*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa8016000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8800900361e, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032c2100
GetUlongFromAddress: unable to read from fffff800032c21c0
fffffa8016000000 Nonpaged pool
FAULTING_IP:
ALSysIO64+361e
fffff880`0900361e 4c8b4c0af0 mov r9,qword ptr [rdx+rcx-10h]
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: Core Temp.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800ab9a6c0 -- (.trap 0xfffff8800ab9a6c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000003b rbx=0000000000000000 rcx=fffff8801d973368
rdx=000001fff868cca4 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800900361e rsp=fffff8800ab9a858 rbp=fffff8800ab9ab60
r8=0000000001048128 r9=0000000000000000 r10=0000000000000000
r11=fffff880110001e8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ALSysIO64+0x361e:
fffff880`0900361e 4c8b4c0af0 mov r9,qword ptr [rdx+rcx-10h] ds:fffffa80`15fffffc=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800031075d4 to fffff8000308ac00
STACK_TEXT:
fffff880`0ab9a558 fffff800`031075d4 : 00000000`00000050 fffffa80`16000000 00000000`00000000 fffff880`0ab9a6c0 : nt!KeBugCheckEx
fffff880`0ab9a560 fffff800`03088d2e : 00000000`00000000 fffffa80`16000000 fffffa80`0968ce00 fffff880`110001e8 : nt! ?? ::FNODOBFM::`string'+0x43836
fffff880`0ab9a6c0 fffff880`0900361e : fffff880`09002c77 00000000`e00c31e8 00000000`0d9bb128 fffffa80`0000358d : nt!KiPageFault+0x16e
fffff880`0ab9a858 fffff880`09002c77 : 00000000`e00c31e8 00000000`0d9bb128 fffffa80`0000358d fffff6fc`400f4dd8 : ALSysIO64+0x361e
fffff880`0ab9a860 00000000`e00c31e8 : 00000000`0d9bb128 fffffa80`0000358d fffff6fc`400f4dd8 fffffa80`09c99810 : ALSysIO64+0x2c77
fffff880`0ab9a868 00000000`0d9bb128 : fffffa80`0000358d fffff6fc`400f4dd8 fffffa80`09c99810 fffff880`09001375 : 0xe00c31e8
fffff880`0ab9a870 fffffa80`0000358d : fffff6fc`400f4dd8 fffffa80`09c99810 fffff880`09001375 00000000`e00c31e8 : 0xd9bb128
fffff880`0ab9a878 fffff6fc`400f4dd8 : fffffa80`09c99810 fffff880`09001375 00000000`e00c31e8 00000000`c0000002 : 0xfffffa80`0000358d
fffff880`0ab9a880 fffffa80`09c99810 : fffff880`09001375 00000000`e00c31e8 00000000`c0000002 fffffa80`09c99848 : 0xfffff6fc`400f4dd8
fffff880`0ab9a888 fffff880`09001375 : 00000000`e00c31e8 00000000`c0000002 fffffa80`09c99848 00000000`00000001 : 0xfffffa80`09c99810
fffff880`0ab9a890 00000000`e00c31e8 : 00000000`c0000002 fffffa80`09c99848 00000000`00000001 00000000`00000001 : ALSysIO64+0x1375
fffff880`0ab9a898 00000000`c0000002 : fffffa80`09c99848 00000000`00000001 00000000`00000001 00000000`00000004 : 0xe00c31e8
fffff880`0ab9a8a0 fffffa80`09c99848 : 00000000`00000001 00000000`00000001 00000000`00000004 fffffa80`09c99810 : 0xc0000002
fffff880`0ab9a8a8 00000000`00000001 : 00000000`00000001 00000000`00000004 fffffa80`09c99810 fffff800`033a8f37 : 0xfffffa80`09c99848
fffff880`0ab9a8b0 00000000`00000001 : 00000000`00000004 fffffa80`09c99810 fffff800`033a8f37 fffffa80`072cab50 : 0x1
fffff880`0ab9a8b8 00000000`00000004 : fffffa80`09c99810 fffff800`033a8f37 fffffa80`072cab50 fffff880`0ab9ab60 : 0x1
fffff880`0ab9a8c0 fffffa80`09c99810 : fffff800`033a8f37 fffffa80`072cab50 fffff880`0ab9ab60 fffffa80`072cab50 : 0x4
fffff880`0ab9a8c8 fffff800`033a8f37 : fffffa80`072cab50 fffff880`0ab9ab60 fffffa80`072cab50 fffffa80`09c99810 : 0xfffffa80`09c99810
fffff880`0ab9a8d0 fffff800`033a9796 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x607
fffff880`0ab9aa00 fffff800`03089e93 : fffffa80`09d882c0 00000000`00000001 fffffa80`07889b50 fffff800`03383884 : nt!NtDeviceIoControlFile+0x56
fffff880`0ab9aa70 00000000`73402e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0013e868 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x73402e09
STACK_COMMAND: kb
FOLLOWUP_IP:
ALSysIO64+361e
fffff880`0900361e 4c8b4c0af0 mov r9,qword ptr [rdx+rcx-10h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: ALSysIO64+361e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ALSysIO64
IMAGE_NAME: ALSysIO64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4e18f201
FAILURE_BUCKET_ID: X64_0x50_ALSysIO64+361e
BUCKET_ID: X64_0x50_ALSysIO64+361e
Followup: MachineOwner
---------
2: kd> lmvm ALSysIO64
start end module name
fffff880`09000000 fffff880`09009000 ALSysIO64 T (no symbols)
Loaded symbol image file: ALSysIO64.sys
Image path: \??\C:\USERS\EUGEN\APPDATA\LOCAL\TEMP\ALSysIO64.sys
Image name: ALSysIO64.sys
Timestamp: Sun Jul 10 02:27:45 2011