Advertisement
Guest User

Untitled

a guest
Aug 31st, 2022
61
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.11 KB | None | 0 0
  1. Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4.  
  5. Loading Dump File [C:\Users\Peyton\Desktop\dmps\083122-8468-01.dmp]
  6. Mini Kernel Dump File: Only registers and stack trace are available
  7.  
  8.  
  9. ************* Path validation summary **************
  10. Response Time (ms) Location
  11. Deferred srv*
  12. Symbol search path is: srv*
  13. Executable search path is:
  14. Windows 10 Kernel Version 19041 MP (20 procs) Free x64
  15. Product: WinNt, suite: TerminalServer SingleUserTS
  16. Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
  17. Machine Name:
  18. Kernel base = 0xfffff806`81c00000 PsLoadedModuleList = 0xfffff806`8282a250
  19. Debug session time: Wed Aug 31 16:20:40.864 2022 (UTC - 4:00)
  20. System Uptime: 0 days 0:00:47.466
  21. Loading Kernel Symbols
  22. ...............................................................
  23. ................................................................
  24. ................................................................
  25. ..............................
  26. Loading User Symbols
  27. Loading unloaded module list
  28. ............
  29. For analysis of this file, run !analyze -v
  30. nt!KeBugCheckEx:
  31. fffff806`81ff88c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9409`97a67330=000000000000000a
  32. 4: kd> !analyze -v
  33. *******************************************************************************
  34. * *
  35. * Bugcheck Analysis *
  36. * *
  37. *******************************************************************************
  38.  
  39. IRQL_NOT_LESS_OR_EQUAL (a)
  40. An attempt was made to access a pageable (or completely invalid) address at an
  41. interrupt request level (IRQL) that is too high. This is usually
  42. caused by drivers using improper addresses.
  43. If a kernel debugger is available get the stack backtrace.
  44. Arguments:
  45. Arg1: 0000000000000008, memory referenced
  46. Arg2: 0000000000000002, IRQL
  47. Arg3: 0000000000000000, bitfield :
  48. bit 0 : value 0 = read operation, 1 = write operation
  49. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  50. Arg4: fffff80681ea2a18, address which referenced memory
  51.  
  52. Debugging Details:
  53. ------------------
  54.  
  55. *** WARNING: Unable to verify timestamp for nvlddmkm.sys
  56.  
  57. KEY_VALUES_STRING: 1
  58.  
  59. Key : Analysis.CPU.mSec
  60. Value: 2967
  61.  
  62. Key : Analysis.DebugAnalysisManager
  63. Value: Create
  64.  
  65. Key : Analysis.Elapsed.mSec
  66. Value: 34193
  67.  
  68. Key : Analysis.Init.CPU.mSec
  69. Value: 202
  70.  
  71. Key : Analysis.Init.Elapsed.mSec
  72. Value: 3421
  73.  
  74. Key : Analysis.Memory.CommitPeak.Mb
  75. Value: 92
  76.  
  77. Key : Bugcheck.Code.DumpHeader
  78. Value: 0xa
  79.  
  80. Key : Bugcheck.Code.Register
  81. Value: 0xa
  82.  
  83. Key : WER.OS.Branch
  84. Value: vb_release
  85.  
  86. Key : WER.OS.Timestamp
  87. Value: 2019-12-06T14:06:00Z
  88.  
  89. Key : WER.OS.Version
  90. Value: 10.0.19041.1
  91.  
  92.  
  93. FILE_IN_CAB: 083122-8468-01.dmp
  94.  
  95. BUGCHECK_CODE: a
  96.  
  97. BUGCHECK_P1: 8
  98.  
  99. BUGCHECK_P2: 2
  100.  
  101. BUGCHECK_P3: 0
  102.  
  103. BUGCHECK_P4: fffff80681ea2a18
  104.  
  105. READ_ADDRESS: fffff806828fb390: Unable to get MiVisibleState
  106. Unable to get NonPagedPoolStart
  107. Unable to get NonPagedPoolEnd
  108. Unable to get PagedPoolStart
  109. Unable to get PagedPoolEnd
  110. unable to get nt!MmSpecialPagesInUse
  111. 0000000000000008
  112.  
  113. BLACKBOXBSD: 1 (!blackboxbsd)
  114.  
  115.  
  116. BLACKBOXNTFS: 1 (!blackboxntfs)
  117.  
  118.  
  119. BLACKBOXPNP: 1 (!blackboxpnp)
  120.  
  121.  
  122. BLACKBOXWINLOGON: 1
  123.  
  124. CUSTOMER_CRASH_COUNT: 1
  125.  
  126. PROCESS_NAME: dwm.exe
  127.  
  128. DPC_STACK_BASE: FFFF940997A67FB0
  129.  
  130. TRAP_FRAME: ffff940997a67470 -- (.trap 0xffff940997a67470)
  131. NOTE: The trap frame does not contain all registers.
  132. Some register values may be zeroed or incorrect.
  133. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
  134. rdx=ffffc18f975f1480 rsi=0000000000000000 rdi=0000000000000000
  135. rip=fffff80681ea2a18 rsp=ffff940997a67600 rbp=ffffe6806b760180
  136. r8=0000000000000000 r9=0000000000000000 r10=fffff80681ea2970
  137. r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
  138. r14=0000000000000000 r15=0000000000000000
  139. iopl=0 nv up ei ng nz na po cy
  140. nt!KeSetEvent+0xa8:
  141. fffff806`81ea2a18 48395008 cmp qword ptr [rax+8],rdx ds:00000000`00000008=????????????????
  142. Resetting default scope
  143.  
  144. STACK_TEXT:
  145. ffff9409`97a67328 fffff806`8200a869 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
  146. ffff9409`97a67330 fffff806`82006b69 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff806`86856dac : nt!KiBugCheckDispatch+0x69
  147. ffff9409`97a67470 fffff806`81ea2a18 : ffffc18f`975f1578 00000000`00000002 ffffc18f`976630f0 ffffc18f`9d0ddab8 : nt!KiPageFault+0x469
  148. ffff9409`97a67600 fffff806`9bd9a354 : 00000000`00000000 ffff9409`97a67790 ffffc18f`993e1720 ffffc18f`975f1480 : nt!KeSetEvent+0xa8
  149. ffff9409`97a67690 fffff806`9bd97415 : ffffc18f`97666702 00000000`00989680 00000000`00000001 ffffc18f`00000001 : dxgmms2!VidSchiProcessDpcCompletedPacket+0x674
  150. ffff9409`97a677f0 fffff806`99a0d5d2 : ffff9409`97a678e9 00000000`00000000 ffffc18f`8db47520 00000020`1380175d : dxgmms2!VidSchDdiNotifyDpc+0x225
  151. ffff9409`97a678a0 fffff806`a60d2a69 : ffffc18f`8db7b030 00000000`00000000 ffffc18f`8db7b030 ffffc18f`8db44000 : dxgkrnl!DxgNotifyDpcCB+0x92
  152. ffff9409`97a67950 ffffc18f`8db7b030 : 00000000`00000000 ffffc18f`8db7b030 ffffc18f`8db44000 fffff806`a60d29ee : nvlddmkm+0x62a69
  153. ffff9409`97a67958 00000000`00000000 : ffffc18f`8db7b030 ffffc18f`8db44000 fffff806`a60d29ee ffffc18f`8db44000 : 0xffffc18f`8db7b030
  154.  
  155.  
  156. SYMBOL_NAME: dxgmms2!VidSchiProcessDpcCompletedPacket+674
  157.  
  158. MODULE_NAME: dxgmms2
  159.  
  160. IMAGE_NAME: dxgmms2.sys
  161.  
  162. IMAGE_VERSION: 10.0.19041.1940
  163.  
  164. STACK_COMMAND: .cxr; .ecxr ; kb
  165.  
  166. BUCKET_ID_FUNC_OFFSET: 674
  167.  
  168. FAILURE_BUCKET_ID: AV_dxgmms2!VidSchiProcessDpcCompletedPacket
  169.  
  170. OS_VERSION: 10.0.19041.1
  171.  
  172. BUILDLAB_STR: vb_release
  173.  
  174. OSPLATFORM_TYPE: x64
  175.  
  176. OSNAME: Windows 10
  177.  
  178. FAILURE_ID_HASH: {0c861586-a12a-53fa-01c7-481171867839}
  179.  
  180. Followup: MachineOwner
  181. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement