Guest User

IRQL_NOT_LESS_OR_EQUAL

a guest
Jul 28th, 2016
156
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.55 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 10.0.10586.567 AMD64
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4.  
  5. Loading Dump File [C:\Windows\Minidump\072816-5046-01.dmp]
  6. Mini Kernel Dump File: Only registers and stack trace are available
  7.  
  8. Symbol search path is: srv*
  9. Executable search path is:
  10. Windows 10 Kernel Version 10586 MP (4 procs) Free x64
  11. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  12. Built by: 10586.494.amd64fre.th2_release_sec.160630-1736
  13. Machine Name:
  14. Kernel base = 0xfffff801`9541b000 PsLoadedModuleList = 0xfffff801`956f8cf0
  15. Debug session time: Thu Jul 28 00:42:40.453 2016 (UTC + 12:00)
  16. System Uptime: 0 days 1:21:21.077
  17. Loading Kernel Symbols
  18. .
  19.  
  20. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
  21. Run !sym noisy before .reload to track down problems loading symbols.
  22.  
  23. ..............................................................
  24. ................................................................
  25. ......................................
  26. Loading User Symbols
  27. Loading unloaded module list
  28. .................
  29. *******************************************************************************
  30. * *
  31. * Bugcheck Analysis *
  32. * *
  33. *******************************************************************************
  34.  
  35. Use !analyze -v to get detailed debugging information.
  36.  
  37. BugCheck A, {17a0, 2, 1, fffff801955db47c}
  38.  
  39. Probably caused by : ntkrnlmp.exe ( nt!KiAcquireQueuedSpinLockInstrumented+58 )
  40.  
  41. Followup: MachineOwner
  42. ---------
  43.  
  44. 2: kd> !analyze -v
  45. *******************************************************************************
  46. * *
  47. * Bugcheck Analysis *
  48. * *
  49. *******************************************************************************
  50.  
  51. IRQL_NOT_LESS_OR_EQUAL (a)
  52. An attempt was made to access a pageable (or completely invalid) address at an
  53. interrupt request level (IRQL) that is too high. This is usually
  54. caused by drivers using improper addresses.
  55. If a kernel debugger is available get the stack backtrace.
  56. Arguments:
  57. Arg1: 00000000000017a0, memory referenced
  58. Arg2: 0000000000000002, IRQL
  59. Arg3: 0000000000000001, bitfield :
  60. bit 0 : value 0 = read operation, 1 = write operation
  61. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  62. Arg4: fffff801955db47c, address which referenced memory
  63.  
  64. Debugging Details:
  65. ------------------
  66.  
  67.  
  68. DUMP_CLASS: 1
  69.  
  70. DUMP_QUALIFIER: 400
  71.  
  72. BUILD_VERSION_STRING: 10586.494.amd64fre.th2_release_sec.160630-1736
  73.  
  74. SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.
  75.  
  76. SYSTEM_SKU: To Be Filled By O.E.M.
  77.  
  78. SYSTEM_VERSION: To Be Filled By O.E.M.
  79.  
  80. BIOS_VENDOR: American Megatrends Inc.
  81.  
  82. BIOS_VERSION: P1.10
  83.  
  84. BIOS_DATE: 07/16/2015
  85.  
  86. BASEBOARD_MANUFACTURER: ASRock
  87.  
  88. BASEBOARD_PRODUCT: Z170 Pro4
  89.  
  90. BASEBOARD_VERSION:
  91.  
  92. DUMP_TYPE: 2
  93.  
  94. BUGCHECK_P1: 17a0
  95.  
  96. BUGCHECK_P2: 2
  97.  
  98. BUGCHECK_P3: 1
  99.  
  100. BUGCHECK_P4: fffff801955db47c
  101.  
  102. WRITE_ADDRESS: fffff80195798520: Unable to get MiVisibleState
  103. 00000000000017a0
  104.  
  105. CURRENT_IRQL: 2
  106.  
  107. FAULTING_IP:
  108. nt!KiAcquireQueuedSpinLockInstrumented+58
  109. fffff801`955db47c 488716 xchg rdx,qword ptr [rsi]
  110.  
  111. CPU_COUNT: 4
  112.  
  113. CPU_MHZ: db0
  114.  
  115. CPU_VENDOR: GenuineIntel
  116.  
  117. CPU_FAMILY: 6
  118.  
  119. CPU_MODEL: 5e
  120.  
  121. CPU_STEPPING: 3
  122.  
  123. CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 1F'00000000 (cache) 1F'00000000 (init)
  124.  
  125. CUSTOMER_CRASH_COUNT: 1
  126.  
  127. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  128.  
  129. BUGCHECK_STR: AV
  130.  
  131. PROCESS_NAME: chrome.exe
  132.  
  133. ANALYSIS_SESSION_HOST: DESKTOP-OHU3II9
  134.  
  135. ANALYSIS_SESSION_TIME: 07-28-2016 17:29:29.0061
  136.  
  137. ANALYSIS_VERSION: 10.0.10586.567 amd64fre
  138.  
  139. TRAP_FRAME: ffffd00025b68e50 -- (.trap 0xffffd00025b68e50)
  140. NOTE: The trap frame does not contain all registers.
  141. Some register values may be zeroed or incorrect.
  142. rax=0000000000000000 rbx=0000000000000000 rcx=ffffd00025b69068
  143. rdx=ffffd00025b69068 rsi=0000000000000000 rdi=0000000000000000
  144. rip=fffff801955db47c rsp=ffffd00025b68fe0 rbp=0000000000000000
  145. r8=0000000000000001 r9=0000000000000000 r10=ffffe0007541c080
  146. r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
  147. r14=0000000000000000 r15=0000000000000000
  148. iopl=0 nv up ei pl nz na po nc
  149. nt!KiAcquireQueuedSpinLockInstrumented+0x58:
  150. fffff801`955db47c 488716 xchg rdx,qword ptr [rsi] ds:00000000`00000000=????????????????
  151. Resetting default scope
  152.  
  153. LAST_CONTROL_TRANSFER: from fffff801955684e9 to fffff8019555d940
  154.  
  155. STACK_TEXT:
  156. ffffd000`25b68d08 fffff801`955684e9 : 00000000`0000000a 00000000`000017a0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
  157. ffffd000`25b68d10 fffff801`95566cc7 : ffffd000`25b693b8 fffff801`9555f1a4 fffff801`957289d0 00000000`00000000 : nt!KiBugCheckDispatch+0x69
  158. ffffd000`25b68e50 fffff801`955db47c : fffff6fb`7dbedf60 fffff6fb`7dbec010 ffffd000`25b690b8 fffff801`954cdcd5 : nt!KiPageFault+0x247
  159. ffffd000`25b68fe0 fffff801`955aa65b : a7400003`7cb9a847 00000000`00000001 00000000`00000000 fffff801`95716c80 : nt!KiAcquireQueuedSpinLockInstrumented+0x58
  160. ffffd000`25b69030 fffff801`954bc38f : 00000000`00000000 a7400003`7cb9a847 00000000`00000000 40000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x3e35b
  161. ffffd000`25b690c0 fffff801`954c55db : fffff680`00251400 ffffe000`7541c080 ffffe000`7541c080 fffff680`0024fff8 : nt!MiDeletePteRun+0xb0f
  162. ffffd000`25b692b0 fffff801`954d38e4 : 00000000`4a280fff ffffd000`25b69579 00000000`00000000 00000000`53646156 : nt!MiDeleteVirtualAddresses+0x91b
  163. ffffd000`25b694b0 fffff801`9588f712 : 00000000`00000000 ffffe000`77b7e120 ffffe000`76658640 ffffe000`7541c080 : nt!MiDeleteVad+0x4b4
  164. ffffd000`25b695e0 fffff801`9588f572 : 00000000`00040000 ffffe000`76658640 00000000`00000001 ffffe000`7541c080 : nt!MmCleanProcessAddressSpace+0xea
  165. ffffd000`25b69640 fffff801`9586fe47 : ffffe000`7541c080 ffffc001`22862060 ffffd000`25b69700 ffffe000`76658640 : nt!PspRundownSingleProcess+0x1be
  166. ffffd000`25b696c0 fffff801`9582102a : ffffd000`c0000005 ffffe000`76658640 ffffd000`25b69a00 ffffe000`766586e8 : nt!PspExitThread+0x4f7
  167. ffffd000`25b69800 fffff801`954ec292 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x2e
  168. ffffd000`25b69830 fffff801`95560cd0 : 00000000`00000000 fffff801`954ea299 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x2f2
  169. ffffd000`25b698c0 fffff801`9556824a : ffffe000`76658640 00000000`00000000 ffffe000`76658640 ffffd000`25b69a80 : nt!KiInitiateUserApc+0x70
  170. ffffd000`25b69a00 00000000`5c9a21bc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
  171. 00000000`0366f2d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x5c9a21bc
  172.  
  173.  
  174. STACK_COMMAND: kb
  175.  
  176. THREAD_SHA1_HASH_MOD_FUNC: 7f03dd3fbe638c71e1ffe8521c7a4e7fad531cf3
  177.  
  178. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: b22f9551e684811c10f832dac4865cc495c9513c
  179.  
  180. THREAD_SHA1_HASH_MOD: 38bc5fec3f0409c265cf5c87da6f8f8859d0711c
  181.  
  182. FOLLOWUP_IP:
  183. nt!KiAcquireQueuedSpinLockInstrumented+58
  184. fffff801`955db47c 488716 xchg rdx,qword ptr [rsi]
  185.  
  186. FAULT_INSTR_CODE: 48168748
  187.  
  188. SYMBOL_STACK_INDEX: 3
  189.  
  190. SYMBOL_NAME: nt!KiAcquireQueuedSpinLockInstrumented+58
  191.  
  192. FOLLOWUP_NAME: MachineOwner
  193.  
  194. MODULE_NAME: nt
  195.  
  196. IMAGE_NAME: ntkrnlmp.exe
  197.  
  198. DEBUG_FLR_IMAGE_TIMESTAMP: 5775e2f5
  199.  
  200. IMAGE_VERSION: 10.0.10586.494
  201.  
  202. BUCKET_ID_FUNC_OFFSET: 58
  203.  
  204. FAILURE_BUCKET_ID: AV_nt!KiAcquireQueuedSpinLockInstrumented
  205.  
  206. BUCKET_ID: AV_nt!KiAcquireQueuedSpinLockInstrumented
  207.  
  208. PRIMARY_PROBLEM_CLASS: AV_nt!KiAcquireQueuedSpinLockInstrumented
  209.  
  210. TARGET_TIME: 2016-07-27T12:42:40.000Z
  211.  
  212. OSBUILD: 10586
  213.  
  214. OSSERVICEPACK: 0
  215.  
  216. SERVICEPACK_NUMBER: 0
  217.  
  218. OS_REVISION: 0
  219.  
  220. SUITE_MASK: 784
  221.  
  222. PRODUCT_TYPE: 1
  223.  
  224. OSPLATFORM_TYPE: x64
  225.  
  226. OSNAME: Windows 10
  227.  
  228. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  229.  
  230. OS_LOCALE:
  231.  
  232. USER_LCID: 0
  233.  
  234. OSBUILD_TIMESTAMP: 2016-07-01 15:26:45
  235.  
  236. BUILDDATESTAMP_STR: 160630-1736
  237.  
  238. BUILDLAB_STR: th2_release_sec
  239.  
  240. BUILDOSVER_STR: 10.0.10586.494.amd64fre.th2_release_sec.160630-1736
  241.  
  242. ANALYSIS_SESSION_ELAPSED_TIME: df7
  243.  
  244. ANALYSIS_SOURCE: KM
  245.  
  246. FAILURE_ID_HASH_STRING: km:av_nt!kiacquirequeuedspinlockinstrumented
  247.  
  248. FAILURE_ID_HASH: {48d9bbe7-abfb-b08d-b568-23dc13e15562}
  249.  
  250. Followup: MachineOwner
  251. ---------
Advertisement
Add Comment
Please, Sign In to add comment