Windows 10 BSOD dmp. file analysis

  • Thread starter Thread starter SquishyElf4556
  • Start date Start date
S

SquishyElf4556

Hello world,


I've had overwhelming number of bsods in the last year. But today it has cost me time and money, so I decided to ask you, tech saavys, to help me analyse the dmp file from the BSOD. Thank you for help


Here it is:


Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [D:\Desktop\120720-25093-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff801`27c00000 PsLoadedModuleList = 0xfffff801`2882a3b0
Debug session time: Mon Dec 7 15:53:41.178 2020 (UTC + 1:00)
System Uptime: 0 days 21:44:57.845
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.
Loading User Symbols
Loading unloaded module list
.............
For analysis of this file, run
!analyze -v
nt!KeBugCheckEx:
fffff801`27ff5210 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff801`2c0730c0=000000000000000a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8012a9b2489, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3546

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-582H9QA

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 3588

Key : Analysis.Memory.CommitPeak.Mb
Value: 92

Key : Analysis.System
Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

BUGCHECK_CODE: d1

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8012a9b2489

WRITE_ADDRESS: fffff801288fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8012880f340: Unable to get Flags value from nt!KdVersionBlock
fffff8012880f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000

BLACKBOXBSD: 1 (
!blackboxbsd)


BLACKBOXNTFS: 1 (
!blackboxntfs)


BLACKBOXPNP: 1 (
!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: audiodg.exe

DPC_STACK_BASE: FFFFF8012C073FB0

TRAP_FRAME: fffff8012c073200 --
(.trap 0xfffff8012c073200)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffac085c0ce690
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8012a9b2489 rsp=fffff8012c073390 rbp=fffff8012c073410
r8=0000000000000000 r9=0000000000000000 r10=0000fffff8012a9b
r11=ffffc2fe95200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 ov up ei ng nz ac po cy
Wdf01000!FxRequest::Reuse+0xa9:
fffff801`2a9b2489 0000 add byte ptr [rax],al ds:00000000`00000000=??
Resetting default scope

STACK_TEXT:
fffff801`2c0730b8 fffff801`28007169 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff801`2c0730c0 fffff801`28003469 : ffffac08`55417100 000053f7`98f2e548 fffff801`2c0732e8 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff801`2c073200 fffff801`2a9b2489 : ffffac08`58b2ca50 ffffac08`5c77ea20 fffff801`2c073578 ffffac08`5952ebbb : nt!KiPageFault+0x469
fffff801`2c073390 fffff801`2aa1c5cc : ffffac08`586b5000 ffffac08`62b56af0 fffff801`2c073450 ffffac08`6b3abcb0 : Wdf01000!FxRequest::Reuse+0xa9 [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 2288]
fffff801`2c0733f0 fffff801`2aa1d387 : 00000000`00000000 ffffac08`62b56af0 ffffac08`62b56bc8 ffffac08`5c77ea20 : Wdf01000!FxUsbPipeContinuousReader::FormatRepeater+0x68 [minkernel\wdf\framework\shared\targets\usb\fxusbpipe.cpp @ 719]
fffff801`2c073470 fffff801`2aa1d943 : ffffac08`62b56b00 ffffac08`62b56bc8 00000000`00000000 00000000`00000000 : Wdf01000!FxUsbPipeContinuousReader::ResubmitRepeater+0x33 [minkernel\wdf\framework\shared\targets\usb\fxusbpipe.cpp @ 154]
fffff801`2c0734f0 fffff801`2a9b9248 : ffffac08`6b3abcb0 00000000`00000001 fffff801`2aa1d8c0 fffff801`00000000 : Wdf01000!FxUsbPipeContinuousReader::_FxUsbPipeRequestComplete+0x83 [minkernel\wdf\framework\shared\targets\usb\fxusbpipe.cpp @ 302]
fffff801`2c073560 fffff801`2a9bc854 : 000053f7`94c54348 ffffac08`6b3abcb0 ffffac08`6b3abcb0 00000000`00000000 : Wdf01000!FxRequestBase::CompleteSubmitted+0xe8 [minkernel\wdf\framework\shared\core\fxrequestbase.cpp @ 530]
fffff801`2c0735f0 fffff801`27ea1ad6 : ffffac08`685e1a50 ffffac08`58b2ca02 ffffac08`58b2ca50 fffff801`2c073719 : Wdf01000!FxIoTarget::_RequestCompletionRoutine+0xe4 [minkernel\wdf\framework\shared\targets\general\fxiotarget.cpp @ 2448]
fffff801`2c073660 fffff801`27ec2fce : ffffac08`58b2ca50 fffff801`2c073719 00000000`00000000 ffffac08`58b2ce83 : nt!IopUnloadSafeCompletion+0x56
fffff801`2c073690 fffff801`27ec2e97 : 00000000`00000001 00000000`00000000 ffffac08`5cfbba30 00000000`00000002 : nt!IopfCompleteRequest+0x11e
fffff801`2c073780 fffff801`2a9b811a : 00000000`00000000 ffffac08`55bad5a0 ffffac08`58b2ca50 fffff801`2c073860 : nt!IofCompleteRequest+0x17
fffff801`2c0737b0 fffff801`2a9b5bbf : ffffac08`5881dc02 ffffac08`696dbb20 ffffac08`58b2ca50 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff801`2c073840 fffff801`351ab91c : 00000000`ffffff02 ffffac08`5881da60 ffffac08`5cfbbe10 ffffac08`5cfbbe10 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffff801`2c0738a0 fffff801`351ab7e1 : ffffac08`5881dc00 00000000`00000009 ffffac08`5881dc90 fffff801`2c073ab8 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc8
fffff801`2c073900 fffff801`351ab5d0 : 00000000`00000004 fffff801`2c073a70 00000000`00000000 ffffac08`5bcd1a60 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd
fffff801`2c0739b0 fffff801`351a6570 : 00000000`00000004 fffff801`2c073a88 00000000`00000008 fffff801`2c073a90 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffff801`2c0739e0 fffff801`351a60a5 : 00000000`00000780 000053f7`aa450f00 ffffac08`570c8e60 ffffac08`62fcbd10 : USBXHCI!Endpoint_TransferEventHandler+0xb0
fffff801`2c073a40 fffff801`351a5d7c : ffffac08`4f0f5dd0 ffffac08`4dec8040 000053f7`aa2ab748 ffffac08`4f0f5000 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
fffff801`2c073b40 fffff801`2a9b38f5 : 00000000`00000f44 00000000`00400a02 00000000`00000000 000066ee`24e7f62f : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff801`2c073b70 fffff801`27ee535e : fffff801`23bbc240 ffffac08`4ddca000 fffff801`2c073e70 ffffac08`00000002 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa5 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
fffff801`2c073bb0 fffff801`27ee4644 : fffff801`23bb9180 00000000`00000000 00000000`00000008 00000000`002d9360 : nt!KiExecuteAllDpcs+0x30e
fffff801`2c073d20 fffff801`27ffc255 : 00000000`00000000 fffff801`23bb9180 ffffd301`8367f140 00000000`00000000 : nt!KiRetireDpcList+0x1f4
fffff801`2c073fb0 fffff801`27ffc040 : fffff801`27ff1300 fffff801`27e7448a 00000000`00000000 00000040`00000000 : nt!KxRetireDpcList+0x5
ffffd085`786a0ac0 fffff801`27ffb8f5 : 00000000`00000000 fffff801`27ff6d81 0000022e`7b50dbb0 00000000`0000000f : nt!KiDispatchInterruptContinue
ffffd085`786a0af0 fffff801`27ff6d81 : 0000022e`7b50dbb0 00000000`0000000f 00000000`00000000 00000000`000008b0 : nt!KiDpcInterruptBypass+0x25
ffffd085`786a0b00 00007ffd`92e8152c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
00000040`c1cffab0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`92e8152c


CHKIMG_EXTENSION: !chkimg -lo 50 -d !Wdf01000
fffff8012a9b2487 - Wdf01000!FxRequest::Reuse+a7
[ bf:3f ]
1 error : !Wdf01000 (fffff8012a9b2487)

MODULE_NAME:
memory_corruption

IMAGE_NAME: memory_corruption

MEMORY_CORRUPTOR: ONE_BIT

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup: memory_corruption


Continue reading...
 
Back
Top