MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffffe3ffc166338
Arg3: 2000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
MEMORY_CORRUPTOR: LARGE
BUGCHECK_STR: 0x1a_41792
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
STACK_TEXT:
ffff8a06`f26dee48 fffff801`3785418e : 00000000`0000001a 00000000`00041792 fffffe3f`fc166338 20000000`00000000 : nt!KeBugCheckEx
ffff8a06`f26dee50 fffff801`376119d1 : 00000000`00000003 fffffe3f`fc166000 ffff8a06`f26df320 00000000`00000003 : nt!MiDeleteVa+0x191e6e
ffff8a06`f26def40 fffff801`37611cf0 : 00000000`00000000 ffffe58b`d0c949c0 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x301
ffff8a06`f26defd0 fffff801`37611cf0 : 00000000`00000000 ffffe58b`d0c949c0 fffffe7f`00000000 00000000`00000010 : nt!MiWalkPageTablesRecursively+0x620
ffff8a06`f26df060 fffff801`37611cf0 : ffff8a06`f26df320 ffffe58b`d0c949c0 00000000`00000000 00000000`00000020 : nt!MiWalkPageTablesRecursively+0x620
ffff8a06`f26df0f0 fffff801`3760e5fb : 00000000`00000000 ffffe58b`d0c949c0 00000000`00000000 00000000`00000030 : nt!MiWalkPageTablesRecursively+0x620
ffff8a06`f26df180 fffff801`376c22d1 : ffff8a06`f26df320 ffffe58b`00000000 fffffe3f`00000002 ffff8a06`00000000 : nt!MiWalkPageTables+0x36b
ffff8a06`f26df280 fffff801`376a787f : 00000000`00000000 00000000`00000060 ffffe58b`d0c94a80 00000000`00000000 : nt!MiDeletePagablePteRange+0x491
ffff8a06`f26df700 fffff801`379ea999 : ffffe58b`d0c94340 00000000`00000000 ffffe58b`00000000 ffffe58b`00000001 : nt!MiDeleteVad+0x41f
ffff8a06`f26df830 fffff801`37a66a00 : ffffe58b`d2fa4d00 ffffe58b`d91af010 ffffe58b`cd143080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff8a06`f26df860 fffff801`37a678b3 : ffffe58b`d2fa4b20 ffffe58b`d2fa4b20 ffffe58b`d2fa4d00 ffffe58b`d0c94340 : nt!MiCleanVad+0x30
ffff8a06`f26df890 fffff801`37ab9e87 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe58b`d0c94340 : nt!MmCleanProcessAddressSpace+0x137
ffff8a06`f26df910 fffff801`379e8c32 : ffffe58b`d0c94340 ffff970e`f84f65f0 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffff8a06`f26df990 fffff801`37a4e29e : ffffe58b`00000000 00000000`00000001 00000000`00000000 00000052`90718000 : nt!PspExitThread+0x5f6
ffff8a06`f26dfa90 fffff801`377ef378 : ffffe58b`d0c94340 ffffe58b`cd143080 ffff8a06`f26dfb80 ffffe58b`d0c94340 : nt!NtTerminateProcess+0xde
ffff8a06`f26dfb00 00007ff8`2edeb314 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000052`904ffa98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`2edeb314
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8013760e63d-fffff8013760e63e 2 bytes - nt!MiWalkPageTables+3ad
[ 80 f6:00 fe ]
fffff80137611a4c-fffff80137611a51 6 bytes - nt!MiWalkPageTablesRecursively+37c (+0x340f)
[ 68 df be 7d fb f6:e0 cf 9f 3f 7f fe ]
fffff80137611a6b-fffff80137611a6f 5 bytes - nt!MiWalkPageTablesRecursively+39b (+0x1f)
[ d0 be 7d fb f6:c0 9f 3f 7f fe ]
fffff80137611a8c-fffff80137611a90 5 bytes - nt!MiWalkPageTablesRecursively+3bc (+0x21)
[ d0 be 7d fb f6:c0 9f 3f 7f fe ]
fffff80137611d24-fffff80137611d28 5 bytes - nt!MiWalkPageTablesRecursively+654 (+0x298)
[ d7 be 7d fb f6:c7 9f 3f 7f fe ]
fffff80137611d87-fffff80137611d8b 5 bytes - nt!MiWalkPageTablesRecursively+6b7 (+0x63)
[ df be 7d fb f6:cf 9f 3f 7f fe ]
fffff80137611dc9-fffff80137611dcd 5 bytes - nt!MiWalkPageTablesRecursively+6f9 (+0x42)
[ d7 be 7d fb f6:c7 9f 3f 7f fe ]
fffff801376127c9-fffff801376127ca 2 bytes - nt!MiGetNextPageTablePte+1c9 (+0xa00)
[ 80 f6:00 fe ]
fffff801376c2348-fffff801376c234c 5 bytes - nt!MiDeleteVa+28 (+0xafb7f)
[ d0 be 7d fb f6:c0 9f 3f 7f fe ]
fffff801376c235b-fffff801376c235f 5 bytes - nt!MiDeleteVa+3b (+0x13)
[ d7 be 7d fb f6:c7 9f 3f 7f fe ]
fffff801376c23c3-fffff801376c23c4 2 bytes - nt!MiDeleteVa+a3 (+0x68)
[ 80 f6:00 fe ]
fffff80137784f1e-fffff80137784f21 4 bytes - nt!MiFreeUltraMapping+32 (+0xc2b5b)
[ a0 7d fb f6:80 3f 7f fe ]
fffff801378541d7-fffff801378541db 5 bytes - nt!MiDeleteVa+191eb7 (+0xcf2b9)
[ df be 7d fb f6:cf 9f 3f 7f fe ]
fffff801378541ef-fffff801378541f3 5 bytes - nt!MiDeleteVa+191ecf (+0x18)
[ d7 be 7d fb f6:c7 9f 3f 7f fe ]
61 errors : !nt (fffff8013760e63d-fffff801378541f3)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8016490822d, The address that the exception occurred at
Arg3: ffffba894ebee048, Exception Record Address
Arg4: ffffba894ebed880, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba
FAULTING_IP:
dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+29
fffff801`6490822d c6421a00 mov byte ptr [rdx+1Ah],0
EXCEPTION_RECORD: ffffba894ebee048 -- (.exr 0xffffba894ebee048)
ExceptionAddress: fffff8016490822d (dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x0000000000000029)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffba894ebed880 -- (.cxr 0xffffba894ebed880;r)
rax=ffff1e2a2dfbe18c rbx=ffff968dc1cc9a48 rcx=ffffd3070c67a000
rdx=dfff968dc1cc9a10 rsi=ffff968daf7be130 rdi=ffffd3070c67a000
rip=fffff8016490822d rsp=ffffba894ebee280 rbp=ffff968daf7be010
r8=ffffd307085d78b0 r9=000000023c480000 r10=000000023c450000
r11=ffffd307115e1010 r12=0000000000000000 r13=ffffba894ebeeb40
r14=dfff968dc1cc9a38 r15=ffff968dc1cc9a38
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x29:
fffff801`6490822d c6421a00 mov byte ptr [rdx+1Ah],0 ds:002b:dfff968d`c1cc9a2a=??
Last set context:
rax=ffff1e2a2dfbe18c rbx=ffff968dc1cc9a48 rcx=ffffd3070c67a000
rdx=dfff968dc1cc9a10 rsi=ffff968daf7be130 rdi=ffffd3070c67a000
rip=fffff8016490822d rsp=ffffba894ebee280 rbp=ffff968daf7be010
r8=ffffd307085d78b0 r9=000000023c480000 r10=000000023c450000
r11=ffffd307115e1010 r12=0000000000000000 r13=ffffba894ebeeb40
r14=dfff968dc1cc9a38 r15=ffff968dc1cc9a38
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x29:
fffff801`6490822d c6421a00 mov byte ptr [rdx+1Ah],0 ds:002b:dfff968d`c1cc9a2a=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffffffffffffffff
FOLLOWUP_IP:
dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+29
fffff801`6490822d c6421a00 mov byte ptr [rdx+1Ah],0
BUGCHECK_STR: AV
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
EXCEPTION_STR: 0x0
LAST_CONTROL_TRANSFER: from fffff80164911008 to fffff8016490822d
STACK_TEXT:
ffffba89`4ebee280 fffff801`64911008 : 00000000`01001002 fffff801`648a1ee7 ffff968d`c1cc9a48 fffff801`00000003 : dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x29
ffffba89`4ebee710 fffff801`6491209b : ffff968d`af7be010 ffffba89`4ebee800 ffff968d`af7be130 ffffd307`0c3d4db0 : dxgmms2!VIDMM_GLOBAL::MakeVirtualAddressRangeNotResident+0xc0
ffffba89`4ebee770 fffff801`6490e387 : ffff968d`c1cc9a10 ffffba89`4ebee8c0 ffffd307`0c67a000 00000000`00000000 : dxgmms2!VIDMM_MEMORY_SEGMENT::EvictResource+0x23b
ffffba89`4ebee7c0 fffff801`649279e8 : ffffd307`0c67a000 ffffd307`0c683c10 ffffd307`0c67a000 ffffd307`0c67a000 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0x8f7
ffffba89`4ebeea00 fffff801`64931b89 : ffff968d`ac98e6a0 ffffd307`0c4f0000 00000000`00000000 00000000`072dac00 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xb78
ffffba89`4ebeebe0 fffff801`56d46715 : ffffd307`0c4f0080 fffff801`64931b80 ffff968d`ac98e6a0 000f8067`b4bbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffffba89`4ebeec10 fffff801`56de5078 : ffffe600`59d36180 ffffd307`0c4f0080 fffff801`56d466c0 00076b76`ffffffe0 : nt!PspSystemThreadStartup+0x55
ffffba89`4ebeec60 00000000`00000000 : ffffba89`4ebef000 ffffba89`4ebe9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
fffff8015417995c-fffff8015417995d 2 bytes - FLTMGR!FltpDataScanCsqAcquireLock+1c
[ 48 ff:4c 8b ]
fffff80154179963-fffff80154179967 5 bytes - FLTMGR!FltpDataScanCsqAcquireLock+23 (+0x07)
[ 0f 1f 44 00 00:e8 98 b6 aa 02 ]
fffff80154179a2e-fffff80154179a2f 2 bytes - FLTMGR!FltpDataScanCsqInsertIrp+6e (+0xcb)
[ 48 ff:4c 8b ]
fffff80154179a35-fffff80154179a39 5 bytes - FLTMGR!FltpDataScanCsqInsertIrp+75 (+0x07)
[ 0f 1f 44 00 00:e8 d6 aa be 02 ]
fffff80154179a51-fffff80154179a52 2 bytes - FLTMGR!FltpDataScanCsqInsertIrp+91 (+0x1c)
[ 48 ff:4c 8b ]
fffff80154179a58-fffff80154179a5c 5 bytes - FLTMGR!FltpDataScanCsqInsertIrp+98 (+0x07)
[ 0f 1f 44 00 00:e8 13 96 bb 02 ]
fffff80154179aad-fffff80154179aae 2 bytes - FLTMGR!FltpDataScanCsqReleaseLock+d (+0x55)
[ 48 ff:4c 8b ]
fffff80154179ab4-fffff80154179ab8 5 bytes - FLTMGR!FltpDataScanCsqReleaseLock+14 (+0x07)
[ 0f 1f 44 00 00:e8 e7 c6 aa 02 ]
fffff80154179bb8-fffff80154179bb9 2 bytes - FLTMGR!FltpQueueDataScanSynchronization+90 (+0x104)
[ 48 ff:4c 8b ]
fffff80154179bbf-fffff80154179bc3 5 bytes - FLTMGR!FltpQueueDataScanSynchronization+97 (+0x07)
[ 0f 1f 44 00 00:e8 5c fd b7 02 ]
fffff80154179bde-fffff80154179bdf 2 bytes - FLTMGR!FltpQueueDataScanSynchronization+b6 (+0x1f)
[ 48 ff:4c 8b ]
37 errors : !FLTMGR (fffff8015417995c-fffff80154179bdf)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: .cxr 0xffffba894ebed880 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------