Microsoft (R) Windows Debugger Version 6.8.0004.0 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\WINDOWS\Minidump\MEMORY.DMP] Kernel Summary Dump File: Only kernel address space is available Symbol search path is: srv*c:\programfiler\Debugging Tools for Windows\symbols*http://msdl.microsoft.com/downloads/symbols Executable search path is: Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 2600.xpsp_sp2_gdr.070227-2254 Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055a620 Debug session time: Tue May 13 11:32:54.328 2008 (GMT+2) System Uptime: 0 days 2:58:32.896 Loading Kernel Symbols ..................................................................................................................................... Loading User Symbols PEB is paged out (Peb.Ldr = 7ffd400c). Type ".hh dbgerr001" for details Loading unloaded module list ............................. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck CD, {8be99010, 0, 804e3d2d, 0} *** ERROR: Module load completed but symbols could not be loaded for fsgk.sys PEB is paged out (Peb.Ldr = 7ffd400c). Type ".hh dbgerr001" for details PEB is paged out (Peb.Ldr = 7ffd400c). Type ".hh dbgerr001" for details Probably caused by : fsgk.sys ( fsgk+8ca4 ) Followup: MachineOwner --------- kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_BEYOND_END_OF_ALLOCATION (cd) N bytes of memory was allocated and more than N bytes are being referenced. This cannot be protected by try-except. When possible, the guilty driver's name (Unicode string) is printed on the bugcheck screen and saved in KiBugCheckDriver. Arguments: Arg1: 8be99010, memory referenced Arg2: 00000000, value 0 = read operation, 1 = write operation Arg3: 804e3d2d, if non-zero, the address which referenced memory. Arg4: 00000000, Mm internal code. Debugging Details: ------------------ PEB is paged out (Peb.Ldr = 7ffd400c). Type ".hh dbgerr001" for details PEB is paged out (Peb.Ldr = 7ffd400c). Type ".hh dbgerr001" for details READ_ADDRESS: 8be99010 Special pool FAULTING_IP: nt!IopfCompleteRequest+97 804e3d2d 8b4014 mov eax,dword ptr [eax+14h] MM_INTERNAL_CODE: 0 DEFAULT_BUCKET_ID: DRIVER_FAULT BUGCHECK_STR: 0xCD PROCESS_NAME: fssm32.exe TRAP_FRAME: b68aeaec -- (.trap 0xffffffffb68aeaec) ErrCode = 00000000 eax=8be98ffc ebx=00000000 ecx=8be98f82 edx=000000c0 esi=8be98f68 edi=8be98fdb eip=804e3d2d esp=b68aeb60 ebp=b68aeb7c iopl=0 nv up ei ng nz na po nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010282 nt!IopfCompleteRequest+0x97: 804e3d2d 8b4014 mov eax,dword ptr [eax+14h] ds:0023:8be99010=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 80523fa0 to 8053354e STACK_TEXT: b68aea88 80523fa0 00000050 8be99010 00000000 nt!KeBugCheckEx+0x1b b68aead4 804e1718 00000000 8be99010 00000000 nt!MmAccessFault+0x6f5 b68aead4 804e3d2d 00000000 8be99010 00000000 nt!KiTrap0E+0xcc b68aeb7c 8066a6c9 8be98f68 00000020 89d389b0 nt!IopfCompleteRequest+0x97 b68aebe8 b6700ca4 8be98f68 00000000 8be98f00 nt!IovCompleteRequest+0x9a WARNING: Stack unwind information not available. Following frames may be wrong. b68aebfc b66f9ad6 0000101c 89d38820 89d38cc0 fsgk+0x8ca4 b68aec10 804e37f7 89d38820 8be98f68 806ee2e8 fsgk+0x1ad6 b68aec20 80669fc5 89d2ab38 806ee2d0 8be98f68 nt!IopfCallDriver+0x31 b68aec44 8056a148 8be98fd8 8a211ca8 8be98f68 nt!IovCallDriver+0xa0 b68aec58 8057ad03 89d38820 8be98f68 8a211ca8 nt!IopSynchronousServiceTail+0x60 b68aed00 8057d281 000004ec 00000000 00000000 nt!IopXxxControlFile+0x611 b68aed34 804de7ec 000004ec 00000000 00000000 nt!NtDeviceIoControlFile+0x2a b68aed34 7c90eb94 000004ec 00000000 00000000 nt!KiFastCallEntry+0xf8 00b8de30 00000000 00000000 00000000 00000000 0x7c90eb94 STACK_COMMAND: kb FOLLOWUP_IP: fsgk+8ca4 b6700ca4 bf12000040 mov edi,40000012h SYMBOL_STACK_INDEX: 5 SYMBOL_NAME: fsgk+8ca4 FOLLOWUP_NAME: MachineOwner MODULE_NAME: fsgk IMAGE_NAME: fsgk.sys DEBUG_FLR_IMAGE_TIMESTAMP: 47b56c68 FAILURE_BUCKET_ID: 0xCD_VRF_fsgk+8ca4 BUCKET_ID: 0xCD_VRF_fsgk+8ca4 Followup: MachineOwner --------- kd> !thread THREAD 89d2a928 Cid 0950.09ac Teb: 7ffdc000 Win32Thread: 00000000 RUNNING on processor 0 IRP List: 8be98f68: (0006,0094) Flags: 40000000 Mdl: 00000000 Not impersonating DeviceMap e1004428 Owning Process 89d329b8 Image: fssm32.exe Wait Start TickCount 685625 Ticks: 0 Context Switch Count 50690 UserTime 00:00:31.828 KernelTime 00:00:07.234 Win32 Start Address 0x0105902c Start Address 0x7c810659 Stack Init b68af000 Current b68ae6b4 Base b68af000 Limit b68ac000 Call 0 Priority 10 BasePriority 10 PriorityDecrement 0 DecrementCount 16 ChildEBP RetAddr Args to Child b68aea88 80523fa0 00000050 8be99010 00000000 nt!KeBugCheckEx+0x1b (FPO: [Non-Fpo]) b68aead4 804e1718 00000000 8be99010 00000000 nt!MmAccessFault+0x6f5 (FPO: [Non-Fpo]) b68aead4 804e3d2d 00000000 8be99010 00000000 nt!KiTrap0E+0xcc (FPO: [0,0] TrapFrame @ b68aeaec) b68aeb7c 8066a6c9 8be98f68 00000020 89d389b0 nt!IopfCompleteRequest+0x97 (FPO: [Non-Fpo]) b68aebe8 b6700ca4 8be98f68 00000000 8be98f00 nt!IovCompleteRequest+0x9a (FPO: [Non-Fpo]) WARNING: Stack unwind information not available. Following frames may be wrong. b68aebfc b66f9ad6 0000101c 89d38820 89d38cc0 fsgk+0x8ca4 b68aec10 804e37f7 89d38820 8be98f68 806ee2e8 fsgk+0x1ad6 b68aec20 80669fc5 89d2ab38 806ee2d0 8be98f68 nt!IopfCallDriver+0x31 (FPO: [0,0,0]) b68aec44 8056a148 8be98fd8 8a211ca8 8be98f68 nt!IovCallDriver+0xa0 (FPO: [Non-Fpo]) b68aec58 8057ad03 89d38820 8be98f68 8a211ca8 nt!IopSynchronousServiceTail+0x60 (FPO: [Non-Fpo]) b68aed00 8057d281 000004ec 00000000 00000000 nt!IopXxxControlFile+0x611 (FPO: [Non-Fpo]) b68aed34 804de7ec 000004ec 00000000 00000000 nt!NtDeviceIoControlFile+0x2a (FPO: [Non-Fpo]) b68aed34 7c90eb94 000004ec 00000000 00000000 nt!KiFastCallEntry+0xf8 (FPO: [0,0] TrapFrame @ b68aed64) 00b8de30 00000000 00000000 00000000 00000000 0x7c90eb94