Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: 0000000000000000, memory referenced
- Arg2: 00000000000000ff, IRQL
- Arg3: 0000000000000040, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff80347e72f96, address which referenced memory
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 2609
- Key : Analysis.DebugAnalysisManager
- Value: Create
- Key : Analysis.Elapsed.mSec
- Value: 7858
- Key : Analysis.Init.CPU.mSec
- Value: 952
- Key : Analysis.Init.Elapsed.mSec
- Value: 90215
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 84
- Key : WER.OS.Branch
- Value: vb_release
- Key : WER.OS.Timestamp
- Value: 2019-12-06T14:06:00Z
- Key : WER.OS.Version
- Value: 10.0.19041.1
- BUGCHECK_CODE: a
- BUGCHECK_P1: 0
- BUGCHECK_P2: ff
- BUGCHECK_P3: 40
- BUGCHECK_P4: fffff80347e72f96
- READ_ADDRESS: 0000000000000000
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- PROCESS_NAME: System
- TRAP_FRAME: fffff8034e68f770 -- (.trap 0xfffff8034e68f770)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000000 rbx=0000000000000000 rcx=00000000ffffffff
- rdx=00000000000000f1 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff80347e72f96 rsp=fffff8034e68f900 rbp=fffff8034e68fa00
- r8=8000000000000000 r9=fffff8034e68fb50 r10=0000fffff80347f6
- r11=0000002bf606b4fd r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up di pl zr na po nc
- nt!PpmIdlePrepare+0x216:
- fffff803`47e72f96 4c8918 mov qword ptr [rax],r11 ds:00000000`00000000=????????????????
- Resetting default scope
- STACK_TEXT:
- fffff803`4e68f628 fffff803`48007b69 : 00000000`0000000a 00000000`00000000 00000000`000000ff 00000000`00000040 : nt!KeBugCheckEx
- fffff803`4e68f630 fffff803`48003e69 : 00000000`00000000 00000000`00000000 00000000`00000010 ffffba07`ae183040 : nt!KiBugCheckDispatch+0x69
- fffff803`4e68f770 fffff803`47e72f96 : ffffba07`b4c69080 00000000`00989680 00000000`00000000 00000000`033189f4 : nt!KiPageFault+0x469
- fffff803`4e68f900 fffff803`47e6ffd7 : 00000000`00000000 00001f80`00000000 00000000`00000003 00000000`00000002 : nt!PpmIdlePrepare+0x216
- fffff803`4e68faf0 fffff803`47ff9774 : 00000000`00000000 fffff803`48927600 ffffba07`b778b080 00000000`000007bc : nt!PoIdle+0x1f7
- fffff803`4e68fc60 00000000`00000000 : fffff803`4e690000 fffff803`4e68a000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
- SYMBOL_NAME: nt!PpmIdlePrepare+216
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- STACK_COMMAND: .thread ; .cxr ; kb
- BUCKET_ID_FUNC_OFFSET: 216
- FAILURE_BUCKET_ID: AV_nt!PpmIdlePrepare
- OS_VERSION: 10.0.19041.1
- BUILDLAB_STR: vb_release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {dd7d0096-4602-c4e5-a984-978d6ab3aa71}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement