Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\minidump\121719-7031-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 18362 MP (16 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Machine Name:
- Kernel base = 0xfffff801`74600000 PsLoadedModuleList = 0xfffff801`74a48130
- Debug session time: Tue Dec 17 20:48:07.357 2019 (UTC + 1:00)
- System Uptime: 0 days 0:01:09.060
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ...................................................
- Loading User Symbols
- Loading unloaded module list
- ......
- For analysis of this file, run !analyze -v
- 8: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: 0000000000000000, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000000, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff801747c88af, address which referenced memory
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- PROCESSES_ANALYSIS: 1
- SERVICE_ANALYSIS: 1
- STACKHASH_ANALYSIS: 1
- TIMELINE_ANALYSIS: 1
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.18362.535 (WinBuild.160101.0800)
- DUMP_FILE_ATTRIBUTES: 0x8
- Kernel Generated Triage Dump
- DUMP_TYPE: 2
- BUGCHECK_P1: 0
- BUGCHECK_P2: 2
- BUGCHECK_P3: 0
- BUGCHECK_P4: fffff801747c88af
- READ_ADDRESS: fffff80174b733b8: Unable to get MiVisibleState
- Unable to get NonPagedPoolStart
- Unable to get NonPagedPoolEnd
- Unable to get PagedPoolStart
- Unable to get PagedPoolEnd
- 0000000000000000
- CURRENT_IRQL: 2
- FAULTING_IP:
- nt!SwapContext+36f
- fffff801`747c88af 0fc719 xrstors [rcx]
- CPU_COUNT: 10
- CPU_MHZ: e74
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 17
- CPU_MODEL: 8
- CPU_STEPPING: 2
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: AV
- PROCESS_NAME: Steam.exe
- ANALYSIS_SESSION_HOST: DESKTOP-PQ1B8N5
- ANALYSIS_SESSION_TIME: 12-17-2019 20:52:56.0621
- ANALYSIS_VERSION: 10.0.18362.1 amd64fre
- TRAP_FRAME: ffffe08b54e21db0 -- (.trap 0xffffe08b54e21db0)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000005 rbx=0000000000000000 rcx=ffffe08b54e22cc0
- rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff801747c88af rsp=ffffe08b54e21f40 rbp=00000067bcbbbdff
- r8=0000000000000000 r9=0000000000000000 r10=0000000000000001
- r11=ffff90861ceeb9a8 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr ac po cy
- nt!SwapContext+0x36f:
- fffff801`747c88af 0fc719 xrstors [rcx]
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff801747d32e9 to fffff801747c14e0
- STACK_TEXT:
- ffffe08b`54e21c68 fffff801`747d32e9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
- ffffe08b`54e21c70 fffff801`747cf62b : 00000000`00000000 fffff801`7867a475 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
- ffffe08b`54e21db0 fffff801`747c88af : ffffd000`a2a80180 00000067`bcbbbdff ffff9086`29727080 00000001`0000004d : nt!KiPageFault+0x46b
- ffffe08b`54e21f40 fffff801`747c8266 : 00000000`00000000 00000000`00000000 fffff801`750bae70 fffff801`750b7848 : nt!SwapContext+0x36f
- ffffe08b`54e21f80 fffff801`7463c7bd : ffffd000`a2679180 00000000`fffffffe ffffd000`ffffffff 00000000`00000001 : nt!KiSwapContext+0x76
- ffffe08b`54e220c0 fffff801`7463b644 : ffff9086`29727080 ffffffff`00000000 ffffe08b`00000000 fffff801`00000000 : nt!KiSwapThread+0xbfd
- ffffe08b`54e22160 fffff801`746884e7 : 00000000`0000004a 00000000`00000000 ffffe08b`54e22601 00000000`00000000 : nt!KiCommitThreadWait+0x144
- ffffe08b`54e22200 fffff801`74c1fe49 : 00000000`00000005 ffffe08b`54e22350 ffff9086`29d95fb0 fffff801`00000000 : nt!KeWaitForMultipleObjects+0x287
- ffffe08b`54e22310 fffff801`74c2150c : 00000000`00000000 00000000`00000000 ffff9086`29727000 00000000`00000000 : nt!ObWaitForMultipleObjects+0x2a9
- ffffe08b`54e22810 fffff801`747d2d18 : 00000000`00000001 ffffe08b`54e22b00 ffffe08b`00000001 ffffe08b`54e22a00 : nt!NtWaitForMultipleObjects32+0xfc
- ffffe08b`54e22a90 00000000`77381cbc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
- 00000000`08dced58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77381cbc
- THREAD_SHA1_HASH_MOD_FUNC: 38fc198047b246f9bc7ca2fc5833415ea198015c
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f34914914fb38895b8e6ad73ebb8a895928e4514
- THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c
- FOLLOWUP_IP:
- nt!SwapContext+36f
- fffff801`747c88af 0fc719 xrstors [rcx]
- FAULT_INSTR_CODE: eb19c70f
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: nt!SwapContext+36f
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
- IMAGE_VERSION: 10.0.18362.535
- STACK_COMMAND: .thread ; .cxr ; kb
- BUCKET_ID_FUNC_OFFSET: 36f
- FAILURE_BUCKET_ID: AV_nt!SwapContext
- BUCKET_ID: AV_nt!SwapContext
- PRIMARY_PROBLEM_CLASS: AV_nt!SwapContext
- TARGET_TIME: 2019-12-17T19:48:07.000Z
- OSBUILD: 18362
- OSSERVICEPACK: 535
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- OS_LOCALE:
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 1980-01-11 16:53:20
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.18362.535
- ANALYSIS_SESSION_ELAPSED_TIME: 3210
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:av_nt!swapcontext
- FAILURE_ID_HASH: {47b746a3-60bf-1f5a-5fa5-88903b6a3204}
- Followup: MachineOwner
- ---------
Add Comment
Please, Sign In to add comment