Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [G: \Downloads\120411-14601-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x8301c000 PsLoadedModuleList = 0x83164810
Debug session time: Sun Dec 4 11: 31: 52.880 2011 (UTC + 1: 00)
System Uptime: 0 days 0: 05: 56.925
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
.....
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: f7970050, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 8b81b4d3, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from 83184718
Unable to read MiSystemVaType memory at 83164160
f7970050
FAULTING_IP:
Ntfs!NtfsSnapshotScbInternal+194
8b81b4d3 394f50 cmp dword ptr [edi+50h],ecx
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
TRAP_FRAME: a4587a8c -- (.trap 0xffffffffa4587a8c)
ErrCode = 00000000
eax=85b32ad8 ebx=00000727 ecx=85b32ad8 edx=85b32b08 esi=a6979d78 edi=f7970000
eip=8b81b4d3 esp=a4587b00 ebp=a4587b0c iopl=0 nv up ei ng nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286
Ntfs!NtfsSnapshotScbInternal+0x194:
8b81b4d3 394f50 cmp dword ptr [edi+50h],ecx ds: 0023: f7970050=??
Resetting default scope
LAST_CONTROL_TRANSFER: from 830625f8 to 830a18e3
STACK_TEXT:
a4587a74 830625f8 00000000 f7970050 00000000 nt!MmAccessFault+0x106
a4587a74 8b81b4d3 00000000 f7970050 00000000 nt!KiTrap0E+0xdc
a4587b0c 8b81b7a2 85b32ad8 a6979d78 00000000 Ntfs!NtfsSnapshotScbInternal+0x194
a4587b20 8b824860 85b32ad8 a6979d78 a6979c88 Ntfs!NtfsSnapshotScb+0x12
a4587b34 8b88f0e7 85b32ad8 a6979d78 2fdca0bc Ntfs!NtfsAcquireExclusiveScb+0x3b
a4587ba4 8b88f76b 85b32ad8 87a64008 2fdca714 Ntfs!NtfsCommonFlushBuffers+0x2e5
a4587c0c 830584bc 86b53020 87a64008 87a64008 Ntfs!NtfsFsdFlushBuffers+0xf7
a4587c24 8b6e620c 868a34d0 87a64008 00000000 nt!IofCallDriver+0x63
a4587c48 8b6e63cb a4587c68 868a34d0 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa
a4587c80 830584bc 868a34d0 87a64008 87a64008 fltmgr!FltpDispatch+0xc5
a4587c98 83259eee 87a64008 8943b378 00000000 nt!IofCallDriver+0x63
a4587cb8 8323ae5a 868a34d0 8943b378 00000000 nt!IopSynchronousServiceTail+0x1f8
a4587d24 8305f42a 00000000 08dff540 08dff548 nt!NtFlushBuffersFile+0x1d7
a4587d24 777f64f4 00000000 08dff540 08dff548 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
08dff548 00000000 00000000 00000000 00000000 0x777f64f4
STACK_COMMAND: kb
FOLLOWUP_IP:
Ntfs!NtfsSnapshotScbInternal+194
8b81b4d3 394f50 cmp dword ptr [edi+50h],ecx
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: Ntfs!NtfsSnapshotScbInternal+194
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bbf45
FAILURE_BUCKET_ID: 0x50_Ntfs!NtfsSnapshotScbInternal+194
BUCKET_ID: 0x50_Ntfs!NtfsSnapshotScbInternal+194
Followup: MachineOwner
---------