Guest User

BSOD after a couple of game freezes

a guest
Dec 17th, 2019
78
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.76 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\minidump\121719-7031-01.dmp]
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8.  
  9. Symbol search path is: srv*
  10. Executable search path is:
  11. Windows 10 Kernel Version 18362 MP (16 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS
  13. Machine Name:
  14. Kernel base = 0xfffff801`74600000 PsLoadedModuleList = 0xfffff801`74a48130
  15. Debug session time: Tue Dec 17 20:48:07.357 2019 (UTC + 1:00)
  16. System Uptime: 0 days 0:01:09.060
  17. Loading Kernel Symbols
  18. ...............................................................
  19. ................................................................
  20. ...................................................
  21. Loading User Symbols
  22. Loading unloaded module list
  23. ......
  24. For analysis of this file, run !analyze -v
  25. 8: kd> !analyze -v
  26. *******************************************************************************
  27. * *
  28. * Bugcheck Analysis *
  29. * *
  30. *******************************************************************************
  31.  
  32. IRQL_NOT_LESS_OR_EQUAL (a)
  33. An attempt was made to access a pageable (or completely invalid) address at an
  34. interrupt request level (IRQL) that is too high. This is usually
  35. caused by drivers using improper addresses.
  36. If a kernel debugger is available get the stack backtrace.
  37. Arguments:
  38. Arg1: 0000000000000000, memory referenced
  39. Arg2: 0000000000000002, IRQL
  40. Arg3: 0000000000000000, bitfield :
  41. bit 0 : value 0 = read operation, 1 = write operation
  42. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  43. Arg4: fffff801747c88af, address which referenced memory
  44.  
  45. Debugging Details:
  46. ------------------
  47.  
  48.  
  49. KEY_VALUES_STRING: 1
  50.  
  51.  
  52. PROCESSES_ANALYSIS: 1
  53.  
  54. SERVICE_ANALYSIS: 1
  55.  
  56. STACKHASH_ANALYSIS: 1
  57.  
  58. TIMELINE_ANALYSIS: 1
  59.  
  60.  
  61. DUMP_CLASS: 1
  62.  
  63. DUMP_QUALIFIER: 400
  64.  
  65. BUILD_VERSION_STRING: 10.0.18362.535 (WinBuild.160101.0800)
  66.  
  67. DUMP_FILE_ATTRIBUTES: 0x8
  68. Kernel Generated Triage Dump
  69.  
  70. DUMP_TYPE: 2
  71.  
  72. BUGCHECK_P1: 0
  73.  
  74. BUGCHECK_P2: 2
  75.  
  76. BUGCHECK_P3: 0
  77.  
  78. BUGCHECK_P4: fffff801747c88af
  79.  
  80. READ_ADDRESS: fffff80174b733b8: Unable to get MiVisibleState
  81. Unable to get NonPagedPoolStart
  82. Unable to get NonPagedPoolEnd
  83. Unable to get PagedPoolStart
  84. Unable to get PagedPoolEnd
  85. 0000000000000000
  86.  
  87. CURRENT_IRQL: 2
  88.  
  89. FAULTING_IP:
  90. nt!SwapContext+36f
  91. fffff801`747c88af 0fc719 xrstors [rcx]
  92.  
  93. CPU_COUNT: 10
  94.  
  95. CPU_MHZ: e74
  96.  
  97. CPU_VENDOR: AuthenticAMD
  98.  
  99. CPU_FAMILY: 17
  100.  
  101. CPU_MODEL: 8
  102.  
  103. CPU_STEPPING: 2
  104.  
  105. CUSTOMER_CRASH_COUNT: 1
  106.  
  107. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  108.  
  109. BUGCHECK_STR: AV
  110.  
  111. PROCESS_NAME: Steam.exe
  112.  
  113. ANALYSIS_SESSION_HOST: DESKTOP-PQ1B8N5
  114.  
  115. ANALYSIS_SESSION_TIME: 12-17-2019 20:52:56.0621
  116.  
  117. ANALYSIS_VERSION: 10.0.18362.1 amd64fre
  118.  
  119. TRAP_FRAME: ffffe08b54e21db0 -- (.trap 0xffffe08b54e21db0)
  120. NOTE: The trap frame does not contain all registers.
  121. Some register values may be zeroed or incorrect.
  122. rax=0000000000000005 rbx=0000000000000000 rcx=ffffe08b54e22cc0
  123. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
  124. rip=fffff801747c88af rsp=ffffe08b54e21f40 rbp=00000067bcbbbdff
  125. r8=0000000000000000 r9=0000000000000000 r10=0000000000000001
  126. r11=ffff90861ceeb9a8 r12=0000000000000000 r13=0000000000000000
  127. r14=0000000000000000 r15=0000000000000000
  128. iopl=0 nv up ei pl zr ac po cy
  129. nt!SwapContext+0x36f:
  130. fffff801`747c88af 0fc719 xrstors [rcx]
  131. Resetting default scope
  132.  
  133. LAST_CONTROL_TRANSFER: from fffff801747d32e9 to fffff801747c14e0
  134.  
  135. STACK_TEXT:
  136. ffffe08b`54e21c68 fffff801`747d32e9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
  137. ffffe08b`54e21c70 fffff801`747cf62b : 00000000`00000000 fffff801`7867a475 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
  138. ffffe08b`54e21db0 fffff801`747c88af : ffffd000`a2a80180 00000067`bcbbbdff ffff9086`29727080 00000001`0000004d : nt!KiPageFault+0x46b
  139. ffffe08b`54e21f40 fffff801`747c8266 : 00000000`00000000 00000000`00000000 fffff801`750bae70 fffff801`750b7848 : nt!SwapContext+0x36f
  140. ffffe08b`54e21f80 fffff801`7463c7bd : ffffd000`a2679180 00000000`fffffffe ffffd000`ffffffff 00000000`00000001 : nt!KiSwapContext+0x76
  141. ffffe08b`54e220c0 fffff801`7463b644 : ffff9086`29727080 ffffffff`00000000 ffffe08b`00000000 fffff801`00000000 : nt!KiSwapThread+0xbfd
  142. ffffe08b`54e22160 fffff801`746884e7 : 00000000`0000004a 00000000`00000000 ffffe08b`54e22601 00000000`00000000 : nt!KiCommitThreadWait+0x144
  143. ffffe08b`54e22200 fffff801`74c1fe49 : 00000000`00000005 ffffe08b`54e22350 ffff9086`29d95fb0 fffff801`00000000 : nt!KeWaitForMultipleObjects+0x287
  144. ffffe08b`54e22310 fffff801`74c2150c : 00000000`00000000 00000000`00000000 ffff9086`29727000 00000000`00000000 : nt!ObWaitForMultipleObjects+0x2a9
  145. ffffe08b`54e22810 fffff801`747d2d18 : 00000000`00000001 ffffe08b`54e22b00 ffffe08b`00000001 ffffe08b`54e22a00 : nt!NtWaitForMultipleObjects32+0xfc
  146. ffffe08b`54e22a90 00000000`77381cbc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
  147. 00000000`08dced58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77381cbc
  148.  
  149.  
  150. THREAD_SHA1_HASH_MOD_FUNC: 38fc198047b246f9bc7ca2fc5833415ea198015c
  151.  
  152. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f34914914fb38895b8e6ad73ebb8a895928e4514
  153.  
  154. THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c
  155.  
  156. FOLLOWUP_IP:
  157. nt!SwapContext+36f
  158. fffff801`747c88af 0fc719 xrstors [rcx]
  159.  
  160. FAULT_INSTR_CODE: eb19c70f
  161.  
  162. SYMBOL_STACK_INDEX: 3
  163.  
  164. SYMBOL_NAME: nt!SwapContext+36f
  165.  
  166. FOLLOWUP_NAME: MachineOwner
  167.  
  168. MODULE_NAME: nt
  169.  
  170. IMAGE_NAME: ntkrnlmp.exe
  171.  
  172. DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
  173.  
  174. IMAGE_VERSION: 10.0.18362.535
  175.  
  176. STACK_COMMAND: .thread ; .cxr ; kb
  177.  
  178. BUCKET_ID_FUNC_OFFSET: 36f
  179.  
  180. FAILURE_BUCKET_ID: AV_nt!SwapContext
  181.  
  182. BUCKET_ID: AV_nt!SwapContext
  183.  
  184. PRIMARY_PROBLEM_CLASS: AV_nt!SwapContext
  185.  
  186. TARGET_TIME: 2019-12-17T19:48:07.000Z
  187.  
  188. OSBUILD: 18362
  189.  
  190. OSSERVICEPACK: 535
  191.  
  192. SERVICEPACK_NUMBER: 0
  193.  
  194. OS_REVISION: 0
  195.  
  196. SUITE_MASK: 272
  197.  
  198. PRODUCT_TYPE: 1
  199.  
  200. OSPLATFORM_TYPE: x64
  201.  
  202. OSNAME: Windows 10
  203.  
  204. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  205.  
  206. OS_LOCALE:
  207.  
  208. USER_LCID: 0
  209.  
  210. OSBUILD_TIMESTAMP: 1980-01-11 16:53:20
  211.  
  212. BUILDDATESTAMP_STR: 160101.0800
  213.  
  214. BUILDLAB_STR: WinBuild
  215.  
  216. BUILDOSVER_STR: 10.0.18362.535
  217.  
  218. ANALYSIS_SESSION_ELAPSED_TIME: 3210
  219.  
  220. ANALYSIS_SOURCE: KM
  221.  
  222. FAILURE_ID_HASH_STRING: km:av_nt!swapcontext
  223.  
  224. FAILURE_ID_HASH: {47b746a3-60bf-1f5a-5fa5-88903b6a3204}
  225.  
  226. Followup: MachineOwner
  227. ---------
Add Comment
Please, Sign In to add comment