BSOD Stop Code 0x50

Discussion in 'Software' started by kyrazy, Jan 19, 2010.

  1. kyrazy

    kyrazy Private E-2

    Hello im getting a bsod several times a day. They usuall happen when im running firefox and world of warcraft at the same time.
    Here is the debug info:
    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [D:\Documents\kyle bsod dump.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    WARNING: Whitespace at end of path element
    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.x86fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0x8280a000 PsLoadedModuleList = 0x82952810
    Debug session time: Thu Dec 31 22:09:23.334 2009 (GMT-8)
    System Uptime: 0 days 1:11:45.381
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......................
    Loading User Symbols
    Loading unloaded module list
    .......
    0: kd>  !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fdb4ac44, memory referenced.
    Arg2: 00000001, value 0 = read operation, 1 = write operation.
    Arg3: 9330b2e3, If non-zero, the instruction address which referenced the bad memory
    	address.
    Arg4: 00000000, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82972718
    Unable to read MiSystemVaType memory at 82952160
     fdb4ac44 
    
    FAULTING_IP: 
    win32k!memmove+33
    9330b2e3 f3a5            rep movs dword ptr es:[edi],dword ptr [esi]
    
    MM_INTERNAL_CODE:  0
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  firefox.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  8a979904 -- (.trap 0xffffffff8a979904)
    ErrCode = 00000002
    eax=fc4a364c ebx=fdb4ac44 ecx=000000a2 edx=00000000 esi=fc4a33c4 edi=fdb4ac44
    eip=9330b2e3 esp=8a979978 ebp=8a979980 iopl=0         nv up ei pl nz ac pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010216
    win32k!memmove+0x33:
    9330b2e3 f3a5            rep movs dword ptr es:[edi],dword ptr [esi]
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from 828505f8 to 8288f8e3
    
    STACK_TEXT:  
    8a9798ec 828505f8 00000001 fdb4ac44 00000000 nt!MmAccessFault+0x106
    8a9798ec 9330b2e3 00000001 fdb4ac44 00000000 nt!KiTrap0E+0xdc
    8a979980 932f7156 fdb4ac44 fc4a33c4 00000288 win32k!memmove+0x33
    8a9799a4 932f7096 00000053 19d2fac2 fe0a0728 win32k!vSrcCopyS32D32Identity+0x5b
    8a979be4 9332cc53 fba01010 fc48a010 00000000 win32k!EngCopyBits+0x604
    8a979ccc 93314e36 fe95bf68 934642f0 fe95bf68 win32k!NtGdiBitBltInternal+0x6ab
    8a979d00 8284d42a 64010180 00000179 0000006c win32k!NtGdiBitBlt+0x2f
    8a979d00 777064f4 64010180 00000179 0000006c nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    0049de68 00000000 00000000 00000000 00000000 0x777064f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    win32k!memmove+33
    9330b2e3 f3a5            rep movs dword ptr es:[edi],dword ptr [esi]
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  win32k!memmove+33
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc2a2
    
    FAILURE_BUCKET_ID:  0x50_win32k!memmove+33
    
    BUCKET_ID:  0x50_win32k!memmove+33
    
    Followup: MachineOwner
    ---------
    
    
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds