Advertisement
Guest User

Untitled

a guest
Jun 27th, 2022
78
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.96 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 10.0.22621.1 AMD64
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4.  
  5. Loading Dump File [E:\Desktop\062822-75281-01.dmp]
  6. Mini Kernel Dump File: Only registers and stack trace are available
  7.  
  8. Symbol search path is: srv*
  9. Executable search path is:
  10. Windows 10 Kernel Version 19041 MP (8 procs) Free x64
  11. Product: WinNt, suite: TerminalServer SingleUserTS
  12. Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
  13. Machine Name:
  14. Kernel base = 0xfffff803`22800000 PsLoadedModuleList = 0xfffff803`2342a2b0
  15. Debug session time: Mon Jun 27 22:45:37.026 2022 (UTC + 3:00)
  16. System Uptime: 2 days 7:02:11.669
  17. Loading Kernel Symbols
  18. ...............................................................
  19. ................................................................
  20. ................................................................
  21. ......................
  22. Loading User Symbols
  23. Loading unloaded module list
  24. .........................
  25. For analysis of this file, run !analyze -v
  26. 4: kd> !analyze -v
  27. *******************************************************************************
  28. * *
  29. * Bugcheck Analysis *
  30. * *
  31. *******************************************************************************
  32.  
  33. IRQL_NOT_LESS_OR_EQUAL (a)
  34. An attempt was made to access a pageable (or completely invalid) address at an
  35. interrupt request level (IRQL) that is too high. This is usually
  36. caused by drivers using improper addresses.
  37. If a kernel debugger is available get the stack backtrace.
  38. Arguments:
  39. Arg1: ffffffffffffffd0, memory referenced
  40. Arg2: 0000000000000002, IRQL
  41. Arg3: 0000000000000001, bitfield :
  42. bit 0 : value 0 = read operation, 1 = write operation
  43. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  44. Arg4: fffff80322a50ba6, address which referenced memory
  45.  
  46. Debugging Details:
  47. ------------------
  48.  
  49. *** WARNING: Unable to verify timestamp for win32k.sys
  50.  
  51. KEY_VALUES_STRING: 1
  52.  
  53. Key : Analysis.CPU.mSec
  54. Value: 5171
  55.  
  56. Key : Analysis.DebugAnalysisManager
  57. Value: Create
  58.  
  59. Key : Analysis.Elapsed.mSec
  60. Value: 57285
  61.  
  62. Key : Analysis.Init.CPU.mSec
  63. Value: 7593
  64.  
  65. Key : Analysis.Init.Elapsed.mSec
  66. Value: 113924
  67.  
  68. Key : Analysis.Memory.CommitPeak.Mb
  69. Value: 95
  70.  
  71. Key : WER.OS.Branch
  72. Value: vb_release
  73.  
  74. Key : WER.OS.Timestamp
  75. Value: 2019-12-06T14:06:00Z
  76.  
  77. Key : WER.OS.Version
  78. Value: 10.0.19041.1
  79.  
  80.  
  81. FILE_IN_CAB: 062822-75281-01.dmp
  82.  
  83. BUGCHECK_CODE: a
  84.  
  85. BUGCHECK_P1: ffffffffffffffd0
  86.  
  87. BUGCHECK_P2: 2
  88.  
  89. BUGCHECK_P3: 1
  90.  
  91. BUGCHECK_P4: fffff80322a50ba6
  92.  
  93. WRITE_ADDRESS: fffff803234fb390: Unable to get MiVisibleState
  94. Unable to get NonPagedPoolStart
  95. Unable to get NonPagedPoolEnd
  96. Unable to get PagedPoolStart
  97. Unable to get PagedPoolEnd
  98. unable to get nt!MmSpecialPagesInUse
  99. ffffffffffffffd0
  100.  
  101. BLACKBOXBSD: 1 (!blackboxbsd)
  102.  
  103.  
  104. BLACKBOXNTFS: 1 (!blackboxntfs)
  105.  
  106.  
  107. BLACKBOXPNP: 1 (!blackboxpnp)
  108.  
  109.  
  110. BLACKBOXWINLOGON: 1
  111.  
  112. CUSTOMER_CRASH_COUNT: 1
  113.  
  114. PROCESS_NAME: System
  115.  
  116. TRAP_FRAME: ffff85001d65f530 -- (.trap 0xffff85001d65f530)
  117. NOTE: The trap frame does not contain all registers.
  118. Some register values may be zeroed or incorrect.
  119. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
  120. rdx=00000000746c6644 rsi=0000000000000000 rdi=0000000000000000
  121. rip=fffff80322a50ba6 rsp=ffff85001d65f6c0 rbp=0000000000000005
  122. r8=0000000000000002 r9=0000000001d88a5e r10=fffff80322a50b60
  123. r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
  124. r14=0000000000000000 r15=0000000000000000
  125. iopl=0 nv up ei pl zr na po nc
  126. nt!ObfDereferenceObjectWithTag+0x26:
  127. fffff803`22a50ba6 f0480fc15ed0 lock xadd qword ptr [rsi-30h],rbx ds:ffffffff`ffffffd0=????????????????
  128. Resetting default scope
  129.  
  130. STACK_TEXT:
  131. ffff8500`1d65f3e8 fffff803`22c09d69 : 00000000`0000000a ffffffff`ffffffd0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
  132. ffff8500`1d65f3f0 fffff803`22c06069 : 00000000`00000000 00000000`00000001 00000000`00000003 00000000`00000000 : nt!KiBugCheckDispatch+0x69
  133. ffff8500`1d65f530 fffff803`22a50ba6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
  134. ffff8500`1d65f6c0 fffff803`22a50b6e : ffffe78f`44986ea0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0x26
  135. ffff8500`1d65f700 fffff803`3a90a218 : 00000000`00000001 ffffd200`9c2e6180 ffffe78f`2729a360 ffffe78f`22871080 : nt!HalPutDmaAdapter+0xe
  136. ffff8500`1d65f730 fffff803`3a90a190 : 00000000`00000000 ffffe78f`23153de0 00000000`00000000 ffffd200`9c2e6180 : afd!AfdDerefPollInfoFileObjects+0x48
  137. ffff8500`1d65f760 fffff803`3a90adee : 00000000`00000002 ffffe78f`44986ec0 ffffd200`9c2e6180 ffff8500`1d65fa10 : afd!AfdCompletePollIrp+0x74
  138. ffff8500`1d65f7b0 fffff803`22a3ffa2 : ffffe78f`44986f00 ffffd200`9c2e6180 ffffd200`9c2e6180 00000000`00000002 : afd!AfdTimeoutPoll+0x2e
  139. ffff8500`1d65f7e0 fffff803`22aa0eed : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00735403 : nt!KiProcessExpiredTimerList+0x172
  140. ffff8500`1d65f8d0 fffff803`22bfb93e : 00000000`00000000 ffffd200`9c2e6180 ffffd200`9c2f1240 ffffe78f`2608b080 : nt!KiRetireDpcList+0x5dd
  141. ffff8500`1d65fb60 00000000`00000000 : ffff8500`1d660000 ffff8500`1d659000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
  142.  
  143.  
  144. SYMBOL_NAME: afd!AfdDerefPollInfoFileObjects+48
  145.  
  146. MODULE_NAME: afd
  147.  
  148. IMAGE_NAME: afd.sys
  149.  
  150. IMAGE_VERSION: 10.0.19041.1767
  151.  
  152. STACK_COMMAND: .cxr; .ecxr ; kb
  153.  
  154. BUCKET_ID_FUNC_OFFSET: 48
  155.  
  156. FAILURE_BUCKET_ID: AV_afd!AfdDerefPollInfoFileObjects
  157.  
  158. OS_VERSION: 10.0.19041.1
  159.  
  160. BUILDLAB_STR: vb_release
  161.  
  162. OSPLATFORM_TYPE: x64
  163.  
  164. OSNAME: Windows 10
  165.  
  166. FAILURE_ID_HASH: {9a846440-a090-65b4-c1d4-bc8c6183377b}
  167.  
  168. Followup: MachineOwner
  169.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement