Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.18914.1001 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\minidump\090119-5500-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 18362 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 18362.1.amd64fre.19h1_release.190318-1202
- Machine Name:
- Kernel base = 0xfffff802`30800000 PsLoadedModuleList = 0xfffff802`30c46490
- Debug session time: Sun Sep 1 12:44:38.294 2019 (UTC + 5:30)
- System Uptime: 0 days 1:43:57.968
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- .............................................
- Loading User Symbols
- Loading unloaded module list
- .................
- For analysis of this file, run !analyze -v
- nt!KeBugCheckEx:
- fffff802`309bfcc0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff830a`50a6f1d0=000000000000000a
- 0: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: 00000000ffffce85, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000000, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff80230842454, address which referenced memory
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.Sec
- Value: 15
- Key : Analysis.Elapsed.Sec
- Value: 292
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 70
- PROCESSES_ANALYSIS: 1
- SERVICE_ANALYSIS: 1
- STACKHASH_ANALYSIS: 1
- TIMELINE_ANALYSIS: 1
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
- SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
- SYSTEM_PRODUCT_NAME: MS-7B84
- SYSTEM_SKU: To be filled by O.E.M.
- SYSTEM_VERSION: 2.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 4.50
- BIOS_DATE: 08/05/2019
- BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
- BASEBOARD_PRODUCT: B450M PRO-M2 V2 (MS-7B84)
- BASEBOARD_VERSION: 2.0
- DUMP_TYPE: 2
- BUGCHECK_P1: ffffce85
- BUGCHECK_P2: 2
- BUGCHECK_P3: 0
- BUGCHECK_P4: fffff80230842454
- READ_ADDRESS: fffff80230d713b8: Unable to get MiVisibleState
- Unable to get NonPagedPoolStart
- Unable to get NonPagedPoolEnd
- Unable to get PagedPoolStart
- Unable to get PagedPoolEnd
- unable to get nt!MmSpecialPagesInUse
- 00000000ffffce85
- CURRENT_IRQL: 2
- FAULTING_IP:
- nt!RtlpHpVsContextAllocateInternal+204
- fffff802`30842454 3309 xor ecx,dword ptr [rcx]
- CPU_COUNT: 8
- CPU_MHZ: e74
- CPU_VENDOR: AuthenticAMD
- CPU_FAMILY: 17
- CPU_MODEL: 18
- CPU_STEPPING: 1
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: AV
- PROCESS_NAME: firefox.exe
- ANALYSIS_SESSION_HOST: DESKTOP-V7A5OU6
- ANALYSIS_SESSION_TIME: 09-01-2019 22:45:07.0857
- ANALYSIS_VERSION: 10.0.18914.1001 amd64fre
- TRAP_FRAME: ffff830a50a6f310 -- (.trap 0xffff830a50a6f310)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=00000000ffffce8d rbx=0000000000000000 rcx=00000000ffffce85
- rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff80230842454 rsp=ffff830a50a6f4a0 rbp=0000000000fa0000
- r8=ffffce8d9afe7038 r9=0000000000000000 r10=0000000000000000
- r11=000002a363c1e000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na po nc
- nt!RtlpHpVsContextAllocateInternal+0x204:
- fffff802`30842454 3309 xor ecx,dword ptr [rcx] ds:00000000`ffffce85=????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff802309d1ae9 to fffff802309bfcc0
- STACK_TEXT:
- ffff830a`50a6f1c8 fffff802`309d1ae9 : 00000000`0000000a 00000000`ffffce85 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
- ffff830a`50a6f1d0 fffff802`309cde2b : ffffce8d`9924ffb0 ffff830a`50a6f3c9 fffff802`30800000 fffff802`30833206 : nt!KiBugCheckDispatch+0x69
- ffff830a`50a6f310 fffff802`30842454 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x46b
- ffff830a`50a6f4a0 fffff802`30832bae : fffff802`000000fa 00000000`00000f80 fffff802`00000f80 ffffce8d`8b010000 : nt!RtlpHpVsContextAllocateInternal+0x204
- ffff830a`50a6f510 fffff802`30b6d06d : 00000000`00000200 00000000`00000000 00000000`00000000 00000000`00000f60 : nt!ExAllocateHeapPool+0xc0e
- ffff830a`50a6f650 fffff802`3ff5dfeb : ffff850b`b20c4298 00000000`00000000 00000000`00000f60 fffff802`00000000 : nt!ExAllocatePoolWithTag+0x5d
- ffff830a`50a6f6a0 fffff802`3ff5dd4c : ffff850b`b20c4200 ffffce8d`00000000 000002a3`63c1e000 00000000`00000f60 : Npfs!NpWriteDataQueue+0x11b
- ffff830a`50a6f710 fffff802`3ff5db7d : ffffce8d`9bb2a6f0 000002a3`63c1e000 00000000`00000000 ffffce8d`910c8080 : Npfs!NpCommonWrite+0x14c
- ffff830a`50a6f7a0 fffff802`30831819 : ffffce8d`8e888d20 ffffce8d`910c81c0 ffffce8d`8e888d20 ffffce8d`9bb2a6f0 : Npfs!NpFsdWrite+0x6d
- ffff830a`50a6f810 fffff802`34ae3f48 : 00000000`00000000 fffff802`34ae3f48 00000000`00000022 00000000`00000000 : nt!IofCallDriver+0x59
- ffff830a`50a6f850 fffff802`30831819 : ffffce8d`9bb2a6f0 ffffce8d`8c9d1201 ffffce8d`92cbab00 ffffce8d`00000000 : FLTMGR!FltpDispatch+0xe8
- ffff830a`50a6f8b0 fffff802`30de7215 : ffffce8d`9bb2a6f0 00000000`00000000 ffffce8d`9bb2a6f0 fffff802`30e43861 : nt!IofCallDriver+0x59
- ffff830a`50a6f8f0 fffff802`30e435c6 : ffff850b`00000000 ffffce8d`8e888d20 ffffce8d`8c9d1210 ffff830a`50a6fb80 : nt!IopSynchronousServiceTail+0x1a5
- ffff830a`50a6f990 fffff802`309d1518 : ffffce8d`910c8080 00000000`00000000 00000000`00000000 000002a3`62490038 : nt!NtWriteFile+0x676
- ffff830a`50a6fa90 00007ffd`d4edc164 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
- 000000e2`0a1ff5b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`d4edc164
- THREAD_SHA1_HASH_MOD_FUNC: 00081a118bc5772486a05fb94eb915475a616cf6
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e1651bd15d48fe6aa1846bb4c8a49a0517e13d0f
- THREAD_SHA1_HASH_MOD: a39b2791c4610cb985115f423d2eeffb85484021
- FOLLOWUP_IP:
- Npfs!NpWriteDataQueue+11b
- fffff802`3ff5dfeb 4c8bf8 mov r15,rax
- FAULT_INSTR_CODE: 48f88b4c
- SYMBOL_STACK_INDEX: 6
- SYMBOL_NAME: Npfs!NpWriteDataQueue+11b
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: Npfs
- IMAGE_NAME: Npfs.SYS
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- IMAGE_VERSION: 10.0.18362.1028
- STACK_COMMAND: .thread ; .cxr ; kb
- BUCKET_ID_FUNC_OFFSET: 11b
- FAILURE_BUCKET_ID: AV_Npfs!NpWriteDataQueue
- BUCKET_ID: AV_Npfs!NpWriteDataQueue
- PRIMARY_PROBLEM_CLASS: AV_Npfs!NpWriteDataQueue
- TARGET_TIME: 2019-09-01T07:14:38.000Z
- OSBUILD: 18362
- OSSERVICEPACK: 295
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- OS_LOCALE:
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 1998-05-31 02:42:57
- BUILDDATESTAMP_STR: 190318-1202
- BUILDLAB_STR: 19h1_release
- BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
- ANALYSIS_SESSION_ELAPSED_TIME: 475f7
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:av_npfs!npwritedataqueue
- FAILURE_ID_HASH: {460f143d-7892-e61d-c145-2a74b8eb0d99}
- Followup: MachineOwner
- ---------
Add Comment
Please, Sign In to add comment