Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 847029 Details for
Bug 1049800
win2008.x86_64 guest BSOD (error code:0x50, PAGE_FAULT_IN_NONPAGED_AREA)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
mem_dump debug info
mem_dump-0x50.txt (text/plain), 6.05 KB, created by
CongLi
on 2014-01-08 09:12:01 UTC
(
hide
)
Description:
mem_dump debug info
Filename:
MIME Type:
Creator:
CongLi
Created:
2014-01-08 09:12:01 UTC
Size:
6.05 KB
patch
obsolete
> >Microsoft (R) Windows Debugger Version 6.2.9200.20512 AMD64 >Copyright (c) Microsoft Corporation. All rights reserved. > > >Loading Dump File [C:\Users\Administrator\Desktop\Memory-0x3B.dmp] >Kernel Summary Dump File: Only kernel address space is available > >Symbol search path is: SRV*C:\symbols\*http://msdl.microsoft.com/download/symbols >Executable search path is: >Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (4 procs) Free x64 >Product: Server, suite: TerminalServer DataCenter SingleUserTS >Built by: 6002.18005.amd64fre.lh_sp2rtm.090410-1830 >Machine Name: >Kernel base = 0xfffff800`0161b000 PsLoadedModuleList = 0xfffff800`017dfdd0 >Debug session time: Thu Jan 9 07:15:14.171 2014 (UTC + 8:00) >System Uptime: 0 days 0:00:35.312 >Loading Kernel Symbols >............................................................... >................................. >Loading User Symbols >PEB is paged out (Peb.Ldr = 000007ff`fffdd018). Type ".hh dbgerr001" for details >Loading unloaded module list >........ >******************************************************************************* >* * >* Bugcheck Analysis * >* * >******************************************************************************* > >Use !analyze -v to get detailed debugging information. > >BugCheck 50, {fffff880055b002e, 0, fffff800017503a0, 0} > >Page d7cfd not present in the dump file. Type ".hh dbgerr004" for details >Page d7fca not present in the dump file. Type ".hh dbgerr004" for details >Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+d0 ) > >Followup: Pool_corruption >--------- > >0: kd> !analyze -v >******************************************************************************* >* * >* Bugcheck Analysis * >* * >******************************************************************************* > >PAGE_FAULT_IN_NONPAGED_AREA (50) >Invalid system memory was referenced. This cannot be protected by try-except, >it must be protected by a Probe. Typically the address is just plain bad or it >is pointing at freed memory. >Arguments: >Arg1: fffff880055b002e, memory referenced. >Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. >Arg3: fffff800017503a0, If non-zero, the instruction address which referenced the bad memory > address. >Arg4: 0000000000000000, (reserved) > >Debugging Details: >------------------ > >Page d7cfd not present in the dump file. Type ".hh dbgerr004" for details >Page d7fca not present in the dump file. Type ".hh dbgerr004" for details > >READ_ADDRESS: fffff880055b002e Paged pool > >FAULTING_IP: >nt!ExDeferredFreePool+d0 >fffff800`017503a0 4d8b08 mov r9,qword ptr [r8] > >MM_INTERNAL_CODE: 0 > >DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT > >BUGCHECK_STR: 0x50 > >PROCESS_NAME: LogonUI.exe > >CURRENT_IRQL: 0 > >TRAP_FRAME: fffffa60091b9530 -- (.trap 0xfffffa60091b9530) >NOTE: The trap frame does not contain all registers. >Some register values may be zeroed or incorrect. >rax=fffff8800005af30 rbx=0000000000000000 rcx=0000000000000002 >rdx=fffffa80036580a0 rsi=0000000000000000 rdi=0000000000000000 >rip=fffff800017503a0 rsp=fffffa60091b96c0 rbp=0000000000000000 > r8=fffff880055b002e r9=fffff880055b002e r10=0000000000000000 >r11=0000000000000001 r12=0000000000000000 r13=0000000000000000 >r14=0000000000000000 r15=0000000000000000 >iopl=0 nv up ei ng nz na po nc >nt!ExDeferredFreePool+0xd0: >fffff800`017503a0 4d8b08 mov r9,qword ptr [r8] ds:fffff880`055b002e=???????????????? >Resetting default scope > >LAST_CONTROL_TRANSFER: from fffff800016d6830 to fffff80001675450 > >STACK_TEXT: >fffffa60`091b9448 fffff800`016d6830 : 00000000`00000050 fffff880`055b002e 00000000`00000000 fffffa60`091b9530 : nt!KeBugCheckEx >fffffa60`091b9450 fffff800`01673fd9 : 00000000`00000000 00000000`00000003 fffff880`05563900 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x2d3dc >fffffa60`091b9530 fffff800`017503a0 : 00000000`00000000 00000000`00000000 fffffa80`03664e0c fffff880`05563a40 : nt!KiPageFault+0x119 >fffffa60`091b96c0 fffff800`0174f2b2 : fffff880`05554ab0 fffff880`055638a0 00000000`00000000 00000000`00000001 : nt!ExDeferredFreePool+0xd0 >fffffa60`091b9730 fffff800`018e3cd3 : fffff880`05562840 fffffa60`091b9810 ffffc430`00000010 00000000`64536553 : nt!ExFreePoolWithTag+0x5e2 >fffffa60`091b97e0 fffff800`018d8f91 : fffffa60`091b9910 00000000`00000000 fffffa80`04607bc0 fffffa60`091b9bd8 : nt!SeDefaultObjectMethod+0x67 >fffffa60`091b9830 fffff800`018960e4 : fffff880`05563b60 00000000`00000090 00000000`00000000 fffffa80`03658120 : nt!ObInsertObject+0x2e1 >fffffa60`091b9a40 fffff800`0189dfe0 : fffff880`05563b60 fffffa80`045ad800 fffffa80`04642610 00000000`00000090 : nt!SeCopyClientToken+0x80 >fffffa60`091b9ad0 fffff800`018ad480 : 00000000`00000000 ffffffff`ffffffff ffffffff`ffffffff fffffa80`045ad850 : nt!SepCreateClientSecurity+0xa0 >fffffa60`091b9b00 fffff800`01896227 : 00000000`00000000 fffff800`00000001 fffffa60`091b9bd8 fffffa60`091b9c38 : nt!AlpcpCreateSecurityContext+0xf0 >fffffa60`091b9ba0 fffff800`01674ef3 : fffffa80`04644200 00000000`00000001 00000000`00000000 00000000`00272ac0 : nt!NtAlpcCreateSecurityContext+0x10b >fffffa60`091b9c20 00000000`773174aa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 >00000000`01b9f188 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773174aa > > >STACK_COMMAND: kb > >FOLLOWUP_IP: >nt!ExDeferredFreePool+d0 >fffff800`017503a0 4d8b08 mov r9,qword ptr [r8] > >SYMBOL_STACK_INDEX: 3 > >SYMBOL_NAME: nt!ExDeferredFreePool+d0 > >FOLLOWUP_NAME: Pool_corruption > >IMAGE_NAME: Pool_Corruption > >DEBUG_FLR_IMAGE_TIMESTAMP: 0 > >MODULE_NAME: Pool_Corruption > >FAILURE_BUCKET_ID: X64_0x50_nt!ExDeferredFreePool+d0 > >BUCKET_ID: X64_0x50_nt!ExDeferredFreePool+d0 > >Followup: Pool_corruption >--------- >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1049800
: 847029 |
847034