Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upQWT BSOD: QUOTA_UNDERFLOW #2220
Comments
omeg
added
bug
C: windows tools
P: major
labels
Aug 1, 2016
omeg
self-assigned this
Aug 1, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment
Hide comment
omeg
Aug 2, 2016
Member
This time drvinst was terminating, but memory wasn't yet freed. Seems like this occurs in random process context, check around KeStackAttachProcess in xeniface/gnttab.
XENIFACE|IoctlGnttabMapForeignPages: > Ref 75
XENIFACE|IoctlGnttabMapForeignPages: > Ref 76
XENIFACE|IoctlGnttabMapForeignPages: > Ref 77
XENIFACE|IoctlGnttabMapForeignPages: > Ref 78
XENIFACE|IoctlGnttabMapForeignPages: > Ref 79
BugCheck 21, {0, 0, 3000228, 2dc6e0c}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+32a56 )
Followup: MachineOwner
---------
QUOTA_UNDERFLOW (21)
This bugcheck occurs if a kernel component mishandles quota charges and
returns more quota than was previously charged to a particular quota block.
Arguments:
Arg1: 0000000000000000, The process (if any) that was initially charged.
Arg2: 0000000000000000, The quota type in question (paged pool, nonpaged pool, etc.)
Arg3: 0000000003000228, The initial charge amount to return.
Arg4: 0000000002dc6e0c, The remaining (unreturned) charge.
Debugging Details:
------------------
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x21
PROCESS_NAME: drvinst.exe
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
LAST_CONTROL_TRANSFER: from fffff80002786b22 to fffff80002696b50
STACK_TEXT:
fffff880`04282fa8 fffff800`02786b22 : 00000000`00000000 fffffa80`03139060 00000000`00000065 fffff800`026da768 : nt!DbgBreakPointWithStatus
fffff880`04282fb0 fffff800`0278790e : 00000000`00000003 00000000`00000000 fffff800`026dafc0 00000000`00000021 : nt!KiBugCheckDebugBreak+0x12
fffff880`04283010 fffff800`02645e16 : fffff8a0`012b2720 fffff800`02942f5e 00000000`00000000 fffff800`029421bf : nt!KeBugCheck2+0x71e
fffff880`042836e0 fffff800`0299533d : fffff800`02824900 fffffa80`01925950 fffffa80`030e8070 fffff800`02942005 : nt! ?? ::FNODOBFM::`string'+0x32a56
fffff880`04283760 fffff800`026a8b1c : fffff800`02824900 00000000`00000000 fffff8a0`012ac680 fffffa80`01925950 : nt!ObpFreeObject+0x13d
fffff880`042837b0 fffff800`02995614 : fffff8a0`012ac680 00000000`00000000 fffffa80`03139060 00000000`00000000 : nt!ObfDereferenceObject+0xdc
fffff880`04283810 fffff800`02957734 : 00000000`00000018 fffff8a0`012ac680 fffff8a0`012b0060 00000000`00000018 : nt!ObpCloseHandleTableEntry+0xc4
fffff880`042838a0 fffff800`02957634 : 00000000`00000004 00000000`00000000 fffffa80`0312bb30 fffff800`02944811 : nt!ObpCloseHandleProcedure+0x30
fffff880`042838e0 fffff800`02957cb2 : fffff8a0`012afa01 00000000`00000001 fffffa80`0312bb30 00000000`00000001 : nt!ExSweepHandleTable+0x74
fffff880`04283920 fffff800`029741c2 : fffff8a0`012afa20 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObKillProcess+0x62
fffff880`04283960 fffff800`0295787c : 00000000`00000000 00000000`00000001 000007ff`fffde000 00000000`00000000 : nt!PspExitThread+0x522
fffff880`04283a60 fffff800`0269df93 : fffffa80`0312bb30 000007fe`00000000 fffffa80`03139060 000007fe`ff1226c8 : nt!NtTerminateProcess+0x138
fffff880`04283ae0 00000000`779c15da : 00000000`7799418b 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0019fa18 00000000`7799418b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000080 : ntdll!NtTerminateProcess+0xa
00000000`0019fa20 00000000`ffe462f8 : 00000000`00000000 00000000`001ef5f0 00000000`0019faa8 00000000`00000000 : ntdll!RtlExitUserProcess+0x9b
00000000`0019fa50 00000000`ffe5468d : 00000000`00000000 00000000`ffe41808 01d1ec3f`061a0000 00000000`00000200 : DrvInst!wmain+0xd64
00000000`0019fbf0 00000000`7786652d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : DrvInst!CreateUserSecuredEvent+0x4b5
00000000`0019fc30 00000000`7799c521 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd
00000000`0019fc60 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x1d
kd> !object fffff800`02824900
fffff80002824900: Not a valid object (ObjectType invalid)
kd> !process
PROCESS fffffa800312bb30
SessionId: 0 Cid: 08c0 Peb: 7fffffdc000 ParentCid: 0338
DirBase: 0ad54000 ObjectTable: fffff8a0012ac680 HandleCount: 206.
Image: drvinst.exe
VadRoot fffffa8003118d60 Vads 80 Clone 0 Private 550. Modified 1305. Locked 0.
DeviceMap fffff8a000008bb0
Token fffff8a0012afa20
ElapsedTime 00:00:50.247
UserTime 00:00:00.171
KernelTime 00:00:00.218
QuotaPoolUsage[PagedPool] 82552
QuotaPoolUsage[NonPagedPool] 9608
Working Set Sizes (now,min,max) (1901, 50, 345) (7604KB, 200KB, 1380KB)
PeakWorkingSetSize 2165
VirtualSize 36 Mb
PeakVirtualSize 58 Mb
PageFaultCount 6400
MemoryPriority BACKGROUND
BasePriority 8
CommitCharge 899
THREAD fffffa8003139060 Cid 08c0.08c4 Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 0
|
This time drvinst was terminating, but memory wasn't yet freed. Seems like this occurs in random process context, check around KeStackAttachProcess in xeniface/gnttab.
|
andrewdavidwong
added
help wanted
and removed
help wanted
labels
Jan 14, 2017
andrewdavidwong
added this to the Far in the future milestone
Dec 16, 2017
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
omeg commentedAug 1, 2016
QWT 3.2.0+
Hard to debug as the object causing it is already freed. Seems to be a process terminating with not all of its memory returned (xeniface likely culprit).