BSOD launching TERA MMO, error 0x00000050


  1. Posts : 2
    Windows 7 home premium 64 bit
       #1

    BSOD launching TERA MMO, error 0x00000050


    Ive already run check disck and two different memtests for four passes and got no errors on either, I blue screen every time I try to launch TERA. I also posted about this on the forums there and someone mentioned that TERA has a memory leak and that will sometimes cause it to use a lot of memory. I have a few different crash logs:


    Code:
    Microsoft (R) Windows Debugger Version 6.3.9600.17029 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Bruce\Documents\crash\052914-87329-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Symbol Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
    Machine Name:
    Kernel base = 0xfffff800`0480d000 PsLoadedModuleList = 0xfffff800`04a51670
    Debug session time: Thu May 29 01:29:00.309 2014 (UTC - 4:00)
    System Uptime: 0 days 1:34:52.166
    Loading Kernel Symbols
    .
    
    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.
    
    ..............................................................
    ................................................................
    .........................................................
    Loading User Symbols
    Loading unloaded module list
    ..................................................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 50, {fffff880afc88cd0, 1, fffffa80095df2e6, 5}
    
    
    Could not read faulting driver name
    Probably caused by : partmgr.sys ( partmgr!PmGlobalDispatch+9f )
    
    Followup: MachineOwner
    ---------
    
    6: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffff880afc88cd0, memory referenced.
    Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
    Arg3: fffffa80095df2e6, If non-zero, the instruction address which referenced the bad memory
    	address.
    Arg4: 0000000000000005, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80004abb100
    GetUlongFromAddress: unable to read from fffff80004abb1c0
     fffff880afc88cd0 Nonpaged pool
    
    FAULTING_IP: 
    +ab3783872089359
    fffffa80`095df2e6 f3aa            rep stos byte ptr [rdi]
    
    MM_INTERNAL_CODE:  5
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  CTAELicensing.
    
    CURRENT_IRQL:  0
    
    ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) x86fre
    
    TRAP_FRAME:  fffff8800c942380 -- (.trap 0xfffff8800c942380)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000057371200
    rdx=0000000000000022 rsi=0000000000000000 rdi=0000000000000000
    rip=fffffa80095df2e6 rsp=fffff8800c942518 rbp=fffffa8006ed04e0
     r8=0000000057371200  r9=0000000000000001 r10=fffff88006ff9cd0
    r11=0000fffffffff000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    fffffa80`095df2e6 f3aa            rep stos byte ptr [rdi]
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80004832f0f to fffff8000488c1c0
    
    STACK_TEXT:  
    fffff880`0c942518 fffffa80`095df7e4 : 00000000`00000022 fffffa80`06ed0380 fffffa80`00000001 fffffa80`06ed04e0 : 0xfffffa80`095df2e6
    fffff880`0c942520 00000000`00000022 : fffffa80`06ed0380 fffffa80`00000001 fffffa80`06ed04e0 fffffa80`00000001 : 0xfffffa80`095df7e4
    fffff880`0c942528 fffffa80`06ed0380 : fffffa80`00000001 fffffa80`06ed04e0 fffffa80`00000001 fffffa80`00000000 : 0x22
    fffff880`0c942530 fffffa80`00000001 : fffffa80`06ed04e0 fffffa80`00000001 fffffa80`00000000 00000000`00000200 : 0xfffffa80`06ed0380
    fffff880`0c942538 fffffa80`06ed04e0 : fffffa80`00000001 fffffa80`00000000 00000000`00000200 00000000`00000200 : 0xfffffa80`00000001
    fffff880`0c942540 fffffa80`00000001 : fffffa80`00000000 00000000`00000200 00000000`00000200 fffffa80`06ed04e0 : 0xfffffa80`06ed04e0
    fffff880`0c942548 fffffa80`00000000 : 00000000`00000200 00000000`00000200 fffffa80`06ed04e0 fffffa80`06ed0380 : 0xfffffa80`00000001
    fffff880`0c942550 00000000`00000200 : 00000000`00000200 fffffa80`06ed04e0 fffffa80`06ed0380 fffffa80`06ed0380 : 0xfffffa80`00000000
    fffff880`0c942558 00000000`00000200 : fffffa80`06ed04e0 fffffa80`06ed0380 fffffa80`06ed0380 fffff880`0100b7a7 : 0x200
    fffff880`0c942560 fffffa80`06ed04e0 : fffffa80`06ed0380 fffffa80`06ed0380 fffff880`0100b7a7 fffffa80`06ed0380 : 0x200
    fffff880`0c942568 fffffa80`06ed0380 : fffffa80`06ed0380 fffff880`0100b7a7 fffffa80`06ed0380 fffffa80`06ed0380 : 0xfffffa80`06ed04e0
    fffff880`0c942570 fffffa80`06ed0380 : fffff880`0100b7a7 fffffa80`06ed0380 fffffa80`06ed0380 fffffa80`07598550 : 0xfffffa80`06ed0380
    fffff880`0c942578 fffff880`0100b7a7 : fffffa80`06ed0380 fffffa80`06ed0380 fffffa80`07598550 fffff8a0`1d675298 : 0xfffffa80`06ed0380
    fffff880`0c942580 fffff880`01013789 : fffff880`01031b50 fffff880`0c942738 00000000`00000200 fffffa80`06ed04e0 : ACPI!ACPIDispatchForwardIrp+0x37
    fffff880`0c9425b0 fffff880`0100ba3f : fffff880`01031b50 fffffa80`074bda90 fffffa80`06ed0380 00000000`00000000 : ACPI!ACPIIrpDispatchDeviceControl+0x75
    fffff880`0c9425e0 fffff880`00dcb445 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000001 : ACPI!ACPIDispatchIrp+0x12b
    fffff880`0c942660 fffff880`00dcb975 : fffffa80`078bd010 fffffa80`07598550 00000000`00020000 fffff880`00000000 : CLASSPNP!ServiceTransferRequest+0x355
    fffff880`0c942700 fffff880`012340af : fffffa80`111d9c10 fffffa80`111d9c10 fffffa80`111d9e00 fffffa80`11aba320 : CLASSPNP!ClassReadWrite+0xd5
    fffff880`0c942750 fffff800`04af31b0 : fffffa80`111d9e48 fffffa80`06e04c40 fffffa80`11670f20 00000000`00000000 : partmgr!PmGlobalDispatch+0x9f
    fffff880`0c942780 fffff800`04af2e4d : 00000000`00000000 fffff880`0c942860 fffffa80`111d9c10 fffff800`04881ddd : nt!RawReadWriteDeviceControl+0xa8
    fffff880`0c9427c0 fffff880`00f4cbcf : fffffa80`111d9e48 fffffa80`11485690 00000000`00000000 fffffa80`111d9c10 : nt!RawDispatch+0x7d
    fffff880`0c942820 fffff880`00f4b6df : fffffa80`09430bd0 00000000`00000001 fffffa80`09430b00 fffffa80`111d9c10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
    fffff880`0c9428b0 fffff800`04b8feab : 00000000`00000000 fffffa80`11670f20 00000000`00000001 fffffa80`111d9c10 : fltmgr!FltpDispatch+0xcf
    fffff880`0c942910 fffff800`04b71753 : fffffa80`11670f20 fffffa80`111d9c01 fffffa80`11670f20 00000000`00000002 : nt!IopSynchronousServiceTail+0xfb
    fffff880`0c942980 fffff800`0488b453 : 00000000`000000ec 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x631
    fffff880`0c942a70 00000000`750a2e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0049f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x750a2e09
    
    
    STACK_COMMAND:  .trap 0xfffff8800c942380 ; kb
    
    FOLLOWUP_IP: 
    partmgr!PmGlobalDispatch+9f
    fffff880`012340af 8bf0            mov     esi,eax
    
    SYMBOL_STACK_INDEX:  12
    
    SYMBOL_NAME:  partmgr!PmGlobalDispatch+9f
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: partmgr
    
    IMAGE_NAME:  partmgr.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4f641bc1
    
    IMAGE_VERSION:  6.1.7601.17796
    
    FAILURE_BUCKET_ID:  X64_0x50_partmgr!PmGlobalDispatch+9f
    
    BUCKET_ID:  X64_0x50_partmgr!PmGlobalDispatch+9f
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:x64_0x50_partmgr!pmglobaldispatch+9f
    
    FAILURE_ID_HASH:  {52e5f7db-32c8-b25d-7537-9fbcea4fd678}
    
    Followup: MachineOwner
    ---------
    Code:
    Microsoft (R) Windows Debugger Version 6.3.9600.17029 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Bruce\Documents\crash\052914-65333-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Symbol Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
    Machine Name:
    Kernel base = 0xfffff800`04812000 PsLoadedModuleList = 0xfffff800`04a556d0
    Debug session time: Thu May 29 23:09:14.905 2014 (UTC - 4:00)
    System Uptime: 0 days 0:11:30.873
    Loading Kernel Symbols
    ..
    
    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.
    
    .............................................................
    ................................................................
    .....................................................
    Loading User Symbols
    Loading unloaded module list
    ..................................................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 50, {fffff880b36ba520, 1, fffffa8007a632e6, 5}
    
    
    Could not read faulting driver name
    Probably caused by : partmgr.sys ( partmgr!PmGlobalDispatch+9f )
    
    Followup: MachineOwner
    ---------
    
    4: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffff880b36ba520, memory referenced.
    Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
    Arg3: fffffa8007a632e6, If non-zero, the instruction address which referenced the bad memory
    	address.
    Arg4: 0000000000000005, (reserved)
    Nnn
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    OVERLAPPED_MODULE: Address regions for 'lltdio' and 'RtsUVStor.sy' overlap
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80004abf100
    GetUlongFromAddress: unable to read from fffff80004abf1c0
     fffff880b36ba520 Nonpaged pool
    
    FAULTING_IP: 
    +7b371f073829359
    fffffa80`07a632e6 f3aa            rep stos byte ptr [rdi]
    
    MM_INTERNAL_CODE:  5
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  CTAELicensing.
    
    CURRENT_IRQL:  0
    
    ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) x86fre
    
    TRAP_FRAME:  fffff8800a944380 -- (.trap 0xfffff8800a944380)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000057373a00
    rdx=0000000000000022 rsi=0000000000000000 rdi=0000000000000000
    rip=fffffa8007a632e6 rsp=fffff8800a944518 rbp=fffffa801048c170
     r8=0000000057373a00  r9=0000000000000001 r10=fffff8800aa2dd20
    r11=0000fffffffff000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    fffffa80`07a632e6 f3aa            rep stos byte ptr [rdi]
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800049045b3 to fffff80004887bc0
    
    STACK_TEXT:  
    fffff880`0a944518 fffffa80`07a637e4 : 00000000`00000022 fffffa80`1048c010 fffffa80`00000001 fffffa80`1048c170 : 0xfffffa80`07a632e6
    fffff880`0a944520 00000000`00000022 : fffffa80`1048c010 fffffa80`00000001 fffffa80`1048c170 fffffa80`00000001 : 0xfffffa80`07a637e4
    fffff880`0a944528 fffffa80`1048c010 : fffffa80`00000001 fffffa80`1048c170 fffffa80`00000001 fffffa80`00000000 : 0x22
    fffff880`0a944530 fffffa80`00000001 : fffffa80`1048c170 fffffa80`00000001 fffffa80`00000000 00000000`00000200 : 0xfffffa80`1048c010
    fffff880`0a944538 fffffa80`1048c170 : fffffa80`00000001 fffffa80`00000000 00000000`00000200 00000000`00000200 : 0xfffffa80`00000001
    fffff880`0a944540 fffffa80`00000001 : fffffa80`00000000 00000000`00000200 00000000`00000200 fffffa80`1048c170 : 0xfffffa80`1048c170
    fffff880`0a944548 fffffa80`00000000 : 00000000`00000200 00000000`00000200 fffffa80`1048c170 fffffa80`1048c010 : 0xfffffa80`00000001
    fffff880`0a944550 00000000`00000200 : 00000000`00000200 fffffa80`1048c170 fffffa80`1048c010 fffffa80`1048c010 : 0xfffffa80`00000000
    fffff880`0a944558 00000000`00000200 : fffffa80`1048c170 fffffa80`1048c010 fffffa80`1048c010 fffff880`00f467a7 : 0x200
    fffff880`0a944560 fffffa80`1048c170 : fffffa80`1048c010 fffffa80`1048c010 fffff880`00f467a7 fffffa80`1048c010 : 0x200
    fffff880`0a944568 fffffa80`1048c010 : fffffa80`1048c010 fffff880`00f467a7 fffffa80`1048c010 fffffa80`1048c010 : 0xfffffa80`1048c170
    fffff880`0a944570 fffffa80`1048c010 : fffff880`00f467a7 fffffa80`1048c010 fffffa80`1048c010 fffffa80`075656e0 : 0xfffffa80`1048c010
    fffff880`0a944578 fffff880`00f467a7 : fffffa80`1048c010 fffffa80`1048c010 fffffa80`075656e0 fffff8a0`1f74fa98 : 0xfffffa80`1048c010
    fffff880`0a944580 fffff880`00f4e789 : fffff880`00f6cb50 fffff880`0a944738 00000000`00000200 fffffa80`1048c170 : ACPI!ACPIDispatchForwardIrp+0x37
    fffff880`0a9445b0 fffff880`00f46a3f : fffff880`00f6cb50 fffffa80`074c7010 fffffa80`1048c010 00000000`00000000 : ACPI!ACPIIrpDispatchDeviceControl+0x75
    fffff880`0a9445e0 fffff880`01401445 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000001 : ACPI!ACPIDispatchIrp+0x12b
    fffff880`0a944660 fffff880`01401975 : fffffa80`078c3010 fffffa80`075656e0 00000000`00020000 fffff880`00000000 : CLASSPNP!ServiceTransferRequest+0x355
    fffff880`0a944700 fffff880`010340af : fffffa80`10af98b0 fffffa80`10af98b0 fffffa80`10af9aa0 fffffa80`10b9b800 : CLASSPNP!ClassReadWrite+0xd5
    fffff880`0a944750 fffff800`04af4a28 : fffffa80`10af9ae8 fffffa80`10847e50 fffffa80`10192630 00000000`00000000 : partmgr!PmGlobalDispatch+0x9f
    fffff880`0a944780 fffff800`04af46bd : 00000000`00000000 fffff880`0a944860 fffffa80`10af98b0 fffff800`0487d7fd : nt!RawReadWriteDeviceControl+0xa8
    fffff880`0a9447c0 fffff880`01242bcf : fffffa80`10af9ae8 fffffa80`096a7e30 00000000`00000000 fffffa80`10af98b0 : nt!RawDispatch+0x7d
    fffff880`0a944820 fffff880`012416df : fffffa80`10bc1990 00000000`00000001 fffffa80`10bc1900 fffffa80`10af98b0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
    fffff880`0a9448b0 fffff800`04b9117b : 00000000`00000000 fffffa80`10192630 00000000`00000001 fffffa80`10af98b0 : fltmgr!FltpDispatch+0xcf
    fffff880`0a944910 fffff800`04b70e53 : fffffa80`10192630 fffffa80`10af9801 fffffa80`10192630 00000000`00000002 : nt!IopSynchronousServiceTail+0xfb
    fffff880`0a944980 fffff800`04886e53 : 00000000`000000ec 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x631
    fffff880`0a944a70 00000000`756e2e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`00d6f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x756e2e09
    
    
    STACK_COMMAND:  .trap 0xfffff8800a944380 ; kb
    
    FOLLOWUP_IP: 
    partmgr!PmGlobalDispatch+9f
    fffff880`010340af 8bf0            mov     esi,eax
    
    SYMBOL_STACK_INDEX:  12
    
    SYMBOL_NAME:  partmgr!PmGlobalDispatch+9f
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: partmgr
    
    IMAGE_NAME:  partmgr.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4f641bc1
    
    IMAGE_VERSION:  6.1.7601.17796
    
    FAILURE_BUCKET_ID:  X64_0x50_partmgr!PmGlobalDispatch+9f
    
    BUCKET_ID:  X64_0x50_partmgr!PmGlobalDispatch+9f
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:x64_0x50_partmgr!pmglobaldispatch+9f
    
    FAILURE_ID_HASH:  {52e5f7db-32c8-b25d-7537-9fbcea4fd678}
    
    Followup: MachineOwner
    ---------
      My Computer


  2. Posts : 2
    Windows 7 home premium 64 bit
    Thread Starter
       #2

    Code:
    Microsoft (R) Windows Debugger Version 6.3.9600.17029 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Bruce\Documents\crash\052914-58905-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Symbol Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
    Machine Name:
    Kernel base = 0xfffff800`04812000 PsLoadedModuleList = 0xfffff800`04a556d0
    Debug session time: Thu May 29 22:52:03.695 2014 (UTC - 4:00)
    System Uptime: 0 days 0:00:35.663
    Loading Kernel Symbols
    ..
    
    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.
    
    .............................................................
    ................................................................
    ........................
    Loading User Symbols
    Loading unloaded module list
    ..................................................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 50, {fffff8a002dfc000, 0, fffff800048d636e, 0}
    
    
    Could not read faulting driver name
    Probably caused by : cng.sys ( cng!HashFirstUserModeCallerBlobs+a5 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffff8a002dfc000, memory referenced.
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
    Arg3: fffff800048d636e, If non-zero, the instruction address which referenced the bad memory
    	address.
    Arg4: 0000000000000000, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80004abf100
    GetUlongFromAddress: unable to read from fffff80004abf1c0
     fffff8a002dfc000 Paged pool
    
    FAULTING_IP: 
    nt!wcsstr+56
    fffff800`048d636e 66418b00        mov     ax,word ptr [r8]
    
    MM_INTERNAL_CODE:  0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  csrss.exe
    
    CURRENT_IRQL:  0
    
    ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) x86fre
    
    TRAP_FRAME:  fffff880069f8730 -- (.trap 0xfffff880069f8730)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=000000000000004d rbx=0000000000000000 rcx=0000000000000043
    rdx=fffff80004b8fe40 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff800048d636e rsp=fffff880069f88c8 rbp=0000000000000000
     r8=fffff8a002dfc000  r9=0000009ffe26c1c0 r10=fffff80004b8fe40
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz ac po nc
    nt!wcsstr+0x56:
    fffff800`048d636e 66418b00        mov     ax,word ptr [r8] ds:fffff8a0`02dfc000=????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80004905bf0 to fffff80004887bc0
    
    STACK_TEXT:  
    fffff880`069f85c8 fffff800`04905bf0 : 00000000`00000050 fffff8a0`02dfc000 00000000`00000000 fffff880`069f8730 : nt!KeBugCheckEx
    fffff880`069f85d0 fffff800`04885cee : 00000000`00000000 fffff8a0`02dfc000 fffffa80`07b41200 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4518f
    fffff880`069f8730 fffff800`048d636e : fffff800`04c8f7fe 00000000`0000003a 00000000`00000000 ffffffff`8000036c : nt!KiPageFault+0x16e
    fffff880`069f88c8 fffff800`04c8f7fe : 00000000`0000003a 00000000`00000000 ffffffff`8000036c 00000000`00000000 : nt!wcsstr+0x56
    fffff880`069f88d0 fffff800`04c8f860 : fffff880`0000003a fffff8a0`02dfbfc0 ffffffff`8000032c fffff880`069f8fc0 : nt!SiIsWinPEBoot+0x4e
    fffff880`069f8910 fffff800`04c92952 : ffffffff`8000032c 00000000`00000082 fffff880`069f8a18 fffff800`04883410 : nt!SiCheckForUfdWinpeBoot+0x30
    fffff880`069f89f0 fffff800`04c92a1d : 00000000`00000000 fffff800`04caa440 00000000`0000ffff fffff880`069f9040 : nt!SiCheckForAlternateSystemDisk+0x12
    fffff880`069f8a20 fffff800`04caa467 : fffff880`069f8c10 fafe441d`61b42e84 ffffffff`8000032c ffffe4f2`53175058 : nt!SiGetBiosSystemDisk+0x9d
    fffff880`069f8aa0 fffff800`04c8fb5a : fffff880`069f8b50 fffff800`04af2d55 00000000`4b505953 00000000`0000015a : nt!SiGetSystemDisk+0x27
    fffff880`069f8ad0 fffff800`04c1554d : fffff8a0`00000030 fffff880`069f8c10 fffff880`069f8b90 fffff880`069f8b50 : nt!SiGetSystemDeviceName+0x3a
    fffff880`069f8b30 fffff800`04c95207 : fffff800`04c948e0 fffff8a0`0355b000 00000000`00020000 fffff880`069f8c10 : nt!IopRetrieveSystemDeviceName+0xac
    fffff880`069f8b90 fffff800`04bec715 : 00000000`00000000 fffff880`069f8c10 fffff880`00000000 fffffa80`00000018 : nt!IoQuerySystemDeviceName+0x37
    fffff880`069f8bd0 fffff800`04b933ad : fffff8a0`0355b000 fffffa80`6365734b fffff880`017402a8 fffff8a0`00000001 : nt! ?? ::NNGAKEGL::`string'+0x52a88
    fffff880`069f8f80 fffff800`04886e53 : 00000000`00013268 fffff880`03100000 00000000`4649524d 00000000`00000001 : nt!NtQuerySystemInformation+0x4d
    fffff880`069f8fc0 fffff800`04883410 : fffff880`01735015 00000000`00020000 fffff880`069f9600 fffff8a0`0355b000 : nt!KiSystemServiceCopyEnd+0x13
    fffff880`069f9158 fffff880`01735015 : 00000000`00020000 fffff880`069f9600 fffff8a0`0355b000 00000000`00000001 : nt!KiServiceLinkage
    fffff880`069f9160 fffff880`0173401b : fffff8a0`0353b048 00000000`00000001 fffff880`069f92d0 00000000`00000000 : cng!HashFirstUserModeCallerBlobs+0xa5
    fffff880`069f9220 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : cng!dblint_sqrt+0x1fb
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    cng!HashFirstUserModeCallerBlobs+a5
    fffff880`01735015 85c0            test    eax,eax
    
    SYMBOL_STACK_INDEX:  10
    
    SYMBOL_NAME:  cng!HashFirstUserModeCallerBlobs+a5
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: cng
    
    IMAGE_NAME:  cng.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  50194fb7
    
    IMAGE_VERSION:  6.1.7601.17919
    
    FAILURE_BUCKET_ID:  X64_0x50_cng!HashFirstUserModeCallerBlobs+a5
    
    BUCKET_ID:  X64_0x50_cng!HashFirstUserModeCallerBlobs+a5
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:x64_0x50_cng!hashfirstusermodecallerblobs+a5
    
    FAILURE_ID_HASH:  {8becbeb9-5929-fe3f-d8a0-a3a5715bd4a1}
    
    Followup: MachineOwner
    ---------
    Code:
    Microsoft (R) Windows Debugger Version 6.3.9600.17029 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Bruce\Documents\crash\053014-130089-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Symbol Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
    Machine Name:
    Kernel base = 0xfffff800`04856000 PsLoadedModuleList = 0xfffff800`04a996d0
    Debug session time: Fri May 30 02:00:13.719 2014 (UTC - 4:00)
    System Uptime: 0 days 0:29:17.577
    Loading Kernel Symbols
    ..
    
    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.
    
    .............................................................
    ................................................................
    ..................................................
    Loading User Symbols
    Loading unloaded module list
    ..................................................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 50, {fffff880b302d320, 1, fffffa80079392e6, 5}
    
    
    Could not read faulting driver name
    Probably caused by : partmgr.sys ( partmgr!PmGlobalDispatch+9f )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffff880b302d320, memory referenced.
    Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
    Arg3: fffffa80079392e6, If non-zero, the instruction address which referenced the bad memory
    	address.
    Arg4: 0000000000000005, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80004b03100
    GetUlongFromAddress: unable to read from fffff80004b031c0
     fffff880b302d320 Nonpaged pool
    
    FAULTING_IP: 
    +89b81e071a69359
    fffffa80`079392e6 f3aa            rep stos byte ptr [rdi]
    
    MM_INTERNAL_CODE:  5
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  CTAELicensing.
    
    CURRENT_IRQL:  0
    
    ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) x86fre
    
    TRAP_FRAME:  fffff8800cb74380 -- (.trap 0xfffff8800cb74380)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000057374c00
    rdx=0000000000000022 rsi=0000000000000000 rdi=0000000000000000
    rip=fffffa80079392e6 rsp=fffff8800cb74518 rbp=fffffa80116d1600
     r8=0000000057374c00  r9=0000000000000001 r10=fffff8800a3a1d20
    r11=0000fffffffff000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    fffffa80`079392e6 f3aa            rep stos byte ptr [rdi]
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800049485b3 to fffff800048cbbc0
    
