Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Instant Online Crash Analysis, brought to you by OSR Open Systems Resources, Inc.
- Show DivPrimary Analysis
- Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
- Online Crash Dump Analysis Service
- See http://www.osronline.com for more information
- Windows 8 Version 17763 MP (16 procs) Free x64
- Product: WinNt, suite: SingleUserTS
- kernel32.dll version: 10.0.17763.1 (WinBuild.160101.0800)
- Machine Name:
- Debug session time: Mon Dec 31 10:02:53.000 2018 (UTC - 5:00)
- System Uptime: not available
- Process Uptime: 0 days 0:00:09.000
- Kernel time: 0 days 0:00:01.000
- User time: 0 days 0:00:04.000
- TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\oca.ini, error 2
- TRIAGER: Could not open triage file : e:\dump_analysis\program\winxp\triage.ini, error 2
- TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\user.ini, error 2
- *******************************************************************************
- * *
- * Exception Analysis *
- * *
- *******************************************************************************
- *** WARNING: Unable to verify timestamp for bfv.exe
- *** ERROR: Module load completed but symbols could not be loaded for bfv.exe
- TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\guids.ini, error 2
- *** WARNING: Unable to verify timestamp for dbdata.dll
- *** ERROR: Module load completed but symbols could not be loaded for dbdata.dll
- *** WARNING: Unable to verify timestamp for igo64.dll
- *** ERROR: Module load completed but symbols could not be loaded for igo64.dll
- *** WARNING: Unable to verify timestamp for nvapi64.dll
- *** ERROR: Module load completed but symbols could not be loaded for nvapi64.dll
- *** WARNING: Unable to verify timestamp for nvrtum64.dll
- *** ERROR: Module load completed but symbols could not be loaded for nvrtum64.dll
- *** WARNING: Unable to verify timestamp for nvwgf2umx.dll
- *** ERROR: Module load completed but symbols could not be loaded for nvwgf2umx.dll
- TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
- GetUrlPageData2 (WinHttp) failed: 12029.
- *** The OS name list needs to be updated! Unknown Windows version: 10.0 ***
- FAULTING_IP:
- ntdll!RtlReportFatalFailure+9
- 00007ff8`a7a3af49 eb00 jmp ntdll!RtlReportFatalFailure+0xb (00007ff8`a7a3af4b)
- EXCEPTION_RECORD: ffffffffffffffff -- (.exr 0xffffffffffffffff)
- ExceptionAddress: 00007ff8a7a3af49 (ntdll!RtlReportFatalFailure+0x0000000000000009)
- ExceptionCode: c0000374
- ExceptionFlags: 00000001
- NumberParameters: 1
- Parameter[0]: 00007ff8a7aa27f0
- PROCESS_NAME: bfv.exe
- ERROR_CODE: (NTSTATUS) 0xc0000374 -
- EXCEPTION_CODE: (NTSTATUS) 0xc0000374 -
- EXCEPTION_PARAMETER1: 00007ff8a7aa27f0
- NTGLOBALFLAG: 0
- APPLICATION_VERIFIER_FLAGS: 0
- LAST_CONTROL_TRANSFER: from 00007ff8a7a3af13 to 00007ff8a7a3af49
- FAULTING_THREAD: ffffffffffffffff
- BUGCHECK_STR: APPLICATION_FAULT_ACTIONABLE_HEAP_CORRUPTION_heap_failure_block_not_busy_INVALID_POINTER_READ_AFTER_CALL
- PRIMARY_PROBLEM_CLASS: ACTIONABLE_HEAP_CORRUPTION_heap_failure_block_not_busy_AFTER_CALL
- DEFAULT_BUCKET_ID: ACTIONABLE_HEAP_CORRUPTION_heap_failure_block_not_busy_AFTER_CALL
- STACK_TEXT:
- 00000000`33aeee90 00007ff8`a7a3af13 : 00000000`004b0000 00000000`33aeef89 00000000`00000003 00007ff8`a794d997 : ntdll!RtlReportFatalFailure+0x9
- 00000000`33aeeee0 00007ff8`a7a4379e : 00000000`48b54760 00007ff8`a7aa27f0 00000000`00000008 00000000`004b0000 : ntdll!RtlReportCriticalFailure+0x97
- 00000000`33aeefd0 00007ff8`a7a43aaa : 00000000`00000008 00000000`004b0000 00000000`004b0000 00000000`00000000 : ntdll!RtlpHeapHandleError+0x12
- 00000000`33aef000 00007ff8`a79debb1 : 00000000`46272230 00000000`00000000 00000000`00000000 00000000`33aef440 : ntdll!RtlpHpHeapHandleError+0x7a
- 00000000`33aef030 00007ff8`a79ecd22 : ffffffff`fffffffe 00007ff8`78d01173 00000000`33aef150 00007ff8`78dd5497 : ntdll!RtlpLogHeapFailure+0x45
- 00000000`33aef060 00007ff8`78d297c1 : 00000000`46272230 00000000`00000000 00000000`48c16d20 00007ff8`78dc6d35 : ntdll!RtlFreeHeap+0x9a8a2
- 00000000`33aef100 00007ff8`78d29791 : 00000000`2c270050 00000000`45ca8670 ffffffff`fffffffe 00000000`48c35f80 : D3D12!operator delete+0x21
- 00000000`33aef130 00007ff8`78ddb213 : 00000000`48117510 00000000`2c270050 00000000`48c36130 00007ff8`78dc7701 : D3D12!CVersionedRootSignatureDeserializer::Release+0xd1
- 00000000`33aef160 00007ff8`78ddd7b1 : 00000000`48c16d20 00000000`48117510 00000000`48c16d20 00000000`46272b30 : D3D12!CStateObjectInfo::AddGlobalRootSignature+0x8b
- 00000000`33aef1b0 00007ff8`78dc5f9b : 00000000`000020ff 00000000`48c16d20 00000000`48c16d20 00000000`48c0f400 : D3D12!CStateObjectInfo::ParseStateObject+0x101
- 00000000`33aef200 00007ff8`78d8a12a : 00000000`48c16d20 00000000`48c17340 00000000`48c17348 00000001`4546589d : D3D12!DriverStateObject::DriverStateObject+0x26b
- 00000000`33aef310 00000001`41c396c9 : 00000000`45ca8670 00000000`307a4bc8 00000000`2c270160 00000000`307a4bc8 : D3D12!CDevice::CreateStateObject+0x6a
- 00000000`33aef3d0 00000000`45ca8670 : 00000000`307a4bc8 00000000`2c270160 00000000`307a4bc8 00001f80`00000000 : bfv+0x1c396c9
- 00000000`33aef3d8 00000000`307a4bc8 : 00000000`2c270160 00000000`307a4bc8 00001f80`00000000 0053002b`002b0033 : 0x45ca8670
- 00000000`33aef3e0 00000000`2c270160 : 00000000`307a4bc8 00001f80`00000000 0053002b`002b0033 00000206`00000005 : 0x307a4bc8
- 00000000`33aef3e8 00000000`307a4bc8 : 00001f80`00000000 0053002b`002b0033 00000206`00000005 00000000`2c270170 : 0x2c270160
- 00000000`33aef3f0 00001f80`00000000 : 0053002b`002b0033 00000206`00000005 00000000`2c270170 00000000`00000000 : 0x307a4bc8
- 00000000`33aef3f8 0053002b`002b0033 : 00000206`00000005 00000000`2c270170 00000000`00000000 00007ff8`a7940000 : 0x1f80`00000000
- 00000000`33aef400 00000206`00000005 : 00000000`2c270170 00000000`00000000 00007ff8`a7940000 00000000`5734cfc0 : 0x53002b`002b0033
- 00000000`33aef408 00000000`2c270170 : 00000000`00000000 00007ff8`a7940000 00000000`5734cfc0 00000000`00003d14 : 0x206`00000005
- 00000000`33aef410 00000000`00000000 : 00007ff8`a7940000 00000000`5734cfc0 00000000`00003d14 00000000`33aefaf0 : 0x2c270170
- FOLLOWUP_IP:
- D3D12!CStateObjectInfo::AddGlobalRootSignature+8b
- 00007ff8`78ddb213 4c8bcd mov r9,rbp
- SYMBOL_STACK_INDEX: 8
- SYMBOL_NAME: d3d12!CStateObjectInfo::AddGlobalRootSignature+8b
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: D3D12
- IMAGE_NAME: D3D12.dll
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- STACK_COMMAND: ~29s; .ecxr ; kb
- FAILURE_BUCKET_ID: ACTIONABLE_HEAP_CORRUPTION_heap_failure_block_not_busy_AFTER_CALL_c0000374_D3D12.dll!CStateObjectInfo::AddGlobalRootSignature
- BUCKET_ID: X64_APPLICATION_FAULT_ACTIONABLE_HEAP_CORRUPTION_heap_failure_block_not_busy_INVALID_POINTER_READ_AFTER_CALL_d3d12!CStateObjectInfo::AddGlobalRootSignature+8b
- WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/bfv_exe/1_0_68_32584/5c1007a4/ntdll_dll/10_0_17763_194/e8b54827/c0000374/000faf49.htm?Retriage=1
- Followup: MachineOwner
- ---------
- This free analysis is provided by OSR Open Systems Resources, Inc.
- Want a deeper understanding of crash dump analysis? Check out our Windows Kernel Debugging and Crash Dump Analysis Seminar (opens in new tab/window)
- Show DivLoaded Module List
- Show DivRaw Stack Contents
- Show DivDump Header Information
- Show DivStrings
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement