Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
- Copyright (c) Microsoft Corporation. All rights reserved.
- Auto Dump Analyzer by gardenman
- Time to debug file(s): 00 hours and 02 minutes and 50 seconds
- ========================================================================
- =================== Dump File: 080217-5718-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff800`e7e8d000 PsLoadedModuleList = 0xfffff800`e81d95e0
- Debug session time: Wed Aug 2 09:37:52.354 2017 (UTC - 4:00)
- System Uptime: 0 days 0:00:03.007
- BugCheck D1, {ffffa087c5dd04ec, 2, 1, fffff80795632ee8}
- Probably caused by : HDAudBus.sys ( HDAudBus!HdaController::ProcessCodecResponses+b8 )
- Followup: MachineOwner
- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If kernel debugger is available get stack backtrace.
- Arguments:
- Arg1: ffffa087c5dd04ec, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
- Arg4: fffff80795632ee8, address which referenced memory
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_SKU: SKU
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 1902
- BIOS_DATE: 06/24/2016
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: Z170-A
- BASEBOARD_VERSION: Rev 1.xx
- DUMP_TYPE: 2
- WRITE_ADDRESS: fffff800e826e358: Unable to get MiVisibleState
- ffffa087c5dd04ec
- CURRENT_IRQL: 2
- FAULTING_IP:
- HDAudBus!HdaController::ProcessCodecResponses+b8
- fffff807`95632ee8 814cc80c00000080 or dword ptr [rax+rcx*8+0Ch],80000000h
- CPU_COUNT: 4
- CPU_MHZ: db0
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 5e
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 74'00000000 (cache) 74'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: AV
- PROCESS_NAME: System
- TRAP_FRAME: fffff800ea039610 -- (.trap 0xfffff800ea039610)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=ffffa08105d6f2e0 rbx=0000000000000000 rcx=00000000d800c240
- rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff80795632ee8 rsp=fffff800ea0397a0 rbp=fffff800ea039839
- r8=ffffa081061b4ea0 r9=0000000000000000 r10=ffff8886403b2000
- r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na pe nc
- HDAudBus!HdaController::ProcessCodecResponses+0xb8:
- fffff807`95632ee8 814cc80c00000080 or dword ptr [rax+rcx*8+0Ch],80000000h ds:ffffa087`c5dd04ec=????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff800e80048a9 to fffff800e7ff94c0
- STACK_TEXT:
- fffff800`ea0394c8 fffff800`e80048a9 : 00000000`0000000a ffffa087`c5dd04ec 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
- fffff800`ea0394d0 fffff800`e8002e7d : 00000000`00000000 00000000`0000000f fffff800`e8200000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
- fffff800`ea039610 fffff807`95632ee8 : fffff800`e6c8e180 fffff800`e7f0455a 00000000`00000000 fffff800`00000000 : nt!KiPageFault+0x23d
- fffff800`ea0397a0 fffff807`95632df0 : ffff8886`403b2000 ffff8886`403b8c38 00000000`00000000 fffff800`ea039839 : HDAudBus!HdaController::ProcessCodecResponses+0xb8
- fffff800`ea0397f0 fffff800`e7effb6c : fffff800`e6c90f80 00000000`00000001 fffff800`e6c8e180 00000000`00010001 : HDAudBus!HdaController::CodecDpc+0x70
- fffff800`ea0398a0 fffff800`e7eff477 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x1dc
- fffff800`ea0399e0 fffff800`e7ffc56a : 00000000`00000000 fffff800`e6c8e180 00000000`001a6fd0 fffff800`e8286a40 : nt!KiRetireDpcList+0xd7
- fffff800`ea039be0 00000000`00000000 : fffff800`ea03a000 fffff800`ea033000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 286085e0e1881fab9ddcefd3b0d2f1b9a8af6992
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0fb7a980ad76883b698c1ef17ae1b78258489530
- THREAD_SHA1_HASH_MOD: c45ee725c8d5fb0d0409d0de11f98f0bac8ce545
- FOLLOWUP_IP:
- HDAudBus!HdaController::ProcessCodecResponses+b8
- fffff807`95632ee8 814cc80c00000080 or dword ptr [rax+rcx*8+0Ch],80000000h
- FAULT_INSTR_CODE: cc84c81
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: HDAudBus!HdaController::ProcessCodecResponses+b8
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: HDAudBus
- IMAGE_NAME: HDAudBus.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 21fd8579
- IMAGE_VERSION: 10.0.15046.0
- BUCKET_ID_FUNC_OFFSET: b8
- FAILURE_BUCKET_ID: OLD_IMAGE_HDAudBus.sys
- BUCKET_ID: OLD_IMAGE_HDAudBus.sys
- PRIMARY_PROBLEM_CLASS: OLD_IMAGE_HDAudBus.sys
- TARGET_TIME: 2017-08-02T13:37:52.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 21ab
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:old_image_hdaudbus.sys
- FAILURE_ID_HASH: {07e9e28c-c1da-5e3c-13fb-74d30982443e}
- Followup: MachineOwner
- ========================================================================
- ============================== Drivers ===============================
- ========================================================================
- Image path: \SystemRoot\system32\DRIVERS\e1d65x64.sys
- Image name: e1d65x64.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=e1d65x64.sys
- Timestamp: Thu Aug 13 2015
- Image path: \SystemRoot\system32\drivers\nvvad64v.sys
- Image name: nvvad64v.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=nvvad64v.sys
- Possible Driver Info: Nvidia Virtual Audio Driver http://www.nvidia.com/
- Timestamp: Sun May 28 2017
- Image path: \SystemRoot\System32\drivers\nvvhci.sys
- Image name: nvvhci.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=nvvhci.sys
- Timestamp: Tue Dec 27 2016
- Image path: \SystemRoot\system32\drivers\nvhda64v.sys
- Image name: nvhda64v.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=nvhda64v.sys
- Timestamp: Wed Mar 15 2017
- Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_ref_pubwu.inf_amd64_f9309145156afb40\nvlddmkm.sys
- Image name: nvlddmkm.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=nvlddmkm.sys
- Possible Driver Info: Nvidia Graphics Card driver. http://www.nvidia.com/
- Timestamp: Mon May 1 2017
- Image path: \SystemRoot\System32\drivers\TeeDriverW8x64.sys
- Image name: TeeDriverW8x64.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=TeeDriverW8x64.sys
- Possible Driver Info: Intel® Management Engine Interface
- Timestamp: Mon Mar 28 2016
- Image path: \SystemRoot\system32\drivers\RTKVHD64.sys
- Image name: RTKVHD64.sys
- Possible Info Link: http://www.carrona.org/drivers/driver.php?id=RTKVHD64.sys
- Timestamp: Tue Aug 16 2016
- Unloaded modules:
- fffff807`92ec0000 fffff807`92ee0000 dam.sys
- fffff807`919b0000 fffff807`919bf000 WdBoot.sys
- fffff807`92120000 fffff807`9212f000 hwpolicy.sys
- ========================================================================
- ============================== BIOS INFO =============================
- ========================================================================
- [SMBIOS Data Tables v3.0]
- [DMI Version - 0]
- [2.0 Calling Convention - No]
- [Table Size - 4402 bytes]
- [BIOS Information (Type 0) - Length 24 - Handle 0000h]
- Vendor American Megatrends Inc.
- BIOS Version 1902
- BIOS Starting Address Segment f000
- BIOS Release Date 06/24/2016
- BIOS ROM Size 1000000
- BIOS Characteristics
- 07: - PCI Supported
- 10: - APM Supported
- 11: - Upgradeable FLASH BIOS
- 12: - BIOS Shadowing Supported
- 15: - CD-Boot Supported
- 16: - Selectable Boot Supported
- 17: - BIOS ROM Socketed
- 19: - EDD Supported
- 23: - 1.2MB Floppy Supported
- 24: - 720KB Floppy Supported
- 25: - 2.88MB Floppy Supported
- 26: - Print Screen Device Supported
- 27: - Keyboard Services Supported
- 28: - Serial Services Supported
- 29: - Printer Services Supported
- 32: - BIOS Vendor Reserved
- BIOS Characteristic Extensions
- 00: - ACPI Supported
- 01: - USB Legacy Supported
- 08: - BIOS Boot Specification Supported
- 10: - Specification Reserved
- 11: - Specification Reserved
- BIOS Major Revision 5
- BIOS Minor Revision 11
- EC Firmware Major Revision 255
- EC Firmware Minor Revision 255
- [System Information (Type 1) - Length 27 - Handle 0001h]
- Manufacturer System manufacturer
- Product Name System Product Name
- Version System Version
- UUID 00000000-0000-0000-0000-000000000000
- Wakeup Type Power Switch
- SKUNumber SKU
- [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
- Manufacturer ASUSTeK COMPUTER INC.
- Product Z170-A
- Version Rev 1.xx
- Feature Flags 09h
- 1591878152: - ?ÿU?ì?ì¡H.õ^3Å?Eü3ÀW?}?Eô?Eø?ÿu
- ¸@
- 1591878192: - ?ÿU?ì?ì¡H.õ^3Å?Eü3ÀW?}?Eô?Eø?ÿu
- ¸@
- Location Default string
- Chassis Handle 0003h
- Board Type 0ah - Processor/Memory Module
- Number of Child Handles 0
- [System Enclosure (Type 3) - Length 22 - Handle 0003h]
- Manufacturer Default string
- Chassis Type Desktop
- Version Default string
- Bootup State Safe
- Power Supply State Safe
- Thermal State Safe
- Security Status None
- OEM Defined 0
- Height 0U
- Number of Power Cords 1
- Number of Contained Elements 0
- Contained Element Size 3
- [Onboard Devices Information (Type 10) - Length 6 - Handle 0028h]
- Number of Devices 1
- 01: Type Video [enabled]
- [OEM Strings (Type 11) - Length 5 - Handle 0029h]
- Number of Strings 4
- 1 Default string
- 2 Default string
- 3 ORC
- 4 Default string
- [System Configuration Options (Type 12) - Length 5 - Handle 002ah]
- [Cache Information (Type 7) - Length 19 - Handle 0045h]
- Socket Designation L1 Cache
- Cache Configuration 0180h - WB Enabled Int NonSocketed L1
- Maximum Cache Size 0080h - 128K
- Installed Size 0080h - 128K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type ParitySingle-Bit ECC
- System Cache Type Data
- Associativity 8-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 0046h]
- Socket Designation L1 Cache
- Cache Configuration 0180h - WB Enabled Int NonSocketed L1
- Maximum Cache Size 0080h - 128K
- Installed Size 0080h - 128K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type ParitySingle-Bit ECC
- System Cache Type Instruction
- Associativity 8-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 0047h]
- Socket Designation L2 Cache
- Cache Configuration 0181h - WB Enabled Int NonSocketed L2
- Maximum Cache Size 0400h - 1024K
- Installed Size 0400h - 1024K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type Multi-Bit ECC
- System Cache Type Unified
- Associativity 4-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 0048h]
- Socket Designation L3 Cache
- Cache Configuration 0182h - WB Enabled Int NonSocketed L3
- Maximum Cache Size 1800h - 6144K
- Installed Size 1800h - 6144K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type Specification Reserved
- System Cache Type Unified
- Associativity Specification Reserved
- [Processor Information (Type 4) - Length 48 - Handle 0049h]
- Socket Designation LGA1151
- Processor Type Central Processor
- Processor Family cdh - Specification Reserved
- Processor Manufacturer Intel(R) Corporation
- Processor ID e3060500fffbebbf
- Processor Version Intel(R) Core(TM) i5-6600K CPU @ 3.50GHz
- Processor Voltage 8bh - 1.1V
- External Clock 100MHz
- Max Speed 8300MHz
- Current Speed 3500MHz
- Status Enabled Populated
- Processor Upgrade Other
- L1 Cache Handle 0046h
- L2 Cache Handle 0047h
- L3 Cache Handle 0048h
- [Physical Memory Array (Type 16) - Length 23 - Handle 004ah]
- Location 03h - SystemBoard/Motherboard
- Use 03h - System Memory
- Memory Error Correction 03h - None
- Maximum Capacity 67108864KB
- Number of Memory Devices 4
- [Memory Device (Type 17) - Length 40 - Handle 004bh]
- Physical Memory Array Handle 004ah
- Total Width 0 bits
- Data Width 0 bits
- Form Factor 02h - Unknown
- Device Locator ChannelA-DIMM1
- Bank Locator BANK 0
- Memory Type 02h - Unknown
- Type Detail 0000h -
- Speed 0MHz
- [Memory Device (Type 17) - Length 40 - Handle 004ch]
- Physical Memory Array Handle 004ah
- Total Width 64 bits
- Data Width 64 bits
- Size 8192MB
- Form Factor 09h - DIMM
- Device Locator ChannelA-DIMM2
- Bank Locator BANK 1
- Memory Type 1ah - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 2133MHz
- Manufacturer G-Skill
- Part Number F4-2133C15-8GRR
- [Memory Device (Type 17) - Length 40 - Handle 004dh]
- Physical Memory Array Handle 004ah
- Total Width 0 bits
- Data Width 0 bits
- Form Factor 02h - Unknown
- Device Locator ChannelB-DIMM1
- Bank Locator BANK 2
- Memory Type 02h - Unknown
- Type Detail 0000h -
- Speed 0MHz
- [Memory Device (Type 17) - Length 40 - Handle 004eh]
- Physical Memory Array Handle 004ah
- Total Width 64 bits
- Data Width 64 bits
- Size 8192MB
- Form Factor 09h - DIMM
- Device Locator ChannelB-DIMM2
- Bank Locator BANK 3
- Memory Type 1ah - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 2133MHz
- Manufacturer G-Skill
- Part Number F4-2133C15-8GRR
- [Memory Array Mapped Address (Type 19) - Length 31 - Handle 004fh]
- Starting Address 00000000h
- Ending Address 00ffffffh
- Memory Array Handle 004ah
- Partition Width 02
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0051h]
- Starting Address 00000000h
- Ending Address 007fffffh
- Memory Device Handle 004ch
- Mem Array Mapped Adr Handle 004fh
- Interleave Position 01
- Interleave Data Depth 02
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0052h]
- Starting Address 00800000h
- Ending Address 00ffffffh
- Memory Device Handle 004eh
- Mem Array Mapped Adr Handle 004fh
- Interleave Position 02
- Interleave Data Depth 02
- ========================================================================
- =================== Dump File: 080217-5812-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff803`e988c000 PsLoadedModuleList = 0xfffff803`e9bd85e0
- Debug session time: Wed Aug 2 09:50:28.884 2017 (UTC - 4:00)
- System Uptime: 0 days 0:09:29.537
- BugCheck F7, {6692bff56ecf, 6e92bff56ecf, ffff916d400a9130, 0}
- Probably caused by : ntkrnlmp.exe ( nt!_report_gsfailure+25 )
- Followup: MachineOwner
- DRIVER_OVERRAN_STACK_BUFFER (f7)
- A driver has overrun a stack-based buffer. This overrun could potentially
- allow a malicious user to gain control of this machine.
- DESCRIPTION
- A driver overran a stack-based buffer (or local variable) in a way that would
- have overwritten the function's return address and jumped back to an arbitrary
- address when the function returned. This is the classic "buffer overrun"
- hacking attack and the system has been brought down to prevent a malicious user
- from gaining complete control of it.
- Do a kb to get a stack backtrace -- the last routine on the stack before the
- buffer overrun handlers and bugcheck call is the one that overran its local
- variable(s).