    STACK_TEXT:  
    fffff880`0cb74518 fffffa80`079397e4 : 00000000`00000022 fffffa80`116d14a0 fffffa80`00000001 fffffa80`116d1600 : 0xfffffa80`079392e6
    fffff880`0cb74520 00000000`00000022 : fffffa80`116d14a0 fffffa80`00000001 fffffa80`116d1600 fffffa80`00000001 : 0xfffffa80`079397e4
    fffff880`0cb74528 fffffa80`116d14a0 : fffffa80`00000001 fffffa80`116d1600 fffffa80`00000001 fffffa80`00000000 : 0x22
    fffff880`0cb74530 fffffa80`00000001 : fffffa80`116d1600 fffffa80`00000001 fffffa80`00000000 00000000`00000200 : 0xfffffa80`116d14a0
    fffff880`0cb74538 fffffa80`116d1600 : fffffa80`00000001 fffffa80`00000000 00000000`00000200 00000000`00000200 : 0xfffffa80`00000001
    fffff880`0cb74540 fffffa80`00000001 : fffffa80`00000000 00000000`00000200 00000000`00000200 fffffa80`116d1600 : 0xfffffa80`116d1600
    fffff880`0cb74548 fffffa80`00000000 : 00000000`00000200 00000000`00000200 fffffa80`116d1600 fffffa80`116d14a0 : 0xfffffa80`00000001
    fffff880`0cb74550 00000000`00000200 : 00000000`00000200 fffffa80`116d1600 fffffa80`116d14a0 fffffa80`116d14a0 : 0xfffffa80`00000000
    fffff880`0cb74558 00000000`00000200 : fffffa80`116d1600 fffffa80`116d14a0 fffffa80`116d14a0 fffff880`00f4a7a7 : 0x200
    fffff880`0cb74560 fffffa80`116d1600 : fffffa80`116d14a0 fffffa80`116d14a0 fffff880`00f4a7a7 fffffa80`116d14a0 : 0x200
    fffff880`0cb74568 fffffa80`116d14a0 : fffffa80`116d14a0 fffff880`00f4a7a7 fffffa80`116d14a0 fffffa80`116d14a0 : 0xfffffa80`116d1600
    fffff880`0cb74570 fffffa80`116d14a0 : fffff880`00f4a7a7 fffffa80`116d14a0 fffffa80`116d14a0 fffffa80`075b9b20 : 0xfffffa80`116d14a0
    fffff880`0cb74578 fffff880`00f4a7a7 : fffffa80`116d14a0 fffffa80`116d14a0 fffffa80`075b9b20 fffff8a0`1de8bbf8 : 0xfffffa80`116d14a0
    fffff880`0cb74580 fffff880`00f52789 : fffff880`00f70b50 fffff880`0cb74738 00000000`00000200 fffffa80`116d1600 : ACPI!ACPIDispatchForwardIrp+0x37
    fffff880`0cb745b0 fffff880`00f4aa3f : fffff880`00f70b50 fffffa80`067087d0 fffffa80`116d14a0 00000000`00000000 : ACPI!ACPIIrpDispatchDeviceControl+0x75
    fffff880`0cb745e0 fffff880`017c3445 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000001 : ACPI!ACPIDispatchIrp+0x12b
    fffff880`0cb74660 fffff880`017c3975 : fffffa80`07804530 fffffa80`075b9b20 00000000`00020000 fffff880`00000000 : CLASSPNP!ServiceTransferRequest+0x355
    fffff880`0cb74700 fffff880`010340af : fffffa80`119da400 fffffa80`119da400 fffffa80`119da5f0 fffffa80`11e331a0 : CLASSPNP!ClassReadWrite+0xd5
    fffff880`0cb74750 fffff800`04b38a28 : fffffa80`119da638 fffffa80`116b5640 fffffa80`11ba5320 00000000`00000000 : partmgr!PmGlobalDispatch+0x9f
    fffff880`0cb74780 fffff800`04b386bd : 00000000`00000000 fffff880`0cb74860 fffffa80`119da400 fffff800`048c17fd : nt!RawReadWriteDeviceControl+0xa8
    fffff880`0cb747c0 fffff880`0120dbcf : fffffa80`119da638 fffffa80`11359860 00000000`00000000 fffffa80`119da400 : nt!RawDispatch+0x7d
    fffff880`0cb74820 fffff880`0120c6df : fffffa80`11d312d0 00000000`00000001 fffffa80`11d31200 fffffa80`119da400 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
    fffff880`0cb748b0 fffff800`04bd517b : 00000000`00000000 fffffa80`11ba5320 00000000`00000001 fffffa80`119da400 : fltmgr!FltpDispatch+0xcf
    fffff880`0cb74910 fffff800`04bb4e53 : fffffa80`11ba5320 fffffa80`119da401 fffffa80`11ba5320 00000000`00000002 : nt!IopSynchronousServiceTail+0xfb
    fffff880`0cb74980 fffff800`048cae53 : 00000000`000000ec 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x631
    fffff880`0cb74a70 00000000`74c92e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`00a1f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74c92e09
    
    
    STACK_COMMAND:  .trap 0xfffff8800cb74380 ; kb
    
    FOLLOWUP_IP: 
    partmgr!PmGlobalDispatch+9f
    fffff880`010340af 8bf0            mov     esi,eax
    
    SYMBOL_STACK_INDEX:  12
    
    SYMBOL_NAME:  partmgr!PmGlobalDispatch+9f
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: partmgr
    
    IMAGE_NAME:  partmgr.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4f641bc1
    
    IMAGE_VERSION:  6.1.7601.17796
    
    FAILURE_BUCKET_ID:  X64_0x50_partmgr!PmGlobalDispatch+9f
    
    BUCKET_ID:  X64_0x50_partmgr!PmGlobalDispatch+9f
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:x64_0x50_partmgr!pmglobaldispatch+9f
    
    FAILURE_ID_HASH:  {52e5f7db-32c8-b25d-7537-9fbcea4fd678}
    
    Followup: MachineOwner
    ---------
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 07:30.
Find Us