- ************* Preparing the environment for Debugger Extensions Gallery repositories **************
- ExtensionRepository : Implicit
- UseExperimentalFeatureForNugetShare : true
- AllowNugetExeUpdate : true
- NonInteractiveNuget : true
- AllowNugetMSCredentialProviderInstall : true
- AllowParallelInitializationOfLocalRepositories : true
- EnableRedirectToV8JsProvider : false
- -- Configuring repositories
- ----> Repository : LocalInstalled, Enabled: true
- ----> Repository : UserExtensions, Enabled: true
- >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
- ************* Waiting for Debugger Extensions Gallery to Initialize **************
- >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.437 seconds
- ----> Repository : UserExtensions, Enabled: true, Packages count: 0
- ----> Repository : LocalInstalled, Enabled: true, Packages count: 41
- Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\MEMORY.DMP]
- Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
- ************* Path validation summary **************
- Response Time (ms) Location
- Deferred srv*
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 19041 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
- Kernel base = 0xfffff804`46a00000 PsLoadedModuleList = 0xfffff804`4762a820
- Debug session time: Wed Jul 24 12:08:35.387 2024 (UTC + 2:00)
- System Uptime: 0 days 0:04:20.113
- Loading Kernel Symbols
- ...............................................................
- ...........Page 101a2c not present in the dump file. Type ".hh dbgerr004" for details
- .....................................................
- ................................................................
- ......
- Loading User Symbols
- PEB is paged out (Peb.Ldr = 000000dc`9b394018). Type ".hh dbgerr001" for details
- Loading unloaded module list
- ......
- For analysis of this file, run !analyze -v
- nt!KeBugCheckEx:
- fffff804`46dfdde0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff886`52ec9d10=0000000000000139
- 4: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- KERNEL_SECURITY_CHECK_FAILURE (139)
- A kernel component has corrupted a critical data structure. The corruption
- could potentially allow a malicious user to gain control of this machine.
- Arguments:
- Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
- Arg2: fffff88652eca030, Address of the trap frame for the exception that caused the BugCheck
- Arg3: fffff88652ec9f88, Address of the exception record for the exception that caused the BugCheck
- Arg4: 0000000000000000, Reserved
- Debugging Details:
- ------------------
- Unable to load image \SystemRoot\system32\DRIVERS\nfs41_driver.sys, Win32 error 0n2
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 5061
- Key : Analysis.Elapsed.mSec
- Value: 6187
- Key : Analysis.IO.Other.Mb
- Value: 0
- Key : Analysis.IO.Read.Mb
- Value: 2
- Key : Analysis.IO.Write.Mb
- Value: 1
- Key : Analysis.Init.CPU.mSec
- Value: 936
- Key : Analysis.Init.Elapsed.mSec
- Value: 36047
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 92
- Key : Bugcheck.Code.KiBugCheckData
- Value: 0x139
- Key : Bugcheck.Code.LegacyAPI
- Value: 0x139
- Key : Bugcheck.Code.TargetModel
- Value: 0x139
- Key : FailFast.Name
- Value: CORRUPT_LIST_ENTRY
- Key : FailFast.Type
- Value: 3
- Key : Failure.Bucket
- Value: 0x139_3_CORRUPT_LIST_ENTRY_nfs41_driver!nfs41_downcall
- Key : Failure.Hash
- Value: {a27df1dd-f47c-8bad-92f0-22e713d43992}
- Key : Hypervisor.Enlightenments.Value
- Value: 12576
- Key : Hypervisor.Enlightenments.ValueHex
- Value: 3120
- Key : Hypervisor.Flags.AnyHypervisorPresent
- Value: 1
- Key : Hypervisor.Flags.ApicEnlightened
- Value: 0
- Key : Hypervisor.Flags.ApicVirtualizationAvailable
- Value: 0
- Key : Hypervisor.Flags.AsyncMemoryHint
- Value: 0
- Key : Hypervisor.Flags.CoreSchedulerRequested
- Value: 0
- Key : Hypervisor.Flags.CpuManager
- Value: 0
- Key : Hypervisor.Flags.DeprecateAutoEoi
- Value: 1
- Key : Hypervisor.Flags.DynamicCpuDisabled
- Value: 0
- Key : Hypervisor.Flags.Epf
- Value: 0
- Key : Hypervisor.Flags.ExtendedProcessorMasks
- Value: 0
- Key : Hypervisor.Flags.HardwareMbecAvailable
- Value: 0
- Key : Hypervisor.Flags.MaxBankNumber
- Value: 0
- Key : Hypervisor.Flags.MemoryZeroingControl
- Value: 0
- Key : Hypervisor.Flags.NoExtendedRangeFlush
- Value: 1
- Key : Hypervisor.Flags.NoNonArchCoreSharing
- Value: 0
- Key : Hypervisor.Flags.Phase0InitDone
- Value: 1
- Key : Hypervisor.Flags.PowerSchedulerQos
- Value: 0
- Key : Hypervisor.Flags.RootScheduler
- Value: 0
- Key : Hypervisor.Flags.SynicAvailable
- Value: 1
- Key : Hypervisor.Flags.UseQpcBias
- Value: 0
- Key : Hypervisor.Flags.Value
- Value: 536632
- Key : Hypervisor.Flags.ValueHex
- Value: 83038
- Key : Hypervisor.Flags.VpAssistPage
- Value: 1
- Key : Hypervisor.Flags.VsmAvailable
- Value: 0
- Key : Hypervisor.RootFlags.AccessStats
- Value: 0
- Key : Hypervisor.RootFlags.CrashdumpEnlightened
- Value: 0
- Key : Hypervisor.RootFlags.CreateVirtualProcessor
- Value: 0
- Key : Hypervisor.RootFlags.DisableHyperthreading
- Value: 0
- Key : Hypervisor.RootFlags.HostTimelineSync
- Value: 0
- Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
- Value: 0
- Key : Hypervisor.RootFlags.IsHyperV
- Value: 0
- Key : Hypervisor.RootFlags.LivedumpEnlightened
- Value: 0
- Key : Hypervisor.RootFlags.MapDeviceInterrupt
- Value: 0
- Key : Hypervisor.RootFlags.MceEnlightened
- Value: 0
- Key : Hypervisor.RootFlags.Nested
- Value: 0
- Key : Hypervisor.RootFlags.StartLogicalProcessor
- Value: 0
- Key : Hypervisor.RootFlags.Value
- Value: 0
- Key : Hypervisor.RootFlags.ValueHex
- Value: 0
- Key : SecureKernel.HalpHvciEnabled
- Value: 0
- Key : WER.OS.Branch
- Value: vb_release
- Key : WER.OS.Version
- Value: 10.0.19041.1
- BUGCHECK_CODE: 139
- BUGCHECK_P1: 3
- BUGCHECK_P2: fffff88652eca030
- BUGCHECK_P3: fffff88652ec9f88
- BUGCHECK_P4: 0
- FILE_IN_CAB: MEMORY.DMP
- TRAP_FRAME: fffff88652eca030 -- (.trap 0xfffff88652eca030)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=fffff8044c016d38 rbx=0000000000000000 rcx=0000000000000003
- rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff80446e2e2fb rsp=fffff88652eca1c0 rbp=fffff88652eca251
- r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
- r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz ac pe nc
- nt!KeWaitForSingleObject+0x1f6d2b:
- fffff804`46e2e2fb cd29 int 29h
- Resetting default scope
- EXCEPTION_RECORD: fffff88652ec9f88 -- (.exr 0xfffff88652ec9f88)
- ExceptionAddress: fffff80446e2e2fb (nt!KeWaitForSingleObject+0x00000000001f6d2b)
- ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
- ExceptionFlags: 00000001
- NumberParameters: 1
- Parameter[0]: 0000000000000003
- Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXWINLOGON: 1
- PROCESS_NAME: nfsd_debug.exe
- ERROR_CODE: (NTSTATUS) 0xc0000409 - Das System hat in dieser Anwendung den berlauf eines stapelbasierten Puffers ermittelt. Dieser berlauf k nnte einem b sartigen Benutzer erm glichen, die Steuerung der Anwendung zu bernehmen.
- EXCEPTION_CODE_STR: c0000409
- EXCEPTION_PARAMETER1: 0000000000000003
- EXCEPTION_STR: 0xc0000409
- STACK_TEXT:
- fffff886`52ec9d08 fffff804`46e125a9 : 00000000`00000139 00000000`00000003 fffff886`52eca030 fffff886`52ec9f88 : nt!KeBugCheckEx
- fffff886`52ec9d10 fffff804`46e12b50 : 00000000`00000000 00000000`00000000 fffff886`52ec9f50 00000000`00000000 : nt!KiBugCheckDispatch+0x69
- fffff886`52ec9e50 fffff804`46e109f2 : ffff950f`53c20a20 ffff950f`53c20a20 ffff950f`594be8b8 fffff804`4c010a30 : nt!KiFastFailDispatch+0xd0
- fffff886`52eca030 fffff804`46e2e2fb : ffff950f`50e04380 fffff804`000001c0 fffff886`00000000 ffff950f`5812e010 : nt!KiRaiseSecurityCheckFailure+0x332
- fffff886`52eca1c0 fffff804`46cf295a : fffff804`4c016d30 00000000`00000022 fffff804`4c02c600 ffff950f`583c9a00 : nt!KeWaitForSingleObject+0x1f6d2b
- fffff886`52eca2b0 fffff804`46c3c2c2 : 00000000`00000000 ffff950f`583c9a60 fffff804`4c016d18 fffff804`46c3ad40 : nt!ExpAcquireFastMutexContended+0x7a
- fffff886`52eca2f0 fffff804`4c002839 : ffff950f`583c9a60 fffff886`00000001 ffff950f`00000000 fffff886`00000000 : nt!ExAcquireFastMutex+0x162
- fffff886`52eca340 fffff804`4bffca9e : ffff950f`53c20a20 00000000`0028201c fffff804`47725440 00000000`00000000 : nfs41_driver!nfs41_downcall+0x159 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c @ 2070]
- fffff886`52eca3b0 fffff804`4c02c976 : ffff950f`53c20a20 ffff950f`53b78060 00000000`00000002 ffff950f`53c20a20 : nfs41_driver!nfs41_DevFcbXXXControlFile+0x13e [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c @ 2566]
- fffff886`52eca430 fffff804`4c02c698 : ffff950f`53c20a20 ffff950f`53c20a20 ffff950f`53b78000 ffff950f`53c20a20 : nfs41_driver!RxXXXControlFileCallthru+0x76 [base\fs\rdr2\rdbss\ntdevfcb.c @ 130]
- fffff886`52eca460 fffff804`4c009542 : 00000000`00000000 ffff950f`583c9a60 ffff950f`53b78001 00000000`00000000 : nfs41_driver!RxCommonDevFCBIoCtl+0x58 [base\fs\rdr2\rdbss\ntdevfcb.c @ 491]
- fffff886`52eca490 fffff804`4c02397d : fffff804`4c016370 ffff950f`50e02100 ffff950f`59d01440 ffff950f`53b78060 : nfs41_driver!RxFsdCommonDispatch+0x442 [base\fs\rdr2\rdbss\ntfsd.c @ 848]
- fffff886`52eca590 fffff804`4bffd8d7 : ffff950f`5806de40 00000000`00000002 fffff886`52eca630 00000000`0000000f : nfs41_driver!RxFsdDispatch+0xfd [base\fs\rdr2\rdbss\ntfsd.c @ 442]
- fffff886`52eca5c0 fffff804`46c2d3f5 : ffff950f`53b78060 ffff950f`583c9a60 ffff950f`588e5730 fffff804`46c3cd1b : nfs41_driver!nfs41_FsdDispatch+0x67 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c @ 7284]
- fffff886`52eca600 fffff804`4b16f248 : fffff804`4b168000 00000000`00000000 ffff950f`53989b60 ffff950f`5a2eae68 : nt!IofCallDriver+0x55
- fffff886`52eca640 fffff804`4b16ed99 : ffff828e`1d6e6b90 00000000`00000000 fffff804`4b168000 00000000`00000000 : mup!MupiCallUncProvider+0xb8
- fffff886`52eca6b0 fffff804`4b16ecce : ffff950f`583c9a60 ffff950f`5a2eae60 ffff950f`5ac2e500 00000000`00000000 : mup!MupStateMachine+0x59
- fffff886`52eca6e0 fffff804`46c2d3f5 : ffff950f`5ac2e500 00000000`00000000 ffff950f`5806de40 00000000`00000001 : mup!MupFsdIrpPassThrough+0x17e
- fffff886`52eca750 fffff804`444a4a76 : ffff950f`0028201c fffff886`52eca950 ffff950f`53b78060 fffff804`4701cdf1 : nt!IofCallDriver+0x55
- fffff886`52eca790 fffff804`46c2d3f5 : 00000000`00000002 ffff950f`583c9c50 fffff886`20206f49 fffff886`52eca950 : FLTMGR!FltpDispatch+0xd6
- fffff886`52eca7f0 fffff804`4701bddc : 00000000`00000001 00000000`0028201c ffff950f`5ac2e500 ffff950f`577df080 : nt!IofCallDriver+0x55
- fffff886`52eca830 fffff804`4701ba2a : 00000000`0028201c fffff886`52ecab80 00000000`00000000 00000000`0028201c : nt!IopSynchronousServiceTail+0x34c
- fffff886`52eca8d0 fffff804`4701ad06 : 00007ff7`4f06a8d0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xd0a
- fffff886`52ecaa20 fffff804`46e11d05 : 00000000`00000000 fffff804`46c3d22e ffff950f`5766e080 000000dc`9b394000 : nt!NtDeviceIoControlFile+0x56
- fffff886`52ecaa90 00007fff`064cd644 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
- 000000dc`9cbfa358 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`064cd644
- FAULTING_SOURCE_LINE: C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c
- FAULTING_SOURCE_FILE: C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c
- FAULTING_SOURCE_LINE_NUMBER: 2070
- FAULTING_SOURCE_CODE:
- 2066: goto out_free;
- 2067: }
- 2068:
- 2069: ExAcquireFastMutex(&cur->lock);
- > 2070: if (cur->state == NFS41_NOT_WAITING) {
- 2071: DbgP("[downcall] Nobody is waiting for this request!!!\n");
- 2072: switch(cur->opcode) {
- 2073: case NFS41_WRITE:
- 2074: case NFS41_READ:
- 2075: MmUnmapLockedPages(cur->buf, cur->u.ReadWrite.MdlAddress);
- SYMBOL_NAME: nfs41_driver!nfs41_downcall+159
- MODULE_NAME: nfs41_driver
- IMAGE_NAME: nfs41_driver.sys
- STACK_COMMAND: .cxr; .ecxr ; kb
- BUCKET_ID_FUNC_OFFSET: 159
- FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nfs41_driver!nfs41_downcall
- OS_VERSION: 10.0.19041.1
- BUILDLAB_STR: vb_release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {a27df1dd-f47c-8bad-92f0-22e713d43992}
- Followup: MachineOwner
- ---------
kernel crash in |nfs41_downcall()|
Posted by Anonymous on Wed 24th Jul 2024 11:13
raw | new post
view followups (newest first): Code using |QueueUserAPC()| which triggers kernel crash in |nfs41_downcall()| by Anonymous
Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.