Loading Dump File [C:\Users\Johannes\Downloads\SF_16-11-2012\SF_16-11-2012\111612-14944-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols\*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9200 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9200.16424.amd64fre.win8_gdr.120926-1855
Machine Name:
Kernel base = 0xfffff801`4667b000 PsLoadedModuleList = 0xfffff801`46945a60
Debug session time: Sat Nov 17 00:21:31.478 2012 (UTC + 1:00)
System Uptime: 0 days 1:43:01.141
Loading Kernel Symbols
...............................................................
................................................................
.....................................................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck BE, {fffff880024e15a8, 80000000004e0121, fffff880015066f0, b}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+322ef )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff880024e15a8, Virtual address for the attempted write.
Arg2: 80000000004e0121, PTE contents.
Arg3: fffff880015066f0, (reserved)
Arg4: 000000000000000b, (reserved)
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'BthEnum' and 'WUDFRd.sys' overlap
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0xBE
PROCESS_NAME: System
CURRENT_IRQL: 0
TAG_NOT_DEFINED_c000000f: FFFFF8800150EFB0
TRAP_FRAME: fffff880015066f0 -- (.trap 0xfffff880015066f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffffffffd0f268
rdx=000000149b304cc3 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80146724bc1 rsp=fffff88001506880 rbp=fffffa800a85a880
r8=0000000000000001 r9=0000000000000020 r10=000001ccb2c4dd51
r11=000000009b304cc3 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!PpmIdleExecuteTransition+0x520:
fffff801`46724bc1 49878728540000 xchg rax,qword ptr [r15+5428h] ds:00000000`00005428=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80146863b25 to fffff801466f5d40
STACK_TEXT:
fffff880`01506508 fffff801`46863b25 : 00000000`000000be fffff880`024e15a8 80000000`004e0121 fffff880`015066f0 : nt!KeBugCheckEx
fffff880`01506510 fffff801`46730d6f : 00000000`00000001 fffff880`024e15a8 fffff880`014e7f40 fffff801`466ebb5c : nt! ?? ::FNODOBFM::`string'+0x322ef
fffff880`015065b0 fffff801`466f37ee : 00000000`00000001 fffff880`014e15c8 00000000`00000000 fffff880`015066f0 : nt!MmAccessFault+0x54f
fffff880`015066f0 fffff801`46724bc1 : fffff880`014e15c8 00000000`00da7a64 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`01506880 fffff801`46723540 : 00000000`00000000 00060bbf`00060bbf fffff880`01506ae8 fffff880`01506af0 : nt!PpmIdleExecuteTransition+0x520
fffff880`01506aa0 fffff801`467213cc : fffff880`014dc180 fffff880`014dc180 00000000`00000000 fffff880`014e7f40 : nt!PoIdle+0x1e0
fffff880`01506be0 00000000`00000000 : fffff880`01507000 fffff880`01500000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x2c
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+322ef
fffff801`46863b25 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+322ef
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5063f8c8
BUCKET_ID_FUNC_OFFSET: 322ef
FAILURE_BUCKET_ID: 0xBE_nt!_??_::FNODOBFM::_string_
BUCKET_ID: 0xBE_nt!_??_::FNODOBFM::_string_
Followup: MachineOwner
---------