Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
- Online Crash Dump Analysis Service
- See http://www.osronline.com for more information
- Windows 8 Kernel Version 17134 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 17134.1.amd64fre.rs4_release.180410-1804
- Machine Name:
- Kernel base = 0xfffff800`ff612000 PsLoadedModuleList = 0xfffff800`ff9c0290
- Debug session time: Tue Oct 23 04:57:08.070 2018 (UTC - 4:00)
- System Uptime: 0 days 0:25:22.755
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: ffffab8197e79f70, memory referenced
- Arg2: 000000000000000e, IRQL
- Arg3: 0000000000000000, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff800ff694639, address which referenced memory
- Debugging Details:
- ------------------
- TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
- READ_ADDRESS: unable to get nt!MmSpecialPoolStart
- unable to get nt!MmSpecialPoolEnd
- unable to get nt!MmPagedPoolEnd
- unable to get nt!MmNonPagedPoolStart
- unable to get nt!MmSizeOfNonPagedPoolInBytes
- ffffab8197e79f70
- CURRENT_IRQL: e
- FAULTING_IP:
- nt!KiIpiProcessRequests+1a9
- fffff800`ff694639 488b8c24a0000000 mov rcx,qword ptr [rsp+0A0h]
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: AV
- PROCESS_NAME: System
- TRAP_FRAME: ffffab8195e79d40 -- (.trap 0xffffab8195e79d40)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
- rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff800ff694639 rsp=ffffab8195e79ed0 rbp=fffffb889522fa00
- r8=0000000000000000 r9=0000000000000000 r10=ffffab8195e80100
- r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- nt!KiIpiProcessRequests+0x1a9:
- fffff800`ff694639 488b8c24a0000000 mov rcx,qword ptr [rsp+0A0h] ss:0018:ffffab81`95e79f70=ffffd2c583948421
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff800ff7cc069 to fffff800ff7bb490
- STACK_TEXT:
- ffffab81`95e79bf8 fffff800`ff7cc069 : 00000000`0000000a ffffab81`97e79f70 00000000`0000000e 00000000`00000000 : nt!KeBugCheckEx
- ffffab81`95e79c00 fffff800`ff7c8ce5 : 00000000`00000002 00000000`00000000 ffffd2c5`83948641 00000000`00000000 : nt!KiBugCheckDispatch+0x69
- ffffab81`95e79d40 fffff800`ff694639 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x425
- ffffab81`95e79ed0 fffff800`ff7c20a0 : ffffab81`95e80180 00000000`00000b64 00000000`00000000 ffffd08a`be698440 : nt!KiIpiProcessRequests+0x1a9
- ffffab81`95e79fb0 fffff800`ff7c1e08 : ffffd08a`c1da3000 00000000`00000002 fffffb88`9522fb00 00000000`00000001 : nt!KiIpiInterruptSubDispatch+0x80
- fffffb88`9522f9d0 fffff800`ff7beba2 : ffffffff`00000000 ffffab81`95e80180 ffffab81`95e90200 ffffd08a`c19a4700 : nt!KiIpiInterrupt+0x2d8
- fffffb88`9522fb60 00000000`00000000 : fffffb88`95230000 fffffb88`95229000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x32
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- nt!KiIpiProcessRequests+1a9
- fffff800`ff694639 488b8c24a0000000 mov rcx,qword ptr [rsp+0A0h]
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: nt!KiIpiProcessRequests+1a9
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 5ba316ae
- FAILURE_BUCKET_ID: X64_AV_nt!KiIpiProcessRequests+1a9
- BUCKET_ID: X64_AV_nt!KiIpiProcessRequests+1a9
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement