- ************* Preparing the environment for Debugger Extensions Gallery repositories **************
 - ExtensionRepository : Implicit
 - UseExperimentalFeatureForNugetShare : true
 - AllowNugetExeUpdate : true
 - NonInteractiveNuget : true
 - AllowNugetMSCredentialProviderInstall : true
 - AllowParallelInitializationOfLocalRepositories : true
 - EnableRedirectToV8JsProvider : false
 - -- Configuring repositories
 - ----> Repository : LocalInstalled, Enabled: true
 - ----> Repository : UserExtensions, Enabled: true
 - >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
 - ************* Waiting for Debugger Extensions Gallery to Initialize **************
 - >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.437 seconds
 - ----> Repository : UserExtensions, Enabled: true, Packages count: 0
 - ----> Repository : LocalInstalled, Enabled: true, Packages count: 41
 - Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
 - Copyright (c) Microsoft Corporation. All rights reserved.
 - Loading Dump File [C:\Windows\MEMORY.DMP]
 - Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
 - ************* Path validation summary **************
 - Response Time (ms) Location
 - Deferred srv*
 - Symbol search path is: srv*
 - Executable search path is:
 - Windows 10 Kernel Version 19041 MP (8 procs) Free x64
 - Product: WinNt, suite: TerminalServer SingleUserTS
 - Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
 - Kernel base = 0xfffff804`46a00000 PsLoadedModuleList = 0xfffff804`4762a820
 - Debug session time: Wed Jul 24 12:08:35.387 2024 (UTC + 2:00)
 - System Uptime: 0 days 0:04:20.113
 - Loading Kernel Symbols
 - ...............................................................
 - ...........Page 101a2c not present in the dump file. Type ".hh dbgerr004" for details
 - .....................................................
 - ................................................................
 - ......
 - Loading User Symbols
 - PEB is paged out (Peb.Ldr = 000000dc`9b394018). Type ".hh dbgerr001" for details
 - Loading unloaded module list
 - ......
 - For analysis of this file, run !analyze -v
 - nt!KeBugCheckEx:
 - fffff804`46dfdde0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff886`52ec9d10=0000000000000139
 - 4: kd> !analyze -v
 - *******************************************************************************
 - * *
 - * Bugcheck Analysis *
 - * *
 - *******************************************************************************
 - KERNEL_SECURITY_CHECK_FAILURE (139)
 - A kernel component has corrupted a critical data structure. The corruption
 - could potentially allow a malicious user to gain control of this machine.
 - Arguments:
 - Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
 - Arg2: fffff88652eca030, Address of the trap frame for the exception that caused the BugCheck
 - Arg3: fffff88652ec9f88, Address of the exception record for the exception that caused the BugCheck
 - Arg4: 0000000000000000, Reserved
 - Debugging Details:
 - ------------------
 - Unable to load image \SystemRoot\system32\DRIVERS\nfs41_driver.sys, Win32 error 0n2
 - KEY_VALUES_STRING: 1
 - Key : Analysis.CPU.mSec
 - Value: 5061
 - Key : Analysis.Elapsed.mSec
 - Value: 6187
 - Key : Analysis.IO.Other.Mb
 - Value: 0
 - Key : Analysis.IO.Read.Mb
 - Value: 2
 - Key : Analysis.IO.Write.Mb
 - Value: 1
 - Key : Analysis.Init.CPU.mSec
 - Value: 936
 - Key : Analysis.Init.Elapsed.mSec
 - Value: 36047
 - Key : Analysis.Memory.CommitPeak.Mb
 - Value: 92
 - Key : Bugcheck.Code.KiBugCheckData
 - Value: 0x139
 - Key : Bugcheck.Code.LegacyAPI
 - Value: 0x139
 - Key : Bugcheck.Code.TargetModel
 - Value: 0x139
 - Key : FailFast.Name
 - Value: CORRUPT_LIST_ENTRY
 - Key : FailFast.Type
 - Value: 3
 - Key : Failure.Bucket
 - Value: 0x139_3_CORRUPT_LIST_ENTRY_nfs41_driver!nfs41_downcall
 - Key : Failure.Hash
 - Value: {a27df1dd-f47c-8bad-92f0-22e713d43992}
 - Key : Hypervisor.Enlightenments.Value
 - Value: 12576
 - Key : Hypervisor.Enlightenments.ValueHex
 - Value: 3120
 - Key : Hypervisor.Flags.AnyHypervisorPresent
 - Value: 1
 - Key : Hypervisor.Flags.ApicEnlightened
 - Value: 0
 - Key : Hypervisor.Flags.ApicVirtualizationAvailable
 - Value: 0
 - Key : Hypervisor.Flags.AsyncMemoryHint
 - Value: 0
 - Key : Hypervisor.Flags.CoreSchedulerRequested
 - Value: 0
 - Key : Hypervisor.Flags.CpuManager
 - Value: 0
 - Key : Hypervisor.Flags.DeprecateAutoEoi
 - Value: 1
 - Key : Hypervisor.Flags.DynamicCpuDisabled
 - Value: 0
 - Key : Hypervisor.Flags.Epf
 - Value: 0
 - Key : Hypervisor.Flags.ExtendedProcessorMasks
 - Value: 0
 - Key : Hypervisor.Flags.HardwareMbecAvailable
 - Value: 0
 - Key : Hypervisor.Flags.MaxBankNumber
 - Value: 0
 - Key : Hypervisor.Flags.MemoryZeroingControl
 - Value: 0
 - Key : Hypervisor.Flags.NoExtendedRangeFlush
 - Value: 1
 - Key : Hypervisor.Flags.NoNonArchCoreSharing
 - Value: 0
 - Key : Hypervisor.Flags.Phase0InitDone
 - Value: 1
 - Key : Hypervisor.Flags.PowerSchedulerQos
 - Value: 0
 - Key : Hypervisor.Flags.RootScheduler
 - Value: 0
 - Key : Hypervisor.Flags.SynicAvailable
 - Value: 1
 - Key : Hypervisor.Flags.UseQpcBias
 - Value: 0
 - Key : Hypervisor.Flags.Value
 - Value: 536632
 - Key : Hypervisor.Flags.ValueHex
 - Value: 83038
 - Key : Hypervisor.Flags.VpAssistPage
 - Value: 1
 - Key : Hypervisor.Flags.VsmAvailable
 - Value: 0
 - Key : Hypervisor.RootFlags.AccessStats
 - Value: 0
 - Key : Hypervisor.RootFlags.CrashdumpEnlightened
 - Value: 0
 - Key : Hypervisor.RootFlags.CreateVirtualProcessor
 - Value: 0
 - Key : Hypervisor.RootFlags.DisableHyperthreading
 - Value: 0
 - Key : Hypervisor.RootFlags.HostTimelineSync
 - Value: 0
 - Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
 - Value: 0
 - Key : Hypervisor.RootFlags.IsHyperV
 - Value: 0
 - Key : Hypervisor.RootFlags.LivedumpEnlightened
 - Value: 0
 - Key : Hypervisor.RootFlags.MapDeviceInterrupt
 - Value: 0
 - Key : Hypervisor.RootFlags.MceEnlightened
 - Value: 0
 - Key : Hypervisor.RootFlags.Nested
 - Value: 0
 - Key : Hypervisor.RootFlags.StartLogicalProcessor
 - Value: 0
 - Key : Hypervisor.RootFlags.Value
 - Value: 0
 - Key : Hypervisor.RootFlags.ValueHex
 - Value: 0
 - Key : SecureKernel.HalpHvciEnabled
 - Value: 0
 - Key : WER.OS.Branch
 - Value: vb_release
 - Key : WER.OS.Version
 - Value: 10.0.19041.1
 - BUGCHECK_CODE: 139
 - BUGCHECK_P1: 3
 - BUGCHECK_P2: fffff88652eca030
 - BUGCHECK_P3: fffff88652ec9f88
 - BUGCHECK_P4: 0
 - FILE_IN_CAB: MEMORY.DMP
 - TRAP_FRAME: fffff88652eca030 -- (.trap 0xfffff88652eca030)
 - NOTE: The trap frame does not contain all registers.
 - Some register values may be zeroed or incorrect.
 - rax=fffff8044c016d38 rbx=0000000000000000 rcx=0000000000000003
 - rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
 - rip=fffff80446e2e2fb rsp=fffff88652eca1c0 rbp=fffff88652eca251
 - r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
 - r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
 - r14=0000000000000000 r15=0000000000000000
 - iopl=0 nv up ei pl nz ac pe nc
 - nt!KeWaitForSingleObject+0x1f6d2b:
 - fffff804`46e2e2fb cd29 int 29h
 - Resetting default scope
 - EXCEPTION_RECORD: fffff88652ec9f88 -- (.exr 0xfffff88652ec9f88)
 - ExceptionAddress: fffff80446e2e2fb (nt!KeWaitForSingleObject+0x00000000001f6d2b)
 - ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
 - ExceptionFlags: 00000001
 - NumberParameters: 1
 - Parameter[0]: 0000000000000003
 - Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
 - BLACKBOXBSD: 1 (!blackboxbsd)
 - BLACKBOXNTFS: 1 (!blackboxntfs)
 - BLACKBOXWINLOGON: 1
 - PROCESS_NAME: nfsd_debug.exe
 - ERROR_CODE: (NTSTATUS) 0xc0000409 - Das System hat in dieser Anwendung den berlauf eines stapelbasierten Puffers ermittelt. Dieser berlauf k nnte einem b sartigen Benutzer erm glichen, die Steuerung der Anwendung zu bernehmen.
 - EXCEPTION_CODE_STR: c0000409
 - EXCEPTION_PARAMETER1: 0000000000000003
 - EXCEPTION_STR: 0xc0000409
 - STACK_TEXT:
 - fffff886`52ec9d08 fffff804`46e125a9 : 00000000`00000139 00000000`00000003 fffff886`52eca030 fffff886`52ec9f88 : nt!KeBugCheckEx
 - fffff886`52ec9d10 fffff804`46e12b50 : 00000000`00000000 00000000`00000000 fffff886`52ec9f50 00000000`00000000 : nt!KiBugCheckDispatch+0x69
 - fffff886`52ec9e50 fffff804`46e109f2 : ffff950f`53c20a20 ffff950f`53c20a20 ffff950f`594be8b8 fffff804`4c010a30 : nt!KiFastFailDispatch+0xd0
 - fffff886`52eca030 fffff804`46e2e2fb : ffff950f`50e04380 fffff804`000001c0 fffff886`00000000 ffff950f`5812e010 : nt!KiRaiseSecurityCheckFailure+0x332
 - fffff886`52eca1c0 fffff804`46cf295a : fffff804`4c016d30 00000000`00000022 fffff804`4c02c600 ffff950f`583c9a00 : nt!KeWaitForSingleObject+0x1f6d2b
 - fffff886`52eca2b0 fffff804`46c3c2c2 : 00000000`00000000 ffff950f`583c9a60 fffff804`4c016d18 fffff804`46c3ad40 : nt!ExpAcquireFastMutexContended+0x7a
 - fffff886`52eca2f0 fffff804`4c002839 : ffff950f`583c9a60 fffff886`00000001 ffff950f`00000000 fffff886`00000000 : nt!ExAcquireFastMutex+0x162
 - fffff886`52eca340 fffff804`4bffca9e : ffff950f`53c20a20 00000000`0028201c fffff804`47725440 00000000`00000000 : nfs41_driver!nfs41_downcall+0x159 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c @ 2070]
 - fffff886`52eca3b0 fffff804`4c02c976 : ffff950f`53c20a20 ffff950f`53b78060 00000000`00000002 ffff950f`53c20a20 : nfs41_driver!nfs41_DevFcbXXXControlFile+0x13e [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c @ 2566]
 - fffff886`52eca430 fffff804`4c02c698 : ffff950f`53c20a20 ffff950f`53c20a20 ffff950f`53b78000 ffff950f`53c20a20 : nfs41_driver!RxXXXControlFileCallthru+0x76 [base\fs\rdr2\rdbss\ntdevfcb.c @ 130]
 - fffff886`52eca460 fffff804`4c009542 : 00000000`00000000 ffff950f`583c9a60 ffff950f`53b78001 00000000`00000000 : nfs41_driver!RxCommonDevFCBIoCtl+0x58 [base\fs\rdr2\rdbss\ntdevfcb.c @ 491]
 - fffff886`52eca490 fffff804`4c02397d : fffff804`4c016370 ffff950f`50e02100 ffff950f`59d01440 ffff950f`53b78060 : nfs41_driver!RxFsdCommonDispatch+0x442 [base\fs\rdr2\rdbss\ntfsd.c @ 848]
 - fffff886`52eca590 fffff804`4bffd8d7 : ffff950f`5806de40 00000000`00000002 fffff886`52eca630 00000000`0000000f : nfs41_driver!RxFsdDispatch+0xfd [base\fs\rdr2\rdbss\ntfsd.c @ 442]
 - fffff886`52eca5c0 fffff804`46c2d3f5 : ffff950f`53b78060 ffff950f`583c9a60 ffff950f`588e5730 fffff804`46c3cd1b : nfs41_driver!nfs41_FsdDispatch+0x67 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c @ 7284]
 - fffff886`52eca600 fffff804`4b16f248 : fffff804`4b168000 00000000`00000000 ffff950f`53989b60 ffff950f`5a2eae68 : nt!IofCallDriver+0x55
 - fffff886`52eca640 fffff804`4b16ed99 : ffff828e`1d6e6b90 00000000`00000000 fffff804`4b168000 00000000`00000000 : mup!MupiCallUncProvider+0xb8
 - fffff886`52eca6b0 fffff804`4b16ecce : ffff950f`583c9a60 ffff950f`5a2eae60 ffff950f`5ac2e500 00000000`00000000 : mup!MupStateMachine+0x59
 - fffff886`52eca6e0 fffff804`46c2d3f5 : ffff950f`5ac2e500 00000000`00000000 ffff950f`5806de40 00000000`00000001 : mup!MupFsdIrpPassThrough+0x17e
 - fffff886`52eca750 fffff804`444a4a76 : ffff950f`0028201c fffff886`52eca950 ffff950f`53b78060 fffff804`4701cdf1 : nt!IofCallDriver+0x55
 - fffff886`52eca790 fffff804`46c2d3f5 : 00000000`00000002 ffff950f`583c9c50 fffff886`20206f49 fffff886`52eca950 : FLTMGR!FltpDispatch+0xd6
 - fffff886`52eca7f0 fffff804`4701bddc : 00000000`00000001 00000000`0028201c ffff950f`5ac2e500 ffff950f`577df080 : nt!IofCallDriver+0x55
 - fffff886`52eca830 fffff804`4701ba2a : 00000000`0028201c fffff886`52ecab80 00000000`00000000 00000000`0028201c : nt!IopSynchronousServiceTail+0x34c
 - fffff886`52eca8d0 fffff804`4701ad06 : 00007ff7`4f06a8d0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xd0a
 - fffff886`52ecaa20 fffff804`46e11d05 : 00000000`00000000 fffff804`46c3d22e ffff950f`5766e080 000000dc`9b394000 : nt!NtDeviceIoControlFile+0x56
 - fffff886`52ecaa90 00007fff`064cd644 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
 - 000000dc`9cbfa358 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`064cd644
 - FAULTING_SOURCE_LINE: C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c
 - FAULTING_SOURCE_FILE: C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c
 - FAULTING_SOURCE_LINE_NUMBER: 2070
 - FAULTING_SOURCE_CODE:
 - 2066: goto out_free;
 - 2067: }
 - 2068:
 - 2069: ExAcquireFastMutex(&cur->lock);
 - > 2070: if (cur->state == NFS41_NOT_WAITING) {
 - 2071: DbgP("[downcall] Nobody is waiting for this request!!!\n");
 - 2072: switch(cur->opcode) {
 - 2073: case NFS41_WRITE:
 - 2074: case NFS41_READ:
 - 2075: MmUnmapLockedPages(cur->buf, cur->u.ReadWrite.MdlAddress);
 - SYMBOL_NAME: nfs41_driver!nfs41_downcall+159
 - MODULE_NAME: nfs41_driver
 - IMAGE_NAME: nfs41_driver.sys
 - STACK_COMMAND: .cxr; .ecxr ; kb
 - BUCKET_ID_FUNC_OFFSET: 159
 - FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nfs41_driver!nfs41_downcall
 - OS_VERSION: 10.0.19041.1
 - BUILDLAB_STR: vb_release
 - OSPLATFORM_TYPE: x64
 - OSNAME: Windows 10
 - FAILURE_ID_HASH: {a27df1dd-f47c-8bad-92f0-22e713d43992}
 - Followup: MachineOwner
 - ---------
 
kernel crash in |nfs41_downcall()|
Posted by Anonymous on Wed 24th Jul 2024 11:13
raw | new post
view followups (newest first): Code using |QueueUserAPC()| which triggers kernel crash in |nfs41_downcall()| by Anonymous
Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.
 nrubsig.kpaste.net RSS