Anda di halaman 1dari 4

Microsoft (R) Windows Debugger Version 6.3.9600.

17336 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\David\Desktop\111715-23500-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Symbol Path validation summary **************
Response
Time (ms)
Location
Deferred
SRV*c:\symbols*http://msdl.micros
oft.com/download/symbols
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 10240 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 10240.16590.amd64fre.th1_st1.151104-1714
Machine Name:
Kernel base = 0xfffff800`dba86000 PsLoadedModuleList = 0xfffff800`dbdab070
Debug session time: Tue Nov 17 13:05:37.379 2015 (UTC + 1:00)
System Uptime: 0 days 17:59:44.863
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that t
ake too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
.....................................................
Loading User Symbols
*******************************************************************************
*
*
*
Bugcheck Analysis
*
*
*
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {3f, 3aef2, 5133dff2, 5133def2}
Probably caused by : memory_corruption ( nt!MiValidatePagefilePageHash+285 )
Followup: MachineOwner
--------0: kd> !analyze -v
*******************************************************************************
*
*
*
Bugcheck Analysis
*
*
*
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, The subtype of the bugcheck.
Arg2: 000000000003aef2

Arg3: 000000005133dff2
Arg4: 000000005133def2
Debugging Details:
-----------------BUGCHECK_STR: 0x1a_3f
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
TRAP_FRAME: ffffd0014effb080 -- (.trap 0xffffd0014effb080)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd0014effb2d0 rbx=0000000000000000 rcx=ffffd0015439e000
rdx=ffffd0015439e000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800dbba9360 rsp=ffffd0014effb210 rbp=00000064065b075d
r8=00000064065afca0 r9=ffffd0015439eea0 r10=00000064065afca0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0
nv up ei pl zr na po nc
nt!RtlDecompressBufferXpressLz+0x50:
fffff800`dbba9360 418b02
mov
eax,dword ptr [r10] ds:00000064`065afc
a0=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800dbca5531 to fffff800dbbd54d0
STACK_TEXT:
ffffd001`4effac38 fffff800`dbca5531 : 00000000`0000001a 00000000`0000003f 000000
00`0003aef2 00000000`5133dff2 : nt!KeBugCheckEx
ffffd001`4effac40 fffff800`dbbf992a : ffffe000`60297520 00000000`00010000 ffffd0
01`4effad80 ffffe000`60297500 : nt!MiValidatePagefilePageHash+0x285
ffffd001`4effad00 fffff800`dbab7232 : ffffe000`5d506a78 ffffd001`4effaee8 ffffe0
00`5d506a78 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x1582a
ffffd001`4effae50 fffff800`dbaa693d : 00000000`c0033333 ffffe000`5d506a78 000000
64`065afca0 00000010`00000000 : nt!MiIssueHardFault+0x1b2
ffffd001`4effaf30 fffff800`dbbde5bd : ffffd001`54399000 ffffd001`00000000 ffffd0
01`4effb240 ffffd001`4effb1e8 : nt!MmAccessFault+0x39d
ffffd001`4effb080 fffff800`dbba9360 : ffffd001`5439e000 ffffd001`5439e000 000000
00`00001000 fffff800`dbb49794 : nt!KiPageFault+0x13d
ffffd001`4effb210 fffff800`dbb49794 : ffffe000`610ee050 fffff800`dbd099f0 ffffd0
01`5439e000 ffffe000`5eb07520 : nt!RtlDecompressBufferXpressLz+0x50
ffffd001`4effb230 fffff800`dbb9933e : 00000000`00000002 00000064`065afca0 ffffe0
00`610ee050 00000000`00000000 : nt!RtlDecompressBufferEx+0x64
ffffd001`4effb280 fffff800`dbb9917e : ffffe000`5e6aee70 ffff1fb7`1acf68d2 ffffe0
00`62905040 fffff800`dbb9a94c : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x186
ffffd001`4effb360 fffff800`dbb98f85 : 00000000`00000002 ffffe000`63e3fa60 ffffe0
00`610ee050 fffff800`dba9c063 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0
xb6
ffffd001`4effb3c0 fffff800`dbb98cbd : ffffe000`ffffffff ffffe000`00000fca 000000
00`00000299 ffffe000`5e6aee70 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+

0x1e1
ffffd001`4effb460 fffff800`dbb9837d : ffffd001`4effb650 ffffe000`5e6aee70 000000
00`00000040 ffffe000`5eb07580 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc1
ffffd001`4effb520 fffff800`dbb982b1 : ffffe000`610ee000 ffffe000`5e6aee70 ffffe0
00`610ee000 fffff800`dbb98298 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x
91
ffffd001`4effb590 fffff800`dbb03925 : ffffe000`5e6aee70 ffffd001`4effb650 ffffe0
00`610ef1d4 fffff800`dbb6dac0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+
0x19
ffffd001`4effb5c0 fffff800`dbb981c3 : 00000000`00000003 fffff800`dbdc9300 ffffe0
00`62905000 ffffe000`610ee000 : nt!KeExpandKernelStackAndCalloutInternal+0x85
ffffd001`4effb610 fffff800`dbb96c88 : ffffe000`5e6aee70 00000000`00000801 ffffe0
00`610ee000 00000000`00000002 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xb7
ffffd001`4effb6e0 fffff800`dbb9692f : ffffe000`5e6aee70 ffffe000`5e6aee70 ffffe0
00`610ee000 fffff800`dbdc9300 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1c
8
ffffd001`4effb740 fffff800`dbb94ad1 : 00000000`0000000c ffffe000`637d1700 000000
00`00000003 ffffe000`637d1650 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0
xc7
ffffd001`4effb7d0 fffff800`dbb94965 : ffffe000`637d1600 ffffd001`4effb890 ffffd0
01`00000003 fffff680`00000000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x165
ffffd001`4effb850 fffff800`dbab8f81 : ffffd001`2019cb0c fffff580`10804000 000000
00`00007175 fffff800`dbaa51f2 : nt!SmPageRead+0x75
ffffd001`4effb890 fffff800`dbab71e8 : 00000000`00000002 ffffe000`5dfbcc78 ffffe0
00`637d1600 00000000`00000000 : nt!MiIssueHardFaultIo+0x129
ffffd001`4effb910 fffff800`dbaa693d : 00000000`c0033333 ffffe000`5dfbcc78 000000
00`119a5e68 ffffd001`00000000 : nt!MiIssueHardFault+0x168
ffffd001`4effb9b0 fffff800`dbbde5bd : 00000000`00000000 00000000`01084090 ffffd0
01`00000000 ffffe000`5e660fa0 : nt!MmAccessFault+0x39d
ffffd001`4effbb00 00000000`6ab1bcb5 : 00000000`00000000 00000000`00000000 000000
00`00000000 00000000`00000000 : nt!KiPageFault+0x13d
00000000`0733d824 00000000`00000000 : 00000000`00000000 00000000`00000000 000000
00`00000000 00000000`00000000 : 0x6ab1bcb5
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiValidatePagefilePageHash+285
fffff800`dbca5531 cc
int

SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiValidatePagefilePageHash+285
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 563ad7f4
IMAGE_VERSION: 10.0.10240.16590
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 285
FAILURE_BUCKET_ID: 0x1a_3f_nt!MiValidatePagefilePageHash
BUCKET_ID: 0x1a_3f_nt!MiValidatePagefilePageHash

ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_3f_nt!mivalidatepagefilepagehash
FAILURE_ID_HASH: {08ffd102-c8c9-2cf6-fee5-98ecbf727366}
Followup: MachineOwner
---------

Anda mungkin juga menyukai