Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 10: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Some common problems are exception code 0x80000003. This means a hard
- coded breakpoint or assertion was hit, but this system was booted
- /NODEBUG. This is not supposed to happen as developers should never have
- hardcoded breakpoints in retail code, but ...
- If this happens, make sure a debugger gets connected, and the
- system is booted /DEBUG. This will let us see why this breakpoint is
- happening.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff80249b3f291, The address that the exception occurred at
- Arg3: ffffc200d81699c8, Exception Record Address
- Arg4: ffff99808badf930, Context Record Address
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- Key : AV.Fault
- Value: Read
- Key : Analysis.CPU.Sec
- Value: 2
- Key : Analysis.DebugAnalysisProvider.CPP
- Value: Create: 8007007e on RAMEN
- Key : Analysis.DebugData
- Value: CreateObject
- Key : Analysis.DebugModel
- Value: CreateObject
- Key : Analysis.Elapsed.Sec
- Value: 25
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 71
- Key : Analysis.System
- Value: CreateObject
- BUGCHECK_CODE: 7e
- BUGCHECK_P1: ffffffffc0000005
- BUGCHECK_P2: fffff80249b3f291
- BUGCHECK_P3: ffffc200d81699c8
- BUGCHECK_P4: ffff99808badf930
- EXCEPTION_RECORD: ffffc200d81699c8 -- (.exr 0xffffc200d81699c8)
- ExceptionAddress: fffff80249b3f291 (nt!MiDemoteCombinedPte+0x0000000000000051)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 2
- Parameter[0]: 0000000000000000
- Parameter[1]: ffffffffffffffff
- Attempt to read from address ffffffffffffffff
- CONTEXT: ffff99808badf930 -- (.cxr 0xffff99808badf930)
- rax=ffffc1e0f0783000 rbx=0000001000200001 rcx=ffff8984291f17c0
- rdx=ffffc18031114e98 rsi=ffffc18031114e98 rdi=ffffc200d816a210
- rip=fffff80249b3f291 rsp=ffffc200d8169c00 rbp=00000062229d3000
- r8=8000000000000000 r9=ffff89842708bd60 r10=0000000000000000
- r11=ffffc18000000000 r12=0000000000000000 r13=ffffc200d816a310
- r14=8000000000000000 r15=ffff8984291f17c0
- iopl=0 nv up ei ng nz na pe cy
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050283
- nt!MiDemoteCombinedPte+0x51:
- fffff802`49b3f291 498378f001 cmp qword ptr [r8-10h],1 ds:002b:7fffffff`fffffff0=????????????????
- Resetting default scope
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: firefox.exe
- READ_ADDRESS: fffff80249f723b8: Unable to get MiVisibleState
- Unable to get NonPagedPoolStart
- Unable to get NonPagedPoolEnd
- Unable to get PagedPoolStart
- Unable to get PagedPoolEnd
- fffff80249e293b8: Unable to get Flags value from nt!KdVersionBlock
- fffff80249e293b8: Unable to get Flags value from nt!KdVersionBlock
- unable to get nt!MmSpecialPagesInUse
- ffffffffffffffff
- ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- EXCEPTION_CODE_STR: c0000005
- EXCEPTION_PARAMETER1: 0000000000000000
- EXCEPTION_PARAMETER2: ffffffffffffffff
- EXCEPTION_STR: 0xc0000005
- BAD_STACK_POINTER: ffff99808badf0c8
- STACK_TEXT:
- ffffc200`d8169c00 fffff802`49ab07e7 : 00000000`00000000 ffffc180`31114bf8 00000000`00000003 00000000`00000000 : nt!MiDemoteCombinedPte+0x51
- ffffc200`d8169cd0 fffff802`49aacf97 : 00000000`00000000 ffffc200`d816a310 00000000`00000000 00000000`00000000 : nt!MiAgePte+0x427
- ffffc200`d8169d70 fffff802`49aad451 : ffffc200`d816a310 ffffc200`d816a310 00000000`00000000 ffffc1e0`c01888a0 : nt!MiWalkPageTablesRecursively+0x1e7
- ffffc200`d8169e30 fffff802`49aad451 : ffffc200`d816a310 ffffc200`d816a310 ffff8984`00000000 ffffc1e0`f0600c40 : nt!MiWalkPageTablesRecursively+0x6a1
- ffffc200`d8169ef0 fffff802`49aad451 : ffffc200`d816a310 ffffc200`d816a310 ffff8984`00000000 ffffc1e0`f0783000 : nt!MiWalkPageTablesRecursively+0x6a1
- ffffc200`d8169fb0 fffff802`49aacbdc : ffffc200`d816a310 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
- ffffc200`d816a070 fffff802`49aac667 : ffffc200`d816a310 ffffc200`00000002 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36c
- ffffc200`d816a170 fffff802`49aabda2 : ffff8984`21d2e080 fffff802`00000000 00000000`000dc2c0 00000000`00000000 : nt!MiAgeWorkingSet+0x3a7
- ffffc200`d816a690 fffff802`49aab6ba : ffff8984`291f17c0 ffffc200`d816a950 00000000`00000000 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3b2
- ffffc200`d816a780 fffff802`49aa9310 : fffff802`00000002 00000000`00000000 fffff802`49e69400 ffff8984`12a3f540 : nt!MiProcessWorkingSets+0x1fa
- ffffc200`d816a930 fffff802`49cc9f46 : fffff802`49f74cc0 00000000`00000004 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0xc8
- ffffc200`d816a9f0 fffff802`49b8b8c5 : 00000000`00000004 00000000`ffffffff 00000000`00000001 00000000`0000009c : nt!MmWorkingSetManager+0x12
- ffffc200`d816aa20 fffff802`49b2a715 : ffff8984`12a8c040 00000000`00000080 fffff802`49b8b770 00490053`0041006b : nt!KeBalanceSetManager+0x155
- ffffc200`d816ab10 fffff802`49bc86ea : ffff9980`8b912180 ffff8984`12a8c040 fffff802`49b2a6c0 00000002`00000078 : nt!PspSystemThreadStartup+0x55
- ffffc200`d816ab60 00000000`00000000 : ffffc200`d816b000 ffffc200`d8164000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
- SYMBOL_NAME: nt!MiDemoteCombinedPte+51
- MODULE_NAME: nt
- IMAGE_VERSION: 10.0.18362.356
- STACK_COMMAND: .cxr 0xffff99808badf930 ; kb
- IMAGE_NAME: memory_corruption
- BUCKET_ID_FUNC_OFFSET: 51
- FAILURE_BUCKET_ID: AV_STACKPTR_ERROR_nt!MiDemoteCombinedPte
- OS_VERSION: 10.0.18362.1
- BUILDLAB_STR: 19h1_release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {51bd6656-a4b2-8d9b-1231-94678dd83b3a}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement