Memory Management BSOD (while computer was idle)

Associate
Joined
29 Aug 2014
Posts
107
121417-5500-01.dmp 14/12/2017 16:18:18 MEMORY_MANAGEMENT 0x0000001a 00000000`00041792 ffff9481`033fcc78 00000200`00000000 00000000`00000000 ntoskrnl.exe ntoskrnl.exe+1640e0 x64 ntoskrnl.exe+1640e0 C:\Windows\Minidump\121417-5500-01.dmp 12 15 16299 2,348,100 14/12/2017 16:19:55


Thats from teh bluescreen viewer

Doing a SFC /SCANNOW right now
 
x99a raider mothernboard MSI
GEOFRCE PALIX DUAL 6GB 1060 GDDR5
GSKILL 2400MHZ DDR 4 RAM
I7 6800K CPU

750W PWR SUPPLY

250G SSD

4TB INTERNAL HDD

All brand new
 
Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 8 Kernel Version 16299 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 16299.15.amd64fre.rs3_release.170928-1534
Machine Name:
Kernel base = 0xfffff801`8f680000 PsLoadedModuleList = 0xfffff801`8f9e1ff0
Debug session time: Fri Dec 15 08:58:06.635 2017 (UTC - 5:00)
System Uptime: 0 days 17:22:58.343
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8018f71590e, The address that the exception occurred at
Arg3: ffff880c9b33ebf8, Exception Record Address
Arg4: ffff880c9b33e440, Context Record Address

Debugging Details:
------------------

TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

FAULTING_IP:
nt!MiDemoteCombinedPte+46
fffff801`8f71590e 49394720 cmp qword ptr [r15+20h],rax

EXCEPTION_RECORD: ffff880c9b33ebf8 -- (.exr 0xffff880c9b33ebf8)
ExceptionAddress: fffff8018f71590e (nt!MiDemoteCombinedPte+0x0000000000000046)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT: ffff880c9b33e440 -- (.cxr 0xffff880c9b33e440)
rax=0000000000000001 rbx=8700020686702025 rcx=ffff9c8bab21dac0
rdx=ffff9c8bab21dac0 rsi=00007ffb7e98f000 rdi=ffff880c9b33f380
rip=fffff8018f71590e rsp=ffff880c9b33ee30 rbp=ffff880c9b33f490
r8=8000000000000000 r9=ffffd10000000000 r10=ffff9c8bab21dac0
r11=0000000000000000 r12=ffffd13ffdbf4c78 r13=ffffd13ffdbf4c78
r14=ffff9c8bad009c10 r15=7fffffffffffffd0
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!MiDemoteCombinedPte+0x46:
fffff801`8f71590e 49394720 cmp qword ptr [r15+20h],rax ds:002b:7fffffff`fffffff0=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: SettingSyncHos

CURRENT_IRQL: 2

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffffffffffffffff

READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffffffffffffffff

FOLLOWUP_IP:
nt!MiDemoteCombinedPte+46
fffff801`8f71590e 49394720 cmp qword ptr [r15+20h],rax

BUGCHECK_STR: AV

EXCEPTION_STR: 0x0

LAST_CONTROL_TRANSFER: from fffff8018f71496b to fffff8018f71590e

STACK_TEXT:
ffff880c`9b33ee30 fffff801`8f71496b : 00000000`00000004 ffffd200`b04de180 00000000`00000000 87000206`86702025 : nt!MiDemoteCombinedPte+0x46
ffff880c`9b33ef00 fffff801`8f7139d2 : 00000000`00000000 00000000`00000000 ffff880c`9b33f490 00000000`00000000 : nt!MiAgePte+0x96b
ffff880c`9b33efa0 fffff801`8f713b0a : 00000000`00000000 00000000`00000000 00000000`00000000 ffff880c`9b33f490 : nt!MiWalkPageTablesRecursively+0x202
ffff880c`9b33f050 fffff801`8f713b0a : 00000000`00000000 55555555`55555555 ffff9c8b`a1a620b0 ffff880c`9b33f490 : nt!MiWalkPageTablesRecursively+0x33a
ffff880c`9b33f100 fffff801`8f713b0a : 00000000`00000000 00000000`00000000 00000000`00000000 ffff880c`9b33f490 : nt!MiWalkPageTablesRecursively+0x33a
ffff880c`9b33f1b0 fffff801`8f71370f : ffff880c`9b33f490 00000000`00000000 ffff880c`9b33f280 ffff880c`9b33f490 : nt!MiWalkPageTablesRecursively+0x33a
ffff880c`9b33f260 fffff801`8f713351 : 00000000`00000000 fffff801`8f715360 ffff9c8b`a1a62010 fffff801`73576d4d : nt!MiWalkPageTables+0x20f
ffff880c`9b33f300 fffff801`8f712d45 : ffff9c8b`ab21dac0 00000000`00000000 ffff9c8b`a1a62010 00000000`00000000 : nt!MiAgeWorkingSet+0x2b1
ffff880c`9b33f7f0 fffff801`8f7124b9 : 00000000`00000000 ffff880c`9b33fa80 ffff880c`9b33f9b0 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x175
ffff880c`9b33f8b0 fffff801`8f73fdca : fffff801`8fa01e40 fffff801`8fa01e40 00000000`00000138 00000000`00000138 : nt!MiProcessWorkingSets+0x219
ffff880c`9b33fa60 fffff801`8f7afe30 : 00000000`ffffffff 00000000`00000006 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0xa2
ffff880c`9b33fb20 fffff801`8f6a8f87 : ffff9c8b`a1b7f040 00000000`00000080 fffff801`8f7afce0 00000000`00000000 : nt!KeBalanceSetManager+0x150
ffff880c`9b33fc10 fffff801`8f7e9676 : fffff801`8e6d5180 ffff9c8b`a1b7f040 fffff801`8f6a8f40 00000000`00000000 : nt!PspSystemThreadStartup+0x47
ffff880c`9b33fc60 00000000`00000000 : ffff880c`9b340000 ffff880c`9b33a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!MiDemoteCombinedPte+46

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP: 5a29b8d4

STACK_COMMAND: .cxr 0xffff880c9b33e440 ; kb

IMAGE_NAME: memory_corruption

FAILURE_BUCKET_ID: X64_AV_nt!MiDemoteCombinedPte+46

BUCKET_ID: X64_AV_nt!MiDemoteCombinedPte+46

Followup: MachineOwner
---------



This free analysis is provided by OSR Open Systems Resources, Inc.
Want a deeper understanding of crash dump analysis? Check out our Windows Kernel Debugging and Crash Dump Analysis Seminar (opens in new tab/window)
 
rash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 8 Kernel Version 16299 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 16299.15.amd64fre.rs3_release.170928-1534
Machine Name:
Kernel base = 0xfffff800`f849d000 PsLoadedModuleList = 0xfffff800`f87feff0
Debug session time: Thu Dec 14 11:18:18.569 2017 (UTC - 5:00)
System Uptime: 0 days 22:33:01.278
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, The subtype of the bugcheck.
Arg2: ffff9481033fcc78
Arg3: 0000020000000000
Arg4: 0000000000000000

Debugging Details:
------------------

TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

BUGCHECK_STR: 0x1a_41792

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: NVDisplay.Cont

CURRENT_IRQL: 2

LAST_CONTROL_TRANSFER: from fffff800f8639e20 to fffff800f86010e0

STACK_TEXT:
ffff858d`3761b568 fffff800`f8639e20 : 00000000`0000001a 00000000`00041792 ffff9481`033fcc78 00000200`00000000 : nt!KeBugCheckEx
ffff858d`3761b570 fffff800`f85145e6 : 00000000`00000000 ffffc204`ced8b080 00000000`00000000 ffffc204`ce782080 : nt!MiDeleteVirtualAddresses+0x1223a0
ffff858d`3761b860 fffff800`f8988842 : ffffc204`d64e0010 ffffc204`d64e0010 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x3b6
ffff858d`3761b9b0 fffff800`f898866c : 00000206`7f950000 ffff858d`3761bb80 ffffc204`d64e0010 00000000`00000000 : nt!MiUnmapVad+0x32
ffff858d`3761b9e0 fffff800`f8988546 : ffffc204`ce782080 00000000`00000008 ffffc204`c80f6930 00000206`7f950000 : nt!MiUnmapViewOfSection+0xec
ffff858d`3761bab0 fffff800`f860c553 : ffffc204`ced8b080 00000206`7f1a3478 ffffc204`ced8b080 ffffc204`ce782080 : nt!NtUnmapViewOfSectionEx+0x86
ffff858d`3761bb00 00007fff`6a5a3674 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000028`21afe3c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fff`6a5a3674


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!MiDeleteVirtualAddresses+1223a0
fffff800`f8639e20 cc int 3

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nt!MiDeleteVirtualAddresses+1223a0

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP: 5a29b8d4

IMAGE_NAME: memory_corruption

FAILURE_BUCKET_ID: X64_0x1a_41792_nt!MiDeleteVirtualAddresses+1223a0

BUCKET_ID: X64_0x1a_41792_nt!MiDeleteVirtualAddresses+1223a0

Followup: MachineOwner
---------



This free analysis is provided by OSR Open Systems Resources, Inc.
Want a deeper understanding of crash dump analysis? Check out our Windows Kernel Debugging and Crash Dump Analysis Seminar (opens in new tab/window)
expand.gif
Crash Code Links

expand.gif
Loaded Module List

expand.gif
Raw Stack Contents

expand.gif
Dump Header Information

expand.gif
Strings


ANALYSIS OF YESTERDAYS DUMP
 
Back
Top Bottom