Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 9: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Some common problems are exception code 0x80000003. This means a hard
- coded breakpoint or assertion was hit, but this system was booted
- /NODEBUG. This is not supposed to happen as developers should never have
- hardcoded breakpoints in retail code, but ...
- If this happens, make sure a debugger gets connected, and the
- system is booted /DEBUG. This will let us see why this breakpoint is
- happening.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff8028253e841, The address that the exception occurred at
- Arg3: fffffc8b59f699c8, Exception Record Address
- Arg4: ffffa4811d971930, Context Record Address
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- Key : AV.Fault
- Value: Read
- Key : Analysis.CPU.Sec
- Value: 3
- Key : Analysis.DebugAnalysisProvider.CPP
- Value: Create: 8007007e on RAMEN
- Key : Analysis.DebugData
- Value: CreateObject
- Key : Analysis.DebugModel
- Value: CreateObject
- Key : Analysis.Elapsed.Sec
- Value: 14
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 71
- Key : Analysis.System
- Value: CreateObject
- BUGCHECK_CODE: 7e
- BUGCHECK_P1: ffffffffc0000005
- BUGCHECK_P2: fffff8028253e841
- BUGCHECK_P3: fffffc8b59f699c8
- BUGCHECK_P4: ffffa4811d971930
- EXCEPTION_RECORD: fffffc8b59f699c8 -- (.exr 0xfffffc8b59f699c8)
- ExceptionAddress: fffff8028253e841 (nt!MiDemoteCombinedPte+0x0000000000000051)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 2
- Parameter[0]: 0000000000000000
- Parameter[1]: ffffffffffffffff
- Attempt to read from address ffffffffffffffff
- CONTEXT: ffffa4811d971930 -- (.cxr 0xffffa4811d971930)
- rax=fffff3f9fcfe7000 rbx=0000001000200001 rcx=ffffc68f2b190580
- rdx=fffff3807c710d60 rsi=fffff3807c710d60 rdi=fffffc8b59f6a210
- rip=fffff8028253e841 rsp=fffffc8b59f69c00 rbp=000000f8e21ac000
- r8=8000000000000000 r9=ffffc68f2b190ba0 r10=0000000000000000
- r11=fffff38000000000 r12=0000000000000000 r13=fffffc8b59f6a310
- r14=8000000000000000 r15=ffffc68f2b190580
- iopl=0 nv up ei ng nz na po cy
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050287
- nt!MiDemoteCombinedPte+0x51:
- fffff802`8253e841 498378f001 cmp qword ptr [r8-10h],1 ds:002b:7fffffff`fffffff0=????????????????
- Resetting default scope
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: NVDispl
- READ_ADDRESS: fffff802829713b8: Unable to get MiVisibleState
- Unable to get NonPagedPoolStart
- Unable to get NonPagedPoolEnd
- Unable to get PagedPoolStart
- Unable to get PagedPoolEnd
- fffff802828283b8: Unable to get Flags value from nt!KdVersionBlock
- fffff802828283b8: Unable to get Flags value from nt!KdVersionBlock
- unable to get nt!MmSpecialPagesInUse
- ffffffffffffffff
- ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- EXCEPTION_CODE_STR: c0000005
- EXCEPTION_PARAMETER1: 0000000000000000
- EXCEPTION_PARAMETER2: ffffffffffffffff
- EXCEPTION_STR: 0xc0000005
- BAD_STACK_POINTER: ffffa4811d9710c8
- STACK_TEXT:
- fffffc8b`59f69c00 fffff802`824b0087 : 00000000`00000000 fffff380`7c7107f8 00000000`00000003 00000000`00000000 : nt!MiDemoteCombinedPte+0x51
- fffffc8b`59f69cd0 fffff802`824ac837 : 00000000`00000000 fffffc8b`59f6a310 00000000`00000000 00000000`00000000 : nt!MiAgePte+0x427
- fffffc8b`59f69d70 fffff802`824accf1 : fffffc8b`59f6a310 fffffc8b`59f6a310 ffffc68f`00000000 fffff3f9`c03e3880 : nt!MiWalkPageTablesRecursively+0x1e7
- fffffc8b`59f69e30 fffff802`824accf1 : fffffc8b`59f6a310 fffffc8b`59f6a310 ffffc68f`00000000 fffff3f9`fce01f18 : nt!MiWalkPageTablesRecursively+0x6a1
- fffffc8b`59f69ef0 fffff802`824accf1 : fffffc8b`59f6a310 fffffc8b`59f6a310 ffffc68f`00000000 fffff3f9`fcfe7008 : nt!MiWalkPageTablesRecursively+0x6a1
- fffffc8b`59f69fb0 fffff802`824ac47c : fffffc8b`59f6a310 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
- fffffc8b`59f6a070 fffff802`824abf07 : fffffc8b`59f6a310 00000000`00000002 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36c
- fffffc8b`59f6a170 fffff802`824ab642 : ffffc68f`2b14b080 fffff802`00000000 00000000`00b5ba28 00000000`00000000 : nt!MiAgeWorkingSet+0x3a7
- fffffc8b`59f6a690 fffff802`824aaf5a : ffffc68f`2b190580 fffffc8b`59f6a950 00000000`00000000 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3b2
- fffffc8b`59f6a780 fffff802`824a8bb0 : fffff802`00000003 00000000`00000000 fffff802`82868340 ffffc68f`1cc3f540 : nt!MiProcessWorkingSets+0x1fa
- fffffc8b`59f6a930 fffff802`826c8ed6 : 00000000`00000001 00000000`00000002 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0xc8
- fffffc8b`59f6a9f0 fffff802`82589e65 : 00000000`00000002 00000000`ffffffff fffff802`82868340 00000000`000000c2 : nt!MmWorkingSetManager+0x12
- fffffc8b`59f6aa20 fffff802`82529e95 : ffffc68f`1cd24080 00000000`00000080 fffff802`82589d10 7caaa6bc`6ac200e7 : nt!KeBalanceSetManager+0x155
- fffffc8b`59f6ab10 fffff802`825c730a : ffffa481`1d8a5180 ffffc68f`1cd24080 fffff802`82529e40 67060006`56305830 : nt!PspSystemThreadStartup+0x55
- fffffc8b`59f6ab60 00000000`00000000 : fffffc8b`59f6b000 fffffc8b`59f64000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
- SYMBOL_NAME: nt!MiDemoteCombinedPte+51
- MODULE_NAME: nt
- IMAGE_VERSION: 10.0.18362.295
- STACK_COMMAND: .cxr 0xffffa4811d971930 ; kb
- IMAGE_NAME: memory_corruption
- BUCKET_ID_FUNC_OFFSET: 51
- FAILURE_BUCKET_ID: AV_STACKPTR_ERROR_nt!MiDemoteCombinedPte
- OS_VERSION: 10.0.18362.1
- BUILDLAB_STR: 19h1_release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {51bd6656-a4b2-8d9b-1231-94678dd83b3a}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement