BugCheck 50, {fffff80803080f08, 0, fffff80002ee3962, 5}
*** ERROR: Module load completed but symbols could not be loaded for speedfan.sys
Probably caused by : speedfan.sys ( speedfan+212d )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff80803080f08, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002ee3962, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
READ_ADDRESS: fffff80803080f08
FAULTING_IP:
nt!MiInsertCachedPte+82
fffff800`02ee3962 488b44cd00 mov rax,qword ptr [rbp+rcx*8]
MM_INTERNAL_CODE: 5
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: speedfan.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800ba206b0 -- (.trap 0xfffff8800ba206b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000fffffffc rbx=0000000000000000 rcx=0000000000000000
rdx=00000000ffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ee3962 rsp=fffff8800ba20840 rbp=fffff80803080f08
r8=000000000001fd2e r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!MiInsertCachedPte+0x82:
fffff800`02ee3962 488b44cd00 mov rax,qword ptr [rbp+rcx*8] ss:0018:fffff808`03080f08=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002f4b421 to fffff80002ecd040
STACK_TEXT:
fffff880`0ba20548 fffff800`02f4b421 : 00000000`00000050 fffff808`03080f08 00000000`00000000 fffff880`0ba206b0 : nt!KeBugCheckEx
fffff880`0ba20550 fffff800`02ecb12e : 00000000`00000000 fffff800`03080ee0 00000000`00000000 fffff6fc`40060000 : nt! ?? ::FNODOBFM::`string'+0x4090b
fffff880`0ba206b0 fffff800`02ee3962 : fffff880`00000001 fffff880`00000002 fffff880`0ba20700 00000000`00001000 : nt!KiPageFault+0x16e
fffff880`0ba20840 fffff800`02e75a79 : fffff6fc`40060000 00000000`0000c000 00000000`00000000 00000000`00000001 : nt!MiInsertCachedPte+0x82
fffff880`0ba20890 fffff880`018ef12d : 00000000`00000000 fffff880`0ba20c60 00000000`0000000c fffffa80`03950880 : nt!MmUnmapIoSpace+0xf5
fffff880`0ba208e0 fffff800`031e2307 : 00000000`00000000 fffffa80`07c72ee0 fffffa80`0000000c fffffa80`9c402420 : speedfan+0x212d
fffff880`0ba209d0 fffff800`031e2b66 : fffffa80`03c06400 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x607
fffff880`0ba20b00 fffff800`02ecc293 : fffffa80`03c06400 00000000`00000001 fffffa80`03a0e760 fffff800`031dd6c4 : nt!NtDeviceIoControlFile+0x56
fffff880`0ba20b70 00000000`74822dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0008ebf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74822dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
speedfan+212d
fffff880`018ef12d 4c8bbc24f8000000 mov r15,qword ptr [rsp+0F8h]
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: speedfan+212d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: speedfan
IMAGE_NAME: speedfan.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d83838e
FAILURE_BUCKET_ID: X64_0x50_speedfan+212d
BUCKET_ID: X64_0x50_speedfan+212d
Followup: MachineOwner
---------