Advertisement
Guest User

Untitled

a guest
Jul 22nd, 2022
35
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.94 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 10.0.22621.1 AMD64
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4.  
  5. Loading Dump File [E:\Desktop\072222-66296-01.dmp]
  6. Mini Kernel Dump File: Only registers and stack trace are available
  7.  
  8. Symbol search path is: srv*
  9. Executable search path is:
  10. Windows 10 Kernel Version 19041 MP (8 procs) Free x64
  11. Product: WinNt, suite: TerminalServer SingleUserTS
  12. Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
  13. Machine Name:
  14. Kernel base = 0xfffff802`2fe00000 PsLoadedModuleList = 0xfffff802`30a2a230
  15. Debug session time: Fri Jul 22 17:47:50.440 2022 (UTC + 3:00)
  16. System Uptime: 0 days 17:49:45.083
  17. Loading Kernel Symbols
  18. ...............................................................
  19. ................................................................
  20. ................................................................
  21. ...............
  22. Loading User Symbols
  23. Loading unloaded module list
  24. .................
  25. For analysis of this file, run !analyze -v
  26. 4: kd> !analyze -v
  27. *******************************************************************************
  28. * *
  29. * Bugcheck Analysis *
  30. * *
  31. *******************************************************************************
  32.  
  33. IRQL_NOT_LESS_OR_EQUAL (a)
  34. An attempt was made to access a pageable (or completely invalid) address at an
  35. interrupt request level (IRQL) that is too high. This is usually
  36. caused by drivers using improper addresses.
  37. If a kernel debugger is available get the stack backtrace.
  38. Arguments:
  39. Arg1: ffffffffffffffd0, memory referenced
  40. Arg2: 0000000000000002, IRQL
  41. Arg3: 0000000000000001, bitfield :
  42. bit 0 : value 0 = read operation, 1 = write operation
  43. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  44. Arg4: fffff80230033386, address which referenced memory
  45.  
  46. Debugging Details:
  47. ------------------
  48.  
  49. *** WARNING: Unable to verify timestamp for win32k.sys
  50.  
  51. KEY_VALUES_STRING: 1
  52.  
  53. Key : Analysis.CPU.mSec
  54. Value: 3405
  55.  
  56. Key : Analysis.DebugAnalysisManager
  57. Value: Create
  58.  
  59. Key : Analysis.Elapsed.mSec
  60. Value: 35813
  61.  
  62. Key : Analysis.Init.CPU.mSec
  63. Value: 2921
  64.  
  65. Key : Analysis.Init.Elapsed.mSec
  66. Value: 100570
  67.  
  68. Key : Analysis.Memory.CommitPeak.Mb
  69. Value: 91
  70.  
  71. Key : WER.OS.Branch
  72. Value: vb_release
  73.  
  74. Key : WER.OS.Timestamp
  75. Value: 2019-12-06T14:06:00Z
  76.  
  77. Key : WER.OS.Version
  78. Value: 10.0.19041.1
  79.  
  80.  
  81. FILE_IN_CAB: 072222-66296-01.dmp
  82.  
  83. BUGCHECK_CODE: a
  84.  
  85. BUGCHECK_P1: ffffffffffffffd0
  86.  
  87. BUGCHECK_P2: 2
  88.  
  89. BUGCHECK_P3: 1
  90.  
  91. BUGCHECK_P4: fffff80230033386
  92.  
  93. WRITE_ADDRESS: fffff80230afb390: Unable to get MiVisibleState
  94. Unable to get NonPagedPoolStart
  95. Unable to get NonPagedPoolEnd
  96. Unable to get PagedPoolStart
  97. Unable to get PagedPoolEnd
  98. unable to get nt!MmSpecialPagesInUse
  99. ffffffffffffffd0
  100.  
  101. BLACKBOXBSD: 1 (!blackboxbsd)
  102.  
  103.  
  104. BLACKBOXNTFS: 1 (!blackboxntfs)
  105.  
  106.  
  107. BLACKBOXPNP: 1 (!blackboxpnp)
  108.  
  109.  
  110. BLACKBOXWINLOGON: 1
  111.  
  112. CUSTOMER_CRASH_COUNT: 1
  113.  
  114. PROCESS_NAME: System
  115.  
  116. TRAP_FRAME: ffff9683c925f530 -- (.trap 0xffff9683c925f530)
  117. NOTE: The trap frame does not contain all registers.
  118. Some register values may be zeroed or incorrect.
  119. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
  120. rdx=00000000746c6644 rsi=0000000000000000 rdi=0000000000000000
  121. rip=fffff80230033386 rsp=ffff9683c925f6c0 rbp=0000000000000006
  122. r8=0000000000000002 r9=0000000001d89dda r10=fffff80230033340
  123. r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
  124. r14=0000000000000000 r15=0000000000000000
  125. iopl=0 nv up ei pl zr na po nc
  126. nt!ObfDereferenceObjectWithTag+0x26:
  127. fffff802`30033386 f0480fc15ed0 lock xadd qword ptr [rsi-30h],rbx ds:ffffffff`ffffffd0=????????????????
  128. Resetting default scope
  129.  
  130. STACK_TEXT:
  131. ffff9683`c925f3e8 fffff802`3020a569 : 00000000`0000000a ffffffff`ffffffd0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
  132. ffff9683`c925f3f0 fffff802`30206869 : 00000000`00000000 00000000`00000001 00000000`00000000 ffff8680`3f480100 : nt!KiBugCheckDispatch+0x69
  133. ffff9683`c925f530 fffff802`30033386 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
  134. ffff9683`c925f6c0 fffff802`3003334e : ffffc98c`20e8caf0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0x26
  135. ffff9683`c925f700 fffff802`4b52a218 : 00000000`00000001 ffff8680`3f480180 ffffc98c`0bf381e0 ffffc98c`185d6080 : nt!HalPutDmaAdapter+0xe
  136. ffff9683`c925f730 fffff802`4b52a190 : 00000000`00000000 ffffc98c`159b8de0 00000000`00000000 ffffc98c`0bff6080 : afd!AfdDerefPollInfoFileObjects+0x48
  137. ffff9683`c925f760 fffff802`4b52adee : 00000000`00000002 ffffc98c`20e8cb10 ffff8680`3f480180 ffff9683`c925fa10 : afd!AfdCompletePollIrp+0x74
  138. ffff9683`c925f7b0 fffff802`30022782 : ffffc98c`20e8cb50 ffff8680`3f480180 ffff8680`3f480180 00000000`00000002 : afd!AfdTimeoutPoll+0x2e
  139. ffff9683`c925f7e0 fffff802`300c9bfd : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00255c6a : nt!KiProcessExpiredTimerList+0x172
  140. ffff9683`c925f8d0 fffff802`301fc0fe : 00000000`00000000 ffff8680`3f480180 ffff8680`3f48b240 ffffc98c`0c0e60c0 : nt!KiRetireDpcList+0x5dd
  141. ffff9683`c925fb60 00000000`00000000 : ffff9683`c9260000 ffff9683`c9259000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
  142.  
  143.  
  144. SYMBOL_NAME: afd!AfdDerefPollInfoFileObjects+48
  145.  
  146. MODULE_NAME: afd
  147.  
  148. IMAGE_NAME: afd.sys
  149.  
  150. IMAGE_VERSION: 10.0.19041.1767
  151.  
  152. STACK_COMMAND: .cxr; .ecxr ; kb
  153.  
  154. BUCKET_ID_FUNC_OFFSET: 48
  155.  
  156. FAILURE_BUCKET_ID: AV_afd!AfdDerefPollInfoFileObjects
  157.  
  158. OS_VERSION: 10.0.19041.1
  159.  
  160. BUILDLAB_STR: vb_release
  161.  
  162. OSPLATFORM_TYPE: x64
  163.  
  164. OSNAME: Windows 10
  165.  
  166. FAILURE_ID_HASH: {9a846440-a090-65b4-c1d4-bc8c6183377b}
  167.  
  168. Followup: MachineOwner
  169.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement