Followup: memory_corruption
---------
0: kd> !analyze -v
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000004477, A driver tried to write to an unallocated address in the
user space of the system process. Parameter 2 contains the
address of the attempted write.
Arg2: 00000000deadbf07
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page e893b not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page e893b not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 14393.693.amd64fre.rs1_release.161220-1747
SYSTEM_MANUFACTURER: LENOVO
SYSTEM_PRODUCT_NAME: 20354
SYSTEM_SKU: LENOVO_MT_20354_BU_idea_FM_Lenovo Z50-70
SYSTEM_VERSION: Lenovo Z50-70
BIOS_VENDOR: LENOVO
BIOS_VERSION: 9BCN91WW
BIOS_DATE: 07/21/2015
BASEBOARD_MANUFACTURER: LENOVO
BASEBOARD_PRODUCT: Lancer 5A5
BASEBOARD_VERSION: 31900058WIN
DUMP_TYPE: 1
BUGCHECK_P1: 4477
BUGCHECK_P2: deadbf07
BUGCHECK_P3: 0
BUGCHECK_P4: 0
BUGCHECK_STR: 0x1a_4477
CPU_COUNT: 4
CPU_MHZ: a22
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1D'00000000 (cache) 1D'00000000 (init)
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: NOSIGN-PC
ANALYSIS_SESSION_TIME: 01-31-2017 22:33:52.0356
ANALYSIS_VERSION: 10.0.14321.1024 x86fre
TRAP_FRAME: ffffcc818ade2840 -- (.trap 0xffffcc818ade2840)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe10c5c6ef788 rbx=0000000000000000 rcx=7ff0f8e2de790000
rdx=00000000deadbeef rsi=0000000000000000 rdi=0000000000000000
rip=fffff809989674b2 rsp=ffffcc818ade29d0 rbp=0000000000000000
r8=ffffe10c5c6d5f80 r9=00000000000000a4 r10=00000000000000b0
r11=ffffe10c5b8b9260 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
bcmwl63a+0x1774b2:
fffff809`989674b2 44896f18 mov dword ptr [rdi+18h],r13d ds:00000000`00000018=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff802971a208f to fffff802971566f0
STACK_TEXT:
ffffcc81`8ade2578 fffff802`971a208f : 00000000`0000001a 00000000`00004477 00000000`deadbf07 00000000`00000000 : nt!KeBugCheckEx
ffffcc81`8ade2580 fffff802`970b40e6 : 00000000`00000002 00000000`deadbf07 ffffcc81`8ade27b0 ffffcc81`8ade2840 : nt! ?? ::FNODOBFM::`string'+0x3c4ff
ffffcc81`8ade2640 fffff802`9715fcfc : ffffe10c`5c254010 ffffe10c`5f47f010 ffffe10c`5c6d5826 fffff809`988b0000 : nt!MmAccessFault+0x2f6
ffffcc81`8ade2840 fffff809`989674b2 : ffffe10c`00000000 00000000`00000000 00000000`0000c000 ffffe10c`5c27d890 : nt!KiPageFault+0x13c
ffffcc81`8ade29d0 fffff809`989a8031 : ffffe10c`00000020 ffffe10c`5c27e000 ffffcc81`00000003 ffffcc81`8ade2ae0 : bcmwl63a+0x1774b2
ffffcc81`8ade2a40 fffff809`988096ac : ffffe10c`5c27e2e8 ffffe10c`5c27e000 ffffe10c`5c27e000 00000000`00000000 : bcmwl63a+0x1b8031
ffffcc81`8ade2ab0 fffff809`98822cd0 : 00000000`00000000 00000000`00000000 ffffe10c`5c27e000 fffff802`973c9550 : bcmwl63a+0x196ac
ffffcc81`8ade2ae0 fffff802`97060d80 : ffffe10c`5b539430 ffffe10c`5b3fc050 ffffe10c`5ac986e0 00000000`00000000 : bcmwl63a+0x32cd0
ffffcc81`8ade2b10 fffff802`970a31b9 : fffff802`973c9100 ffffe10c`573e8040 fffff802`97060c90 fffff802`00000000 : nt!IopProcessWorkItem+0xf0
ffffcc81`8ade2b80 fffff802`9700e729 : ffffcc81`8a802180 00000000`00000080 ffffe10c`5327c040 ffffe10c`573e8040 : nt!ExpWorkerThread+0xe9
ffffcc81`8ade2c10 fffff802`9715bbb6 : ffffcc81`8a802180 ffffe10c`573e8040 fffff802`9700e6e8 41000000`b2b94100 : nt!PspSystemThreadStartup+0x41
ffffcc81`8ade2c60 00000000`00000000 : ffffcc81`8ade3000 ffffcc81`8addd000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
TARGET_TIME: 2017-01-31T20:55:41.000Z
OSBUILD: 14393
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2016-12-21 07:50:57
BUILDDATESTAMP_STR: 161220-1747
BUILDLAB_STR: rs1_release
BUILDOSVER_STR: 10.0.14393.693.amd64fre.rs1_release.161220-1747
ANALYSIS_SESSION_ELAPSED_TIME: 252b
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
Nota.: Cortadas las partes repetitivas.
---------
0: kd> !analyze -v
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000004477, A driver tried to write to an unallocated address in the
user space of the system process. Parameter 2 contains the
address of the attempted write.
Arg2: 00000000deadbf07
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page e893b not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page e893b not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 14393.693.amd64fre.rs1_release.161220-1747
SYSTEM_MANUFACTURER: LENOVO
SYSTEM_PRODUCT_NAME: 20354
SYSTEM_SKU: LENOVO_MT_20354_BU_idea_FM_Lenovo Z50-70
SYSTEM_VERSION: Lenovo Z50-70
BIOS_VENDOR: LENOVO
BIOS_VERSION: 9BCN91WW
BIOS_DATE: 07/21/2015
BASEBOARD_MANUFACTURER: LENOVO
BASEBOARD_PRODUCT: Lancer 5A5
BASEBOARD_VERSION: 31900058WIN
DUMP_TYPE: 1
BUGCHECK_P1: 4477
BUGCHECK_P2: deadbf07
BUGCHECK_P3: 0
BUGCHECK_P4: 0
BUGCHECK_STR: 0x1a_4477
CPU_COUNT: 4
CPU_MHZ: a22
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 1D'00000000 (cache) 1D'00000000 (init)
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: NOSIGN-PC
ANALYSIS_SESSION_TIME: 01-31-2017 22:33:52.0356
ANALYSIS_VERSION: 10.0.14321.1024 x86fre
TRAP_FRAME: ffffcc818ade2840 -- (.trap 0xffffcc818ade2840)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe10c5c6ef788 rbx=0000000000000000 rcx=7ff0f8e2de790000
rdx=00000000deadbeef rsi=0000000000000000 rdi=0000000000000000
rip=fffff809989674b2 rsp=ffffcc818ade29d0 rbp=0000000000000000
r8=ffffe10c5c6d5f80 r9=00000000000000a4 r10=00000000000000b0
r11=ffffe10c5b8b9260 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
bcmwl63a+0x1774b2:
fffff809`989674b2 44896f18 mov dword ptr [rdi+18h],r13d ds:00000000`00000018=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff802971a208f to fffff802971566f0
STACK_TEXT:
ffffcc81`8ade2578 fffff802`971a208f : 00000000`0000001a 00000000`00004477 00000000`deadbf07 00000000`00000000 : nt!KeBugCheckEx
ffffcc81`8ade2580 fffff802`970b40e6 : 00000000`00000002 00000000`deadbf07 ffffcc81`8ade27b0 ffffcc81`8ade2840 : nt! ?? ::FNODOBFM::`string'+0x3c4ff
ffffcc81`8ade2640 fffff802`9715fcfc : ffffe10c`5c254010 ffffe10c`5f47f010 ffffe10c`5c6d5826 fffff809`988b0000 : nt!MmAccessFault+0x2f6
ffffcc81`8ade2840 fffff809`989674b2 : ffffe10c`00000000 00000000`00000000 00000000`0000c000 ffffe10c`5c27d890 : nt!KiPageFault+0x13c
ffffcc81`8ade29d0 fffff809`989a8031 : ffffe10c`00000020 ffffe10c`5c27e000 ffffcc81`00000003 ffffcc81`8ade2ae0 : bcmwl63a+0x1774b2
ffffcc81`8ade2a40 fffff809`988096ac : ffffe10c`5c27e2e8 ffffe10c`5c27e000 ffffe10c`5c27e000 00000000`00000000 : bcmwl63a+0x1b8031
ffffcc81`8ade2ab0 fffff809`98822cd0 : 00000000`00000000 00000000`00000000 ffffe10c`5c27e000 fffff802`973c9550 : bcmwl63a+0x196ac
ffffcc81`8ade2ae0 fffff802`97060d80 : ffffe10c`5b539430 ffffe10c`5b3fc050 ffffe10c`5ac986e0 00000000`00000000 : bcmwl63a+0x32cd0
ffffcc81`8ade2b10 fffff802`970a31b9 : fffff802`973c9100 ffffe10c`573e8040 fffff802`97060c90 fffff802`00000000 : nt!IopProcessWorkItem+0xf0
ffffcc81`8ade2b80 fffff802`9700e729 : ffffcc81`8a802180 00000000`00000080 ffffe10c`5327c040 ffffe10c`573e8040 : nt!ExpWorkerThread+0xe9
ffffcc81`8ade2c10 fffff802`9715bbb6 : ffffcc81`8a802180 ffffe10c`573e8040 fffff802`9700e6e8 41000000`b2b94100 : nt!PspSystemThreadStartup+0x41
ffffcc81`8ade2c60 00000000`00000000 : ffffcc81`8ade3000 ffffcc81`8addd000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
TARGET_TIME: 2017-01-31T20:55:41.000Z
OSBUILD: 14393
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2016-12-21 07:50:57
BUILDDATESTAMP_STR: 161220-1747
BUILDLAB_STR: rs1_release
BUILDOSVER_STR: 10.0.14393.693.amd64fre.rs1_release.161220-1747
ANALYSIS_SESSION_ELAPSED_TIME: 252b
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
Nota.: Cortadas las partes repetitivas.
Comentario