Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [E:\HELP\TFGluigi\062617-11263-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Symbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.23807.amd64fre.win7sp1_ldr.170512-0600
Machine Name:
Kernel base = 0xfffff800`02e1e000 PsLoadedModuleList = 0xfffff800`03060750
Debug session time: Mon Jun 26 22:46:10.579 2017 (UTC + 2:00)
System Uptime: 0 days 3:09:48.796
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
..............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {1000000038, 2, 0, fffff80002e7815c}
Probably caused by : memory_corruption ( nt!MiDereferenceControlAreaPfn+1c )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000001000000038, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002e7815c, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030ca100
0000001000000038
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiDereferenceControlAreaPfn+1c
fffff800`02e7815c f6433820 test byte ptr [rbx+38h],20h
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: bf1.exe
TRAP_FRAME: fffff88009c125b0 -- (.trap 0xfffff88009c125b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8000300ce80 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa8011e09530 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002e7815c rsp=fffff88009c12740 rbp=0000000000000001
r8=0000000000000001 r9=0000000000000001 r10=0000000000000002
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiDereferenceControlAreaPfn+0x1c:
fffff800`02e7815c f6433820 test byte ptr [rbx+38h],20h ds:0020:00000000`00000038=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e8e3e9 to fffff80002e8ee40
STACK_TEXT:
fffff880`09c12468 fffff800`02e8e3e9 : 00000000`0000000a 00000010`00000038 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`09c12470 fffff800`02e8d060 : 00000000`00000000 fffff880`0f1e08fb fffffa80`0c752000 00000010`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`09c125b0 fffff800`02e7815c : fffff800`03434460 fffff880`09c127f0 fffff800`03434460 fffffa80`00000000 : nt!KiPageFault+0x260
fffff880`09c12740 fffff800`02e7800f : fffffa80`08fca5d0 00000000`00000002 fffff680`00000000 fffffa80`08fca5d0 : nt!MiDereferenceControlAreaPfn+0x1c
fffff880`09c127b0 fffff800`02f511fe : fffffa80`08fca5d0 fffff880`09c12900 00000000`00000080 00000000`00250b39 : nt!MiRestoreTransitionPte+0xcf
fffff880`09c12810 fffff800`02e9fc53 : 00000000`00000002 fffff880`09c12900 fffffa80`114b1ea8 00000000`00000002 : nt!MiRemoveLowestPriorityStandbyPage+0x21e
fffff880`09c12890 fffff800`02e9c3ae : 00000000`00000001 00000002`96d7c000 fffff880`09c12ae0 fffff680`014b6be0 : nt!MiResolveDemandZeroFault+0x6f3
fffff880`09c12980 fffff800`02e8cf6e : 00000000`00000001 00000002`96d7c000 00000000`00000001 00000000`00010000 : nt!MmAccessFault+0x5de
fffff880`09c12ae0 000007fe`f36cc3f9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`29c2fba8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`f36cc3f9
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiDereferenceControlAreaPfn+1c
fffff800`02e7815c f6433820 test byte ptr [rbx+38h],20h
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiDereferenceControlAreaPfn+1c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5915f59a
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiDereferenceControlAreaPfn+1c
BUCKET_ID: X64_0xA_nt!MiDereferenceControlAreaPfn+1c
Followup: MachineOwner
---------