Microsoft (R) Windows Debugger Version 10.0.18869.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Recep Baltas\Downloads\Compressed\081817-4812-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 15063 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff803`42203000 PsLoadedModuleList = 0xfffff803`4254f5c0
Debug session time: Fri Aug 18 17:27:40.843 2017 (UTC + 3:00)
System Uptime: 0 days 0:31:16.545
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
.........................................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`4236f560 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff803`4445b050=000000000000001e
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80f82315be0, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for dxgmms2.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.Elapsed.Sec
Value: 20
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.15063.540 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80f82315be0
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff803425e4358: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
dxgmms2+15be0
fffff80f`82315be0 ffe0 jmp rax
EXCEPTION_PARAMETER2: ffffffffffffffff
BUGCHECK_STR: 0x1E_c0000005_R
CPU_COUNT: 8
CPU_MHZ: 1068
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: 9
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 05-19-2019 21:17:30.0375
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
LAST_CONTROL_TRANSFER: from fffff803423fe0b6 to fffff8034236f560
STACK_TEXT:
fffff803`4445b048 fffff803`423fe0b6 : 00000000`0000001e ffffffff`c0000005 fffff80f`82315be0 00000000`00000000 : nt!KeBugCheckEx
fffff803`4445b050 fffff803`42375a3d : fffff803`4258d000 fffff803`42203000 000536a0`00889000 fffff80f`82315be0 : nt!KiFatalExceptionHandler+0x22
fffff803`4445b090 fffff803`4222ed94 : 00000000`00000000 fffff803`4445b1c0 00000000`00000000 00000000`00000002 : nt!RtlpExecuteHandlerForException+0xd
fffff803`4445b0c0 fffff803`4222db36 : fffff803`4445bf98 fffff803`4445bce0 fffff803`4445bf98 fffff803`4445bf98 : nt!RtlDispatchException+0x404
fffff803`4445b7b0 fffff803`4237a98e : 00000000`00000002 00000000`00000007 fffff803`4445bf70 fffff803`42a8eef5 : nt!KiDispatchException+0x1f6
fffff803`4445be60 fffff803`42378c34 : ffffcf86`c72790f0 ffffcf86`cc0b2000 00000000`00000000 00000000`000000ff : nt!KiExceptionDispatch+0xce
fffff803`4445c040 fffff80f`82315be0 : fffff80f`82305525 00000000`0004187a 00000000`0004187a 00000000`00000000 : nt!KiGeneralProtectionFault+0xf4
fffff803`4445c1d8 fffff80f`82305525 : 00000000`0004187a 00000000`0004187a 00000000`00000000 fffff80f`0000002f : dxgmms2+0x15be0
fffff803`4445c1e0 00000000`0004187a : 00000000`0004187a 00000000`00000000 fffff80f`0000002f 00000000`0000002f : dxgmms2+0x5525
fffff803`4445c1e8 00000000`0004187a : 00000000`00000000 fffff80f`0000002f 00000000`0000002f ffffcf86`00000000 : 0x4187a
fffff803`4445c1f0 00000000`00000000 : fffff80f`0000002f 00000000`0000002f ffffcf86`00000000 00000000`00000002 : 0x4187a
THREAD_SHA1_HASH_MOD_FUNC: 33231b57691c76cf762e038dc196879fa97bd91a
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3b250b0b63de9ab897b6ee063aa53006749d152e
THREAD_SHA1_HASH_MOD: a683acd7799930b805ad47c79a24be2963b1605c
FOLLOWUP_IP:
dxgmms2+15be0
fffff80f`82315be0 ffe0 jmp rax
FAULT_INSTR_CODE: cccce0ff
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: dxgmms2+15be0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 7c54eb18
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 15be0
FAILURE_BUCKET_ID: 0x1E_c0000005_R_dxgmms2!unknown_function
BUCKET_ID: 0x1E_c0000005_R_dxgmms2!unknown_function
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_dxgmms2!unknown_function
TARGET_TIME: 2017-08-18T14:27:40.000Z
OSBUILD: 15063
OSSERVICEPACK: 540
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-08-01 04:23:25
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.15063.540
ANALYSIS_SESSION_ELAPSED_TIME: 500a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_dxgmms2!unknown_function
FAILURE_ID_HASH: {6fc992a2-5edf-7a24-bf2a-af1c2de96632}
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80f82315be0, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.Elapsed.Sec
Value: 1
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.15063.540 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80f82315be0
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
dxgmms2+15be0
fffff80f`82315be0 ffe0 jmp rax
EXCEPTION_PARAMETER2: ffffffffffffffff
BUGCHECK_STR: 0x1E_c0000005_R
CPU_COUNT: 8
CPU_MHZ: 1068
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: 9
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 05-19-2019 21:17:52.0112
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
LAST_CONTROL_TRANSFER: from fffff803423fe0b6 to fffff8034236f560
STACK_TEXT:
fffff803`4445b048 fffff803`423fe0b6 : 00000000`0000001e ffffffff`c0000005 fffff80f`82315be0 00000000`00000000 : nt!KeBugCheckEx
fffff803`4445b050 fffff803`42375a3d : fffff803`4258d000 fffff803`42203000 000536a0`00889000 fffff80f`82315be0 : nt!KiFatalExceptionHandler+0x22
fffff803`4445b090 fffff803`4222ed94 : 00000000`00000000 fffff803`4445b1c0 00000000`00000000 00000000`00000002 : nt!RtlpExecuteHandlerForException+0xd
fffff803`4445b0c0 fffff803`4222db36 : fffff803`4445bf98 fffff803`4445bce0 fffff803`4445bf98 fffff803`4445bf98 : nt!RtlDispatchException+0x404
fffff803`4445b7b0 fffff803`4237a98e : 00000000`00000002 00000000`00000007 fffff803`4445bf70 fffff803`42a8eef5 : nt!KiDispatchException+0x1f6
fffff803`4445be60 fffff803`42378c34 : ffffcf86`c72790f0 ffffcf86`cc0b2000 00000000`00000000 00000000`000000ff : nt!KiExceptionDispatch+0xce
fffff803`4445c040 fffff80f`82315be0 : fffff80f`82305525 00000000`0004187a 00000000`0004187a 00000000`00000000 : nt!KiGeneralProtectionFault+0xf4
fffff803`4445c1d8 fffff80f`82305525 : 00000000`0004187a 00000000`0004187a 00000000`00000000 fffff80f`0000002f : dxgmms2+0x15be0
fffff803`4445c1e0 00000000`0004187a : 00000000`0004187a 00000000`00000000 fffff80f`0000002f 00000000`0000002f : dxgmms2+0x5525
fffff803`4445c1e8 00000000`0004187a : 00000000`00000000 fffff80f`0000002f 00000000`0000002f ffffcf86`00000000 : 0x4187a
fffff803`4445c1f0 00000000`00000000 : fffff80f`0000002f 00000000`0000002f ffffcf86`00000000 00000000`00000002 : 0x4187a
THREAD_SHA1_HASH_MOD_FUNC: 33231b57691c76cf762e038dc196879fa97bd91a
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3b250b0b63de9ab897b6ee063aa53006749d152e
THREAD_SHA1_HASH_MOD: a683acd7799930b805ad47c79a24be2963b1605c
FOLLOWUP_IP:
dxgmms2+15be0
fffff80f`82315be0 ffe0 jmp rax
FAULT_INSTR_CODE: cccce0ff
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: dxgmms2+15be0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 7c54eb18
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 15be0
FAILURE_BUCKET_ID: 0x1E_c0000005_R_dxgmms2!unknown_function
BUCKET_ID: 0x1E_c0000005_R_dxgmms2!unknown_function
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_dxgmms2!unknown_function
TARGET_TIME: 2017-08-18T14:27:40.000Z
OSBUILD: 15063
OSSERVICEPACK: 540
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-08-01 04:23:25
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.15063.540
ANALYSIS_SESSION_ELAPSED_TIME: 7cf
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_dxgmms2!unknown_function
FAILURE_ID_HASH: {6fc992a2-5edf-7a24-bf2a-af1c2de96632}
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80f82315be0, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.15063.540 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80f82315be0
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
dxgmms2+15be0
fffff80f`82315be0 ffe0 jmp rax
EXCEPTION_PARAMETER2: ffffffffffffffff
BUGCHECK_STR: 0x1E_c0000005_R
CPU_COUNT: 8
CPU_MHZ: 1068
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: 9
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 05-19-2019 21:17:54.0596
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
LAST_CONTROL_TRANSFER: from fffff803423fe0b6 to fffff8034236f560
STACK_TEXT:
fffff803`4445b048 fffff803`423fe0b6 : 00000000`0000001e ffffffff`c0000005 fffff80f`82315be0 00000000`00000000 : nt!KeBugCheckEx
fffff803`4445b050 fffff803`42375a3d : fffff803`4258d000 fffff803`42203000 000536a0`00889000 fffff80f`82315be0 : nt!KiFatalExceptionHandler+0x22
fffff803`4445b090 fffff803`4222ed94 : 00000000`00000000 fffff803`4445b1c0 00000000`00000000 00000000`00000002 : nt!RtlpExecuteHandlerForException+0xd
fffff803`4445b0c0 fffff803`4222db36 : fffff803`4445bf98 fffff803`4445bce0 fffff803`4445bf98 fffff803`4445bf98 : nt!RtlDispatchException+0x404
fffff803`4445b7b0 fffff803`4237a98e : 00000000`00000002 00000000`00000007 fffff803`4445bf70 fffff803`42a8eef5 : nt!KiDispatchException+0x1f6
fffff803`4445be60 fffff803`42378c34 : ffffcf86`c72790f0 ffffcf86`cc0b2000 00000000`00000000 00000000`000000ff : nt!KiExceptionDispatch+0xce
fffff803`4445c040 fffff80f`82315be0 : fffff80f`82305525 00000000`0004187a 00000000`0004187a 00000000`00000000 : nt!KiGeneralProtectionFault+0xf4
fffff803`4445c1d8 fffff80f`82305525 : 00000000`0004187a 00000000`0004187a 00000000`00000000 fffff80f`0000002f : dxgmms2+0x15be0
fffff803`4445c1e0 00000000`0004187a : 00000000`0004187a 00000000`00000000 fffff80f`0000002f 00000000`0000002f : dxgmms2+0x5525
fffff803`4445c1e8 00000000`0004187a : 00000000`00000000 fffff80f`0000002f 00000000`0000002f ffffcf86`00000000 : 0x4187a
fffff803`4445c1f0 00000000`00000000 : fffff80f`0000002f 00000000`0000002f ffffcf86`00000000 00000000`00000002 : 0x4187a
THREAD_SHA1_HASH_MOD_FUNC: 33231b57691c76cf762e038dc196879fa97bd91a
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3b250b0b63de9ab897b6ee063aa53006749d152e
THREAD_SHA1_HASH_MOD: a683acd7799930b805ad47c79a24be2963b1605c
FOLLOWUP_IP:
dxgmms2+15be0
fffff80f`82315be0 ffe0 jmp rax
FAULT_INSTR_CODE: cccce0ff
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: dxgmms2+15be0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 7c54eb18
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 15be0
FAILURE_BUCKET_ID: 0x1E_c0000005_R_dxgmms2!unknown_function
BUCKET_ID: 0x1E_c0000005_R_dxgmms2!unknown_function
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_dxgmms2!unknown_function
TARGET_TIME: 2017-08-18T14:27:40.000Z
OSBUILD: 15063
OSSERVICEPACK: 540
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-08-01 04:23:25
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.15063.540
ANALYSIS_SESSION_ELAPSED_TIME: 81e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_dxgmms2!unknown_function
FAILURE_ID_HASH: {6fc992a2-5edf-7a24-bf2a-af1c2de96632}
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80f82315be0, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.15063.540 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80f82315be0
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
dxgmms2+15be0
fffff80f`82315be0 ffe0 jmp rax
EXCEPTION_PARAMETER2: ffffffffffffffff
BUGCHECK_STR: 0x1E_c0000005_R
CPU_COUNT: 8
CPU_MHZ: 1068
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: 9
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 05-19-2019 21:17:57.0404
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
LAST_CONTROL_TRANSFER: from fffff803423fe0b6 to fffff8034236f560
STACK_TEXT:
fffff803`4445b048 fffff803`423fe0b6 : 00000000`0000001e ffffffff`c0000005 fffff80f`82315be0 00000000`00000000 : nt!KeBugCheckEx
fffff803`4445b050 fffff803`42375a3d : fffff803`4258d000 fffff803`42203000 000536a0`00889000 fffff80f`82315be0 : nt!KiFatalExceptionHandler+0x22
fffff803`4445b090 fffff803`4222ed94 : 00000000`00000000 fffff803`4445b1c0 00000000`00000000 00000000`00000002 : nt!RtlpExecuteHandlerForException+0xd
fffff803`4445b0c0 fffff803`4222db36 : fffff803`4445bf98 fffff803`4445bce0 fffff803`4445bf98 fffff803`4445bf98 : nt!RtlDispatchException+0x404
fffff803`4445b7b0 fffff803`4237a98e : 00000000`00000002 00000000`00000007 fffff803`4445bf70 fffff803`42a8eef5 : nt!KiDispatchException+0x1f6
fffff803`4445be60 fffff803`42378c34 : ffffcf86`c72790f0 ffffcf86`cc0b2000 00000000`00000000 00000000`000000ff : nt!KiExceptionDispatch+0xce
fffff803`4445c040 fffff80f`82315be0 : fffff80f`82305525 00000000`0004187a 00000000`0004187a 00000000`00000000 : nt!KiGeneralProtectionFault+0xf4
fffff803`4445c1d8 fffff80f`82305525 : 00000000`0004187a 00000000`0004187a 00000000`00000000 fffff80f`0000002f : dxgmms2+0x15be0
fffff803`4445c1e0 00000000`0004187a : 00000000`0004187a 00000000`00000000 fffff80f`0000002f 00000000`0000002f : dxgmms2+0x5525
fffff803`4445c1e8 00000000`0004187a : 00000000`00000000 fffff80f`0000002f 00000000`0000002f ffffcf86`00000000 : 0x4187a
fffff803`4445c1f0 00000000`00000000 : fffff80f`0000002f 00000000`0000002f ffffcf86`00000000 00000000`00000002 : 0x4187a
THREAD_SHA1_HASH_MOD_FUNC: 33231b57691c76cf762e038dc196879fa97bd91a
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3b250b0b63de9ab897b6ee063aa53006749d152e
THREAD_SHA1_HASH_MOD: a683acd7799930b805ad47c79a24be2963b1605c
FOLLOWUP_IP:
dxgmms2+15be0
fffff80f`82315be0 ffe0 jmp rax
FAULT_INSTR_CODE: cccce0ff
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: dxgmms2+15be0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 7c54eb18
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 15be0
FAILURE_BUCKET_ID: 0x1E_c0000005_R_dxgmms2!unknown_function
BUCKET_ID: 0x1E_c0000005_R_dxgmms2!unknown_function
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_dxgmms2!unknown_function
TARGET_TIME: 2017-08-18T14:27:40.000Z
OSBUILD: 15063
OSSERVICEPACK: 540
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-08-01 04:23:25
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.15063.540
ANALYSIS_SESSION_ELAPSED_TIME: 7e9
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_dxgmms2!unknown_function
FAILURE_ID_HASH: {6fc992a2-5edf-7a24-bf2a-af1c2de96632}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.18869.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Recep Baltas\Downloads\Compressed\081817-4656-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 15063 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff803`f069b000 PsLoadedModuleList = 0xfffff803`f09e75c0
Debug session time: Fri Aug 18 00:45:22.398 2017 (UTC + 3:00)
System Uptime: 0 days 0:34:11.100
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
.......................................................
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`f0807560 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff803`f285b6c0=000000000000001e
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff803f070ca43, The address that the exception occurred at
Arg3: ffffffffffffffff, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.Elapsed.Sec
Value: 64
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.15063.540 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff803f070ca43
BUGCHECK_P3: ffffffffffffffff
BUGCHECK_P4: 0
WRITE_ADDRESS: fffff803f0a7c358: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000000
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!KiTimerWaitTest+b3
fffff803`f070ca43 f0480fba6d4000 lock bts qword ptr [rbp+40h],0
EXCEPTION_PARAMETER1: ffffffffffffffff
BUGCHECK_STR: 0x1E_c0000005
CPU_COUNT: 8
CPU_MHZ: 1068
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: 9
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 05-19-2019 21:16:36.0549
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
TRAP_FRAME: ffffb501972b1230 -- (.trap 0xffffb501972b1230)
Unable to read trap frame at ffffb501`972b1230
LAST_CONTROL_TRANSFER: from fffff803f08960b6 to fffff803f0807560
STACK_TEXT:
fffff803`f285b6b8 fffff803`f08960b6 : 00000000`0000001e ffffffff`c0000005 fffff803`f070ca43 ffffffff`ffffffff : nt!KeBugCheckEx
fffff803`f285b6c0 fffff803`f080da3d : fffff803`f0a25000 fffff803`f069b000 000536a0`00889000 ffffb501`954b1a98 : nt!KiFatalExceptionHandler+0x22
fffff803`f285b700 fffff803`f06c6d94 : 00000000`00000000 fffff803`f285b830 00000000`00000000 fffff807`faf3b9b6 : nt!RtlpExecuteHandlerForException+0xd
fffff803`f285b730 fffff803`f06c5b36 : fffff803`f285c608 fffff803`f285c350 fffff803`f285c608 fffff803`f285c608 : nt!RtlDispatchException+0x404
fffff803`f285be20 fffff803`f081298e : 00000000`00000000 00000000`00000000 ffffb501`972b1230 fffff807`f9c56a0b : nt!KiDispatchException+0x1f6
fffff803`f285c4d0 fffff803`f0810b05 : 00000000`00000000 00000300`20100000 2d6a319b`22fc77a2 cc1b5953`ae6ab4a1 : nt!KiExceptionDispatch+0xce
fffff803`f285c6b0 fffff803`f070ca43 : 00000500`000005d0 ffffb501`8f695000 00000000`00000100 ffffffff`00000000 : nt!KiStackFault+0x105
fffff803`f285c840 fffff803`f070c6ff : fffff803`ef569180 ffffb501`00000000 fffff803`f285ca98 00000000`00000003 : nt!KiTimerWaitTest+0xb3
fffff803`f285c8f0 fffff803`f070d707 : fffff803`ef569180 00000000`003e95c2 00000000`00000000 00000000`000131bb : nt!KiProcessExpiredTimerList+0xaf
fffff803`f285c9e0 fffff803`f080a60a : 00000000`00000000 fffff803`ef569180 00000000`001a6fe0 fffff803`f0a94a40 : nt!KiRetireDpcList+0x367
fffff803`f285cbe0 00000000`00000000 : fffff803`f285d000 fffff803`f2856000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
THREAD_SHA1_HASH_MOD_FUNC: e35a957f93ce65caabf319c76ce5221cbfaffe50
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 2887175b5f3da4f48c8e58cc466ab0d4aac81424
THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c
FOLLOWUP_IP:
nt!KiTimerWaitTest+b3
fffff803`f070ca43 f0480fba6d4000 lock bts qword ptr [rbp+40h],0
FAULT_INSTR_CODE: ba0f48f0
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: nt!KiTimerWaitTest+b3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 597fd80d
IMAGE_VERSION: 10.0.15063.540
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: b3
FAILURE_BUCKET_ID: 0x1E_c0000005_nt!KiTimerWaitTest
BUCKET_ID: 0x1E_c0000005_nt!KiTimerWaitTest
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_nt!KiTimerWaitTest
TARGET_TIME: 2017-08-17T21:45:22.000Z
OSBUILD: 15063
OSSERVICEPACK: 540
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-08-01 04:23:25
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.15063.540
ANALYSIS_SESSION_ELAPSED_TIME: facc
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_nt!kitimerwaittest
FAILURE_ID_HASH: {0b1bac46-2a62-8b1e-2945-6087e0228943}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.18869.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Recep Baltas\Downloads\Compressed\081817-4828-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 15063 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff802`ca67e000 PsLoadedModuleList = 0xfffff802`ca9ca5c0
Debug session time: Fri Aug 18 16:54:23.396 2017 (UTC + 3:00)
System Uptime: 0 days 1:23:03.098
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
...........................................................
Loading User Symbols
Loading unloaded module list
............................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`ca7ea560 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff802`cc85b6c0=000000000000001e
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff802ca6efa98, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.Elapsed.Sec
Value: 75
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.15063.540 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff802ca6efa98
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff802caa5f358: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!KiTimerWaitTest+108
fffff802`ca6efa98 f0490fbaad1059000000 lock bts qword ptr [r13+5910h],0
EXCEPTION_PARAMETER2: ffffffffffffffff
BUGCHECK_STR: 0x1E_c0000005_R
CPU_COUNT: 8
CPU_MHZ: 1068
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: 9
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 05-19-2019 21:16:26.0484
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
TRAP_FRAME: ffffce8a207ebe80 -- (.trap 0xffffce8a207ebe80)
Unable to read trap frame at ffffce8a`207ebe80
LAST_CONTROL_TRANSFER: from fffff802ca8790b6 to fffff802ca7ea560
STACK_TEXT:
fffff802`cc85b6b8 fffff802`ca8790b6 : 00000000`0000001e ffffffff`c0000005 fffff802`ca6efa98 00000000`00000000 : nt!KeBugCheckEx
fffff802`cc85b6c0 fffff802`ca7f0a3d : fffff802`caa08000 fffff802`ca67e000 000536a0`00889000 ffffce8a`18174000 : nt!KiFatalExceptionHandler+0x22
fffff802`cc85b700 fffff802`ca6a9d94 : 00000000`00000000 fffff802`cc85b830 00000000`00000000 fffff80a`38e4b9b6 : nt!RtlpExecuteHandlerForException+0xd
fffff802`cc85b730 fffff802`ca6a8b36 : fffff802`cc85c608 fffff802`cc85c350 fffff802`cc85c608 fffff802`cc85c608 : nt!RtlDispatchException+0x404
fffff802`cc85be20 fffff802`ca7f598e : fffff80a`000003c0 fffff80a`384d7d20 ffffce8a`207ebe80 00003175`df814300 : nt!KiDispatchException+0x1f6
fffff802`cc85c4d0 fffff802`ca7f3c34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xce
fffff802`cc85c6b0 fffff802`ca6efa98 : 00000500`00000000 ffffce8a`00000000 00000000`00000100 ffffffff`00000000 : nt!KiGeneralProtectionFault+0xf4
fffff802`cc85c840 fffff802`ca6ef6ff : fffff802`c961c180 ffffce8a`00000000 fffff802`cc85ca98 00000000`00000000 : nt!KiTimerWaitTest+0x108
fffff802`cc85c8f0 fffff802`ca6f0707 : fffff802`c961c180 00000000`003e95bc 00000000`00000000 00000000`0002e6a2 : nt!KiProcessExpiredTimerList+0xaf
fffff802`cc85c9e0 fffff802`ca7ed60a : 00000000`00000000 fffff802`c961c180 00000000`001a6fe0 fffff802`caa77a40 : nt!KiRetireDpcList+0x367
fffff802`cc85cbe0 00000000`00000000 : fffff802`cc85d000 fffff802`cc856000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
THREAD_SHA1_HASH_MOD_FUNC: fb0c6f85f4c78de1bdfcfc45b2e86ed9be95905d
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 40bb150c915506284a8bacf3e23c65187c26e7af
THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c
FOLLOWUP_IP:
nt!KiTimerWaitTest+108
fffff802`ca6efa98 f0490fbaad1059000000 lock bts qword ptr [r13+5910h],0
FAULT_INSTR_CODE: ba0f49f0
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: nt!KiTimerWaitTest+108
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 597fd80d
IMAGE_VERSION: 10.0.15063.540
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 108
FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!KiTimerWaitTest
BUCKET_ID: 0x1E_c0000005_R_nt!KiTimerWaitTest
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_nt!KiTimerWaitTest
TARGET_TIME: 2017-08-18T13:54:23.000Z
OSBUILD: 15063
OSSERVICEPACK: 540
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-08-01 04:23:25
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.15063.540
ANALYSIS_SESSION_ELAPSED_TIME: 1278a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_nt!kitimerwaittest
FAILURE_ID_HASH: {60392e1e-177d-1e45-9fd7-b743dcff84fd}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.18869.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Recep Baltas\Downloads\Compressed\081817-4625-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 15063 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 15063.0.amd64fre.rs2_release.170317-1834
Machine Name:
Kernel base = 0xfffff800`b828f000 PsLoadedModuleList = 0xfffff800`b85db5c0
Debug session time: Fri Aug 18 00:10:27.819 2017 (UTC + 3:00)
System Uptime: 0 days 0:35:55.520
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
.........................................................
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`b83fb560 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffaf00`3202d3d0=000000000000003b
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff828da6249b44, Address of the instruction which caused the bugcheck
Arg3: ffffaf003202dca0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32kfull.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 7
Key : Analysis.Elapsed.Sec
Value: 129
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 15063.0.amd64fre.rs2_release.170317-1834
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0906
BIOS_DATE: 03/22/2017
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: STRIX Z270G GAMING
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffff828da6249b44
BUGCHECK_P3: ffffaf003202dca0
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
win32kfull+49b44
ffff828d`a6249b44 488b8878010000 mov rcx,qword ptr [rax+178h]
CONTEXT: ffffaf003202dca0 -- (.cxr 0xffffaf003202dca0)
rax=04ff82c44011dab0 rbx=ffff82c442440450 rcx=00000000bf000000
rdx=00000000050004f2 rsi=0000000000000064 rdi=0000000000000200
rip=ffff828da6249b44 rsp=ffffaf003202e690 rbp=0000000000000064
r8=ffffaf003202e4a0 r9=000000000000002f r10=fffff800b8215f10
r11=fffff800b828f000 r12=0000000000000000 r13=000000000020e3fb
r14=ffff82c440130728 r15=000000000000000f
iopl=0 nv up ei pl nz na pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010203
win32kfull+0x49b44:
ffff828d`a6249b44 488b8878010000 mov rcx,qword ptr [rax+178h] ds:002b:04ff82c4`4011dc28=????????????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: 8
CPU_MHZ: 1068
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: 9
CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 42'00000000 (cache) 42'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 05-19-2019 21:16:16.0451
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
LAST_CONTROL_TRANSFER: from ffff878e0b8e13c0 to ffff828da6249b44
STACK_TEXT:
ffffaf00`3202e690 ffff878e`0b8e13c0 : 00000000`00000200 00000000`00000001 ffff878e`0b8e13c8 ffffaf00`3202e810 : win32kfull+0x49b44
ffffaf00`3202e698 00000000`00000200 : 00000000`00000001 ffff878e`0b8e13c8 ffffaf00`3202e810 ffff878e`09ff48b0 : 0xffff878e`0b8e13c0
ffffaf00`3202e6a0 00000000`00000001 : ffff878e`0b8e13c8 ffffaf00`3202e810 ffff878e`09ff48b0 00000000`00000001 : 0x200
ffffaf00`3202e6a8 ffff878e`0b8e13c8 : ffffaf00`3202e810 ffff878e`09ff48b0 00000000`00000001 ffff828d`a65d1fff : 0x1
ffffaf00`3202e6b0 ffffaf00`3202e810 : ffff878e`09ff48b0 00000000`00000001 ffff828d`a65d1fff ffff82c4`400c6ab0 : 0xffff878e`0b8e13c8
ffffaf00`3202e6b8 ffff878e`09ff48b0 : 00000000`00000001 ffff828d`a65d1fff ffff82c4`400c6ab0 00000000`003e95b8 : 0xffffaf00`3202e810
ffffaf00`3202e6c0 00000000`00000001 : ffff828d`a65d1fff ffff82c4`400c6ab0 00000000`003e95b8 ffff828d`a67302e0 : 0xffff878e`09ff48b0
ffffaf00`3202e6c8 ffff828d`a65d1fff : ffff82c4`400c6ab0 00000000`003e95b8 ffff828d`a67302e0 00000000`00000002 : 0x1
ffffaf00`3202e6d0 ffff828d`a624987e : 00000000`00000001 ffffaf00`3202e810 00000000`00000004 00000000`00000002 : win32kbase!EnterCrit+0x9f
ffffaf00`3202e710 00000000`00000001 : ffffaf00`3202e810 00000000`00000004 00000000`00000002 ffffaf00`00000004 : win32kfull+0x4987e
ffffaf00`3202e718 ffffaf00`3202e810 : 00000000`00000004 00000000`00000002 ffffaf00`00000004 ffffaf00`3202e810 : 0x1
ffffaf00`3202e720 00000000`00000004 : 00000000`00000002 ffffaf00`00000004 ffffaf00`3202e810 00000000`00000000 : 0xffffaf00`3202e810
ffffaf00`3202e728 00000000`00000002 : ffffaf00`00000004 ffffaf00`3202e810 00000000`00000000 ffff878e`0a0271c0 : 0x4
ffffaf00`3202e730 ffffaf00`00000004 : ffffaf00`3202e810 00000000`00000000 ffff878e`0a0271c0 ffffdf81`95d1d240 : 0x2
ffffaf00`3202e738 ffffaf00`3202e810 : 00000000`00000000 ffff878e`0a0271c0 ffffdf81`95d1d240 00000000`00000000 : 0xffffaf00`00000004
ffffaf00`3202e740 00000000`00000000 : ffff878e`0a0271c0 ffffdf81`95d1d240 00000000`00000000 00000000`00000000 : 0xffffaf00`3202e810
THREAD_SHA1_HASH_MOD_FUNC: 146857873b571aa86d5b599ca0447c891d1a56d3
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 8fdd0a27375a5d050f7a146094778879872d9030
THREAD_SHA1_HASH_MOD: 916a6a589eb994e3aaaae4ad4510eeb8f3b7eb5a
FOLLOWUP_IP:
win32kfull+49b44
ffff828d`a6249b44 488b8878010000 mov rcx,qword ptr [rax+178h]
FAULT_INSTR_CODE: 78888b48
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32kfull+49b44
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 2354c46
STACK_COMMAND: .cxr 0xffffaf003202dca0 ; kb
BUCKET_ID_FUNC_OFFSET: 49b44
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kfull!unknown_function
BUCKET_ID: 0x3B_c0000005_win32kfull!unknown_function
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_win32kfull!unknown_function
TARGET_TIME: 2017-08-17T21:10:27.000Z
OSBUILD: 15063
OSSERVICEPACK: 540
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-08-01 04:23:25
BUILDDATESTAMP_STR: 170317-1834
BUILDLAB_STR: rs2_release
BUILDOSVER_STR: 10.0.15063.0.amd64fre.rs2_release.170317-1834
ANALYSIS_SESSION_ELAPSED_TIME: 1f93d
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_win32kfull!unknown_function
FAILURE_ID_HASH: {c8562915-20db-1d44-10f6-80418b3fecc4}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.18869.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Recep Baltas\Downloads\Compressed\081717-4921-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 15063 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 15063.0.amd64fre.rs2_release.170317-1834
Machine Name:
Kernel base = 0xfffff801`4388c000 PsLoadedModuleList = 0xfffff801`43bd85c0
Debug session time: Thu Aug 17 20:43:15.365 2017 (UTC + 3:00)
System Uptime: 0 days 0:00:11.071
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
......................................................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`439f8560 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffae00`f4ee32f0=0000000000000050
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffbdfda8b0032c, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8060d2b1934, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.Elapsed.Sec
Value: 144
Key : Analysis.Memory.CommitPeak.Mb
Value: 65
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 15063.0.amd64fre.rs2_release.170317-1834
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0906
BIOS_DATE: 03/22/2017
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: STRIX Z270G GAMING
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 2
BUGCHECK_P1: ffffbdfda8b0032c
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8060d2b1934
BUGCHECK_P4: 2
READ_ADDRESS: fffff80143c6d358: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffbdfda8b0032c
FAULTING_IP:
IOMap64+1934
fffff806`0d2b1934 8b0482 mov eax,dword ptr [rdx+rax*4]
MM_INTERNAL_CODE: 2
CPU_COUNT: 8
CPU_MHZ: 1068
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: 9
CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 42'00000000 (cache) 42'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: GpuFanHelper.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 05-19-2019 21:15:30.0143
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
TRAP_FRAME: ffffae00f4ee3580 -- (.trap 0xffffae00f4ee3580)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000c00cb rbx=0000000000000000 rcx=0000000000000001
rdx=ffffbdfda8800000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8060d2b1934 rsp=ffffae00f4ee3710 rbp=ffff9782a8828c20
r8=0000000000000000 r9=ffff9782a7e345c0 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
IOMap64+0x1934:
fffff806`0d2b1934 8b0482 mov eax,dword ptr [rdx+rax*4] ds:ffffbdfd`a8b0032c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80143a2dfb4 to fffff801439f8560
STACK_TEXT:
ffffae00`f4ee32e8 fffff801`43a2dfb4 : 00000000`00000050 ffffbdfd`a8b0032c 00000000`00000000 ffffae00`f4ee3580 : nt!KeBugCheckEx
ffffae00`f4ee32f0 fffff801`439192d6 : 00000000`00000000 ffffbdfd`a8b0032c ffffae00`f4ee3580 ffff9782`a8ab1080 : nt!MiSystemFault+0x116e84
ffffae00`f4ee3390 fffff801`43a01d72 : 00000000`00000002 00000000`00000000 ffff9782`a8ab1580 00000000`00000001 : nt!MmAccessFault+0xae6
ffffae00`f4ee3580 fffff806`0d2b1934 : ffff9782`a8c1ef18 00000000`00000000 ffff9782`a8828ad0 ffff9782`a8c1eee0 : nt!KiPageFault+0x132
ffffae00`f4ee3710 ffff9782`a8c1ef18 : 00000000`00000000 ffff9782`a8828ad0 ffff9782`a8c1eee0 ffff9782`a8828c20 : IOMap64+0x1934
ffffae00`f4ee3718 00000000`00000000 : ffff9782`a8828ad0 ffff9782`a8c1eee0 ffff9782`a8828c20 fffff806`0d2b163d : 0xffff9782`a8c1ef18
THREAD_SHA1_HASH_MOD_FUNC: 478dd3aaec51d8bf998407944823e3ebbc8e722a
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 98c100427eea7f2845f9ac62e9b8a5b78783ad52
THREAD_SHA1_HASH_MOD: 8671a1c461e046c8f3cd570e417f7017d14e394b
FOLLOWUP_IP:
IOMap64+1934
fffff806`0d2b1934 8b0482 mov eax,dword ptr [rdx+rax*4]
FAULT_INSTR_CODE: eb82048b
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: IOMap64+1934
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: IOMap64
IMAGE_NAME: IOMap64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5448513c
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1934
FAILURE_BUCKET_ID: AV_R_INVALID_IOMap64!unknown_function
BUCKET_ID: AV_R_INVALID_IOMap64!unknown_function
PRIMARY_PROBLEM_CLASS: AV_R_INVALID_IOMap64!unknown_function
TARGET_TIME: 2017-08-17T17:43:15.000Z
OSBUILD: 15063
OSSERVICEPACK: 540
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-08-01 04:23:25
BUILDDATESTAMP_STR: 170317-1834
BUILDLAB_STR: rs2_release
BUILDOSVER_STR: 10.0.15063.0.amd64fre.rs2_release.170317-1834
ANALYSIS_SESSION_ELAPSED_TIME: 235c6
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_r_invalid_iomap64!unknown_function
FAILURE_ID_HASH: {24e98ca5-f46a-9570-8c6c-621e5780430e}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.18869.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Recep Baltas\Downloads\Compressed\081717-4562-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 15063 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 15063.0.amd64fre.rs2_release.170317-1834
Machine Name:
Kernel base = 0xfffff800`11299000 PsLoadedModuleList = 0xfffff800`115e55c0
Debug session time: Thu Aug 17 20:34:55.989 2017 (UTC + 3:00)
System Uptime: 0 days 0:00:08.696
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
...................................................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`11405560 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd300`9d1c2390=000000000000001a
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000006194a, The subtype of the bugcheck.
Arg2: 0000000000000000
Arg3: 0000000000000001
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.Elapsed.Sec
Value: 146
Key : Analysis.Memory.CommitPeak.Mb
Value: 65
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 15063.0.amd64fre.rs2_release.170317-1834
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0906
BIOS_DATE: 03/22/2017
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: STRIX Z270G GAMING
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 2
BUGCHECK_P1: 6194a
BUGCHECK_P2: 0
BUGCHECK_P3: 1
BUGCHECK_P4: 0
BUGCHECK_STR: 0x1a_6194a
CPU_COUNT: 8
CPU_MHZ: 1068
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: 9
CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 42'00000000 (cache) 42'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: GpuFanHelper.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 05-19-2019 21:15:24.0415
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
LAST_CONTROL_TRANSFER: from fffff800114526be to fffff80011405560
STACK_TEXT:
ffffd300`9d1c2388 fffff800`114526be : 00000000`0000001a 00000000`0006194a 00000000`00000000 00000000`00000001 : nt!KeBugCheckEx
ffffd300`9d1c2390 fffff800`11452300 : 00000000`000d4000 00000000`00000000 00000000`00000001 00000000`00000001 : nt!MiDereferenceIoPages+0xd576a
ffffd300`9d1c2440 fffff800`1137bf88 : 00000000`00000000 ffffd300`9e5c0000 00000000`00040000 00000000`00000040 : nt!MiZeroAndFlushPtes+0xd6278
ffffd300`9d1c2670 fffff802`5c591ae2 : ffffe585`025d0560 ffffe585`025d69c0 00000000`00000001 00000000`00000000 : nt!MmUnmapIoSpace+0x68
ffffd300`9d1c26a0 ffffe585`025d0560 : ffffe585`025d69c0 00000000`00000001 00000000`00000000 ffffd300`9d1c2720 : IOMap64+0x1ae2
ffffd300`9d1c26a8 ffffe585`025d69c0 : 00000000`00000001 00000000`00000000 ffffd300`9d1c2720 ffff9480`00993780 : 0xffffe585`025d0560
ffffd300`9d1c26b0 00000000`00000001 : 00000000`00000000 ffffd300`9d1c2720 ffff9480`00993780 00000000`00000000 : 0xffffe585`025d69c0
ffffd300`9d1c26b8 00000000`00000000 : ffffd300`9d1c2720 ffff9480`00993780 00000000`00000000 ffffe585`02edfa50 : 0x1
THREAD_SHA1_HASH_MOD_FUNC: e89b9ba7f5da08f45c88d3018c44ae012e21f592
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 4ca521458d441d73fd6780ba68cf23c287eb2e2b
THREAD_SHA1_HASH_MOD: 8671a1c461e046c8f3cd570e417f7017d14e394b
FOLLOWUP_IP:
IOMap64+1ae2
fffff802`5c591ae2 4f89bcece0520000 mov qword ptr [r12+r13*8+52E0h],r15
FAULT_INSTR_CODE: ecbc894f
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: IOMap64+1ae2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: IOMap64
IMAGE_NAME: IOMap64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5448513c
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1ae2
FAILURE_BUCKET_ID: 0x1a_6194a_IOMap64!unknown_function
BUCKET_ID: 0x1a_6194a_IOMap64!unknown_function
PRIMARY_PROBLEM_CLASS: 0x1a_6194a_IOMap64!unknown_function
TARGET_TIME: 2017-08-17T17:34:55.000Z
OSBUILD: 15063
OSSERVICEPACK: 540
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-08-01 04:23:25
BUILDDATESTAMP_STR: 170317-1834
BUILDLAB_STR: rs2_release
BUILDOSVER_STR: 10.0.15063.0.amd64fre.rs2_release.170317-1834
ANALYSIS_SESSION_ELAPSED_TIME: 23d39
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_6194a_iomap64!unknown_function
FAILURE_ID_HASH: {cb8efea1-bd7c-6759-ca10-6f209680f912}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.18869.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Recep Baltas\Downloads\Compressed\081817-4734-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 15063 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff801`dbc8b000 PsLoadedModuleList = 0xfffff801`dbfd75c0
Debug session time: Fri Aug 18 04:06:50.306 2017 (UTC + 3:00)
System Uptime: 0 days 2:35:05.009
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
...
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
FLTMGR!FltpDeleteContextList+0x86:
fffff80b`2aa96566 0fb74818 movzx ecx,word ptr [rax+18h] ds:002b:efff978d`2a722748=????
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80b2aa96566, The address that the exception occurred at
Arg3: ffffce81ae7133f8, Exception Record Address
Arg4: ffffce81ae712c40, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.Elapsed.Sec
Value: 1
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.15063.540 (WinBuild.160101.0800)
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0906
BIOS_DATE: 03/22/2017
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: STRIX Z270G GAMING
BASEBOARD_VERSION: Rev 1.xx
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80b2aa96566
BUGCHECK_P3: ffffce81ae7133f8
BUGCHECK_P4: ffffce81ae712c40
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
FLTMGR!FltpDeleteContextList+86
fffff80b`2aa96566 0fb74818 movzx ecx,word ptr [rax+18h]
EXCEPTION_RECORD: ffffce81ae7133f8 -- (.exr 0xffffce81ae7133f8)
ExceptionAddress: fffff80b2aa96566 (FLTMGR!FltpDeleteContextList+0x0000000000000086)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffce81ae712c40 -- (.cxr 0xffffce81ae712c40)
rax=efff978d2a722730 rbx=ffffa78a225f2648 rcx=ffff978d2a75ec28
rdx=0000000000005804 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80b2aa96566 rsp=ffffce81ae713630 rbp=fffff80b2aa60000
r8=0000000000005806 r9=0000000000000000 r10=ffff978d2a75e7d0
r11=ffffa78a21823ea0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000706 r15=ffffa78a20360860
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010286
FLTMGR!FltpDeleteContextList+0x86:
fffff80b`2aa96566 0fb74818 movzx ecx,word ptr [rax+18h] ds:002b:efff978d`2a722748=????
Resetting default scope
CPU_COUNT: 8
CPU_MHZ: 1068
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: 9
CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 42'00000000 (cache) 42'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
FOLLOWUP_IP:
FLTMGR!FltpDeleteContextList+86
fffff80b`2aa96566 0fb74818 movzx ecx,word ptr [rax+18h]
BUGCHECK_STR: AV
READ_ADDRESS: fffff801dc06c358: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 05-19-2019 21:22:23.0162
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
LAST_CONTROL_TRANSFER: from fffff80b2aa9860e to fffff80b2aa96566
STACK_TEXT:
ffffce81`ae713630 fffff80b`2aa9860e : ffff978d`30ec1f48 00000000`00000705 ffffffff`ffffffff ffff978d`2d9f3588 : FLTMGR!FltpDeleteContextList+0x86
ffffce81`ae713660 fffff80b`2aa98f32 : ffff978d`30ec1f00 00000000`00000705 ffff978d`30ec1f00 ffffa78a`20360860 : FLTMGR!CleanupStreamListCtrl+0x4a
ffffce81`ae7136a0 fffff801`dc1bda3f : ffffa78a`20360860 fffff80b`2b4084ee ffffa78a`20360860 00000000`00000706 : FLTMGR!DeleteStreamListCtrlCallback+0x92
ffffce81`ae7136e0 fffff80b`2b4c1f6e : ffffa78a`20360860 ffffce81`ae7137f8 00000000`00000705 ffff978d`2ae08450 : nt!FsRtlTeardownPerStreamContexts+0x4f
ffffce81`ae713720 fffff80b`2b4c1dc5 : ffffce81`ae7137b0 ffff978d`3111cb28 ffffa78a`20360720 00000008`3111cb00 : NTFS!NtfsDeleteScb+0x12e
ffffce81`ae7137a0 fffff80b`2b4082b5 : 00000000`00000001 ffffa78a`20360860 ffff978d`3111cc18 00000000`00000000 : NTFS!NtfsRemoveScb+0xc5
ffffce81`ae7137f0 fffff80b`2b4c1aef : ffffa78a`20360720 fffff80b`2b50d1d0 ffffce81`ae713932 ffffa78a`20360b00 : NTFS!NtfsPrepareFcbForRemoval+0x75
ffffce81`ae713830 fffff80b`2b4091d3 : ffff978d`315b0ca8 ffffce81`ae713932 ffffa78a`20360b30 ffffa78a`20360720 : NTFS!NtfsTeardownStructures+0x8f
ffffce81`ae7138b0 fffff80b`2b4c464c : ffffce81`ae713a48 ffffa78a`00000000 ffff978d`315b0ca8 ffffce81`ae713a48 : NTFS!NtfsDecrementCloseCounts+0xd3
ffffce81`ae7138f0 fffff80b`2b50d3ad : ffff978d`315b0ca8 ffffa78a`20360860 ffffa78a`20360720 ffff978d`2ae08180 : NTFS!NtfsCommonClose+0x3fc
ffffce81`ae7139c0 fffff801`dbcc8ca8 : 00000000`00000000 ffff978d`33a736c0 fffff801`dc0094e0 fffff801`dc083380 : NTFS!NtfsFspCloseInternal+0x1c9
ffffce81`ae713b00 fffff801`dbd67ac7 : 00000000`00000000 00000000`00000080 ffff978d`28026480 ffff978d`33a736c0 : nt!ExpWorkerThread+0xd8
ffffce81`ae713b90 fffff801`dbdfc9e6 : fffff801`dab51180 ffff978d`33a736c0 fffff801`dbd67a80 00000000`00000000 : nt!PspSystemThreadStartup+0x47
ffffce81`ae713be0 00000000`00000000 : ffffce81`ae714000 ffffce81`ae70d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
THREAD_SHA1_HASH_MOD_FUNC: 6d7927a3edc40b14cdb357e09c00f9c4d5cb7d22
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f87803992c13ee0a0a1414319f52a06aecce77eb
THREAD_SHA1_HASH_MOD: 68ef0f0096c33eca4038053e64f4c77ce9f83484
FAULT_INSTR_CODE: 1848b70f
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: FLTMGR!FltpDeleteContextList+86
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: FLTMGR
IMAGE_NAME: FLTMGR.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.15063.413
STACK_COMMAND: .cxr 0xffffce81ae712c40 ; kb
BUCKET_ID_FUNC_OFFSET: 86
FAILURE_BUCKET_ID: AV_FLTMGR!FltpDeleteContextList
BUCKET_ID: AV_FLTMGR!FltpDeleteContextList
PRIMARY_PROBLEM_CLASS: AV_FLTMGR!FltpDeleteContextList
TARGET_TIME: 2017-08-18T01:06:50.000Z
OSBUILD: 15063
OSSERVICEPACK: 540
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-08-01 04:23:25
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.15063.540
ANALYSIS_SESSION_ELAPSED_TIME: 7a7
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_fltmgr!fltpdeletecontextlist
FAILURE_ID_HASH: {43e99fff-500f-8d6b-330e-cd11df88a24c}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.18869.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Recep Baltas\Downloads\Compressed\081817-4843-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 15063 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff803`0f81c000 PsLoadedModuleList = 0xfffff803`0fb685c0
Debug session time: Fri Aug 18 13:47:40.167 2017 (UTC + 3:00)
System Uptime: 0 days 2:58:15.869
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
................................................................
Loading User Symbols
Loading unloaded module list
.....................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`0f988560 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd100`ab2ec2f0=0000000000000050
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe0fd4fd001f4, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff804fb4b1934, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.Elapsed.Sec
Value: 23
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.15063.540 (WinBuild.160101.0800)
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0906
BIOS_DATE: 03/22/2017
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: STRIX Z270G GAMING
BASEBOARD_VERSION: Rev 1.xx
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: ffffe0fd4fd001f4
BUGCHECK_P2: 0
BUGCHECK_P3: fffff804fb4b1934
BUGCHECK_P4: 2
READ_ADDRESS: fffff8030fbfd358: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffe0fd4fd001f4
FAULTING_IP:
IOMap64+1934
fffff804`fb4b1934 8b0482 mov eax,dword ptr [rdx+rax*4]
MM_INTERNAL_CODE: 2
CPU_COUNT: 8
CPU_MHZ: 1068
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: 9
CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 42'00000000 (cache) 42'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: GpuFanHelper.e
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 05-19-2019 21:16:49.0968
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
TRAP_FRAME: ffffd100ab2ec580 -- (.trap 0xffffd100ab2ec580)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000c007d rbx=0000000000000000 rcx=0000000000000001
rdx=ffffe0fd4fa00000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804fb4b1934 rsp=ffffd100ab2ec710 rbp=ffff8c0d80181890
r8=0000000000000000 r9=ffff8c0d80ef5b00 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
IOMap64+0x1934:
fffff804`fb4b1934 8b0482 mov eax,dword ptr [rdx+rax*4] ds:ffffe0fd`4fd001f4=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8030f9bdfb4 to fffff8030f988560
STACK_TEXT:
ffffd100`ab2ec2e8 fffff803`0f9bdfb4 : 00000000`00000050 ffffe0fd`4fd001f4 00000000`00000000 ffffd100`ab2ec580 : nt!KeBugCheckEx
ffffd100`ab2ec2f0 fffff803`0f8a92d6 : 00000000`00000000 ffffe0fd`4fd001f4 ffffd100`ab2ec580 ffff8c0d`824c4100 : nt!MiSystemFault+0x116e84
ffffd100`ab2ec390 fffff803`0f991d72 : 00000000`00000002 00000000`00000000 ffff8c0d`824c4600 00000000`00000001 : nt!MmAccessFault+0xae6
ffffd100`ab2ec580 fffff804`fb4b1934 : ffff8c0d`7f21a938 00000000`00000000 ffff8c0d`80181740 ffff8c0d`7f21a900 : nt!KiPageFault+0x132
ffffd100`ab2ec710 ffff8c0d`7f21a938 : 00000000`00000000 ffff8c0d`80181740 ffff8c0d`7f21a900 ffff8c0d`80181890 : IOMap64+0x1934
ffffd100`ab2ec718 00000000`00000000 : ffff8c0d`80181740 ffff8c0d`7f21a900 ffff8c0d`80181890 fffff804`fb4b163d : 0xffff8c0d`7f21a938
THREAD_SHA1_HASH_MOD_FUNC: 478dd3aaec51d8bf998407944823e3ebbc8e722a
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 98c100427eea7f2845f9ac62e9b8a5b78783ad52
THREAD_SHA1_HASH_MOD: 8671a1c461e046c8f3cd570e417f7017d14e394b
FOLLOWUP_IP:
IOMap64+1934
fffff804`fb4b1934 8b0482 mov eax,dword ptr [rdx+rax*4]
FAULT_INSTR_CODE: eb82048b
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: IOMap64+1934
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: IOMap64
IMAGE_NAME: IOMap64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5448513c
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1934
FAILURE_BUCKET_ID: AV_R_INVALID_IOMap64!unknown_function
BUCKET_ID: AV_R_INVALID_IOMap64!unknown_function
PRIMARY_PROBLEM_CLASS: AV_R_INVALID_IOMap64!unknown_function
TARGET_TIME: 2017-08-18T10:47:40.000Z
OSBUILD: 15063
OSSERVICEPACK: 540
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-08-01 04:23:25
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.15063.540
ANALYSIS_SESSION_ELAPSED_TIME: 5a6d
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_r_invalid_iomap64!unknown_function
FAILURE_ID_HASH: {24e98ca5-f46a-9570-8c6c-621e5780430e}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.18869.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Recep Baltas\Downloads\Compressed\081717-4593-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 15063 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 15063.0.amd64fre.rs2_release.170317-1834
Machine Name:
Kernel base = 0xfffff802`ac07d000 PsLoadedModuleList = 0xfffff802`ac3c95c0
Debug session time: Thu Aug 17 23:33:49.594 2017 (UTC + 3:00)
System Uptime: 0 days 0:18:38.298
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
.........................................................
Loading User Symbols
Loading unloaded module list
.....
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`ac1e9560 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa500`068f4650=000000000000001e
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff804fbe33d52, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.Elapsed.Sec
Value: 164
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 15063.0.amd64fre.rs2_release.170317-1834
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0906
BIOS_DATE: 03/22/2017
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: STRIX Z270G GAMING
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff804fbe33d52
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff802ac45e358: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
intelppm+3d52
fffff804`fbe33d52 c3 ret
EXCEPTION_PARAMETER2: ffffffffffffffff
BUGCHECK_STR: 0x1E_c0000005_R
CPU_COUNT: 8
CPU_MHZ: 1068
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: 9
CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 42'00000000 (cache) 42'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 05-19-2019 21:15:42.0227
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
TRAP_FRAME: cd4c10b67d630cd7 -- (.trap 0xcd4c10b67d630cd7)
Unable to read trap frame at cd4c10b6`7d630cd7
LAST_CONTROL_TRANSFER: from fffff802ac2780b6 to fffff802ac1e9560
STACK_TEXT:
ffffa500`068f4648 fffff802`ac2780b6 : 00000000`0000001e ffffffff`c0000005 fffff804`fbe33d52 00000000`00000000 : nt!KeBugCheckEx
ffffa500`068f4650 fffff802`ac1efa3d : fffff802`ac407000 fffff802`ac07d000 000536a0`00889000 fffff804`fbe33d52 : nt!KiFatalExceptionHandler+0x22
ffffa500`068f4690 fffff802`ac0a8d94 : 00000000`00000000 ffffa500`068f47c0 00000000`00000000 00000000`00000002 : nt!RtlpExecuteHandlerForException+0xd
ffffa500`068f46c0 fffff802`ac0a7b36 : ffffa500`068f5598 ffffa500`068f52e0 ffffa500`068f5598 ffffa500`068f5598 : nt!RtlDispatchException+0x404
ffffa500`068f4db0 fffff802`ac1f498e : 00000000`00000000 00000000`00000000 cd4c10b6`7d630cd7 00000000`00000000 : nt!KiDispatchException+0x1f6
ffffa500`068f5460 fffff802`ac1f2c34 : ffff60b7`b1d73036 00000000`00000000 00000000`00000000 ffffa500`068cd5a4 : nt!KiExceptionDispatch+0xce
ffffa500`068f5640 fffff804`fbe33d52 : 80fff804`fbe31360 9d000000`00000000 ac000000`00000000 80ff8103`4355f010 : nt!KiGeneralProtectionFault+0xf4
ffffa500`068f57d8 80fff804`fbe31360 : 9d000000`00000000 ac000000`00000000 80ff8103`4355f010 80ffa500`068c7180 : intelppm+0x3d52
ffffa500`068f57e0 9d000000`00000000 : ac000000`00000000 80ff8103`4355f010 80ffa500`068c7180 00000000`00000046 : 0x80fff804`fbe31360
ffffa500`068f57e8 ac000000`00000000 : 80ff8103`4355f010 80ffa500`068c7180 00000000`00000046 fffff802`ac0f36f9 : 0x9d000000`00000000
ffffa500`068f57f0 80ff8103`4355f010 : 80ffa500`068c7180 00000000`00000046 fffff802`ac0f36f9 00000000`00000000 : 0xac000000`00000000
ffffa500`068f57f8 80ffa500`068c7180 : 00000000`00000046 fffff802`ac0f36f9 00000000`00000000 00000000`0000006f : 0x80ff8103`4355f010
ffffa500`068f5800 00000000`00000046 : fffff802`ac0f36f9 00000000`00000000 00000000`0000006f 00000000`00000000 : 0x80ffa500`068c7180
ffffa500`068f5808 fffff802`ac0f36f9 : 00000000`00000000 00000000`0000006f 00000000`00000000 00000000`00000017 : 0x46
ffffa500`068f5810 fffff802`ac0f2f53 : 00000000`00000003 00000000`00000002 ffff8103`4355f100 00000000`00000000 : nt!PpmIdleExecuteTransition+0x619
ffffa500`068f5a80 fffff802`ac1ec5dc : 00000000`00000000 ffffa500`068c7180 ffffa500`068d3d80 ffff8103`3f576440 : nt!PoIdle+0x343
ffffa500`068f5be0 00000000`00000000 : ffffa500`068f6000 ffffa500`068ef000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x2c
THREAD_SHA1_HASH_MOD_FUNC: c2d4a7e7fd320894d9c9c4604e68b07fc7557a8f
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 74a3cb85afd865cd275703c2a7644622a404bae1
THREAD_SHA1_HASH_MOD: 8bfa170b56017b97d64f9552cea766743e2f8e1a
FOLLOWUP_IP:
intelppm+3d52
fffff804`fbe33d52 c3 ret
FAULT_INSTR_CODE: ccccccc3
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: intelppm+3d52
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: intelppm
IMAGE_NAME: intelppm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.15063.413
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 3d52
FAILURE_BUCKET_ID: 0x1E_c0000005_R_intelppm!unknown_function
BUCKET_ID: 0x1E_c0000005_R_intelppm!unknown_function
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_intelppm!unknown_function
TARGET_TIME: 2017-08-17T20:33:49.000Z
OSBUILD: 15063
OSSERVICEPACK: 540
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-08-01 04:23:25
BUILDDATESTAMP_STR: 170317-1834
BUILDLAB_STR: rs2_release
BUILDOSVER_STR: 10.0.15063.0.amd64fre.rs2_release.170317-1834
ANALYSIS_SESSION_ELAPSED_TIME: 28233
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_intelppm!unknown_function
FAILURE_ID_HASH: {d2c87d4a-7718-5900-56e8-3560bdf175c1}
Followup: MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff804fbe33d52, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.Elapsed.Sec
Value: 3
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 15063.0.amd64fre.rs2_release.170317-1834
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0906
BIOS_DATE: 03/22/2017
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: STRIX Z270G GAMING
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff804fbe33d52
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
intelppm+3d52
fffff804`fbe33d52 c3 ret
EXCEPTION_PARAMETER2: ffffffffffffffff
BUGCHECK_STR: 0x1E_c0000005_R
CPU_COUNT: 8
CPU_MHZ: 1068
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: 9
CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 42'00000000 (cache) 42'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 05-19-2019 21:18:27.0974
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
TRAP_FRAME: cd4c10b67d630cd7 -- (.trap 0xcd4c10b67d630cd7)
Unable to read trap frame at cd4c10b6`7d630cd7
LAST_CONTROL_TRANSFER: from fffff802ac2780b6 to fffff802ac1e9560
STACK_TEXT:
ffffa500`068f4648 fffff802`ac2780b6 : 00000000`0000001e ffffffff`c0000005 fffff804`fbe33d52 00000000`00000000 : nt!KeBugCheckEx
ffffa500`068f4650 fffff802`ac1efa3d : fffff802`ac407000 fffff802`ac07d000 000536a0`00889000 fffff804`fbe33d52 : nt!KiFatalExceptionHandler+0x22
ffffa500`068f4690 fffff802`ac0a8d94 : 00000000`00000000 ffffa500`068f47c0 00000000`00000000 00000000`00000002 : nt!RtlpExecuteHandlerForException+0xd
ffffa500`068f46c0 fffff802`ac0a7b36 : ffffa500`068f5598 ffffa500`068f52e0 ffffa500`068f5598 ffffa500`068f5598 : nt!RtlDispatchException+0x404
ffffa500`068f4db0 fffff802`ac1f498e : 00000000`00000000 00000000`00000000 cd4c10b6`7d630cd7 00000000`00000000 : nt!KiDispatchException+0x1f6
ffffa500`068f5460 fffff802`ac1f2c34 : ffff60b7`b1d73036 00000000`00000000 00000000`00000000 ffffa500`068cd5a4 : nt!KiExceptionDispatch+0xce
ffffa500`068f5640 fffff804`fbe33d52 : 80fff804`fbe31360 9d000000`00000000 ac000000`00000000 80ff8103`4355f010 : nt!KiGeneralProtectionFault+0xf4
ffffa500`068f57d8 80fff804`fbe31360 : 9d000000`00000000 ac000000`00000000 80ff8103`4355f010 80ffa500`068c7180 : intelppm+0x3d52
ffffa500`068f57e0 9d000000`00000000 : ac000000`00000000 80ff8103`4355f010 80ffa500`068c7180 00000000`00000046 : 0x80fff804`fbe31360
ffffa500`068f57e8 ac000000`00000000 : 80ff8103`4355f010 80ffa500`068c7180 00000000`00000046 fffff802`ac0f36f9 : 0x9d000000`00000000
ffffa500`068f57f0 80ff8103`4355f010 : 80ffa500`068c7180 00000000`00000046 fffff802`ac0f36f9 00000000`00000000 : 0xac000000`00000000
ffffa500`068f57f8 80ffa500`068c7180 : 00000000`00000046 fffff802`ac0f36f9 00000000`00000000 00000000`0000006f : 0x80ff8103`4355f010
ffffa500`068f5800 00000000`00000046 : fffff802`ac0f36f9 00000000`00000000 00000000`0000006f 00000000`00000000 : 0x80ffa500`068c7180
ffffa500`068f5808 fffff802`ac0f36f9 : 00000000`00000000 00000000`0000006f 00000000`00000000 00000000`00000017 : 0x46
ffffa500`068f5810 fffff802`ac0f2f53 : 00000000`00000003 00000000`00000002 ffff8103`4355f100 00000000`00000000 : nt!PpmIdleExecuteTransition+0x619
ffffa500`068f5a80 fffff802`ac1ec5dc : 00000000`00000000 ffffa500`068c7180 ffffa500`068d3d80 ffff8103`3f576440 : nt!PoIdle+0x343
ffffa500`068f5be0 00000000`00000000 : ffffa500`068f6000 ffffa500`068ef000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x2c
THREAD_SHA1_HASH_MOD_FUNC: c2d4a7e7fd320894d9c9c4604e68b07fc7557a8f
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 74a3cb85afd865cd275703c2a7644622a404bae1
THREAD_SHA1_HASH_MOD: 8bfa170b56017b97d64f9552cea766743e2f8e1a
FOLLOWUP_IP:
intelppm+3d52
fffff804`fbe33d52 c3 ret
FAULT_INSTR_CODE: ccccccc3
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: intelppm+3d52
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: intelppm
IMAGE_NAME: intelppm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.15063.413
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 3d52
FAILURE_BUCKET_ID: 0x1E_c0000005_R_intelppm!unknown_function
BUCKET_ID: 0x1E_c0000005_R_intelppm!unknown_function
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_intelppm!unknown_function
TARGET_TIME: 2017-08-17T20:33:49.000Z
OSBUILD: 15063
OSSERVICEPACK: 540
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-08-01 04:23:25
BUILDDATESTAMP_STR: 170317-1834
BUILDLAB_STR: rs2_release
BUILDOSVER_STR: 10.0.15063.0.amd64fre.rs2_release.170317-1834
ANALYSIS_SESSION_ELAPSED_TIME: f45
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_intelppm!unknown_function
FAILURE_ID_HASH: {d2c87d4a-7718-5900-56e8-3560bdf175c1}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.18869.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Recep Baltas\Downloads\Compressed\081817-4531-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 15063 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 15063.0.amd64fre.rs2_release.170317-1834
Machine Name:
Kernel base = 0xfffff800`3327d000 PsLoadedModuleList = 0xfffff800`335c95c0
Debug session time: Fri Aug 18 10:48:39.801 2017 (UTC + 3:00)
System Uptime: 0 days 5:27:47.118
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
............................................................
Loading User Symbols
Loading unloaded module list
..................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`333e9560 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb700`9b6a32f0=0000000000000050
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb7009f7bb008, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8011c691966, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for IOMap64.sys
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.Elapsed.Sec
Value: 4
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 15063.0.amd64fre.rs2_release.170317-1834
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0906
BIOS_DATE: 03/22/2017
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: STRIX Z270G GAMING
BASEBOARD_VERSION: Rev 1.xx
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: ffffb7009f7bb008
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8011c691966
BUGCHECK_P4: 0
READ_ADDRESS: fffff8003365e358: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffb7009f7bb008
FAULTING_IP:
IOMap64+1966
fffff801`1c691966 0fb60410 movzx eax,byte ptr [rax+rdx]
MM_INTERNAL_CODE: 0
CPU_COUNT: 8
CPU_MHZ: 1068
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: 9
CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 42'00000000 (cache) 42'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: AsRogAuraGpuDl
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 05-19-2019 21:16:45.0306
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
TRAP_FRAME: ffffb7009b6a3580 -- (.trap 0xffffb7009b6a3580)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffb7009f7bb000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8011c691966 rsp=ffffb7009b6a3710 rbp=ffff84832dcc59e0
r8=0000000000000000 r9=ffff84832f277d80 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
IOMap64+0x1966:
fffff801`1c691966 0fb60410 movzx eax,byte ptr [rax+rdx] ds:ffffb700`9f7bb008=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8003341ed8a to fffff800333e9560
STACK_TEXT:
ffffb700`9b6a32e8 fffff800`3341ed8a : 00000000`00000050 ffffb700`9f7bb008 00000000`00000000 ffffb700`9b6a3580 : nt!KeBugCheckEx
ffffb700`9b6a32f0 fffff800`3330a2d6 : 00000000`00000000 ffffb700`9f7bb008 ffffb700`9b6a3580 ffff8483`2e031080 : nt!MiSystemFault+0x116c5a
ffffb700`9b6a3390 fffff800`333f2d72 : 00000000`00000002 00000000`00000000 ffff8483`2e031580 00000000`00000001 : nt!MmAccessFault+0xae6
ffffb700`9b6a3580 fffff801`1c691966 : ffff8483`2d508b88 00000000`00000000 ffff8483`2dcc5890 ffff8483`2d508b50 : nt!KiPageFault+0x132
ffffb700`9b6a3710 ffff8483`2d508b88 : 00000000`00000000 ffff8483`2dcc5890 ffff8483`2d508b50 ffff8483`2dcc59e0 : IOMap64+0x1966
ffffb700`9b6a3718 00000000`00000000 : ffff8483`2dcc5890 ffff8483`2d508b50 ffff8483`2dcc59e0 fffff801`1c69163d : 0xffff8483`2d508b88
THREAD_SHA1_HASH_MOD_FUNC: 478dd3aaec51d8bf998407944823e3ebbc8e722a
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: cf1dd2499bebcbb5f32ce877d3afb4336606b22f
THREAD_SHA1_HASH_MOD: 8671a1c461e046c8f3cd570e417f7017d14e394b
FOLLOWUP_IP:
IOMap64+1966
fffff801`1c691966 0fb60410 movzx eax,byte ptr [rax+rdx]
FAULT_INSTR_CODE: 1004b60f
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: IOMap64+1966
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: IOMap64
IMAGE_NAME: IOMap64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5448513c
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1966
FAILURE_BUCKET_ID: AV_R_INVALID_IOMap64!unknown_function
BUCKET_ID: AV_R_INVALID_IOMap64!unknown_function
PRIMARY_PROBLEM_CLASS: AV_R_INVALID_IOMap64!unknown_function
TARGET_TIME: 2017-08-18T07:48:39.000Z
OSBUILD: 15063
OSSERVICEPACK: 540
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-08-01 04:23:25
BUILDDATESTAMP_STR: 170317-1834
BUILDLAB_STR: rs2_release
BUILDOSVER_STR: 10.0.15063.0.amd64fre.rs2_release.170317-1834
ANALYSIS_SESSION_ELAPSED_TIME: fb8
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_r_invalid_iomap64!unknown_function
FAILURE_ID_HASH: {24e98ca5-f46a-9570-8c6c-621e5780430e}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff803f070ca43, The address that the exception occurred at
Arg3: ffffffffffffffff, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
DBGHELP: Timeout to store: C:\ProgramData\Dbg\sym*https://msdl.microsoft.com/download/symbols
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.Elapsed.Sec
Value: 65
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.15063.540 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff803f070ca43
BUGCHECK_P3: ffffffffffffffff
BUGCHECK_P4: 0
WRITE_ADDRESS: fffff803f0a7c358: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000000
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!KiTimerWaitTest+b3
fffff803`f070ca43 f0480fba6d4000 lock bts qword ptr [rbp+40h],0
EXCEPTION_PARAMETER1: ffffffffffffffff
BUGCHECK_STR: 0x1E_c0000005
CPU_COUNT: 8
CPU_MHZ: 1068
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: 9
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 05-19-2019 21:16:53.0051
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
TRAP_FRAME: ffffb501972b1230 -- (.trap 0xffffb501972b1230)
Unable to read trap frame at ffffb501`972b1230
LAST_CONTROL_TRANSFER: from fffff803f08960b6 to fffff803f0807560
STACK_TEXT:
fffff803`f285b6b8 fffff803`f08960b6 : 00000000`0000001e ffffffff`c0000005 fffff803`f070ca43 ffffffff`ffffffff : nt!KeBugCheckEx
fffff803`f285b6c0 fffff803`f080da3d : fffff803`f0a25000 fffff803`f069b000 000536a0`00889000 ffffb501`954b1a98 : nt!KiFatalExceptionHandler+0x22
fffff803`f285b700 fffff803`f06c6d94 : 00000000`00000000 fffff803`f285b830 00000000`00000000 fffff807`faf3b9b6 : nt!RtlpExecuteHandlerForException+0xd
fffff803`f285b730 fffff803`f06c5b36 : fffff803`f285c608 fffff803`f285c350 fffff803`f285c608 fffff803`f285c608 : nt!RtlDispatchException+0x404
fffff803`f285be20 fffff803`f081298e : 00000000`00000000 00000000`00000000 ffffb501`972b1230 fffff807`f9c56a0b : nt!KiDispatchException+0x1f6
fffff803`f285c4d0 fffff803`f0810b05 : 00000000`00000000 00000300`20100000 2d6a319b`22fc77a2 cc1b5953`ae6ab4a1 : nt!KiExceptionDispatch+0xce
fffff803`f285c6b0 fffff803`f070ca43 : 00000500`000005d0 ffffb501`8f695000 00000000`00000100 ffffffff`00000000 : nt!KiStackFault+0x105
fffff803`f285c840 fffff803`f070c6ff : fffff803`ef569180 ffffb501`00000000 fffff803`f285ca98 00000000`00000003 : nt!KiTimerWaitTest+0xb3
fffff803`f285c8f0 fffff803`f070d707 : fffff803`ef569180 00000000`003e95c2 00000000`00000000 00000000`000131bb : nt!KiProcessExpiredTimerList+0xaf
fffff803`f285c9e0 fffff803`f080a60a : 00000000`00000000 fffff803`ef569180 00000000`001a6fe0 fffff803`f0a94a40 : nt!KiRetireDpcList+0x367
fffff803`f285cbe0 00000000`00000000 : fffff803`f285d000 fffff803`f2856000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
THREAD_SHA1_HASH_MOD_FUNC: e35a957f93ce65caabf319c76ce5221cbfaffe50
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 2887175b5f3da4f48c8e58cc466ab0d4aac81424
THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c
FOLLOWUP_IP:
nt!KiTimerWaitTest+b3
fffff803`f070ca43 f0480fba6d4000 lock bts qword ptr [rbp+40h],0
FAULT_INSTR_CODE: ba0f48f0
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: nt!KiTimerWaitTest+b3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 597fd80d
IMAGE_VERSION: 10.0.15063.540
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: b3
FAILURE_BUCKET_ID: 0x1E_c0000005_nt!KiTimerWaitTest
BUCKET_ID: 0x1E_c0000005_nt!KiTimerWaitTest
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_nt!KiTimerWaitTest
TARGET_TIME: 2017-08-17T21:45:22.000Z
OSBUILD: 15063
OSSERVICEPACK: 540
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-08-01 04:23:25
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.15063.540
ANALYSIS_SESSION_ELAPSED_TIME: fe8b
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_nt!kitimerwaittest
FAILURE_ID_HASH: {0b1bac46-2a62-8b1e-2945-6087e0228943}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80189709cf9, Address of the instruction which caused the bugcheck
Arg3: ffff8b006234ef50, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.15063.540 (WinBuild.160101.0800)
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0906
BIOS_DATE: 03/22/2017
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: STRIX Z270G GAMING
BASEBOARD_VERSION: Rev 1.xx
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80189709cf9
BUGCHECK_P3: ffff8b006234ef50
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!KiTryUnwaitThread+e9
fffff801`89709cf9 f0480fbaaf1059000000 lock bts qword ptr [rdi+5910h],0
CONTEXT: ffff8b006234ef50 -- (.cxr 0xffff8b006234ef50)
rax=0000000000000001 rbx=ffffcb8519139080 rcx=0000000000000000
rdx=ffffcb85191391c0 rsi=ffffcb85191391c0 rdi=7fff8b005d540180
rip=fffff80189709cf9 rsp=ffff8b006234f940 rbp=ffff8b005d643180
r8=0000000000000000 r9=0000000000000000 r10=fffff80189b4b100
r11=ffffba0981777480 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!KiTryUnwaitThread+0xe9:
fffff801`89709cf9 f0480fbaaf1059000000 lock bts qword ptr [rdi+5910h],0 ds:002b:7fff8b00`5d545a90=????????????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: 8
CPU_MHZ: 1068
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: 9
CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 42'00000000 (cache) 42'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: audiodg.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 05-19-2019 21:17:51.0407
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
LAST_CONTROL_TRANSFER: from fffff80189708079 to fffff80189709cf9
STACK_TEXT:
ffff8b00`6234f940 fffff801`89708079 : ffffcb85`16e81060 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiTryUnwaitThread+0xe9
ffff8b00`6234f9a0 fffff801`89b4b222 : 0000004e`75effa58 00000000`00000000 0000004e`75effa01 00000000`00000000 : nt!KeSetEvent+0x129
ffff8b00`6234fa30 fffff801`89812413 : ffffcb85`106227c0 00000000`01b03d1a 00000000`00000000 ffffcb85`16e81060 : nt!NtSetEvent+0x92
ffff8b00`6234fa80 00007ffb`d9225564 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
0000004e`75effbc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`d9225564
THREAD_SHA1_HASH_MOD_FUNC: 44d6e36e19ba605184aa0576aa8a9b801de5022e
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d595dbc7873d9236bdfe3d01760c0c9a38794a63
THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791
FOLLOWUP_IP:
nt!KiTryUnwaitThread+e9
fffff801`89709cf9 f0480fbaaf1059000000 lock bts qword ptr [rdi+5910h],0
FAULT_INSTR_CODE: ba0f48f0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KiTryUnwaitThread+e9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 597fd80d
IMAGE_VERSION: 10.0.15063.540
STACK_COMMAND: .cxr 0xffff8b006234ef50 ; kb
BUCKET_ID_FUNC_OFFSET: e9
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!KiTryUnwaitThread
BUCKET_ID: 0x3B_c0000005_nt!KiTryUnwaitThread
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!KiTryUnwaitThread
TARGET_TIME: 2017-08-17T22:30:13.000Z
OSBUILD: 15063
OSSERVICEPACK: 540
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-08-01 04:23:25
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.15063.540
ANALYSIS_SESSION_ELAPSED_TIME: 89f
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!kitryunwaitthread
FAILURE_ID_HASH: {5d7ff845-c6aa-f56d-5e43-2409865be7c6}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff803fa85ac94, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.Elapsed.Sec
Value: 85
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 15063.0.amd64fre.rs2_release.170317-1834
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0906
BIOS_DATE: 03/22/2017
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: STRIX Z270G GAMING
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff803fa85ac94
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff803fabeb358: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!KxWaitForLockOwnerShip+14
fffff803`fa85ac94 48890a mov qword ptr [rdx],rcx
EXCEPTION_PARAMETER2: ffffffffffffffff
BUGCHECK_STR: 0x1E_c0000005_R
CPU_COUNT: 8
CPU_MHZ: 1068
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: 9
CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 42'00000000 (cache) 42'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 05-19-2019 21:15:48.0177
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
LAST_CONTROL_TRANSFER: from fffff803faa050b6 to fffff803fa976560
STACK_TEXT:
fffff803`fca5b378 fffff803`faa050b6 : 00000000`0000001e ffffffff`c0000005 fffff803`fa85ac94 00000000`00000000 : nt!KeBugCheckEx
fffff803`fca5b380 fffff803`fa97ca3d : fffff803`fab94000 fffff803`fa80a000 000536a0`00889000 ffffaf06`c7f34330 : nt!KiFatalExceptionHandler+0x22
fffff803`fca5b3c0 fffff803`fa835d94 : 00000000`00000000 fffff803`fca5b4f0 00000000`00000000 fffff80d`ee71fa00 : nt!RtlpExecuteHandlerForException+0xd
fffff803`fca5b3f0 fffff803`fa834b36 : fffff803`fca5c2c8 fffff803`fca5c010 fffff803`fca5c2c8 fffff803`fca5c2c8 : nt!RtlDispatchException+0x404
fffff803`fca5bae0 fffff803`fa98198e : fffff803`fca5c318 ffffaf06`ccc77110 ffffaf06`cb638010 00000000`00000103 : nt!KiDispatchException+0x1f6
fffff803`fca5c190 fffff803`fa97fc34 : ffffaf06`cc5e7000 fffff80d`eea27460 ffffaf06`00000000 ffffaf06`cc5e7000 : nt!KiExceptionDispatch+0xce
fffff803`fca5c370 fffff803`fa85ac94 : 00000000`00000000 00000000`ffffffff 00000000`00000000 fffff80d`eea9decb : nt!KiGeneralProtectionFault+0xf4
fffff803`fca5c500 fffff803`fa85ac64 : ffffaf06`d06fd010 fffff803`fca5c5b0 00000000`00000001 fffff80d`eea398ab : nt!KxWaitForLockOwnerShip+0x14
fffff803`fca5c530 fffff80d`ee86909a : ffffaf06`cc5e4000 fffff80d`eea3b1bc fffff803`fca5c5b0 00000000`00000001 : nt!KeAcquireInStackQueuedSpinLock+0x44
fffff803`fca5c560 ffffaf06`cc5e4000 : fffff80d`eea3b1bc fffff803`fca5c5b0 00000000`00000001 00000000`00000000 : nvlddmkm+0x1909a
fffff803`fca5c568 fffff80d`eea3b1bc : fffff803`fca5c5b0 00000000`00000001 00000000`00000000 ffffaf06`d06fd021 : 0xffffaf06`cc5e4000
fffff803`fca5c570 fffff803`fca5c5b0 : 00000000`00000001 00000000`00000000 ffffaf06`d06fd021 ffffaf06`cc5e7002 : nvlddmkm+0x1eb1bc
fffff803`fca5c578 00000000`00000001 : 00000000`00000000 ffffaf06`d06fd021 ffffaf06`cc5e7002 fffff80d`eea39f9d : 0xfffff803`fca5c5b0
fffff803`fca5c580 00000000`00000000 : ffffaf06`d06fd021 ffffaf06`cc5e7002 fffff80d`eea39f9d ffffaf06`cd139000 : 0x1
THREAD_SHA1_HASH_MOD_FUNC: 5d53fe4f1eaa8ef1f500257d8ec119fca26fb691
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c56152d95445bc86e980d87f07a878a34894a8c9
THREAD_SHA1_HASH_MOD: 86cfe786c39c0221c86306f07cc8f475ea91d71b
FOLLOWUP_IP:
nt!KxWaitForLockOwnerShip+14
fffff803`fa85ac94 48890a mov qword ptr [rdx],rcx
FAULT_INSTR_CODE: 660a8948
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: nt!KxWaitForLockOwnerShip+14
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 597fd80d
IMAGE_VERSION: 10.0.15063.540
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 14
FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!KxWaitForLockOwnerShip
BUCKET_ID: 0x1E_c0000005_R_nt!KxWaitForLockOwnerShip
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_nt!KxWaitForLockOwnerShip
TARGET_TIME: 2017-08-17T13:52:00.000Z
OSBUILD: 15063
OSSERVICEPACK: 540
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-08-01 04:23:25
BUILDDATESTAMP_STR: 170317-1834
BUILDLAB_STR: rs2_release
BUILDOSVER_STR: 10.0.15063.0.amd64fre.rs2_release.170317-1834
ANALYSIS_SESSION_ELAPSED_TIME: 14edb
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_nt!kxwaitforlockownership
FAILURE_ID_HASH: {46e638f9-c452-7fad-a26d-265733d49ab4}
Followup: MachineOwner
---------