Microsoft (R) Windows Debugger Version 6.9.0003.113 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Preben\Desktop\Feil med PC\Mini101108-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/downloads/symbols Executable search path is: Windows Server 2008 Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 6001.18063.amd64fre.vistasp1_gdr.080425-1930 Kernel base = 0xfffff800`01e53000 PsLoadedModuleList = 0xfffff800`02018db0 Debug session time: Sat Oct 11 05:31:21.862 2008 (GMT+2) System Uptime: 0 days 12:56:50.625 Loading Kernel Symbols ............................................................................................................................................. Loading User Symbols Loading unloaded module list ....... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {ffffffffffffffc7, 1, fffff8000212da8f, 0} Could not read faulting driver name Probably caused by : ntkrnlmp.exe ( nt!ObpAllocateObject+1cf ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: ffffffffffffffc7, memory referenced. Arg2: 0000000000000001, value 0 = read operation, 1 = write operation. Arg3: fffff8000212da8f, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000000, (reserved) Debugging Details: ------------------ Could not read faulting driver name WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000207c080 ffffffffffffffc7 FAULTING_IP: nt!ObpAllocateObject+1cf fffff800`0212da8f c3 ret MM_INTERNAL_CODE: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: steam.exe CURRENT_IRQL: 0 TRAP_FRAME: fffffa600cab1920 -- (.trap 0xfffffa600cab1920) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=fffffa8003cad930 rcx=0000000000000001 rdx=0000000000000001 rsi=000000006e657645 rdi=fffff8000212d994 rip=fffff8000212da8f rsp=fffffa600cab1ab8 rbp=00000000055fe8d0 r8=0000000000000801 r9=000000006e657645 r10=0000000000000001 r11=fffffa8008913660 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!ObpAllocateObject+0x1cf: fffff800`0212da8f c3 ret Resetting default scope LAST_CONTROL_TRANSFER: from fffff80001eb7361 to fffff80001ea8390 STACK_TEXT: fffffa60`0cab1828 fffff800`01eb7361 : 00000000`00000050 ffffffff`ffffffc7 00000000`00000001 fffffa60`0cab1920 : nt!KeBugCheckEx fffffa60`0cab1830 fffff800`01ea6f19 : 00000000`00000001 fffffa80`062c2bb0 fffffa80`04fab600 fffffa80`03cad930 : nt!MmAccessFault+0x1371 fffffa60`0cab1920 fffff800`0212da8f : fffff800`0213adfd fffffa80`03cad930 fffffa80`08e1e001 00000000`055fe8d0 : nt!KiPageFault+0x119 fffffa60`0cab1ab8 fffff800`0213adfd : fffffa80`03cad930 fffffa80`08e1e001 00000000`055fe8d0 fffffa80`08e1e0d0 : nt!ObpAllocateObject+0x1cf fffffa60`0cab1ac0 fffff800`021384ec : 00000000`055fe818 fffffa60`0cab1ca0 00000000`00000001 00000000`00000000 : nt!ObCreateObject+0xdd fffffa60`0cab1b40 fffff800`01ea7e33 : fffffa80`062c2bb0 00000000`055fe7f8 fffffa60`0cab1bc8 00000000`75876e00 : nt!NtCreateEvent+0x9c fffffa60`0cab1bb0 00000000`77855efa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`055fe7d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77855efa STACK_COMMAND: kb FOLLOWUP_IP: nt!ObpAllocateObject+1cf fffff800`0212da8f c3 ret SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!ObpAllocateObject+1cf FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4812c3f7 FAILURE_BUCKET_ID: X64_0x50_W_nt!ObpAllocateObject+1cf BUCKET_ID: X64_0x50_W_nt!ObpAllocateObject+1cf Followup: MachineOwner ---------