Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041911-27081-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e15000 PsLoadedModuleList = 0xfffff800`0305ae90
Debug session time: Tue Apr 19 04:50:17.296 2011 (UTC - 4:00)
System Uptime: 0 days 4:12:37.435
Loading Kernel Symbols
...............................................................
................................................................
................................................................
......
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 34, {50853, fffff8800337e658, fffff8800337deb0, fffff80002ee2dcd}
Probably caused by : memory_corruption ( nt!MiRemoveLowestPriorityStandbyPage+139 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CACHE_MANAGER (34)
See the comment for FAT_FILE_SYSTEM (0x23)
Arguments:
Arg1: 0000000000050853
Arg2: fffff8800337e658
Arg3: fffff8800337deb0
Arg4: fffff80002ee2dcd
Debugging Details:
------------------
EXCEPTION_RECORD: fffff8800337e658 -- (.exr 0xfffff8800337e658)
ExceptionAddress: fffff80002ee2dcd (nt!MiRemoveLowestPriorityStandbyPage+0x0000000000000139)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff8800337deb0 -- (.cxr 0xfffff8800337deb0)
rax=3000000000632d9c rbx=fffffa8001ca0340 rcx=fffffa8000000008
rdx=0000000000000000 rsi=fffff80003019d68 rdi=fffff80003019d48
rip=fffff80002ee2dcd rsp=fffff8800337e890 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=fffffa8006b2db48
r11=fffff8800337e8e0 r12=0000000000098abc r13=0000000000000001
r14=ffffffffffffffff r15=0000000000000002
iopl=0 nv up ei pl nz ac po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010216
nt!MiRemoveLowestPriorityStandbyPage+0x139:
fffff800`02ee2dcd 4c8934c1 mov qword ptr [rcx+rax*8],r14 ds:002b:7ffffa80`03196ce8=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c60e8
ffffffffffffffff
FOLLOWUP_IP:
nt!MiRemoveLowestPriorityStandbyPage+139
fffff800`02ee2dcd 4c8934c1 mov qword ptr [rcx+rax*8],r14
FAULTING_IP:
nt!MiRemoveLowestPriorityStandbyPage+139
fffff800`02ee2dcd 4c8934c1 mov qword ptr [rcx+rax*8],r14
BUGCHECK_STR: 0x34
LAST_CONTROL_TRANSFER: from fffff80002e59b8f to fffff80002ee2dcd
STACK_TEXT:
fffff880`0337e890 fffff800`02e59b8f : fa80103c`4d6004c0 fa80103c`4d6004c0 fffff880`0337e980 00000000`0000017a : nt!MiRemoveLowestPriorityStandbyPage+0x139
fffff880`0337e910 fffff800`031341ca : fffffa80`0ca95010 fffffa80`00000001 fffffa80`0ca95010 00000000`00000005 : nt!MiPfPutPagesInTransition+0x826
fffff880`0337ea80 fffff800`02e415e7 : fffffa80`0ca95010 00000000`00001000 00000000`00001000 fffff800`03032600 : nt!MmPrefetchForCacheManager+0x8e
fffff880`0337ead0 fffff800`02edb3de : fffffa80`10554f20 00000000`00000000 00000000`6b576343 00000000`00000701 : nt!CcPerformReadAhead+0x2f3
fffff880`0337ec00 fffff800`02e9fa21 : fffffa80`06ba1280 fffff800`0318bf01 fffff800`03094190 fffffa80`00000002 : nt!CcWorkerThread+0x21e
fffff880`0337ecb0 fffff800`03132cce : 00000000`00000000 fffffa80`06c9fb60 00000000`00000080 fffffa80`06b2d740 : nt!ExpWorkerThread+0x111
fffff880`0337ed40 fffff800`02e86fe6 : fffff880`03164180 fffffa80`06c9fb60 fffff880`0316efc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`0337ed80 00000000`00000000 : fffff880`0337f000 fffff880`03379000 fffff880`0337e9e0 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiRemoveLowestPriorityStandbyPage+139
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
STACK_COMMAND: .cxr 0xfffff8800337deb0 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x34_nt!MiRemoveLowestPriorityStandbyPage+139
BUCKET_ID: X64_0x34_nt!MiRemoveLowestPriorityStandbyPage+139
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041911-24632-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e53000 PsLoadedModuleList = 0xfffff800`03098e90
Debug session time: Tue Apr 19 21:01:21.792 2011 (UTC - 4:00)
System Uptime: 0 days 5:05:36.322
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.......
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 124, {0, fffffa8008b30028, b60c2000, 135}
Probably caused by : hardware
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
WHEA_UNCORRECTABLE_ERROR (124)
A fatal hardware error has occurred. Parameter 1 identifies the type of error
source that reported the error. Parameter 2 holds the address of the
WHEA_ERROR_RECORD structure that describes the error conditon.
Arguments:
Arg1: 0000000000000000, Machine Check Exception
Arg2: fffffa8008b30028, Address of the WHEA_ERROR_RECORD structure.
Arg3: 00000000b60c2000, High order 32-bits of the MCi_STATUS value.
Arg4: 0000000000000135, Low order 32-bits of the MCi_STATUS value.
Debugging Details:
------------------
BUGCHECK_STR: 0x124_AuthenticAMD
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: RpcSandraSrv.e
CURRENT_IRQL: f
STACK_TEXT:
fffff880`0316ca88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
STACK_COMMAND: kb
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: X64_0x124_AuthenticAMD_PROCESSOR_CACHE
BUCKET_ID: X64_0x124_AuthenticAMD_PROCESSOR_CACHE
Followup: MachineOwner
---------