L
LucasRZ1
Guest
Hi,
I get a blue screen eveytime I try to play some Borderlands, caused probably by ntkrnlmp.exe.
- Already reinstalled driver via DDU
Can't solve this, if anyone can help me
Last minidump: 111520-9312-01
C:/Windows/Minidump (via WinDBG)
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\lucas\Desktop\111520-9312-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`49000000 PsLoadedModuleList = 0xfffff801`49c2a3b0
Debug session time: Sun Nov 15 14:24:59.740 2020 (UTC - 3:00)
System Uptime: 0 days 3:39:34.731
Loading Kernel Symbols
...............................................................
................................................................
................................................................
Loading User Symbols
Loading unloaded module list
.............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`493f5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff801`4584a590=000000000000000a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff801492e533e, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8608
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on LUCAS-PC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 82492
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 20
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff801492e533e
WRITE_ADDRESS: fffff80149cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80149c0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80149c0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000020
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8014584a6d0 -- (.trap 0xfffff8014584a6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00001dec3e8d00a5 rbx=0000000000000000 rcx=ffffb18f0b224000
rdx=00001dec00000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801492e533e rsp=fffff8014584a860 rbp=fffff8014584a960
r8=0000000000000000 r9=0000000000000000 r10=ffffb18f172d5f88
r11=fffff8014584ab10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff801`492e533e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope
STACK_TEXT:
fffff801`4584a588 fffff801`49407169 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff801`4584a590 fffff801`49403469 : 00001dec`3e8a8671 00000000`00000001 ffffb18f`17002000 fffff801`53f8a7c7 : nt!KiBugCheckDispatch+0x69
fffff801`4584a6d0 fffff801`492e533e : fffff801`43cc5240 ffffb18f`0b20f000 fffff801`45840400 ffffb18f`00000002 : nt!KiPageFault+0x469
fffff801`4584a860 fffff801`492e4644 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee
fffff801`4584a9d0 fffff801`493f8d7e : 00000000`00000000 fffff801`43cc2180 fffff801`49d27600 ffffb18f`1a886080 : nt!KiRetireDpcList+0x1f4
fffff801`4584ac60 00000000`00000000 : fffff801`4584b000 fffff801`45845000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiExecuteAllDpcs+2ee
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2ee
FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}
Followup: MachineOwner
---------
Continue reading...
I get a blue screen eveytime I try to play some Borderlands, caused probably by ntkrnlmp.exe.
- Already reinstalled driver via DDU
Can't solve this, if anyone can help me
Last minidump: 111520-9312-01
C:/Windows/Minidump (via WinDBG)
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\lucas\Desktop\111520-9312-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`49000000 PsLoadedModuleList = 0xfffff801`49c2a3b0
Debug session time: Sun Nov 15 14:24:59.740 2020 (UTC - 3:00)
System Uptime: 0 days 3:39:34.731
Loading Kernel Symbols
...............................................................
................................................................
................................................................
Loading User Symbols
Loading unloaded module list
.............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`493f5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff801`4584a590=000000000000000a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff801492e533e, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8608
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on LUCAS-PC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 82492
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 20
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff801492e533e
WRITE_ADDRESS: fffff80149cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80149c0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80149c0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000020
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8014584a6d0 -- (.trap 0xfffff8014584a6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00001dec3e8d00a5 rbx=0000000000000000 rcx=ffffb18f0b224000
rdx=00001dec00000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801492e533e rsp=fffff8014584a860 rbp=fffff8014584a960
r8=0000000000000000 r9=0000000000000000 r10=ffffb18f172d5f88
r11=fffff8014584ab10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff801`492e533e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope
STACK_TEXT:
fffff801`4584a588 fffff801`49407169 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff801`4584a590 fffff801`49403469 : 00001dec`3e8a8671 00000000`00000001 ffffb18f`17002000 fffff801`53f8a7c7 : nt!KiBugCheckDispatch+0x69
fffff801`4584a6d0 fffff801`492e533e : fffff801`43cc5240 ffffb18f`0b20f000 fffff801`45840400 ffffb18f`00000002 : nt!KiPageFault+0x469
fffff801`4584a860 fffff801`492e4644 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee
fffff801`4584a9d0 fffff801`493f8d7e : 00000000`00000000 fffff801`43cc2180 fffff801`49d27600 ffffb18f`1a886080 : nt!KiRetireDpcList+0x1f4
fffff801`4584ac60 00000000`00000000 : fffff801`4584b000 fffff801`45845000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiExecuteAllDpcs+2ee
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2ee
FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}
Followup: MachineOwner
---------
Continue reading...