Crash 1

download Crash 1

If you can't read please download the document

description

Crashdump Memory management

Transcript of Crash 1

Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [C:\Users\David\Desktop\111715-23500-01.dmp]Mini Kernel Dump File: Only registers and stack trace are available************* Symbol Path validation summary **************Response Time (ms) LocationDeferred SRV*c:\symbols*http://msdl.microsoft.com/download/symbolsSymbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbolsExecutable search path is: Windows 8 Kernel Version 10240 MP (4 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSBuilt by: 10240.16590.amd64fre.th1_st1.151104-1714Machine Name:Kernel base = 0xfffff800`dba86000 PsLoadedModuleList = 0xfffff800`dbdab070Debug session time: Tue Nov 17 13:05:37.379 2015 (UTC + 1:00)System Uptime: 0 days 17:59:44.863Loading Kernel Symbols.Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.Run !sym noisy before .reload to track down problems loading symbols....................................................................................................................................................................................Loading User Symbols******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck 1A, {3f, 3aef2, 5133dff2, 5133def2}Probably caused by : memory_corruption ( nt!MiValidatePagefilePageHash+285 )Followup: MachineOwner---------0: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined.Arguments:Arg1: 000000000000003f, The subtype of the bugcheck.Arg2: 000000000003aef2Arg3: 000000005133dff2Arg4: 000000005133def2Debugging Details:------------------BUGCHECK_STR: 0x1a_3fCUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULTPROCESS_NAME: SystemCURRENT_IRQL: 0ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64freTRAP_FRAME: ffffd0014effb080 -- (.trap 0xffffd0014effb080)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=ffffd0014effb2d0 rbx=0000000000000000 rcx=ffffd0015439e000rdx=ffffd0015439e000 rsi=0000000000000000 rdi=0000000000000000rip=fffff800dbba9360 rsp=ffffd0014effb210 rbp=00000064065b075d r8=00000064065afca0 r9=ffffd0015439eea0 r10=00000064065afca0r11=0000000000000000 r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0 nv up ei pl zr na po ncnt!RtlDecompressBufferXpressLz+0x50:fffff800`dbba9360 418b02 mov eax,dword ptr [r10] ds:00000064`065afca0=????????Resetting default scopeLAST_CONTROL_TRANSFER: from fffff800dbca5531 to fffff800dbbd54d0STACK_TEXT: ffffd001`4effac38 fffff800`dbca5531 : 00000000`0000001a 00000000`0000003f 00000000`0003aef2 00000000`5133dff2 : nt!KeBugCheckExffffd001`4effac40 fffff800`dbbf992a : ffffe000`60297520 00000000`00010000 ffffd001`4effad80 ffffe000`60297500 : nt!MiValidatePagefilePageHash+0x285ffffd001`4effad00 fffff800`dbab7232 : ffffe000`5d506a78 ffffd001`4effaee8 ffffe000`5d506a78 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x1582affffd001`4effae50 fffff800`dbaa693d : 00000000`c0033333 ffffe000`5d506a78 00000064`065afca0 00000010`00000000 : nt!MiIssueHardFault+0x1b2ffffd001`4effaf30 fffff800`dbbde5bd : ffffd001`54399000 ffffd001`00000000 ffffd001`4effb240 ffffd001`4effb1e8 : nt!MmAccessFault+0x39dffffd001`4effb080 fffff800`dbba9360 : ffffd001`5439e000 ffffd001`5439e000 00000000`00001000 fffff800`dbb49794 : nt!KiPageFault+0x13dffffd001`4effb210 fffff800`dbb49794 : ffffe000`610ee050 fffff800`dbd099f0 ffffd001`5439e000 ffffe000`5eb07520 : nt!RtlDecompressBufferXpressLz+0x50ffffd001`4effb230 fffff800`dbb9933e : 00000000`00000002 00000064`065afca0 ffffe000`610ee050 00000000`00000000 : nt!RtlDecompressBufferEx+0x64ffffd001`4effb280 fffff800`dbb9917e : ffffe000`5e6aee70 ffff1fb7`1acf68d2 ffffe000`62905040 fffff800`dbb9a94c : nt!ST_STORE::StDmSinglePageCopy+0x186ffffd001`4effb360 fffff800`dbb98f85 : 00000000`00000002 ffffe000`63e3fa60 ffffe000`610ee050 fffff800`dba9c063 : nt!ST_STORE::StDmSinglePageTransfer+0xb6ffffd001`4effb3c0 fffff800`dbb98cbd : ffffe000`ffffffff ffffe000`00000fca 00000000`00000299 ffffe000`5e6aee70 : nt!ST_STORE::StDmpSinglePageRetrieve+0x1e1ffffd001`4effb460 fffff800`dbb9837d : ffffd001`4effb650 ffffe000`5e6aee70 00000000`00000040 ffffe000`5eb07580 : nt!ST_STORE::StDmPageRetrieve+0xc1ffffd001`4effb520 fffff800`dbb982b1 : ffffe000`610ee000 ffffe000`5e6aee70 ffffe000`610ee000 fffff800`dbb98298 : nt!SMKM_STORE::SmStDirectReadIssue+0x91ffffd001`4effb590 fffff800`dbb03925 : ffffe000`5e6aee70 ffffd001`4effb650 ffffe000`610ef1d4 fffff800`dbb6dac0 : nt!SMKM_STORE::SmStDirectReadCallout+0x19ffffd001`4effb5c0 fffff800`dbb981c3 : 00000000`00000003 fffff800`dbdc9300 ffffe000`62905000 ffffe000`610ee000 : nt!KeExpandKernelStackAndCalloutInternal+0x85ffffd001`4effb610 fffff800`dbb96c88 : ffffe000`5e6aee70 00000000`00000801 ffffe000`610ee000 00000000`00000002 : nt!SMKM_STORE::SmStDirectRead+0xb7ffffd001`4effb6e0 fffff800`dbb9692f : ffffe000`5e6aee70 ffffe000`5e6aee70 ffffe000`610ee000 fffff800`dbdc9300 : nt!SMKM_STORE::SmStWorkItemQueue+0x1c8ffffd001`4effb740 fffff800`dbb94ad1 : 00000000`0000000c ffffe000`637d1700 00000000`00000003 ffffe000`637d1650 : nt!SMKM_STORE_MGR::SmIoCtxQueueWork+0xc7ffffd001`4effb7d0 fffff800`dbb94965 : ffffe000`637d1600 ffffd001`4effb890 ffffd001`00000003 fffff680`00000000 : nt!SMKM_STORE_MGR::SmPageRead+0x165ffffd001`4effb850 fffff800`dbab8f81 : ffffd001`2019cb0c fffff580`10804000 00000000`00007175 fffff800`dbaa51f2 : nt!SmPageRead+0x75ffffd001`4effb890 fffff800`dbab71e8 : 00000000`00000002 ffffe000`5dfbcc78 ffffe000`637d1600 00000000`00000000 : nt!MiIssueHardFaultIo+0x129ffffd001`4effb910 fffff800`dbaa693d : 00000000`c0033333 ffffe000`5dfbcc78 00000000`119a5e68 ffffd001`00000000 : nt!MiIssueHardFault+0x168ffffd001`4effb9b0 fffff800`dbbde5bd : 00000000`00000000 00000000`01084090 ffffd001`00000000 ffffe000`5e660fa0 : nt!MmAccessFault+0x39dffffd001`4effbb00 00000000`6ab1bcb5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x13d00000000`0733d824 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6ab1bcb5STACK_COMMAND: kbFOLLOWUP_IP: nt!MiValidatePagefilePageHash+285fffff800`dbca5531 cc int 3SYMBOL_STACK_INDEX: 1SYMBOL_NAME: nt!MiValidatePagefilePageHash+285FOLLOWUP_NAME: MachineOwnerMODULE_NAME: ntDEBUG_FLR_IMAGE_TIMESTAMP: 563ad7f4IMAGE_VERSION: 10.0.10240.16590IMAGE_NAME: memory_corruptionBUCKET_ID_FUNC_OFFSET: 285FAILURE_BUCKET_ID: 0x1a_3f_nt!MiValidatePagefilePageHashBUCKET_ID: 0x1a_3f_nt!MiValidatePagefilePageHashANALYSIS_SOURCE: KMFAILURE_ID_HASH_STRING: km:0x1a_3f_nt!mivalidatepagefilepagehashFAILURE_ID_HASH: {08ffd102-c8c9-2cf6-fee5-98ecbf727366}Followup: MachineOwner---------