S
SebastianWida
Hello
After expanding the memory to 32GB, bsod appeared and I'm not sure what the reason is...
Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\wida\Desktop\110819-16021-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.24524.amd64fre.win7sp1_ldr_escrow.190916-1700
Machine Name:
Kernel base = 0xfffff800`0300a000 PsLoadedModuleList = 0xfffff800`03243c90
Debug session time: Fri Nov 8 13:24:53.661 2019 (UTC + 1:00)
System Uptime: 0 days 4:35:11.576
Loading Kernel Symbols
...............................................................
................................................................
...............................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffe0, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff80003304479, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
GetUlongPtrFromAddress: unable to read from fffff800032a7300
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24524.amd64fre.win7sp1_ldr_escrow.190916-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP Z230 Tower Workstation
SYSTEM_SKU: D1P34AV
BIOS_VENDOR: Hewlett-Packard
BIOS_VERSION: L51 v01.18
BIOS_DATE: 01/23/2014
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 1905
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffffffffe0
BUGCHECK_P2: 1
BUGCHECK_P3: fffff80003304479
BUGCHECK_P4: 0
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032a7100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032a72f0
GetUlongPtrFromAddress: unable to read from fffff800032a74a8
GetPointerFromAddress: unable to read from fffff800032a70d8
ffffffffffffffe0
FAULTING_IP:
nt!ObOpenObjectByName+39
fffff800`03304479 4d8963e0 mov qword ptr [r11-20h],r12
MM_INTERNAL_CODE: 0
CPU_COUNT: 8
CPU_MHZ: da3
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1C'00000000 (cache) 17'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: ADPClientServi
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: WIDA
ANALYSIS_SESSION_TIME: 11-08-2019 23:48:26.0815
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: fffff8800e9846d0 -- (.trap 0xfffff8800e9846d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8800e984988 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa8019738400 rsi=0000000000000000 rdi=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ObOpenObjectByName+0x39:
fffff800`03304479 4d8963e0 mov qword ptr [r11-20h],r12 ds:fffff880`0e984908=0000000000000000
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800031777a2 to fffff8000309dca0
STACK_TEXT:
fffff880`0e984578 fffff800`031777a2 : 00000000`00000050 ffffffff`ffffffe0 00000000`00000001 fffff880`0e9846d0 : nt!KeBugCheckEx
fffff880`0e984580 fffff800`030a9ddc : 00000000`00000001 ffffffff`ffffffe0 fffff880`c0000000 00000000`00000000 : nt!MmAccessFault+0x2322
fffff880`0e9846d0 fffff800`03304479 : fffffa80`19960060 00000000`001ff260 00000000`00000001 fffff800`03038f11 : nt!KiPageFault+0x35c
fffff880`0e984860 fffff800`034c1038 : 00000000`00000000 00000000`00000000 00000000`001ff260 fffff880`0e9848a8 : nt!ObOpenObjectByName+0x39
fffff880`0e984930 fffff800`03353aac : fffffa80`19960060 00000000`00100001 00000000`001fecb8 00000000`001febf8 : nt!IopCreateFile+0xa08
fffff880`0e9849e0 fffff800`030abd53 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtOpenFile+0x58
fffff880`0e984a70 00000000`76fc9bba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`001febd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76fc9bba
THREAD_SHA1_HASH_MOD_FUNC: 6ae89f5457f6cd3617077eeec221c125126ea8f4
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 572bc9c80bd6243f3f946153fca3e23c1ed28663
THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6
FOLLOWUP_IP:
nt!ObOpenObjectByName+39
fffff800`03304479 4d8963e0 mov qword ptr [r11-20h],r12
FAULT_INSTR_CODE: e063894d
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!ObOpenObjectByName+39
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5d803c60
IMAGE_VERSION: 6.1.7601.24524
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0x50_nt!ObOpenObjectByName+39
BUCKET_ID: X64_0x50_nt!ObOpenObjectByName+39
PRIMARY_PROBLEM_CLASS: X64_0x50_nt!ObOpenObjectByName+39
TARGET_TIME: 2019-11-08T12:24:53.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-09-17 03:52:32
BUILDDATESTAMP_STR: 190916-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24524.amd64fre.win7sp1_ldr_escrow.190916-1700
ANALYSIS_SESSION_ELAPSED_TIME: 837
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x50_nt!obopenobjectbyname+39
FAILURE_ID_HASH: {5a2d3e1f-f0e5-0083-8c4e-24da994ae59d}
Followup: MachineOwner
---------
best regards
SW
Continue reading...
After expanding the memory to 32GB, bsod appeared and I'm not sure what the reason is...
Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\wida\Desktop\110819-16021-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.24524.amd64fre.win7sp1_ldr_escrow.190916-1700
Machine Name:
Kernel base = 0xfffff800`0300a000 PsLoadedModuleList = 0xfffff800`03243c90
Debug session time: Fri Nov 8 13:24:53.661 2019 (UTC + 1:00)
System Uptime: 0 days 4:35:11.576
Loading Kernel Symbols
...............................................................
................................................................
...............................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffe0, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff80003304479, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
GetUlongPtrFromAddress: unable to read from fffff800032a7300
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24524.amd64fre.win7sp1_ldr_escrow.190916-1700
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP Z230 Tower Workstation
SYSTEM_SKU: D1P34AV
BIOS_VENDOR: Hewlett-Packard
BIOS_VERSION: L51 v01.18
BIOS_DATE: 01/23/2014
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 1905
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffffffffe0
BUGCHECK_P2: 1
BUGCHECK_P3: fffff80003304479
BUGCHECK_P4: 0
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032a7100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800032a72f0
GetUlongPtrFromAddress: unable to read from fffff800032a74a8
GetPointerFromAddress: unable to read from fffff800032a70d8
ffffffffffffffe0
FAULTING_IP:
nt!ObOpenObjectByName+39
fffff800`03304479 4d8963e0 mov qword ptr [r11-20h],r12
MM_INTERNAL_CODE: 0
CPU_COUNT: 8
CPU_MHZ: da3
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1C'00000000 (cache) 17'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: ADPClientServi
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: WIDA
ANALYSIS_SESSION_TIME: 11-08-2019 23:48:26.0815
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: fffff8800e9846d0 -- (.trap 0xfffff8800e9846d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8800e984988 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa8019738400 rsi=0000000000000000 rdi=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ObOpenObjectByName+0x39:
fffff800`03304479 4d8963e0 mov qword ptr [r11-20h],r12 ds:fffff880`0e984908=0000000000000000
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800031777a2 to fffff8000309dca0
STACK_TEXT:
fffff880`0e984578 fffff800`031777a2 : 00000000`00000050 ffffffff`ffffffe0 00000000`00000001 fffff880`0e9846d0 : nt!KeBugCheckEx
fffff880`0e984580 fffff800`030a9ddc : 00000000`00000001 ffffffff`ffffffe0 fffff880`c0000000 00000000`00000000 : nt!MmAccessFault+0x2322
fffff880`0e9846d0 fffff800`03304479 : fffffa80`19960060 00000000`001ff260 00000000`00000001 fffff800`03038f11 : nt!KiPageFault+0x35c
fffff880`0e984860 fffff800`034c1038 : 00000000`00000000 00000000`00000000 00000000`001ff260 fffff880`0e9848a8 : nt!ObOpenObjectByName+0x39
fffff880`0e984930 fffff800`03353aac : fffffa80`19960060 00000000`00100001 00000000`001fecb8 00000000`001febf8 : nt!IopCreateFile+0xa08
fffff880`0e9849e0 fffff800`030abd53 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtOpenFile+0x58
fffff880`0e984a70 00000000`76fc9bba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`001febd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76fc9bba
THREAD_SHA1_HASH_MOD_FUNC: 6ae89f5457f6cd3617077eeec221c125126ea8f4
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 572bc9c80bd6243f3f946153fca3e23c1ed28663
THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6
FOLLOWUP_IP:
nt!ObOpenObjectByName+39
fffff800`03304479 4d8963e0 mov qword ptr [r11-20h],r12
FAULT_INSTR_CODE: e063894d
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!ObOpenObjectByName+39
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5d803c60
IMAGE_VERSION: 6.1.7601.24524
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0x50_nt!ObOpenObjectByName+39
BUCKET_ID: X64_0x50_nt!ObOpenObjectByName+39
PRIMARY_PROBLEM_CLASS: X64_0x50_nt!ObOpenObjectByName+39
TARGET_TIME: 2019-11-08T12:24:53.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-09-17 03:52:32
BUILDDATESTAMP_STR: 190916-1700
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24524.amd64fre.win7sp1_ldr_escrow.190916-1700
ANALYSIS_SESSION_ELAPSED_TIME: 837
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x50_nt!obopenobjectbyname+39
FAILURE_ID_HASH: {5a2d3e1f-f0e5-0083-8c4e-24da994ae59d}
Followup: MachineOwner
---------
best regards
SW
Continue reading...