******************************************************************************** *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff8801a956ba0, 1, fffff8016cc3a744, 0}
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : memory_corruption
Followup: memory_corruption
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8801a956ba0, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff8016cc3a744, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8016cbc6168
GetUlongFromAddress: unable to read from fffff8016cbc61f8
fffff8801a956ba0 Nonpaged pool
FAULTING_IP:
nt!EtwpFlushActiveBuffers+60
fffff801`6cc3a744 4c89bc24c0012000 mov qword ptr [rsp+2001C0h],r15
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: AV
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff8801a756850 -- (.trap 0xfffff8801a756850)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000010802102 rbx=0000000000000000 rcx=fffffa800a5cf040
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8016cc3a744 rsp=fffff8801a7569e0 rbp=0000000000000001
r8=00000000000c00e1 r9=000000000000002f r10=00000000000000ff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!EtwpFlushActiveBuffers+0x60:
fffff801`6cc3a744 4c89bc24c0012000 mov qword ptr [rsp+2001C0h],r15 ss:0018:fffff880`1a956ba0=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8016ca58e4d to fffff8016c8ea740
STACK_TEXT:
fffff880`1a756668 fffff801`6ca58e4d : 00000000`00000050 fffff880`1a956ba0 00000000`00000001 fffff880`1a756850 : nt!KeBugCheckEx
fffff880`1a756670 fffff801`6c925e1f : 00000000`00000001 fffff880`1a956ba0 fffffa80`0a5d0b00 00000000`0013008b : nt! ?? ::FNODOBFM::`string'+0x3256b
fffff880`1a756710 fffff801`6c8e81ee : 00000000`00000001 fffffa80`0a5cf040 ffff2a75`f6d70900 fffff880`1a756850 : nt!MmAccessFault+0x54f
fffff880`1a756850 fffff801`6cc3a744 : fffff8a0`019071d0 00000000`00000003 00000000`00000005 fffff8a0`019071e0 : nt!KiPageFault+0x16e
fffff880`1a7569e0 fffff801`6cc3b263 : fffffa80`0a5cf000 00000000`00000000 fffffa80`0a5cf040 fffffa80`0a5cf040 : nt!EtwpFlushActiveBuffers+0x60
fffff880`1a756b90 fffff801`6c892625 : fffffa80`0a5d0b00 00000000`00000080 fffffa80`0a5cf040 fffff801`6ceb6f1f : nt!EtwpLogger+0x1a7
fffff880`1a756c10 fffff801`6c8d0e56 : fffff880`02ad1180 fffffa80`0a5d0b00 fffff880`02adcf40 fffffa80`06af1940 : nt!PspSystemThreadStartup+0x59
fffff880`1a756c60 00000000`00000000 : fffff880`1a757000 fffff880`1a751000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8016cc3a74a - nt!EtwpFlushActiveBuffers+66
[ 00:20 ]
1 error : !nt (fffff8016cc3a74a)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
Followup: memory_corruption
---------