Systems Crash with Error: NMI_HARDWARE_FAILURE

K

kokoto

Hi, Please help with the analysis of this Dump report and also provide a solution to the error report. thank you.

This crash has occurred several times, the hardware vendor updated firmware, re installed RAID drivers, we still get the same error. please advise.

Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
Copyright (c) Microsoft Corporation. All rights reserved.




Loading Dump File [C:\Users\CPSITJO\Documents\dmp\MEMORY.DMP]
Kernel Bitmap Dump File: Full address space is available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 14393 MP (16 procs) Free x64
Product: Server, suite: TerminalServer SingleUserTS
Built by: 14393.3085.amd64fre.rs1_release.190703-1816
Machine Name:
Kernel base = 0xfffff800`2ae12000 PsLoadedModuleList = 0xfffff800`2b115040
Debug session time: Wed Aug 28 19:59:05.362 2019 (UTC + 3:00)
System Uptime: 0 days 8:39:06.335
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
....................................
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 80, {4f4454, 0, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt!WheaReportHwError+258 )
Followup: MachineOwner
---------
12: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NMI_HARDWARE_FAILURE (80)
This is typically due to a hardware malfunction. The hardware supplier should
be called.
Arguments:
Arg1: 00000000004f4454
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------

DUMP_CLASS: 1
DUMP_QUALIFIER: 402
BUILD_VERSION_STRING: 14393.3085.amd64fre.rs1_release.190703-1816
SYSTEM_MANUFACTURER: Lenovo
SYSTEM_PRODUCT_NAME: ThinkSystem SR630 -[7X02CTO1WW]-
SYSTEM_SKU: 7X02CTO1WW
SYSTEM_VERSION: 07
BIOS_VENDOR: Lenovo
BIOS_VERSION: -[IVE142E-2.30]-
BIOS_DATE: 07/02/2019
BASEBOARD_MANUFACTURER: Lenovo
BASEBOARD_PRODUCT: -[7X02CTO1WW]-
BASEBOARD_VERSION: none
DUMP_TYPE: 0
BUGCHECK_P1: 4f4454
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
CPU_COUNT: 10
CPU_MHZ: 82f
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 55
CPU_STEPPING: 4
CPU_MICROCODE: 6,55,4,0 (F,M,S,R) SIG: 200005E'00000000 (cache) 200005E'00000000 (init)
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x80
PROCESS_NAME: svchost.exe
CURRENT_IRQL: f
ANALYSIS_SESSION_HOST: CPS-IT-001-JO
ANALYSIS_SESSION_TIME: 09-03-2019 08:46:00.0208
ANALYSIS_VERSION: 10.0.14321.1024 x86fre
EXCEPTION_RECORD: 0000000000030000 -- (.exr 0x30000)
Cannot read Exception record @ 0000000000030000
LAST_CONTROL_TRANSFER: from fffff8002b665aae to fffff8002af6eb70
STACK_TEXT:
ffff8580`6c2e6be8 fffff800`2b665aae : 00000000`00000080 00000000`004f4454 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffff8580`6c2e6bf0 fffff800`2b03d97c : ffffa78b`d59ef968 fffff800`2b67ddf0 fffff800`2b67ddf0 00000000`00000001 : hal!HalBugCheckSystem+0x7e
ffff8580`6c2e6c30 fffff800`2b666a7e : fffff800`000006c0 fffff800`2b1cc62c ffff8580`6c2e6d10 fffff800`2ae1dc88 : nt!WheaReportHwError+0x258
ffff8580`6c2e6c90 fffff800`2ae1d5a6 : ffff8580`6c2d0180 00000000`00000000 00000000`00000000 fffff800`2ae1da58 : hal!HalHandleNMI+0xfe
ffff8580`6c2e6cc0 fffff800`2af79542 : ffff8580`6c2d0180 ffff8580`6c2e6ed0 00000000`00000000 00000000`00000000 : nt!KiProcessNMI+0x106
ffff8580`6c2e6d10 fffff800`2af79343 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxNmiInterrupt+0x82
ffff8580`6c2e6e50 fffff800`2afe3353 : 00000000`00000001 ffff8580`6c2d0180 00000000`00000282 fffff800`2b6324e5 : nt!KiNmiInterrupt+0x1c3
ffff8580`6c31bf20 fffff800`2ae6fc0d : ffff8580`6c901500 00000000`00000000 ffff8580`6c2d0180 00000000`00000000 : nt!KiAcquireSpinLockInstrumented+0x5b
ffff8580`6c31bf70 fffff800`2af70128 : ffff8580`70c8f4c0 00000000`00000020 00007ff8`59ac0000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xed
ffff8580`6c31bfb0 fffff800`2af703b7 : ffffa78b`d7c68080 00000000`00000000 00000286`a17fca10 000000d5`1617edd8 : nt!KiInterruptSubDispatch+0x108
ffff8580`70c8f440 00007ff8`59aef140 : 00000000`00030000 00007ff8`54df23a2 00000286`a16533b0 00000286`00000000 : nt!KiInterruptDispatch+0x37
000000d5`1617ee10 00007ff8`59aede98 : 00000000`00000070 2f3fe22b`00000000 00000000`00000018 11c91ceb`00000000 : ntdll!RtlpLowFragHeapAllocFromContext+0xf0
000000d5`1617eee0 00007ff8`57cbf1cc : 00000286`00000000 00000000`00000000 00000286`a16533b0 00007ff8`57d70000 : ntdll!RtlpAllocateHeapInternal+0xf8
000000d5`1617f030 00007ff8`57cbee27 : 00000286`a0c64ef0 00000000`00000001 00000286`a0d18860 00000000`00000001 : RPCRT4!I_RpcAllocate+0x3c
000000d5`1617f080 00007ff8`57d767fe : 00000286`a0c64ef0 00000286`a0d18860 00000000`00000001 00000286`a0c64f60 : RPCRT4!NdrFullPointerXlatInit+0x27
000000d5`1617f0b0 00007ff8`57cfa064 : 00000286`a1690003 00000000`00000000 00000000`00000000 00000000`00000007 : RPCRT4!Ndr64AsyncServerWorker+0x1de
000000d5`1617f1d0 00007ff8`57cf8f7d : 00000286`a169c6f0 00000286`a0ba0000 000000d5`1617f3b0 00000286`a0c3e670 : RPCRT4!DispatchToStubInCNoAvrf+0x24
000000d5`1617f220 00007ff8`57cf982b : 00000000`00000000 abababab`dededede 00000000`00000000 00000000`00000000 : RPCRT4!RPC_INTERFACE::DispatchToStubWorker+0x1bd
000000d5`1617f2f0 00007ff8`57cd98fc : 000000d5`1617f490 00000286`a0d18860 00000000`00000001 00007ff8`57cf84fd : RPCRT4!RPC_INTERFACE::DispatchToStub+0xcb
000000d5`1617f350 00007ff8`57cd9d7c : 00000000`0002dbf1 00000286`a17fca10 000000d5`1617f4f9 00000286`a1785000 : RPCRT4!LRPC_SCALL::DispatchRequest+0x34c
000000d5`1617f430 00007ff8`57cf413c : 0e62e716`00000000 00000286`a0d0a940 00000000`00000000 00000000`00000000 : RPCRT4!LRPC_SCALL::HandleRequest+0x2bc
000000d5`1617f550 00007ff8`57cf599b : 00000286`a0c41310 00000286`a0c41310 00000286`00000001 00000000`00000001 : RPCRT4!LRPC_ADDRESS::HandleRequest+0x36c
000000d5`1617f600 00007ff8`57ce864a : 00000000`0000000f 000000d5`1617faa8 ffffffff`ffffffff 00007ff8`57d90f84 : RPCRT4!LRPC_ADDRESS::processIO+0x91b
000000d5`1617f740 00007ff8`59ae864e : 00000286`a0d18860 00007ff8`57cbc31d 00000000`7ffe03b0 00000286`a0c440f8 : RPCRT4!LrpcIoComplete+0xaa
000000d5`1617f7e0 00007ff8`59ae9fb9 : 00000000`00000010 00000286`a0c3b800 00000286`a196a260 00000000`00000000 : ntdll!TppAlpcpExecuteCallback+0x25e
000000d5`1617f890 00007ff8`578d84d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!TppWorkerThread+0x8d9
000000d5`1617fc90 00007ff8`59b2e851 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : KERNEL32!BaseThreadInitThunk+0x14
000000d5`1617fcc0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21

STACK_COMMAND: kb
THREAD_SHA1_HASH_MOD_FUNC: cacbafe8e592091873b6d18479086691386cb327
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6e076c1a28b01ee169bbb30bff9f028cea11fece
THREAD_SHA1_HASH_MOD: 41775a356eb031734e5ea196f7779287f36ba4c6
FOLLOWUP_IP:
nt!WheaReportHwError+258
fffff800`2b03d97c eb70 jmp nt!WheaReportHwError+0x2ca (fffff800`2b03d9ee)
FAULT_INSTR_CODE: 418d70eb
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!WheaReportHwError+258
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5d1d7d1e
BUCKET_ID_FUNC_OFFSET: 258
FAILURE_BUCKET_ID: 0x80_nt!WheaReportHwError
BUCKET_ID: 0x80_nt!WheaReportHwError
PRIMARY_PROBLEM_CLASS: 0x80_nt!WheaReportHwError
TARGET_TIME: 2019-08-28T16:59:05.000Z
OSBUILD: 14393
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 3
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 Server TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-07-04 07:14:22
BUILDDATESTAMP_STR: 190703-1816
BUILDLAB_STR: rs1_release
BUILDOSVER_STR: 10.0.14393.3085.amd64fre.rs1_release.190703-1816
ANALYSIS_SESSION_ELAPSED_TIME: 1d4b
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x80_nt!wheareporthwerror
FAILURE_ID_HASH: {d5f8e3c5-00d9-a505-9cff-8d968ebc3f39}
Followup: MachineOwner
---------
12: kd> !running -ti
System Processors: (000000000000ffff)
Idle Processors: (000000000000efff)
Prcbs Current (pri) Next (pri) Idle
0 fffff8002b152180 fffff8002b1ce940 ( 0) fffff8002b1ce940 ................
# Child-SP RetAddr Call Site
00 fffff800`2ce1b158 fffff804`3719659a intelppm!C1Halt+0x2
01 fffff800`2ce1b160 fffff804`37191323 intelppm!C1Idle+0x1a
02 fffff800`2ce1b190 fffff800`2aebc20c intelppm!AcpiCStateIdleExecute+0x23
03 fffff800`2ce1b1c0 fffff800`2aebb39a nt!PpmIdleExecuteTransition+0xcbc
04 fffff800`2ce1b440 fffff800`2af7219c nt!PoIdle+0x33a
05 fffff800`2ce1b5a0 00000000`00000000 nt!KiIdleLoop+0x2c
1 ffff85806bbc0180 ffff85806bbd7000 ( 0) ffff85806bbd7000 ................
# Child-SP RetAddr Call Site
00 ffff8580`6bbe7158 fffff804`3719659a intelppm!C1Halt+0x2
01 ffff8580`6bbe7160 fffff804`37191323 intelppm!C1Idle+0x1a
02 ffff8580`6bbe7190 fffff800`2aebc20c intelppm!AcpiCStateIdleExecute+0x23
03 ffff8580`6bbe71c0 fffff800`2aebb39a nt!PpmIdleExecuteTransition+0xcbc
04 ffff8580`6bbe7440 fffff800`2af7219c nt!PoIdle+0x33a
05 ffff8580`6bbe75a0 00000000`00000000 nt!KiIdleLoop+0x2c
2 ffff85806bc40180 ffff85806bc57000 ( 0) ffff85806bc57000 ................
# Child-SP RetAddr Call Site
00 ffff8580`6bc7c158 fffff804`3719659a intelppm!C1Halt+0x2
01 ffff8580`6bc7c160 fffff804`37191323 intelppm!C1Idle+0x1a
02 ffff8580`6bc7c190 fffff800`2aebc20c intelppm!AcpiCStateIdleExecute+0x23
03 ffff8580`6bc7c1c0 fffff800`2aebb39a nt!PpmIdleExecuteTransition+0xcbc
04 ffff8580`6bc7c440 fffff800`2af7219c nt!PoIdle+0x33a
05 ffff8580`6bc7c5a0 00000000`00000000 nt!KiIdleLoop+0x2c
3 ffff85806bc8a180 ffff85806bca1000 ( 0) ffff85806bca1000 ................
# Child-SP RetAddr Call Site
00 ffff8580`6bcb1158 fffff804`3719659a intelppm!C1Halt+0x2
01 ffff8580`6bcb1160 fffff804`37191323 intelppm!C1Idle+0x1a
02 ffff8580`6bcb1190 fffff800`2aebc20c intelppm!AcpiCStateIdleExecute+0x23
03 ffff8580`6bcb11c0 fffff800`2aebb39a nt!PpmIdleExecuteTransition+0xcbc
04 ffff8580`6bcb1440 fffff800`2af7219c nt!PoIdle+0x33a
05 ffff8580`6bcb15a0 00000000`00000000 nt!KiIdleLoop+0x2c
4 ffff85806bea4180 ffff85806bebb000 ( 0) ffff85806bebb000 ................
# Child-SP RetAddr Call Site
00 ffff8580`6bedffc0 fffff804`37192a12 nt!KiIsrLinkage+0x58
01 ffff8580`6bee0158 fffff804`3719659a intelppm!C1Halt+0x2
02 ffff8580`6bee0160 fffff804`37191323 intelppm!C1Idle+0x1a
03 ffff8580`6bee0190 fffff800`2aebc20c intelppm!AcpiCStateIdleExecute+0x23
04 ffff8580`6bee01c0 fffff800`2aebb39a nt!PpmIdleExecuteTransition+0xcbc
05 ffff8580`6bee0440 fffff800`2af7219c nt!PoIdle+0x33a
06 ffff8580`6bee05a0 00000000`00000000 nt!KiIdleLoop+0x2c
5 ffff85806bf40180 ffff85806bf57000 ( 0) ffff85806bf57000 ................
# Child-SP RetAddr Call Site
00 ffff8580`6bf3b158 fffff804`3719659a intelppm!C1Halt+0x2
01 ffff8580`6bf3b160 fffff804`37191323 intelppm!C1Idle+0x1a
02 ffff8580`6bf3b190 fffff800`2aebc20c intelppm!AcpiCStateIdleExecute+0x23
03 ffff8580`6bf3b1c0 fffff800`2aebb39a nt!PpmIdleExecuteTransition+0xcbc
04 ffff8580`6bf3b440 fffff800`2af7219c nt!PoIdle+0x33a
05 ffff8580`6bf3b5a0 00000000`00000000 nt!KiIdleLoop+0x2c
6 ffff85806bfc5180 ffff85806bfdc000 ( 0) ffff85806bfdc000 ................
# Child-SP RetAddr Call Site
00 ffff8580`6b992158 fffff804`3719659a intelppm!C1Halt+0x2
01 ffff8580`6b992160 fffff804`37191323 intelppm!C1Idle+0x1a
02 ffff8580`6b992190 fffff800`2aebc20c intelppm!AcpiCStateIdleExecute+0x23
03 ffff8580`6b9921c0 fffff800`2aebb39a nt!PpmIdleExecuteTransition+0xcbc
04 ffff8580`6b992440 fffff800`2af7219c nt!PoIdle+0x33a
05 ffff8580`6b9925a0 00000000`00000000 nt!KiIdleLoop+0x2c
7 ffff85806bb5c180 ffff85806bb73000 ( 0) ffff85806bb73000 ................
# Child-SP RetAddr Call Site
00 ffff8580`6c05c158 fffff804`3719659a intelppm!C1Halt+0x2
01 ffff8580`6c05c160 fffff804`37191323 intelppm!C1Idle+0x1a
02 ffff8580`6c05c190 fffff800`2aebc20c intelppm!AcpiCStateIdleExecute+0x23
03 ffff8580`6c05c1c0 fffff800`2aebb39a nt!PpmIdleExecuteTransition+0xcbc
04 ffff8580`6c05c440 fffff800`2af7219c nt!PoIdle+0x33a
05 ffff8580`6c05c5a0 00000000`00000000 nt!KiIdleLoop+0x2c
8 ffff85806c0c0180 ffff85806c0d7000 ( 0) ffff85806c0d7000 ................
# Child-SP RetAddr Call Site
00 ffff8580`6c0b7158 fffff804`3719659a intelppm!C1Halt+0x2
01 ffff8580`6c0b7160 fffff804`37191323 intelppm!C1Idle+0x1a
02 ffff8580`6c0b7190 fffff800`2aebc20c intelppm!AcpiCStateIdleExecute+0x23
03 ffff8580`6c0b71c0 fffff800`2aebb39a nt!PpmIdleExecuteTransition+0xcbc
04 ffff8580`6c0b7440 fffff800`2af7219c nt!PoIdle+0x33a
05 ffff8580`6c0b75a0 00000000`00000000 nt!KiIdleLoop+0x2c
9 ffff85806c141180 ffff85806c158000 ( 0) ffff85806c158000 ................
# Child-SP RetAddr Call Site
00 ffff8580`6c17d158 fffff804`3719659a intelppm!C1Halt+0x2
01 ffff8580`6c17d160 fffff804`37191323 intelppm!C1Idle+0x1a
02 ffff8580`6c17d190 fffff800`2aebc20c intelppm!AcpiCStateIdleExecute+0x23
03 ffff8580`6c17d1c0 fffff800`2aebb39a nt!PpmIdleExecuteTransition+0xcbc
04 ffff8580`6c17d440 fffff800`2af7219c nt!PoIdle+0x33a
05 ffff8580`6c17d5a0 00000000`00000000 nt!KiIdleLoop+0x2c
10 ffff85806c1d2180 ffff85806c1e9000 ( 0) ffff85806c1e9000 ................
# Child-SP RetAddr Call Site
00 ffff8580`6c1f9158 fffff804`3719659a intelppm!C1Halt+0x2
01 ffff8580`6c1f9160 fffff804`37191323 intelppm!C1Idle+0x1a
02 ffff8580`6c1f9190 fffff800`2aebc20c intelppm!AcpiCStateIdleExecute+0x23
03 ffff8580`6c1f91c0 fffff800`2aebb39a nt!PpmIdleExecuteTransition+0xcbc
04 ffff8580`6c1f9440 fffff800`2af7219c nt!PoIdle+0x33a
05 ffff8580`6c1f95a0 00000000`00000000 nt!KiIdleLoop+0x2c
11 ffff85806c240180 ffff85806c257000 ( 0) ffff85806c257000 ................
# Child-SP RetAddr Call Site
00 ffff8580`6c27c158 fffff804`3719659a intelppm!C1Halt+0x2
01 ffff8580`6c27c160 fffff804`37191323 intelppm!C1Idle+0x1a
02 ffff8580`6c27c190 fffff800`2aebc20c intelppm!AcpiCStateIdleExecute+0x23
03 ffff8580`6c27c1c0 fffff800`2aebb39a nt!PpmIdleExecuteTransition+0xcbc
04 ffff8580`6c27c440 fffff800`2af7219c nt!PoIdle+0x33a
05 ffff8580`6c27c5a0 00000000`00000000 nt!KiIdleLoop+0x2c
12 ffff85806c2d0180 ffffa78bd7c68080 ( 9) ffff85806c2e7000 ................
# Child-SP RetAddr Call Site
00 ffff8580`6c2e6be8 fffff800`2b665aae nt!KeBugCheckEx
01 ffff8580`6c2e6bf0 fffff800`2b03d97c hal!HalBugCheckSystem+0x7e
02 ffff8580`6c2e6c30 fffff800`2b666a7e nt!WheaReportHwError+0x258
03 ffff8580`6c2e6c90 fffff800`2ae1d5a6 hal!HalHandleNMI+0xfe
04 ffff8580`6c2e6cc0 fffff800`2af79542 nt!KiProcessNMI+0x106
05 ffff8580`6c2e6d10 fffff800`2af79343 nt!KxNmiInterrupt+0x82
06 ffff8580`6c2e6e50 fffff800`2afe3353 nt!KiNmiInterrupt+0x1c3
07 ffff8580`6c31bf20 fffff800`2ae6fc0d nt!KiAcquireSpinLockInstrumented+0x5b
08 ffff8580`6c31bf70 fffff800`2af70128 nt!KiCallInterruptServiceRoutine+0xed
09 ffff8580`6c31bfb0 fffff800`2af703b7 nt!KiInterruptSubDispatch+0x108
0a ffff8580`70c8f440 00007ff8`59aef140 nt!KiInterruptDispatch+0x37
0b 000000d5`1617ee10 00007ff8`59aede98 ntdll!RtlpLowFragHeapAllocFromContext+0xf0
0c 000000d5`1617eee0 00007ff8`57cbf1cc ntdll!RtlpAllocateHeapInternal+0xf8
0d 000000d5`1617f030 00007ff8`57cbee27 RPCRT4!I_RpcAllocate+0x3c
0e 000000d5`1617f080 00007ff8`57d767fe RPCRT4!NdrFullPointerXlatInit+0x27
0f 000000d5`1617f0b0 00007ff8`57cfa064 RPCRT4!Ndr64AsyncServerWorker+0x1de
10 000000d5`1617f1d0 00007ff8`57cf8f7d RPCRT4!DispatchToStubInCNoAvrf+0x24
11 000000d5`1617f220 00007ff8`57cf982b RPCRT4!RPC_INTERFACE::DispatchToStubWorker+0x1bd
12 000000d5`1617f2f0 00007ff8`57cd98fc RPCRT4!RPC_INTERFACE::DispatchToStub+0xcb
13 000000d5`1617f350 00007ff8`57cd9d7c RPCRT4!LRPC_SCALL::DispatchRequest+0x34c
14 000000d5`1617f430 00007ff8`57cf413c RPCRT4!LRPC_SCALL::HandleRequest+0x2bc
15 000000d5`1617f550 00007ff8`57cf599b RPCRT4!LRPC_ADDRESS::HandleRequest+0x36c
16 000000d5`1617f600 00007ff8`57ce864a RPCRT4!LRPC_ADDRESS::processIO+0x91b
17 000000d5`1617f740 00007ff8`59ae864e RPCRT4!LrpcIoComplete+0xaa
18 000000d5`1617f7e0 00007ff8`59ae9fb9 ntdll!TppAlpcpExecuteCallback+0x25e
19 000000d5`1617f890 00007ff8`578d84d4 ntdll!TppWorkerThread+0x8d9
1a 000000d5`1617fc90 00007ff8`59b2e851 KERNEL32!BaseThreadInitThunk+0x14
1b 000000d5`1617fcc0 00000000`00000000 ntdll!RtlUserThreadStart+0x21
13 ffff85806c380180 ffff85806c397000 ( 0) ffff85806c397000 ................
# Child-SP RetAddr Call Site
00 ffff8580`6c33d158 fffff804`3719659a intelppm!C1Halt+0x2
01 ffff8580`6c33d160 fffff804`37191323 intelppm!C1Idle+0x1a
02 ffff8580`6c33d190 fffff800`2aebc20c intelppm!AcpiCStateIdleExecute+0x23
03 ffff8580`6c33d1c0 fffff800`2aebb39a nt!PpmIdleExecuteTransition+0xcbc
04 ffff8580`6c33d440 fffff800`2af7219c nt!PoIdle+0x33a
05 ffff8580`6c33d5a0 00000000`00000000 nt!KiIdleLoop+0x2c
14 ffff85806c400180 ffff85806c417000 ( 0) ffff85806c417000 ................
# Child-SP RetAddr Call Site
00 ffff8580`6c3f9158 fffff804`3719659a intelppm!C1Halt+0x2
01 ffff8580`6c3f9160 fffff804`37191323 intelppm!C1Idle+0x1a
02 ffff8580`6c3f9190 fffff800`2aebc20c intelppm!AcpiCStateIdleExecute+0x23
03 ffff8580`6c3f91c0 fffff800`2aebb39a nt!PpmIdleExecuteTransition+0xcbc
04 ffff8580`6c3f9440 fffff800`2af7219c nt!PoIdle+0x33a
05 ffff8580`6c3f95a0 00000000`00000000 nt!KiIdleLoop+0x2c
15 ffff85806c484180 ffff85806c49b000 ( 0) ffff85806c49b000 ................
# Child-SP RetAddr Call Site
00 ffff8580`6c4c0158 fffff804`3719659a intelppm!C1Halt+0x2
01 ffff8580`6c4c0160 fffff804`37191323 intelppm!C1Idle+0x1a
02 ffff8580`6c4c0190 fffff800`2aebc20c intelppm!AcpiCStateIdleExecute+0x23
03 ffff8580`6c4c01c0 fffff800`2aebb39a nt!PpmIdleExecuteTransition+0xcbc
04 ffff8580`6c4c0440 fffff800`2af7219c nt!PoIdle+0x33a
05 ffff8580`6c4c05a0 00000000`00000000 nt!KiIdleLoop+0x2c
12: kd> .restart /f
Loading Dump File [C:\Users\CPSITJO\Documents\dmp\MEMORY.DMP]
Kernel Bitmap Dump File: Full address space is available

************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 14393 MP (16 procs) Free x64
Product: Server, suite: TerminalServer SingleUserTS
Built by: 14393.3085.amd64fre.rs1_release.190703-1816
Machine Name:
Kernel base = 0xfffff800`2ae12000 PsLoadedModuleList = 0xfffff800`2b115040
Debug session time: Wed Aug 28 19:59:05.362 2019 (UTC + 3:00)
System Uptime: 0 days 8:39:06.335
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
....................................
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 80, {4f4454, 0, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt!WheaReportHwError+258 )
Followup: MachineOwner
---------

Continue reading...
 

Similar threads

H
Replies
0
Views
360
Hammad_Awan
H
A
Replies
0
Views
356
Aleksander Kalicki
A
Replies
0
Views
384
권오생
M
Replies
0
Views
397
Manjunath_bn
M
Back
Top Bottom