Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.17134.12 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [E:\050218-8500-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- ************* Path validation summary **************
- Response Time (ms) Location
- Deferred SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
- Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
- Executable search path is:
- Windows 10 Kernel Version 16299 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Machine Name:
- Kernel base = 0xfffff800`c0299000 PsLoadedModuleList = 0xfffff800`c05ff110
- Debug session time: Wed May 2 13:49:21.863 2018 (UTC + 2:00)
- System Uptime: 0 days 0:07:33.788
- Loading Kernel Symbols
- ..
- Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
- Run !sym noisy before .reload to track down problems loading symbols.
- .............................................................
- ................................................................
- ...............................................................
- Loading User Symbols
- Loading unloaded module list
- ...........
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck 1E, {ffffffffc0000096, fffff800c04c6879, fffff800c245db98, fffff800c245d3e0}
- Probably caused by : tcpip.sys ( tcpip!IppFlcReceivePacketsCore+3c8 )
- Followup: MachineOwner
- ---------
- 0: kd> ! analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- KMODE_EXCEPTION_NOT_HANDLED (1e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Arguments:
- Arg1: ffffffffc0000096, The exception code that was not handled
- Arg2: fffff800c04c6879, The address that the exception occurred at
- Arg3: fffff800c245db98, Parameter 0 of the exception
- Arg4: fffff800c245d3e0, Parameter 1 of the exception
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- TIMELINE_ANALYSIS: 1
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.16299.402 (WinBuild.160101.0800)
- SYSTEM_MANUFACTURER: Hewlett-Packard
- SYSTEM_PRODUCT_NAME: HP PAVILION NOTEBOOK
- SYSTEM_SKU: G2B30EA#UUW
- SYSTEM_VERSION: 08A3110000300000000000000
- BIOS_VENDOR: Insyde
- BIOS_VERSION: F.20
- BIOS_DATE: 03/14/2017
- BASEBOARD_MANUFACTURER: Hewlett-Packard
- BASEBOARD_PRODUCT: 2170
- BASEBOARD_VERSION: 31.25
- DUMP_TYPE: 2
- DUMP_FILE_ATTRIBUTES: 0x8
- Kernel Generated Triage Dump
- BUGCHECK_P1: ffffffffc0000096
- BUGCHECK_P2: fffff800c04c6879
- BUGCHECK_P3: fffff800c245db98
- BUGCHECK_P4: fffff800c245d3e0
- EXCEPTION_CODE: (NTSTATUS) 0xc0000096 - {EXCEPTION} Privileged instruction.
- FAULTING_IP:
- nt!MiTransientCombineAddress+99
- fffff800`c04c6879 440f22c1 mov cr8,rcx
- EXCEPTION_PARAMETER1: fffff800c245db98
- EXCEPTION_PARAMETER2: fffff800c245d3e0
- BUGCHECK_STR: 0x1E_c0000096
- CPU_COUNT: 4
- CPU_MHZ: 7cc
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 16
- CPU_MODEL: 0
- CPU_STEPPING: 1
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXPNP: 1 (!blackboxpnp)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: chrome.exe
- CURRENT_IRQL: 2
- ANALYSIS_SESSION_HOST: DESKTOP-HQ89IPB
- ANALYSIS_SESSION_TIME: 05-02-2018 14:06:03.0438
- ANALYSIS_VERSION: 10.0.17134.12 amd64fre
- DPC_STACK_BASE: FFFFF800C245EFB0
- EXCEPTION_RECORD: ffffc50a14360e60 -- (.exr 0xffffc50a14360e60)
- Cannot read Exception record @ ffffc50a14360e60
- TRAP_FRAME: ffffc50a1114c370 -- (.trap 0xffffc50a1114c370)
- Unable to read trap frame at ffffc50a`1114c370
- LAST_CONTROL_TRANSFER: from fffff800c04995d3 to fffff800c040e930
- STACK_TEXT:
- fffff800`c245cb98 fffff800`c04995d3 : 00000000`0000001e ffffffff`c0000096 fffff800`c04c6879 fffff800`c245db98 : nt!KeBugCheckEx
- fffff800`c245cba0 fffff800`c0426726 : fffff800`c04c6879 fffff800`c033cf48 fffff800`c245ddd8 fffff800`c245db98 : nt!KiFatalFilter+0x1f
- fffff800`c245cbe0 fffff800`c03ec12f : ffffc50a`00000001 00000000`00000000 fffff800`c2459000 fffff800`c245f000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
- fffff800`c245cc20 fffff800`c04178bd : 00000000`00000000 fffff800`c245cdc0 fffff800`c245db98 ffffbf4f`8fba0e5d : nt!_C_specific_handler+0x9f
- fffff800`c245cc90 fffff800`c033ca50 : 00000000`00000000 fffff800`c245db98 ffffc50a`00000001 ffffc50a`11c00000 : nt!RtlpExecuteHandlerForException+0xd
- fffff800`c245ccc0 fffff800`c033d683 : fffff800`c245db98 fffff800`c245d8e0 fffff800`c245db98 ffffc50a`1f8f5b88 : nt!RtlDispatchException+0x430
- fffff800`c245d3b0 fffff800`c0420bc2 : ffffc50a`14360e60 fffff80e`f8e74158 ffffc50a`1114c370 ffffc50a`116dc1b0 : nt!KiDispatchException+0x1f3
- fffff800`c245da60 fffff800`c041cd75 : 00000000`00000000 00000000`00000082 00000000`00000001 00000000`00000001 : nt!KiExceptionDispatch+0xc2
- fffff800`c245dc40 fffff800`c04c6879 : fffff800`c04bdd36 fffff800`c245df90 00000000`00000002 fffff800`c245e020 : nt!KiGeneralProtectionFault+0x335
- fffff800`c245ddd8 fffff800`c245dec9 : fffff80e`f4c69818 fffff80e`f4de4000 ffffc50a`11088940 00000000`00000041 : nt!MiTransientCombineAddress+0x99
- fffff800`c245de08 fffff80e`f4c69818 : fffff80e`f4de4000 ffffc50a`11088940 00000000`00000041 fffff800`c245e020 : 0xfffff800`c245dec9
- fffff800`c245de10 fffff80e`f4c26b7c : ffffc50a`1328d910 ffffc50a`14360e60 00000000`00000001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x3c8
- fffff800`c245df30 fffff80e`f4c268b6 : ffffc50a`14360e60 00000000`00000000 fffff800`c245e048 fffff800`c245df70 : tcpip!IpFlcReceivePackets+0xc
- fffff800`c245df60 fffff80e`f4c6a758 : ffffc50a`132c0002 00001f80`01010001 00000000`00000000 ffffc50a`1089cb80 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x256
- fffff800`c245e040 fffff800`c03297fb : ffffc50a`10615740 fffff800`c245e249 00000000`00000002 fffff800`c05464fb : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x118
- fffff800`c245e170 fffff800`c032975d : ffffc50a`1060d890 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x8b
- fffff800`c245e1c0 fffff800`c0633a08 : 00000000`00000b02 00000000`00000041 ffffc50a`13db7790 fffff800`c0633f40 : nt!KeExpandKernelStackAndCalloutEx+0x1d
- fffff800`c245e200 00000000`00000b02 : 00000000`00000041 ffffc50a`13db7790 fffff800`c0633f40 ffffc50a`10615740 : nt!NonPagedPoolDescriptor+0x8
- fffff800`c245e208 00000000`00000041 : ffffc50a`13db7790 fffff800`c0633f40 ffffc50a`10615740 fffff80e`f4d062be : 0xb02
- fffff800`c245e210 ffffc50a`13db7790 : fffff800`c0633f40 ffffc50a`10615740 fffff80e`f4d062be 00000000`00000001 : 0x41
- fffff800`c245e218 fffff800`c0633f40 : ffffc50a`10615740 fffff80e`f4d062be 00000000`00000001 00000000`00000000 : 0xffffc50a`13db7790
- fffff800`c245e220 ffffc50a`10615740 : fffff80e`f4d062be 00000000`00000001 00000000`00000000 00000000`00000000 : nt!NonPagedPoolDescriptor+0x540
- fffff800`c245e228 fffff80e`f4d062be : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000001 : 0xffffc50a`10615740
- fffff800`c245e230 fffff80e`f4c83f92 : 00000000`00000001 00000000`00000200 00000000`00000400 ffffc50a`1176d000 : tcpip!memset+0x4db7e
- fffff800`c245e260 fffff80e`f58f4fae : ffffc50a`0fc701a0 ffffc50a`132a5891 00000000`00000001 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x252
- fffff800`c245e490 ff00000e`f58f0081 : ffffc50a`13320001 00000000`00000000 ffffc50a`00000000 ff000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x13e
- fffff800`c245e560 ffffc50a`13320001 : 00000000`00000000 ffffc50a`00000000 ff000000`00000001 ffffc50a`000000ff : 0xff00000e`f58f0081
- fffff800`c245e568 00000000`00000000 : ffffc50a`00000000 ff000000`00000001 ffffc50a`000000ff 00000000`00000000 : 0xffffc50a`13320001
- THREAD_SHA1_HASH_MOD_FUNC: b78f732074ad1583ce8134949fbf1923b8ec1cfb
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 22b89dc4ecd3d5dff27f42c9f7ef79351a73148c
- THREAD_SHA1_HASH_MOD: 4b22dc7afafebc8acd8798a54a9efe985674d599
- FOLLOWUP_IP:
- tcpip!IppFlcReceivePacketsCore+3c8
- fffff80e`f4c69818 8d0cc0 lea ecx,[rax+rax*8]
- FAULT_INSTR_CODE: 48c00c8d
- SYMBOL_STACK_INDEX: b
- SYMBOL_NAME: tcpip!IppFlcReceivePacketsCore+3c8
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: tcpip
- IMAGE_NAME: tcpip.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 39ec9e9f
- IMAGE_VERSION: 10.0.16299.334
- STACK_COMMAND: .thread ; .cxr ; kb
- BUCKET_ID_FUNC_OFFSET: 3c8
- FAILURE_BUCKET_ID: 0x1E_c0000096_tcpip!IppFlcReceivePacketsCore
- BUCKET_ID: 0x1E_c0000096_tcpip!IppFlcReceivePacketsCore
- PRIMARY_PROBLEM_CLASS: 0x1E_c0000096_tcpip!IppFlcReceivePacketsCore
- TARGET_TIME: 2018-05-02T11:49:21.000Z
- OSBUILD: 16299
- OSSERVICEPACK: 402
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 784
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
- OS_LOCALE:
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2018-04-15 21:59:01
- BUILDDATESTAMP_STR: 160101.0800
- BUILDLAB_STR: WinBuild
- BUILDOSVER_STR: 10.0.16299.402
- ANALYSIS_SESSION_ELAPSED_TIME: a5e
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x1e_c0000096_tcpip!ippflcreceivepacketscore
- FAILURE_ID_HASH: {4b89d319-a12a-c3cf-d0e5-1dab5db420b0}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement