Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 10: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If kernel debugger is available get stack backtrace.
- Arguments:
- Arg1: 0000000000000000, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
- Arg4: fffff805458f5895, address which referenced memory
- Debugging Details:
- ------------------
- Page 1382ef not present in the dump file. Type ".hh dbgerr004" for details
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 3343
- Key : Analysis.DebugAnalysisManager
- Value: Create
- Key : Analysis.Elapsed.mSec
- Value: 6269
- Key : Analysis.Init.CPU.mSec
- Value: 562
- Key : Analysis.Init.Elapsed.mSec
- Value: 250271
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 91
- Key : WER.OS.Branch
- Value: co_release
- Key : WER.OS.Timestamp
- Value: 2021-06-04T16:28:00Z
- Key : WER.OS.Version
- Value: 10.0.22000.1
- FILE_IN_CAB: MEMORY.DMP
- DUMP_FILE_ATTRIBUTES: 0x1000
- BUGCHECK_CODE: d1
- BUGCHECK_P1: 0
- BUGCHECK_P2: 2
- BUGCHECK_P3: 0
- BUGCHECK_P4: fffff805458f5895
- READ_ADDRESS: 0000000000000000
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- PROCESS_NAME: svchost.exe
- DPC_STACK_BASE: FFFFD702C2AAEFB0
- TRAP_FRAME: ffffd702c2aae990 -- (.trap 0xffffd702c2aae990)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=00000000c0000001 rbx=0000000000000000 rcx=0000000000000000
- rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff805458f5895 rsp=ffffd702c2aaeb20 rbp=ffffd702c2aaec99
- r8=0000000000000000 r9=0000000001d80128 r10=0000fffff8054577
- r11=ffffadfc05200000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz na pe nc
- cmudaxp+0x305895:
- fffff805`458f5895 488b01 mov rax,qword ptr [rcx] ds:00000000`00000000=????????????????
- Resetting default scope
- STACK_TEXT:
- ffffd702`c2aae848 fffff805`376285a9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
- ffffd702`c2aae850 fffff805`37624700 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff805`3764f20a : nt!KiBugCheckDispatch+0x69
- ffffd702`c2aae990 fffff805`458f5895 : ffffa984`e36aa158 ffffa984`e36aa080 00000000`00000006 00000000`00000009 : nt!KiPageFault+0x440
- ffffd702`c2aaeb20 fffff805`45773fad : ffffa984`ce308740 00000000`00000000 00000000`00000000 00000000`00000080 : cmudaxp+0x305895
- ffffd702`c2aaeb70 fffff805`45779d67 : 00000000`00000006 ffffbe00`f7f7d180 ffffa984`ce308888 ffffd702`c2aaec99 : cmudaxp+0x183fad
- ffffd702`c2aaeba0 fffff805`374cc394 : 00000000`00000000 ffffa984`00000001 ffffd702`00000000 ffffbe00`00000002 : cmudaxp+0x189d67
- ffffd702`c2aaebd0 fffff805`374ca984 : 00000000`00000000 00000000`00000000 00000358`2813e9f1 fffff805`33442328 : nt!KiProcessExpiredTimerList+0x204
- ffffd702`c2aaed00 fffff805`3761d755 : 00000000`00000000 ffffbe00`f7f7d180 ffffa984`ccb1a500 00000000`00000058 : nt!KiRetireDpcList+0x714
- ffffd702`c2aaefb0 fffff805`3761d530 : fffff805`37611980 fffff805`3741356a 00000000`0000001c 0000015f`89e15000 : nt!KxRetireDpcList+0x5
- ffffd702`c63f0aa0 fffff805`3761cd75 : 00000000`00000058 fffff805`37617c11 00000000`00212440 00000000`00000000 : nt!KiDispatchInterruptContinue
- ffffd702`c63f0ad0 fffff805`37617c11 : 00000000`00212440 00000000`00000000 00000000`00000000 0000015f`89df7b90 : nt!KiDpcInterruptBypass+0x25
- ffffd702`c63f0ae0 00007ffc`01e62d4c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1
- 00000012`fe2fdc10 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`01e62d4c
- SYMBOL_NAME: cmudaxp+305895
- MODULE_NAME: cmudaxp
- IMAGE_NAME: cmudaxp.sys
- STACK_COMMAND: .cxr; .ecxr ; kb
- BUCKET_ID_FUNC_OFFSET: 305895
- FAILURE_BUCKET_ID: AV_cmudaxp!unknown_function
- OS_VERSION: 10.0.22000.1
- BUILDLAB_STR: co_release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {03686d51-1f48-1dca-e2e9-bc35f26d989f}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement