PePiCK
2011-08-24 15:31:06 UTC
Hi,
Someone can help me,
it's a second time in last 2 week this server crash with this same
minidumb.
Thank's
Fred
*******************************************************************************
*
*
* Bugcheck
Analysis *
*
*
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-
except,
it must be protected by a Probe. Typically the address is just plain
bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa803340f000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff880013845c2, If non-zero, the instruction address which
referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from
fffff8000210f100
fffffa803340f000
FAULTING_IP:
cng!SHA256Update+b6
fffff880`013845c2 488b4720 mov rax,qword ptr [rdi+20h]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT_SERVER_MINIDUMP
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800934a940 -- (.trap 0xfffff8800934a940)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff8a07dd32528
rdx=fffff8a07dd32550 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880013845c2 rsp=fffff8800934aad0 rbp=00000000ffffffe4
r8=000000000584da4e r9=000000000000000f r10=00000000cf18c000
r11=00000000163774b8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cng!SHA256Update+0xb6:
fffff880`013845c2 488b4720 mov rax,qword ptr [rdi+20h]
ds:b642:00000000`00000020=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80001e889fc to fffff80001edcc40
STACK_TEXT:
fffff880`0934a7d8 fffff800`01e889fc : 00000000`00000050
fffffa80`3340f000 00000000`00000000 fffff880`0934a940 : nt!
KeBugCheckEx
fffff880`0934a7e0 fffff800`01edad6e : 00000000`00000000
fffffa80`3340f000 00000000`00000000 00000000`fe1a9464 :
nt! ?? ::FNODOBFM::`string'+0x4611f
fffff880`0934a940 fffff880`013845c2 : fffff8a0`7dd32528
fffff880`3538246f 00000000`163774b8 fffff880`c4366f96 : nt!KiPageFault
+0x16e
fffff880`0934aad0 fffff880`01380645 : 00000000`ffffffe4
00000000`00000001 00000000`00000000 00000000`00000001 : cng!
SHA256Update+0xb6
fffff880`0934ab10 fffff880`07a4b133 : fffff880`0934b100
fffffa80`315b8439 fffff880`0934acd8 fffff880`07a4b010 : cng!
MSCryptHashData+0x65
fffff880`0934ab40 fffff880`07a5b280 : fffff8a0`7dd324e0
00000000`00000004 fffff880`0934acd8 fffff880`0934abb0 : CSVFilter!
ShaHash::Hash+0x7b
fffff880`0934aba0 fffff880`07a467ed : 00000000`c0000225
fffff880`0934acc0 fffffa80`3c3f1c60 00000000`00000000 : CSVFilter!
CfspVerify+0x30
fffff880`0934ac00 fffff880`07a4f194 : 00000000`00000142
00000000`00000001 00000000`00000000 fffffa80`2f6219c0 : CSVFilter!
CfspGetCfsEa+0x69
fffff880`0934ac30 fffff880`012de067 : 00000000`0000003b
00000000`00000000 fffff880`0934b500 fffffa80`3c3f1d00 : CSVFilter!
CfsPreCreate+0x18c
fffff880`0934afc0 fffff880`012e09aa : fffffa80`38975800
fffffa80`38975800 fffffa80`2f2aa500 fffffa80`2f2b2000 : fltmgr!
FltpPerformPreCallbacks+0x2f7
fffff880`0934b0c0 fffff880`012fe2a3 : fffffa80`33e4c010
fffffa80`33e4c010 fffffa80`33e4c010 6d4e6f49`0934b128 : fltmgr!
FltpPassThroughInternal+0x4a
fffff880`0934b0f0 fffff800`021daf95 : 00000000`00000004
fffffa80`36e7fcc8 fffffa80`327f0310 00000000`00000000 : fltmgr!
FltpCreate+0x293
fffff880`0934b1a0 fffff800`021d75c2 : fffffa80`2f2aa5b0
fffff8a0`00000000 fffffa80`36e7fb10 fffff880`00000000 : nt!
IopParseDevice+0x5a5
fffff880`0934b330 fffff800`021d8a56 : ffffffff`800027a4
fffffa80`36e7fb10 00000000`00000000 fffffa80`2ea0fde0 : nt!
ObpLookupObjectName+0x312
fffff880`0934b420 fffff800`021da35c : fffffa80`3c397b60
00000000`00000000 00000000`00000000 00000000`000007ff : nt!
ObOpenObjectByName+0x306
fffff880`0934b4f0 fffff800`0218188b : fffff880`0934b960
00010001`00100080 fffff880`0934b900 fffff880`0934b948 : nt!
IopCreateFile+0x2bc
fffff880`0934b590 fffff880`06cbf7bb : 00000000`00000000
fffff880`0934b6b0 fffff880`0934b900 fffff8a0`03133020 : nt!
IoCreateFileEx+0xfb
fffff880`0934b630 00000000`00000000 : 00000000`00000000
00000000`00000000 00000000`00000000 00000000`00000000 : srv!
SrvIoCreateFile+0x33b
STACK_COMMAND: kb
FOLLOWUP_IP:
cng!SHA256Update+b6
fffff880`013845c2 488b4720 mov rax,qword ptr [rdi+20h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: cng!SHA256Update+b6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: cng
IMAGE_NAME: cng.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79e2d
FAILURE_BUCKET_ID: X64_0x50_cng!SHA256Update+b6
BUCKET_ID: X64_0x50_cng!SHA256Update+b6
Followup: MachineOwner
---------
Someone can help me,
it's a second time in last 2 week this server crash with this same
minidumb.
Thank's
Fred
*******************************************************************************
*
*
* Bugcheck
Analysis *
*
*
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-
except,
it must be protected by a Probe. Typically the address is just plain
bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa803340f000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff880013845c2, If non-zero, the instruction address which
referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from
fffff8000210f100
fffffa803340f000
FAULTING_IP:
cng!SHA256Update+b6
fffff880`013845c2 488b4720 mov rax,qword ptr [rdi+20h]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT_SERVER_MINIDUMP
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800934a940 -- (.trap 0xfffff8800934a940)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff8a07dd32528
rdx=fffff8a07dd32550 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880013845c2 rsp=fffff8800934aad0 rbp=00000000ffffffe4
r8=000000000584da4e r9=000000000000000f r10=00000000cf18c000
r11=00000000163774b8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cng!SHA256Update+0xb6:
fffff880`013845c2 488b4720 mov rax,qword ptr [rdi+20h]
ds:b642:00000000`00000020=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80001e889fc to fffff80001edcc40
STACK_TEXT:
fffff880`0934a7d8 fffff800`01e889fc : 00000000`00000050
fffffa80`3340f000 00000000`00000000 fffff880`0934a940 : nt!
KeBugCheckEx
fffff880`0934a7e0 fffff800`01edad6e : 00000000`00000000
fffffa80`3340f000 00000000`00000000 00000000`fe1a9464 :
nt! ?? ::FNODOBFM::`string'+0x4611f
fffff880`0934a940 fffff880`013845c2 : fffff8a0`7dd32528
fffff880`3538246f 00000000`163774b8 fffff880`c4366f96 : nt!KiPageFault
+0x16e
fffff880`0934aad0 fffff880`01380645 : 00000000`ffffffe4
00000000`00000001 00000000`00000000 00000000`00000001 : cng!
SHA256Update+0xb6
fffff880`0934ab10 fffff880`07a4b133 : fffff880`0934b100
fffffa80`315b8439 fffff880`0934acd8 fffff880`07a4b010 : cng!
MSCryptHashData+0x65
fffff880`0934ab40 fffff880`07a5b280 : fffff8a0`7dd324e0
00000000`00000004 fffff880`0934acd8 fffff880`0934abb0 : CSVFilter!
ShaHash::Hash+0x7b
fffff880`0934aba0 fffff880`07a467ed : 00000000`c0000225
fffff880`0934acc0 fffffa80`3c3f1c60 00000000`00000000 : CSVFilter!
CfspVerify+0x30
fffff880`0934ac00 fffff880`07a4f194 : 00000000`00000142
00000000`00000001 00000000`00000000 fffffa80`2f6219c0 : CSVFilter!
CfspGetCfsEa+0x69
fffff880`0934ac30 fffff880`012de067 : 00000000`0000003b
00000000`00000000 fffff880`0934b500 fffffa80`3c3f1d00 : CSVFilter!
CfsPreCreate+0x18c
fffff880`0934afc0 fffff880`012e09aa : fffffa80`38975800
fffffa80`38975800 fffffa80`2f2aa500 fffffa80`2f2b2000 : fltmgr!
FltpPerformPreCallbacks+0x2f7
fffff880`0934b0c0 fffff880`012fe2a3 : fffffa80`33e4c010
fffffa80`33e4c010 fffffa80`33e4c010 6d4e6f49`0934b128 : fltmgr!
FltpPassThroughInternal+0x4a
fffff880`0934b0f0 fffff800`021daf95 : 00000000`00000004
fffffa80`36e7fcc8 fffffa80`327f0310 00000000`00000000 : fltmgr!
FltpCreate+0x293
fffff880`0934b1a0 fffff800`021d75c2 : fffffa80`2f2aa5b0
fffff8a0`00000000 fffffa80`36e7fb10 fffff880`00000000 : nt!
IopParseDevice+0x5a5
fffff880`0934b330 fffff800`021d8a56 : ffffffff`800027a4
fffffa80`36e7fb10 00000000`00000000 fffffa80`2ea0fde0 : nt!
ObpLookupObjectName+0x312
fffff880`0934b420 fffff800`021da35c : fffffa80`3c397b60
00000000`00000000 00000000`00000000 00000000`000007ff : nt!
ObOpenObjectByName+0x306
fffff880`0934b4f0 fffff800`0218188b : fffff880`0934b960
00010001`00100080 fffff880`0934b900 fffff880`0934b948 : nt!
IopCreateFile+0x2bc
fffff880`0934b590 fffff880`06cbf7bb : 00000000`00000000
fffff880`0934b6b0 fffff880`0934b900 fffff8a0`03133020 : nt!
IoCreateFileEx+0xfb
fffff880`0934b630 00000000`00000000 : 00000000`00000000
00000000`00000000 00000000`00000000 00000000`00000000 : srv!
SrvIoCreateFile+0x33b
STACK_COMMAND: kb
FOLLOWUP_IP:
cng!SHA256Update+b6
fffff880`013845c2 488b4720 mov rax,qword ptr [rdi+20h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: cng!SHA256Update+b6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: cng
IMAGE_NAME: cng.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79e2d
FAILURE_BUCKET_ID: X64_0x50_cng!SHA256Update+b6
BUCKET_ID: X64_0x50_cng!SHA256Update+b6
Followup: MachineOwner
---------