Advertisement
CarvedInside

Walczyk 2022/01/04 7:26 am

Jan 6th, 2022
75
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.45 KB | None | 0 0
  1. 10: kd> !analyze -v
  2. *******************************************************************************
  3. * *
  4. * Bugcheck Analysis *
  5. * *
  6. *******************************************************************************
  7.  
  8. DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
  9. An attempt was made to access a pageable (or completely invalid) address at an
  10. interrupt request level (IRQL) that is too high. This is usually
  11. caused by drivers using improper addresses.
  12. If kernel debugger is available get stack backtrace.
  13. Arguments:
  14. Arg1: 0000000000000000, memory referenced
  15. Arg2: 0000000000000002, IRQL
  16. Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
  17. Arg4: fffff805458f5895, address which referenced memory
  18.  
  19. Debugging Details:
  20. ------------------
  21.  
  22. Page 1382ef not present in the dump file. Type ".hh dbgerr004" for details
  23.  
  24. KEY_VALUES_STRING: 1
  25.  
  26. Key : Analysis.CPU.mSec
  27. Value: 3343
  28.  
  29. Key : Analysis.DebugAnalysisManager
  30. Value: Create
  31.  
  32. Key : Analysis.Elapsed.mSec
  33. Value: 6269
  34.  
  35. Key : Analysis.Init.CPU.mSec
  36. Value: 562
  37.  
  38. Key : Analysis.Init.Elapsed.mSec
  39. Value: 250271
  40.  
  41. Key : Analysis.Memory.CommitPeak.Mb
  42. Value: 91
  43.  
  44. Key : WER.OS.Branch
  45. Value: co_release
  46.  
  47. Key : WER.OS.Timestamp
  48. Value: 2021-06-04T16:28:00Z
  49.  
  50. Key : WER.OS.Version
  51. Value: 10.0.22000.1
  52.  
  53. FILE_IN_CAB: MEMORY.DMP
  54.  
  55. DUMP_FILE_ATTRIBUTES: 0x1000
  56.  
  57. BUGCHECK_CODE: d1
  58.  
  59. BUGCHECK_P1: 0
  60.  
  61. BUGCHECK_P2: 2
  62.  
  63. BUGCHECK_P3: 0
  64.  
  65. BUGCHECK_P4: fffff805458f5895
  66.  
  67. READ_ADDRESS: 0000000000000000
  68.  
  69. BLACKBOXBSD: 1 (!blackboxbsd)
  70.  
  71. BLACKBOXNTFS: 1 (!blackboxntfs)
  72.  
  73. BLACKBOXPNP: 1 (!blackboxpnp)
  74.  
  75. BLACKBOXWINLOGON: 1
  76.  
  77. PROCESS_NAME: svchost.exe
  78.  
  79. DPC_STACK_BASE: FFFFD702C2AAEFB0
  80.  
  81. TRAP_FRAME: ffffd702c2aae990 -- (.trap 0xffffd702c2aae990)
  82. NOTE: The trap frame does not contain all registers.
  83. Some register values may be zeroed or incorrect.
  84. rax=00000000c0000001 rbx=0000000000000000 rcx=0000000000000000
  85. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
  86. rip=fffff805458f5895 rsp=ffffd702c2aaeb20 rbp=ffffd702c2aaec99
  87. r8=0000000000000000 r9=0000000001d80128 r10=0000fffff8054577
  88. r11=ffffadfc05200000 r12=0000000000000000 r13=0000000000000000
  89. r14=0000000000000000 r15=0000000000000000
  90. iopl=0 nv up ei ng nz na pe nc
  91. cmudaxp+0x305895:
  92. fffff805`458f5895 488b01 mov rax,qword ptr [rcx] ds:00000000`00000000=????????????????
  93. Resetting default scope
  94.  
  95. STACK_TEXT:
  96. ffffd702`c2aae848 fffff805`376285a9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
  97. ffffd702`c2aae850 fffff805`37624700 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff805`3764f20a : nt!KiBugCheckDispatch+0x69
  98. ffffd702`c2aae990 fffff805`458f5895 : ffffa984`e36aa158 ffffa984`e36aa080 00000000`00000006 00000000`00000009 : nt!KiPageFault+0x440
  99. ffffd702`c2aaeb20 fffff805`45773fad : ffffa984`ce308740 00000000`00000000 00000000`00000000 00000000`00000080 : cmudaxp+0x305895
  100. ffffd702`c2aaeb70 fffff805`45779d67 : 00000000`00000006 ffffbe00`f7f7d180 ffffa984`ce308888 ffffd702`c2aaec99 : cmudaxp+0x183fad
  101. ffffd702`c2aaeba0 fffff805`374cc394 : 00000000`00000000 ffffa984`00000001 ffffd702`00000000 ffffbe00`00000002 : cmudaxp+0x189d67
  102. ffffd702`c2aaebd0 fffff805`374ca984 : 00000000`00000000 00000000`00000000 00000358`2813e9f1 fffff805`33442328 : nt!KiProcessExpiredTimerList+0x204
  103. ffffd702`c2aaed00 fffff805`3761d755 : 00000000`00000000 ffffbe00`f7f7d180 ffffa984`ccb1a500 00000000`00000058 : nt!KiRetireDpcList+0x714
  104. ffffd702`c2aaefb0 fffff805`3761d530 : fffff805`37611980 fffff805`3741356a 00000000`0000001c 0000015f`89e15000 : nt!KxRetireDpcList+0x5
  105. ffffd702`c63f0aa0 fffff805`3761cd75 : 00000000`00000058 fffff805`37617c11 00000000`00212440 00000000`00000000 : nt!KiDispatchInterruptContinue
  106. ffffd702`c63f0ad0 fffff805`37617c11 : 00000000`00212440 00000000`00000000 00000000`00000000 0000015f`89df7b90 : nt!KiDpcInterruptBypass+0x25
  107. ffffd702`c63f0ae0 00007ffc`01e62d4c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1
  108. 00000012`fe2fdc10 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`01e62d4c
  109.  
  110. SYMBOL_NAME: cmudaxp+305895
  111.  
  112. MODULE_NAME: cmudaxp
  113.  
  114. IMAGE_NAME: cmudaxp.sys
  115.  
  116. STACK_COMMAND: .cxr; .ecxr ; kb
  117.  
  118. BUCKET_ID_FUNC_OFFSET: 305895
  119.  
  120. FAILURE_BUCKET_ID: AV_cmudaxp!unknown_function
  121.  
  122. OS_VERSION: 10.0.22000.1
  123.  
  124. BUILDLAB_STR: co_release
  125.  
  126. OSPLATFORM_TYPE: x64
  127.  
  128. OSNAME: Windows 10
  129.  
  130. FAILURE_ID_HASH: {03686d51-1f48-1dca-e2e9-bc35f26d989f}
  131.  
  132. Followup: MachineOwner
  133. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement