Instant Online Crash Analysis, brought to you by OSR Open Systems Resources, Inc. Show DivPrimary Analysis Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com) Online Crash Dump Analysis Service See http://www.osronline.com for more information Windows 8 Kernel Version 17134 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 17134.1.amd64fre.rs4_release.180410-1804 Machine Name: Kernel base = 0xfffff801`9ea8d000 PsLoadedModuleList = 0xfffff801`9ee3b150 Debug session time: Thu Nov 8 06:02:54.981 2018 (UTC - 5:00) System Uptime: 0 days 0:07:54.679 ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* WDF_VIOLATION (10d) The Kernel-Mode Driver Framework was notified that Windows detected an error in a framework-based driver. In general, the dump file will yield additional information about the driver that caused this bug check. Arguments: Arg1: 0000000000000008, An operation occurred on a DMA transaction object while it was not in the correct state. Arg2: 00002c7f466179b8, Reserved. Arg3: 0000000000000005, Reserved. Arg4: ffffd380b99b2e10, Reserved. Debugging Details: ------------------ TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2 BUGCHECK_STR: 0x10D_8 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from fffff80bc65221ca to fffff8019ec36690 STACK_TEXT: fffff801`a0c63af8 fffff80b`c65221ca : 00000000`0000010d 00000000`00000008 00002c7f`466179b8 00000000`00000005 : nt!KeBugCheckEx fffff801`a0c63b00 fffff80b`c650d0bb : ffffd380`b99e8640 ffffd380`b99e9cca ffffd380`b99e9e08 fffff801`9eb5a35a : Wdf01000!FxVerifierBugCheckWorker+0x1e fffff801`a0c63b40 fffff80b`c6507979 : fffff801`a0c63c28 ffffd380`b99e9cca fffff801`a0c63c28 ffffd380`b99e9e08 : Wdf01000!FxDmaTransactionBase::DmaCompleted+0xbb fffff801`a0c63bc0 fffff80b`c8ea46a4 : ffffd380`b99e8640 ffffd380`b99e9cc0 00000000`000000ff ffffd380`b99e9cc0 : Wdf01000!imp_WdfDmaTransactionDmaCompleted+0x49 fffff801`a0c63bf0 ffffd380`b99e8640 : ffffd380`b99e9cc0 00000000`000000ff ffffd380`b99e9cc0 ffffd380`b99e9df8 : IGLx+0x46a4 fffff801`a0c63bf8 ffffd380`b99e9cc0 : 00000000`000000ff ffffd380`b99e9cc0 ffffd380`b99e9df8 fffff80b`c64ee07e : 0xffffd380`b99e8640 fffff801`a0c63c00 00000000`000000ff : ffffd380`b99e9cc0 ffffd380`b99e9df8 fffff80b`c64ee07e 00002c7f`46616338 : 0xffffd380`b99e9cc0 fffff801`a0c63c08 ffffd380`b99e9cc0 : ffffd380`b99e9df8 fffff80b`c64ee07e 00002c7f`46616338 ffffd380`00000102 : 0xff fffff801`a0c63c10 ffffd380`b99e9df8 : fffff80b`c64ee07e 00002c7f`46616338 ffffd380`00000102 00000000`00000102 : 0xffffd380`b99e9cc0 fffff801`a0c63c18 fffff80b`c64ee07e : 00002c7f`46616338 ffffd380`00000102 00000000`00000102 fffff801`a0c63e60 : 0xffffd380`b99e9df8 fffff801`a0c63c20 fffff80b`c64e3cfb : 00000000`00000002 00000000`00000000 00000001`1aee5a00 ffffd380`b99e9cc0 : Wdf01000!FxTimer::TimerHandler+0x4aa96 fffff801`a0c63c60 fffff801`9eb6ad29 : 00000000`00000002 ffffd380`bac635b0 00000001`1aee5a00 fffff801`9ebb073c : Wdf01000!FxTimer::_FxTimerDpcThunk+0x40bcb fffff801`a0c63cb0 fffff801`9eb69c67 : 00000000`0000001e 00000000`00000000 00000000`0031d34b 00000000`00000019 : nt!KiProcessExpiredTimerList+0x159 fffff801`a0c63da0 fffff801`9ec3d5e5 : 00000000`00000000 fffff801`9d5d3180 ffffe98d`83092420 fffff801`9ea63cb0 : nt!KiRetireDpcList+0x4c7 fffff801`a0c63fb0 fffff801`9ec3d3e0 : 00000000`00000000 fffff801`9ea044e6 00000000`00000005 fffff80b`cdc734ad : nt!KxRetireDpcList+0x5 ffffe98d`83092360 fffff801`9ec3cd15 : fffff80b`cdc2cb20 fffff801`9ec384b1 ffffd380`b99d4000 fffff801`9ea63cb0 : nt!KiDispatchInterruptContinue ffffe98d`83092390 fffff801`9ec384b1 : ffffd380`b99d4000 fffff801`9ea63cb0 ffffd380`ba1c4670 ffffd380`ba2bad90 : nt!KiDpcInterruptBypass+0x25 ffffe98d`830923a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1 STACK_COMMAND: kb FOLLOWUP_IP: IGLx+46a4 fffff80b`c8ea46a4 ba02010000 mov edx,102h SYMBOL_STACK_INDEX: 4 SYMBOL_NAME: IGLx+46a4 FOLLOWUP_NAME: MachineOwner MODULE_NAME: IGLx IMAGE_NAME: IGLx.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5719b9d7 FAILURE_BUCKET_ID: X64_0x10D_8_IGLx+46a4 BUCKET_ID: X64_0x10D_8_IGLx+46a4 Followup: MachineOwner --------- This free analysis is provided by OSR Open Systems Resources, Inc. Want a deeper understanding of crash dump analysis? Check out our Windows Kernel Debugging and Crash Dump Analysis Seminar (opens in new tab/window) Show DivCrash Code Links Show DivLoaded Module List Show DivRaw Stack Contents Show DivDump Header Information Show DivStrings