Advertisement
Guest User

rcraid.sys

a guest
Apr 22nd, 2025
15
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.45 KB | None | 0 0
  1. ************* Preparing the environment for Debugger Extensions Gallery repositories **************
  2. ExtensionRepository : Implicit
  3. UseExperimentalFeatureForNugetShare : true
  4. AllowNugetExeUpdate : true
  5. NonInteractiveNuget : true
  6. AllowNugetMSCredentialProviderInstall : true
  7. AllowParallelInitializationOfLocalRepositories : true
  8. EnableRedirectToChakraJsProvider : false
  9.  
  10. -- Configuring repositories
  11. ----> Repository : LocalInstalled, Enabled: true
  12. ----> Repository : UserExtensions, Enabled: true
  13.  
  14. >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
  15.  
  16. ************* Waiting for Debugger Extensions Gallery to Initialize **************
  17.  
  18. >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.000 seconds
  19. ----> Repository : UserExtensions, Enabled: true, Packages count: 0
  20. ----> Repository : LocalInstalled, Enabled: true, Packages count: 43
  21.  
  22. Microsoft (R) Windows Debugger Version 10.0.27793.1000 AMD64
  23. Copyright (c) Microsoft Corporation. All rights reserved.
  24.  
  25.  
  26. Loading Dump File [C:\Windows\Minidump\042225-35828-01.dmp]
  27. Mini Kernel Dump File: Only registers and stack trace are available
  28.  
  29. Symbol search path is: srv*
  30. Executable search path is:
  31. Windows 10 Kernel Version 26100 MP (16 procs) Free x64
  32. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  33. Kernel base = 0xfffff803`b5e00000 PsLoadedModuleList = 0xfffff803`b6cf4730
  34. Debug session time: Tue Apr 22 12:21:04.886 2025 (UTC - 7:00)
  35. System Uptime: 0 days 0:02:42.511
  36. Loading Kernel Symbols
  37. ...............................................................
  38. ................................................................
  39. ................................................................
  40. .....................
  41. Loading User Symbols
  42.  
  43. Loading unloaded module list
  44. ........
  45. For analysis of this file, run !analyze -v
  46. nt!KeBugCheckEx:
  47. fffff803`b62b8680 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8184`9d3070f0=0000000000000044
  48. 7: kd> !analyze -v
  49. *******************************************************************************
  50. * *
  51. * Bugcheck Analysis *
  52. * *
  53. *******************************************************************************
  54.  
  55. MULTIPLE_IRP_COMPLETE_REQUESTS (44)
  56. A driver has requested that an IRP be completed (IoCompleteRequest()), but
  57. the packet has already been completed. This is a tough bug to find because
  58. the easiest case, a driver actually attempted to complete its own packet
  59. twice, is generally not what happened. Rather, two separate drivers each
  60. believe that they own the packet, and each attempts to complete it. The
  61. first actually works, and the second fails. Tracking down which drivers
  62. in the system actually did this is difficult, generally because the trails
  63. of the first driver have been covered by the second. However, the driver
  64. stack for the current request can be found by examining the DeviceObject
  65. fields in each of the stack locations.
  66. Arguments:
  67. Arg1: ffff9c0814efe360, Address of the IRP
  68. Arg2: 00000000000027a2
  69. Arg3: 0000000000000000
  70. Arg4: 0000000000000000
  71.  
  72. Debugging Details:
  73. ------------------
  74.  
  75.  
  76. KEY_VALUES_STRING: 1
  77.  
  78. Key : Analysis.CPU.mSec
  79. Value: 1031
  80.  
  81. Key : Analysis.Elapsed.mSec
  82. Value: 2449
  83.  
  84. Key : Analysis.IO.Other.Mb
  85. Value: 0
  86.  
  87. Key : Analysis.IO.Read.Mb
  88. Value: 1
  89.  
  90. Key : Analysis.IO.Write.Mb
  91. Value: 0
  92.  
  93. Key : Analysis.Init.CPU.mSec
  94. Value: 296
  95.  
  96. Key : Analysis.Init.Elapsed.mSec
  97. Value: 5899
  98.  
  99. Key : Analysis.Memory.CommitPeak.Mb
  100. Value: 93
  101.  
  102. Key : Analysis.Version.DbgEng
  103. Value: 10.0.27793.1000
  104.  
  105. Key : Analysis.Version.Description
  106. Value: 10.2410.02.02 amd64fre
  107.  
  108. Key : Analysis.Version.Ext
  109. Value: 1.2410.2.2
  110.  
  111. Key : Bugcheck.Code.LegacyAPI
  112. Value: 0x44
  113.  
  114. Key : Bugcheck.Code.TargetModel
  115. Value: 0x44
  116.  
  117. Key : Dump.Attributes.AsUlong
  118. Value: 0x20008
  119.  
  120. Key : Dump.Attributes.KernelGeneratedTriageDump
  121. Value: 1
  122.  
  123. Key : Failure.Bucket
  124. Value: 0x44_rcraid!unknown_function
  125.  
  126. Key : Failure.Hash
  127. Value: {b87cbe27-b733-b2ac-0276-055ddf5ce977}
  128.  
  129.  
  130. BUGCHECK_CODE: 44
  131.  
  132. BUGCHECK_P1: ffff9c0814efe360
  133.  
  134. BUGCHECK_P2: 27a2
  135.  
  136. BUGCHECK_P3: 0
  137.  
  138. BUGCHECK_P4: 0
  139.  
  140. FILE_IN_CAB: 042225-35828-01.dmp
  141.  
  142. DUMP_FILE_ATTRIBUTES: 0x20008
  143. Kernel Generated Triage Dump
  144.  
  145. FAULTING_THREAD: ffff9c08113a0080
  146.  
  147. IRP_ADDRESS: ffff9c0814efe360
  148.  
  149. BLACKBOXBSD: 1 (!blackboxbsd)
  150.  
  151.  
  152. BLACKBOXNTFS: 1 (!blackboxntfs)
  153.  
  154.  
  155. BLACKBOXPNP: 1 (!blackboxpnp)
  156.  
  157.  
  158. BLACKBOXWINLOGON: 1
  159.  
  160. CUSTOMER_CRASH_COUNT: 1
  161.  
  162. PROCESS_NAME: System
  163.  
  164. STACK_TEXT:
  165. ffff8184`9d3070e8 fffff803`b6032eeb : 00000000`00000044 ffff9c08`14efe360 00000000`000027a2 00000000`00000000 : nt!KeBugCheckEx
  166. ffff8184`9d3070f0 fffff803`4a490ffd : ffff9c08`11581cc1 fffff803`b621cd37 00000000`00000000 fffff803`4a505c60 : nt!IoFreeIrp+0x41b
  167. ffff8184`9d307180 ffff9c08`11581cc1 : fffff803`b621cd37 00000000`00000000 fffff803`4a505c60 fffff803`4a505c60 : rcraid+0x10ffd
  168. ffff8184`9d307188 fffff803`b621cd37 : 00000000`00000000 fffff803`4a505c60 fffff803`4a505c60 fffff803`4a49069b : 0xffff9c08`11581cc1
  169. ffff8184`9d307190 fffff803`492ab53b : ffff9c08`115819a5 fffff803`4a485f79 ffff9c08`115819a5 00000000`ffffffff : nt!KeStallExecutionProcessor+0x27
  170. ffff8184`9d3071d0 fffff803`4a4f31e1 : ffff9c08`11581890 ffff9c08`115819a5 00000000`00000000 00000000`00000001 : storport!StorPortStallExecution+0xb
  171. ffff8184`9d307200 ffff9c08`11581890 : ffff9c08`115819a5 00000000`00000000 00000000`00000001 fffff803`4a505c60 : rcraid+0x731e1
  172. ffff8184`9d307208 ffff9c08`115819a5 : 00000000`00000000 00000000`00000001 fffff803`4a505c60 fffff803`4a486606 : 0xffff9c08`11581890
  173. ffff8184`9d307210 00000000`00000000 : 00000000`00000001 fffff803`4a505c60 fffff803`4a486606 fffff803`4a505c60 : 0xffff9c08`115819a5
  174.  
  175.  
  176. SYMBOL_NAME: rcraid+10ffd
  177.  
  178. MODULE_NAME: rcraid
  179.  
  180. IMAGE_NAME: rcraid.sys
  181.  
  182. STACK_COMMAND: .process /r /p 0xffff9c080e75f040; .thread 0xffff9c08113a0080 ; kb
  183.  
  184. BUCKET_ID_FUNC_OFFSET: 10ffd
  185.  
  186. FAILURE_BUCKET_ID: 0x44_rcraid!unknown_function
  187.  
  188. OSPLATFORM_TYPE: x64
  189.  
  190. OSNAME: Windows 10
  191.  
  192. FAILURE_ID_HASH: {b87cbe27-b733-b2ac-0276-055ddf5ce977}
  193.  
  194. Followup: MachineOwner
  195. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement