3D Mark11 stress test bsod 0x1a MEMORY_MANAGEMENT请各位大神帮忙看下
Windows内核调试
3D Mark11 stress test bsod 0x1a MEMORY_MANAGEMENT请各位大神帮忙看下
jerry_hb
2015-04-20, 12:40 下午
Hi 各位大神,
我们在跑3D Mark11 stress test时有碰到bsod 0x1a MEMORY_MANAGEMENT issue,failrate 2/120 by units.
Minidump如附件,请帮忙看下这个与什么有关。
Thank you!
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41792, fffff680122068b8, ffff0000, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+1644a )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff680122068b8
Arg3: 00000000ffff0000
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41792
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: conhost.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
LAST_CONTROL_TRANSFER: from fffff8036dfec2fa to fffff8036dfc59a0
STACK_TEXT:
ffffd001`af63b848 fffff803`6dfec2fa : 00000000`0000001a 00000000`00041792 fffff680`122068b8 00000000`ffff0000 : nt!KeBugCheckEx
ffffd001`af63b850 fffff803`6df377b8 : ffffd001`00000000 00000000`00000026 00000000`00000000 00000000`00000026 : nt! ?? ::FNODOBFM::`string'+0x1644a
ffffd001`af63bae0 fffff803`6dfd11b3 : 00000000`00000000 00000024`4087dea0 00000000`00000001 ffffe000`58c99540 : nt!NtFreeVirtualMemory+0xa48
ffffd001`af63bc40 00007ff9`119f0e2a : 00007ff9`11980bca 00000000`003c003a 00000024`4087e4c0 37f682b0`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000024`4087dbd8 00007ff9`11980bca : 00000000`003c003a 00000024`4087e4c0 37f682b0`00000000 00000000`00000000 : ntdll!NtFreeVirtualMemory+0xa
00000024`4087dbe0 00007ff9`1198019a : 00000024`40c90000 00000024`4087e2f8 00000000`00001002 00000000`00000000 : ntdll!RtlpSecMemFreeVirtualMemory+0x26
00000024`4087dc10 00007ff9`0eb8b2f3 : 00007ff9`0ebf26b0 00007ff9`119bf9fe 00007ff9`0ec73b90 00000024`4087e2f8 : ntdll!RtlCreateHeap+0x93a
00000024`4087de00 00007ff9`10c78518 : 00000024`4087dea0 00007ff9`10c72790 00000024`4087e2f8 00007ff9`10c72790 : KERNELBASE!HeapCreate+0x47
00000024`4087de40 00007ff9`10c7845a : 00000024`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : msvcrt!heap_init+0x18
00000024`4087de70 00007ff9`10c7755e : 00000000`00000000 00000000`00000000 00000024`4087e270 00000000`00000001 : msvcrt!core_crt_dll_init+0xcc
00000024`4087dfe0 00007ff9`1197dcf4 : 00000000`00000001 00007ff9`10c72790 00000000`01000000 00000024`4087e090 : msvcrt!__CRTDLL_INIT+0x13
00000024`4087e010 00007ff9`1197d46e : 00000024`40a03650 00007ff9`10c70000 005c0032`00000001 0033004d`004d0049 : ntdll!LdrpCallInitRoutine+0x4c
00000024`4087e070 00007ff9`1197d264 : 00000024`40a03770 00000000`00000000 00000024`40a039d0 00007ff9`10c72790 : ntdll!LdrpInitializeNode+0x176
00000024`4087e180 00007ff9`1197d2a0 : 00000000`00000000 00000024`40a039d0 00000024`4087e200 00000000`00000000 : ntdll!LdrpInitializeGraph+0x38
00000024`4087e1c0 00007ff9`119812cf : 00000024`40a03801 00000024`40a038b0 00000024`4087e260 00007ff9`11998a07 : ntdll!LdrpInitializeGraph+0x74
00000024`4087e200 00007ff9`11996291 : 00000000`00000000 00000000`00000000 00000024`4087e360 00000024`4087e360 : ntdll!LdrpPrepareModuleForExecution+0x13f
00000024`4087e260 00007ff9`0eb84250 : 00000000`003c003a 00000024`4087e4c0 00000000`00000000 00007ff9`0eb829ef : ntdll!LdrGetProcedureAddressForCaller+0x2a1
00000024`4087e450 00007ff9`10afe804 : 00007ff9`11200000 00007ff9`119c8313 00000024`4087e7f0 00000000`00000001 : KERNELBASE!GetProcAddressForCaller+0x70
00000024`4087e4a0 00007ff9`10afdc92 : 00007ff9`10b8e4a0 00000024`4087e7f0 00007ff9`c0000001 00007ff9`10b216e8 : USER32!InitializeImmEntryTable+0x6c
00000024`4087e6f0 00007ff9`1197dcf4 : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000000 : USER32!_UserClientDllInitialize+0x2ba
00000024`4087ee70 00007ff9`1197d46e : 00000024`40a033f0 00007ff9`10af0000 00000000`00000001 00000000`00000000 : ntdll!LdrpCallInitRoutine+0x4c
00000024`4087eed0 00007ff9`1197d264 : 00000024`40a02520 00007ff9`119cbf00 00000024`40a01f60 00007ff9`10afdec0 : ntdll!LdrpInitializeNode+0x176
00000024`4087efe0 00007ff9`1197d2a0 : 00000000`00000000 00000024`40a01f60 00000024`4087f060 00007ff6`f5626000 : ntdll!LdrpInitializeGraph+0x38
00000024`4087f020 00007ff9`11a2426c : 00000000`00000000 00000000`00000010 00000024`4087f0b4 00007ff6`f5626000 : ntdll!LdrpInitializeGraph+0x74
00000024`4087f060 00007ff9`11a034e8 : 00007ff9`11960000 00000000`00000000 00007ff6`f5626000 00000000`00000000 : ntdll!LdrpInitializeProcess+0x19c4
00000024`4087f380 00007ff9`1197a65e : 00000024`4087f440 00000000`00000000 00007ff6`f5626000 00000000`00000000 : ntdll!_LdrpInitialize+0x88e38
00000024`4087f3f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!LdrInitializeThunk+0xe
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+1644a
fffff803`6dfec2fa cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+1644a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 54503718
BUCKET_ID_FUNC_OFFSET: 1644a
FAILURE_BUCKET_ID: 0x1a_41792_nt!_??_::FNODOBFM::_string_
BUCKET_ID: 0x1a_41792_nt!_??_::FNODOBFM::_string_
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_41792_nt!_??_::fnodobfm::_string_
FAILURE_ID_HASH: {e00e25fc-1d2f-6e67-bb24-ba96083192fa}
Followup: MachineOwner
---------
1: kd> !thread
THREAD ffffe00058ea5880 Cid 0c88.0c84 Teb: 00007ff6f562e000 Win32Thread: 0000000000000000 RUNNING on processor 1
Not impersonating
DeviceMap ffffc0004c4501c0
Owning Process ffffe00058ea0900 Image: conhost.exe
Attached Process N/A Image: N/A
Wait Start TickCount 2685 Ticks: 0
Context Switch Count 7 IdealProcessor: 0
UserTime 00:00:00.015
KernelTime 00:00:00.000
Win32 Start Address conhost!WinMainCRTStartup (0x00007ff6f6039040)
Stack Init ffffd001af63bdd0 Current ffffd001af63b5e0
Base ffffd001af63c000 Limit ffffd001af636000 Call 0
Priority 14 BasePriority 8 UnusualBoost 5 ForegroundBoost 0 IoPriority 2 PagePriority 5
Child-SP RetAddr : Args to Child : Call Site
ffffd001`af63b848 fffff803`6dfec2fa : 00000000`0000001a 00000000`00041792 fffff680`122068b8 00000000`ffff0000 : nt!KeBugCheckEx
ffffd001`af63b850 fffff803`6df377b8 : ffffd001`00000000 00000000`00000026 00000000`00000000 00000000`00000026 : nt! ?? ::FNODOBFM::`string'+0x1644a
ffffd001`af63bae0 fffff803`6dfd11b3 : 00000000`00000000 00000024`4087dea0 00000000`00000001 ffffe000`58c99540 : nt!NtFreeVirtualMemory+0xa48
ffffd001`af63bc40 00007ff9`119f0e2a : 00007ff9`11980bca 00000000`003c003a 00000024`4087e4c0 37f682b0`00000000 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ ffffd001`af63bc40)
00000024`4087dbd8 00007ff9`11980bca : 00000000`003c003a 00000024`4087e4c0 37f682b0`00000000 00000000`00000000 : ntdll!NtFreeVirtualMemory+0xa
00000024`4087dbe0 00007ff9`1198019a : 00000024`40c90000 00000024`4087e2f8 00000000`00001002 00000000`00000000 : ntdll!RtlpSecMemFreeVirtualMemory+0x26
00000024`4087dc10 00007ff9`0eb8b2f3 : 00007ff9`0ebf26b0 00007ff9`119bf9fe 00007ff9`0ec73b90 00000024`4087e2f8 : ntdll!RtlCreateHeap+0x93a
00000024`4087de00 00007ff9`10c78518 : 00000024`4087dea0 00007ff9`10c72790 00000024`4087e2f8 00007ff9`10c72790 : KERNELBASE!HeapCreate+0x47
00000024`4087de40 00007ff9`10c7845a : 00000024`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : msvcrt!heap_init+0x18
00000024`4087de70 00007ff9`10c7755e : 00000000`00000000 00000000`00000000 00000024`4087e270 00000000`00000001 : msvcrt!core_crt_dll_init+0xcc
00000024`4087dfe0 00007ff9`1197dcf4 : 00000000`00000001 00007ff9`10c72790 00000000`01000000 00000024`4087e090 : msvcrt!__CRTDLL_INIT+0x13
00000024`4087e010 00007ff9`1197d46e : 00000024`40a03650 00007ff9`10c70000 005c0032`00000001 0033004d`004d0049 : ntdll!LdrpCallInitRoutine+0x4c
00000024`4087e070 00007ff9`1197d264 : 00000024`40a03770 00000000`00000000 00000024`40a039d0 00007ff9`10c72790 : ntdll!LdrpInitializeNode+0x176
00000024`4087e180 00007ff9`1197d2a0 : 00000000`00000000 00000024`40a039d0 00000024`4087e200 00000000`00000000 : ntdll!LdrpInitializeGraph+0x38
00000024`4087e1c0 00007ff9`119812cf : 00000024`40a03801 00000024`40a038b0 00000024`4087e260 00007ff9`11998a07 : ntdll!LdrpInitializeGraph+0x74
00000024`4087e200 00007ff9`11996291 : 00000000`00000000 00000000`00000000 00000024`4087e360 00000024`4087e360 : ntdll!LdrpPrepareModuleForExecution+0x13f
00000024`4087e260 00007ff9`0eb84250 : 00000000`003c003a 00000024`4087e4c0 00000000`00000000 00007ff9`0eb829ef : ntdll!LdrGetProcedureAddressForCaller+0x2a1
00000024`4087e450 00007ff9`10afe804 : 00007ff9`11200000 00007ff9`119c8313 00000024`4087e7f0 00000000`00000001 : KERNELBASE!GetProcAddressForCaller+0x70
00000024`4087e4a0 00007ff9`10afdc92 : 00007ff9`10b8e4a0 00000024`4087e7f0 00007ff9`c0000001 00007ff9`10b216e8 : USER32!InitializeImmEntryTable+0x6c
00000024`4087e6f0 00007ff9`1197dcf4 : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000000 : USER32!_UserClientDllInitialize+0x2ba
00000024`4087ee70 00007ff9`1197d46e : 00000024`40a033f0 00007ff9`10af0000 00000000`00000001 00000000`00000000 : ntdll!LdrpCallInitRoutine+0x4c
00000024`4087eed0 00007ff9`1197d264 : 00000024`40a02520 00007ff9`119cbf00 00000024`40a01f60 00007ff9`10afdec0 : ntdll!LdrpInitializeNode+0x176
00000024`4087efe0 00007ff9`1197d2a0 : 00000000`00000000 00000024`40a01f60 00000024`4087f060 00007ff6`f5626000 : ntdll!LdrpInitializeGraph+0x38
00000024`4087f020 00007ff9`11a2426c : 00000000`00000000 00000000`00000010 00000024`4087f0b4 00007ff6`f5626000 : ntdll!LdrpInitializeGraph+0x74
00000024`4087f060 00007ff9`11a034e8 : 00007ff9`11960000 00000000`00000000 00007ff6`f5626000 00000000`00000000 : ntdll!LdrpInitializeProcess+0x19c4
00000024`4087f380 00007ff9`1197a65e : 00000024`4087f440 00000000`00000000 00007ff6`f5626000 00000000`00000000 : ntdll!_LdrpInitialize+0x88e38
00000024`4087f3f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!LdrInitializeThunk+0xe
1: kd> .trap ffffd001`af63bc40
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=00007ff9119f0e2a rsp=000000244087dbd8 rbp=0000000000008000
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
ntdll!NtFreeVirtualMemory+0xa:
0033:00007ff9`119f0e2a c3 ret
1: kd> !locks
**** DUMP OF ALL RESOURCE OBJECTS ****
KD: Scanning for held locks.
Resource @ nt!CmpRegistryLock (0xfffff8036e1d0780) Shared 3 owning threads
Contention Count = 5
Threads: ffffe00058ea7880-01<*> ffffe000582fc880-01<*> ffffe00058eb1080-01<*>
KD: Scanning for held locks.....
Resource @ 0xffffe00050efda20 Exclusively owned
Contention Count = 1
Threads: ffffe000584eb040-01<*>
KD: Scanning for held locks.
Resource @ 0xffffe00050f9b8b0 Exclusively owned
Contention Count = 2
Threads: ffffe000584eb040-01<*>
KD: Scanning for held locks......
Resource @ 0xffffe000539faa08 Shared 2 owning threads
Contention Count = 2
Threads: ffffe00058c6e080-01<*> ffffe00050921880-01<*>
KD: Scanning for held locks...............
Resource @ 0xffffe0004fd78d60 Exclusively owned
Contention Count = 1
Threads: ffffe000511372c0-01<*>
KD: Scanning for held locks..................................................................................................................................................................................
Resource @ 0xffffe00058d2bd00 Shared 1 owning threads
Threads: ffffe0005835d600-01<*>
KD: Scanning for held locks.................................................................................................................................................
Resource @ 0xffffe00058eb2c40 Exclusively owned
Threads: ffffe000584eb040-01<*>
Resource @ 0xffffe00058eb2cf0 Exclusively owned
Threads: ffffe000584eb040-01<*>
Resource @ 0xffffe000585c7850 Exclusively owned
Contention Count = 1
NumberOfSharedWaiters = 1
Threads: ffffe00058c6e080-01<*> ffffe00050921880-01
KD: Scanning for held locks.
11146 total locks, 9 locks currently held
1: kd> !thread ffffe000584eb040
THREAD ffffe000584eb040 Cid 0848.0970 Teb: 00007ff6573be000 Win32Thread: fffff9014072bb60 READY on processor 80000000
IRP List:
ffffe000576175d0: (0006,03e8) Flags: 00060a00 Mdl: 00000000
Not impersonating
DeviceMap ffffc0004bfb66b0
Owning Process ffffe000584d8900 Image: sppsvc.exe
Attached Process N/A Image: N/A
Wait Start TickCount 2684 Ticks: 1 (0:00:00:00.015)
Context Switch Count 479 IdealProcessor: 1
UserTime 00:00:00.312
KernelTime 00:00:00.015
Win32 Start Address ntdll!TppWorkerThread (0x00007ff9119933a0)
Stack Init ffffd001c4868dd0 Current ffffd001c4868110
Base ffffd001c4869000 Limit ffffd001c4863000 Call 0
Priority 8 BasePriority 8 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5
Child-SP RetAddr : Args to Child : Call Site
ffffd001`c4868150 fffff803`6dedec2b : 00000012`99adcc84 fffff803`00000000 00000000`00000009 00000000`ffffffff : nt!KiSwapContext+0x76
ffffd001`c4868290 fffff803`6dede52f : ffffe000`584eb040 ffffd001`c4868328 00000000`00000001 00000000`00000001 : nt!KiProcessDeferredReadyList+0x13b
ffffd001`c48682d0 fffff800`0ff6449d : ffffc000`4b549600 ffffd001`00000008 00000000`00000010 ffffc000`4b549600 : nt!KeSetPriorityThread+0x2bf
ffffd001`c4868370 fffff800`0ff662da : ffffc000`4b5e06a0 00000000`bb0155c3 ffffe000`50ef9180 00000000`00000000 : Ntfs!LfsFlushToLsnPriv+0x161
ffffd001`c4868410 fffff800`0ff67bc2 : ffffc000`4b5e06a0 00000000`bb0155c3 00000000`bb0155c3 ffffe000`50ef9180 : Ntfs!LfsFlushToLsnWithoutDiskCacheFlush+0xa2
ffffd001`c4868460 fffff800`0ff836a2 : 00000000`00000001 ffffe000`50ef9180 ffffe000`57bd3ca8 ffffc000`4eb41c00 : Ntfs!NtfsCommitCurrentTransaction+0x212
ffffd001`c48684f0 fffff800`0ff86842 : 00000000`00000702 ffffd001`c4868870 ffffc000`4eb41c00 ffffc000`4eb41c00 : Ntfs!NtfsCheckpointCurrentTransaction+0x3e
ffffd001`c4868520 fffff800`0feb1280 : ffffe000`57bd3ca8 ffffc000`4eb41b00 ffffc000`4eb41c30 00000000`00000701 : Ntfs!NtfsPostUsnChangeWithOverrideOption+0x31a
ffffd001`c4868600 fffff800`0feb4b87 : ffffe000`57bd3ca8 ffffe000`58eb2d01 00000000`00000000 ffffe000`57bd3ca8 : Ntfs!NtfsCommonWrite+0x8a0
ffffd001`c4868840 fffff800`0fd84b1e : ffffe000`58e83690 ffffe000`576175d0 00000000`00000001 ffffe000`57617970 : Ntfs!NtfsFsdWrite+0x203
ffffd001`c4868900 fffff800`0fd830c2 : ffffd001`c48689c0 ffffe000`50ecdba0 ffffe000`58eb2dd0 ffffe000`576175d0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2ce
ffffd001`c48689a0 fffff803`6e25b788 : 00000000`00000001 ffffd001`c4868a81 ffffe000`58eb2dd0 00000000`00000000 : fltmgr!FltpDispatch+0xb2
ffffd001`c4868a00 fffff803`6e2822d6 : ffffe000`58eb2d04 ffffe000`58eb2dd0 ffffd001`c4868b18 ffffe000`576175d0 : nt!IopSynchronousServiceTail+0x170
ffffd001`c4868ad0 fffff803`6dfd11b3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x682
ffffd001`c4868bd0 00007ff9`119f0cca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ ffffd001`c4868c40)
0000007b`d638df08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!NtWriteFile+0xa
1: kd> !thread ffffe000511372c0
THREAD ffffe000511372c0 Cid 0004.0114 Teb: 0000000000000000 Win32Thread: 0000000000000000 WAIT: (Executive) KernelMode Non-Alertable
ffffe00051167cd0 SynchronizationEvent
Not impersonating
DeviceMap ffffc0004b20c280
Owning Process ffffe0004fd804c0 Image: System
Attached Process N/A Image: N/A
Wait Start TickCount 2093 Ticks: 592 (0:00:00:09.250)
Context Switch Count 35 IdealProcessor: 1
UserTime 00:00:00.000
KernelTime 00:00:00.015
Win32 Start Address dxgkrnl!DpiPowerArbiterThread (0xfffff80010b4cf40)
Stack Init ffffd001ae570dd0 Current ffffd001ae5709b0
Base ffffd001ae571000 Limit ffffd001ae56b000 Call 0
Priority 8 BasePriority 8 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5
Child-SP RetAddr : Args to Child : Call Site
ffffd001`ae5709f0 fffff803`6dea6d7e : ffffd001`acfc0180 ffffe000`511372c0 00000000`fffffffe 00000000`fffffffe : nt!KiSwapContext+0x76
ffffd001`ae570b30 fffff803`6dea67f9 : ffffd894`4add3634 ffffe000`51167100 ffffd001`ae5bb900 ffffe000`51167100 : nt!KiSwapThread+0x14e
ffffd001`ae570bd0 fffff803`6dece8d0 : ffffe000`50944440 00000000`00000000 ffffe000`511372c0 ffffe000`5894a1b0 : nt!KiCommitThreadWait+0x129
ffffd001`ae570c50 fffff800`10b4cfa7 : ffffe000`51167cd0 ffffe000`00000000 ffffe000`50e1a000 fffff800`00000000 : nt!KeWaitForSingleObject+0x2c0
ffffd001`ae570ce0 fffff803`6df76c70 : ffffe000`51167c48 ffffe000`511372c0 00000000`00000080 ffffe000`511372c0 : dxgkrnl!DpiPowerArbiterThread+0x67
ffffd001`ae570d40 fffff803`6dfcbfc6 : fffff803`6e178180 ffffe000`511372c0 fffff803`6e1d1a00 ffffd001`ae570e89 : nt!PspSystemThreadStartup+0x58
ffffd001`ae570da0 00000000`00000000 : ffffd001`ae571000 ffffd001`ae56b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16