- Arguments:
- Arg1: 00006692bff56ecf, Actual security check cookie from the stack
- Arg2: 00006e92bff56ecf, Expected security check cookie
- Arg3: ffff916d400a9130, Complement of the expected security check cookie
- Arg4: 0000000000000000, zero
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_SKU: SKU
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 1902
- BIOS_DATE: 06/24/2016
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: Z170-A
- BASEBOARD_VERSION: Rev 1.xx
- DUMP_TYPE: 2
- SECURITY_COOKIE: Expected 00006e92bff56ecf found 00006692bff56ecf
- BUGCHECK_STR: 0xF7_ONE_BIT
- CPU_COUNT: 4
- CPU_MHZ: db0
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 5e
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 74'00000000 (cache) 74'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: nvspcaps64.exe
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from fffff803e9a66905 to fffff803e99f84c0
- STACK_TEXT:
- ffffbc81`b570f7a8 fffff803`e9a66905 : 00000000`000000f7 00006692`bff56ecf 00006e92`bff56ecf ffff916d`400a9130 : nt!KeBugCheckEx
- ffffbc81`b570f7b0 fffff803`e98bfae6 : ffff8588`00000000 00000000`00000000 00000000`00000001 00001f80`00000000 : nt!_report_gsfailure+0x25
- ffffbc81`b570f7f0 fffff803`e98bf461 : 00000000`00000000 00000000`0573f730 00000000`00000000 ffff9a00`ac87e7ec : nt!KiSwapThread+0x1b6
- ffffbc81`b570f8a0 fffff803`e98bed78 : ffff8588`91cfd650 fffff803`00000000 ffff9a00`ac87e700 ffff8588`974c1570 : nt!KiCommitThreadWait+0x101
- ffffbc81`b570f940 fffff803`e9d14db8 : ffff8588`974c1570 00000000`00000006 00000000`00000001 ffffbc81`b570fb00 : nt!KeWaitForSingleObject+0x2b8
- ffffbc81`b570fa10 fffff803`e9a03413 : ffff8588`96568080 00000000`ffffffff 00000000`00000000 ffff8588`974c1570 : nt!NtWaitForSingleObject+0xf8
- ffffbc81`b570fa80 00007ffe`d52e5424 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000000`0573f7a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`d52e5424
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 20a6c2ca139290b6b0f69f439d1ba3f651d8f65a
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: be8294a57536fa05d07e28d25301a945be97d28e
- THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6
- FOLLOWUP_IP:
- nt!_report_gsfailure+25
- fffff803`e9a66905 cc int 3
- FAULT_INSTR_CODE: cccccccc
- SYMBOL_STACK_INDEX: 1
- SYMBOL_NAME: nt!_report_gsfailure+25
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 595f24eb
- IMAGE_VERSION: 10.0.15063.483
- BUCKET_ID_FUNC_OFFSET: 25
- FAILURE_BUCKET_ID: 0xF7_ONE_BIT_MISSING_GSFRAME_nt!_report_gsfailure
- BUCKET_ID: 0xF7_ONE_BIT_MISSING_GSFRAME_nt!_report_gsfailure
- PRIMARY_PROBLEM_CLASS: 0xF7_ONE_BIT_MISSING_GSFRAME_nt!_report_gsfailure
- TARGET_TIME: 2017-08-02T13:50:28.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 91b
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0xf7_one_bit_missing_gsframe_nt!_report_gsfailure
- FAILURE_ID_HASH: {8f84f302-dd0e-1f96-6f9c-0ea31ad59f42}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 080217-5125-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff802`7ea99000 PsLoadedModuleList = 0xfffff802`7ede55e0
- Debug session time: Wed Aug 2 11:40:02.338 2017 (UTC - 4:00)
- System Uptime: 0 days 0:53:37.900
- BugCheck A, {fffffa862a03ed48, 2, 0, fffff8027eb0a794}
- Probably caused by : ntkrnlmp.exe ( nt!KiProcessExpiredTimerList+144 )
- Followup: MachineOwner
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: fffffa862a03ed48, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000000, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff8027eb0a794, address which referenced memory
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_SKU: SKU
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 1902
- BIOS_DATE: 06/24/2016
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: Z170-A
- BASEBOARD_VERSION: Rev 1.xx
- DUMP_TYPE: 2
- READ_ADDRESS: fffff8027ee7a358: Unable to get MiVisibleState
- fffffa862a03ed48
- CURRENT_IRQL: 2
- FAULTING_IP:
- nt!KiProcessExpiredTimerList+144
- fffff802`7eb0a794 483918 cmp qword ptr [rax],rbx
- CPU_COUNT: 4
- CPU_MHZ: db0
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 5e
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 74'00000000 (cache) 74'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: AV
- PROCESS_NAME: System
- TRAP_FRAME: fffff80280c39760 -- (.trap 0xfffff80280c39760)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=fffffa862a03ed48 rbx=0000000000000000 rcx=ffffaa862a03ed48
- rdx=ffffaa862a03ed40 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8027eb0a794 rsp=fffff80280c398f0 rbp=ffffaa862a03d080
- r8=fffff8027d90c800 r9=0000000000000001 r10=000000077e04ad43
- r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- nt!KiProcessExpiredTimerList+0x144:
- fffff802`7eb0a794 483918 cmp qword ptr [rax],rbx ds:fffffa86`2a03ed48=????????????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff8027ec108a9 to fffff8027ec054c0
- STACK_TEXT:
- fffff802`80c39618 fffff802`7ec108a9 : 00000000`0000000a fffffa86`2a03ed48 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
- fffff802`80c39620 fffff802`7ec0ee7d : 00000384`5811af65 fffff802`7d90ef48 00000390`863ad091 00000000`00000001 : nt!KiBugCheckDispatch+0x69
- fffff802`80c39760 fffff802`7eb0a794 : fffff802`7d909180 ffffaa86`00000000 fffff802`80c39a98 00000000`00000000 : nt!KiPageFault+0x23d
- fffff802`80c398f0 fffff802`7eb0b707 : fffff802`7d909180 00000000`003436b4 00000000`00000000 00000000`0001df99 : nt!KiProcessExpiredTimerList+0x144
- fffff802`80c399e0 fffff802`7ec0856a : 00000000`00000000 fffff802`7d909180 00000000`001a6fd0 fffff802`7ee92a40 : nt!KiRetireDpcList+0x367
- fffff802`80c39be0 00000000`00000000 : fffff802`80c3a000 fffff802`80c33000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: c73bb6ff898fe473664c349f64dc01aa275821e8
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c83217197397b6586eb2f7586c5d7246bdd71e96
- THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
- FOLLOWUP_IP:
- nt!KiProcessExpiredTimerList+144
- fffff802`7eb0a794 483918 cmp qword ptr [rax],rbx
- FAULT_INSTR_CODE: f183948
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: nt!KiProcessExpiredTimerList+144
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 595f24eb
- IMAGE_VERSION: 10.0.15063.483
- BUCKET_ID_FUNC_OFFSET: 144
- FAILURE_BUCKET_ID: AV_nt!KiProcessExpiredTimerList
- BUCKET_ID: AV_nt!KiProcessExpiredTimerList
- PRIMARY_PROBLEM_CLASS: AV_nt!KiProcessExpiredTimerList
- TARGET_TIME: 2017-08-02T15:40:02.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 1eaa
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:av_nt!kiprocessexpiredtimerlist
- FAILURE_ID_HASH: {a74cefe1-c8f8-f6bc-a51d-bfc4da639d5f}
- Followup: MachineOwner
- ========================================================================
- =================== Dump File: 080217-5437-01.dmp ====================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 15063 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 15063.0.amd64fre.rs2_release.170317-1834
- Kernel base = 0xfffff802`a200a000 PsLoadedModuleList = 0xfffff802`a23565e0
- Debug session time: Wed Aug 2 10:28:59.828 2017 (UTC - 4:00)
- System Uptime: 0 days 0:02:03.481
- BugCheck 50, {fffffd02a203d461, 10, fffffd02a203d461, 2}
- Could not read faulting driver name
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- PAGE_FAULT_IN_NONPAGED_AREA (50)
- Invalid system memory was referenced. This cannot be protected by try-except.
- Typically the address is just plain bad or it is pointing at freed memory.
- Arguments:
- Arg1: fffffd02a203d461, memory referenced.
- Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
- Arg3: fffffd02a203d461, If non-zero, the instruction address which referenced the bad memory
- address.
- Arg4: 0000000000000002, (reserved)
- Debugging Details:
- Could not read faulting driver name
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.15063.483 (WinBuild.160101.0800)
- SYSTEM_SKU: SKU
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 1902
- BIOS_DATE: 06/24/2016
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: Z170-A
- BASEBOARD_VERSION: Rev 1.xx
- DUMP_TYPE: 2
- READ_ADDRESS: fffff802a23eb358: Unable to get MiVisibleState
- fffffd02a203d461
- FAULTING_IP:
- +0
- fffffd02`a203d461 ?? ???
- MM_INTERNAL_CODE: 2
- CPU_COUNT: 4
- CPU_MHZ: db0
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 5e
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 74'00000000 (cache) 74'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: AV
- PROCESS_NAME: System
- CURRENT_IRQL: 0
- TRAP_FRAME: ffffa500ac64e790 -- (.trap 0xffffa500ac64e790)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000000 rbx=0000000000000000 rcx=ac57952602660000
- rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffffd02a203d461 rsp=ffffa500ac64e920 rbp=ffffa500a7f64180
- r8=00000000ffffffff r9=0000000077d61ddc r10=0000000000000000
- r11=0000000000000246 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz na po nc
- fffffd02`a203d461 ?? ???
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff802a21abfb4 to fffff802a21764c0
- FAILED_INSTRUCTION_ADDRESS:
- +0
- fffffd02`a203d461 ?? ???
- STACK_TEXT:
- ffffa500`ac64e4f8 fffff802`a21abfb4 : 00000000`00000050 fffffd02`a203d461 00000000`00000010 ffffa500`ac64e790 : nt!KeBugCheckEx
- ffffa500`ac64e500 fffff802`a20972d6 : 00000000`00000010 fffffd02`a203d461 ffffa500`ac64e790 ffffdd04`ec27a040 : nt!MiSystemFault+0x116e84
- ffffa500`ac64e5a0 fffff802`a217fd72 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0xae6
- ffffa500`ac64e790 fffffd02`a203d461 : ffffdd04`f0993040 ffffdd04`f0993180 00000000`00000000 ffffa500`ac64ea58 : nt!KiPageFault+0x132
- ffffa500`ac64e920 ffffdd04`f0993040 : ffffdd04`f0993180 00000000`00000000 ffffa500`ac64ea58 00000000`00001200 : 0xfffffd02`a203d461
- ffffa500`ac64e928 ffffdd04`f0993180 : 00000000`00000000 ffffa500`ac64ea58 00000000`00001200 ffffa500`ac649000 : 0xffffdd04`f0993040
- ffffa500`ac64e930 00000000`00000000 : ffffa500`ac64ea58 00000000`00001200 ffffa500`ac649000 ffffa500`ac649000 : 0xffffdd04`f0993180
- STACK_COMMAND: kb
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff802a20973b0 - nt!MmAccessFault+bc0
- [ f6:dc ]
- fffff802a21abfd9 - nt!MiValidFault+1160f9 (+0x114c29)
- [ f6:dc ]
- 2 errors : !nt (fffff802a20973b0-fffff802a21abfd9)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2017-08-02T14:28:59.000Z
- OSBUILD: 15063
- OSSERVICEPACK: 483
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2017-07-07 02:06:35
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.15063.483
- ANALYSIS_SESSION_ELAPSED_TIME: 29c3
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment