Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.22000.194 X86
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\Minidump\011122-4593-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 19041 MP (12 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
- Machine Name:
- Kernel base = 0xfffff805`07400000 PsLoadedModuleList = 0xfffff805`0802a1b0
- Debug session time: Tue Jan 11 20:24:20.511 2022 (UTC - 5:00)
- System Uptime: 0 days 0:22:46.130
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ..............................................................
- Loading User Symbols
- Loading unloaded module list
- .......
- For analysis of this file, run !analyze -v
- 4: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: 0000000000006638, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000001, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff805076b1a89, address which referenced memory
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 3311
- Key : Analysis.DebugAnalysisManager
- Value: Create
- Key : Analysis.Elapsed.mSec
- Value: 5912
- Key : Analysis.Init.CPU.mSec
- Value: 1093
- Key : Analysis.Init.Elapsed.mSec
- Value: 9554
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 84
- Key : WER.OS.Branch
- Value: vb_release
- Key : WER.OS.Timestamp
- Value: 2019-12-06T14:06:00Z
- Key : WER.OS.Version
- Value: 10.0.19041.1
- BUGCHECK_CODE: a
- BUGCHECK_P1: 6638
- BUGCHECK_P2: 2
- BUGCHECK_P3: 1
- BUGCHECK_P4: fffff805076b1a89
- WRITE_ADDRESS: fffff805080fb390: Unable to get MiVisibleState
- Unable to get NonPagedPoolStart
- Unable to get NonPagedPoolEnd
- Unable to get PagedPoolStart
- Unable to get PagedPoolEnd
- unable to get nt!MmSpecialPagesInUse
- 0000000000006638
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: Gunfire Reborn.exe
- TRAP_FRAME: ffff8a0ba007d430 -- (.trap 0xffff8a0ba007d430)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000006638 rbx=0000000000000000 rcx=ffff8a0ba007d910
- rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff805076b1a89 rsp=ffff8a0ba007d5c0 rbp=ffff8a0ba007d6c0
- r8=ffffe93ffdba6638 r9=ffffe93ffdba6638 r10=0000000000000000
- r11=ffffe974ba5d2000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- nt!MiQueryAddressState+0x8f9:
- fffff805`076b1a89 0900 or dword ptr [rax],eax ds:00000000`00006638=????????
- Resetting default scope
- MISALIGNED_IP:
- nt!MiQueryAddressState+8f9
- fffff805`076b1a89 0900 or dword ptr [rax],eax
- STACK_TEXT:
- ffff8a0b`a007d2e8 fffff805`07809069 : 00000000`0000000a 00000000`00006638 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
- ffff8a0b`a007d2f0 fffff805`07805369 : 00000000`00000000 00000000`00000030 00000000`00000000 ffffb501`a7fe0180 : nt!KiBugCheckDispatch+0x69
- ffff8a0b`a007d430 fffff805`076b1a89 : 0000a007`d5c00000 00000000`00000000 ffff8a0b`a007d618 ffff8a0b`a007d614 : nt!KiPageFault+0x469
- ffff8a0b`a007d5c0 fffff805`0764b865 : 00000000`00000000 00007ffb`74cc6000 00007ffb`74cc6000 0000002a`91cceef0 : nt!MiQueryAddressState+0x8f9
- ffff8a0b`a007d7d0 fffff805`07a0020c : 00000000`00000000 00000000`00000000 ffff8d08`00000005 00000000`00000000 : nt!MiQueryAddressSpan+0x175
- ffff8a0b`a007d890 fffff805`079ff9b5 : ffff8d08`c9d6b080 ffffb501`a8240180 00000000`00000000 00000000`00000000 : nt!MmQueryVirtualMemory+0x83c
- ffff8a0b`a007da40 fffff805`07808ab8 : 00007ffb`5e783e89 0000002a`91ccedc0 ffff8d08`ba506260 ffffb501`a8240180 : nt!NtQueryVirtualMemory+0x25
- ffff8a0b`a007da90 00007ffb`bcacd1d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
- 0000002a`91cced78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`bcacd1d4
- SYMBOL_NAME: nt!MiQueryAddressState+8f9
- IMAGE_VERSION: 10.0.19041.1415
- STACK_COMMAND: .thread ; .cxr ; kb
- IMAGE_NAME: hardware
- MODULE_NAME: hardware
- FAILURE_BUCKET_ID: IP_MISALIGNED
- OS_VERSION: 10.0.19041.1
- BUILDLAB_STR: vb_release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement