Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\020811-36265-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x8283a000 PsLoadedModuleList = 0x82982810
Debug session time: Tue Feb 8 17:53:14.629 2011 (GMT-5)
System Uptime: 2 days 0:06:07.536
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {837fffe4, 2, 1, 828cdbee}
Probably caused by : memory_corruption ( nt!MiInsertPageInFreeOrZeroedList+238 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 837fffe4, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 828cdbee, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 829a2718
Unable to read MiSystemVaType memory at 82982160
837fffe4
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiInsertPageInFreeOrZeroedList+238
828cdbee 8901 mov dword ptr [ecx],eax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: MsMpEng.exe
TRAP_FRAME: 8e09b6f4 -- (.trap 0xffffffff8e09b6f4)
ErrCode = 00000002
eax=0000056c ebx=0000001c ecx=837fffe4 edx=00000000 esi=838097d0 edi=8451ec70
eip=828cdbee esp=8e09b768 ebp=8e09b790 iopl=0 nv up ei ng nz na pe cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010287
nt!MiInsertPageInFreeOrZeroedList+0x238:
828cdbee 8901 mov dword ptr [ecx],eax ds:0023:837fffe4=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 828cdbee to 8288082b
STACK_TEXT:
8e09b6f4 828cdbee badb0d00 00000000 00000000 nt!KiTrap0E+0x2cf
8e09b790 828ca30e 00061031 838097d0 c0044ee0 nt!MiInsertPageInFreeOrZeroedList+0x238
8e09b7d0 82866a6d c0600228 c0045000 863a2730 nt!MiPfnShareCountIsZero+0x18c
8e09b81c 8286646e 85ecc2a8 00000200 00000000 nt!MiDeletePteList+0x23c
8e09bc84 828ee0ba c0045140 85ecc2a8 b6f3e220 nt!MiDecommitPages+0xef
8e09bd1c 8287d44a ffffffff 0166f09c 0166f0b0 nt!NtFreeVirtualMemory+0x882
8e09bd1c 777964f4 ffffffff 0166f09c 0166f0b0 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0166f070 00000000 00000000 00000000 00000000 0x777964f4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiInsertPageInFreeOrZeroedList+238
828cdbee 8901 mov dword ptr [ecx],eax
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiInsertPageInFreeOrZeroedList+238
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c3fac
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0xA_nt!MiInsertPageInFreeOrZeroedList+238
BUCKET_ID: 0xA_nt!MiInsertPageInFreeOrZeroedList+238
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 837fffe4, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 828cdbee, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 829a2718
Unable to read MiSystemVaType memory at 82982160
837fffe4
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiInsertPageInFreeOrZeroedList+238
828cdbee 8901 mov dword ptr [ecx],eax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: MsMpEng.exe
TRAP_FRAME: 8e09b6f4 -- (.trap 0xffffffff8e09b6f4)
ErrCode = 00000002
eax=0000056c ebx=0000001c ecx=837fffe4 edx=00000000 esi=838097d0 edi=8451ec70
eip=828cdbee esp=8e09b768 ebp=8e09b790 iopl=0 nv up ei ng nz na pe cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010287
nt!MiInsertPageInFreeOrZeroedList+0x238:
828cdbee 8901 mov dword ptr [ecx],eax ds:0023:837fffe4=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 828cdbee to 8288082b
STACK_TEXT:
8e09b6f4 828cdbee badb0d00 00000000 00000000 nt!KiTrap0E+0x2cf
8e09b790 828ca30e 00061031 838097d0 c0044ee0 nt!MiInsertPageInFreeOrZeroedList+0x238
8e09b7d0 82866a6d c0600228 c0045000 863a2730 nt!MiPfnShareCountIsZero+0x18c
8e09b81c 8286646e 85ecc2a8 00000200 00000000 nt!MiDeletePteList+0x23c
8e09bc84 828ee0ba c0045140 85ecc2a8 b6f3e220 nt!MiDecommitPages+0xef
8e09bd1c 8287d44a ffffffff 0166f09c 0166f0b0 nt!NtFreeVirtualMemory+0x882
8e09bd1c 777964f4 ffffffff 0166f09c 0166f0b0 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0166f070 00000000 00000000 00000000 00000000 0x777964f4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiInsertPageInFreeOrZeroedList+238
828cdbee 8901 mov dword ptr [ecx],eax
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiInsertPageInFreeOrZeroedList+238
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c3fac
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0xA_nt!MiInsertPageInFreeOrZeroedList+238
BUCKET_ID: 0xA_nt!MiInsertPageInFreeOrZeroedList+238
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 837fffe4, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 828cdbee, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 829a2718
Unable to read MiSystemVaType memory at 82982160
837fffe4
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiInsertPageInFreeOrZeroedList+238
828cdbee 8901 mov dword ptr [ecx],eax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: MsMpEng.exe
TRAP_FRAME: 8e09b6f4 -- (.trap 0xffffffff8e09b6f4)
ErrCode = 00000002
eax=0000056c ebx=0000001c ecx=837fffe4 edx=00000000 esi=838097d0 edi=8451ec70
eip=828cdbee esp=8e09b768 ebp=8e09b790 iopl=0 nv up ei ng nz na pe cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010287
nt!MiInsertPageInFreeOrZeroedList+0x238:
828cdbee 8901 mov dword ptr [ecx],eax ds:0023:837fffe4=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 828cdbee to 8288082b
STACK_TEXT:
8e09b6f4 828cdbee badb0d00 00000000 00000000 nt!KiTrap0E+0x2cf
8e09b790 828ca30e 00061031 838097d0 c0044ee0 nt!MiInsertPageInFreeOrZeroedList+0x238
8e09b7d0 82866a6d c0600228 c0045000 863a2730 nt!MiPfnShareCountIsZero+0x18c
8e09b81c 8286646e 85ecc2a8 00000200 00000000 nt!MiDeletePteList+0x23c
8e09bc84 828ee0ba c0045140 85ecc2a8 b6f3e220 nt!MiDecommitPages+0xef
8e09bd1c 8287d44a ffffffff 0166f09c 0166f0b0 nt!NtFreeVirtualMemory+0x882
8e09bd1c 777964f4 ffffffff 0166f09c 0166f0b0 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0166f070 00000000 00000000 00000000 00000000 0x777964f4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiInsertPageInFreeOrZeroedList+238
828cdbee 8901 mov dword ptr [ecx],eax
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiInsertPageInFreeOrZeroedList+238
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c3fac
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0xA_nt!MiInsertPageInFreeOrZeroedList+238
BUCKET_ID: 0xA_nt!MiInsertPageInFreeOrZeroedList+238
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 837fffe4, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 828cdbee, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 829a2718
Unable to read MiSystemVaType memory at 82982160
837fffe4
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiInsertPageInFreeOrZeroedList+238
828cdbee 8901 mov dword ptr [ecx],eax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: MsMpEng.exe
TRAP_FRAME: 8e09b6f4 -- (.trap 0xffffffff8e09b6f4)
ErrCode = 00000002
eax=0000056c ebx=0000001c ecx=837fffe4 edx=00000000 esi=838097d0 edi=8451ec70
eip=828cdbee esp=8e09b768 ebp=8e09b790 iopl=0 nv up ei ng nz na pe cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010287
nt!MiInsertPageInFreeOrZeroedList+0x238:
828cdbee 8901 mov dword ptr [ecx],eax ds:0023:837fffe4=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 828cdbee to 8288082b
STACK_TEXT:
8e09b6f4 828cdbee badb0d00 00000000 00000000 nt!KiTrap0E+0x2cf
8e09b790 828ca30e 00061031 838097d0 c0044ee0 nt!MiInsertPageInFreeOrZeroedList+0x238
8e09b7d0 82866a6d c0600228 c0045000 863a2730 nt!MiPfnShareCountIsZero+0x18c
8e09b81c 8286646e 85ecc2a8 00000200 00000000 nt!MiDeletePteList+0x23c
8e09bc84 828ee0ba c0045140 85ecc2a8 b6f3e220 nt!MiDecommitPages+0xef
8e09bd1c 8287d44a ffffffff 0166f09c 0166f0b0 nt!NtFreeVirtualMemory+0x882
8e09bd1c 777964f4 ffffffff 0166f09c 0166f0b0 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0166f070 00000000 00000000 00000000 00000000 0x777964f4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiInsertPageInFreeOrZeroedList+238
828cdbee 8901 mov dword ptr [ecx],eax
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiInsertPageInFreeOrZeroedList+238
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c3fac
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0xA_nt!MiInsertPageInFreeOrZeroedList+238
BUCKET_ID: 0xA_nt!MiInsertPageInFreeOrZeroedList+238
Followup: MachineOwner
---------