Hello, i've randomly some BSOD on my SBS 2008 std on IBM x3200 m3 server.
After uninstalled NOD32 antivirus my BSOD became rarely but i still have some.
this is last debug of minidmp file.
could some one help me read it?
thank you
3: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8800a959000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002f45e2e, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
READ_ADDRESS: fffff8800a959000
FAULTING_IP:
nt!PspGetSetContextInternal+396
fffff800`02f45e2e 488b28 mov rbp,qword ptr [rax]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT_SERVER
BUGCHECK_STR: 0x50
PROCESS_NAME: VSSVC.exe
CURRENT_IRQL: 1
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
TRAP_FRAME: fffffa600e226ce0 -- (.trap 0xfffffa600e226ce0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8800a959000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002f45e2e rsp=fffffa600e226e70 rbp=00000000000003fd
r8=0000000000000000 r9=fffff80003179000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!PspGetSetContextInternal+0x396:
fffff800`02f45e2e 488b28 mov rbp,qword ptr [rax] ds:fffff880`0a959000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002d1ea20 to fffff80002cba150
STACK_TEXT:
fffffa60`0e226bf8 fffff800`02d1ea20 : 00000000`00000050 fffff880`0a959000 00000000`00000000 fffffa60`0e226ce0 : nt!KeBugCheckEx
fffffa60`0e226c00 fffff800`02cb8cd9 : 00000000`00000000 00000000`00000000 fffffa60`08df5000 fffffa60`0fad3570 : nt! ?? ::FNODOBFM::`string'+0x2d48c
fffffa60`0e226ce0 fffff800`02f45e2e : 00000000`000003fd fffffa60`0fad3570 fffff880`00000000 fffffa60`0fad3ac8 : nt!KiPageFault+0x119
fffffa60`0e226e70 fffff800`02ce770d : fffff880`0a8106d0 fffffa80`0fd48bb0 fffffa60`0fad3570 00000000`00000000 : nt!PspGetSetContextInternal+0x396
fffffa60`0e2273c0 fffff800`02cdb8ce : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PspGetSetContextSpecialApc+0x9d
fffffa60`0e2274d0 fffff800`02cdf313 : fffffa60`0e2275f0 00000000`00000000 00000000`00000000 fffffa80`0fd48bb0 : nt!KiDeliverApc+0x19e
fffffa60`0e227570 ffffffff`fdb592f1 : ffffffff`fdb57938 fffffa60`0e227720 ffffffff`fdb57969 00000000`00000000 : nt!KiApcInterrupt+0x103
fffffa60`0e227708 ffffffff`fdb57938 : fffffa60`0e227720 ffffffff`fdb57969 00000000`00000000 00000000`00000001 : 0xffffffff`fdb592f1
fffffa60`0e227710 fffffa60`0e227720 : ffffffff`fdb57969 00000000`00000000 00000000`00000001 ffffffff`fd7164f9 : 0xffffffff`fdb57938
fffffa60`0e227718 ffffffff`fdb57969 : 00000000`00000000 00000000`00000001 ffffffff`fd7164f9 ffffffff`fdb69028 : 0xfffffa60`0e227720
fffffa60`0e227720 00000000`00000000 : 00000000`00000001 ffffffff`fd7164f9 ffffffff`fdb69028 ffffffff`fd715048 : 0xffffffff`fdb57969
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!PspGetSetContextInternal+396
fffff800`02f45e2e 488b28 mov rbp,qword ptr [rax]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!PspGetSetContextInternal+396
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 513a94a9
IMAGE_VERSION: 6.0.6002.18805
FAILURE_BUCKET_ID: X64_0x50_nt!PspGetSetContextInternal+396
BUCKET_ID: X64_0x50_nt!PspGetSetContextInternal+396
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x50_nt!pspgetsetcontextinternal+396
FAILURE_ID_HASH: {3af51032-0f21-c7a7-da92-8305b7b88bed}
Followup: MachineOwner
---------