Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\041919-18718-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*
Symbol search path is: SRV*
Executable search path is:
Windows 10 Kernel Version 17134 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 17134.1.amd64fre.rs4_release.180410-1804
Machine Name:
Kernel base = 0xfffff802`52ea8000 PsLoadedModuleList = 0xfffff802`532552b0
Debug session time: Fri Apr 19 18:47:05.683 2019 (UTC + 2:00)
System Uptime: 5 days 21:05:23.503
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000002, fffff80252f774f8, ffffec0042580060, ffffec0042580100}
*** WARNING: Unable to verify timestamp for jnprns.sys
*** ERROR: Module load completed but symbols could not be loaded for jnprns.sys
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : jnprns.sys ( jnprns+12217 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000002, The exception code that was not handled
Arg2: fffff80252f774f8, The address that the exception occurred at
Arg3: ffffec0042580060, Exception Record Address
Arg4: ffffec0042580100, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP ProBook 4540s
SYSTEM_SKU: C5E15ES#AB8
SYSTEM_VERSION: A1009002
BIOS_VENDOR: Hewlett-Packard
BIOS_VERSION: 68IRR Ver. F.67
BIOS_DATE: 05/30/2018
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 17F6
BASEBOARD_VERSION: KBC Version 58.21
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000002
BUGCHECK_P2: fffff80252f774f8
BUGCHECK_P3: ffffec0042580060
BUGCHECK_P4: ffffec0042580100
EXCEPTION_CODE: (NTSTATUS) 0xc0000002 - {Not Implemented} The requested operation is not implemented.
FAULTING_IP:
nt!RtlRaiseStatus+18
fffff802`52f774f8 488b8424b8010000 mov rax,qword ptr [rsp+1B8h]
EXCEPTION_RECORD: ffffec0042580060 -- (.exr 0xffffec0042580060)
ExceptionAddress: fffff80252f774f8 (nt!RtlRaiseStatus+0x0000000000000018)
ExceptionCode: c0000002
ExceptionFlags: 00000001
NumberParameters: 0
CONTEXT: ffffec0042580100 -- (.cxr 0xffffec0042580100)
rax=0000000000000001 rbx=00000000c0000002 rcx=ffff958a00000000
rdx=ffffec0042580450 rsi=ffff958af8c83c28 rdi=ffffec0042580670
rip=fffff80252f774f8 rsp=ffffec0042580040 rbp=0000000000000000
r8=0000000000000002 r9=0000000000000000 r10=ffffec0042580640
r11=ffffec0042580299 r12=0000000000000000 r13=ffff958af78934c0
r14=0000000000000003 r15=ffff958af78934d0
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000282
nt!RtlRaiseStatus+0x18:
fffff802`52f774f8 488b8424b8010000 mov rax,qword ptr [rsp+1B8h] ss:0018:ffffec00`425801f8=fffff80252f774f8
Resetting default scope
CPU_COUNT: 8
CPU_MHZ: 893
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3a
CPU_STEPPING: 9
CPU_MICROCODE: 6,3a,9,0 (F,M,S,R) SIG: 20'00000000 (cache) 20'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
CURRENT_IRQL: 2
ERROR_CODE: (NTSTATUS) 0xc0000002 - {Not Implemented} The requested operation is not implemented.
EXCEPTION_CODE_STR: c0000002
ANALYSIS_SESSION_HOST: MICHAL
ANALYSIS_SESSION_TIME: 04-19-2019 21:46:04.0334
ANALYSIS_VERSION: 10.0.17763.132 amd64fre
LAST_CONTROL_TRANSFER: from fffff80253162ede to fffff80252f774f8
STACK_TEXT:
ffffec00`42580040 fffff802`53162ede : ffff958a`f8c83c28 ffff958a`f8c83c28 ffff958a`f8c83ee0 00000000`00000000 : nt!RtlRaiseStatus+0x18
ffffec00`425805e0 fffff804`ca042217 : ffff958a`fbb415a0 00000000`00000000 00000000`00000002 fffff804`ca0555ac : nt!purecall+0xe
ffffec00`42580610 ffff958a`fbb415a0 : 00000000`00000000 00000000`00000002 fffff804`ca0555ac ffff958a`f8c83ad0 : jnprns+0x12217
ffffec00`42580618 00000000`00000000 : 00000000`00000002 fffff804`ca0555ac ffff958a`f8c83ad0 fffff804`ca04594a : 0xffff958a`fbb415a0
THREAD_SHA1_HASH_MOD_FUNC: 8de8c45802aa0609de5ec804c07bdc3de177e3d5
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 8d19daae8c42de5bb0fd71b81775fd30f040bbf0
THREAD_SHA1_HASH_MOD: faf7af3820cc9fce2e1aeadf1605e542dab8e671
FOLLOWUP_IP:
jnprns+12217
fffff804`ca042217 ?? ???
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: jnprns+12217
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: jnprns
IMAGE_NAME: jnprns.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5452859c
STACK_COMMAND: .cxr 0xffffec0042580100 ; kb
BUCKET_ID_FUNC_OFFSET: 12217
FAILURE_BUCKET_ID: AV_jnprns!unknown_function
BUCKET_ID: AV_jnprns!unknown_function
PRIMARY_PROBLEM_CLASS: AV_jnprns!unknown_function
TARGET_TIME: 2019-04-19T16:47:05.000Z
OSBUILD: 17134
OSSERVICEPACK: 706
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-04-02 09:50:10
BUILDDATESTAMP_STR: 180410-1804
BUILDLAB_STR: rs4_release
BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804
ANALYSIS_SESSION_ELAPSED_TIME: 3fcd
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_jnprns!unknown_function
FAILURE_ID_HASH: {9ed7adcf-c04d-7954-5a67-be64dfa4fc67}
Followup: MachineOwner
---------
0: kd> lmvm jnprns
Browse full module list
start end module name
fffff804`ca030000 fffff804`ca0b6000 jnprns T (no symbols)
Loaded symbol image file: jnprns.sys
Image path: \SystemRoot\system32\DRIVERS\jnprns.sys
Image name: jnprns.sys
Browse all global symbols functions data
Timestamp: Thu Oct 30 10:38:20 2014 (5452859C)
CheckSum: 00084241
ImageSize: 00086000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
0: kd> .load pde
=========================================================================================
PDE v11.3 - Copyright 2017 Andrew Richards
=========================================================================================
0: kd> !dpx
Start memory scan : 0xffffec004257f868 ($csp)
End memory scan : 0xffffec0042581000 (Kernel Stack Base)
rsp : 0xffffec004257f868 : 0xfffff80253069456 : nt!PspSystemThreadStartup$filt$0+0x44
r14 : 0xffffec004257f9f0 : 0xfffff80252fd82d7 : nt!PspSystemThreadStartup+0x47
0xffffec004257f868 : 0xfffff80253069456 : nt!PspSystemThreadStartup$filt$0+0x44
0xffffec004257f880 : 0xfffff80252f774f8 : nt!RtlRaiseStatus+0x18
0xffffec004257f8a8 : 0xfffff8025302ed5f : nt!_C_specific_handler+0x9f
0xffffec004257f8d8 : 0xfffff804c82095dd : FLTMGR!FltpGetStreamListCtrl+0x4d
0xffffec004257f8f8 : 0xfffff802532a5eb4 : "nt!Ports <PERF> (nt+0x3fdeb4)"
0xffffec004257f900 : 0xfffff802532a5eb4 : "nt!Ports <PERF> (nt+0x3fdeb4)"
0xffffec004257f908 : 0xfffff80252fd82d7 : nt!PspSystemThreadStartup+0x47
0xffffec004257f918 : 0xfffff8025305a94d : nt!RtlpExecuteHandlerForException+0xd
0xffffec004257f940 : 0xffffec004257f9f0 : 0xfffff80252fd82d7 : nt!PspSystemThreadStartup+0x47
0xffffec004257f948 : 0xfffff80252f66b16 : nt!RtlDispatchException+0x416
0xffffec004257f998 : 0xfffff80252ea8000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
0xffffec004257f9f0 : 0xfffff80252fd82d7 : nt!PspSystemThreadStartup+0x47
0xffffec004257f9f8 : 0xfffff80252ea8000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
0xffffec004257fa00 : 0xfffff802532a5eb4 : "nt!Ports <PERF> (nt+0x3fdeb4)"
0xffffec004257fa20 : 0xfffff8025302ecc0 : nt!_C_specific_handler
Unable to load image \SystemRoot\system32\DRIVERS\klif.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for klif.sys
*** ERROR: Module load completed but symbols could not be loaded for klif.sys
0xffffec004257faf8 : 0xffffec004257fb38 : 0xfffff80253059516 : nt!KiStartSystemThread+0x16
0xffffec004257fb20 : 0xfffff804c8228060 : FLTMGR!WPP_GLOBAL_Control
0xffffec004257fb38 : 0xfffff80253059516 : nt!KiStartSystemThread+0x16
0xffffec004257fb68 : 0xfffff804ca14a870 : Ntfs!NtfsExtendedCompleteRequestInternal+0x140
0xffffec004257fba8 : 0xfffff804c9515dec : tcpip!OlmUploadConnections+0x30c
0xffffec004257fc28 : 0xfffff804c82073c6 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x316
0xffffec004257fce8 : 0xffffec004257ff08 : 0xffffec00425800b8 : 0xfffff804ca14ae69 : Ntfs!NtfsMarkUnusedContextPreTrimProcessing+0x39
0xffffec004257fd48 : 0xfffff804ca14ae69 : Ntfs!NtfsMarkUnusedContextPreTrimProcessing+0x39
0xffffec004257fd60 : 0xfffff80253276080 : nt!MiSystemPartition
0xffffec004257fda8 : 0xfffff80252f3c757 : nt!ExAcquirePushLockSharedEx+0xe7
0xffffec004257fde8 : 0xfffff804c8209aa3 : FLTMGR!GetContextFromStreamList+0x163
0xffffec004257fe40 : 0xfffff804c8e66060 : Wof!Providers
0xffffec004257fe68 : 0xfffff80252eb5606 : nt!ExReleaseFastMutexUnsafe+0x26
0xffffec004257fe90 : 0xffffec004257ff28 : 0xfffff80252ea8000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
0xffffec004257fe98 : 0xfffff804c8e6d26c : Wof!WofPostCleanupCallback+0x15c
0xffffec004257fea0 : 0xffffec004257ff28 : 0xfffff80252ea8000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
0xffffec004257fed8 : 0xfffff804c8205d63 : FLTMGR!FltpPerformPostCallbacks+0x383
0xffffec004257ff08 : 0xffffec00425800b8 : 0xfffff804ca14ae69 : Ntfs!NtfsMarkUnusedContextPreTrimProcessing+0x39
0xffffec004257ff18 : 0xfffff80253162ed0 : nt!purecall
*** WARNING: Unable to verify timestamp for jnprns.sys
*** ERROR: Module load completed but symbols could not be loaded for jnprns.sys
0xffffec004257ff28 : 0xfffff80252ea8000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
0xffffec004257ff30 : 0xfffff802532be940 : "nt!Ports <PERF> (nt+0x416940)"
0xffffec004257ff38 : 0xfffff804ca030000 : jnprns
0xffffec004257ff48 : 0xfffff804ca030000 : jnprns
0xffffec004257ff58 : 0xfffff804ca030000 : jnprns
0xffffec004257ff68 : 0xfffff804ca030000 : jnprns
0xffffec004257ff78 : 0xfffff804ca030000 : jnprns
0xffffec004257ff88 : 0xfffff804ca030000 : jnprns
0xffffec004257ff98 : 0xfffff804ca030000 : jnprns
0xffffec004257ffa8 : 0xfffff804c9200000 : "ndis!ndisDataPathExpandStackCallback <PERF> (ndis+0x0)"
0xffffec004257ffb0 : 0xfffff804c92a2498 : "ndis!Microsoft_Windows_Networking_CorrelationTraceActivityPayload <PERF> (ndis+0xa2498)"
0xffffec004257ffb8 : 0xfffff804c9200000 : "ndis!ndisDataPathExpandStackCallback <PERF> (ndis+0x0)"
0xffffec004257ffc0 : 0xfffff804c92a6218 : "ndis!Microsoft_Windows_Networking_CorrelationTraceActivityPayload <PERF> (ndis+0xa6218)"
0xffffec004257ffc8 : 0xfffff804c9200000 : "ndis!ndisDataPathExpandStackCallback <PERF> (ndis+0x0)"
0xffffec004257ffd0 : 0xfffff804c92a248c : "ndis!Microsoft_Windows_Networking_CorrelationTraceActivityPayload <PERF> (ndis+0xa248c)"
0xffffec004257ffd8 : 0xfffff804c9200000 : "ndis!ndisDataPathExpandStackCallback <PERF> (ndis+0x0)"
0xffffec004257ffe0 : 0xfffff804c92a2bf4 : "ndis!Microsoft_Windows_Networking_CorrelationTraceActivityPayload <PERF> (ndis+0xa2bf4)"
0xffffec0042580038 : 0xfffff80252f7752e : nt!RtlRaiseStatus+0x4e
0xffffec0042580048 : 0xfffff80252f43d28 : nt!IopfCompleteRequest+0x718
0xffffec0042580070 : 0xfffff80252f774f8 : nt!RtlRaiseStatus+0x18
0xffffec00425800a8 : 0xfffff80252f3aecd : nt!ExReleaseResourceLite+0xdd
0xffffec00425800b8 : 0xfffff804ca14ae69 : Ntfs!NtfsMarkUnusedContextPreTrimProcessing+0x39
0xffffec0042580148 : 0xfffff804ca14ae69 : Ntfs!NtfsMarkUnusedContextPreTrimProcessing+0x39
0xffffec0042580168 : 0xfffff80252f435f7 : nt!IofCompleteRequest+0x17
0xffffec00425801f8 : 0xfffff80252f774f8 : nt!RtlRaiseStatus+0x18
0xffffec0042580228 : 0xfffff804ca14a870 : Ntfs!NtfsExtendedCompleteRequestInternal+0x140
0xffffec0042580268 : 0xfffff804c9515dec : tcpip!OlmUploadConnections+0x30c
0xffffec00425802c8 : 0xfffff80253059175 : nt!SwapContext+0x165
0xffffec00425803a0 : 0xfffff8025328a9c0 : nt!NonPagedPoolDescriptor
0xffffec00425803a8 : 0xfffff8025319236d : nt!ExDeferredFreePool+0x33d
0xffffec00425803e8 : 0xfffff8025328a9c8 : nt!NonPagedPoolDescriptor+0x8
0xffffec0042580410 : 0xfffff8025328a9c0 : nt!NonPagedPoolDescriptor
0xffffec0042580438 : 0xfffff80253193867 : nt!ExFreePoolWithTag+0x807
0xffffec0042580458 : 0xfffff80252f447cb : nt!KeSetEvent+0xab
0xffffec0042580468 : 0xfffff80252ed8d8c : nt!KiCancelTimer+0x19c
0xffffec0042580518 : 0xfffff804c92212b5 : ndis!NdisFreeMemory+0x15
0xffffec00425805d8 : 0xfffff80253162ede : nt!purecall+0xe
0xffffec00425806b8 : 0xfffff804c92be28a : ndis!Ndis::BindRules::UnbindIncompatibleDriversForMacChange+0x1da
0xffffec00425806c8 : 0xfffff804c92be28a : ndis!Ndis::BindRules::UnbindIncompatibleDriversForMacChange+0x1da
0xffffec00425806d8 : 0xfffff804c9208cea : ndis!NdisResetEvent+0xa
0xffffec00425807b8 : 0xfffff804c92b89c8 : ndis!NdisWatchdogState::NdisWatchdogState+0xdc
0xffffec00425807e8 : 0xfffff804c92af492 : ndis!ndisArmWatchdog+0x122
0xffffec0042580818 : 0xfffff804c92b3074 : ndis!ndisFInvokePause+0x54
0xffffec0042580858 : 0xfffff804c93029d7 : ndis!ndisPauseFilterInner+0x10f
0xffffec00425808a8 : 0xfffff802533b26ee : nt!MmLockPagableSectionByHandle+0xe
0xffffec0042580908 : 0xfffff804c92b2fba : ndis!ndisPauseFilter+0x6e
0xffffec0042580948 : 0xfffff804c92bc8bc : ndis!Ndis::BindEngine::Iterate+0x5d0
0xffffec0042580970 : 0xfffff80253311400 : nt!KiInitialThread
0xffffec0042580998 : 0xfffff80252f3f3f8 : nt!KiSwapThread+0x318
0xffffec0042580a18 : 0xfffff802533a5dc5 : nt!ObpFreeObject+0x195
0xffffec0042580aa0 : 0xfffff8025330f240 : nt!ExNode0
0xffffec0042580ac0 : 0xfffff804c92ca600 : "ndis!KWorkItemBase<Ndis::BindEngine,KWorkItem<Ndis::BindEngine> >::CallbackThunk"
0xffffec0042580ac8 : 0xfffff804c92bc263 : ndis!Ndis::BindEngine::UpdateBindings+0x7b
0xffffec0042580af8 : 0xfffff804c92bbf24 : ndis!Ndis::BindEngine::UpdateBindingsWorkItem+0x44
0xffffec0042580b08 : 0xfffff804c92ca600 : "ndis!KWorkItemBase<Ndis::BindEngine,KWorkItem<Ndis::BindEngine> >::CallbackThunk"
0xffffec0042580b48 : 0xfffff804c92ca612 : "ndis!KWorkItemBase<Ndis::BindEngine,KWorkItem<Ndis::BindEngine> >::CallbackThunk"+0x12
0xffffec0042580b58 : 0xfffff802532547c0 : nt!ObpRemoveObjectWorkItem
0xffffec0042580b68 : 0xfffff8025342c510 : nt!ObpProcessRemoveObjectQueue
0xffffec0042580b78 : 0xfffff80252f5db05 : nt!ExpWorkerThread+0xf5
0xffffec0042580b88 : 0xfffff8025342c500 : nt!MiCombinePageSortByHash+0x10
0xffffec0042580bb8 : 0xffff958af68451c0 : 0xffff958af68ad830 : 0xfffff80253276080 : nt!MiSystemPartition
0xffffec0042580bc8 : 0xfffff802533ec936 : nt!PspTerminateThreadByPointer+0x96
0xffffec0042580bd8 : 0xfffff8025335c707 : nt!PspDisablePrimaryTokenExchange+0x27
0xffffec0042580be8 : 0xfffff804c8228060 : FLTMGR!WPP_GLOBAL_Control
0xffffec0042580c00 : 0xfffff80252f5da10 : nt!ExpWorkerThread
0xffffec0042580c08 : 0xfffff80252fd82d7 : nt!PspSystemThreadStartup+0x47
0xffffec0042580c38 : 0xfffff80253164501 : nt!NtQueryInformationWorkerFactory+0x265
0xffffec0042580c58 : 0xfffff80253059516 : nt!KiStartSystemThread+0x16
0xffffec0042580c70 : 0xfffff80252fd8290 : nt!PspSystemThreadStartup
0: kd> lmvm klif
Browse full module list
start end module name
fffff804`c9d80000 fffff804`c9e94000 klif T (no symbols)
Loaded symbol image file: klif.sys
Image path: \SystemRoot\system32\DRIVERS\klif.sys
Image name: klif.sys
Browse all global symbols functions data
Timestamp: Mon Oct 15 00:26:47 2018 (5BC44137)
CheckSum: 0011B736
ImageSize: 00114000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
Hi this problem, different computerHi
RAM TEST : no error
HDD TEST : no error
ThanksThe one from which the latest dump came.
Has Sysnative Forums helped you? Please consider donating to help us support the site!