CACHE_MANAGER Stop Error
Hello, I am new at attempting to resolve blue screens, but this is driving me crazy! At all sorts of different random times, I get this stop error with several other numerical parameters. I downloaded BlueScreenView, which indicates that the cause is Ntfs.sys and ntoskrnl.exe (the kernel + the system), so this is not very useful. In addition to the bug check code (0x0x00000034), Parameters are: Param 1: 00000000`00050830 Param2: fffff880`033cc808 Param3: fffff880`033cc070 Param4: fffff800`03d6ddb4 Ofcourse, in the original bsod the params appeared as hex values, 0x0000000000050830, etc ... I would be very happy to upload the minidump file that I have to anyone who might be able to help. Thanks in advance!
September 17th, 2010 4:15pm

Bug Check 0x34: CACHE_MANAGER This indicates that a problem occurred in the file system's cache manager. Please copy the dmp files from the folder C:\Windows\Minidump first to your desktop, zip all dmp into 1 zip file and upload the zip file to your Skydrive [1] and post a link here, so that I can look at the dumps. André [1] http://social.technet.microsoft.com/Forums/en-US/w7itproui/thread/4fc10639-02db-4665-993a-08d865088d65"A programmer is just a tool which converts caffeine into code" CLIP- Stellvertreter http://www.winvistaside.de/
Free Windows Admin Tool Kit Click here and download it now
September 17th, 2010 6:01pm

Hi Andre, I uploaded the minidump, which is here: http://cid-11ac254488e21108.office.live.com/self.aspx/MiniDump/091710-15319-01.zip For what is may be worth, the Bugcheck code and Param values are below. I have been sufferring many many BSODs over the past few weeks, and they are not always the CACHE_MANAGER 0x34 flavor. I rebuilt the entire Windows7 image and re-loaded all software. I am a software engineer and the software on the box is limited to standard fare dev stuff (Visual Studio, SQL-Server, Office, Forefront). I added ShadowProtect recently, but did this after the Bluescreens started because I wanted to make sure that I had good backup images (and this has now saved me many times b/c after some of these BSOD's the system is no longer bootable). The BSODs have calmed down but not gone away, and the last 2 have been exactly this CACHE_MANAGER flavor. Yesterday, I completely rebuilt my master boot record. Today, I found and installed the latest and greatest video driver and chipset driver (disk controller), and thought that the problem was over, but after a few hours this last BSOD happened. I'm thinking it might be memory related and have ordered new RAM, but if you find that it is probably something else then I can cancel or return the order. Finally, I'll mention that I can create a BSOD at will simply by uninstalling any application with Forefront 2010 running. However, if I stop Forefront's real-time protection then I can successfully uninstall anything and there is no BSOD. Unfortunately, not running Forefront is not an option for me as my employer requires it. Thanks in advance! BugcheckCode 0x34 BugcheckParameter1 0x50830 BugcheckParameter2 0xfffff880033cc808 BugcheckParameter3 0xfffff880033cc070 BugcheckParameter4 0xfffff80003d6ddb4
September 17th, 2010 9:22pm

Hello Again Andre, In addition to http://cid-11ac254488e21108.office.live.com/self.aspx/MiniDump/091710-15319-01.zip (which contains the 0x34 stop), please also see http://cid-11ac254488e21108.office.live.com/self.aspx/MiniDump/091710-33321-01.zip. This is a 0x24 stop error that I can produce at will simply by uninstalling almost anything. I can work-around it by disabling my anti-virus software (MSFT Forefront 2010).
Free Windows Admin Tool Kit Click here and download it now
September 17th, 2010 11:49pm

It looks like this was due to an access violation, it might be worth checking memory with an extended test with Windows memory diagnostic or a longer test, >5 hrs, with memtest86+ (preferred) to see if any DIMMs are having problems, http://oca.microsoft.com/en/windiag.asp http://www.memtest.org/ You may also want to do a chkdsk on each drive to see if any inconsistencies are found and perform a chkdsk /R on the drives to attempt to repair, but I would investigate it as a memory issue first above. Do you have any more dumps that you can upload to try to confirm it one way or another? ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 34, {50830, fffff880033cc808, fffff880033cc070, fffff80003d6ddb4} Probably caused by : memory_corruption ( nt!MiSectionDelete+24 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* CACHE_MANAGER (34) See the comment for FAT_FILE_SYSTEM (0x23) Arguments: Arg1: 0000000000050830 Arg2: fffff880033cc808 Arg3: fffff880033cc070 Arg4: fffff80003d6ddb4 Debugging Details: ------------------ EXCEPTION_RECORD: fffff880033cc808 -- (.exr 0xfffff880033cc808) ExceptionAddress: fffff80003d6ddb4 (nt!MiSectionDelete+0x0000000000000024) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff CONTEXT: fffff880033cc070 -- (.cxr 0xfffff880033cc070) rax=ffff0067006f006c rbx=0000000000000000 rcx=fffff8a010fd2b90 rdx=fffffa8006c32000 rsi=0000000000000000 rdi=fffff8a010fd2b60 rip=fffff80003d6ddb4 rsp=fffff880033cca40 rbp=0000000000000002 r8=000000000000c828 r9=0000000000000310 r10=fffff80003a0c000 r11=fffff880033ccab0 r12=0000000000000011 r13=0000000000000000 r14=00000000ffffffff r15=0000000000000001 iopl=0 nv up ei ng nz na po nc cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010286 nt!MiSectionDelete+0x24: fffff800`03d6ddb4 488b18 mov rbx,qword ptr [rax] ds:002b:ffff0067`006f006c=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 0 ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: ffffffffffffffff READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003cb40e0 ffffffffffffffff FOLLOWUP_IP: nt!MiSectionDelete+24 fffff800`03d6ddb4 488b18 mov rbx,qword ptr [rax] FAULTING_IP: nt!MiSectionDelete+24 fffff800`03d6ddb4 488b18 mov rbx,qword ptr [rax] BUGCHECK_STR: 0x34 LAST_CONTROL_TRANSFER: from fffff80003a818b4 to fffff80003d6ddb4 STACK_TEXT: fffff880`033cca40 fffff800`03a818b4 : 00000000`00000000 00000000`00000002 fffffa80`06d30790 fffffa80`00000000 : nt!MiSectionDelete+0x24 fffff880`033cca80 fffff800`03a6c2f0 : 00000000`00000002 fffffa80`0afb5630 00000000`00000000 00000000`00000000 : nt!ObfDereferenceObject+0xd4 fffff880`033ccae0 fffff800`03a6fd1c : fffffa80`07002820 00000000`00000011 fffffa80`07002820 fffffa80`00000000 : nt!CcDeleteSharedCacheMap+0x1bc fffff880`033ccb50 fffff800`03a70520 : fffff800`03c83100 fffff880`033ccc58 00000000`00000000 fffffa80`00000000 : nt!CcWriteBehind+0x5bc fffff880`033ccc00 fffff800`03a89961 : fffffa80`06d213d0 fffff800`03a70358 fffff800`03c83140 fffffa80`00000003 : nt!CcWorkerThread+0x1c8 fffff880`033cccb0 fffff800`03d20c06 : 00000000`00000000 fffffa80`06d22040 00000000`00000080 fffffa80`06d0e040 : nt!ExpWorkerThread+0x111 fffff880`033ccd40 fffff800`03a5ac26 : fffff880`009ed180 fffffa80`06d22040 fffff880`009f7f40 00000000`00000000 : nt!PspSystemThreadStartup+0x5a fffff880`033ccd80 00000000`00000000 : fffff880`033cd000 fffff880`033c7000 fffff880`033cbc20 00000000`00000000 : nt!KxStartSystemThread+0x16 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiSectionDelete+24 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9 STACK_COMMAND: .cxr 0xfffff880033cc070 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x34_nt!MiSectionDelete+24 BUCKET_ID: X64_0x34_nt!MiSectionDelete+24 Followup: MachineOwner --------- 0: kd> .exr 0xfffff880033cc808 ExceptionAddress: fffff80003d6ddb4 (nt!MiSectionDelete+0x0000000000000024) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 24, {1904fb, fffff8800a0b6868, fffff8800a0b60d0, fffff80003a84905} Unable to load image MpFilter.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for MpFilter.sys *** ERROR: Module load completed but symbols could not be loaded for MpFilter.sys Probably caused by : Ntfs.sys ( Ntfs!NtfsRestartIndexEnumeration+271 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* NTFS_FILE_SYSTEM (24) If you see NtfsExceptionFilter on the stack then the 2nd and 3rd parameters are the exception record and context record. Do a .cxr on the 3rd parameter and then kb to obtain a more informative stack trace. Arguments: Arg1: 00000000001904fb Arg2: fffff8800a0b6868 Arg3: fffff8800a0b60d0 Arg4: fffff80003a84905 Debugging Details: ------------------ EXCEPTION_RECORD: fffff8800a0b6868 -- (.exr 0xfffff8800a0b6868) ExceptionAddress: fffff80003a84905 (nt!ExpInterlockedPopEntrySListFault16) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff CONTEXT: fffff8800a0b60d0 -- (.cxr 0xfffff8800a0b60d0) rax=0000004da573005a rbx=fffff9800f3c04c8 rcx=fffff80003bfd600 rdx=006e006f00430051 rsi=fffff80003bfd600 rdi=0000000000000011 rip=fffff80003a84905 rsp=fffff8800a0b6aa0 rbp=fffffa8006c95000 r8=006e006f00430050 r9=fffff80003a11000 r10=fffff80003bfd600 r11=fffff8a0003aa000 r12=0000000000000009 r13=0000000000000000 r14=0000000000000002 r15=000000004946744e iopl=0 nv up ei pl nz na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206 nt!ExpInterlockedPopEntrySListFault16: fffff800`03a84905 498b08 mov rcx,qword ptr [r8] ds:002b:006e006f`00430050=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: MsMpEng.exe CURRENT_IRQL: 0 ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: ffffffffffffffff READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003cb90e0 ffffffffffffffff FOLLOWUP_IP: Ntfs!NtfsRestartIndexEnumeration+271 fffff880`014cfbd1 4989842498000000 mov qword ptr [r12+98h],rax FAULTING_IP: nt!ExpInterlockedPopEntrySListFault16+0 fffff800`03a84905 498b08 mov rcx,qword ptr [r8] BUGCHECK_STR: 0x24 LAST_CONTROL_TRANSFER: from fffff80003bb5646 to fffff80003a84905 STACK_TEXT: fffff880`0a0b6aa0 fffff800`03bb5646 : fffffa80`06d166b0 fffffa80`0d564060 00000000`00100010 fffff980`0f3c051a : nt!ExpInterlockedPopEntrySListFault16 fffff880`0a0b6ab0 fffff880`014cfbd1 : fffff8a0`01cea500 fffff980`0f3c04c8 fffff8a0`1536e4f0 fffff8a0`01cea501 : nt!ExAllocatePoolWithTag+0x276 fffff880`0a0b6ba0 fffff880`014ccdfe : fffffa80`0cb76420 fffff8a0`05b52e10 fffff8a0`05b52bc0 fffffa80`0cb76420 : Ntfs!NtfsRestartIndexEnumeration+0x271 fffff880`0a0b6dc0 fffff880`014ce421 : fffff880`0a0b72d0 00000000`00000008 fffffa80`07dcf6d0 fffffa80`0bc23010 : Ntfs!NtfsQueryDirectory+0x94e fffff880`0a0b7160 fffff880`014d078f : fffffa80`0cb76420 00000000`00000000 fffff880`0a0b7260 00000000`00000000 : Ntfs!NtfsCommonDirectoryControl+0xa1 fffff880`0a0b71a0 fffff880`0136b23f : fffffa80`0bc236c8 fffffa80`0bc23010 fffffa80`0cb76420 fffff880`0a0b71c8 : Ntfs!NtfsFsdDirectoryControl+0x10f fffff880`0a0b7210 fffff880`0136d94a : 00000000`00000000 00000000`00000000 fffffa80`099c6000 fffffa80`0c84eb70 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f fffff880`0a0b72a0 fffff880`0138cdb8 : fffffa80`07e51430 00000000`00000022 fffffa80`07dda800 fffffa80`0c84ec20 : fltmgr!FltPerformSynchronousIo+0x2ca fffff880`0a0b7340 fffff880`0635ad71 : 00000000`00000000 00000000`00000020 fffff880`0a0b7400 fffff880`0a0b7490 : fltmgr!FltQueryDirectoryFile+0x98 fffff880`0a0b7380 fffff880`0138cd02 : 00000000`0000004e fffffa80`0afa6550 fffffa80`0cd7a070 00000000`00000017 : luafv!LuafvNormalizeNameComponentEx+0x145 fffff880`0a0b7480 fffff880`0138c01e : 00000000`00000017 00000000`00000057 fffffa80`0afa6550 00000000`000007ff : fltmgr!FltpCallNormalizeNameComponentHandler+0x82 fffff880`0a0b74e0 fffff880`0138d361 : 00000000`00000057 00000000`00000080 00000000`0000004f 00000000`00000000 : fltmgr!FltpExpandShortNames+0x14e fffff880`0a0b7540 fffff880`0138d13e : fffffa80`0afa6550 fffffa80`099c0000 00000000`00000000 fffffa80`0bc11201 : fltmgr!FltpGetNormalizedFileNameWorker+0xc1 fffff880`0a0b7580 fffff880`0136e54b : fffffa80`07dda800 fffffa80`0e01fa50 fffffa80`07737000 fffff880`0a0b8000 : fltmgr!FltpCreateFileNameInformation+0xee fffff880`0a0b75e0 fffff880`0138b5ef : 00000000`00008000 fffffa80`0e01fa50 fffffa80`099c6010 fffff8a0`1a0bb488 : fltmgr!FltpGetFileNameInformation+0x26b fffff880`0a0b7660 fffff880`0411c278 : fffffa80`0afa6550 00000000`00000000 00000000`00000101 00000000`00000000 : fltmgr!FltGetFileNameInformationUnsafe+0x7f fffff880`0a0b76d0 fffffa80`0afa6550 : 00000000`00000000 00000000`00000101 00000000`00000000 00000000`00000000 : MpFilter+0xb278 fffff880`0a0b76d8 00000000`00000000 : 00000000`00000101 00000000`00000000 00000000`00000000 00000000`00000001 : 0xfffffa80`0afa6550 SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: Ntfs!NtfsRestartIndexEnumeration+271 FOLLOWUP_NAME: MachineOwner MODULE_NAME: Ntfs IMAGE_NAME: Ntfs.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f STACK_COMMAND: .cxr 0xfffff8800a0b60d0 ; kb FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsRestartIndexEnumeration+271 BUCKET_ID: X64_0x24_Ntfs!NtfsRestartIndexEnumeration+271 Followup: MachineOwner --------- 0: kd> .exr 0xfffff8800a0b6868 ExceptionAddress: fffff80003a84905 (nt!ExpInterlockedPopEntrySListFault16) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff 0: kd> .cxr 0xfffff8800a0b60d0 rax=0000004da573005a rbx=fffff9800f3c04c8 rcx=fffff80003bfd600 rdx=006e006f00430051 rsi=fffff80003bfd600 rdi=0000000000000011 rip=fffff80003a84905 rsp=fffff8800a0b6aa0 rbp=fffffa8006c95000 r8=006e006f00430050 r9=fffff80003a11000 r10=fffff80003bfd600 r11=fffff8a0003aa000 r12=0000000000000009 r13=0000000000000000 r14=0000000000000002 r15=000000004946744e iopl=0 nv up ei pl nz na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206 nt!ExpInterlockedPopEntrySListFault16: fffff800`03a84905 498b08 mov rcx,qword ptr [r8] ds:002b:006e006f`00430050=???????????????? 0: kd> kb 1000 RetAddr : Args to Child : Call Site fffff800`03bb5646 : fffffa80`06d166b0 fffffa80`0d564060 00000000`00100010 fffff980`0f3c051a : nt!ExpInterlockedPopEntrySListFault16 fffff880`014cfbd1 : fffff8a0`01cea500 fffff980`0f3c04c8 fffff8a0`1536e4f0 fffff8a0`01cea501 : nt!ExAllocatePoolWithTag+0x276 fffff880`014ccdfe : fffffa80`0cb76420 fffff8a0`05b52e10 fffff8a0`05b52bc0 fffffa80`0cb76420 : Ntfs!NtfsRestartIndexEnumeration+0x271 fffff880`014ce421 : fffff880`0a0b72d0 00000000`00000008 fffffa80`07dcf6d0 fffffa80`0bc23010 : Ntfs!NtfsQueryDirectory+0x94e fffff880`014d078f : fffffa80`0cb76420 00000000`00000000 fffff880`0a0b7260 00000000`00000000 : Ntfs!NtfsCommonDirectoryControl+0xa1 fffff880`0136b23f : fffffa80`0bc236c8 fffffa80`0bc23010 fffffa80`0cb76420 fffff880`0a0b71c8 : Ntfs!NtfsFsdDirectoryControl+0x10f fffff880`0136d94a : 00000000`00000000 00000000`00000000 fffffa80`099c6000 fffffa80`0c84eb70 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f fffff880`0138cdb8 : fffffa80`07e51430 00000000`00000022 fffffa80`07dda800 fffffa80`0c84ec20 : fltmgr!FltPerformSynchronousIo+0x2ca fffff880`0635ad71 : 00000000`00000000 00000000`00000020 fffff880`0a0b7400 fffff880`0a0b7490 : fltmgr!FltQueryDirectoryFile+0x98 fffff880`0138cd02 : 00000000`0000004e fffffa80`0afa6550 fffffa80`0cd7a070 00000000`00000017 : luafv!LuafvNormalizeNameComponentEx+0x145 fffff880`0138c01e : 00000000`00000017 00000000`00000057 fffffa80`0afa6550 00000000`000007ff : fltmgr!FltpCallNormalizeNameComponentHandler+0x82 fffff880`0138d361 : 00000000`00000057 00000000`00000080 00000000`0000004f 00000000`00000000 : fltmgr!FltpExpandShortNames+0x14e fffff880`0138d13e : fffffa80`0afa6550 fffffa80`099c0000 00000000`00000000 fffffa80`0bc11201 : fltmgr!FltpGetNormalizedFileNameWorker+0xc1 fffff880`0136e54b : fffffa80`07dda800 fffffa80`0e01fa50 fffffa80`07737000 fffff880`0a0b8000 : fltmgr!FltpCreateFileNameInformation+0xee fffff880`0138b5ef : 00000000`00008000 fffffa80`0e01fa50 fffffa80`099c6010 fffff8a0`1a0bb488 : fltmgr!FltpGetFileNameInformation+0x26b fffff880`0411c278 : fffffa80`0afa6550 00000000`00000000 00000000`00000101 00000000`00000000 : fltmgr!FltGetFileNameInformationUnsafe+0x7f fffffa80`0afa6550 : 00000000`00000000 00000000`00000101 00000000`00000000 00000000`00000000 : MpFilter+0xb278 00000000`00000000 : 00000000`00000101 00000000`00000000 00000000`00000000 00000000`00000001 : 0xfffffa80`0afa6550 -- Mike Burr
September 19th, 2010 8:43am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics