Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ************* Preparing the environment for Debugger Extensions Gallery repositories **************
- ExtensionRepository : Implicit
- UseExperimentalFeatureForNugetShare : true
- AllowNugetExeUpdate : true
- NonInteractiveNuget : true
- AllowNugetMSCredentialProviderInstall : true
- AllowParallelInitializationOfLocalRepositories : true
- EnableRedirectToChakraJsProvider : false
- -- Configuring repositories
- ----> Repository : LocalInstalled, Enabled: true
- ----> Repository : UserExtensions, Enabled: true
- >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
- ************* Waiting for Debugger Extensions Gallery to Initialize **************
- >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.172 seconds
- ----> Repository : UserExtensions, Enabled: true, Packages count: 0
- ----> Repository : LocalInstalled, Enabled: true, Packages count: 42
- Microsoft (R) Windows Debugger Version 10.0.27668.1000 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Users\xxxxx\Documents\090824-11531-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 22621 MP (32 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Kernel base = 0xfffff801`35400000 PsLoadedModuleList = 0xfffff801`360134f0
- Debug session time: Sun Sep 8 01:13:55.481 2024 (UTC + 1:00)
- System Uptime: 2 days 9:05:45.734
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................................
- ................................................................
- Loading User Symbols
- PEB is paged out (Peb.Ldr = 00000000`0105d018). Type ".hh dbgerr001" for details
- Loading unloaded module list
- ..................................................
- For analysis of this file, run !analyze -v
- nt!KeBugCheckEx:
- fffff801`35815cb0 48894c2408 mov qword ptr [rsp+8],rcx ss:ffff9607`b4d0eed0=000000000000007a
- 10: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- KERNEL_DATA_INPAGE_ERROR (7a)
- The requested page of kernel data could not be read in. Typically caused by
- a bad block in the paging file or disk controller error. Also see
- KERNEL_STACK_INPAGE_ERROR.
- If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
- it means the disk subsystem has experienced a failure.
- If the error status is 0xC000009A, then it means the request failed because
- a filesystem failed to make forward progress.
- Arguments:
- Arg1: ffff80011a2d19c8, lock type that was held (value 1,2,3, or PTE address)
- Arg2: ffffffffc000000e, error status (normally i/o status code)
- Arg3: 0000000cc72db860, current process (virtual address for lock type 3, or PTE)
- Arg4: fffff8016ba0f00c, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
- Debugging Details:
- ------------------
- *** WARNING: Unable to verify timestamp for HTTP.sys
- PEB is paged out (Peb.Ldr = 00000000`0105d018). Type ".hh dbgerr001" for details
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 2686
- Key : Analysis.Elapsed.mSec
- Value: 7985
- Key : Analysis.IO.Other.Mb
- Value: 0
- Key : Analysis.IO.Read.Mb
- Value: 0
- Key : Analysis.IO.Write.Mb
- Value: 1
- Key : Analysis.Init.CPU.mSec
- Value: 249
- Key : Analysis.Init.Elapsed.mSec
- Value: 5122
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 89
- Key : Bugcheck.Code.LegacyAPI
- Value: 0x7a
- Key : Bugcheck.Code.TargetModel
- Value: 0x7a
- Key : Dump.Attributes.AsUlong
- Value: 1008
- Key : Dump.Attributes.DiagDataWrittenToHeader
- Value: 1
- Key : Dump.Attributes.ErrorCode
- Value: 0
- Key : Dump.Attributes.KernelGeneratedTriageDump
- Value: 1
- Key : Dump.Attributes.LastLine
- Value: Dump completed successfully.
- Key : Dump.Attributes.ProgressPercentage
- Value: 0
- Key : Failure.Bucket
- Value: 0x7a_c000000e_HTTP!unknown_function
- Key : Failure.Hash
- Value: {d781c069-abb4-aa0e-ee7b-ef9cf9904cce}
- BUGCHECK_CODE: 7a
- BUGCHECK_P1: ffff80011a2d19c8
- BUGCHECK_P2: ffffffffc000000e
- BUGCHECK_P3: cc72db860
- BUGCHECK_P4: fffff8016ba0f00c
- FILE_IN_CAB: 090824-11531-01.dmp
- DUMP_FILE_ATTRIBUTES: 0x1008
- Kernel Generated Triage Dump
- FAULTING_THREAD: ffffbe8d06056080
- ERROR_CODE: (NTSTATUS) 0xc000000e - A device which does not exist was specified.
- DISK_HARDWARE_ERROR: There was error with disk hardware
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: GameSDK.exe
- TRAP_FRAME: ffff9607b4d0f1f0 -- (.trap 0xffff9607b4d0f1f0)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=000000004c525443 rbx=0000000000000000 rcx=ffffbe8d0792ce10
- rdx=ffffbe8d115eeca0 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8016ba0f00c rsp=ffff9607b4d0f380 rbp=fffff8016b95eea0
- r8=ffffbe8d05d21450 r9=ffffbe8d0792ce10 r10=0000fffff8016ba0
- r11=ffff99781ea00000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz na pe cy
- HTTP+0x12f00c:
- fffff801`6ba0f00c ?? ???
- Resetting default scope
- STACK_TEXT:
- ffff9607`b4d0eec8 fffff801`358c78b3 : 00000000`0000007a ffff8001`1a2d19c8 ffffffff`c000000e 0000000c`c72db860 : nt!KeBugCheckEx
- ffff9607`b4d0eed0 fffff801`35743106 : 00000000`00000000 ffff9607`00000000 ffff9607`b4d0f078 fffff801`00000000 : nt!MiWaitForInPageComplete+0x184e63
- ffff9607`b4d0efd0 fffff801`35668071 : 00000000`c0033333 00000000`00000000 fffff801`6ba0f00c fffff801`6ba0f00c : nt!MiIssueHardFault+0x246
- ffff9607`b4d0f0d0 fffff801`35826f7e : ffffbe8d`05a020c0 ffffbe8d`05d21450 00000000`00000000 fffff801`358270ac : nt!MmAccessFault+0x331
- ffff9607`b4d0f1f0 fffff801`6ba0f00c : 00000000`00000010 00000000`00050217 ffff9607`b4d0f3a8 00000000`00000000 : nt!KiPageFault+0x37e
- ffff9607`b4d0f380 00000000`00000010 : 00000000`00050217 ffff9607`b4d0f3a8 00000000`00000000 ffffbe8d`115eeca0 : HTTP+0x12f00c
- ffff9607`b4d0f388 00000000`00050217 : ffff9607`b4d0f3a8 00000000`00000000 ffffbe8d`115eeca0 fffff801`35712655 : 0x10
- ffff9607`b4d0f390 ffff9607`b4d0f3a8 : 00000000`00000000 ffffbe8d`115eeca0 fffff801`35712655 ffffbe8d`05d21450 : 0x50217
- ffff9607`b4d0f398 00000000`00000000 : ffffbe8d`115eeca0 fffff801`35712655 ffffbe8d`05d21450 ffffbe8d`0792ce10 : 0xffff9607`b4d0f3a8
- SYMBOL_NAME: HTTP+12f00c
- MODULE_NAME: HTTP
- IMAGE_NAME: HTTP.sys
- STACK_COMMAND: .process /r /p 0xffffbe8d05a020c0; .thread 0xffffbe8d06056080 ; kb
- BUCKET_ID_FUNC_OFFSET: 12f00c
- FAILURE_BUCKET_ID: 0x7a_c000000e_HTTP!unknown_function
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {d781c069-abb4-aa0e-ee7b-ef9cf9904cce}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment