Guest User

Untitled

a guest
Nov 12th, 2024
43
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.25 KB | None | 0 0
  1. IRQL_NOT_LESS_OR_EQUAL (a)
  2. An attempt was made to access a pageable (or completely invalid) address at an
  3. interrupt request level (IRQL) that is too high. This is usually
  4. caused by drivers using improper addresses.
  5. If a kernel debugger is available get the stack backtrace.
  6. Arguments:
  7. Arg1: fffffc7e3f00f000, memory referenced
  8. Arg2: 0000000000000002, IRQL
  9. Arg3: 0000000000000000, bitfield :
  10. bit 0 : value 0 = read operation, 1 = write operation
  11. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  12. Arg4: fffff804a4389471, address which referenced memory
  13.  
  14. Debugging Details:
  15. ------------------
  16.  
  17.  
  18. KEY_VALUES_STRING: 1
  19.  
  20. Key : Analysis.CPU.mSec
  21. Value: 1765
  22.  
  23. Key : Analysis.Elapsed.mSec
  24. Value: 4367
  25.  
  26. Key : Analysis.IO.Other.Mb
  27. Value: 2
  28.  
  29. Key : Analysis.IO.Read.Mb
  30. Value: 1
  31.  
  32. Key : Analysis.IO.Write.Mb
  33. Value: 23
  34.  
  35. Key : Analysis.Init.CPU.mSec
  36. Value: 390
  37.  
  38. Key : Analysis.Init.Elapsed.mSec
  39. Value: 18726
  40.  
  41. Key : Analysis.Memory.CommitPeak.Mb
  42. Value: 89
  43.  
  44. Key : Analysis.Version.DbgEng
  45. Value: 10.0.27725.1000
  46.  
  47. Key : Analysis.Version.Description
  48. Value: 10.2408.27.01 amd64fre
  49.  
  50. Key : Analysis.Version.Ext
  51. Value: 1.2408.27.1
  52.  
  53. Key : Bugcheck.Code.LegacyAPI
  54. Value: 0xa
  55.  
  56. Key : Bugcheck.Code.TargetModel
  57. Value: 0xa
  58.  
  59. Key : Dump.Attributes.AsUlong
  60. Value: 21808
  61.  
  62. Key : Dump.Attributes.DiagDataWrittenToHeader
  63. Value: 1
  64.  
  65. Key : Dump.Attributes.ErrorCode
  66. Value: 0
  67.  
  68. Key : Dump.Attributes.KernelGeneratedTriageDump
  69. Value: 1
  70.  
  71. Key : Dump.Attributes.LastLine
  72. Value: Dump completed successfully.
  73.  
  74. Key : Dump.Attributes.ProgressPercentage
  75. Value: 0
  76.  
  77. Key : Failure.Bucket
  78. Value: AV_nt!MiLockPageTableInternal
  79.  
  80. Key : Failure.Hash
  81. Value: {ec75f940-be6d-bedd-fb38-d04291f99c16}
  82.  
  83. Key : Hypervisor.Enlightenments.ValueHex
  84. Value: 7497cf94
  85.  
  86. Key : Hypervisor.Flags.AnyHypervisorPresent
  87. Value: 1
  88.  
  89. Key : Hypervisor.Flags.ApicEnlightened
  90. Value: 1
  91.  
  92. Key : Hypervisor.Flags.ApicVirtualizationAvailable
  93. Value: 0
  94.  
  95. Key : Hypervisor.Flags.AsyncMemoryHint
  96. Value: 0
  97.  
  98. Key : Hypervisor.Flags.CoreSchedulerRequested
  99. Value: 0
  100.  
  101. Key : Hypervisor.Flags.CpuManager
  102. Value: 1
  103.  
  104. Key : Hypervisor.Flags.DeprecateAutoEoi
  105. Value: 0
  106.  
  107. Key : Hypervisor.Flags.DynamicCpuDisabled
  108. Value: 1
  109.  
  110. Key : Hypervisor.Flags.Epf
  111. Value: 0
  112.  
  113. Key : Hypervisor.Flags.ExtendedProcessorMasks
  114. Value: 1
  115.  
  116. Key : Hypervisor.Flags.HardwareMbecAvailable
  117. Value: 1
  118.  
  119. Key : Hypervisor.Flags.MaxBankNumber
  120. Value: 0
  121.  
  122. Key : Hypervisor.Flags.MemoryZeroingControl
  123. Value: 0
  124.  
  125. Key : Hypervisor.Flags.NoExtendedRangeFlush
  126. Value: 0
  127.  
  128. Key : Hypervisor.Flags.NoNonArchCoreSharing
  129. Value: 1
  130.  
  131. Key : Hypervisor.Flags.Phase0InitDone
  132. Value: 1
  133.  
  134. Key : Hypervisor.Flags.PowerSchedulerQos
  135. Value: 0
  136.  
  137. Key : Hypervisor.Flags.RootScheduler
  138. Value: 0
  139.  
  140. Key : Hypervisor.Flags.SynicAvailable
  141. Value: 1
  142.  
  143. Key : Hypervisor.Flags.UseQpcBias
  144. Value: 0
  145.  
  146. Key : Hypervisor.Flags.Value
  147. Value: 38408431
  148.  
  149. Key : Hypervisor.Flags.ValueHex
  150. Value: 24a10ef
  151.  
  152. Key : Hypervisor.Flags.VpAssistPage
  153. Value: 1
  154.  
  155. Key : Hypervisor.Flags.VsmAvailable
  156. Value: 1
  157.  
  158. Key : Hypervisor.RootFlags.AccessStats
  159. Value: 1
  160.  
  161. Key : Hypervisor.RootFlags.CrashdumpEnlightened
  162. Value: 1
  163.  
  164. Key : Hypervisor.RootFlags.CreateVirtualProcessor
  165. Value: 1
  166.  
  167. Key : Hypervisor.RootFlags.DisableHyperthreading
  168. Value: 0
  169.  
  170. Key : Hypervisor.RootFlags.HostTimelineSync
  171. Value: 1
  172.  
  173. Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
  174. Value: 0
  175.  
  176. Key : Hypervisor.RootFlags.IsHyperV
  177. Value: 1
  178.  
  179. Key : Hypervisor.RootFlags.LivedumpEnlightened
  180. Value: 1
  181.  
  182. Key : Hypervisor.RootFlags.MapDeviceInterrupt
  183. Value: 1
  184.  
  185. Key : Hypervisor.RootFlags.MceEnlightened
  186. Value: 1
  187.  
  188. Key : Hypervisor.RootFlags.Nested
  189. Value: 0
  190.  
  191. Key : Hypervisor.RootFlags.StartLogicalProcessor
  192. Value: 1
  193.  
  194. Key : Hypervisor.RootFlags.Value
  195. Value: 1015
  196.  
  197. Key : Hypervisor.RootFlags.ValueHex
  198. Value: 3f7
  199.  
  200.  
  201. BUGCHECK_CODE: a
  202.  
  203. BUGCHECK_P1: fffffc7e3f00f000
  204.  
  205. BUGCHECK_P2: 2
  206.  
  207. BUGCHECK_P3: 0
  208.  
  209. BUGCHECK_P4: fffff804a4389471
  210.  
  211. FILE_IN_CAB: 111224-18312-01.dmp
  212.  
  213. TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
  214.  
  215.  
  216. DUMP_FILE_ATTRIBUTES: 0x21808
  217. Kernel Generated Triage Dump
  218.  
  219. FAULTING_THREAD: ffffe60ddb7bd0c0
  220.  
  221. READ_ADDRESS: fffff804a4fc34b0: Unable to get MiVisibleState
  222. Unable to get NonPagedPoolStart
  223. Unable to get NonPagedPoolEnd
  224. Unable to get PagedPoolStart
  225. Unable to get PagedPoolEnd
  226. unable to get nt!MmSpecialPagesInUse
  227. fffffc7e3f00f000
  228.  
  229. BLACKBOXBSD: 1 (!blackboxbsd)
  230.  
  231.  
  232. BLACKBOXNTFS: 1 (!blackboxntfs)
  233.  
  234.  
  235. BLACKBOXPNP: 1 (!blackboxpnp)
  236.  
  237.  
  238. BLACKBOXWINLOGON: 1
  239.  
  240. CUSTOMER_CRASH_COUNT: 1
  241.  
  242. PROCESS_NAME: VALORANT-Win64
  243.  
  244. TRAP_FRAME: ffffd50c3c29e730 -- (.trap 0xffffd50c3c29e730)
  245. NOTE: The trap frame does not contain all registers.
  246. Some register values may be zeroed or incorrect.
  247. rax=0000000000020000 rbx=0000000000000000 rcx=ffffe60df5c134c0
  248. rdx=ffffe60df5c134c0 rsi=0000000000000000 rdi=0000000000000000
  249. rip=fffff804a4389471 rsp=ffffd50c3c29e8c0 rbp=ffffe60df5c134c0
  250. r8=fffffc7e3f1f8000 r9=fffffc7e3f1f8fff r10=0000004000000000
  251. r11=ffff7f78eae00000 r12=0000000000000000 r13=0000000000000000
  252. r14=0000000000000000 r15=0000000000000000
  253. iopl=0 nv up ei pl zr na po nc
  254. nt!MiLockPageTableInternal+0x121:
  255. fffff804`a4389471 488b1e mov rbx,qword ptr [rsi] ds:00000000`00000000=????????????????
  256. Resetting default scope
  257.  
  258. STACK_TEXT:
  259. ffffd50c`3c29e5e8 fffff804`a468a9e9 : 00000000`0000000a fffffc7e`3f00f000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
  260. ffffd50c`3c29e5f0 fffff804`a4685ca8 : ffffffff`00000001 ffffffff`ffffff72 fffffc7e`00617000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
  261. ffffd50c`3c29e730 fffff804`a4389471 : ffffd50c`3c29eb10 fffff804`a438891d ffffa180`0d964a60 fffff804`a42ea98c : nt!KiPageFault+0x468
  262. ffffd50c`3c29e8c0 fffff804`a438933b : fffffc03`80000000 00000000`00020000 fffffc00`00000000 ffffa180`15d85b20 : nt!MiLockPageTableInternal+0x121
  263. ffffd50c`3c29e910 fffff804`a4388864 : ffffd50c`3c29ea50 00000000`00000000 ffffa180`0d964a60 fffffc03`80000000 : nt!MiTryLockPageTableUnordered+0xf
  264. ffffd50c`3c29e940 fffff804`a438701f : 00000000`00020000 00000000`00000000 ffffa180`0d964a60 00000000`00020000 : nt!MiLockActivePageTableInList+0x60
  265. ffffd50c`3c29e980 fffff804`a44934cb : 00000000`00000000 00000000`00000000 00000000`00000200 ffff0001`00000414 : nt!MiFastTrimWorkingSet+0x63
  266. ffffd50c`3c29ea10 fffff804`a447b59f : 00000000`00000000 ffffe60d`f5c134c0 00000000`00000000 00000000`001f3fc5 : nt!MiTrimWorkingSet+0x1eb
  267. ffffd50c`3c29ec70 fffff804`a4446e3f : ffffe60d`f5c134c0 ffffffff`ffffffff ffffffff`ffffffff e60df5c1`3090fffd : nt!MiEmptyWorkingSetInitiate+0x103
  268. ffffd50c`3c29ed90 fffff804`a49855cc : 00000000`00000001 ffffd50c`3c29f4e0 ffffd50c`3c29ef08 00000000`00000000 : nt!MmAdjustWorkingSetSizeEx+0xcb
  269. ffffd50c`3c29ee10 fffff804`a496097c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000008 : nt!PspSetQuotaLimits+0x330
  270. ffffd50c`3c29ef70 fffff804`a468a058 : 000001af`1af14568 00000000`00004e38 ffffe60d`db7bd0c0 00000000`001f0fff : nt!NtSetInformationProcess+0xf2c
  271. ffffd50c`3c29f460 00007ffb`6903f9e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
  272. 0000009e`f9dfeb48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`6903f9e4
  273.  
  274.  
  275. SYMBOL_NAME: nt!MiLockPageTableInternal+121
  276.  
  277. MODULE_NAME: nt
  278.  
  279. IMAGE_VERSION: 10.0.26100.2161
  280.  
  281. STACK_COMMAND: .process /r /p 0xffffe60ddb5ce0c0; .thread 0xffffe60ddb7bd0c0 ; kb
  282.  
  283. IMAGE_NAME: ntkrnlmp.exe
  284.  
  285. BUCKET_ID_FUNC_OFFSET: 121
  286.  
  287. FAILURE_BUCKET_ID: AV_nt!MiLockPageTableInternal
  288.  
  289. OSPLATFORM_TYPE: x64
  290.  
  291. OSNAME: Windows 10
  292.  
  293. FAILURE_ID_HASH: {ec75f940-be6d-bedd-fb38-d04291f99c16}
  294.  
  295. Followup: MachineOwner
  296. ---------
Add Comment
Please, Sign In to add comment