BugCheck 50, {fffff8085a006100, 0, fffff8079128e729, 2}
*** WARNING: Unable to verify timestamp for hardlock.sys
*** ERROR: Module load completed but symbols could not be loaded for hardlock.sys
Could not read faulting driver name
Unable to load image \SystemRoot\System32\drivers\Netwtw04.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Netwtw04.sys
*** ERROR: Module load completed but symbols could not be loaded for Netwtw04.sys
Unable to load image \SystemRoot\System32\drivers\dump_iaStorAC.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for dump_iaStorAC.sys
*** ERROR: Module load completed but symbols could not be loaded for dump_iaStorAC.sys
*** WARNING: Unable to verify timestamp for tcpip.sys
*** ERROR: Module load completed but symbols could not be loaded for tcpip.sys
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : memory_corruption
Followup: memory_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8085a006100, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8079128e729, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
fffff8085a006100
FAULTING_IP:
hardlock+4e729
fffff807`9128e729 458b0e mov r9d,dword ptr [r14]
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: AV
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
TRAP_FRAME: fffff98519d0a580 -- (.trap 0xfffff98519d0a580)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=8a00000007000001 rbx=0000000000000000 rcx=ffffa3ffffffffff
rdx=fffff98519d0a6b0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8079128e729 rsp=fffff98519d0a710 rbp=fffff80777885260
r8=ffffa38000000000 r9=fffff80791240400 r10=b7f556989cffeab9
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
hardlock+0x4e729:
fffff807`9128e729 458b0e mov r9d,dword ptr [r14] ds:00000000`00000000=00000000
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff807779de677 to fffff8077799d840
STACK_TEXT:
fffff985`19d0a368 fffff807`779de677 : 00000000`00000050 fffff808`5a006100 00000000`00000000 fffff985`19d0a580 : nt!KeBugCheckEx
fffff985`19d0a370 fffff807`77866508 : fffff808`5a006100 00000000`c0000016 fffff985`19d0a580 00000000`00000000 : nt!MiSystemFault+0x17f6fb
fffff985`19d0a470 fffff807`779ab91e : 00000000`00000000 00000000`00000090 fffff807`777d2000 fffff807`77882d29 : nt!MmAccessFault+0x218
fffff985`19d0a580 fffff807`9128e729 : fffff807`777d2000 ffffffff`80001558 fffff807`91250718 ffffa3fc`03bbbe90 : nt!KiPageFault+0x35e
fffff985`19d0a710 fffff807`777d2000 : ffffffff`80001558 fffff807`91250718 ffffa3fc`03bbbe90 ffffa3d1`fe01ddd8 : hardlock+0x4e729
fffff985`19d0a718 ffffffff`80001558 : fffff807`91250718 ffffa3fc`03bbbe90 ffffa3d1`fe01ddd8 fffff807`777d2000 : nt!_guard_fids_table <PERF> (nt+0x1d2000)
fffff985`19d0a720 fffff807`91250718 : ffffa3fc`03bbbe90 ffffa3d1`fe01ddd8 fffff807`777d2000 fffff807`9128e03c : 0xffffffff`80001558
fffff985`19d0a728 ffffa3fc`03bbbe90 : ffffa3d1`fe01ddd8 fffff807`777d2000 fffff807`9128e03c ffffffff`80001558 : hardlock+0x10718
fffff985`19d0a730 ffffa3d1`fe01ddd8 : fffff807`777d2000 fffff807`9128e03c ffffffff`80001558 fffff807`9127ac0e : 0xffffa3fc`03bbbe90
fffff985`19d0a738 fffff807`777d2000 : fffff807`9128e03c ffffffff`80001558 fffff807`9127ac0e fffff807`9127ae18 : 0xffffa3d1`fe01ddd8
fffff985`19d0a740 fffff807`9128e03c : ffffffff`80001558 fffff807`9127ac0e fffff807`9127ae18 fffff807`9128e809 : nt!_guard_fids_table <PERF> (nt+0x1d2000)
fffff985`19d0a748 ffffffff`80001558 : fffff807`9127ac0e fffff807`9127ae18 fffff807`9128e809 fffff985`19d0a960 : hardlock+0x4e03c
fffff985`19d0a750 fffff807`9127ac0e : fffff807`9127ae18 fffff807`9128e809 fffff985`19d0a960 ffff9306`9beff000 : 0xffffffff`80001558
fffff985`19d0a758 fffff807`9127ae18 : fffff807`9128e809 fffff985`19d0a960 ffff9306`9beff000 fffff807`9128e538 : hardlock+0x3ac0e
fffff985`19d0a760 fffff807`9128e809 : fffff985`19d0a960 ffff9306`9beff000 fffff807`9128e538 fffff807`777d2000 : hardlock+0x3ae18
fffff985`19d0a768 fffff985`19d0a960 : ffff9306`9beff000 fffff807`9128e538 fffff807`777d2000 ffff9306`9c0764d0 : hardlock+0x4e809
fffff985`19d0a770 ffff9306`9beff000 : fffff807`9128e538 fffff807`777d2000 ffff9306`9c0764d0 ffff9306`9be54e50 : 0xfffff985`19d0a960
fffff985`19d0a778 fffff807`9128e538 : fffff807`777d2000 ffff9306`9c0764d0 ffff9306`9be54e50 00000000`00000000 : 0xffff9306`9beff000
fffff985`19d0a780 fffff807`777d2000 : ffff9306`9c0764d0 ffff9306`9be54e50 00000000`00000000 ffffffff`80001558 : hardlock+0x4e538
fffff985`19d0a788 ffff9306`9c0764d0 : ffff9306`9be54e50 00000000`00000000 ffffffff`80001558 ffffa483`4b2bbcf0 : nt!_guard_fids_table <PERF> (nt+0x1d2000)
fffff985`19d0a790 ffff9306`9be54e50 : 00000000`00000000 ffffffff`80001558 ffffa483`4b2bbcf0 00000000`00000000 : 0xffff9306`9c0764d0
fffff985`19d0a798 00000000`00000000 : ffffffff`80001558 ffffa483`4b2bbcf0 00000000`00000000 fffff807`9128e1de : 0xffff9306`9be54e50
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
fffff80775b1ff47-fffff80775b1ff48 2 bytes - FLTMGR!FltpProcessGenericWorkItem+67
[ 48 ff:4c 8b ]
fffff80775b1ff4e-fffff80775b1ff52 5 bytes - FLTMGR!FltpProcessGenericWorkItem+6e (+0x07)
[ 0f 1f 44 00 00:e8 fd 17 d1 01 ]
fffff80775b1ff64-fffff80775b1ff65 2 bytes - FLTMGR!FltpProcessGenericWorkItem+84 (+0x16)
[ 48 ff:4c 8b ]
fffff80775b1ff6b-fffff80775b1ff6f 5 bytes - FLTMGR!FltpProcessGenericWorkItem+8b (+0x07)
[ 0f 1f 44 00 00:e8 10 4b dc 01 ]
fffff80775b1ff8a-fffff80775b1ff8b 2 bytes - FLTMGR!FltpProcessGenericWorkItem+aa (+0x1f)
[ 48 ff:4c 8b ]
fffff80775b1ff91-fffff80775b1ff95 5 bytes - FLTMGR!FltpProcessGenericWorkItem+b1 (+0x07)
[ 0f 1f 44 00 00:e8 ca 4a dc 01 ]
fffff80775b1ffaa-fffff80775b1ffab 2 bytes - FLTMGR!FltpProcessGenericWorkItem+ca (+0x19)
[ 48 ff:4c 8b ]
fffff80775b1ffb1-fffff80775b1ffb5 5 bytes - FLTMGR!FltpProcessGenericWorkItem+d1 (+0x07)
[ 0f 1f 44 00 00:e8 9a 17 d1 01 ]
28 errors : !FLTMGR (fffff80775b1ff47-fffff80775b1ffb5)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------