Stop Error Dump File Analysis - Dump file analysed: \092019-3796-01.dmp] on 20/09/19

Analysed using Microsoft (R) Windows Debugger Version 10.0.18362.1 X86 and PCT Analyser V5.2 (Copyright 2019)

Click on each button to view the relevant information

General Tips for Stop Errors (BSOD)

Firstly, you can follow the Microsoft online Blue Screen wizard here.

Diagnostic / Testing Tools

What are Stop Errors?

Firstly, it is worth clarifying that a BSOD is only attributed to Windows, for example, where Windows has a Blue Screen, Linux actually has something known as a System Panic. However, you’ll find Linux is much less prone to them.

Microsoft defines a blue screen very well:

“When Microsoft Windows encounters a condition that compromises safe system operation, the system halts. This condition is called a bug check. It is also commonly referred to as a system crash, a kernel error, a Stop error, or BSOD. A hardware device, its driver, or related software might have caused this error.”

In simple terms – it’s when Windows has detected a problem that could have caused damage or corruption to the operating system, or your computer itself, and therefore needed to STOP.

That’s why technically it’s called a stop error, stop code, or a bug check. They are more indicative of a fatal system crash. For the purpose of standardisation, we will call this a bug check (Bugcheck = BSOD).

So, there are some important considerations to take before continuing:

Summary

Debug session time: Fri Sep 20 15:36:04.569 2019 (UTC + 1:00)System Uptime: 0 days 21:20:52.266

BugCheck 3B ----- SYSTEM_SERVICE_EXCEPTION

Probably caused by : ntkrnlmp.exe ( nt!HvpGetCellPaged+a2 )

Arg1: 00000000c0000006, Exception code that caused the bugcheck

Arg2: fffff80281e8c242, Address of the instruction which caused the bugcheck

Arg3: ffffb40430d8e400, Address of the context record for the exception that caused the bugcheck

Arg4: 0000000000000000, zero.

PROCESS_NAME: Registry

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe -----> Windows NT operating system kernel


Bugcheck Description:

SYSTEM_SERVICE_EXCEPTION

"This indicates that an exception happened while executing a routine that transitions from non-privileged code to privileged code. The stop code indicates that executing code had an exception and the thread that was it, is a system thread. The exception information returned in parameter one is listed in NTSTATUS Values and is also available in the ntstatus.h file located in the inc directory of the Windows Driver Kit."

About your bugcheck / typical cause:

"This is typically driver based and therefore you should reference the third party modules loaded to check which ones may be misbehaving. If any are out of date, try updating or disabling them. Look at the STACK TEXT for clues on what was running when the failure occurred. If multiple dump files are available, compare information to look for common code that is in the stack"

System Information

This includes BIOS, Motherboard, Processor, and Memory. Not all dump files will contain hardware information, and therefore this will not always be complete

Operating System

OSNAME: Windows 10

OSBUILD: 18362

OSPLATFORM_TYPE: x64

OSSERVICEPACK: 356

BIOS Information

BIOS Version B188.01B

BIOS Release Date 08/01/2018

Mainboard Information

BaseBoardManufacturer = DFI Inc.

BaseBoardProduct = SD100

BaseBoardVersion = Type2 - Board Version

Processor Information

Processor Version Intel(R) Core(TM) i7-7700K CPU @ 4.20GHz

Processor Voltage 8ch - 1.2V

Current Speed 4200MHz

Max Speed 8300MHz

Memory Information

Slot Size Speed Part Number
Memory Slot 1 8192MB 2133MHz Part Number TS1GSH64V1H
Memory Slot 2 8192MB 2133MHz Part Number TS1GSH64V1H
Memory Slot 3 No Data
Memory Slot 4 No Data

Loaded Modules

To disable third party modules, use Autoruns (Microsoft Program)

Modules are listed from OLDEST to NEWEST - typically out of drivers should be looked at first. Total Modules Loaded = Total 8
1- ModuleName Column1 2- Time Stamp 3- Company 4- Description
inpoutx64.sys 17/10/2008 Highrez HighRez InOut Direct Access HW Ports Driver
iaLPSS2_UART2.sys 23/06/2017 Intel Intel Serial IO UART driver
nvhda64v.sys 15/12/2017 NVIDIA NVIDIA Audio HDMI Driver (nForce Chip)
nvlddmkm.sys 13/01/2018 NVIDIA NVIDIA Video Drivers
TeeDriverW8x64.sys 11/04/2018 Intel Intel Management Engine Interface driver
iaLPSS2i_I2C.sys 19/04/2018 Intel Intel Serial IO host controller driver
iaLPSS2i_GPIO2.sys 19/04/2018 Intel Intel(R) Serial IO Driver
e1i65x64.sys 11/06/2018 Intel Intel(R) Gigabit Adapter NDIS 6.x driver

Column1 Dump File

Microsoft (R) Windows Debugger Version 10.0.18362.1 X86

Copyright (c) Microsoft Corporation. All rights reserved.

Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*

Executable search path is:

Windows 10 Kernel Version 18362 MP (8 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS

Built by: 18362.1.amd64fre.19h1_release.190318-1202

Machine Name:

Kernel base = 0xfffff802`81800000 PsLoadedModuleList = 0xfffff802`81c475b0

Debug session time: Fri Sep 20 15:36:04.569 2019 (UTC + 1:00)

System Uptime: 0 days 21:20:52.266

Loading Kernel Symbols

...............................................................

................................................................

...................................................

Loading User Symbols

Loading unloaded module list

.................

For analysis of this file, run !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000006, fffff80281e8c242, ffffb40430d8e400, 0}

*** WARNING: Unable to verify timestamp for win32k.sys

Probably caused by : ntkrnlmp.exe ( nt!HvpGetCellPaged+a2 )

Followup: MachineOwner

---------

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)

An exception happened while executing a system service routine.

Arguments:

Arg1: 00000000c0000006, Exception code that caused the bugcheck

Arg2: fffff80281e8c242, Address of the instruction which caused the bugcheck

Arg3: ffffb40430d8e400, Address of the context record for the exception that caused the bugcheck

The reference count of an object is illegal for the current state of the object. Arg4: 0000000000000000, zero.

to increment the reference count of the object. When the driver is done with the Debugging Details:

pointer the driver calls another kernel routine to decrement the reference count. ------------------

open handles to the object, in which case the fourth parameter indicates the number KEY_VALUES_STRING: 1

contains the actual value of the pointer references count. PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1

DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER: DFI Inc.

SYSTEM_PRODUCT_NAME: SD100

SYSTEM_SKU: Type1Sku0

SYSTEM_VERSION: TBD by OEM

BIOS_VENDOR: Insyde

BIOS_VERSION: B188.01B

BIOS_DATE: 08/01/2018

BASEBOARD_MANUFACTURER: DFI Inc.

BASEBOARD_PRODUCT: SD100

BASEBOARD_VERSION: Type2 - Board Version

DUMP_TYPE: 2

BUGCHECK_P1: c0000006

BUGCHECK_P2: fffff80281e8c242

BUGCHECK_P3: ffffb40430d8e400

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000006 - The instruction at 0x%p referenced memory at 0x%p. The required data was not placed into memory because of an I/O error status of 0x%x.

FAULTING_IP:

nt!HvpGetCellPaged+a2

fffff802`81e8c242 418b02 mov eax,dword ptr [r10]

CONTEXT: ffffb40430d8e400 -- (.cxr 0xffffb40430d8e400)

rax=0000000000000000 rbx=ffffb40430d8ee50 rcx=0000000000000007

rdx=0000000004a7e0a8 rsi=000000000000037a rdi=ffffbe86e915d000

rip=fffff80281e8c242 rsp=ffffb40430d8edf8 rbp=ffffbe86e915d000

r8=000000000000001c r9=ffff8a86e0e3c080 r10=000001f60347f0a8

r11=00000000000000a8 r12=00000000ce4cf905 r13=ffffb40430d8f0a0

r14=000000000000037a r15=000001f603394024

iopl=0 nv up ei pl nz na pe nc

cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202

nt!HvpGetCellPaged+0xa2:

fffff802`81e8c242 418b02 mov eax,dword ptr [r10] ds:002b:000001f6`0347f0a8=????????

Resetting default scope

BUGCHECK_STR: 0x3B_c0000006

CPU_COUNT: 8

CPU_MHZ: 1068

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: 9

CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: B4'00000000 (cache) B4'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: Registry

CURRENT_IRQL: 0

ANALYSIS_SESSION_HOST: DESKTOP-CL34DUR

ANALYSIS_SESSION_TIME: 09-20-2019 16:10:35.0475

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER: from fffff80281e2799f to fffff80281e8c242

STACK_TEXT:

ffffb404`30d8edf8 fffff802`81e2799f : 00000000`7f147a21 ffffb404`30d8f170 ffff8a86`e0e3c080 ffffbe86`eeeaa670 : nt!HvpGetCellPaged+0xa2

ffffb404`30d8ee00 fffff802`81e26299 : 00000001`ffffffff 00000000`ce4cf905 ffffbe86`00000001 ffffbe86`eeeaa640 : nt!CmpDoCompareKeyName+0x2f

ffffb404`30d8ee50 fffff802`81df0ae3 : ffffbe86`eeeaa640 ffffb404`30d8f0c0 ffffb404`30d8f040 ffffb404`30d8f0c0 : nt!CmpWalkOneLevel+0x709

ffffb404`30d8ef60 fffff802`81dee034 : ffffb404`0000001c ffffb404`30d8f2a0 ffffb404`30d8f268 00000000`00000000 : nt!CmpDoParseKey+0x513

ffffb404`30d8f1f0 fffff802`81debf1f : ffff8a86`d830f9a0 ffffbe86`f63a0501 00000000`00000000 00000000`00000001 : nt!CmpParseKey+0x274

ffffb404`30d8f410 fffff802`81dea381 : ffff8a86`d830f900 ffffb404`30d8f658 00000000`00000040 ffff8a86`d16f84e0 : nt!ObpLookupObjectName+0x78f

ffffb404`30d8f5d0 fffff802`81df2e6c : 00000000`00000001 00000000`00000000 00000000`00000000 ffff8a86`d16f84e0 : nt!ObOpenObjectByNameEx+0x201

ffffb404`30d8f710 fffff802`81df2ced : 0000002f`690fe750 ffffb404`30d8fa80 00000000`00000001 00000000`00000000 : nt!ObOpenObjectByName+0x5c

ffffb404`30d8f760 fffff802`81df4d0f : 00000000`00010000 0000002f`690fe090 00000000`00000000 ffffb404`30d8f978 : nt!CmOpenKey+0x29d

ffffb404`30d8f9c0 fffff802`819d2915 : 0000016e`42e9c770 ffffb404`30d8fa80 00000000`000000d1 0000016e`4514d880 : nt!NtOpenKeyEx+0xf

ffffb404`30d8fa00 00007ffd`8245e424 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25

0000002f`690fe678 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`8245e424

THREAD_SHA1_HASH_MOD_FUNC: c60f19c144f9d7dd390ce35adb8e8dcc06aff971

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6a69a3496045c75c34350c0c09a8b6630f4601b9

THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c

FOLLOWUP_IP:

nt!HvpGetCellPaged+a2

fffff802`81e8c242 418b02 mov eax,dword ptr [r10]

FAULT_INSTR_CODE: 41028b41

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!HvpGetCellPaged+a2

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.18362.356

STACK_COMMAND: .cxr 0xffffb40430d8e400 ; kb

BUCKET_ID_FUNC_OFFSET: a2

FAILURE_BUCKET_ID: 0x3B_c0000006_nt!HvpGetCellPaged

BUCKET_ID: 0x3B_c0000006_nt!HvpGetCellPaged

PRIMARY_PROBLEM_CLASS: 0x3B_c0000006_nt!HvpGetCellPaged

TARGET_TIME: 2019-09-20T14:36:04.000Z

OSBUILD: 18362

OSSERVICEPACK: 356

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: unknown_date

BUILDDATESTAMP_STR: 190318-1202

BUILDLAB_STR: 19h1_release

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME: 30c0

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x3b_c0000006_nt!hvpgetcellpaged

FAILURE_ID_HASH: {68f3db38-ae8e-4bae-c37a-85819946495f}

Followup: MachineOwner

---------

@ hal.dll 81442445

@ E:\WinDBG\Debuggers\x86\sym\ntkrnlmp.pdb\CE7FFB00C20B87500211456B3E905C471\ntkrnlmp.pdb a5839c4d

@ kd.dll 5a75d524

@ mcupdate_GenuineIntel.dll f73f41c4

@ werkernel.sys 958e14b2

@ ksecdd.sys a35f28f6

@ msrpc.sys 8e1a4f15

@ tm.sys 9a74c3b7

@ CLFS.SYS 07bc3c0b

@ PSHED.dll b21f9dda

@ BOOTVID.dll 0f301604

@ clipsp.sys 5c90178f

@ FLTMGR.SYS 801a5f11

@ cmimcext.sys c7f022b4

@ ntosext.sys bac877d8

@ CI.dll 64b700c8

@ cng.sys 5444b5a1

@ WDFLDR.SYS 3b396780

@ SleepStudyHelper.sys ba6e2346

@ WppRecorder.sys 34a54231

@ acpiex.sys 2b91edb2

@ SgrmAgent.sys f851a195

@ WMILIB.SYS 59021e3d

@ WindowsTrustedRTProxy.sys 514e3023

@ Wdf01000.sys 116a658a

@ mssecflt.sys 9c3fcc09

@ ACPI.sys 90b929f2

@ intelpep.sys 48981283

@ WindowsTrustedRT.sys cb95ce3d

@ pcw.sys 6b731527

@ msisadrv.sys 5e470a0e

@ pci.sys d78389fa

@ vdrvroot.sys 0101bcc6

@ pdc.sys 87c34d95

@ CEA.sys f3811107

@ partmgr.sys 89c96ad1

@ spaceport.sys dc82b965

@ volmgr.sys 211cef76

@ volmgrx.sys d6f366b7

@ mountmgr.sys 242db05f

@ storahci.sys 381e77bb

@ storport.sys a692ce5b

@ EhStorClass.sys 526cc202

@ fileinfo.sys 24bbed20

@ Wof.sys 3cb75347

@ WdFilter.sys 8a73d08b

@ Fs_Rec.sys 49e932ba

@ NETIO.SYS e3375155

@ volume.sys a4e9fdfa

@ iorate.sys 18d52dda

@ Ntfs.sys d9a3ce82

@ ndis.sys 7a2508ba

@ ksecpkg.sys e1e129d5

@ tcpip.sys 61ae2576

@ fwpkclnt.sys 58c1e6ed

@ wfplwfs.sys 60902cbb

@ fvevol.sys d4b5a2e7

@ volsnap.sys 1876f533

@ rdyboost.sys f450ceb3

@ mup.sys 565e0311

@ disk.sys 384fefed

@ CLASSPNP.SYS 09ed6e49

@ cdrom.sys 9f6b0b7b

@ filecrypt.sys 4ead73c1

@ tbs.sys 965bac31

@ Null.SYS e822087b

@ Beep.SYS 528ec21a

@ crashdmp.sys 2985cb13

@ afd.sys b88dd13e

@ vwififlt.sys 39396289

@ pacer.sys e7276bde

@ netbios.sys b37fd2e9

@ rdbss.sys bce0ed0a

@ csc.sys b0cbd8b6

@ nsiproxy.sys 528da18a

@ npsvctrig.sys 0e7ac006

@ mssmbios.sys e6dc521d

@ gpuenergydrv.sys 0cc24294

@ dfsc.sys fabe3f7d

@ fastfat.SYS 5d09adaa

@ bam.sys 22198778

@ ahcache.sys a8473be2

@ Vid.sys b7cfc354

@ winhvr.sys cf370026

@ CompositeBus.sys f050d616

@ kdnic.sys 1ff5f7f5

@ umbus.sys 3104a4ad

@ HTTP.sys aac6df8e

@ peauth.sys 54b328cc

@ srv2.sys bd56acc9

@ NDProxy.sys 193fe713

@ rasl2tp.sys a7aa404e

@ raspptp.sys 54893590

@ ndiswan.sys fb43c10d

@ WdNisDrv.sys afc7a2ac

@ condrv.sys aee79cba

@ dxgkrnl.sys f0008504

@ watchdog.sys 21474799

@ BasicDisplay.sys 4e6e05e1

@ BasicRender.sys 82a93228

@ Npfs.SYS b03ecfd3

@ Msfs.SYS 91fe0ff4

@ tdx.sys 0a1f3dc4

@ TDI.SYS 894065a0

@ netbt.sys 113d2a22

@ afunix.sys 9d6c12c4

@ ucx01000.sys 04268533

@ iaLPSS2i_I2C.sys 5ad84ada

@ SpbCx.sys 2201d8b1

@ TeeDriverW8x64.sys 5ace1fc8

@ e1i65x64.sys 5b1eb8e2

@ iaLPSS2_UART2.sys 594c6b66

@ SerCx2.sys 2f683c32

@ serial.sys b6549b39

@ serenum.sys 0b8b1db3

@ AgileVpn.sys a96aff6d

@ kbdclass.sys 0b474226

@ mouclass.sys 4a22ffb8

@ iaLPSS2i_GPIO2.sys 5ad84af4

@ msgpioclx.sys 137f3458

@ wmiacpi.sys af7efce5

@ intelppm.sys 78d96350

@ acpipagr.sys 80ab510e

@ UEFI.sys 60bae916

@ NdisVirtualBus.sys d217410a

@ swenum.sys c4d73525

@ rdpbus.sys 4e9899f8

@ nvhda64v.sys 5a338527

@ ksthunk.sys 15502221

@ UsbHub3.sys d4267d67

@ USBD.SYS cd63ce9d

@ HdAudio.sys 4a11f5b5

@ winquic.sys d60f7863

@ mrxsmb.sys 1e559e99

@ mrxsmb20.sys 2a968ecc

@ mslldp.sys 15c3108a

@ lltdio.sys 707e9308

@ rspndr.sys ed98d1ee

@ wanarp.sys 1bd57cfb

@ nwifi.sys be919ea8

@ ndisuio.sys 38fd20ee

@ mpsdrv.sys 7d5af2f0

@ inpoutx64.sys 48f9193c

@ srvnet.sys 220ab43d

@ Ndu.sys 23725908

@ tcpipreg.sys 3451b629

@ mmcss.sys 3ee4136d

@ rassstp.sys 6ec6a1e5

@ ndistapi.sys 690d0d05

@ HIDPARSE.SYS 0d56f932

@ usbccgp.sys 5d2af1d1

@ hidusb.sys 7b9189fe

@ HIDCLASS.SYS d4d0dee6

@ kbdhid.sys 4cf68ca7

@ dxgmms2.sys 79e12d93

@ mouhid.sys a140c187

@ monitor.sys 93f54fb5

@ dump_diskdump.sys 5cc3d020

@ dump_storahci.sys 381e77bb

@ dump_dumpfve.sys 4bedf38a

@ rdpvideominiport.sys d9035062

@ luafv.sys 08a8e82a

@ wcifs.sys 6c454d30

@ cldflt.sys ff0d7e8e

@ rdpdr.sys 69b648da

@ storqosflt.sys d77c69c8

@ tsusbhub.sys a3f71a46

@ bowser.sys d37f2e35

@ raspppoe.sys 053a7d72

@ nvlddmkm.sys 5a59c79c

@ HDAudBus.sys aecd2958

@ portcls.sys d4f15bf0

@ drmk.sys a3e06fb0

@ ks.sys 1f5fe6fb

@ USBXHCI.SYS 951b0a79

@ win32kfull.sys 00000000

@ win32kbase.sys 00000000

@ cdd.dll 00000000

@ win32k.sys 00000000

[SMBIOS Data Tables v3.0]

[DMI Version - 0]

[2.0 Calling Convention - No]

[Table Size - 3505 bytes]

[BIOS Information (Type 0) - Length 24 - Handle 0000h]

Vendor Insyde

BIOS Version B188.01B

BIOS Starting Address Segment e000

BIOS Release Date 08/01/2018

BIOS ROM Size 700000

BIOS Characteristics

07: - PCI Supported

11: - Upgradeable FLASH BIOS

12: - BIOS Shadowing Supported

15: - CD-Boot Supported

16: - Selectable Boot Supported

19: - EDD Supported

20: - NEC 9800 J-Floppy Supported

21: - Toshiba J-Floppy Supported

22: - 360KB Floppy Supported

23: - 1.2MB Floppy Supported

24: - 720KB Floppy Supported

25: - 2.88MB Floppy Supported

27: - Keyboard Services Supported

30: - CGA/Mono Services Supported

BIOS Characteristic Extensions

00: - ACPI Supported

01: - USB Legacy Supported

08: - BIOS Boot Specification Supported

10: - Enable Targeted Content Distribution

11: - UEFI Specification Supported

BIOS Major Revision 12

BIOS Minor Revision 68

EC Firmware Major Revision 255

EC Firmware Minor Revision 255

[System Information (Type 1) - Length 27 - Handle 0001h]

Manufacturer DFI Inc.

Product Name SD100

Version TBD by OEM

Serial Number 123456789

UUID 00000000-0000-0000-0000-000000000000

Wakeup Type Power Switch

SKUNumber Type1Sku0

Family Type1Family

[BaseBoard Information (Type 2) - Length 15 - Handle 0002h]

Manufacturer DFI Inc.

Product SD100

Version Type2 - Board Version

Serial Number Type2 - Board Serial Number

Asset Tag

Feature Flags 09h

00: - Motherboard

03: - Replaceable

Location Type2 - Board Chassis Location

Chassis Handle 0003h

Board Type 0ah - Processor/Memory Module

Number of Child Handles 0

[System Enclosure (Type 3) - Length 22 - Handle 0003h]

Manufacturer Chassis Manufacturer

Chassis Type Notebook

Version Chassis Version

Serial Number

Asset Tag Number

Bootup State Safe

Power Supply State Safe

Thermal State Safe

Security Status None

OEM Defined 0

Height 0U

Number of Power Cords 1

Number of Contained Elements 0

Contained Element Size 0

[Processor Information (Type 4) - Length 48 - Handle 0004h]

Socket Designation U3E1

Processor Type Central Processor

Processor Family c6h - Specification Reserved

Processor Manufacturer Intel(R) Corporation

Processor ID e9060900fffbebbf

Processor Version Intel(R) Core(TM) i7-7700K CPU @ 4.20GHz

Processor Voltage 8ch - 1.2V

External Clock 100MHz

Max Speed 8300MHz

Current Speed 4200MHz

Status Enabled Populated

Processor Upgrade Other

L1 Cache Handle 0005h

L2 Cache Handle 0006h

L3 Cache Handle 0007h

Serial Number

Asset Tag Number

Part Number To Be Filled By O.E.M.

[Cache Information (Type 7) - Length 19 - Handle 0005h]

Socket Designation L1 Cache

Cache Configuration 0180h - WB Enabled Int NonSocketed L1

Maximum Cache Size 0100h - 256K

Installed Size 0100h - 256K

Supported SRAM Type 0020h - Synchronous

Current SRAM Type 0020h - Synchronous

Cache Speed 0ns

Error Correction Type ParitySingle-Bit ECC

System Cache Type Unified

Associativity 8-way Set-Associative

[Cache Information (Type 7) - Length 19 - Handle 0006h]

Socket Designation L2 Cache

Cache Configuration 0181h - WB Enabled Int NonSocketed L2

Maximum Cache Size 0400h - 1024K

Installed Size 0400h - 1024K

Supported SRAM Type 0020h - Synchronous

Current SRAM Type 0020h - Synchronous

Cache Speed 0ns

Error Correction Type Multi-Bit ECC

System Cache Type Unified

Associativity 4-way Set-Associative

[Cache Information (Type 7) - Length 19 - Handle 0007h]

Socket Designation L3 Cache

Cache Configuration 0182h - WB Enabled Int NonSocketed L3

Maximum Cache Size 2000h - 8192K

Installed Size 2000h - 8192K

Supported SRAM Type 0020h - Synchronous

Current SRAM Type 0020h - Synchronous

Cache Speed 0ns

Error Correction Type Specification Reserved

System Cache Type Unified

Associativity 16-way Set-Associative

[OEM Strings (Type 11) - Length 5 - Handle 001eh]

Number of Strings 3

1 OemString1

2 OemString2

3 OemString3

[System Configuration Options (Type 12) - Length 5 - Handle 001fh]

[Physical Memory Array (Type 16) - Length 23 - Handle 0024h]

Location 03h - SystemBoard/Motherboard

Use 03h - System Memory

Memory Error Correction 03h - None

Maximum Capacity 33554432KB

Memory Error Inf Handle [No Errors]

Number of Memory Devices 2

[Memory Device (Type 17) - Length 40 - Handle 0025h]

Physical Memory Array Handle 0024h

Memory Error Info Handle [No Errors]

Total Width 64 bits

Data Width 64 bits

Size 8192MB

Form Factor 0dh - SODIMM

Device Set [None]

Device Locator ChannelA-DIMM0

Bank Locator BANK 0

Memory Type 1ah - Specification Reserved

Type Detail 4080h - Synchronous

Speed 2133MHz

Manufacturer Transcend

Serial Number

Asset Tag Number

Part Number TS1GSH64V1H

[Memory Device (Type 17) - Length 40 - Handle 0026h]

Physical Memory Array Handle 0024h

Memory Error Info Handle [No Errors]

Total Width 64 bits

Data Width 64 bits

Size 8192MB

Form Factor 0dh - SODIMM

Device Set [None]

Device Locator ChannelB-DIMM0

Bank Locator BANK 2

Memory Type 1ah - Specification Reserved

Type Detail 4080h - Synchronous

Speed 2133MHz

Manufacturer Transcend

Serial Number

Asset Tag Number

Part Number TS1GSH64V1H

[Memory Array Mapped Address (Type 19) - Length 31 - Handle 0027h]

Starting Address 00000000h

Ending Address 00ffffffh

Memory Array Handle 0024h

Partition Width 02

Extended Starting Address 0000000000000000h

Extended Ending Address 0000000000000000h

[Memory Device Mapped Address (Type 20) - Length 35 - Handle 0028h]

Starting Address 00000000h

Ending Address 007fffffh

Memory Device Handle 0025h

Mem Array Mapped Adr Handle 0027h

Partition Row Position [Unknown]

Interleave Position 01

Interleave Data Depth 01

Extended Starting Address 0000000000000000h

Extended Ending Address 0000000000000000h

[Memory Device Mapped Address (Type 20) - Length 35 - Handle 0029h]

Starting Address 00000000h

Ending Address 007fffffh

Memory Device Handle 0026h

Mem Array Mapped Adr Handle 0027h

Partition Row Position [Unknown]

Interleave Position 02

Interleave Data Depth 01

Extended Starting Address 0000000000000000h

Extended Ending Address 0000000000000000h

Machine ID Information [From Smbios 3.0, DMIVersion 0, Size=3505]

BiosMajorRelease = 12

BiosMinorRelease = 68

BiosVendor = Insyde

BiosVersion = B188.01B

BiosReleaseDate = 08/01/2018

SystemManufacturer = DFI Inc.

SystemProductName = SD100

SystemFamily = Type1Family

SystemVersion = TBD by OEM

SystemSKU = Type1Sku0

BaseBoardManufacturer = DFI Inc.

BaseBoardProduct = SD100

BaseBoardVersion = Type2 - Board Version

Additional Commands

No additional commands run in this instance