Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.10586.567 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\Minidump\072816-5046-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 10586 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 10586.494.amd64fre.th2_release_sec.160630-1736
- Machine Name:
- Kernel base = 0xfffff801`9541b000 PsLoadedModuleList = 0xfffff801`956f8cf0
- Debug session time: Thu Jul 28 00:42:40.453 2016 (UTC + 12:00)
- System Uptime: 0 days 1:21:21.077
- Loading Kernel Symbols
- .
- Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
- Run !sym noisy before .reload to track down problems loading symbols.
- ..............................................................
- ................................................................
- ......................................
- Loading User Symbols
- Loading unloaded module list
- .................
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck A, {17a0, 2, 1, fffff801955db47c}
- Probably caused by : ntkrnlmp.exe ( nt!KiAcquireQueuedSpinLockInstrumented+58 )
- Followup: MachineOwner
- ---------
- 2: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: 00000000000017a0, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000001, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff801955db47c, address which referenced memory
- Debugging Details:
- ------------------
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10586.494.amd64fre.th2_release_sec.160630-1736
- SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.
- SYSTEM_SKU: To Be Filled By O.E.M.
- SYSTEM_VERSION: To Be Filled By O.E.M.
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: P1.10
- BIOS_DATE: 07/16/2015
- BASEBOARD_MANUFACTURER: ASRock
- BASEBOARD_PRODUCT: Z170 Pro4
- BASEBOARD_VERSION:
- DUMP_TYPE: 2
- BUGCHECK_P1: 17a0
- BUGCHECK_P2: 2
- BUGCHECK_P3: 1
- BUGCHECK_P4: fffff801955db47c
- WRITE_ADDRESS: fffff80195798520: Unable to get MiVisibleState
- 00000000000017a0
- CURRENT_IRQL: 2
- FAULTING_IP:
- nt!KiAcquireQueuedSpinLockInstrumented+58
- fffff801`955db47c 488716 xchg rdx,qword ptr [rsi]
- CPU_COUNT: 4
- CPU_MHZ: db0
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 5e
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 1F'00000000 (cache) 1F'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: AV
- PROCESS_NAME: chrome.exe
- ANALYSIS_SESSION_HOST: DESKTOP-OHU3II9
- ANALYSIS_SESSION_TIME: 07-28-2016 17:29:29.0061
- ANALYSIS_VERSION: 10.0.10586.567 amd64fre
- TRAP_FRAME: ffffd00025b68e50 -- (.trap 0xffffd00025b68e50)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000000 rbx=0000000000000000 rcx=ffffd00025b69068
- rdx=ffffd00025b69068 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff801955db47c rsp=ffffd00025b68fe0 rbp=0000000000000000
- r8=0000000000000001 r9=0000000000000000 r10=ffffe0007541c080
- r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na po nc
- nt!KiAcquireQueuedSpinLockInstrumented+0x58:
- fffff801`955db47c 488716 xchg rdx,qword ptr [rsi] ds:00000000`00000000=????????????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff801955684e9 to fffff8019555d940
- STACK_TEXT:
- ffffd000`25b68d08 fffff801`955684e9 : 00000000`0000000a 00000000`000017a0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
- ffffd000`25b68d10 fffff801`95566cc7 : ffffd000`25b693b8 fffff801`9555f1a4 fffff801`957289d0 00000000`00000000 : nt!KiBugCheckDispatch+0x69
- ffffd000`25b68e50 fffff801`955db47c : fffff6fb`7dbedf60 fffff6fb`7dbec010 ffffd000`25b690b8 fffff801`954cdcd5 : nt!KiPageFault+0x247
- ffffd000`25b68fe0 fffff801`955aa65b : a7400003`7cb9a847 00000000`00000001 00000000`00000000 fffff801`95716c80 : nt!KiAcquireQueuedSpinLockInstrumented+0x58
- ffffd000`25b69030 fffff801`954bc38f : 00000000`00000000 a7400003`7cb9a847 00000000`00000000 40000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x3e35b
- ffffd000`25b690c0 fffff801`954c55db : fffff680`00251400 ffffe000`7541c080 ffffe000`7541c080 fffff680`0024fff8 : nt!MiDeletePteRun+0xb0f
- ffffd000`25b692b0 fffff801`954d38e4 : 00000000`4a280fff ffffd000`25b69579 00000000`00000000 00000000`53646156 : nt!MiDeleteVirtualAddresses+0x91b
- ffffd000`25b694b0 fffff801`9588f712 : 00000000`00000000 ffffe000`77b7e120 ffffe000`76658640 ffffe000`7541c080 : nt!MiDeleteVad+0x4b4
- ffffd000`25b695e0 fffff801`9588f572 : 00000000`00040000 ffffe000`76658640 00000000`00000001 ffffe000`7541c080 : nt!MmCleanProcessAddressSpace+0xea
- ffffd000`25b69640 fffff801`9586fe47 : ffffe000`7541c080 ffffc001`22862060 ffffd000`25b69700 ffffe000`76658640 : nt!PspRundownSingleProcess+0x1be
- ffffd000`25b696c0 fffff801`9582102a : ffffd000`c0000005 ffffe000`76658640 ffffd000`25b69a00 ffffe000`766586e8 : nt!PspExitThread+0x4f7
- ffffd000`25b69800 fffff801`954ec292 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x2e
- ffffd000`25b69830 fffff801`95560cd0 : 00000000`00000000 fffff801`954ea299 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x2f2
- ffffd000`25b698c0 fffff801`9556824a : ffffe000`76658640 00000000`00000000 ffffe000`76658640 ffffd000`25b69a80 : nt!KiInitiateUserApc+0x70
- ffffd000`25b69a00 00000000`5c9a21bc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
- 00000000`0366f2d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x5c9a21bc
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 7f03dd3fbe638c71e1ffe8521c7a4e7fad531cf3
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: b22f9551e684811c10f832dac4865cc495c9513c
- THREAD_SHA1_HASH_MOD: 38bc5fec3f0409c265cf5c87da6f8f8859d0711c
- FOLLOWUP_IP:
- nt!KiAcquireQueuedSpinLockInstrumented+58
- fffff801`955db47c 488716 xchg rdx,qword ptr [rsi]
- FAULT_INSTR_CODE: 48168748
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: nt!KiAcquireQueuedSpinLockInstrumented+58
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 5775e2f5
- IMAGE_VERSION: 10.0.10586.494
- BUCKET_ID_FUNC_OFFSET: 58
- FAILURE_BUCKET_ID: AV_nt!KiAcquireQueuedSpinLockInstrumented
- BUCKET_ID: AV_nt!KiAcquireQueuedSpinLockInstrumented
- PRIMARY_PROBLEM_CLASS: AV_nt!KiAcquireQueuedSpinLockInstrumented
- TARGET_TIME: 2016-07-27T12:42:40.000Z
- OSBUILD: 10586
- OSSERVICEPACK: 0
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- OS_LOCALE:
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2016-07-01 15:26:45
- BUILDDATESTAMP_STR: 160630-1736
- BUILDLAB_STR: th2_release_sec
- BUILDOSVER_STR: 10.0.10586.494.amd64fre.th2_release_sec.160630-1736
- ANALYSIS_SESSION_ELAPSED_TIME: df7
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:av_nt!kiacquirequeuedspinlockinstrumented
- FAILURE_ID_HASH: {48d9bbe7-abfb-b08d-b568-23dc13e15562}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment