Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.22621.1 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [E:\Desktop\062822-75281-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 19041 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
- Machine Name:
- Kernel base = 0xfffff803`22800000 PsLoadedModuleList = 0xfffff803`2342a2b0
- Debug session time: Mon Jun 27 22:45:37.026 2022 (UTC + 3:00)
- System Uptime: 2 days 7:02:11.669
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................................
- ......................
- Loading User Symbols
- Loading unloaded module list
- .........................
- For analysis of this file, run !analyze -v
- 4: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: ffffffffffffffd0, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000001, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff80322a50ba6, address which referenced memory
- Debugging Details:
- ------------------
- *** WARNING: Unable to verify timestamp for win32k.sys
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 5171
- Key : Analysis.DebugAnalysisManager
- Value: Create
- Key : Analysis.Elapsed.mSec
- Value: 57285
- Key : Analysis.Init.CPU.mSec
- Value: 7593
- Key : Analysis.Init.Elapsed.mSec
- Value: 113924
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 95
- Key : WER.OS.Branch
- Value: vb_release
- Key : WER.OS.Timestamp
- Value: 2019-12-06T14:06:00Z
- Key : WER.OS.Version
- Value: 10.0.19041.1
- FILE_IN_CAB: 062822-75281-01.dmp
- BUGCHECK_CODE: a
- BUGCHECK_P1: ffffffffffffffd0
- BUGCHECK_P2: 2
- BUGCHECK_P3: 1
- BUGCHECK_P4: fffff80322a50ba6
- WRITE_ADDRESS: fffff803234fb390: Unable to get MiVisibleState
- Unable to get NonPagedPoolStart
- Unable to get NonPagedPoolEnd
- Unable to get PagedPoolStart
- Unable to get PagedPoolEnd
- unable to get nt!MmSpecialPagesInUse
- ffffffffffffffd0
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: System
- TRAP_FRAME: ffff85001d65f530 -- (.trap 0xffff85001d65f530)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
- rdx=00000000746c6644 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff80322a50ba6 rsp=ffff85001d65f6c0 rbp=0000000000000005
- r8=0000000000000002 r9=0000000001d88a5e r10=fffff80322a50b60
- r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- nt!ObfDereferenceObjectWithTag+0x26:
- fffff803`22a50ba6 f0480fc15ed0 lock xadd qword ptr [rsi-30h],rbx ds:ffffffff`ffffffd0=????????????????
- Resetting default scope
- STACK_TEXT:
- ffff8500`1d65f3e8 fffff803`22c09d69 : 00000000`0000000a ffffffff`ffffffd0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
- ffff8500`1d65f3f0 fffff803`22c06069 : 00000000`00000000 00000000`00000001 00000000`00000003 00000000`00000000 : nt!KiBugCheckDispatch+0x69
- ffff8500`1d65f530 fffff803`22a50ba6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
- ffff8500`1d65f6c0 fffff803`22a50b6e : ffffe78f`44986ea0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0x26
- ffff8500`1d65f700 fffff803`3a90a218 : 00000000`00000001 ffffd200`9c2e6180 ffffe78f`2729a360 ffffe78f`22871080 : nt!HalPutDmaAdapter+0xe
- ffff8500`1d65f730 fffff803`3a90a190 : 00000000`00000000 ffffe78f`23153de0 00000000`00000000 ffffd200`9c2e6180 : afd!AfdDerefPollInfoFileObjects+0x48
- ffff8500`1d65f760 fffff803`3a90adee : 00000000`00000002 ffffe78f`44986ec0 ffffd200`9c2e6180 ffff8500`1d65fa10 : afd!AfdCompletePollIrp+0x74
- ffff8500`1d65f7b0 fffff803`22a3ffa2 : ffffe78f`44986f00 ffffd200`9c2e6180 ffffd200`9c2e6180 00000000`00000002 : afd!AfdTimeoutPoll+0x2e
- ffff8500`1d65f7e0 fffff803`22aa0eed : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00735403 : nt!KiProcessExpiredTimerList+0x172
- ffff8500`1d65f8d0 fffff803`22bfb93e : 00000000`00000000 ffffd200`9c2e6180 ffffd200`9c2f1240 ffffe78f`2608b080 : nt!KiRetireDpcList+0x5dd
- ffff8500`1d65fb60 00000000`00000000 : ffff8500`1d660000 ffff8500`1d659000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
- SYMBOL_NAME: afd!AfdDerefPollInfoFileObjects+48
- MODULE_NAME: afd
- IMAGE_NAME: afd.sys
- IMAGE_VERSION: 10.0.19041.1767
- STACK_COMMAND: .cxr; .ecxr ; kb
- BUCKET_ID_FUNC_OFFSET: 48
- FAILURE_BUCKET_ID: AV_afd!AfdDerefPollInfoFileObjects
- OS_VERSION: 10.0.19041.1
- BUILDLAB_STR: vb_release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {9a846440-a090-65b4-c1d4-bc8c6183377b}
- Followup: MachineOwner
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement