Advertisement
Guest User

Untitled

a guest
Apr 1st, 2021
229
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.80 KB | None | 0 0
  1. *******************************************************************************
  2. * *
  3. * Bugcheck Analysis *
  4. * *
  5. *******************************************************************************
  6.  
  7. IRQL_NOT_LESS_OR_EQUAL (a)
  8. An attempt was made to access a pageable (or completely invalid) address at an
  9. interrupt request level (IRQL) that is too high. This is usually
  10. caused by drivers using improper addresses.
  11. If a kernel debugger is available get the stack backtrace.
  12. Arguments:
  13. Arg1: 0000000000000000, memory referenced
  14. Arg2: 00000000000000ff, IRQL
  15. Arg3: 0000000000000040, bitfield :
  16. bit 0 : value 0 = read operation, 1 = write operation
  17. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  18. Arg4: fffff80347e72f96, address which referenced memory
  19.  
  20. Debugging Details:
  21. ------------------
  22.  
  23.  
  24. KEY_VALUES_STRING: 1
  25.  
  26. Key : Analysis.CPU.mSec
  27. Value: 2609
  28.  
  29. Key : Analysis.DebugAnalysisManager
  30. Value: Create
  31.  
  32. Key : Analysis.Elapsed.mSec
  33. Value: 7858
  34.  
  35. Key : Analysis.Init.CPU.mSec
  36. Value: 952
  37.  
  38. Key : Analysis.Init.Elapsed.mSec
  39. Value: 90215
  40.  
  41. Key : Analysis.Memory.CommitPeak.Mb
  42. Value: 84
  43.  
  44. Key : WER.OS.Branch
  45. Value: vb_release
  46.  
  47. Key : WER.OS.Timestamp
  48. Value: 2019-12-06T14:06:00Z
  49.  
  50. Key : WER.OS.Version
  51. Value: 10.0.19041.1
  52.  
  53.  
  54. BUGCHECK_CODE: a
  55.  
  56. BUGCHECK_P1: 0
  57.  
  58. BUGCHECK_P2: ff
  59.  
  60. BUGCHECK_P3: 40
  61.  
  62. BUGCHECK_P4: fffff80347e72f96
  63.  
  64. READ_ADDRESS: 0000000000000000
  65.  
  66. BLACKBOXBSD: 1 (!blackboxbsd)
  67.  
  68.  
  69. BLACKBOXNTFS: 1 (!blackboxntfs)
  70.  
  71.  
  72. BLACKBOXPNP: 1 (!blackboxpnp)
  73.  
  74.  
  75. BLACKBOXWINLOGON: 1
  76.  
  77. PROCESS_NAME: System
  78.  
  79. TRAP_FRAME: fffff8034e68f770 -- (.trap 0xfffff8034e68f770)
  80. NOTE: The trap frame does not contain all registers.
  81. Some register values may be zeroed or incorrect.
  82. rax=0000000000000000 rbx=0000000000000000 rcx=00000000ffffffff
  83. rdx=00000000000000f1 rsi=0000000000000000 rdi=0000000000000000
  84. rip=fffff80347e72f96 rsp=fffff8034e68f900 rbp=fffff8034e68fa00
  85. r8=8000000000000000 r9=fffff8034e68fb50 r10=0000fffff80347f6
  86. r11=0000002bf606b4fd r12=0000000000000000 r13=0000000000000000
  87. r14=0000000000000000 r15=0000000000000000
  88. iopl=0 nv up di pl zr na po nc
  89. nt!PpmIdlePrepare+0x216:
  90. fffff803`47e72f96 4c8918 mov qword ptr [rax],r11 ds:00000000`00000000=????????????????
  91. Resetting default scope
  92.  
  93. STACK_TEXT:
  94. fffff803`4e68f628 fffff803`48007b69 : 00000000`0000000a 00000000`00000000 00000000`000000ff 00000000`00000040 : nt!KeBugCheckEx
  95. fffff803`4e68f630 fffff803`48003e69 : 00000000`00000000 00000000`00000000 00000000`00000010 ffffba07`ae183040 : nt!KiBugCheckDispatch+0x69
  96. fffff803`4e68f770 fffff803`47e72f96 : ffffba07`b4c69080 00000000`00989680 00000000`00000000 00000000`033189f4 : nt!KiPageFault+0x469
  97. fffff803`4e68f900 fffff803`47e6ffd7 : 00000000`00000000 00001f80`00000000 00000000`00000003 00000000`00000002 : nt!PpmIdlePrepare+0x216
  98. fffff803`4e68faf0 fffff803`47ff9774 : 00000000`00000000 fffff803`48927600 ffffba07`b778b080 00000000`000007bc : nt!PoIdle+0x1f7
  99. fffff803`4e68fc60 00000000`00000000 : fffff803`4e690000 fffff803`4e68a000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
  100.  
  101.  
  102. SYMBOL_NAME: nt!PpmIdlePrepare+216
  103.  
  104. MODULE_NAME: nt
  105.  
  106. IMAGE_NAME: ntkrnlmp.exe
  107.  
  108. STACK_COMMAND: .thread ; .cxr ; kb
  109.  
  110. BUCKET_ID_FUNC_OFFSET: 216
  111.  
  112. FAILURE_BUCKET_ID: AV_nt!PpmIdlePrepare
  113.  
  114. OS_VERSION: 10.0.19041.1
  115.  
  116. BUILDLAB_STR: vb_release
  117.  
  118. OSPLATFORM_TYPE: x64
  119.  
  120. OSNAME: Windows 10
  121.  
  122. FAILURE_ID_HASH: {dd7d0096-4602-c4e5-a984-978d6ab3aa71}
  123.  
  124. Followup: MachineOwner
  125. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement