Hi, my system suddenly crashed without bsod, and I'm trying to understand why and what happened.
I'm somewhat used to bsods thank to the infamous shield controller drivers, but this time the os simply froze while using chrome, blasting noise through the tv it was connected to. (the classic glitchy sound you can hear when something that was playing audio crashes).
No bsod was displayed, the pc just rebooted after few seconds. I'm excluding the possibility of the shield controller's involvement because
My machine is a brand new rog zephyrus m, (GM501GS-EI003T), running Windows10 Pro and Bitdefender Total Security
Here's what i got by running the dump file through WinDbg:
Here's the link to the
Thank you
I'm somewhat used to bsods thank to the infamous shield controller drivers, but this time the os simply froze while using chrome, blasting noise through the tv it was connected to. (the classic glitchy sound you can hear when something that was playing audio crashes).
No bsod was displayed, the pc just rebooted after few seconds. I'm excluding the possibility of the shield controller's involvement because
- the bluetooth was already turned off
- the log is different from the typical "xusb" crash
My machine is a brand new rog zephyrus m, (GM501GS-EI003T), running Windows10 Pro and Bitdefender Total Security
Here's what i got by running the dump file through WinDbg:
Code:
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8056d13e841, The address that the exception occurred at
Arg3: ffffca08bc3719c8, Exception Record Address
Arg4: fffff80568daf930, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on LUC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 4
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8056d13e841
BUGCHECK_P3: ffffca08bc3719c8
BUGCHECK_P4: fffff80568daf930
EXCEPTION_RECORD: ffffca08bc3719c8 -- (.exr 0xffffca08bc3719c8)
ExceptionAddress: fffff8056d13e841 (nt!MiDemoteCombinedPte+0x0000000000000051)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff80568daf930 -- (.cxr 0xfffff80568daf930)
rax=ffff9ecf67b3d000 rbx=0000001004000001 rcx=ffffa48fdcfe8580
rdx=ffff9ebffe00bcf0 rsi=ffff9ebffe00bcf0 rdi=ffffca08bc372210
rip=fffff8056d13e841 rsp=ffffca08bc371c00 rbp=00007ffc0179e000
r8=8000000000000000 r9=ffffa48fdd0c9010 r10=0000000000000000
r11=ffff9e8000000000 r12=0000000000000000 r13=ffffca08bc372310
r14=8000000000000000 r15=ffffa48fdcfe8580
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050287
nt!MiDemoteCombinedPte+0x51:
fffff805`6d13e841 498378f001 cmp qword ptr [r8-10h],1 ds:002b:7fffffff`fffffff0=????????????????
Resetting default scope
PROCESS_NAME: smartscreen.exe
READ_ADDRESS: ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%p ha fatto riferimento alla memoria a 0x%p. La memoria non poteva essere %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
BAD_STACK_POINTER: fffff80568daf0c8
STACK_TEXT:
ffffca08`bc371c00 fffff805`6d0b0087 : ffffa48f`dcfe8640 fffff805`6d0749e6 00000000`00000003 00000000`00000000 : nt!MiDemoteCombinedPte+0x51
ffffca08`bc371cd0 fffff805`6d0ac837 : ffffa48f`00000003 ffffca08`bc372310 00000000`00000000 00000000`00000000 : nt!MiAgePte+0x427
ffffca08`bc371d70 fffff805`6d0accf1 : ffffca08`bc372310 ffffca08`bc372310 ffffa48f`00000000 ffff9ecf`5fff0058 : nt!MiWalkPageTablesRecursively+0x1e7
ffffca08`bc371e30 fffff805`6d0accf1 : ffffca08`bc372310 ffffca08`bc372310 ffffa48f`00000000 ffff9ecf`67afff80 : nt!MiWalkPageTablesRecursively+0x6a1
ffffca08`bc371ef0 fffff805`6d0accf1 : ffffca08`bc372310 ffffca08`bc372310 ffffa48f`00000000 ffff9ecf`67b3d7f8 : nt!MiWalkPageTablesRecursively+0x6a1
ffffca08`bc371fb0 fffff805`6d0ac47c : ffffca08`bc372310 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
ffffca08`bc372070 fffff805`6d0abf07 : ffffca08`bc372310 ffffca08`00000002 00000000`00000002 fffff805`00000000 : nt!MiWalkPageTables+0x36c
ffffca08`bc372170 fffff805`6d0ab642 : ffffa48f`d3d0d240 fffff805`00000000 00000000`008bded8 00000000`00000000 : nt!MiAgeWorkingSet+0x3a7
ffffca08`bc372690 fffff805`6d0aaf5a : ffffa48f`dcfe8580 ffffca08`bc372950 00000000`00000000 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3b2
ffffca08`bc372780 fffff805`6d0a8bb0 : fffff805`6d468340 00000000`00000000 fffff805`6d468340 ffffa48f`bda3f520 : nt!MiProcessWorkingSets+0x1fa
ffffca08`bc372930 fffff805`6d2c8ed6 : 00000000`00000001 00000000`00000007 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0xc8
ffffca08`bc3729f0 fffff805`6d189e65 : 00000000`00000007 00000000`ffffffff fffff805`6d468340 00000000`000001e2 : nt!MmWorkingSetManager+0x12
ffffca08`bc372a20 fffff805`6d129e95 : ffffa48f`bdb48040 00000000`00000080 fffff805`6d189d10 00000000`00000000 : nt!KeBalanceSetManager+0x155
ffffca08`bc372b10 fffff805`6d1c730a : ffffe381`89bc0180 ffffa48f`bdb48040 fffff805`6d129e40 00000000`00a132db : nt!PspSystemThreadStartup+0x55
ffffca08`bc372b60 00000000`00000000 : ffffca08`bc373000 ffffca08`bc36c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
SYMBOL_NAME: nt!MiDemoteCombinedPte+51
MODULE_NAME: nt
STACK_COMMAND: .cxr 0xfffff80568daf930 ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 51
FAILURE_BUCKET_ID: AV_STACKPTR_ERROR_nt!MiDemoteCombinedPte
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {51bd6656-a4b2-8d9b-1231-94678dd83b3a}
Followup: MachineOwner
---------
Here's the link to the
MEMORY.DMP
file: https://1drv.ms/u/s!ArpFFw9rJBoeidtJLENhspNaMh7zcA?e=C7ekshThank you
Last edited: