 fffffa60`01d39be0 : nt!MiAgeWorkingSet+0x2d3
fffffa60`01d39b40 fffff800`026622e0 : fffffa80`00000368 00000000`00000002 fffff800`0280f3a8 00000000`00000000 : nt!MiProcessWorkingSets+0x231
fffffa60`01d39bb0 fffff800`026cd0d0 : fffffa80`03cc8b00 00000000`00000001 00000000`00000006 00000000`00000008 : nt! ?? ::FNODOBFM::`string'+0x34af0
fffffa60`01d39c10 fffff800`028c3f87 : fffffa80`03cc8b30 00000000`00000080 00000000`00000000 ffd3fbff`f7beff01 : nt!KeBalanceSetManager+0x120
fffffa60`01d39d50 fffff800`026f6656 : fffff800`027d2680 fffffa80`03cc8b30 fffff800`027d7b80 00000000`00000000 : nt!PspSystemThreadStartup+0x57
fffffa60`01d39d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiLogPageAccess+255
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4b7d238f
STACK_COMMAND: .cxr 0xfffffa6001d390c0 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x7E_nt!MiLogPageAccess+255
BUCKET_ID: X64_0x7E_nt!MiLogPageAccess+255
Followup: MachineOwner
---------
0: kd> lmsmn
start end module name
fffffa60`03759000 fffffa60`03768f00 1394BUS 1394BUS.SYS
fffffa60`00b70000 fffffa60`00bc6000 acpi acpi.sys
fffffa60`17791000 fffffa60`1779c000 AegisP AegisP.sys
fffffa60`037f1000 fffffa60`037fa000 Afc Afc.sys
fffffa60`06645000 fffffa60`066b0000 afd afd.sys
fffffa60`02560000 fffffa60`025a4000 aq2dqx27 aq2dqx27.SYS
fffffa60`00d0b000 fffffa60`00d13000 atapi atapi.sys
fffffa60`00d13000 fffffa60`00d37000 ataport ataport.SYS
fffff960`00840000 fffff960`008a1000 ATMFD ATMFD.DLL
fffffa60`00902000 fffffa60`0090e000 BATTC BATTC.SYS
fffffa60`17ad7000 fffffa60`17af5000 bowser bowser.sys
fffff960`006c0000 fffff960`006d1000 cdd cdd.dll
fffffa60`17d90000 fffffa60`17dac000 cdfs cdfs.sys
fffffa60`02fe2000 fffffa60`02ffe000 cdrom cdrom.sys
fffffa60`006c0000 fffffa60`00772000 CI CI.dll
fffffa60`014e6000 fffffa60`01512000 CLASSPNP CLASSPNP.SYS
fffffa60`00663000 fffffa60`006c0000 CLFS CLFS.SYS
fffffa60`0253d000 fffffa60`02541580 CmBatt CmBatt.sys
fffffa60`00a00000 fffffa60`00a03400 compbatt compbatt.sys
fffffa60`067bf000 fffffa60`067cd000 crashdmp crashdmp.sys
fffffa60`01512000 fffffa60`0151c000 crcdisk crcdisk.sys
fffffa60`06751000 fffffa60`0676e000 dfsc dfsc.sys
fffffa60`014d2000 fffffa60`014e6000 disk disk.sys
fffffa60`038fd000 fffffa60`03920000 drmk drmk.sys
fffffa60`02400000 fffffa60`02504000 dump_iaStor dump_iaStor.sys
fffffa60`067cd000 fffffa60`067d9000 Dxapi Dxapi.sys
fffffa60`02cb8000 fffffa60`02d9b000 dxgkrnl dxgkrnl.sys
fffffa60`17625000 fffffa60`176f7000 eamon eamon.sys
fffffa60`014a6000 fffffa60`014d2000 ecache ecache.sys
fffffa60`03933000 fffffa60`03956000 ehdrv ehdrv.sys
fffffa60`17c9f000 fffffa60`17cbf000 epfwwfpr epfwwfpr.sys
fffffa60`00d88000 fffffa60`00d9c000 fileinfo fileinfo.sys
fffffa60`00d41000 fffffa60`00d88000 fltmgr fltmgr.sys
fffffa60`03920000 fffffa60`0392a000 Fs_Rec Fs_Rec.SYS
fffffa60`02522000 fffffa60`0252a000 FwLnk FwLnk.sys
fffffa60`00fd0000 fffffa60`00ffc000 fwpkclnt fwpkclnt.sys
fffffa60`02553000 fffffa60`02560000 GEARAspiWDM GEARAspiWDM.sys
fffff800`02619000 fffff800`0265f000 hal hal.dll
fffffa60`02e07000 fffffa60`02ef4000 HDAudBus HDAudBus.sys
fffffa60`03879000 fffffa60`038c2000 HdAudio HdAudio.sys
fffffa60`17dc7000 fffffa60`17dceb80 HIDPARSE HIDPARSE.SYS
fffffa60`17a0b000 fffffa60`17aae000 HTTP HTTP.sys
fffffa60`037b5000 fffffa60`037cb000 i8042prt i8042prt.sys
fffffa60`00c07000 fffffa60`00d0b000 iaStor iaStor.sys
fffffa60`02600000 fffffa60`02cb7120 igdkmd64 igdkmd64.sys
fffffa60`00988000 fffffa60`00990000 intelide intelide.sys
fffffa60`0252a000 fffffa60`0253d000 intelppm intelppm.sys
fffffa60`037cb000 fffffa60`037d9000 kbdclass kbdclass.sys
fffffa60`0060a000 fffffa60`00614000 kdcom kdcom.dll
fffffa60`01598000 fffffa60`015cc000 ks ks.sys
fffffa60`00772000 fffffa60`007f9000 ksecdd ksecdd.sys
fffffa60`037fa000 fffffa60`037ff180 ksthunk ksthunk.sys
fffffa60`1779c000 fffffa60`177b0000 lltdio lltdio.sys
fffffa60`17603000 fffffa60`17625000 luafv luafv.sys
fffffa60`03200000 fffffa60`03206a00 ManyCam_x64 ManyCam_x64.sys
fffffa60`00614000 fffffa60`0064f000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll
fffffa60`067d9000 fffffa60`067ec000 monitor monitor.sys
fffffa60`037db000 fffffa60`037e7000 mouclass mouclass.sys
fffffa60`009a0000 fffffa60`009b3000 mountmgr mountmgr.sys
fffffa60`17af5000 fffffa60`17b0f000 mpsdrv mpsdrv.sys
fffffa60`17b0f000 fffffa60`17b36000 mrxdav mrxdav.sys
fffffa60`17b36000 fffffa60`17b5f000 mrxsmb mrxsmb.sys
fffffa60`17b5f000 fffffa60`17ba8000 mrxsmb10 mrxsmb10.sys
fffffa60`17ba8000 fffffa60`17bc7000 mrxsmb20 mrxsmb20.sys
fffffa60`00d37000 fffffa60`00d41000 msahci msahci.sys
fffffa60`0399b000 fffffa60`039a6000 Msfs Msfs.SYS
fffffa60`00bc6000 fffffa60`00bd0000 msisadrv msisadrv.sys
fffffa60`025b7000 fffffa60`025f0000 msiscsi msiscsi.sys
fffffa60`17ddc000 fffffa60`17dddb80 MSPCLOCK MSPCLOCK.sys
fffffa60`17dda000 fffffa60`17ddba00 MSPQM MSPQM.sys
fffffa60`00d9c000 fffffa60`00dec000 msrpc msrpc.sys
fffffa60`00e00000 fffffa60`00e0b000 mssmbios mssmbios.sys
fffffa60`01494000 fffffa60`014a6000 mup mup.sys
fffffa60`00e0d000 fffffa60`00fd0000 ndis ndis.sys
fffffa60`015ef000 fffffa60`015fb000 ndistapi ndistapi.sys
fffffa60`177e4000 fffffa60`177ef000 ndisuio ndisuio.sys
fffffa60`013cf000 fffffa60`01400000 ndiswan ndiswan.sys
fffffa60`03865000 fffffa60`03879000 NDProxy NDProxy.SYS
fffffa60`066ce000 fffffa60`066dd000 netbios netbios.sys
fffffa60`06601000 fffffa60`06645000 netbt netbt.sys
fffffa60`01007000 fffffa60`01060000 NETIO NETIO.SYS
fffffa60`03209000 fffffa60`03747000 NETw5v64 NETw5v64.sys
fffffa60`039a6000 fffffa60`039b7000 Npfs Npfs.SYS
fffffa60`06745000 fffffa60`06751000 nsiproxy nsiproxy.sys
fffff800`0265f000 fffff800`02b76000 nt ntkrnlmp.exe
fffffa60`01206000 fffffa60`01386000 Ntfs Ntfs.sys
fffffa60`0392a000 fffffa60`03933000 Null Null.SYS
fffffa60`177b0000 fffffa60`177e4000 nwifi nwifi.sys
fffffa60`03747000 fffffa60`03758b00 ohci1394 ohci1394.sys
fffffa60`066b0000 fffffa60`066ce000 pacer pacer.sys
fffffa60`008ed000 fffffa60`00902000 partmgr partmgr.sys
fffffa60`00bd0000 fffffa60`00c00000 pci pci.sys
fffffa60`00990000 fffffa60`009a0000 PCIIDEX PCIIDEX.SYS
fffffa60`17cbf000 fffffa60`17d75000 peauth peauth.sys
fffffa60`038c2000 fffffa60`038fd000 portcls portcls.sys
fffffa60`0064f000 fffffa60`00663000 PSHED PSHED.dll
fffffa60`039b7000 fffffa60`039c0000 rasacd rasacd.sys
fffffa60`015cc000 fffffa60`015ef000 rasl2tp rasl2tp.sys
fffffa60`011d6000 fffffa60`011e6000 raspppoe raspppoe.sys
fffffa60`009b3000 fffffa60`009d1000 raspptp raspptp.sys
fffffa60`011e6000 fffffa60`011fe000 rassstp rassstp.sys
fffffa60`066f8000 fffffa60`06745000 rdbss rdbss.sys
fffffa60`03989000 fffffa60`03992000 RDPCDD RDPCDD.sys
fffffa60`03992000 fffffa60`0399b000 rdpencdd rdpencdd.sys
fffffa60`03789000 fffffa60`0379e000 rimmpx64 rimmpx64.sys
fffffa60`0379e000 fffffa60`037b5000 rimspx64 rimspx64.sys
fffffa60`02f45000 fffffa60`02f9c000 rixdpx64 rixdpx64.sys
fffffa60`009e1000 fffffa60`009f9000 rspndr rspndr.sys
fffffa60`02ef4000 fffffa60`02f45000 Rtlh64 Rtlh64.sys
fffffa60`00b42000 fffffa60`00b70000 SCSIPORT SCSIPORT.SYS
fffffa60`03769000 fffffa60`03789000 sdbus sdbus.sys
fffffa60`17d75000 fffffa60`17d80000 secdrv secdrv.SYS
fffffa60`039dd000 fffffa60`039f8000 smb smb.sys
fffffa60`0148c000 fffffa60`01494000 spldr spldr.sys
fffffa60`176f7000 fffffa60`17791000 spsys spsys.sys
[COLOR=Red][B]fffffa60`00a05000 fffffa60`00b39000 sptd sptd.sys [/B][/COLOR]
fffffa60`17c0a000 fffffa60`17c9f000 srv srv.sys
fffffa60`17bc7000 fffffa60`17bf9000 srv2 srv2.sys
fffffa60`17aae000 fffffa60`17ad7000 srvnet srvnet.sys
fffffa60`0152a000 fffffa60`01587000 storport storport.sys
fffffa60`01587000 fffffa60`01597a80 STREAM STREAM.SYS
fffffa60`03207000 fffffa60`03208480 swenum swenum.sys
fffffa60`02f9c000 fffffa60`02fe2000 SynTP SynTP.sys
fffffa60`01060000 fffffa60`011d6000 tcpip tcpip.sys
fffffa60`17d80000 fffffa60`17d90000 tcpipreg tcpipreg.sys
fffffa60`037e7000 fffffa60`037f1000 tdcmdpst tdcmdpst.sys
fffffa60`025f0000 fffffa60`025fd000 TDI TDI.SYS
fffffa60`039c0000 fffffa60`039dd000 tdx tdx.sys
fffffa60`00dec000 fffffa60`00dff000 termdd termdd.sys
fffffa60`01405000 fffffa60`0148c000 tos_sps64 tos_sps64.sys
fffffa60`03853000 fffffa60`03865000 tosporte tosporte.sys
fffffa60`025a4000 fffffa60`025b6980 tosrfcom tosrfcom.sys
fffff960`00400000 fffff960`0040a000 TSDDD TSDDD.dll
fffffa60`02519000 fffffa60`02522000 tunmp tunmp.sys
fffffa60`0250c000 fffffa60`02519000 tunnel tunnel.sys
fffffa60`013ca000 fffffa60`013cee80 TVALZ_O TVALZ_O.SYS
fffffa60`009d1000 fffffa60`009e1000 umbus umbus.sys
fffffa60`0676e000 fffffa60`0678a000 usbccgp usbccgp.sys
fffffa60`037d9000 fffffa60`037dae00 USBD USBD.SYS
fffffa60`02542000 fffffa60`02553000 usbehci usbehci.sys
fffffa60`0380b000 fffffa60`03853000 usbhub usbhub.sys
fffffa60`02db7000 fffffa60`02dfd000 USBPORT USBPORT.SYS
fffffa60`02dab000 fffffa60`02db7000 usbuhci usbuhci.sys
fffffa60`06795000 fffffa60`067be300 usbvideo usbvideo.sys
fffffa60`0678a000 fffffa60`06795000 UVCFTR_S UVCFTR_S.SYS
fffffa60`03956000 fffffa60`03964000 vga vga.sys
fffffa60`03964000 fffffa60`03989000 VIDEOPRT VIDEOPRT.SYS
fffffa60`0090e000 fffffa60`00922000 volmgr volmgr.sys
fffffa60`00922000 fffffa60`00988000 volmgrx volmgrx.sys
fffffa60`01386000 fffffa60`013ca000 volsnap volsnap.sys
fffffa60`066dd000 fffffa60`066f8000 wanarp wanarp.sys
fffffa60`02d9b000 fffffa60`02dab000 watchdog watchdog.sys
fffffa60`00805000 fffffa60`008df000 Wdf01000 Wdf01000.sys
fffffa60`008df000 fffffa60`008ed000 WDFLDR WDFLDR.SYS
fffff960`00000000 fffff960`002b4000 win32k win32k.sys
fffffa60`00b39000 fffffa60`00b42000 WMILIB WMILIB.SYS
Unloaded modules:
fffffa60`17db5000 fffffa60`17dc7000 HIDCLASS.SYS
fffffa60`17dac000 fffffa60`17db5000 hidusb.sys
fffffa60`17dcf000 fffffa60`17dda000 mouhid.sys
fffffa60`0151c000 fffffa60`0152a000 crashdmp.sys
fffffa60`02408000 fffffa60`0250c000 dump_iaStor.