*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: daa3b000, memory referenced.
Arg2: 00000001, value 0 = read operation, 1 = write operation.
Arg3: 83653b70, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 8377d718
Unable to read MiSystemVaType memory at 8375d160
daa3b000
FAULTING_IP:
nt!memmove+90
83653b70 f3a5 rep movs dword ptr es:[edi],dword ptr [esi]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: b43abbb4 -- (.trap 0xffffffffb43abbb4)
ErrCode = 00000002
eax=00000000 ebx=daa3aff9 ecx=00000028 edx=00000001 esi=c9c4f041 edi=daa3b000
eip=83653b70 esp=b43abc28 ebp=b43abc30 iopl=0 nv up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
nt!memmove+0x90:
83653b70 f3a5 rep movs dword ptr es:[edi],dword ptr [esi]
Resetting default scope
LAST_CONTROL_TRANSFER: from 8365b5f8 to 8369a8e3
STACK_TEXT:
b43abb9c 8365b5f8 00000001 daa3b000 00000000 nt!MmAccessFault+0x106
b43abb9c 83653b70 00000001 daa3b000 00000000 nt!KiTrap0E+0xdc
b43abc30 b5833047 daa3aff9 c9c4f03a 000000a8 nt!memmove+0x90
b43abc5c b58333cc daa3aff0 c9c4f035 8b0de380 srv!SrvOs2FeaToNt+0x53
b43abc7c b584c4be daa3aff0 b43abcbc b43abca8 srv!SrvOs2FeaListToNt+0x9e
b43abcb4 b5853fed daa2a008 83653ae0 c9c3f008 srv!SrvSmbOpen2+0x93
b43abcc8 b585505c b58226ec 8b0de380 b5824000 srv!ExecuteTransaction+0x101
b43abd00 b581e2cc 8b0de380 8b0b44d8 8b0b44a0 srv!SrvSmbTransactionSecondary+0x2c5
b43abd28 b582dc84 00000000 8b0bb698 00000000 srv!SrvProcessSmb+0x187
b43abd50 8382366d 000b44a0 9c2bd66a 00000000 srv!WorkerThread+0x15c
b43abd90 836d50d9 b582db28 8b0b44a0 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
FOLLOWUP_IP:
srv!SrvOs2FeaToNt+53
b5833047 0fb74606 movzx eax,word ptr [esi+6]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: srv!SrvOs2FeaToNt+53
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: srv
IMAGE_NAME: srv.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bbffe
FAILURE_BUCKET_ID: 0x50_srv!SrvOs2FeaToNt+53
BUCKET_ID: 0x50_srv!SrvOs2FeaToNt+53
Followup: MachineOwner
---------
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: daa3b000, memory referenced.
Arg2: 00000001, value 0 = read operation, 1 = write operation.
Arg3: 83653b70, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 8377d718
Unable to read MiSystemVaType memory at 8375d160
daa3b000
FAULTING_IP:
nt!memmove+90
83653b70 f3a5 rep movs dword ptr es:[edi],dword ptr [esi]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: b43abbb4 -- (.trap 0xffffffffb43abbb4)
ErrCode = 00000002
eax=00000000 ebx=daa3aff9 ecx=00000028 edx=00000001 esi=c9c4f041 edi=daa3b000
eip=83653b70 esp=b43abc28 ebp=b43abc30 iopl=0 nv up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
nt!memmove+0x90:
83653b70 f3a5 rep movs dword ptr es:[edi],dword ptr [esi]
Resetting default scope
LAST_CONTROL_TRANSFER: from 8365b5f8 to 8369a8e3
STACK_TEXT:
b43abb9c 8365b5f8 00000001 daa3b000 00000000 nt!MmAccessFault+0x106
b43abb9c 83653b70 00000001 daa3b000 00000000 nt!KiTrap0E+0xdc
b43abc30 b5833047 daa3aff9 c9c4f03a 000000a8 nt!memmove+0x90
b43abc5c b58333cc daa3aff0 c9c4f035 8b0de380 srv!SrvOs2FeaToNt+0x53
b43abc7c b584c4be daa3aff0 b43abcbc b43abca8 srv!SrvOs2FeaListToNt+0x9e
b43abcb4 b5853fed daa2a008 83653ae0 c9c3f008 srv!SrvSmbOpen2+0x93
b43abcc8 b585505c b58226ec 8b0de380 b5824000 srv!ExecuteTransaction+0x101
b43abd00 b581e2cc 8b0de380 8b0b44d8 8b0b44a0 srv!SrvSmbTransactionSecondary+0x2c5
b43abd28 b582dc84 00000000 8b0bb698 00000000 srv!SrvProcessSmb+0x187
b43abd50 8382366d 000b44a0 9c2bd66a 00000000 srv!WorkerThread+0x15c
b43abd90 836d50d9 b582db28 8b0b44a0 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
FOLLOWUP_IP:
srv!SrvOs2FeaToNt+53
b5833047 0fb74606 movzx eax,word ptr [esi+6]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: srv!SrvOs2FeaToNt+53
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: srv
IMAGE_NAME: srv.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bbffe
FAILURE_BUCKET_ID: 0x50_srv!SrvOs2FeaToNt+53
BUCKET_ID: 0x50_srv!SrvOs2FeaToNt+53
Followup: MachineOwner
---------