Windows 10 BSOD - ntkrnlmp.exe

Jul 17, 2018
2
0
10
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000a417162, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8032deaecd0, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 401

BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804

SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME: AB350M-Gaming 3

SYSTEM_SKU: Default string

SYSTEM_VERSION: Default string

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: F23d

BIOS_DATE: 04/17/2018

BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT: AB350M-Gaming 3-CF

BASEBOARD_VERSION: x.x

DUMP_TYPE: 1

BUGCHECK_P1: a417162

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8032deaecd0

READ_ADDRESS: 000000000a417162

CURRENT_IRQL: 2

FAULTING_IP:
nt!MiZeroPhysicalPage+40
fffff803`2deaecd0 450fb67d22 movzx r15d,byte ptr [r13+22h]

CPU_COUNT: 4

CPU_MHZ: da5

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXPNP: 1 (!blackboxpnp)


DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: AV

PROCESS_NAME: s2_mp64_ship.exe

ANALYSIS_SESSION_HOST: KG2143F

ANALYSIS_SESSION_TIME: 07-17-2018 22:05:54.0690

ANALYSIS_VERSION: 10.0.17134.1 amd64fre

TRAP_FRAME: ffff828e9f176f90 -- (.trap 0xffff828e9f176f90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff828e9f177140 rbx=0000000000000000 rcx=ffff828e9f177160
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8032e3d361f rsp=ffff828e9f177120 rbp=ffff828e9f177239
r8=0000000000000000 r9=0000000000000000 r10=fffff8032e369cd0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!PiDmGetObjectConstraintList+0x5b:
fffff803`2e3d361f 6644892e mov word ptr [rsi],r13w ds:00000000`00000000=????
Resetting default scope

LOCK_ADDRESS: fffff8032e1e1600 -- (!locks fffff8032e1e1600)

Resource @ nt!PnpRegistryDeviceResource (0xfffff8032e1e1600) Exclusively owned
Contention Count = 11316
Threads: ffffce0c2edb8680-01<*>
1 total locks

PNP_TRIAGE_DATA:
Lock address : 0xfffff8032e1e1600
Thread Count : 1
Thread address: 0xffffce0c2edb8680
Thread wait : 0x2146dcb

LAST_CONTROL_TRANSFER: from fffff8032dfb5f69 to fffff8032dfa5430

STACK_TEXT:
ffff828e`9f176658 fffff803`2dfb5f69 : 00000000`0000000a 00000000`0a417162 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff828e`9f176660 fffff803`2dfb2be5 : fffff803`2de0d000 00000000`0000005f ffffa90d`e82b5f40 fffff803`2e302bb0 : nt!KiBugCheckDispatch+0x69
ffff828e`9f1767a0 fffff803`2deaecd0 : 00000000`00000200 fffff803`2ce22180 00000000`00000001 fffff803`2e770af2 : nt!KiPageFault+0x425
ffff828e`9f176930 fffff803`2dec0b5c : 00000000`00000001 ffffce0c`0000005c 00000000`00000001 fffffff6`00000000 : nt!MiZeroPhysicalPage+0x40
ffff828e`9f176990 fffff803`2debea80 : 00000000`00000000 ffff828e`9f176c40 ffff828e`9f1771d8 ffff828e`9f176f60 : nt!MiGetPageChain+0x34c
ffff828e`9f176ac0 fffff803`2debe34a : 00000000`00000000 00000000`00000000 ffffffff`ffffffff 00000000`00000000 : nt!MiResolvePrivateZeroFault+0x130
ffff828e`9f176be0 fffff803`2debc17e : fffff803`2e1e6a60 00000000`00000000 00000000`00000000 00000000`00000002 : nt!MiResolveDemandZeroFault+0x20a
ffff828e`9f176cd0 fffff803`2deba42e : 00000001`00000000 00000000`00000002 00000000`c0000016 fffff5fa`fd7ebf58 : nt!MiDispatchFault+0x69e
ffff828e`9f176e20 fffff803`2dfb2ada : 00000000`00000000 ffff828e`9f1771d0 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x21e
ffff828e`9f176f90 fffff803`2e3d361f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x31a
ffff828e`9f177120 fffff803`2e3d35a9 : ffff828e`9f177470 ffffa90d`d0112910 00000000`00000000 00000000`00000000 : nt!PiDmGetObjectConstraintList+0x5b
ffff828e`9f177190 fffff803`2e3d34c5 : 00000000`00000000 00000000`00000000 ffffce0c`2edb8680 fffff803`2deaf544 : nt!PiDmGetCmObjectConstraintListFromCache+0x6d
ffff828e`9f177200 fffff803`2e369e9d : ffffa90d`d0112910 ffff828e`9f177470 00000000`c0000016 fffff803`2e36c296 : nt!PiPnpRtlGetFilteredDeviceInterfaceList+0x95
ffff828e`9f1772a0 fffff803`2e361f31 : 00000000`00002000 fffff803`2de0d000 ffffbe01`10519000 ffff828e`9f177608 : nt!PiPnpRtlCmActionCallback+0x1cd
ffff828e`9f177410 fffff803`2e362637 : 00000000`00000000 ffff828e`00000000 ffff828e`20207050 ffff828e`9f177630 : nt!_CmGetMatchingFilteredDeviceInterfaceList+0xdd
ffff828e`9f177530 fffff803`2e361d83 : fffff80a`3f9a9501 ffff828e`9f177970 00000000`00000000 ffff828e`9f177778 : nt!IopGetDeviceInterfaces+0x26f
ffff828e`9f177700 fffff803`2e36f5a8 : ffffa90d`d880f5b0 fffff803`2e30f502 ffff828e`9f177918 00000000`00000000 : nt!PiCMGetDeviceInterfaceList+0xf7
ffff828e`9f177800 fffff803`2e36f3d3 : ce0c3762`36e0aa95 00000000`00120089 ffff8f3a`955bc7e5 00000000`00000000 : nt!PiCMHandleIoctl+0x1b8
ffff828e`9f177840 fffff803`2e36f36a : 00000000`00008014 00000000`00000000 ffffce0c`337d0080 00000000`00000000 : nt!PiCMFastIoDeviceDispatch+0x53
ffff828e`9f177890 fffff803`2e30ff5b : 00000000`0000005c 00000000`0000004f ffffa90d`d880f5b0 00000000`00000000 : nt!PiDaFastIoDispatch+0x6a
ffff828e`9f1778f0 fffff803`2e3109d6 : ffffce0c`2edb8680 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x39b
ffff828e`9f177a20 fffff803`2dfb5a43 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000084 : nt!NtDeviceIoControlFile+0x56
ffff828e`9f177a90 00007ffb`fc209f94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000060`9037ee08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`fc209f94


THREAD_SHA1_HASH_MOD_FUNC: d7608e5ea3b4e6c741e1477b6b0e60cf6ca8d0f8

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0019eb57dfd2f61226f473c92db6fad58e137c5e

THREAD_SHA1_HASH_MOD: cbd6d858ece2492ed52a5625660f550734be73dc

FOLLOWUP_IP:
nt!MiZeroPhysicalPage+40
fffff803`2deaecd0 450fb67d22 movzx r15d,byte ptr [r13+22h]

FAULT_INSTR_CODE: 7db60f45

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: nt!MiZeroPhysicalPage+40

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP: 5b3f12f4

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: memory_corruption

BUCKET_ID_FUNC_OFFSET: 40

FAILURE_BUCKET_ID: AV_nt!MiZeroPhysicalPage

BUCKET_ID: AV_nt!MiZeroPhysicalPage

PRIMARY_PROBLEM_CLASS: AV_nt!MiZeroPhysicalPage

TARGET_TIME: 2018-07-17T19:45:11.000Z

OSBUILD: 17134

OSSERVICEPACK: 0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2018-07-06 07:57:56

BUILDDATESTAMP_STR: 180410-1804

BUILDLAB_STR: rs4_release

BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804

ANALYSIS_SESSION_ELAPSED_TIME: 1a4f

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:av_nt!mizerophysicalpage

FAILURE_ID_HASH: {830d9ba1-5b55-aca7-94fa-65b6da5d536b}

Followup: MachineOwner
---------

0: kd> lmvm nt
Browse full module list
start end module name
fffff803`2de0d000 fffff803`2e76e000 nt (pdb symbols) c:\temp\ntkrnlmp.pdb\311A83B581114CD0BEB21F065438BFAA1\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Timestamp: Thu Jul 5 23:57:56 2018 (5B3F12F4)
CheckSum: 008C6682
ImageSize: 00961000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:

______________________________________________________________________

I don't really know what I'm doing, any help would be really appreciated my dudes

thanks
 
Solution
Call of Duty crashed blaming New Technology operating system kernel multi processor,,, thats what happened, it doesn't tell us why.

IRQ errors can be drivers or ram.

Do you have Gigabyte App Center installed? If not, go to here - link - and download/run it, it will check you have latest drivers for motherboard

Can you follow option one on the following link - here
and then do this step below: Small memory dumps - Have Windows Create a Small Memory Dump (Minidump) on BSOD

that creates a file in c windows/minidump after the next BSOD
copy that file to documents
upload the copy from documents to a cloud server and share the link here and someone with right software to read them will help you fix it :)

Colif

Win 11 Master
Moderator
Call of Duty crashed blaming New Technology operating system kernel multi processor,,, thats what happened, it doesn't tell us why.

IRQ errors can be drivers or ram.

Do you have Gigabyte App Center installed? If not, go to here - link - and download/run it, it will check you have latest drivers for motherboard

Can you follow option one on the following link - here
and then do this step below: Small memory dumps - Have Windows Create a Small Memory Dump (Minidump) on BSOD

that creates a file in c windows/minidump after the next BSOD
copy that file to documents
upload the copy from documents to a cloud server and share the link here and someone with right software to read them will help you fix it :)
 
Solution

Colif

Win 11 Master
Moderator
COD wasn't the cause, it was just what crashed. When you get another BSOD, just post the resulting mini dump in here and I see what we can find.

If you ran the Gigabyte app and it found drivers, its possible they fixed it already.