BugCheck 1A, {41792, ffffea80b5dbf918, 80000000000000, 0}
Probably caused by : memory_corruption
Followup: memory_corruption
---------
7: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffea80b5dbf918
Arg3: 0080000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
MEMORY_CORRUPTOR: LARGE
BUGCHECK_STR: 0x1a_41792
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: TiWorker.exe
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
STACK_TEXT:
ffffeb0c`434c2fe8 fffff801`0af4bfda : 00000000`0000001a 00000000`00041792 ffffea80`b5dbf918 00800000`00000000 : nt!KeBugCheckEx
ffffeb0c`434c2ff0 fffff801`0aee9606 : 00000000`00000000 ffffe680`0a55fa00 00000000`00000005 ffffea80`b5dbf918 : nt!MiDeleteVa+0x153a
ffffeb0c`434c30f0 fffff801`0aee971b : ffffeaf5`405aedf8 ffff9a8e`b1b7d9c0 ffffeb0c`00000000 ffffeb0c`434c3560 : nt!MiWalkPageTablesRecursively+0x776
ffffeb0c`434c3190 fffff801`0aee971b : ffffeaf5`7aa02d70 ffff9a8e`b1b7d9c0 ffffeb0c`00000001 ffffeb0c`434c3570 : nt!MiWalkPageTablesRecursively+0x88b
ffffeb0c`434c3230 fffff801`0aee971b : ffffeaf5`7aa02000 ffff9a8e`b1b7d9c0 ffffeb0c`00000002 ffffeb0c`434c3580 : nt!MiWalkPageTablesRecursively+0x88b
ffffeb0c`434c32d0 fffff801`0aed867b : ffffeb0c`434c3460 ffff9a8e`b1b7d9c0 00000000`00000003 ffffeb0c`434c3590 : nt!MiWalkPageTablesRecursively+0x88b
ffffeb0c`434c3370 fffff801`0af4a871 : ffffeb0c`434c3510 ffff9a8e`00000000 00000000`00000002 ffff9a8e`00000000 : nt!MiWalkPageTables+0x36b
ffffeb0c`434c3470 fffff801`0af5b738 : ffff9a8e`b1b7da80 fffff801`0af23370 ffff9a8e`b1149080 ffff9a8e`b1b7d810 : nt!MiDeletePagablePteRange+0x4f1
ffffeb0c`434c3780 fffff801`0af5b09c : 00000000`00000100 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVirtualAddresses+0x48
ffffeb0c`434c37d0 fffff801`0af1afbf : 00000000`16bb8000 0000016b`b7ed0000 0000016b`b804ffff fffff801`00000001 : nt!MiDeletePartialVad+0x260
ffffeb0c`434c38f0 fffff801`0b2fa70c : ffffeb0c`00000001 00000000`00000000 ffffeb0c`434c3a50 0000016b`b7ed0000 : nt!MiFreeVadRange+0x113
ffffeb0c`434c3950 fffff801`0b2fa1e5 : 00000000`00000000 0000000a`4c5fcb48 00000000`00002000 00007ffb`00000004 : nt!MmFreeVirtualMemory+0x4ec
ffffeb0c`434c3aa0 fffff801`0b005eb8 : ffff9a8e`b1149080 ffff9a8e`00000000 00000000`00000000 ffff9a8e`ba104690 : nt!NtFreeVirtualMemory+0x95
ffffeb0c`434c3b00 00007ffc`1aa2c154 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000000a`4c5fcaf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`1aa2c154
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
fffff80107e4cd05-fffff80107e4cd06 2 bytes - FLTMGR!DeleteStreamListCtrlCallback+35
[ 48 ff:4c 8b ]
fffff80107e4cd0c-fffff80107e4cd10 5 bytes - FLTMGR!DeleteStreamListCtrlCallback+3c (+0x07)
[ 0f 1f 44 00 00:e8 df df 01 03 ]
fffff80107e4cd1a-fffff80107e4cd1b 2 bytes - FLTMGR!DeleteStreamListCtrlCallback+4a (+0x0e)
[ 48 ff:4c 8b ]
fffff80107e4cd21-fffff80107e4cd25 5 bytes - FLTMGR!DeleteStreamListCtrlCallback+51 (+0x07)
[ 0f 1f 44 00 00:e8 ba f6 08 03 ]
fffff80107e4cd6a-fffff80107e4cd6b 2 bytes - FLTMGR!DeleteStreamListCtrlCallback+9a (+0x49)
[ 48 ff:4c 8b ]
fffff80107e4cd71-fffff80107e4cd77 7 bytes - FLTMGR!DeleteStreamListCtrlCallback+a1 (+0x07)
[ 0f 1f 44 00 00 48 ff:e8 ba ee 08 03 4c 8b ]
fffff80107e4cd7d-fffff80107e4cd81 5 bytes - FLTMGR!DeleteStreamListCtrlCallback+ad (+0x0c)
[ 0f 1f 44 00 00:e8 ce d1 fc 02 ]
28 errors : !FLTMGR (fffff80107e4cd05-fffff80107e4cd81)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------