Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (
http://www.osr.com)
Online Crash Dump Analysis Service
See
OSR Online - The Home Page for Windows Driver Developers for more information
Windows 8 Kernel Version 14393 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 14393.1358.amd64fre.rs1_release.170602-2252
Machine Name:
Kernel base = 0xfffff803`eea83000 PsLoadedModuleList = 0xfffff803`eed82000
Debug session time: Sun Jun 18 11:17:48.051 2017 (UTC - 4:00)
System Uptime: 2 days 23:44:38.964
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SESSION_HAS_VALID_POOL_ON_EXIT (ab)
Caused by a session driver not freeing its pool allocations prior to a
session unload. This indicates a bug in win32k.sys, atmfd.dll,
rdpdd.dll or a video driver.
Arguments:
Arg1: 0000000000000009, session ID
Arg2: 0000000000000130, number of paged pool bytes that are leaking
Arg3: 0000000000000000, number of nonpaged pool bytes that are leaking
Arg4: 0000000000000001, total number of paged and nonpaged allocations that are leaking.
nonpaged allocations are in the upper half of this word,
paged allocations are in the lower half of this word.
Debugging Details:
------------------
***** Kernel symbols are WRONG. Please fix symbols to do analysis.
ADDITIONAL_DEBUG_TEXT:
Use '!findthebuild' command to search for the target build information.
If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols.
FAULTING_MODULE: fffff803eea83000 nt
DEBUG_FLR_IMAGE_TIMESTAMP: 0
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0xAB
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff803eee499f5 to fffff803eee53d53
STACK_TEXT:
ffffac80`bbc4f540 fffff803`eee499f5 : ffffffff`ffffffff 00000000`00000001 00000000`0025f600 00000000`0025f4e7 : nt!IoUnregisterShutdownNotification+0xb93
ffffac80`bbc4f590 fffff803`eee53a17 : ffffac80`bbc4f6a8 fffff803`00000008 ffffd302`00000000 00000259`00000000 : nt!PoSetFixedWakeSource+0xc21
ffffac80`bbc4f670 fffff803`ef0a3f37 : ffffd302`f08ff010 ffffd302`f08ff010 ffffac80`bbc4f938 ffffac80`bbc4f938 : nt!IoUnregisterShutdownNotification+0x857
ffffac80`bbc4f730 fffff803`ef099d98 : 00000000`00000000 ffffc282`5615a180 ffffc282`6f4995e0 ffffc282`5615a180 : nt!NtSetQuotaInformationFile+0x29b
ffffac80`bbc4f8d0 fffff803`ef099c0e : ffffffff`80000ae0 00000000`00000000 00000000`00000000 00000000`000000ab : nt!DbgkWerCaptureLiveKernelDump+0x324
ffffac80`bbc4f930 fffff648`8c9ade32 : fffff604`40000fb0 ffffac80`bbc4f9e0 00000000`00000001 00000000`00000001 : nt!DbgkWerCaptureLiveKernelDump+0x19a
ffffac80`bbc4f980 fffff604`40000fb0 : ffffac80`bbc4f9e0 00000000`00000001 00000000`00000001 00000000`00000000 : win32kfull+0x1ade32
ffffac80`bbc4f988 ffffac80`bbc4f9e0 : 00000000`00000001 00000000`00000001 00000000`00000000 00000000`00000001 : 0xfffff604`40000fb0
ffffac80`bbc4f990 00000000`00000001 : 00000000`00000001 00000000`00000000 00000000`00000001 ffffac80`bbc4f9d0 : 0xffffac80`bbc4f9e0
ffffac80`bbc4f998 00000000`00000001 : 00000000`00000000 00000000`00000001 ffffac80`bbc4f9d0 fffff648`8c9f0c50 : 0x1
ffffac80`bbc4f9a0 00000000`00000000 : 00000000`00000001 ffffac80`bbc4f9d0 fffff648`8c9f0c50 ffffd302`00000000 : 0x1
STACK_COMMAND: kb
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
Followup: memory_corruption
---------
This free analysis is provided by OSR Open Systems Resources, Inc.
Want a deeper understanding of crash dump analysis? Check out our Windows Kernel Debugging and Crash Dump Analysis Seminar (opens in new tab/window)