Advertisement
Guest User

Untitled

a guest
Nov 13th, 2019
201
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.75 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.19494.1001 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [E:\111219-5015-01.dmp]
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8.  
  9. Symbol search path is: srv*
  10. Executable search path is:
  11. Windows 10 Kernel Version 18362 MP (12 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  13. Built by: 18362.1.amd64fre.19h1_release.190318-1202
  14. Machine Name:
  15. Kernel base = 0xfffff802`16000000 PsLoadedModuleList = 0xfffff802`164480b0
  16. Debug session time: Tue Nov 12 13:51:33.845 2019 (UTC - 7:00)
  17. System Uptime: 0 days 0:50:36.606
  18. Loading Kernel Symbols
  19. ...............................................................
  20. ................................................................
  21. ................................................................
  22. .......
  23. Loading User Symbols
  24. Loading unloaded module list
  25. ...........
  26. For analysis of this file, run !analyze -v
  27. nt!KeBugCheckEx:
  28. fffff802`161c1410 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe780`44df1610=000000000000000a
  29. 10: kd> !analyze -v
  30. *******************************************************************************
  31. * *
  32. * Bugcheck Analysis *
  33. * *
  34. *******************************************************************************
  35.  
  36. IRQL_NOT_LESS_OR_EQUAL (a)
  37. An attempt was made to access a pageable (or completely invalid) address at an
  38. interrupt request level (IRQL) that is too high. This is usually
  39. caused by drivers using improper addresses.
  40. If a kernel debugger is available get the stack backtrace.
  41. Arguments:
  42. Arg1: ffffe78040df1d38, memory referenced
  43. Arg2: 000000000000000d, IRQL
  44. Arg3: 0000000000000001, bitfield :
  45. bit 0 : value 0 = read operation, 1 = write operation
  46. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  47. Arg4: fffff8021601e906, address which referenced memory
  48.  
  49. Debugging Details:
  50. ------------------
  51.  
  52. *** WARNING: Unable to verify timestamp for win32k.sys
  53.  
  54. KEY_VALUES_STRING: 1
  55.  
  56. Key : Analysis.CPU.Sec
  57. Value: 2
  58.  
  59. Key : Analysis.DebugAnalysisProvider.CPP
  60. Value: Create: 8007007e on W18132
  61.  
  62. Key : Analysis.DebugData
  63. Value: CreateObject
  64.  
  65. Key : Analysis.DebugModel
  66. Value: CreateObject
  67.  
  68. Key : Analysis.Elapsed.Sec
  69. Value: 13
  70.  
  71. Key : Analysis.Memory.CommitPeak.Mb
  72. Value: 71
  73.  
  74. Key : Analysis.System
  75. Value: CreateObject
  76.  
  77.  
  78. BUGCHECK_CODE: a
  79.  
  80. BUGCHECK_P1: ffffe78040df1d38
  81.  
  82. BUGCHECK_P2: d
  83.  
  84. BUGCHECK_P3: 1
  85.  
  86. BUGCHECK_P4: fffff8021601e906
  87.  
  88. WRITE_ADDRESS: fffff802165733b8: Unable to get MiVisibleState
  89. Unable to get NonPagedPoolStart
  90. Unable to get NonPagedPoolEnd
  91. Unable to get PagedPoolStart
  92. Unable to get PagedPoolEnd
  93. fffff8021642a3d8: Unable to get Flags value from nt!KdVersionBlock
  94. fffff8021642a3d8: Unable to get Flags value from nt!KdVersionBlock
  95. unable to get nt!MmSpecialPagesInUse
  96. ffffe78040df1d38
  97.  
  98. CUSTOMER_CRASH_COUNT: 1
  99.  
  100. PROCESS_NAME: System
  101.  
  102. TRAP_FRAME: ffffe78044df1750 -- (.trap 0xffffe78044df1750)
  103. NOTE: The trap frame does not contain all registers.
  104. Some register values may be zeroed or incorrect.
  105. rax=000000000000000b rbx=0000000000000000 rcx=000000000000000a
  106. rdx=ffffe78044df1ce8 rsi=0000000000000000 rdi=0000000000000000
  107. rip=fffff8021601e906 rsp=ffffe78044df18e0 rbp=ffffe78044df19e0
  108. r8=0000000000000008 r9=0000000000000000 r10=0000000711f535dc
  109. r11=ffffe78044df1b68 r12=0000000000000000 r13=0000000000000000
  110. r14=0000000000000000 r15=0000000000000000
  111. iopl=0 nv up ei pl nz na pe cy
  112. nt!KiForwardTick+0x1c6:
  113. fffff802`1601e906 488974cb08 mov qword ptr [rbx+rcx*8+8],rsi ds:00000000`00000058=????????????????
  114. Resetting default scope
  115.  
  116. STACK_TEXT:
  117. ffffe780`44df1608 fffff802`161d32e9 : 00000000`0000000a ffffe780`40df1d38 00000000`0000000d 00000000`00000001 : nt!KeBugCheckEx
  118. ffffe780`44df1610 fffff802`161cf62b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
  119. ffffe780`44df1750 fffff802`1601e906 : ffffe780`44df1ce0 ffffe780`44df19e0 ffffe780`44df19e0 00000000`00000000 : nt!KiPageFault+0x46b
  120. ffffe780`44df18e0 fffff802`1601f4eb : fffff780`00000320 ffffe780`44dd2100 00000000`00000001 00000000`00000000 : nt!KiForwardTick+0x1c6
  121. ffffe780`44df1b70 fffff802`16ab74b7 : ffffe780`44dd2180 ffffd38a`b04bf9d0 ffffd38a`b04bfa50 00000000`00000000 : nt!KeClockInterruptNotify+0x85b
  122. ffffe780`44df1f30 fffff802`16002a25 : 00000007`120c67b2 ffffd68a`9670c800 ffffd68a`9670c8b0 ffffd418`93f4386c : hal!HalpTimerClockInterrupt+0xf7
  123. ffffe780`44df1f60 fffff802`161c2eaa : ffffd38a`b04bfa50 ffffd68a`9670c800 00000000`00000292 ffffd68a`9670c800 : nt!KiCallInterruptServiceRoutine+0xa5
  124. ffffe780`44df1fb0 fffff802`161c3417 : 00000000`00000002 ffffe780`44dd2180 ffffd38a`b04bfb00 00000000`00000001 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
  125. ffffd38a`b04bf9d0 fffff802`161c4f1e : 00000000`00000000 ffffe780`44dd2180 ffffd68a`a489b080 00000000`00000292 : nt!KiInterruptDispatchNoLockNoEtw+0x37
  126. ffffd38a`b04bfb60 00000000`00000000 : ffffd38a`b04c0000 ffffd38a`b04b9000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x4e
  127.  
  128.  
  129. SYMBOL_NAME: nt!KiForwardTick+1c6
  130.  
  131. MODULE_NAME: nt
  132.  
  133. IMAGE_NAME: ntkrnlmp.exe
  134.  
  135. IMAGE_VERSION: 10.0.18362.449
  136.  
  137. STACK_COMMAND: .thread ; .cxr ; kb
  138.  
  139. BUCKET_ID_FUNC_OFFSET: 1c6
  140.  
  141. FAILURE_BUCKET_ID: AV_nt!KiForwardTick
  142.  
  143. OS_VERSION: 10.0.18362.1
  144.  
  145. BUILDLAB_STR: 19h1_release
  146.  
  147. OSPLATFORM_TYPE: x64
  148.  
  149. OSNAME: Windows 10
  150.  
  151. FAILURE_ID_HASH: {44ec81eb-1a7a-f00b-efc2-cdb657c00a52}
  152.  
  153. Followup: MachineOwner
  154. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement