Windows 10 Just wanted to ask if someone could help analyse this crash/BSOD i got todey.

  • Thread starter Thread starter Crash Dump Noob
  • Start date Start date
C

Crash Dump Noob

I think it might have been Utorrent that did something but I am not sure. I also checked the drivers for my internet adapter they seem to be op to date.


This is what I got from the crash dump not sure if this was a one-off accident or if I need to change something or update something.

any help/tips are appreciated.

Microsoft (R) Windows Debugger Version 10.0.19528.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\052420-15109-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff805`7a400000 PsLoadedModuleList = 0xfffff805`7a848170
Debug session time: Sun May 24 14:42:28.404 2020 (UTC + 2:00)
System Uptime: 4 days 4:04:22.910
Loading Kernel Symbols
...............................................................
................................................................
...................................................
Loading User Symbols
Loading unloaded module list
......................................
For analysis of this file, run
!analyze -v
nt!KeBugCheckEx:
fffff805`7a5c2390 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff58b`a19eca50=000000000000000a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80581626cb3, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 9

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on VIKTORSSSD-PC

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 40

Key : Analysis.Memory.CommitPeak.Mb
Value: 81

Key : Analysis.System
Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE: d1

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80581626cb3

READ_ADDRESS: fffff8057a9733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8057a82a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8057a82a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000

BLACKBOXBSD: 1 (
!blackboxbsd)


BLACKBOXNTFS: 1 (
!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: uTorrent.exe

TRAP_FRAME: fffff58ba19ecb90 --
(.trap 0xfffff58ba19ecb90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=00000000000015f2
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80581626cb3 rsp=fffff58ba19ecd20 rbp=ffffdc830c6b2e90
r8=0000000000000040 r9=ffffdc830c469000 r10=0000fffff8058162
r11=ffffb1fbac000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
L1C63x64!DmaFillTpds+0x177:
fffff805`81626cb3 488b08 mov rcx,qword ptr [rax] ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT:
fffff58b`a19eca48 fffff805`7a5d41e9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff58b`a19eca50 fffff805`7a5d0529 : ffffc200`2bf52500 fffff805`7aedd9ba 00000a30`00000002 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff58b`a19ecb90 fffff805`81626cb3 : ffffdc83`27416a00 00000000`00000000 ffffdc83`0c74adc8 fffff805`7a6a8301 : nt!KiPageFault+0x469
fffff58b`a19ecd20 fffff805`81626edb : ffffdc83`00000014 00000000`00000000 ffffdc83`0c6b2e90 fffff58b`a19ece40 : L1C63x64!DmaFillTpds+0x177
fffff58b`a19ecd80 fffff805`7aedbc41 : ffffdc83`0c74adc8 ffffdc83`0c74adb0 ffffdc83`1c2df4c0 ffffdc83`10407bb0 : L1C63x64!DmaProcessSGList+0x9f
fffff58b`a19ecdb0 fffff805`7aedb8d4 : ffffdc83`0c3d9050 ffffdc83`08d90ce0 fffff805`7a400001 ffffdc83`00000000 : hal!HalpAllocateAdapterCallbackV2+0x171
fffff58b`a19ece40 fffff805`7aedb195 : fffff805`7aedbad0 00000000`00000001 ffffdc83`0c3d9050 ffffdc83`1c2dfa30 : hal!HalAllocateAdapterChannelV2+0x148
fffff58b`a19ece90 fffff805`7aed2025 : ffffdc83`0c3d9050 ffffdc83`16903350 ffffdc83`0c6b2d58 00000000`00000014 : hal!HalAllocateAdapterChannel+0x45
fffff58b`a19eced0 fffff805`7de5ed5e : ffffdc83`0817e810 ffffdc83`0c3d9050 fffff805`000000a0 ffffdc83`1c2dfa30 : hal!HalBuildScatterGatherListV2+0x18385
fffff58b`a19ecf60 fffff805`816270e4 : ffffdc83`0c469000 ffffdc83`0c469000 ffffdc83`0c6b2e90 ffffdc83`130bc8d0 : ndis!NdisMAllocateNetBufferSGList+0x11e
fffff58b`a19ed030 fffff805`81627512 : ffffdc83`0c469000 ffffdc83`130bc8d0 ffffdc83`00000000 ffffdc83`0c469a20 : L1C63x64!DmaSendNetBufferList+0x1d0
fffff58b`a19ed110 fffff805`7de5dd8f : 00000000`00000000 ffffdc83`0c3d91a0 fffff805`7de5dc70 00000000`00000000 : L1C63x64!MiniportSendNetBufferLists+0x11e
fffff58b`a19ed150 fffff805`7de5dc7e : ffffdc83`0c7b4a00 ffffdc83`130bc8d0 ffffdc83`00000000 fffff805`7de5dc70 : ndis!ndisMSendNBLToMiniportInternal+0xff
fffff58b`a19ed220 fffff805`7de5ea48 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMSendNBLToMiniport+0xe
fffff58b`a19ed260 fffff805`7de90900 : 00000000`00000000 fffff58b`a19ed329 ffffdc83`0c3d91a0 fffff805`7e3ad333 : ndis!ndisCallSendHandler+0x58
fffff58b`a19ed2b0 fffff805`7de5c13f : 00000000`00000000 ffffdc83`0c3d91a0 ffffdc83`0c7c35f0 00000000`00000000 : ndis!ndisInvokeNextSendHandler+0x194
fffff58b`a19ed380 fffff805`7e3b2a55 : ffffdc83`0c7968a0 ffffdc83`130bc8d0 00007dc9`00000000 6657a8c0`00000000 : ndis!NdisSendNetBufferLists+0x1af
fffff58b`a19ed480 fffff805`7e3b277c : ffffdc83`0c214b90 00000000`00000000 00000000`00000800 00000000`00000000 : tcpip!FlpSendPacketsHelper+0x2b5
fffff58b`a19ed530 fffff805`7e3ca696 : 00000000`00000000 ffffdc83`0c483ea0 ffffdc83`08e6ea28 00000000`00000000 : tcpip!FlSendPackets+0x5c
fffff58b`a19ed560 fffff805`7e3c9aa5 : 00000000`00000004 00000000`00000000 fffff805`7e57e2e0 fffff805`7e3ca060 : tcpip!IppFragmentPackets+0x2b6
fffff58b`a19ed640 fffff805`7e3c9742 : 00000000`00000000 ffffdc83`140d4314 00000000`00000000 00000000`00000014 : tcpip!IppDispatchSendPacketHelper+0xa5
fffff58b`a19ed710 fffff805`7e3c7ecc : 00000000`00000004 00000000`00000004 ffffdc83`08e6eaf8 ffffdc83`08e6ea28 : tcpip!IppPacketizeDatagrams+0x302
fffff58b`a19ed850 fffff805`7e3aaf00 : ffffdc83`08dfda00 00000000`00000000 fffff805`7e57e2e0 ffffdc83`1d8e4010 : tcpip!IppSendDatagramsCommon+0x40c
fffff58b`a19ed9d0 fffff805`7e3a0be0 : 00000000`fbcdfdea 00000000`00000000 00000000`00004569 00000000`00000000 : tcpip!IpNlpSendDatagrams+0x40
fffff58b`a19eda10 fffff805`7e39f6b2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpSendMessagesOnPath+0x1040
fffff58b`a19edeb0 fffff805`7e39f435 : ffffdc83`1f0a2dc0 fffff58b`a19ee470 fffff58b`a19ee360 fffff58b`a19ee360 : tcpip!UdpSendMessages+0x262
fffff58b`a19ee250 fffff805`7a4c00e8 : 00000000`00000000 00000000`00000000 fffff805`7e3dc070 ffffdc83`126bd010 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
fffff58b`a19ee280 fffff805`7a4c005d : fffff805`7e39f420 fffff58b`a19ee360 ffffdc83`08af2640 fffff805`7aa90933 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff58b`a19ee2f0 fffff805`7e3a7593 : ffffdc83`10ec5e78 00000000`00000000 00000000`00000002 fffff805`7f325020 : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff58b`a19ee330 fffff805`7f34602f : ffffdc83`22e8e470 fffff58b`a19eeb80 ffffdc83`182a47e0 fffff58b`a19eeb80 : tcpip!UdpTlProviderSendMessages+0x73
fffff58b`a19ee3b0 fffff805`7f324ef3 : ffffdc83`22e8e470 fffff58b`a19ee6d0 00000000`00000584 00000000`00000000 : afd!AfdFastDatagramSend+0x62f
fffff58b`a19ee520 fffff805`7aab2a2b : 00000000`00000000 00000000`00000000 fffff58b`a19eeb80 00000000`00012023 : afd!AfdFastIoDeviceControl+0x1863
fffff58b`a19ee900 fffff805`7aab22f6 : 00000000`00000410 00000000`0000077c 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x71b
fffff58b`a19eea20 fffff805`7a5d3c18 : 00000000`00000000 fffff805`00000001 00000000`00000000 fffff58b`a19eeb80 : nt!NtDeviceIoControlFile+0x56
fffff58b`a19eea90 00000000`76f51cbc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`02f1f308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76f51cbc


SYMBOL_NAME: L1C63x64!DmaFillTpds+177

MODULE_NAME:
L1C63x64

IMAGE_NAME: L1C63x64.sys

IMAGE_VERSION: 2.1.0.16

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 177

FAILURE_BUCKET_ID: AV_L1C63x64!DmaFillTpds

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {76270725-45a3-0ed5-02d4-c98791835399}

Followup: MachineOwner
---------

0: kd> !blackboxbsd
Stream size mismatch (expected = 176, read = 168)
0: kd> !blackboxntfs

NTFS Blackbox Data

0 Slow I/O Timeout Records Found
0 Oplock Break Timeout Records Found
0: kd> lmvm L1C63x64
Browse full module list
start end module name
fffff805`81620000 fffff805`81642000
L1C63x64 (pdb symbols) C:\ProgramData\Dbg\sym\L1c63x64.pdb\DF9236FBD6744CE8A7D9FF5A931BF7271\L1c63x64.pdb
Loaded symbol image file: L1C63x64.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\L1C63x64.sys\5158FBC522000\L1C63x64.sys
Image path: \SystemRoot\System32\drivers\L1C63x64.sys
Image name: L1C63x64.sys
Browse all global symbols functions data
Timestamp: Mon Apr 1 05:15:17 2013 (5158FBC5)
CheckSum: 0002612D
ImageSize: 00022000
File version: 2.1.0.16
Product version: 2.1.0.16
File flags: 8 (Mask 3F) Private
File OS: 40004 NT Win32
File type: 3.6 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Qualcomm Atheros Co., Ltd.
ProductName: Qualcomm Atheros Ar81xx series PCI-E Gigabit Ethernet Controller
InternalName: L1c63x64.sys
OriginalFilename: L1c63x64.sys
ProductVersion: 2.1.0.16
FileVersion: 2.1.0.16
FileDescription: Qualcomm Atheros Ar81xx series PCI-E Gigabit Ethernet Controller
LegalCopyright: 2001-2012 Qualcomm Atheros Co., Ltd. All Rights Reserved.
0: kd> .trap 0xfffff58ba19ecb90
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=00000000000015f2
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80581626cb3 rsp=fffff58ba19ecd20 rbp=ffffdc830c6b2e90
r8=0000000000000040 r9=ffffdc830c469000 r10=0000fffff8058162
r11=ffffb1fbac000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
L1C63x64!DmaFillTpds+0x177:
fffff805`81626cb3 488b08 mov rcx,qword ptr [rax] ds:00000000`00000000=????????????????
0: kd> .trap 0xfffff58ba19ecb90
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=00000000000015f2
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80581626cb3 rsp=fffff58ba19ecd20 rbp=ffffdc830c6b2e90
r8=0000000000000040 r9=ffffdc830c469000 r10=0000fffff8058162
r11=ffffb1fbac000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
L1C63x64!DmaFillTpds+0x177:
fffff805`81626cb3 488b08 mov rcx,qword ptr [rax] ds:00000000`00000000=????????????????


Continue reading...
 
Back
Top