Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.19494.1001 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [E:\111219-5015-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 18362 MP (12 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 18362.1.amd64fre.19h1_release.190318-1202
- Machine Name:
- Kernel base = 0xfffff802`16000000 PsLoadedModuleList = 0xfffff802`164480b0
- Debug session time: Tue Nov 12 13:51:33.845 2019 (UTC - 7:00)
- System Uptime: 0 days 0:50:36.606
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................................
- .......
- Loading User Symbols
- Loading unloaded module list
- ...........
- For analysis of this file, run !analyze -v
- nt!KeBugCheckEx:
- fffff802`161c1410 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe780`44df1610=000000000000000a
- 10: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: ffffe78040df1d38, memory referenced
- Arg2: 000000000000000d, IRQL
- Arg3: 0000000000000001, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff8021601e906, address which referenced memory
- Debugging Details:
- ------------------
- *** WARNING: Unable to verify timestamp for win32k.sys
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.Sec
- Value: 2
- Key : Analysis.DebugAnalysisProvider.CPP
- Value: Create: 8007007e on W18132
- Key : Analysis.DebugData
- Value: CreateObject
- Key : Analysis.DebugModel
- Value: CreateObject
- Key : Analysis.Elapsed.Sec
- Value: 13
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 71
- Key : Analysis.System
- Value: CreateObject
- BUGCHECK_CODE: a
- BUGCHECK_P1: ffffe78040df1d38
- BUGCHECK_P2: d
- BUGCHECK_P3: 1
- BUGCHECK_P4: fffff8021601e906
- WRITE_ADDRESS: fffff802165733b8: Unable to get MiVisibleState
- Unable to get NonPagedPoolStart
- Unable to get NonPagedPoolEnd
- Unable to get PagedPoolStart
- Unable to get PagedPoolEnd
- fffff8021642a3d8: Unable to get Flags value from nt!KdVersionBlock
- fffff8021642a3d8: Unable to get Flags value from nt!KdVersionBlock
- unable to get nt!MmSpecialPagesInUse
- ffffe78040df1d38
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: System
- TRAP_FRAME: ffffe78044df1750 -- (.trap 0xffffe78044df1750)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=000000000000000b rbx=0000000000000000 rcx=000000000000000a
- rdx=ffffe78044df1ce8 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8021601e906 rsp=ffffe78044df18e0 rbp=ffffe78044df19e0
- r8=0000000000000008 r9=0000000000000000 r10=0000000711f535dc
- r11=ffffe78044df1b68 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na pe cy
- nt!KiForwardTick+0x1c6:
- fffff802`1601e906 488974cb08 mov qword ptr [rbx+rcx*8+8],rsi ds:00000000`00000058=????????????????
- Resetting default scope
- STACK_TEXT:
- ffffe780`44df1608 fffff802`161d32e9 : 00000000`0000000a ffffe780`40df1d38 00000000`0000000d 00000000`00000001 : nt!KeBugCheckEx
- ffffe780`44df1610 fffff802`161cf62b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
- ffffe780`44df1750 fffff802`1601e906 : ffffe780`44df1ce0 ffffe780`44df19e0 ffffe780`44df19e0 00000000`00000000 : nt!KiPageFault+0x46b
- ffffe780`44df18e0 fffff802`1601f4eb : fffff780`00000320 ffffe780`44dd2100 00000000`00000001 00000000`00000000 : nt!KiForwardTick+0x1c6
- ffffe780`44df1b70 fffff802`16ab74b7 : ffffe780`44dd2180 ffffd38a`b04bf9d0 ffffd38a`b04bfa50 00000000`00000000 : nt!KeClockInterruptNotify+0x85b
- ffffe780`44df1f30 fffff802`16002a25 : 00000007`120c67b2 ffffd68a`9670c800 ffffd68a`9670c8b0 ffffd418`93f4386c : hal!HalpTimerClockInterrupt+0xf7
- ffffe780`44df1f60 fffff802`161c2eaa : ffffd38a`b04bfa50 ffffd68a`9670c800 00000000`00000292 ffffd68a`9670c800 : nt!KiCallInterruptServiceRoutine+0xa5
- ffffe780`44df1fb0 fffff802`161c3417 : 00000000`00000002 ffffe780`44dd2180 ffffd38a`b04bfb00 00000000`00000001 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
- ffffd38a`b04bf9d0 fffff802`161c4f1e : 00000000`00000000 ffffe780`44dd2180 ffffd68a`a489b080 00000000`00000292 : nt!KiInterruptDispatchNoLockNoEtw+0x37
- ffffd38a`b04bfb60 00000000`00000000 : ffffd38a`b04c0000 ffffd38a`b04b9000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x4e
- SYMBOL_NAME: nt!KiForwardTick+1c6
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- IMAGE_VERSION: 10.0.18362.449
- STACK_COMMAND: .thread ; .cxr ; kb
- BUCKET_ID_FUNC_OFFSET: 1c6
- FAILURE_BUCKET_ID: AV_nt!KiForwardTick
- OS_VERSION: 10.0.18362.1
- BUILDLAB_STR: 19h1_release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {44ec81eb-1a7a-f00b-efc2-cdb657c00a52}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement