Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ************* Preparing the environment for Debugger Extensions Gallery repositories **************
- ExtensionRepository : Implicit
- UseExperimentalFeatureForNugetShare : true
- AllowNugetExeUpdate : true
- NonInteractiveNuget : true
- AllowNugetMSCredentialProviderInstall : true
- AllowParallelInitializationOfLocalRepositories : true
- EnableRedirectToChakraJsProvider : false
- -- Configuring repositories
- ----> Repository : LocalInstalled, Enabled: true
- ----> Repository : UserExtensions, Enabled: true
- >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
- ************* Waiting for Debugger Extensions Gallery to Initialize **************
- >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.000 seconds
- ----> Repository : UserExtensions, Enabled: true, Packages count: 0
- ----> Repository : LocalInstalled, Enabled: true, Packages count: 43
- Microsoft (R) Windows Debugger Version 10.0.27793.1000 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\Minidump\042225-35828-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 26100 MP (16 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Kernel base = 0xfffff803`b5e00000 PsLoadedModuleList = 0xfffff803`b6cf4730
- Debug session time: Tue Apr 22 12:21:04.886 2025 (UTC - 7:00)
- System Uptime: 0 days 0:02:42.511
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................................
- .....................
- Loading User Symbols
- Loading unloaded module list
- ........
- For analysis of this file, run !analyze -v
- nt!KeBugCheckEx:
- fffff803`b62b8680 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8184`9d3070f0=0000000000000044
- 7: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- MULTIPLE_IRP_COMPLETE_REQUESTS (44)
- A driver has requested that an IRP be completed (IoCompleteRequest()), but
- the packet has already been completed. This is a tough bug to find because
- the easiest case, a driver actually attempted to complete its own packet
- twice, is generally not what happened. Rather, two separate drivers each
- believe that they own the packet, and each attempts to complete it. The
- first actually works, and the second fails. Tracking down which drivers
- in the system actually did this is difficult, generally because the trails
- of the first driver have been covered by the second. However, the driver
- stack for the current request can be found by examining the DeviceObject
- fields in each of the stack locations.
- Arguments:
- Arg1: ffff9c0814efe360, Address of the IRP
- Arg2: 00000000000027a2
- Arg3: 0000000000000000
- Arg4: 0000000000000000
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 1031
- Key : Analysis.Elapsed.mSec
- Value: 2449
- Key : Analysis.IO.Other.Mb
- Value: 0
- Key : Analysis.IO.Read.Mb
- Value: 1
- Key : Analysis.IO.Write.Mb
- Value: 0
- Key : Analysis.Init.CPU.mSec
- Value: 296
- Key : Analysis.Init.Elapsed.mSec
- Value: 5899
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 93
- Key : Analysis.Version.DbgEng
- Value: 10.0.27793.1000
- Key : Analysis.Version.Description
- Value: 10.2410.02.02 amd64fre
- Key : Analysis.Version.Ext
- Value: 1.2410.2.2
- Key : Bugcheck.Code.LegacyAPI
- Value: 0x44
- Key : Bugcheck.Code.TargetModel
- Value: 0x44
- Key : Dump.Attributes.AsUlong
- Value: 0x20008
- Key : Dump.Attributes.KernelGeneratedTriageDump
- Value: 1
- Key : Failure.Bucket
- Value: 0x44_rcraid!unknown_function
- Key : Failure.Hash
- Value: {b87cbe27-b733-b2ac-0276-055ddf5ce977}
- BUGCHECK_CODE: 44
- BUGCHECK_P1: ffff9c0814efe360
- BUGCHECK_P2: 27a2
- BUGCHECK_P3: 0
- BUGCHECK_P4: 0
- FILE_IN_CAB: 042225-35828-01.dmp
- DUMP_FILE_ATTRIBUTES: 0x20008
- Kernel Generated Triage Dump
- FAULTING_THREAD: ffff9c08113a0080
- IRP_ADDRESS: ffff9c0814efe360
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: System
- STACK_TEXT:
- ffff8184`9d3070e8 fffff803`b6032eeb : 00000000`00000044 ffff9c08`14efe360 00000000`000027a2 00000000`00000000 : nt!KeBugCheckEx
- ffff8184`9d3070f0 fffff803`4a490ffd : ffff9c08`11581cc1 fffff803`b621cd37 00000000`00000000 fffff803`4a505c60 : nt!IoFreeIrp+0x41b
- ffff8184`9d307180 ffff9c08`11581cc1 : fffff803`b621cd37 00000000`00000000 fffff803`4a505c60 fffff803`4a505c60 : rcraid+0x10ffd
- ffff8184`9d307188 fffff803`b621cd37 : 00000000`00000000 fffff803`4a505c60 fffff803`4a505c60 fffff803`4a49069b : 0xffff9c08`11581cc1
- ffff8184`9d307190 fffff803`492ab53b : ffff9c08`115819a5 fffff803`4a485f79 ffff9c08`115819a5 00000000`ffffffff : nt!KeStallExecutionProcessor+0x27
- ffff8184`9d3071d0 fffff803`4a4f31e1 : ffff9c08`11581890 ffff9c08`115819a5 00000000`00000000 00000000`00000001 : storport!StorPortStallExecution+0xb
- ffff8184`9d307200 ffff9c08`11581890 : ffff9c08`115819a5 00000000`00000000 00000000`00000001 fffff803`4a505c60 : rcraid+0x731e1
- ffff8184`9d307208 ffff9c08`115819a5 : 00000000`00000000 00000000`00000001 fffff803`4a505c60 fffff803`4a486606 : 0xffff9c08`11581890
- ffff8184`9d307210 00000000`00000000 : 00000000`00000001 fffff803`4a505c60 fffff803`4a486606 fffff803`4a505c60 : 0xffff9c08`115819a5
- SYMBOL_NAME: rcraid+10ffd
- MODULE_NAME: rcraid
- IMAGE_NAME: rcraid.sys
- STACK_COMMAND: .process /r /p 0xffff9c080e75f040; .thread 0xffff9c08113a0080 ; kb
- BUCKET_ID_FUNC_OFFSET: 10ffd
- FAILURE_BUCKET_ID: 0x44_rcraid!unknown_function
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {b87cbe27-b733-b2ac-0276-055ddf5ce977}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement