Advertisement
JetSerge

Untitled

Aug 4th, 2016
173
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.60 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\MEMORY.DMP]
  7. Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
  8.  
  9. Symbol search path is: srv*
  10. Executable search path is:
  11. Windows 10 Kernel Version 14393 MP (12 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS
  13. Built by: 14393.0.amd64fre.rs1_release.160715-1616
  14. Machine Name:
  15. Kernel base = 0xfffff802`05c93000 PsLoadedModuleList = 0xfffff802`05f98060
  16. Debug session time: Thu Aug 4 07:18:21.845 2016 (UTC + 3:00)
  17. System Uptime: 0 days 3:22:47.609
  18. Loading Kernel Symbols
  19. ...............................................................
  20. ................................................................
  21. ................................................................
  22. ............
  23. Loading User Symbols
  24.  
  25. Loading unloaded module list
  26. .........
  27. *******************************************************************************
  28. * *
  29. * Bugcheck Analysis *
  30. * *
  31. *******************************************************************************
  32.  
  33. Use !analyze -v to get detailed debugging information.
  34.  
  35. BugCheck 133, {1, 1e00, 0, 0}
  36.  
  37. Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+e8d6 )
  38.  
  39. Followup: MachineOwner
  40. ---------
  41.  
  42. 0: kd> !analyze -v
  43. *******************************************************************************
  44. * *
  45. * Bugcheck Analysis *
  46. * *
  47. *******************************************************************************
  48.  
  49. DPC_WATCHDOG_VIOLATION (133)
  50. The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
  51. or above.
  52. Arguments:
  53. Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
  54. DISPATCH_LEVEL or above. The offending component can usually be
  55. identified with a stack trace.
  56. Arg2: 0000000000001e00, The watchdog period.
  57. Arg3: 0000000000000000
  58. Arg4: 0000000000000000
  59.  
  60. Debugging Details:
  61. ------------------
  62.  
  63.  
  64. DUMP_CLASS: 1
  65.  
  66. DUMP_QUALIFIER: 401
  67.  
  68. BUILD_VERSION_STRING: 10.0.14393.0 (rs1_release.160715-1616)
  69.  
  70. DUMP_TYPE: 1
  71.  
  72. BUGCHECK_P1: 1
  73.  
  74. BUGCHECK_P2: 1e00
  75.  
  76. BUGCHECK_P3: 0
  77.  
  78. BUGCHECK_P4: 0
  79.  
  80. DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
  81.  
  82. CPU_COUNT: c
  83.  
  84. CPU_MHZ: e10
  85.  
  86. CPU_VENDOR: GenuineIntel
  87.  
  88. CPU_FAMILY: 6
  89.  
  90. CPU_MODEL: 4f
  91.  
  92. CPU_STEPPING: 1
  93.  
  94. CPU_MICROCODE: 6,4f,1,0 (F,M,S,R) SIG: B00001C'00000000 (cache) B00001C'00000000 (init)
  95.  
  96. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  97.  
  98. BUGCHECK_STR: 0x133
  99.  
  100. PROCESS_NAME: System
  101.  
  102. CURRENT_IRQL: d
  103.  
  104. ANALYSIS_SESSION_HOST: JETSERGE
  105.  
  106. ANALYSIS_SESSION_TIME: 08-04-2016 08:04:03.0308
  107.  
  108. ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
  109.  
  110. LAST_CONTROL_TRANSFER: from fffff80205dfaa96 to fffff80205ddcf90
  111.  
  112. STACK_TEXT:
  113. fffff802`07f21b18 fffff802`05dfaa96 : 00000000`00000133 00000000`00000001 00000000`00001e00 00000000`00000000 : nt!KeBugCheckEx
  114. fffff802`07f21b20 fffff802`05cb62b9 : 000445c2`51867f00 000445c2`51867738 fffff780`00000320 fffff802`05c6c490 : nt! ?? ::FNODOBFM::`string'+0xe8d6
  115. fffff802`07f21b80 fffff802`05c21366 : fffff802`07f21d90 fffff802`05fd5180 00000000`00000007 000445c2`51867738 : nt!KeClockInterruptNotify+0x469
  116. fffff802`07f21cd0 fffff802`05d61f97 : fffff802`05c6c3e0 ffffa881`afdd2060 000445c2`51866d60 ffffa881`b23bd100 : hal!HalpTimerClockInterrupt+0x56
  117. fffff802`07f21d00 fffff802`05dde60a : fffff802`05c6c3e0 ffffa881`bfc34000 00000000`00000000 fffff802`07f13960 : nt!KiCallInterruptServiceRoutine+0x87
  118. fffff802`07f21d40 fffff802`05ddea57 : 00000000`00000000 ffffa881`bfc3d000 ffffa881`bfc16040 fffff802`05e0a0fb : nt!KiInterruptSubDispatchNoLockNoEtw+0xea
  119. fffff802`07f21d90 fffff802`05d6994c : 00000000`00000000 ffffa881`afcb1000 fffff802`05fd5180 00000000`00000002 : nt!KiInterruptDispatchNoLockNoEtw+0x37
  120. fffff802`07f21f20 fffff802`05dde3e3 : ffffcb00`c4d08c80 ffffa881`bfc34000 fffff802`05f8e400 ffffcb00`c4d08c80 : nt!PerfInfoLogInterrupt+0x2c
  121. fffff802`07f21fb0 fffff802`05dde657 : ffffa881`00000000 00001f80`00900210 00000000`00000002 ffffa881`b3930848 : nt!KiInterruptSubDispatch+0x123
  122. fffff802`07f13630 fffff802`05ccb43f : 00000000`00000000 00000000`00000000 00000000`00000000 fffff802`00000004 : nt!KiInterruptDispatch+0x37
  123. fffff802`07f137c0 fffff802`05ccb0e3 : fffff802`05fd5180 00000000`00000000 fffff802`07f13990 fffff802`00000002 : nt!EtwpLogKernelEvent+0x2bf
  124. fffff802`07f13890 fffff802`05cca3ff : 0000001c`0cf39069 ffffa881`b123b180 00000000`00000000 fffff802`05fd5180 : nt!KiExecuteAllDpcs+0x393
  125. fffff802`07f139e0 fffff802`05de001a : 00000000`00000000 fffff802`05fd5180 fffff802`06050940 ffffa881`b253e800 : nt!KiRetireDpcList+0x5df
  126. fffff802`07f13c60 00000000`00000000 : fffff802`07f14000 fffff802`07f0e000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
  127.  
  128.  
  129. STACK_COMMAND: kb
  130.  
  131. THREAD_SHA1_HASH_MOD_FUNC: 9d2946ed34415bd9e83aeaa269673fe1514c9535
  132.  
  133. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 403b3ff6c14fcf3ac511f796c27e9516b04d5549
  134.  
  135. THREAD_SHA1_HASH_MOD: a46c1b556d92394c8d3f63eb407b2ed053afd34a
  136.  
  137. FOLLOWUP_IP:
  138. nt! ?? ::FNODOBFM::`string'+e8d6
  139. fffff802`05dfaa96 cc int 3
  140.  
  141. FAULT_INSTR_CODE: e92ccdcc
  142.  
  143. SYMBOL_STACK_INDEX: 1
  144.  
  145. SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+e8d6
  146.  
  147. FOLLOWUP_NAME: MachineOwner
  148.  
  149. MODULE_NAME: nt
  150.  
  151. IMAGE_NAME: ntkrnlmp.exe
  152.  
  153. DEBUG_FLR_IMAGE_TIMESTAMP: 578998f1
  154.  
  155. IMAGE_VERSION: 10.0.14393.0
  156.  
  157. BUCKET_ID_FUNC_OFFSET: e8d6
  158.  
  159. FAILURE_BUCKET_ID: 0x133_ISR_nt!_??_::FNODOBFM::_string_
  160.  
  161. BUCKET_ID: 0x133_ISR_nt!_??_::FNODOBFM::_string_
  162.  
  163. PRIMARY_PROBLEM_CLASS: 0x133_ISR_nt!_??_::FNODOBFM::_string_
  164.  
  165. TARGET_TIME: 2016-08-04T04:18:21.000Z
  166.  
  167. OSBUILD: 14393
  168.  
  169. OSSERVICEPACK: 0
  170.  
  171. SERVICEPACK_NUMBER: 0
  172.  
  173. OS_REVISION: 0
  174.  
  175. SUITE_MASK: 272
  176.  
  177. PRODUCT_TYPE: 1
  178.  
  179. OSPLATFORM_TYPE: x64
  180.  
  181. OSNAME: Windows 10
  182.  
  183. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  184.  
  185. OS_LOCALE:
  186.  
  187. USER_LCID: 0
  188.  
  189. OSBUILD_TIMESTAMP: 2016-07-16 05:16:17
  190.  
  191. BUILDDATESTAMP_STR: 160715-1616
  192.  
  193. BUILDLAB_STR: rs1_release
  194.  
  195. BUILDOSVER_STR: 10.0.14393.0
  196.  
  197. ANALYSIS_SESSION_ELAPSED_TIME: 10b2
  198.  
  199. ANALYSIS_SOURCE: KM
  200.  
  201. FAILURE_ID_HASH_STRING: km:0x133_isr_nt!_??_::fnodobfm::_string_
  202.  
  203. FAILURE_ID_HASH: {89366ad1-5557-ac2b-d015-8f6ec2fdbf31}
  204.  
  205. Followup: MachineOwner
  206. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement