Memory_Management 1A,.
We should wait for a reply from Britton30.
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41284, ff6001, 0, fffff70001080000}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4ac3 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041284, A PTE or the working set list is corrupt.
Arg2: 0000000000ff6001
Arg3: 0000000000000000
Arg4: fffff70001080000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41284
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: SystemInfo.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff8000311fa63 to fffff800030c8f00
STACK_TEXT:
fffff880`07aac8e8 fffff800`0311fa63 : 00000000`0000001a 00000000`00041284 00000000`00ff6001 00000000`00000000 : nt!KeBugCheckEx
fffff880`07aac8f0 fffff800`030f9c15 : fffff700`01080000 df100000`322f8867 00000000`20206f49 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x4ac3
fffff880`07aac930 fffff800`0310ac4a : 00000000`00000000 00000000`00ffffff fffffa80`00000000 fffffa80`07dee390 : nt!MiDeleteVirtualAddresses+0x4cc
fffff880`07aacaf0 fffff800`030c8153 : ffffffff`ffffffff 00000000`0015d518 00000000`0015d510 000007ff`00008000 : nt!NtFreeVirtualMemory+0x5ca
fffff880`07aacbe0 00000000`7774009a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0015d3c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7774009a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+4ac3
fffff800`0311fa63 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+4ac3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4ac3
BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4ac3
Followup: MachineOwner
---------