Advertisement
Guest User

Untitled

a guest
May 2nd, 2018
135
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 10.12 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.17134.12 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [E:\050218-8500-01.dmp]
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8.  
  9.  
  10. ************* Path validation summary **************
  11. Response Time (ms) Location
  12. Deferred SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
  13. Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
  14. Executable search path is:
  15. Windows 10 Kernel Version 16299 MP (4 procs) Free x64
  16. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  17. Machine Name:
  18. Kernel base = 0xfffff800`c0299000 PsLoadedModuleList = 0xfffff800`c05ff110
  19. Debug session time: Wed May 2 13:49:21.863 2018 (UTC + 2:00)
  20. System Uptime: 0 days 0:07:33.788
  21. Loading Kernel Symbols
  22. ..
  23.  
  24. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
  25. Run !sym noisy before .reload to track down problems loading symbols.
  26.  
  27. .............................................................
  28. ................................................................
  29. ...............................................................
  30. Loading User Symbols
  31. Loading unloaded module list
  32. ...........
  33. *******************************************************************************
  34. * *
  35. * Bugcheck Analysis *
  36. * *
  37. *******************************************************************************
  38.  
  39. Use !analyze -v to get detailed debugging information.
  40.  
  41. BugCheck 1E, {ffffffffc0000096, fffff800c04c6879, fffff800c245db98, fffff800c245d3e0}
  42.  
  43. Probably caused by : tcpip.sys ( tcpip!IppFlcReceivePacketsCore+3c8 )
  44.  
  45. Followup: MachineOwner
  46. ---------
  47.  
  48. 0: kd> ! analyze -v
  49. *******************************************************************************
  50. * *
  51. * Bugcheck Analysis *
  52. * *
  53. *******************************************************************************
  54.  
  55. KMODE_EXCEPTION_NOT_HANDLED (1e)
  56. This is a very common bugcheck. Usually the exception address pinpoints
  57. the driver/function that caused the problem. Always note this address
  58. as well as the link date of the driver/image that contains this address.
  59. Arguments:
  60. Arg1: ffffffffc0000096, The exception code that was not handled
  61. Arg2: fffff800c04c6879, The address that the exception occurred at
  62. Arg3: fffff800c245db98, Parameter 0 of the exception
  63. Arg4: fffff800c245d3e0, Parameter 1 of the exception
  64.  
  65. Debugging Details:
  66. ------------------
  67.  
  68.  
  69. KEY_VALUES_STRING: 1
  70.  
  71.  
  72. TIMELINE_ANALYSIS: 1
  73.  
  74.  
  75. DUMP_CLASS: 1
  76.  
  77. DUMP_QUALIFIER: 400
  78.  
  79. BUILD_VERSION_STRING: 10.0.16299.402 (WinBuild.160101.0800)
  80.  
  81. SYSTEM_MANUFACTURER: Hewlett-Packard
  82.  
  83. SYSTEM_PRODUCT_NAME: HP PAVILION NOTEBOOK
  84.  
  85. SYSTEM_SKU: G2B30EA#UUW
  86.  
  87. SYSTEM_VERSION: 08A3110000300000000000000
  88.  
  89. BIOS_VENDOR: Insyde
  90.  
  91. BIOS_VERSION: F.20
  92.  
  93. BIOS_DATE: 03/14/2017
  94.  
  95. BASEBOARD_MANUFACTURER: Hewlett-Packard
  96.  
  97. BASEBOARD_PRODUCT: 2170
  98.  
  99. BASEBOARD_VERSION: 31.25
  100.  
  101. DUMP_TYPE: 2
  102.  
  103. DUMP_FILE_ATTRIBUTES: 0x8
  104. Kernel Generated Triage Dump
  105.  
  106. BUGCHECK_P1: ffffffffc0000096
  107.  
  108. BUGCHECK_P2: fffff800c04c6879
  109.  
  110. BUGCHECK_P3: fffff800c245db98
  111.  
  112. BUGCHECK_P4: fffff800c245d3e0
  113.  
  114. EXCEPTION_CODE: (NTSTATUS) 0xc0000096 - {EXCEPTION} Privileged instruction.
  115.  
  116. FAULTING_IP:
  117. nt!MiTransientCombineAddress+99
  118. fffff800`c04c6879 440f22c1 mov cr8,rcx
  119.  
  120. EXCEPTION_PARAMETER1: fffff800c245db98
  121.  
  122. EXCEPTION_PARAMETER2: fffff800c245d3e0
  123.  
  124. BUGCHECK_STR: 0x1E_c0000096
  125.  
  126. CPU_COUNT: 4
  127.  
  128. CPU_MHZ: 7cc
  129.  
  130. CPU_VENDOR: AuthenticAMD
  131.  
  132. CPU_FAMILY: 16
  133.  
  134. CPU_MODEL: 0
  135.  
  136. CPU_STEPPING: 1
  137.  
  138. BLACKBOXBSD: 1 (!blackboxbsd)
  139.  
  140.  
  141. BLACKBOXPNP: 1 (!blackboxpnp)
  142.  
  143.  
  144. CUSTOMER_CRASH_COUNT: 1
  145.  
  146. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  147.  
  148. PROCESS_NAME: chrome.exe
  149.  
  150. CURRENT_IRQL: 2
  151.  
  152. ANALYSIS_SESSION_HOST: DESKTOP-HQ89IPB
  153.  
  154. ANALYSIS_SESSION_TIME: 05-02-2018 14:06:03.0438
  155.  
  156. ANALYSIS_VERSION: 10.0.17134.12 amd64fre
  157.  
  158. DPC_STACK_BASE: FFFFF800C245EFB0
  159.  
  160. EXCEPTION_RECORD: ffffc50a14360e60 -- (.exr 0xffffc50a14360e60)
  161. Cannot read Exception record @ ffffc50a14360e60
  162.  
  163. TRAP_FRAME: ffffc50a1114c370 -- (.trap 0xffffc50a1114c370)
  164. Unable to read trap frame at ffffc50a`1114c370
  165.  
  166. LAST_CONTROL_TRANSFER: from fffff800c04995d3 to fffff800c040e930
  167.  
  168. STACK_TEXT:
  169. fffff800`c245cb98 fffff800`c04995d3 : 00000000`0000001e ffffffff`c0000096 fffff800`c04c6879 fffff800`c245db98 : nt!KeBugCheckEx
  170. fffff800`c245cba0 fffff800`c0426726 : fffff800`c04c6879 fffff800`c033cf48 fffff800`c245ddd8 fffff800`c245db98 : nt!KiFatalFilter+0x1f
  171. fffff800`c245cbe0 fffff800`c03ec12f : ffffc50a`00000001 00000000`00000000 fffff800`c2459000 fffff800`c245f000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
  172. fffff800`c245cc20 fffff800`c04178bd : 00000000`00000000 fffff800`c245cdc0 fffff800`c245db98 ffffbf4f`8fba0e5d : nt!_C_specific_handler+0x9f
  173. fffff800`c245cc90 fffff800`c033ca50 : 00000000`00000000 fffff800`c245db98 ffffc50a`00000001 ffffc50a`11c00000 : nt!RtlpExecuteHandlerForException+0xd
  174. fffff800`c245ccc0 fffff800`c033d683 : fffff800`c245db98 fffff800`c245d8e0 fffff800`c245db98 ffffc50a`1f8f5b88 : nt!RtlDispatchException+0x430
  175. fffff800`c245d3b0 fffff800`c0420bc2 : ffffc50a`14360e60 fffff80e`f8e74158 ffffc50a`1114c370 ffffc50a`116dc1b0 : nt!KiDispatchException+0x1f3
  176. fffff800`c245da60 fffff800`c041cd75 : 00000000`00000000 00000000`00000082 00000000`00000001 00000000`00000001 : nt!KiExceptionDispatch+0xc2
  177. fffff800`c245dc40 fffff800`c04c6879 : fffff800`c04bdd36 fffff800`c245df90 00000000`00000002 fffff800`c245e020 : nt!KiGeneralProtectionFault+0x335
  178. fffff800`c245ddd8 fffff800`c245dec9 : fffff80e`f4c69818 fffff80e`f4de4000 ffffc50a`11088940 00000000`00000041 : nt!MiTransientCombineAddress+0x99
  179. fffff800`c245de08 fffff80e`f4c69818 : fffff80e`f4de4000 ffffc50a`11088940 00000000`00000041 fffff800`c245e020 : 0xfffff800`c245dec9
  180. fffff800`c245de10 fffff80e`f4c26b7c : ffffc50a`1328d910 ffffc50a`14360e60 00000000`00000001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x3c8
  181. fffff800`c245df30 fffff80e`f4c268b6 : ffffc50a`14360e60 00000000`00000000 fffff800`c245e048 fffff800`c245df70 : tcpip!IpFlcReceivePackets+0xc
  182. fffff800`c245df60 fffff80e`f4c6a758 : ffffc50a`132c0002 00001f80`01010001 00000000`00000000 ffffc50a`1089cb80 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x256
  183. fffff800`c245e040 fffff800`c03297fb : ffffc50a`10615740 fffff800`c245e249 00000000`00000002 fffff800`c05464fb : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x118
  184. fffff800`c245e170 fffff800`c032975d : ffffc50a`1060d890 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x8b
  185. fffff800`c245e1c0 fffff800`c0633a08 : 00000000`00000b02 00000000`00000041 ffffc50a`13db7790 fffff800`c0633f40 : nt!KeExpandKernelStackAndCalloutEx+0x1d
  186. fffff800`c245e200 00000000`00000b02 : 00000000`00000041 ffffc50a`13db7790 fffff800`c0633f40 ffffc50a`10615740 : nt!NonPagedPoolDescriptor+0x8
  187. fffff800`c245e208 00000000`00000041 : ffffc50a`13db7790 fffff800`c0633f40 ffffc50a`10615740 fffff80e`f4d062be : 0xb02
  188. fffff800`c245e210 ffffc50a`13db7790 : fffff800`c0633f40 ffffc50a`10615740 fffff80e`f4d062be 00000000`00000001 : 0x41
  189. fffff800`c245e218 fffff800`c0633f40 : ffffc50a`10615740 fffff80e`f4d062be 00000000`00000001 00000000`00000000 : 0xffffc50a`13db7790
  190. fffff800`c245e220 ffffc50a`10615740 : fffff80e`f4d062be 00000000`00000001 00000000`00000000 00000000`00000000 : nt!NonPagedPoolDescriptor+0x540
  191. fffff800`c245e228 fffff80e`f4d062be : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000001 : 0xffffc50a`10615740
  192. fffff800`c245e230 fffff80e`f4c83f92 : 00000000`00000001 00000000`00000200 00000000`00000400 ffffc50a`1176d000 : tcpip!memset+0x4db7e
  193. fffff800`c245e260 fffff80e`f58f4fae : ffffc50a`0fc701a0 ffffc50a`132a5891 00000000`00000001 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x252
  194. fffff800`c245e490 ff00000e`f58f0081 : ffffc50a`13320001 00000000`00000000 ffffc50a`00000000 ff000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x13e
  195. fffff800`c245e560 ffffc50a`13320001 : 00000000`00000000 ffffc50a`00000000 ff000000`00000001 ffffc50a`000000ff : 0xff00000e`f58f0081
  196. fffff800`c245e568 00000000`00000000 : ffffc50a`00000000 ff000000`00000001 ffffc50a`000000ff 00000000`00000000 : 0xffffc50a`13320001
  197.  
  198.  
  199. THREAD_SHA1_HASH_MOD_FUNC: b78f732074ad1583ce8134949fbf1923b8ec1cfb
  200.  
  201. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 22b89dc4ecd3d5dff27f42c9f7ef79351a73148c
  202.  
  203. THREAD_SHA1_HASH_MOD: 4b22dc7afafebc8acd8798a54a9efe985674d599
  204.  
  205. FOLLOWUP_IP:
  206. tcpip!IppFlcReceivePacketsCore+3c8
  207. fffff80e`f4c69818 8d0cc0 lea ecx,[rax+rax*8]
  208.  
  209. FAULT_INSTR_CODE: 48c00c8d
  210.  
  211. SYMBOL_STACK_INDEX: b
  212.  
  213. SYMBOL_NAME: tcpip!IppFlcReceivePacketsCore+3c8
  214.  
  215. FOLLOWUP_NAME: MachineOwner
  216.  
  217. MODULE_NAME: tcpip
  218.  
  219. IMAGE_NAME: tcpip.sys
  220.  
  221. DEBUG_FLR_IMAGE_TIMESTAMP: 39ec9e9f
  222.  
  223. IMAGE_VERSION: 10.0.16299.334
  224.  
  225. STACK_COMMAND: .thread ; .cxr ; kb
  226.  
  227. BUCKET_ID_FUNC_OFFSET: 3c8
  228.  
  229. FAILURE_BUCKET_ID: 0x1E_c0000096_tcpip!IppFlcReceivePacketsCore
  230.  
  231. BUCKET_ID: 0x1E_c0000096_tcpip!IppFlcReceivePacketsCore
  232.  
  233. PRIMARY_PROBLEM_CLASS: 0x1E_c0000096_tcpip!IppFlcReceivePacketsCore
  234.  
  235. TARGET_TIME: 2018-05-02T11:49:21.000Z
  236.  
  237. OSBUILD: 16299
  238.  
  239. OSSERVICEPACK: 402
  240.  
  241. SERVICEPACK_NUMBER: 0
  242.  
  243. OS_REVISION: 0
  244.  
  245. SUITE_MASK: 784
  246.  
  247. PRODUCT_TYPE: 1
  248.  
  249. OSPLATFORM_TYPE: x64
  250.  
  251. OSNAME: Windows 10
  252.  
  253. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  254.  
  255. OS_LOCALE:
  256.  
  257. USER_LCID: 0
  258.  
  259. OSBUILD_TIMESTAMP: 2018-04-15 21:59:01
  260.  
  261. BUILDDATESTAMP_STR: 160101.0800
  262.  
  263. BUILDLAB_STR: WinBuild
  264.  
  265. BUILDOSVER_STR: 10.0.16299.402
  266.  
  267. ANALYSIS_SESSION_ELAPSED_TIME: a5e
  268.  
  269. ANALYSIS_SOURCE: KM
  270.  
  271. FAILURE_ID_HASH_STRING: km:0x1e_c0000096_tcpip!ippflcreceivepacketscore
  272.  
  273. FAILURE_ID_HASH: {4b89d319-a12a-c3cf-d0e5-1dab5db420b0}
  274.  
  275. Followup: MachineOwner
  276. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement