Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Loading Dump File [C:\Users\Sergio\Desktop\072117-29781-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 10586 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 10586.103.amd64fre.th2_release.160126-1819
- Machine Name:
- Kernel base = 0xfffff802`82076000 PsLoadedModuleList = 0xfffff802`82354cf0
- Debug session time: Fri Jul 21 14:56:54.054 2017 (UTC + 2:00)
- System Uptime: 0 days 1:45:30.810
- Loading Kernel Symbols
- .
- Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
- Run !sym noisy before .reload to track down problems loading symbols.
- ..............................................................
- ................................................................
- ............................................
- Loading User Symbols
- Loading unloaded module list
- ...............
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck A, {1e4, 2, 0, fffff802820e43ec}
- Probably caused by : ntkrnlmp.exe ( nt!KiExecuteAllDpcs+29c )
- Followup: MachineOwner
- ---------
- 2: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: 00000000000001e4, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000000, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff802820e43ec, address which referenced memory
- Debugging Details:
- ------------------
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10.0.10586.103 (th2_release.160126-1819)
- SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.
- SYSTEM_SKU: To Be Filled By O.E.M.
- SYSTEM_VERSION: To Be Filled By O.E.M.
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: P2.80
- BIOS_DATE: 05/31/2016
- BASEBOARD_MANUFACTURER: ASRock
- BASEBOARD_PRODUCT: 970 Pro3 R2.0
- BASEBOARD_VERSION:
- DUMP_TYPE: 2
- BUGCHECK_P1: 1e4
- BUGCHECK_P2: 2
- BUGCHECK_P3: 0
- BUGCHECK_P4: fffff802820e43ec
- READ_ADDRESS: fffff802823f4520: Unable to get MiVisibleState
- 00000000000001e4
- CURRENT_IRQL: 2
- FAULTING_IP:
- nt!KiExecuteAllDpcs+29c
- fffff802`820e43ec 453bb3e4010000 cmp r14d,dword ptr [r11+1E4h]
- CPU_COUNT: 8
- CPU_MHZ: f97
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 15
- CPU_MODEL: 2
- CPU_STEPPING: 0
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: AV
- PROCESS_NAME: System
- ANALYSIS_SESSION_HOST: L934054
- ANALYSIS_SESSION_TIME: 07-21-2017 16:23:00.0717
- ANALYSIS_VERSION: 10.0.15063.468 amd64fre
- TRAP_FRAME: ffffd0006dffc730 -- (.trap 0xffffd0006dffc730)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000062eb3 rbx=0000000000000000 rcx=24f4d544209d0000
- rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff802820e43ec rsp=ffffd0006dffc8c0 rbp=ffffd0006dffc9c0
- r8=0000000000000001 r9=0000000000000000 r10=ffffd0006df7a180
- r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- nt!KiExecuteAllDpcs+0x29c:
- fffff802`820e43ec 453bb3e4010000 cmp r14d,dword ptr [r11+1E4h] ds:00000000`000001e4=????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff802821c2fe9 to fffff802821b8480
- STACK_TEXT:
- ffffd000`6dffc5e8 fffff802`821c2fe9 : 00000000`0000000a 00000000`000001e4 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
- ffffd000`6dffc5f0 fffff802`821c17c7 : 75af1625`2c7df594 ffffe001`0000005d 00000000`00000002 ffffe001`7417eea8 : nt!KiBugCheckDispatch+0x69
- ffffd000`6dffc730 fffff802`820e43ec : ffffd000`6dffcb20 ffffd000`6df7a180 ffffe001`75831320 ffffe001`74260f44 : nt!KiPageFault+0x247
- ffffd000`6dffc8c0 fffff802`820e3ad9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x29c
- ffffd000`6dffca10 fffff802`821bb23a : ffffffff`00000000 ffffd000`6df7a180 ffffd000`6df86cc0 ffffe001`73bf2840 : nt!KiRetireDpcList+0xe9
- ffffd000`6dffcc60 00000000`00000000 : ffffd000`6dffd000 ffffd000`6dff7000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 08147b47469579b607a5d7d9344a6795c211d870
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ec13776148230090081086c4d1dcf7030f5273f3
- THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
- FOLLOWUP_IP:
- nt!KiExecuteAllDpcs+29c
- fffff802`820e43ec 453bb3e4010000 cmp r14d,dword ptr [r11+1E4h]
- FAULT_INSTR_CODE: e4b33b45
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: nt!KiExecuteAllDpcs+29c
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 56a849a9
- IMAGE_VERSION: 10.0.10586.103
- BUCKET_ID_FUNC_OFFSET: 29c
- FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs
- BUCKET_ID: AV_nt!KiExecuteAllDpcs
- PRIMARY_PROBLEM_CLASS: AV_nt!KiExecuteAllDpcs
- TARGET_TIME: 2017-07-21T12:56:54.000Z
- OSBUILD: 10586
- OSSERVICEPACK: 103
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- OS_LOCALE:
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2016-01-27 05:38:01
- BUILDDATESTAMP_STR: 160126-1819
- BUILDLAB_STR: th2_release
- BUILDOSVER_STR: 10.0.10586.103
- ANALYSIS_SESSION_ELAPSED_TIME: f26
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:av_nt!kiexecutealldpcs
- FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement