Index

A note on the digital index

A link in an index entry is displayed as the section title in which that entry appears. Because some sections have multiple index markers, it is not unusual for an entry to have several links to the same section. Clicking on any link will take you directly to the place in the text in which the marker appears.

Symbols

!analyze command, Verbose Analysis, Verbose Analysis, Hung or Unresponsive Systems, Analysis of Common Stop Codes
!ca command, Section Objects
!cpuinfo command, Advanced Crash Dump Analysis
!dc command, Page List Dynamics, Page List Dynamics
!dd command, Physical Address Extension (PAE)
!defwrites command, Write Throttling
!devnode command, Device EnumerationDevice Stacks, Device Stacks
!devobj command, Driver Objects and Device Objects, Shadow Copy Provider
!devstack command, I/O Requests to Layered Drivers
!dq command, Physical Address Extension (PAE)
!drvobj command, Driver Objects and Device Objects, Volume Mounting
!filecache command, Cache Working Set Size
!fileobj command, Per-File Cache Data Structures
!for_each_module command, 0xC5 - DRIVER_CORRUPTED_EXPOOL
!handle command, Section Objects
!heap command, Heap Security Features, Heap Debugging Features
!Irp command, I/O Requests to Layered Drivers, Advanced Crash Dump Analysis
!Irpfind command, I/O Requests to Layered Drivers
!loadermemorylist command, Initializing the Kernel and Executive SubsystemsInitializing the Kernel and Executive Subsystems, Initializing the Kernel and Executive Subsystems
!locks command, Hung or Unresponsive Systems
!memusage command, Section Objects
!object command, Driver Objects and Device Objects
!pfn command, Page List Dynamics, PFN Data Structures
!pocaps command, Driver Power Operation
!pool command, Buffer Overruns, Memory Corruption, and Special Pool
!poolused command, Monitoring Pool Usage
!popolicy command, Driver Power Operation
!ppm command, Utility Function
!ppmcheck command, Performance CheckPerformance Check, Performance Check
!ppmperfpolicy extension, Thresholds and Policy Settings
!ppmstate command, Utility Function
!process command, IRP Stack Locations, I/O Cancellation for Thread Termination, Physical Address Extension (PAE), Crash Dump FilesCrash Dump Files, Crash Dump Files, Crash Dump Files, Advanced Crash Dump Analysis, Hung or Unresponsive Systems
DirBase field, Physical Address Extension (PAE)
listing processes, Advanced Crash Dump Analysis
minidump data, Crash Dump FilesCrash Dump Files, Crash Dump Files, Crash Dump Files
Notmyfault.exe, I/O Cancellation for Thread Termination
outstanding IRPs, IRP Stack Locations
processor information, Hung or Unresponsive Systems
!pte command, Page Directories, Physical Address Extension (PAE), 0xD1 - DRIVER_IRQL_NOT_LESS_OR_EQUAL
!session command, x86 Session Space
!stacks command, Hung or Unresponsive Systems
!thread command, IRP Stack Locations, Advanced Crash Dump Analysis
!vad command, Process VADs
!verifier command, Driver Verifier
!vm command, Examining Memory Usage, x86 Session Space, Advanced Crash Dump Analysis
!vpb command, Volume Mounting
!wdfkd.wdfldr debugger, Structure and Operation of a KMDF Driver
!wsle command, Working Set ManagementBalance Set Manager and Swapper, Balance Set Manager and Swapper
1394 ports, Hung or Unresponsive Systems
16-bit applications, Allocation Granularity, File Names
16-bit real mode components, BIOS Preboot
16-bit Unicode characters, Unicode-Based Names
32-bit protected mode, BIOS Preboot
32-bit real mode components, BIOS Preboot
32-bit systems, ASLR in Kernel Address Space, Physical Address Extension (PAE), User Stacks, Windows Client Memory Limits32-Bit Client Effective Memory Limits, 32-Bit Client Effective Memory Limits, 32-Bit Client Effective Memory Limits, 32-Bit Client Effective Memory Limits, File Names, The UEFI Boot Process, Initializing the Kernel and Executive Subsystems, Using Crash Troubleshooting Tools, Using Crash Troubleshooting Tools
driver verification, Using Crash Troubleshooting Tools
file names, File Names
kernel address space, ASLR in Kernel Address Space
numbers of threads, User Stacks
PAE support, Physical Address Extension (PAE)
physical memory support, Windows Client Memory Limits32-Bit Client Effective Memory Limits, 32-Bit Client Effective Memory Limits, 32-Bit Client Effective Memory Limits, 32-Bit Client Effective Memory Limits
troubleshooting, Using Crash Troubleshooting Tools
UEFI support, The UEFI Boot Process
VDM support, Initializing the Kernel and Executive Subsystems
32-bit virtual addresses, x86 Virtual Address Translationx86 Virtual Address Translation, x86 Virtual Address Translation, x86 Virtual Address Translation
32-bit Windows, Introduction to the Memory Manager, No Execute Page Protection, No Execute Page Protection, No Execute Page Protection, Address Windowing Extensions, x86 Address Space Layoutsx86 System Address Space Layout, x86 Address Space Layouts, x86 Address Space Layouts, x86 System Address Space Layoutx86 Session Space, x86 System Address Space Layout, x86 System Address Space Layout, x86 Session Space, x86 Session Space, System Page Table EntriesSystem Page Table Entries, System Page Table Entries, Dynamic System Virtual Address Space Management, Dynamic System Virtual Address Space Management
address space layouts, x86 Address Space Layoutsx86 System Address Space Layout, x86 Address Space Layouts, x86 Address Space Layouts, x86 System Address Space Layout, x86 System Address Space Layout
AWE, Address Windowing Extensions
execution protection, No Execute Page Protection, No Execute Page Protection
no-execute page protection, No Execute Page Protection
process size, Introduction to the Memory Manager
system address space layouts, x86 System Address Space Layoutx86 Session Space, x86 Session Space, x86 Session Space
system PTEs, System Page Table EntriesSystem Page Table Entries, System Page Table Entries
virtual address spaces, Dynamic System Virtual Address Space Management
virtual allocator mechanism, Dynamic System Virtual Address Space Management
3DES algorithm, Encrypting File Data
512e emulation, Disk Sector Format
64-bit address space layouts, 64-Bit Address Space Layouts64-Bit Address Space Layouts, 64-Bit Address Space Layouts, 64-Bit Address Space Layouts
64-bit protected mode, BIOS Preboot
64-bit systems, No Execute Page Protection, Windows x64 16-TB LimitationSystem Virtual Address Space Quotas, Dynamic System Virtual Address Space Management, Dynamic System Virtual Address Space Management, Dynamic System Virtual Address Space Management, Dynamic System Virtual Address Space Management, System Virtual Address Space Quotas, ASLR in Kernel Address Space, User Stacks, Windows Client Memory Limits
client memory limitations, Windows Client Memory Limits
dynamic address spaces, Windows x64 16-TB LimitationSystem Virtual Address Space Quotas, Dynamic System Virtual Address Space Management, Dynamic System Virtual Address Space Management, Dynamic System Virtual Address Space Management, System Virtual Address Space Quotas
execution protection, No Execute Page Protection
kernel address space, ASLR in Kernel Address Space
numbers of threads and, User Stacks
virtual address allocation, Dynamic System Virtual Address Space Management
64-bit Windows, Introduction to the Memory Manager, System Page Table Entries, Windows x64 16-TB Limitation, Windows x64 16-TB Limitation, Dynamic System Virtual Address Space Management
\Catroot directory, Driver Installation
\Device directory, Driver Objects and Device Objects, Driver Objects and Device Objects, Driver Objects and Device Objects, Explicit File I/O
\Global?? directory, Driver Objects and Device Objects, Opening Devices, Opening Devices, Disk Device Objects, Explicit File I/O, Initializing the Kernel and Executive Subsystems
\Inf directory, Driver Installation
\Security directory, Initializing the Kernel and Executive Subsystems
\Sessions directory, Smss, Csrss, and Wininit
_NT_SYMBOL_PATH variable, When There Is No Crash Dump
“A disk read error occurred” error, Boot Sector Corruption
“away-mode” power requests, Power Availability Requests
“blue screen of death”, System File Corruption, Causes of Windows Crashes, Troubleshooting Crashes, Hung or Unresponsive SystemsWhen There Is No Crash Dump, When There Is No Crash Dump
system file corruption, System File Corruption
top 20 stop codes, Causes of Windows Crashes, Troubleshooting Crashes
troubleshooting without crash dumps, Hung or Unresponsive SystemsWhen There Is No Crash Dump, When There Is No Crash Dump
“BOOTMGR is compressed” error, Boot Sector Corruption
“BOOTMGR is missing” error, Boot Sector Corruption
“Check boot path and disk hardware” error, BCD Misconfiguration
“Could not read from selected boot disk” error, BCD Misconfiguration
“data read” errors, NTFS Bad-Cluster Recovery
“disk full” error, Per-User Volume Quotas
“Error loading operating system” error, MBR Corruption
“Invalid partition table” errors, MBR Corruption
“log file full” errors, Log Record Types, Undo Pass
“Missing operating system” error, MBR Corruption
“no cache” flag, File System Interfaces
“no write” log records, Recoverable File System Support, Caching with the Mapping and Pinning Interfaces
“STOP: 0xC000136” error, System File Corruption
“system running low on virtual memory” error, Commit Charge and Page File Size
“Windows could not start… ” error, BCD Misconfiguration, System Hive Corruption