My last crash from last Sunday
//////////////////////////////////////////////////////////////////////////
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\110313-20732-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18113.amd64fre.win7sp1_gdr.130318-1533
Machine Name:
Kernel base = 0xfffff800`0305d000 PsLoadedModuleList = 0xfffff800`032a0670
Debug session time: Sun Nov 3 19:20:17.081 2013 (GMT-5)
System Uptime: 0 days 11:13:33.671
Loading Kernel Symbols
...............................................................
................................................................
..............................................
Loading User Symbols
Loading unloaded module list
...................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff910c0e0b750, 0, fffff96000185750, 5}
Could not read faulting driver name
Probably caused by : win32k.sys ( win32k!memmove+250 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff910c0e0b750, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff96000185750, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000330a100
fffff910c0e0b750
FAULTING_IP:
win32k!memmove+250
fffff960`00185750 488b440af8 mov rax,qword ptr [rdx+rcx-8]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88007caca90 -- (.trap 0xfffff88007caca90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff900c0e0c170 rbx=0000000000000000 rcx=fffff910c0e0c178
rdx=fffffffffffff5e0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff96000185750 rsp=fffff88007cacc28 rbp=ffffffffffffffff
r8=0000001000000008 r9=0000000080000000 r10=0000000000000002
r11=fffff900c0e0c170 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
win32k!memmove+0x250:
fffff960`00185750 488b440af8 mov rax,qword ptr [rdx+rcx-8] ds:7530:fffff910`c0e0b750=?
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000314f5a3 to fffff800030d2c00
STACK_TEXT:
fffff880`07cac928 fffff800`0314f5a3 : 00000000`00000050 fffff910`c0e0b750 00000000`00000000 fffff880`07caca90 : nt!KeBugCheckEx
fffff880`07cac930 fffff800`030d0d2e : 00000000`00000000 fffff910`c0e0b750 00000000`00000000 fffff900`c0e0b690 : nt! ?? ::FNODOBFM::`string'+0x43801
fffff880`07caca90 fffff960`00185750 : fffff960`00164a37 00000000`00000000 00000000`76b575d4 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`07cacc28 fffff960`00164a37 : 00000000`00000000 00000000`76b575d4 00000000`00000000 00000000`00000020 : win32k!memmove+0x250
fffff880`07cacc30 fffff960`00164979 : 00000000`0000a918 fffffa80`0a0c7530 ffffffff`ffffffff 00000000`00000000 : win32k!CreateProp+0x87
fffff880`07cacc60 fffff960`001a2345 : 00000000`00000000 00000000`0000a918 00000000`00000000 00000000`0000000f : win32k!InternalSetProp+0x45
fffff880`07cacc90 fffff800`030d1e93 : fffffa80`0a0c7530 fffff880`07cacd40 00000000`00000000 00000000`00000000 : win32k!NtUserSetProp+0xe1
fffff880`07caccc0 00000000`76b56fba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`03b2de98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76b56fba
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!memmove+250
fffff960`00185750 488b440af8 mov rax,qword ptr [rdx+rcx-8]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: win32k!memmove+250
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4fd6b298
FAILURE_BUCKET_ID: X64_0x50_win32k!memmove+250
BUCKET_ID: X64_0x50_win32k!memmove+250
Followup: MachineOwner
---------