Guest User

Untitled

a guest
Sep 7th, 2024
62
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 16.56 KB | None | 0 0
  1.  
  2. ************* Preparing the environment for Debugger Extensions Gallery repositories **************
  3. ExtensionRepository : Implicit
  4. UseExperimentalFeatureForNugetShare : true
  5. AllowNugetExeUpdate : true
  6. NonInteractiveNuget : true
  7. AllowNugetMSCredentialProviderInstall : true
  8. AllowParallelInitializationOfLocalRepositories : true
  9. EnableRedirectToChakraJsProvider : false
  10.  
  11. -- Configuring repositories
  12. ----> Repository : LocalInstalled, Enabled: true
  13. ----> Repository : UserExtensions, Enabled: true
  14.  
  15. >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
  16.  
  17. ************* Waiting for Debugger Extensions Gallery to Initialize **************
  18.  
  19. >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.172 seconds
  20. ----> Repository : UserExtensions, Enabled: true, Packages count: 0
  21. ----> Repository : LocalInstalled, Enabled: true, Packages count: 42
  22.  
  23. Microsoft (R) Windows Debugger Version 10.0.27668.1000 AMD64
  24. Copyright (c) Microsoft Corporation. All rights reserved.
  25.  
  26.  
  27. Loading Dump File [C:\Users\kenow\Documents\090824-11531-01.dmp]
  28. Mini Kernel Dump File: Only registers and stack trace are available
  29.  
  30. Symbol search path is: srv*
  31. Executable search path is:
  32. Windows 10 Kernel Version 22621 MP (32 procs) Free x64
  33. Product: WinNt, suite: TerminalServer SingleUserTS
  34. Kernel base = 0xfffff801`35400000 PsLoadedModuleList = 0xfffff801`360134f0
  35. Debug session time: Sun Sep 8 01:13:55.481 2024 (UTC + 1:00)
  36. System Uptime: 2 days 9:05:45.734
  37. Loading Kernel Symbols
  38. ...............................................................
  39. ................................................................
  40. ................................................................
  41. ................................................................
  42.  
  43. Loading User Symbols
  44. PEB is paged out (Peb.Ldr = 00000000`0105d018). Type ".hh dbgerr001" for details
  45. Loading unloaded module list
  46. ..................................................
  47. For analysis of this file, run !analyze -v
  48. nt!KeBugCheckEx:
  49. fffff801`35815cb0 48894c2408 mov qword ptr [rsp+8],rcx ss:ffff9607`b4d0eed0=000000000000007a
  50. 10: kd> !analyze -v
  51. *******************************************************************************
  52. * *
  53. * Bugcheck Analysis *
  54. * *
  55. *******************************************************************************
  56.  
  57. KERNEL_DATA_INPAGE_ERROR (7a)
  58. The requested page of kernel data could not be read in. Typically caused by
  59. a bad block in the paging file or disk controller error. Also see
  60. KERNEL_STACK_INPAGE_ERROR.
  61. If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
  62. it means the disk subsystem has experienced a failure.
  63. If the error status is 0xC000009A, then it means the request failed because
  64. a filesystem failed to make forward progress.
  65. Arguments:
  66. Arg1: ffff80011a2d19c8, lock type that was held (value 1,2,3, or PTE address)
  67. Arg2: ffffffffc000000e, error status (normally i/o status code)
  68. Arg3: 0000000cc72db860, current process (virtual address for lock type 3, or PTE)
  69. Arg4: fffff8016ba0f00c, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
  70.  
  71. Debugging Details:
  72. ------------------
  73.  
  74. *** WARNING: Unable to verify timestamp for HTTP.sys
  75. PEB is paged out (Peb.Ldr = 00000000`0105d018). Type ".hh dbgerr001" for details
  76.  
  77. KEY_VALUES_STRING: 1
  78.  
  79. Key : Analysis.CPU.mSec
  80. Value: 2686
  81.  
  82. Key : Analysis.Elapsed.mSec
  83. Value: 7985
  84.  
  85. Key : Analysis.IO.Other.Mb
  86. Value: 0
  87.  
  88. Key : Analysis.IO.Read.Mb
  89. Value: 0
  90.  
  91. Key : Analysis.IO.Write.Mb
  92. Value: 1
  93.  
  94. Key : Analysis.Init.CPU.mSec
  95. Value: 249
  96.  
  97. Key : Analysis.Init.Elapsed.mSec
  98. Value: 5122
  99.  
  100. Key : Analysis.Memory.CommitPeak.Mb
  101. Value: 89
  102.  
  103. Key : Bugcheck.Code.LegacyAPI
  104. Value: 0x7a
  105.  
  106. Key : Bugcheck.Code.TargetModel
  107. Value: 0x7a
  108.  
  109. Key : Dump.Attributes.AsUlong
  110. Value: 1008
  111.  
  112. Key : Dump.Attributes.DiagDataWrittenToHeader
  113. Value: 1
  114.  
  115. Key : Dump.Attributes.ErrorCode
  116. Value: 0
  117.  
  118. Key : Dump.Attributes.KernelGeneratedTriageDump
  119. Value: 1
  120.  
  121. Key : Dump.Attributes.LastLine
  122. Value: Dump completed successfully.
  123.  
  124. Key : Dump.Attributes.ProgressPercentage
  125. Value: 0
  126.  
  127. Key : Failure.Bucket
  128. Value: 0x7a_c000000e_HTTP!unknown_function
  129.  
  130. Key : Failure.Hash
  131. Value: {d781c069-abb4-aa0e-ee7b-ef9cf9904cce}
  132.  
  133.  
  134. BUGCHECK_CODE: 7a
  135.  
  136. BUGCHECK_P1: ffff80011a2d19c8
  137.  
  138. BUGCHECK_P2: ffffffffc000000e
  139.  
  140. BUGCHECK_P3: cc72db860
  141.  
  142. BUGCHECK_P4: fffff8016ba0f00c
  143.  
  144. FILE_IN_CAB: 090824-11531-01.dmp
  145.  
  146. DUMP_FILE_ATTRIBUTES: 0x1008
  147. Kernel Generated Triage Dump
  148.  
  149. FAULTING_THREAD: ffffbe8d06056080
  150.  
  151. ERROR_CODE: (NTSTATUS) 0xc000000e - A device which does not exist was specified.
  152.  
  153. DISK_HARDWARE_ERROR: There was error with disk hardware
  154.  
  155. BLACKBOXBSD: 1 (!blackboxbsd)
  156.  
  157.  
  158. BLACKBOXNTFS: 1 (!blackboxntfs)
  159.  
  160.  
  161. BLACKBOXPNP: 1 (!blackboxpnp)
  162.  
  163.  
  164. BLACKBOXWINLOGON: 1
  165.  
  166. CUSTOMER_CRASH_COUNT: 1
  167.  
  168. PROCESS_NAME: GameSDK.exe
  169.  
  170. TRAP_FRAME: ffff9607b4d0f1f0 -- (.trap 0xffff9607b4d0f1f0)
  171. NOTE: The trap frame does not contain all registers.
  172. Some register values may be zeroed or incorrect.
  173. rax=000000004c525443 rbx=0000000000000000 rcx=ffffbe8d0792ce10
  174. rdx=ffffbe8d115eeca0 rsi=0000000000000000 rdi=0000000000000000
  175. rip=fffff8016ba0f00c rsp=ffff9607b4d0f380 rbp=fffff8016b95eea0
  176. r8=ffffbe8d05d21450 r9=ffffbe8d0792ce10 r10=0000fffff8016ba0
  177. r11=ffff99781ea00000 r12=0000000000000000 r13=0000000000000000
  178. r14=0000000000000000 r15=0000000000000000
  179. iopl=0 nv up ei ng nz na pe cy
  180. HTTP+0x12f00c:
  181. fffff801`6ba0f00c ?? ???
  182. Resetting default scope
  183.  
  184. STACK_TEXT:
  185. ffff9607`b4d0eec8 fffff801`358c78b3 : 00000000`0000007a ffff8001`1a2d19c8 ffffffff`c000000e 0000000c`c72db860 : nt!KeBugCheckEx
  186. ffff9607`b4d0eed0 fffff801`35743106 : 00000000`00000000 ffff9607`00000000 ffff9607`b4d0f078 fffff801`00000000 : nt!MiWaitForInPageComplete+0x184e63
  187. ffff9607`b4d0efd0 fffff801`35668071 : 00000000`c0033333 00000000`00000000 fffff801`6ba0f00c fffff801`6ba0f00c : nt!MiIssueHardFault+0x246
  188. ffff9607`b4d0f0d0 fffff801`35826f7e : ffffbe8d`05a020c0 ffffbe8d`05d21450 00000000`00000000 fffff801`358270ac : nt!MmAccessFault+0x331
  189. ffff9607`b4d0f1f0 fffff801`6ba0f00c : 00000000`00000010 00000000`00050217 ffff9607`b4d0f3a8 00000000`00000000 : nt!KiPageFault+0x37e
  190. ffff9607`b4d0f380 00000000`00000010 : 00000000`00050217 ffff9607`b4d0f3a8 00000000`00000000 ffffbe8d`115eeca0 : HTTP+0x12f00c
  191. ffff9607`b4d0f388 00000000`00050217 : ffff9607`b4d0f3a8 00000000`00000000 ffffbe8d`115eeca0 fffff801`35712655 : 0x10
  192. ffff9607`b4d0f390 ffff9607`b4d0f3a8 : 00000000`00000000 ffffbe8d`115eeca0 fffff801`35712655 ffffbe8d`05d21450 : 0x50217
  193. ffff9607`b4d0f398 00000000`00000000 : ffffbe8d`115eeca0 fffff801`35712655 ffffbe8d`05d21450 ffffbe8d`0792ce10 : 0xffff9607`b4d0f3a8
  194.  
  195.  
  196. SYMBOL_NAME: HTTP+12f00c
  197.  
  198. MODULE_NAME: HTTP
  199.  
  200. IMAGE_NAME: HTTP.sys
  201.  
  202. STACK_COMMAND: .process /r /p 0xffffbe8d05a020c0; .thread 0xffffbe8d06056080 ; kb
  203.  
  204. BUCKET_ID_FUNC_OFFSET: 12f00c
  205.  
  206. FAILURE_BUCKET_ID: 0x7a_c000000e_HTTP!unknown_function
  207.  
  208. OSPLATFORM_TYPE: x64
  209.  
  210. OSNAME: Windows 10
  211.  
  212. FAILURE_ID_HASH: {d781c069-abb4-aa0e-ee7b-ef9cf9904cce}
  213.  
  214. Followup: MachineOwner
  215. ---------
  216.  
  217. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
  218. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
  219. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
  220. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
  221. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
  222. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
  223. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
  224. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
  225. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
  226. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
  227. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
  228. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
  229. NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Usb4Kd.natvis'
  230.  
  231. ************* Preparing the environment for Debugger Extensions Gallery repositories **************
  232. ExtensionRepository : Implicit
  233. UseExperimentalFeatureForNugetShare : true
  234. AllowNugetExeUpdate : true
  235. NonInteractiveNuget : true
  236. AllowNugetMSCredentialProviderInstall : true
  237. AllowParallelInitializationOfLocalRepositories : true
  238. EnableRedirectToChakraJsProvider : false
  239.  
  240. -- Configuring repositories
  241. ----> Repository : LocalInstalled, Enabled: true
  242. ----> Repository : UserExtensions, Enabled: true
  243.  
  244. >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
  245.  
  246. ************* Waiting for Debugger Extensions Gallery to Initialize **************
  247.  
  248. >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
  249. ----> Repository : UserExtensions, Enabled: true, Packages count: 0
  250. ----> Repository : LocalInstalled, Enabled: true, Packages count: 42
  251.  
  252. Microsoft (R) Windows Debugger Version 10.0.27668.1000 AMD64
  253. Copyright (c) Microsoft Corporation. All rights reserved.
  254.  
  255.  
  256. Loading Dump File [C:\Users\xxxxx\Documents\090524-12031-01.dmp]
  257. Mini Kernel Dump File: Only registers and stack trace are available
  258.  
  259.  
  260. ************* Path validation summary **************
  261. Response Time (ms) Location
  262. Deferred srv*
  263. Symbol search path is: srv*
  264. Executable search path is:
  265. Windows 10 Kernel Version 22621 MP (32 procs) Free x64
  266. Product: WinNt, suite: TerminalServer SingleUserTS
  267. Kernel base = 0xfffff800`60600000 PsLoadedModuleList = 0xfffff800`612134f0
  268. Debug session time: Thu Sep 5 14:07:23.529 2024 (UTC + 1:00)
  269. System Uptime: 0 days 11:27:51.128
  270. Loading Kernel Symbols
  271. ...............................................................
  272. ................................................................
  273. ................................................................
  274. ................................................................
  275. ..
  276. Loading User Symbols
  277. PEB is paged out (Peb.Ldr = 0000009b`d75a4018). Type ".hh dbgerr001" for details
  278. Loading unloaded module list
  279. .........................
  280. For analysis of this file, run !analyze -v
  281. nt!KeBugCheckEx:
  282. fffff800`60a15cb0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffd06`49596d00=00000000000000ef
  283. 15: kd> !analyze -v
  284. *******************************************************************************
  285. * *
  286. * Bugcheck Analysis *
  287. * *
  288. *******************************************************************************
  289.  
  290. CRITICAL_PROCESS_DIED (ef)
  291. A critical system process died
  292. Arguments:
  293. Arg1: ffff81842729f140, Process object or thread object
  294. Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
  295. Arg3: ffff81842729f140, The process object that initiated the termination.
  296. Arg4: 0000000000000000
  297.  
  298. Debugging Details:
  299. ------------------
  300.  
  301.  
  302. KEY_VALUES_STRING: 1
  303.  
  304. Key : Analysis.CPU.mSec
  305. Value: 2593
  306.  
  307. Key : Analysis.Elapsed.mSec
  308. Value: 3006
  309.  
  310. Key : Analysis.IO.Other.Mb
  311. Value: 0
  312.  
  313. Key : Analysis.IO.Read.Mb
  314. Value: 0
  315.  
  316. Key : Analysis.IO.Write.Mb
  317. Value: 0
  318.  
  319. Key : Analysis.Init.CPU.mSec
  320. Value: 249
  321.  
  322. Key : Analysis.Init.Elapsed.mSec
  323. Value: 5259
  324.  
  325. Key : Analysis.Memory.CommitPeak.Mb
  326. Value: 99
  327.  
  328. Key : Bugcheck.Code.LegacyAPI
  329. Value: 0xef
  330.  
  331. Key : Bugcheck.Code.TargetModel
  332. Value: 0xef
  333.  
  334. Key : CriticalProcessDied.ExceptionCode
  335. Value: 2fbe4080
  336.  
  337. Key : CriticalProcessDied.Process
  338. Value: csrss.exe
  339.  
  340. Key : Dump.Attributes.AsUlong
  341. Value: 1008
  342.  
  343. Key : Dump.Attributes.DiagDataWrittenToHeader
  344. Value: 1
  345.  
  346. Key : Dump.Attributes.ErrorCode
  347. Value: 0
  348.  
  349. Key : Dump.Attributes.KernelGeneratedTriageDump
  350. Value: 1
  351.  
  352. Key : Dump.Attributes.LastLine
  353. Value: Dump completed successfully.
  354.  
  355. Key : Dump.Attributes.ProgressPercentage
  356. Value: 0
  357.  
  358. Key : Failure.Bucket
  359. Value: 0xEF_csrss.exe_BUGCHECK_CRITICAL_PROCESS_2fbe4080_nt!PspCatchCriticalBreak
  360.  
  361. Key : Failure.Hash
  362. Value: {be513464-3c83-3d02-247e-b0e3eaecc076}
  363.  
  364.  
  365. BUGCHECK_CODE: ef
  366.  
  367. BUGCHECK_P1: ffff81842729f140
  368.  
  369. BUGCHECK_P2: 0
  370.  
  371. BUGCHECK_P3: ffff81842729f140
  372.  
  373. BUGCHECK_P4: 0
  374.  
  375. FILE_IN_CAB: 090524-12031-01.dmp
  376.  
  377. DUMP_FILE_ATTRIBUTES: 0x1008
  378. Kernel Generated Triage Dump
  379.  
  380. FAULTING_THREAD: ffff81842fbe4080
  381.  
  382. PROCESS_NAME: csrss.exe
  383.  
  384. CRITICAL_PROCESS: csrss.exe
  385.  
  386. EXCEPTION_RECORD: fffff98000000000 -- (.exr 0xfffff98000000000)
  387. Cannot read Exception record @ fffff98000000000
  388.  
  389. ERROR_CODE: (NTSTATUS) 0x2fbe4080 - <Unable to get error code text>
  390.  
  391. BLACKBOXBSD: 1 (!blackboxbsd)
  392.  
  393.  
  394. BLACKBOXNTFS: 1 (!blackboxntfs)
  395.  
  396.  
  397. BLACKBOXPNP: 1 (!blackboxpnp)
  398.  
  399.  
  400. BLACKBOXWINLOGON: 1
  401.  
  402. CUSTOMER_CRASH_COUNT: 1
  403.  
  404. TRAP_FRAME: fffff9fcfe7f3000 -- (.trap 0xfffff9fcfe7f3000)
  405. Unable to read trap frame at fffff9fc`fe7f3000
  406. Resetting default scope
  407.  
  408. STACK_TEXT:
  409. fffffd06`49596cf8 fffff800`60fb0bd9 : 00000000`000000ef ffff8184`2729f140 00000000`00000000 ffff8184`2729f140 : nt!KeBugCheckEx
  410. fffffd06`49596d00 fffff800`60f02f17 : ffff8184`2729f140 fffff800`60955d7d 00000000`00000000 fffff800`609556bf : nt!PspCatchCriticalBreak+0x119
  411. fffffd06`49596d90 fffff800`60ddc28f : ffff8184`2729f140 00000000`c0000005 ffff8184`2729f140 00000000`00000001 : nt!PspTerminateAllThreads+0x1277cb
  412. fffffd06`49596e00 fffff800`60ddc3b1 : ffffffff`ffffffff ffff8184`2729f140 ffff8184`2fbe4080 ffff8184`2729f140 : nt!PspTerminateProcess+0xe7
  413. fffffd06`49596e40 fffff800`60a2b308 : 0000009b`00000554 ffff8184`2fbe4080 ffff8184`2729f140 fffff800`60f367b7 : nt!NtTerminateProcess+0xb1
  414. fffffd06`49596ec0 fffff800`60a1b7a0 : fffff800`60ad255f ffffffff`ffffffff 0000009b`d7600db0 00000000`00000001 : nt!KiSystemServiceCopyEnd+0x28
  415. fffffd06`49597058 fffff800`60ad255f : ffffffff`ffffffff 0000009b`d7600db0 00000000`00000001 fffffd06`49597090 : nt!KiServiceLinkage
  416. fffffd06`49597060 fffff800`60a2bd7c : fffff980`00000000 00000000`00000000 fffff9fc`fe7f3000 00000000`00000000 : nt!KiDispatchException+0x16fe5f
  417. fffffd06`495978c0 fffff800`60a27063 : 00000000`00000014 00000000`00000000 0000009b`d76017d0 ffff8184`2fbe4080 : nt!KiExceptionDispatch+0x13c
  418. fffffd06`49597aa0 00007ffa`0e694039 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x463
  419. 0000009b`d7601000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`0e694039
  420.  
  421.  
  422. SYMBOL_NAME: nt!PspCatchCriticalBreak+119
  423.  
  424. MODULE_NAME: nt
  425.  
  426. IMAGE_NAME: ntkrnlmp.exe
  427.  
  428. IMAGE_VERSION: 10.0.22621.4036
  429.  
  430. STACK_COMMAND: .process /r /p 0xffff81842729f140; .thread 0xffff81842fbe4080 ; kb
  431.  
  432. BUCKET_ID_FUNC_OFFSET: 119
  433.  
  434. FAILURE_BUCKET_ID: 0xEF_csrss.exe_BUGCHECK_CRITICAL_PROCESS_2fbe4080_nt!PspCatchCriticalBreak
  435.  
  436. OSPLATFORM_TYPE: x64
  437.  
  438. OSNAME: Windows 10
  439.  
  440. FAILURE_ID_HASH: {be513464-3c83-3d02-247e-b0e3eaecc076}
  441.  
  442. Followup: MachineOwner
  443. ---------
  444.  
  445.  
Advertisement
Add Comment
Please, Sign In to add comment