Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Users\Peyton\Desktop\dmps\083122-8468-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- ************* Path validation summary **************
- Response Time (ms) Location
- Deferred srv*
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 19041 MP (20 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
- Machine Name:
- Kernel base = 0xfffff806`81c00000 PsLoadedModuleList = 0xfffff806`8282a250
- Debug session time: Wed Aug 31 16:20:40.864 2022 (UTC - 4:00)
- System Uptime: 0 days 0:00:47.466
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................................
- ..............................
- Loading User Symbols
- Loading unloaded module list
- ............
- For analysis of this file, run !analyze -v
- nt!KeBugCheckEx:
- fffff806`81ff88c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9409`97a67330=000000000000000a
- 4: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: 0000000000000008, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000000, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff80681ea2a18, address which referenced memory
- Debugging Details:
- ------------------
- *** WARNING: Unable to verify timestamp for nvlddmkm.sys
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 2967
- Key : Analysis.DebugAnalysisManager
- Value: Create
- Key : Analysis.Elapsed.mSec
- Value: 34193
- Key : Analysis.Init.CPU.mSec
- Value: 202
- Key : Analysis.Init.Elapsed.mSec
- Value: 3421
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 92
- Key : Bugcheck.Code.DumpHeader
- Value: 0xa
- Key : Bugcheck.Code.Register
- Value: 0xa
- Key : WER.OS.Branch
- Value: vb_release
- Key : WER.OS.Timestamp
- Value: 2019-12-06T14:06:00Z
- Key : WER.OS.Version
- Value: 10.0.19041.1
- FILE_IN_CAB: 083122-8468-01.dmp
- BUGCHECK_CODE: a
- BUGCHECK_P1: 8
- BUGCHECK_P2: 2
- BUGCHECK_P3: 0
- BUGCHECK_P4: fffff80681ea2a18
- READ_ADDRESS: fffff806828fb390: Unable to get MiVisibleState
- Unable to get NonPagedPoolStart
- Unable to get NonPagedPoolEnd
- Unable to get PagedPoolStart
- Unable to get PagedPoolEnd
- unable to get nt!MmSpecialPagesInUse
- 0000000000000008
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: dwm.exe
- DPC_STACK_BASE: FFFF940997A67FB0
- TRAP_FRAME: ffff940997a67470 -- (.trap 0xffff940997a67470)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
- rdx=ffffc18f975f1480 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff80681ea2a18 rsp=ffff940997a67600 rbp=ffffe6806b760180
- r8=0000000000000000 r9=0000000000000000 r10=fffff80681ea2970
- r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz na po cy
- nt!KeSetEvent+0xa8:
- fffff806`81ea2a18 48395008 cmp qword ptr [rax+8],rdx ds:00000000`00000008=????????????????
- Resetting default scope
- STACK_TEXT:
- ffff9409`97a67328 fffff806`8200a869 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
- ffff9409`97a67330 fffff806`82006b69 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff806`86856dac : nt!KiBugCheckDispatch+0x69
- ffff9409`97a67470 fffff806`81ea2a18 : ffffc18f`975f1578 00000000`00000002 ffffc18f`976630f0 ffffc18f`9d0ddab8 : nt!KiPageFault+0x469
- ffff9409`97a67600 fffff806`9bd9a354 : 00000000`00000000 ffff9409`97a67790 ffffc18f`993e1720 ffffc18f`975f1480 : nt!KeSetEvent+0xa8
- ffff9409`97a67690 fffff806`9bd97415 : ffffc18f`97666702 00000000`00989680 00000000`00000001 ffffc18f`00000001 : dxgmms2!VidSchiProcessDpcCompletedPacket+0x674
- ffff9409`97a677f0 fffff806`99a0d5d2 : ffff9409`97a678e9 00000000`00000000 ffffc18f`8db47520 00000020`1380175d : dxgmms2!VidSchDdiNotifyDpc+0x225
- ffff9409`97a678a0 fffff806`a60d2a69 : ffffc18f`8db7b030 00000000`00000000 ffffc18f`8db7b030 ffffc18f`8db44000 : dxgkrnl!DxgNotifyDpcCB+0x92
- ffff9409`97a67950 ffffc18f`8db7b030 : 00000000`00000000 ffffc18f`8db7b030 ffffc18f`8db44000 fffff806`a60d29ee : nvlddmkm+0x62a69
- ffff9409`97a67958 00000000`00000000 : ffffc18f`8db7b030 ffffc18f`8db44000 fffff806`a60d29ee ffffc18f`8db44000 : 0xffffc18f`8db7b030
- SYMBOL_NAME: dxgmms2!VidSchiProcessDpcCompletedPacket+674
- MODULE_NAME: dxgmms2
- IMAGE_NAME: dxgmms2.sys
- IMAGE_VERSION: 10.0.19041.1940
- STACK_COMMAND: .cxr; .ecxr ; kb
- BUCKET_ID_FUNC_OFFSET: 674
- FAILURE_BUCKET_ID: AV_dxgmms2!VidSchiProcessDpcCompletedPacket
- OS_VERSION: 10.0.19041.1
- BUILDLAB_STR: vb_release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {0c861586-a12a-53fa-01c7-481171867839}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement