Guest User

Untitled

a guest
Sep 1st, 2019
78
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.31 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.18914.1001 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\minidump\090119-5500-01.dmp]
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8.  
  9. Symbol search path is: srv*
  10. Executable search path is:
  11. Windows 10 Kernel Version 18362 MP (8 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS
  13. Built by: 18362.1.amd64fre.19h1_release.190318-1202
  14. Machine Name:
  15. Kernel base = 0xfffff802`30800000 PsLoadedModuleList = 0xfffff802`30c46490
  16. Debug session time: Sun Sep 1 12:44:38.294 2019 (UTC + 5:30)
  17. System Uptime: 0 days 1:43:57.968
  18. Loading Kernel Symbols
  19. ...............................................................
  20. ................................................................
  21. .............................................
  22. Loading User Symbols
  23. Loading unloaded module list
  24. .................
  25. For analysis of this file, run !analyze -v
  26. nt!KeBugCheckEx:
  27. fffff802`309bfcc0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff830a`50a6f1d0=000000000000000a
  28. 0: kd> !analyze -v
  29. *******************************************************************************
  30. * *
  31. * Bugcheck Analysis *
  32. * *
  33. *******************************************************************************
  34.  
  35. IRQL_NOT_LESS_OR_EQUAL (a)
  36. An attempt was made to access a pageable (or completely invalid) address at an
  37. interrupt request level (IRQL) that is too high. This is usually
  38. caused by drivers using improper addresses.
  39. If a kernel debugger is available get the stack backtrace.
  40. Arguments:
  41. Arg1: 00000000ffffce85, memory referenced
  42. Arg2: 0000000000000002, IRQL
  43. Arg3: 0000000000000000, bitfield :
  44. bit 0 : value 0 = read operation, 1 = write operation
  45. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  46. Arg4: fffff80230842454, address which referenced memory
  47.  
  48. Debugging Details:
  49. ------------------
  50.  
  51.  
  52. KEY_VALUES_STRING: 1
  53.  
  54. Key : Analysis.CPU.Sec
  55. Value: 15
  56.  
  57. Key : Analysis.Elapsed.Sec
  58. Value: 292
  59.  
  60. Key : Analysis.Memory.CommitPeak.Mb
  61. Value: 70
  62.  
  63.  
  64. PROCESSES_ANALYSIS: 1
  65.  
  66. SERVICE_ANALYSIS: 1
  67.  
  68. STACKHASH_ANALYSIS: 1
  69.  
  70. TIMELINE_ANALYSIS: 1
  71.  
  72.  
  73. DUMP_CLASS: 1
  74.  
  75. DUMP_QUALIFIER: 400
  76.  
  77. BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
  78.  
  79. SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
  80.  
  81. SYSTEM_PRODUCT_NAME: MS-7B84
  82.  
  83. SYSTEM_SKU: To be filled by O.E.M.
  84.  
  85. SYSTEM_VERSION: 2.0
  86.  
  87. BIOS_VENDOR: American Megatrends Inc.
  88.  
  89. BIOS_VERSION: 4.50
  90.  
  91. BIOS_DATE: 08/05/2019
  92.  
  93. BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
  94.  
  95. BASEBOARD_PRODUCT: B450M PRO-M2 V2 (MS-7B84)
  96.  
  97. BASEBOARD_VERSION: 2.0
  98.  
  99. DUMP_TYPE: 2
  100.  
  101. BUGCHECK_P1: ffffce85
  102.  
  103. BUGCHECK_P2: 2
  104.  
  105. BUGCHECK_P3: 0
  106.  
  107. BUGCHECK_P4: fffff80230842454
  108.  
  109. READ_ADDRESS: fffff80230d713b8: Unable to get MiVisibleState
  110. Unable to get NonPagedPoolStart
  111. Unable to get NonPagedPoolEnd
  112. Unable to get PagedPoolStart
  113. Unable to get PagedPoolEnd
  114. unable to get nt!MmSpecialPagesInUse
  115. 00000000ffffce85
  116.  
  117. CURRENT_IRQL: 2
  118.  
  119. FAULTING_IP:
  120. nt!RtlpHpVsContextAllocateInternal+204
  121. fffff802`30842454 3309 xor ecx,dword ptr [rcx]
  122.  
  123. CPU_COUNT: 8
  124.  
  125. CPU_MHZ: e74
  126.  
  127. CPU_VENDOR: AuthenticAMD
  128.  
  129. CPU_FAMILY: 17
  130.  
  131. CPU_MODEL: 18
  132.  
  133. CPU_STEPPING: 1
  134.  
  135. BLACKBOXBSD: 1 (!blackboxbsd)
  136.  
  137.  
  138. BLACKBOXNTFS: 1 (!blackboxntfs)
  139.  
  140.  
  141. BLACKBOXPNP: 1 (!blackboxpnp)
  142.  
  143.  
  144. BLACKBOXWINLOGON: 1
  145.  
  146. CUSTOMER_CRASH_COUNT: 1
  147.  
  148. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  149.  
  150. BUGCHECK_STR: AV
  151.  
  152. PROCESS_NAME: firefox.exe
  153.  
  154. ANALYSIS_SESSION_HOST: DESKTOP-V7A5OU6
  155.  
  156. ANALYSIS_SESSION_TIME: 09-01-2019 22:45:07.0857
  157.  
  158. ANALYSIS_VERSION: 10.0.18914.1001 amd64fre
  159.  
  160. TRAP_FRAME: ffff830a50a6f310 -- (.trap 0xffff830a50a6f310)
  161. NOTE: The trap frame does not contain all registers.
  162. Some register values may be zeroed or incorrect.
  163. rax=00000000ffffce8d rbx=0000000000000000 rcx=00000000ffffce85
  164. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
  165. rip=fffff80230842454 rsp=ffff830a50a6f4a0 rbp=0000000000fa0000
  166. r8=ffffce8d9afe7038 r9=0000000000000000 r10=0000000000000000
  167. r11=000002a363c1e000 r12=0000000000000000 r13=0000000000000000
  168. r14=0000000000000000 r15=0000000000000000
  169. iopl=0 nv up ei pl nz na po nc
  170. nt!RtlpHpVsContextAllocateInternal+0x204:
  171. fffff802`30842454 3309 xor ecx,dword ptr [rcx] ds:00000000`ffffce85=????????
  172. Resetting default scope
  173.  
  174. LAST_CONTROL_TRANSFER: from fffff802309d1ae9 to fffff802309bfcc0
  175.  
  176. STACK_TEXT:
  177. ffff830a`50a6f1c8 fffff802`309d1ae9 : 00000000`0000000a 00000000`ffffce85 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
  178. ffff830a`50a6f1d0 fffff802`309cde2b : ffffce8d`9924ffb0 ffff830a`50a6f3c9 fffff802`30800000 fffff802`30833206 : nt!KiBugCheckDispatch+0x69
  179. ffff830a`50a6f310 fffff802`30842454 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x46b
  180. ffff830a`50a6f4a0 fffff802`30832bae : fffff802`000000fa 00000000`00000f80 fffff802`00000f80 ffffce8d`8b010000 : nt!RtlpHpVsContextAllocateInternal+0x204
  181. ffff830a`50a6f510 fffff802`30b6d06d : 00000000`00000200 00000000`00000000 00000000`00000000 00000000`00000f60 : nt!ExAllocateHeapPool+0xc0e
  182. ffff830a`50a6f650 fffff802`3ff5dfeb : ffff850b`b20c4298 00000000`00000000 00000000`00000f60 fffff802`00000000 : nt!ExAllocatePoolWithTag+0x5d
  183. ffff830a`50a6f6a0 fffff802`3ff5dd4c : ffff850b`b20c4200 ffffce8d`00000000 000002a3`63c1e000 00000000`00000f60 : Npfs!NpWriteDataQueue+0x11b
  184. ffff830a`50a6f710 fffff802`3ff5db7d : ffffce8d`9bb2a6f0 000002a3`63c1e000 00000000`00000000 ffffce8d`910c8080 : Npfs!NpCommonWrite+0x14c
  185. ffff830a`50a6f7a0 fffff802`30831819 : ffffce8d`8e888d20 ffffce8d`910c81c0 ffffce8d`8e888d20 ffffce8d`9bb2a6f0 : Npfs!NpFsdWrite+0x6d
  186. ffff830a`50a6f810 fffff802`34ae3f48 : 00000000`00000000 fffff802`34ae3f48 00000000`00000022 00000000`00000000 : nt!IofCallDriver+0x59
  187. ffff830a`50a6f850 fffff802`30831819 : ffffce8d`9bb2a6f0 ffffce8d`8c9d1201 ffffce8d`92cbab00 ffffce8d`00000000 : FLTMGR!FltpDispatch+0xe8
  188. ffff830a`50a6f8b0 fffff802`30de7215 : ffffce8d`9bb2a6f0 00000000`00000000 ffffce8d`9bb2a6f0 fffff802`30e43861 : nt!IofCallDriver+0x59
  189. ffff830a`50a6f8f0 fffff802`30e435c6 : ffff850b`00000000 ffffce8d`8e888d20 ffffce8d`8c9d1210 ffff830a`50a6fb80 : nt!IopSynchronousServiceTail+0x1a5
  190. ffff830a`50a6f990 fffff802`309d1518 : ffffce8d`910c8080 00000000`00000000 00000000`00000000 000002a3`62490038 : nt!NtWriteFile+0x676
  191. ffff830a`50a6fa90 00007ffd`d4edc164 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
  192. 000000e2`0a1ff5b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`d4edc164
  193.  
  194.  
  195. THREAD_SHA1_HASH_MOD_FUNC: 00081a118bc5772486a05fb94eb915475a616cf6
  196.  
  197. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e1651bd15d48fe6aa1846bb4c8a49a0517e13d0f
  198.  
  199. THREAD_SHA1_HASH_MOD: a39b2791c4610cb985115f423d2eeffb85484021
  200.  
  201. FOLLOWUP_IP:
  202. Npfs!NpWriteDataQueue+11b
  203. fffff802`3ff5dfeb 4c8bf8 mov r15,rax
  204.  
  205. FAULT_INSTR_CODE: 48f88b4c
  206.  
  207. SYMBOL_STACK_INDEX: 6
  208.  
  209. SYMBOL_NAME: Npfs!NpWriteDataQueue+11b
  210.  
  211. FOLLOWUP_NAME: MachineOwner
  212.  
  213. MODULE_NAME: Npfs
  214.  
  215. IMAGE_NAME: Npfs.SYS
  216.  
  217. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  218.  
  219. IMAGE_VERSION: 10.0.18362.1028
  220.  
  221. STACK_COMMAND: .thread ; .cxr ; kb
  222.  
  223. BUCKET_ID_FUNC_OFFSET: 11b
  224.  
  225. FAILURE_BUCKET_ID: AV_Npfs!NpWriteDataQueue
  226.  
  227. BUCKET_ID: AV_Npfs!NpWriteDataQueue
  228.  
  229. PRIMARY_PROBLEM_CLASS: AV_Npfs!NpWriteDataQueue
  230.  
  231. TARGET_TIME: 2019-09-01T07:14:38.000Z
  232.  
  233. OSBUILD: 18362
  234.  
  235. OSSERVICEPACK: 295
  236.  
  237. SERVICEPACK_NUMBER: 0
  238.  
  239. OS_REVISION: 0
  240.  
  241. SUITE_MASK: 272
  242.  
  243. PRODUCT_TYPE: 1
  244.  
  245. OSPLATFORM_TYPE: x64
  246.  
  247. OSNAME: Windows 10
  248.  
  249. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  250.  
  251. OS_LOCALE:
  252.  
  253. USER_LCID: 0
  254.  
  255. OSBUILD_TIMESTAMP: 1998-05-31 02:42:57
  256.  
  257. BUILDDATESTAMP_STR: 190318-1202
  258.  
  259. BUILDLAB_STR: 19h1_release
  260.  
  261. BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
  262.  
  263. ANALYSIS_SESSION_ELAPSED_TIME: 475f7
  264.  
  265. ANALYSIS_SOURCE: KM
  266.  
  267. FAILURE_ID_HASH_STRING: km:av_npfs!npwritedataqueue
  268.  
  269. FAILURE_ID_HASH: {460f143d-7892-e61d-c145-2a74b8eb0d99}
  270.  
  271. Followup: MachineOwner
  272. ---------
Add Comment
Please, Sign In to add comment