Advertisement
Guest User

Untitled

a guest
Mar 7th, 2025
15
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 14.77 KB | None | 0 0
  1. nt!KeBugCheckEx:
  2. fffff806`790b8460 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff860b`65a461c0=000000000000000a
  3. 17: kd> !analyze -v
  4. *******************************************************************************
  5. * *
  6. * Bugcheck Analysis *
  7. * *
  8. *******************************************************************************
  9.  
  10. IRQL_NOT_LESS_OR_EQUAL (a)
  11. An attempt was made to access a pageable (or completely invalid) address at an
  12. interrupt request level (IRQL) that is too high. This is usually
  13. caused by drivers using improper addresses.
  14. If a kernel debugger is available get the stack backtrace.
  15. Arguments:
  16. Arg1: 0000000000000018, memory referenced
  17. Arg2: 0000000000000002, IRQL
  18. Arg3: 0000000000000001, bitfield :
  19. bit 0 : value 0 = read operation, 1 = write operation
  20. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  21. Arg4: fffff806790b0c06, address which referenced memory
  22.  
  23. Debugging Details:
  24. ------------------
  25.  
  26.  
  27. KEY_VALUES_STRING: 1
  28.  
  29. Key : Analysis.CPU.mSec
  30. Value: 1000
  31.  
  32. Key : Analysis.Elapsed.mSec
  33. Value: 1134
  34.  
  35. Key : Analysis.IO.Other.Mb
  36. Value: 0
  37.  
  38. Key : Analysis.IO.Read.Mb
  39. Value: 1
  40.  
  41. Key : Analysis.IO.Write.Mb
  42. Value: 1
  43.  
  44. Key : Analysis.Init.CPU.mSec
  45. Value: 218
  46.  
  47. Key : Analysis.Init.Elapsed.mSec
  48. Value: 26109
  49.  
  50. Key : Analysis.Memory.CommitPeak.Mb
  51. Value: 98
  52.  
  53. Key : Analysis.Version.DbgEng
  54. Value: 10.0.27793.1000
  55.  
  56. Key : Analysis.Version.Description
  57. Value: 10.2410.02.02 amd64fre
  58.  
  59. Key : Analysis.Version.Ext
  60. Value: 1.2410.2.2
  61.  
  62. Key : Bugcheck.Code.LegacyAPI
  63. Value: 0xa
  64.  
  65. Key : Bugcheck.Code.TargetModel
  66. Value: 0xa
  67.  
  68. Key : Dump.Attributes.AsUlong
  69. Value: 0x21008
  70.  
  71. Key : Dump.Attributes.DiagDataWrittenToHeader
  72. Value: 1
  73.  
  74. Key : Dump.Attributes.ErrorCode
  75. Value: 0x0
  76.  
  77. Key : Dump.Attributes.KernelGeneratedTriageDump
  78. Value: 1
  79.  
  80. Key : Dump.Attributes.LastLine
  81. Value: Dump completed successfully.
  82.  
  83. Key : Dump.Attributes.ProgressPercentage
  84. Value: 0
  85.  
  86. Key : Failure.Bucket
  87. Value: AV_nt!MiReplenishPageSlist
  88.  
  89. Key : Failure.Exception.IP.Address
  90. Value: 0xfffff806790b0c06
  91.  
  92. Key : Failure.Exception.IP.Module
  93. Value: nt
  94.  
  95. Key : Failure.Exception.IP.Offset
  96. Value: 0x4b0c06
  97.  
  98. Key : Failure.Hash
  99. Value: {e1780c1b-c7ae-f629-f6fa-ba2f8fe42756}
  100.  
  101.  
  102. BUGCHECK_CODE: a
  103.  
  104. BUGCHECK_P1: 18
  105.  
  106. BUGCHECK_P2: 2
  107.  
  108. BUGCHECK_P3: 1
  109.  
  110. BUGCHECK_P4: fffff806790b0c06
  111.  
  112. FILE_IN_CAB: 030725-7453-01.dmp
  113.  
  114. DUMP_FILE_ATTRIBUTES: 0x21008
  115. Kernel Generated Triage Dump
  116.  
  117. FAULTING_THREAD: ffff8f8eb347d080
  118.  
  119. WRITE_ADDRESS: fffff80679bc34b0: Unable to get MiVisibleState
  120. Unable to get NonPagedPoolStart
  121. Unable to get NonPagedPoolEnd
  122. Unable to get PagedPoolStart
  123. Unable to get PagedPoolEnd
  124. unable to get nt!MmSpecialPagesInUse
  125. 0000000000000018
  126.  
  127. BLACKBOXBSD: 1 (!blackboxbsd)
  128.  
  129.  
  130. BLACKBOXNTFS: 1 (!blackboxntfs)
  131.  
  132.  
  133. BLACKBOXPNP: 1 (!blackboxpnp)
  134.  
  135.  
  136. BLACKBOXWINLOGON: 1
  137.  
  138. CUSTOMER_CRASH_COUNT: 1
  139.  
  140. PROCESS_NAME: msedgewebview2
  141.  
  142. TRAP_FRAME: ffff860b65a46300 -- (.trap 0xffff860b65a46300)
  143. NOTE: The trap frame does not contain all registers.
  144. Some register values may be zeroed or incorrect.
  145. rax=0000000000030000 rbx=0000000000000000 rcx=ffffc68000000000
  146. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
  147. rip=fffff806790b0c06 rsp=ffff860b65a46490 rbp=0000000000000005
  148. r8=ffffc68042add750 r9=0000000000030000 r10=0000000000000001
  149. r11=ffffc68042add750 r12=0000000000000000 r13=0000000000000000
  150. r14=0000000000000000 r15=0000000000000000
  151. iopl=0 nv up ei pl nz na po nc
  152. nt!MiReplenishPageSlist+0x1be:
  153. fffff806`790b0c06 f0480fba6f183f lock bts qword ptr [rdi+18h],3Fh ds:00000000`00000018=????????????????
  154. Resetting default scope
  155.  
  156. STACK_TEXT:
  157. ffff860b`65a461b8 fffff806`7928cee9 : 00000000`0000000a 00000000`00000018 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
  158. ffff860b`65a461c0 fffff806`792881a8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0001583a : nt!KiBugCheckDispatch+0x69
  159. ffff860b`65a46300 fffff806`790b0c06 : 00000000`00070027 00000000`00000006 ffffc980`00004300 00000000`002c2be0 : nt!KiPageFault+0x468
  160. ffff860b`65a46490 fffff806`79012bac : 00000000`00450000 ffffc980`00000001 ffff860b`65a46690 ffff860b`65a465a0 : nt!MiReplenishPageSlist+0x1be
  161. ffff860b`65a46560 fffff806`79012506 : ffffc980`00003300 00000000`00000001 ffff860b`65a467c9 00000000`00070027 : nt!MiGetPerfectColorHeadPage+0x364
  162. ffff860b`65a46670 fffff806`79012363 : 00000000`00000000 ffff860b`65a46769 00000000`00000003 ffffc680`42add720 : nt!MiGetPerfectFreeOrZeroPage+0x72
  163. ffff860b`65a466d0 fffff806`78e92751 : 00000000`00000005 00000000`00070027 00000000`00000000 00000000`00000000 : nt!MiGetBestPageFromNode+0x2f
  164. ffff860b`65a46760 fffff806`78f52369 : 00000000`80000006 ffff8f8e`05560001 00000000`00000000 00000000`00000006 : nt!MiGetPage+0x1c5
  165. ffff860b`65a46830 fffff806`78f147a2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiMakePageAvoidRead+0x1b1
  166. ffff860b`65a46990 fffff806`78f13086 : ffffb601`f8163000 0000176c`07c73e6d 00000000`00000000 00000000`00001000 : nt!MmCopyToCachedPage+0x1c2
  167. ffff860b`65a46a50 fffff806`78f12950 : ffff8f8e`c42b08a0 0000176c`07c73e6d ffff860b`65a46ca0 00000000`00000000 : nt!CcMapAndCopyInToCache+0x596
  168. ffff860b`65a46c30 fffff806`0bd7b502 : 00000000`000e80d2 ffffe785`35e26170 00000000`000df193 ffffe785`35e26101 : nt!CcCopyWriteEx+0x170
  169. ffff860b`65a46ce0 fffff806`0a7bb192 : ffff860b`65a470e9 0000176c`07c70000 ffff860b`65a470a0 0000176c`07c70000 : Ntfs!NtfsCopyWriteA+0x442
  170. ffff860b`65a47000 fffff806`0a7b94b1 : ffff860b`65a47180 ffff860b`65a470e9 ffff8f8e`b108c010 ffff8f8e`b108c110 : FLTMGR!FltpPerformFastIoCall+0xb2
  171. ffff860b`65a47060 fffff806`0a81cad2 : ffff860b`65a41000 00000000`00000000 ffff8f8e`d38757e0 00000000`00000000 : FLTMGR!FltpPassThroughFastIo+0x121
  172. ffff860b`65a47150 fffff806`79483964 : ffff860b`65a47200 00000000`00000000 00000000`00000000 fffff806`0a81c960 : FLTMGR!FltpFastIoWrite+0x172
  173. ffff860b`65a47200 fffff806`794835af : ffff8f8e`d38757e0 ffff8f8e`d38757b0 00000000`00000000 00000000`00000000 : nt!IopWriteFile+0x1c4
  174. ffff860b`65a47320 fffff806`7928c558 : 00000000`00120196 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x2cf
  175. ffff860b`65a473f0 00007ffc`e5d1f8d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
  176. 00000001`0cbff0b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`e5d1f8d4
  177.  
  178.  
  179. SYMBOL_NAME: nt!MiReplenishPageSlist+1be
  180.  
  181. MODULE_NAME: nt
  182.  
  183. IMAGE_VERSION: 10.0.26100.3194
  184.  
  185. STACK_COMMAND: .process /r /p 0xffff8f8eb8aea080; .thread 0xffff8f8eb347d080 ; kb
  186.  
  187. IMAGE_NAME: ntkrnlmp.exe
  188.  
  189. BUCKET_ID_FUNC_OFFSET: 1be
  190.  
  191. FAILURE_BUCKET_ID: AV_nt!MiReplenishPageSlist
  192.  
  193. OSPLATFORM_TYPE: x64
  194.  
  195. OSNAME: Windows 10
  196.  
  197. FAILURE_ID_HASH: {e1780c1b-c7ae-f629-f6fa-ba2f8fe42756}
  198.  
  199. Followup: MachineOwner
  200. ---------
  201.  
  202.  
  203.  
  204. ______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
  205.  
  206.  
  207. nt!KeBugCheckEx:
  208. fffff805`8eab8460 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff908b`5fbb6090=000000000000000a
  209. 22: kd> !analyze -v
  210. *******************************************************************************
  211. * *
  212. * Bugcheck Analysis *
  213. * *
  214. *******************************************************************************
  215.  
  216. IRQL_NOT_LESS_OR_EQUAL (a)
  217. An attempt was made to access a pageable (or completely invalid) address at an
  218. interrupt request level (IRQL) that is too high. This is usually
  219. caused by drivers using improper addresses.
  220. If a kernel debugger is available get the stack backtrace.
  221. Arguments:
  222. Arg1: 0000000000000018, memory referenced
  223. Arg2: 0000000000000002, IRQL
  224. Arg3: 0000000000000001, bitfield :
  225. bit 0 : value 0 = read operation, 1 = write operation
  226. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  227. Arg4: fffff8058eab0c06, address which referenced memory
  228.  
  229. Debugging Details:
  230. ------------------
  231.  
  232.  
  233. KEY_VALUES_STRING: 1
  234.  
  235. Key : Analysis.CPU.mSec
  236. Value: 1015
  237.  
  238. Key : Analysis.Elapsed.mSec
  239. Value: 1292
  240.  
  241. Key : Analysis.IO.Other.Mb
  242. Value: 0
  243.  
  244. Key : Analysis.IO.Read.Mb
  245. Value: 1
  246.  
  247. Key : Analysis.IO.Write.Mb
  248. Value: 0
  249.  
  250. Key : Analysis.Init.CPU.mSec
  251. Value: 234
  252.  
  253. Key : Analysis.Init.Elapsed.mSec
  254. Value: 4046
  255.  
  256. Key : Analysis.Memory.CommitPeak.Mb
  257. Value: 88
  258.  
  259. Key : Analysis.Version.DbgEng
  260. Value: 10.0.27793.1000
  261.  
  262. Key : Analysis.Version.Description
  263. Value: 10.2410.02.02 amd64fre
  264.  
  265. Key : Analysis.Version.Ext
  266. Value: 1.2410.2.2
  267.  
  268. Key : Bugcheck.Code.LegacyAPI
  269. Value: 0xa
  270.  
  271. Key : Bugcheck.Code.TargetModel
  272. Value: 0xa
  273.  
  274. Key : Dump.Attributes.AsUlong
  275. Value: 0x21008
  276.  
  277. Key : Dump.Attributes.DiagDataWrittenToHeader
  278. Value: 1
  279.  
  280. Key : Dump.Attributes.ErrorCode
  281. Value: 0x0
  282.  
  283. Key : Dump.Attributes.KernelGeneratedTriageDump
  284. Value: 1
  285.  
  286. Key : Dump.Attributes.LastLine
  287. Value: Dump completed successfully.
  288.  
  289. Key : Dump.Attributes.ProgressPercentage
  290. Value: 0
  291.  
  292. Key : Failure.Bucket
  293. Value: AV_nt!MiReplenishPageSlist
  294.  
  295. Key : Failure.Exception.IP.Address
  296. Value: 0xfffff8058eab0c06
  297.  
  298. Key : Failure.Exception.IP.Module
  299. Value: nt
  300.  
  301. Key : Failure.Exception.IP.Offset
  302. Value: 0x4b0c06
  303.  
  304. Key : Failure.Hash
  305. Value: {e1780c1b-c7ae-f629-f6fa-ba2f8fe42756}
  306.  
  307.  
  308. BUGCHECK_CODE: a
  309.  
  310. BUGCHECK_P1: 18
  311.  
  312. BUGCHECK_P2: 2
  313.  
  314. BUGCHECK_P3: 1
  315.  
  316. BUGCHECK_P4: fffff8058eab0c06
  317.  
  318. FILE_IN_CAB: 030125-7437-01.dmp
  319.  
  320. DUMP_FILE_ATTRIBUTES: 0x21008
  321. Kernel Generated Triage Dump
  322.  
  323. FAULTING_THREAD: ffffe4840267f080
  324.  
  325. WRITE_ADDRESS: fffff8058f5c34b0: Unable to get MiVisibleState
  326. Unable to get NonPagedPoolStart
  327. Unable to get NonPagedPoolEnd
  328. Unable to get PagedPoolStart
  329. Unable to get PagedPoolEnd
  330. unable to get nt!MmSpecialPagesInUse
  331. 0000000000000018
  332.  
  333. BLACKBOXBSD: 1 (!blackboxbsd)
  334.  
  335.  
  336. BLACKBOXNTFS: 1 (!blackboxntfs)
  337.  
  338.  
  339. BLACKBOXPNP: 1 (!blackboxpnp)
  340.  
  341.  
  342. BLACKBOXWINLOGON: 1
  343.  
  344. CUSTOMER_CRASH_COUNT: 1
  345.  
  346. PROCESS_NAME: MsMpEng.exe
  347.  
  348. TRAP_FRAME: ffff908b5fbb61d0 -- (.trap 0xffff908b5fbb61d0)
  349. NOTE: The trap frame does not contain all registers.
  350. Some register values may be zeroed or incorrect.
  351. rax=0000000000030000 rbx=0000000000000000 rcx=ffffb08000000000
  352. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
  353. rip=fffff8058eab0c06 rsp=ffff908b5fbb6360 rbp=ffffffffffffffff
  354. r8=ffffb0804294f6e0 r9=0000000000030000 r10=0000000000000001
  355. r11=ffffb0804294f6e0 r12=0000000000000000 r13=0000000000000000
  356. r14=0000000000000000 r15=0000000000000000
  357. iopl=0 nv up ei ng nz ac po cy
  358. nt!MiReplenishPageSlist+0x1be:
  359. fffff805`8eab0c06 f0480fba6f183f lock bts qword ptr [rdi+18h],3Fh ds:00000000`00000018=????????????????
  360. Resetting default scope
  361.  
  362. STACK_TEXT:
  363. ffff908b`5fbb6088 fffff805`8ec8cee9 : 00000000`0000000a 00000000`00000018 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
  364. ffff908b`5fbb6090 fffff805`8ec881a8 : 00080000`00000100 00000000`00000000 00000000`00000000 00000000`0000000b : nt!KiBugCheckDispatch+0x69
  365. ffff908b`5fbb61d0 fffff805`8eab0c06 : 00000000`0007007a 00000000`00000000 ffffb380`00004300 00000000`00000431 : nt!KiPageFault+0x468
  366. ffff908b`5fbb6360 fffff805`8ea12bac : 00000000`00450000 ffffb380`00000001 ffff908b`5fbb6568 ffff908b`5fbb6470 : nt!MiReplenishPageSlist+0x1be
  367. ffff908b`5fbb6430 fffff805`8ea12e88 : ffffb380`00003300 00000000`0007007a ffff908b`5fbb65a8 30000000`00000000 : nt!MiGetPerfectColorHeadPage+0x364
  368. ffff908b`5fbb6540 fffff805`8ea1245d : ffffb380`000053e8 00000000`00000070 ffffe483`00000100 00000000`00000000 : nt!MiRemovePageAnyColor+0x218
  369. ffff908b`5fbb65f0 fffff805`8e892751 : 00000000`00000005 00000000`00070070 00000000`00000000 00000000`00000000 : nt!MiGetBestPageFromNode+0x129
  370. ffff908b`5fbb6680 fffff805`8e950113 : 00000000`00000009 00000000`00000000 00000000`0007006f 00000000`00000009 : nt!MiGetPage+0x1c5
  371. ffff908b`5fbb6750 fffff805`8e95153e : 00000000`00000001 00000000`00000001 ffff908b`5fbb6899 ffff908b`5fbb6e40 : nt!MiGetPageChain+0x163
  372. ffff908b`5fbb67f0 fffff805`8e94919e : e484142a`1e0004c0 ffff808c`9f4c3800 fffff805`8f438600 fffff805`00000009 : nt!MiGetHardFaultPages+0x162
  373. ffff908b`5fbb68e0 fffff805`8e9488b5 : fffff805`8f438600 ffffe484`142a1d80 00000000`00000100 ffff808c`67ecb000 : nt!MiBuildMdlForMappedFileFault+0x42a
  374. ffff908b`5fbb6a40 fffff805`8e8d814a : ffff908b`5fbb6c70 ffff808c`67ecc400 ffffb080`35023200 ffff908b`5fbb6c48 : nt!MiResolveMappedFileFault+0x3d9
  375. ffff908b`5fbb6b70 fffff805`8e8d854a : 0000024b`ae4b0000 00000000`00000000 ffff908b`5fbb6c48 ffff808c`67ecc400 : nt!MiResolveProtoPteFault+0x432
  376. ffff908b`5fbb6c10 fffff805`8e87a3a3 : 0000024b`ae4b0000 fffff805`00000001 00000000`00001000 ffffe484`073e3080 : nt!MiDispatchFault+0x226
  377. ffff908b`5fbb6d60 fffff805`8e8c6912 : 00000000`00000000 ffff908b`5fbb6fd0 0000024b`ae4b0000 00000000`00000000 : nt!MmAccessFault+0x183
  378. ffff908b`5fbb6ed0 fffff805`8efe3d0c : 00000000`00000000 00000000`00000000 00000000`00000000 ffff908b`00000000 : nt!MiPrefetchVirtualMemory+0x2d6
  379. ffff908b`5fbb7080 fffff805`8ec8c558 : fffff604`f941fa8c ffffe484`0267f080 ffff908b`5fbb74e0 00000000`00001f58 : nt!NtSetInformationVirtualMemory+0x43c
  380. ffff908b`5fbb73f0 00007ffd`8de22dc4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
  381. 0000007e`9eafcdd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`8de22dc4
  382.  
  383.  
  384. SYMBOL_NAME: nt!MiReplenishPageSlist+1be
  385.  
  386. MODULE_NAME: nt
  387.  
  388. IMAGE_VERSION: 10.0.26100.3194
  389.  
  390. STACK_COMMAND: .process /r /p 0xffffe484073e3080; .thread 0xffffe4840267f080 ; kb
  391.  
  392. IMAGE_NAME: ntkrnlmp.exe
  393.  
  394. BUCKET_ID_FUNC_OFFSET: 1be
  395.  
  396. FAILURE_BUCKET_ID: AV_nt!MiReplenishPageSlist
  397.  
  398. OSPLATFORM_TYPE: x64
  399.  
  400. OSNAME: Windows 10
  401.  
  402. FAILURE_ID_HASH: {e1780c1b-c7ae-f629-f6fa-ba2f8fe42756}
  403.  
  404. Followup: MachineOwner
  405. ---------
  406.  
  407.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement