Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.19494.1001 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\Minidump\102419-8015-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- ************* Path validation summary **************
- Response Time (ms) Location
- Deferred srv*
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 18362 MP (12 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Machine Name:
- Kernel base = 0xfffff800`07200000 PsLoadedModuleList = 0xfffff800`07648210
- Debug session time: Thu Oct 24 17:41:47.375 2019 (UTC - 6:00)
- System Uptime: 0 days 0:10:14.125
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................................
- .............
- Loading User Symbols
- Loading unloaded module list
- .........
- For analysis of this file, run !analyze -v
- nt!KeBugCheckEx:
- fffff800`073c1220 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffc00`f7467230=000000000000000a
- 10: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If kernel debugger is available get stack backtrace.
- Arguments:
- Arg1: 000000005b8bc8c3, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
- Arg4: fffff80020878231, address which referenced memory
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.Sec
- Value: 1
- Key : Analysis.DebugAnalysisProvider.CPP
- Value: Create: 8007007e on DESKTOP-1CBU1CD
- Key : Analysis.DebugData
- Value: CreateObject
- Key : Analysis.DebugModel
- Value: CreateObject
- Key : Analysis.Elapsed.Sec
- Value: 2
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 72
- Key : Analysis.System
- Value: CreateObject
- DUMP_FILE_ATTRIBUTES: 0x8
- Kernel Generated Triage Dump
- BUGCHECK_CODE: d1
- BUGCHECK_P1: 5b8bc8c3
- BUGCHECK_P2: 2
- BUGCHECK_P3: 1
- BUGCHECK_P4: fffff80020878231
- WRITE_ADDRESS: fffff800077733b8: Unable to get MiVisibleState
- Unable to get NonPagedPoolStart
- Unable to get NonPagedPoolEnd
- Unable to get PagedPoolStart
- Unable to get PagedPoolEnd
- fffff8000762a3c8: Unable to get Flags value from nt!KdVersionBlock
- fffff8000762a3c8: Unable to get Flags value from nt!KdVersionBlock
- unable to get nt!MmSpecialPagesInUse
- 000000005b8bc8c3
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: System
- TRAP_FRAME: fffffc00f7467370 -- (.trap 0xfffffc00f7467370)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=fffff80021115180 rbx=0000000000000000 rcx=0000000000800001
- rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff80020878231 rsp=fffffc00f7467500 rbp=fffffc00f7467670
- r8=0000000000000007 r9=0000000000000000 r10=fffff80020f4ef18
- r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz na pe nc
- nvlddmkm+0xe8231:
- fffff800`20878231 008bc3c88b5b add byte ptr [rbx+5B8BC8C3h],cl ds:00000000`5b8bc8c3=??
- Resetting default scope
- STACK_TEXT:
- fffffc00`f7467228 fffff800`073d30e9 : 00000000`0000000a 00000000`5b8bc8c3 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
- fffffc00`f7467230 fffff800`073cf42b : 00000001`0000000b 00000000`00000000 00000000`00000fff 00000000`00000000 : nt!KiBugCheckDispatch+0x69
- fffffc00`f7467370 fffff800`20878231 : 00000000`00000000 fffffc00`f7467670 ffffcc84`fbc5d030 00000000`00000000 : nt!KiPageFault+0x46b
- fffffc00`f7467500 00000000`00000000 : fffffc00`f7467670 ffffcc84`fbc5d030 00000000`00000000 fffffc00`f7467670 : nvlddmkm+0xe8231
- SYMBOL_NAME: nvlddmkm+e8231
- MODULE_NAME: nvlddmkm
- IMAGE_NAME: nvlddmkm.sys
- STACK_COMMAND: .thread ; .cxr ; kb
- BUCKET_ID_FUNC_OFFSET: e8231
- FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement