SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff80263ce515e, The address that the exception occurred at
Arg3: ffff820aa8f11248, Exception Record Address
Arg4: ffff820aa8f10a90, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc000001d
BUGCHECK_P2: fffff80263ce515e
BUGCHECK_P3: ffff820aa8f11248
BUGCHECK_P4: ffff820aa8f10a90
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>
FAULTING_IP:
FLTMGR!FltpPerformPreCallbacks+9fe
fffff802`63ce515e ce ???
EXCEPTION_RECORD: ffff820aa8f11248 -- (.exr 0xffff820aa8f11248)
ExceptionAddress: fffff80263ce515e (FLTMGR!FltpPerformPreCallbacks+0x00000000000009fe)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0
CONTEXT: ffff820aa8f10a90 -- (.cxr 0xffff820aa8f10a90)
rax=0000000000000208 rbx=ffffbc0fd43708b0 rcx=0000000000000208
rdx=0000000000000005 rsi=ffffbc0fd4370c50 rdi=ffffbc0fd0870d40
rip=fffff80263ce515e rsp=ffff820aa8f11488 rbp=ffffbc0fd45ecb30
r8=0000000000000208 r9=0000000000000001 r10=ffffbc0fd03f3240
r11=fffff80263cfc470 r12=0000000000000000 r13=0000000000000000
r14=ffffbc0fd43708b0 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
FLTMGR!FltpPerformPreCallbacks+0x9fe:
fffff802`63ce515e ce ???
Resetting default scope
CPU_COUNT: 10
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: AV
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>
EXCEPTION_CODE_STR: c000001d
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-20-2020 23:23:20.0126
ANALYSIS_VERSION: 10.0.18362.1 x86fre
MISALIGNED_IP:
FLTMGR!FltpPerformPreCallbacks+9fe
fffff802`63ce515e ce ???
LAST_CONTROL_TRANSFER: from ffffbc0fd43f5030 to fffff80263ce515e
FAILED_INSTRUCTION_ADDRESS:
FLTMGR!FltpPerformPreCallbacks+9fe
fffff802`63ce515e ce ???
STACK_TEXT:
ffff820a`a8f11488 ffffbc0f`d43f5030 : fffff802`629e74cd ffffbc0f`d4596e60 ffffbc0f`d45ecb30 ffffbc0f`d0870d40 : FLTMGR!FltpPerformPreCallbacks+0x9fe
ffff820a`a8f11598 fffff802`629e74cd : ffffbc0f`d4596e60 ffffbc0f`d45ecb30 ffffbc0f`d0870d40 ffffbc0f`d43708b0 : 0xffffbc0f`d43f5030
ffff820a`a8f115a0 fffff802`629fa0e0 : ffff820a`a8f11900 00000000`00000000 ffffbc0f`cc9f9f00 fffff802`628f4fc0 : nt!IopDeleteFile+0x12d
ffff820a`a8f11620 fffff802`624390c4 : 00000000`00000000 00000000`00000000 ffff820a`a8f11900 ffffbc0f`d4596e60 : nt!ObpRemoveObjectRoutine+0x80
ffff820a`a8f11680 fffff802`648926ad : 00000000`00000000 ffffbc0f`d4596e60 00000000`00000000 00000000`00000000 : nt!ObfDereferenceObject+0xa4
ffff820a`a8f116c0 fffff802`648abc94 : ffffcc04`cf383170 ffff820a`a8f119c9 ffffbc0f`d4369c28 ffffcc04`cf383010 : Ntfs!NtfsDeleteInternalAttributeStream+0x111
ffff820a`a8f11700 fffff802`648afb09 : ffffbc0f`d4369c28 00000000`00000000 00000000`00000000 00000067`00000000 : Ntfs!TxfInitializeTxfSystemDirectory+0x220
ffff820a`a8f11810 fffff802`64880753 : ffffbc0f`d43f5180 fffff802`62400001 fffff802`5dd31101 fffff802`62991400 : Ntfs!TxfInitializeVolume+0x335
ffff820a`a8f11950 fffff802`647719c0 : ffffbc0f`d0952d68 fffff802`64771600 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonFileSystemControl+0x16b
ffff820a`a8f11a30 fffff802`624bd095 : ffffbc0f`cc8877d0 ffffbc0f`d0377040 ffffbc0f`cc8877d0 ffffbc0f`d0952df8 : Ntfs!NtfsFspDispatch+0x3c0
ffff820a`a8f11b70 fffff802`6252a7a5 : ffffbc0f`d0377040 00000000`00000080 ffffbc0f`cc8af080 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
ffff820a`a8f11c10 fffff802`625c8b2a : ffffe300`3d539180 ffffbc0f`d0377040 fffff802`6252a750 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff820a`a8f11c60 00000000`00000000 : ffff820a`a8f12000 ffff820a`a8f0c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
fffff80263ce5c21 - FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+7a1
[ fd:f5 ]
1 error : !FLTMGR (fffff80263ce5c21)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .cxr 0xffff820aa8f10a90 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
TARGET_TIME: 2020-01-20T19:07:48.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 3c87
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: memory_corruption
---------
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffcd00ad11d2b0
Arg3: 000000f09647f7f8
Arg4: fffff801757d284c
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450 GAMING X
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/27/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450 GAMING X
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: 8
BUGCHECK_P2: ffffcd00ad11d2b0
BUGCHECK_P3: f09647f7f8
BUGCHECK_P4: fffff801757d284c
BUGCHECK_STR: 0x7f_8
TRAP_FRAME: ffffcd00ad11d2b0 -- (.trap 0xffffcd00ad11d2b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000023 rbx=0000000000000000 rcx=00007fff6791c524
rdx=00007fff64b40000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801757d284c rsp=000000f09647f7f8 rbp=0000000000000000
r8=0000000000000006 r9=000000f09647f830 r10=ffffffffffffffff
r11=0000000000000246 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na pe nc
nt!KiSystemCall64+0xc:
fffff801`757d284c 65488b2425a8010000 mov rsp,qword ptr gs:[1A8h] gs:00000000`000001a8=????????????????
Resetting default scope
CPU_COUNT: 10
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: WmiPrvSE.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-20-2020 23:23:24.0377
ANALYSIS_VERSION: 10.0.18362.1 x86fre
BAD_STACK_POINTER: 000000f09647f7f8
LAST_CONTROL_TRANSFER: from fffff801757d32e9 to fffff801757c14e0
STACK_TEXT:
ffffcd00`ad11d168 fffff801`757d32e9 : 00000000`0000007f 00000000`00000008 ffffcd00`ad11d2b0 000000f0`9647f7f8 : nt!KeBugCheckEx
ffffcd00`ad11d170 fffff801`757ce145 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffcd00`ad11d2b0 fffff801`757d284c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c5
000000f0`9647f7f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemCall64+0xc
THREAD_SHA1_HASH_MOD_FUNC: d998fe020a7bf757d69726f6a68a4c5e54a760f5
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3b0d8742792bf900a74135b28da7f2938ee852be
THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791
FOLLOWUP_IP:
nt!KiDoubleFaultAbort+2c5
fffff801`757ce145 90 nop
FAULT_INSTR_CODE: 6666c390
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDoubleFaultAbort+2c5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2c5
FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort
BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort
PRIMARY_PROBLEM_CLASS: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort
TARGET_TIME: 2020-01-20T19:32:24.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 6624
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x7f_8_stackptr_error_nt!kidoublefaultabort
FAILURE_ID_HASH: {c5b9990d-856b-1bb5-7662-4621e5941c84}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffff80000004, The exception code that was not handled
Arg2: fffff80153f4206c, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffff828a45efa108, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450 GAMING X
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/27/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450 GAMING X
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: ffffffff80000004
BUGCHECK_P2: fffff80153f4206c
BUGCHECK_P3: 0
BUGCHECK_P4: ffff828a45efa108
EXCEPTION_CODE: (HRESULT) 0x80000004 (2147483652) - B yle bir arabirim desteklenmiyor
FAULTING_IP:
amdppm!ReadIoMemRaw+e4
fffff801`53f4206c 0fb6c0 movzx eax,al
EXCEPTION_PARAMETER2: ffff828a45efa108
BUGCHECK_STR: 0x1E_80000004
CPU_COUNT: 10
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-20-2020 23:23:28.0704
ANALYSIS_VERSION: 10.0.18362.1 x86fre
EXCEPTION_RECORD: 0000000000140001 -- (.exr 0x140001)
Cannot read Exception record @ 0000000000140001
TRAP_FRAME: fffff801417766c0 -- (.trap 0xfffff801417766c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fbaee8f975003983 rsp=ec834808244c8948 rbp=8b4800036912e828
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 vif ov dn di ng zr na po nc
ffff:fbaee8f9`75003983 ?? ???
Resetting default scope
BAD_STACK_POINTER: ec834808244c8948
LAST_CONTROL_TRANSFER: from fffff80141aa653e to fffff801419c14e0
STACK_TEXT:
ffffc588`5c6d0558 fffff801`41aa653e : 00000000`0000001e ffffffff`80000004 fffff801`53f4206c 00000000`00000000 : nt!KeBugCheckEx
ffffc588`5c6d0560 fffff801`419ca312 : fffff801`41d11000 fffff801`41800000 0005e548`00ab6000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22
ffffc588`5c6d05a0 fffff801`418c2fa5 : 00000000`00000000 00000000`00000000 ffffc588`5c6d0b10 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
ffffc588`5c6d05d0 fffff801`418c753e : ffffc588`5c6d1508 ffffc588`5c6d1250 ffffc588`5c6d1508 ffff828a`45efa108 : nt!RtlDispatchException+0x4a5
ffffc588`5c6d0d20 fffff801`419d341d : 00000000`00140001 00000000`00000001 fffff801`417766c0 fffff801`417602ca : nt!KiDispatchException+0x16e
ffffc588`5c6d13d0 fffff801`419cc5e5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000000e : nt!KiExceptionDispatch+0x11d
ffffc588`5c6d15b0 fffff801`53f4206c : fffff801`53f421d0 00000000`00000000 ffffcbde`8931b7ca 00000000`00009166 : nt!KxDebugTrapOrFault+0x3e5
ffffc588`5c6d1748 fffff801`53f421d0 : 00000000`00000000 ffffcbde`8931b7ca 00000000`00009166 00000000`00005cf5 : amdppm!ReadIoMemRaw+0xe4
ffffc588`5c6d1750 fffff801`53f4a9aa : 00000000`00000000 00000000`00000000 ffff828a`440f2720 fffff801`41af024b : amdppm!ReadGenAddr+0x18
ffffc588`5c6d1780 fffff801`53f4a863 : ffffd880`d9bb9180 00000000`00000000 ffffd880`d9bb9100 000001df`1605dab4 : amdppm!C2Idle+0x8a
ffffc588`5c6d17b0 fffff801`41821e7c : 00000000`0000002e 00000000`00000000 ffff828a`46470010 00000000`0000002e : amdppm!AcpiCStateIdleExecute+0x23
ffffc588`5c6d17e0 fffff801`418215ce : 00000000`00000003 00000000`00000002 ffff828a`46470100 00000000`00000008 : nt!PpmIdleExecuteTransition+0x70c
ffffc588`5c6d1b00 fffff801`419c4fe8 : ffffffff`00000000 ffffd880`d9bb9180 ffff828a`3cd84040 00000000`00000b6b : nt!PoIdle+0x36e
ffffc588`5c6d1c60 00000000`00000000 : ffffc588`5c6d2000 ffffc588`5c6cc000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48
THREAD_SHA1_HASH_MOD_FUNC: f567785a2aa709df54df08e1708e3e6de0fcbf87
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 26e79b0c8a19c9eb798a9396ece3fd96783ae3ec
THREAD_SHA1_HASH_MOD: 0e4c860846993d7e3faf763ce25943f431bdbf85
FOLLOWUP_IP:
amdppm!ReadIoMemRaw+e4
fffff801`53f4206c 0fb6c0 movzx eax,al
FAULT_INSTR_CODE: c3c0b60f
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: amdppm!ReadIoMemRaw+e4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: amdppm
IMAGE_NAME: amdppm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.387
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: e4
FAILURE_BUCKET_ID: 0x1E_80000004_STACKPTR_ERROR_amdppm!ReadIoMemRaw
BUCKET_ID: 0x1E_80000004_STACKPTR_ERROR_amdppm!ReadIoMemRaw
PRIMARY_PROBLEM_CLASS: 0x1E_80000004_STACKPTR_ERROR_amdppm!ReadIoMemRaw
TARGET_TIME: 2020-01-20T19:17:18.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 41e9
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_80000004_stackptr_error_amdppm!readiomemraw
FAILURE_ID_HASH: {7bb3962b-00ba-2a7f-4bf4-c161c3461831}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffd8014ff121d0, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: ffffd8014ff121d0, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450 GAMING X
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/27/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450 GAMING X
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: ffffd8014ff121d0
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: ffffd8014ff121d0
READ_ADDRESS: fffff8013f3733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffd8014ff121d0
CURRENT_IRQL: 0
FAULTING_IP:
+0
ffffd801`4ff121d0 ?? ???
ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.
BUGCHECK_STR: DISABLED_INTERRUPT_FAULT
CPU_COUNT: 10
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-20-2020 23:23:32.0873
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffff918c622d15c0 -- (.trap 0xffff918c622d15c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000414
rdx=0000000000000414 rsi=0000000000000000 rdi=0000000000000000
rip=ffffd8014ff121d0 rsp=ffff918c622d1750 rbp=ffff980f51e48010
r8=0000000000000000 r9=0000000000000000 r10=ffff980f51dfc868
r11=ffff9af9d0200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
ffffd801`4ff121d0 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8013efd32e9 to fffff8013efc14e0
FAILED_INSTRUCTION_ADDRESS:
+0
ffffd801`4ff121d0 ?? ???
STACK_TEXT:
ffff918c`622d1478 fffff801`3efd32e9 : 00000000`0000000a ffffd801`4ff121d0 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffff918c`622d1480 fffff801`3efcf62b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff918c`622d15c0 ffffd801`4ff121d0 : ffff918c`622d1780 ffff69bf`f32ce2c4 00000000`00011f9e 00000000`0000b976 : nt!KiPageFault+0x46b
ffff918c`622d1750 ffff918c`622d1780 : ffff69bf`f32ce2c4 00000000`00011f9e 00000000`0000b976 00000000`00000000 : 0xffffd801`4ff121d0
ffff918c`622d1758 ffff69bf`f32ce2c4 : 00000000`00011f9e 00000000`0000b976 00000000`00000000 fffff801`4ff1a9aa : 0xffff918c`622d1780
ffff918c`622d1760 00000000`00011f9e : 00000000`0000b976 00000000`00000000 fffff801`4ff1a9aa 00000000`00000000 : 0xffff69bf`f32ce2c4
ffff918c`622d1768 00000000`0000b976 : 00000000`00000000 fffff801`4ff1a9aa 00000000`00000000 00000000`00000000 : 0x11f9e
ffff918c`622d1770 00000000`00000000 : fffff801`4ff1a9aa 00000000`00000000 00000000`00000000 ffff980f`4bffa720 : 0xb976
THREAD_SHA1_HASH_MOD_FUNC: bf99962f16aee8a6a536cfcc5454c0cd4db15ac9
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 497aaf2f8d4f907c0c9bce6ce025c930b885e2b8
THREAD_SHA1_HASH_MOD: 2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b
FOLLOWUP_IP:
nt!KiPageFault+46b
fffff801`3efcf62b 33c0 xor eax,eax
FAULT_INSTR_CODE: ffb0c033
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+46b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 46b
FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault
BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault
PRIMARY_PROBLEM_CLASS: DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault
TARGET_TIME: 2020-01-20T19:26:50.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 4179
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:disabled_interrupt_fault_code_av_bad_ip_nt!kipagefault
FAILURE_ID_HASH: {f2ab72c5-099d-9077-bfcf-ba12aa825b36}
Followup: MachineOwner
---------
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffda85ddd64340, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
------------------------------------------------
| |
| NT symbols are not available |
| Wmitrace cannot operate without them |
| |
------------------------------------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
DUMP_TYPE: 2
BUGCHECK_P1: ffffda85ddd64340
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
CPU_COUNT: 10
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CORRUPT_MODULELIST_0xEF
BUGCHECK_STR: 0xEF
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-20-2020 23:23:15.0780
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8017d2cae89 to fffff8017cbc14e0
STACK_TEXT:
ffffad08`4e5e8938 fffff801`7d2cae89 : 00000000`000000ef ffffda85`ddd64340 00000000`00000000 00000000`00000000 : 0xfffff801`7cbc14e0
ffffad08`4e5e8940 00000000`000000ef : ffffda85`ddd64340 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff801`7d2cae89
ffffad08`4e5e8948 ffffda85`ddd64340 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : 0xef
ffffad08`4e5e8950 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`c0000005 : 0xffffda85`ddd64340
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID: CORRUPT_MODULELIST_0xEF
PRIMARY_PROBLEM_CLASS: CORRUPT_MODULELIST_0xEF
FAILURE_BUCKET_ID: CORRUPT_MODULELIST_0xEF
TARGET_TIME: 2020-01-20T19:43:51.000Z
OSBUILD: 18362
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
ANALYSIS_SESSION_ELAPSED_TIME: 1f
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:corrupt_modulelist_0xef
FAILURE_ID_HASH: {622df55c-925d-d478-30ae-d5699ff4662f}
Followup: MachineOwner
---------