Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ************* Preparing the environment for Debugger Extensions Gallery repositories **************
- ExtensionRepository : Implicit
- UseExperimentalFeatureForNugetShare : true
- AllowNugetExeUpdate : true
- NonInteractiveNuget : true
- AllowNugetMSCredentialProviderInstall : true
- AllowParallelInitializationOfLocalRepositories : true
- EnableRedirectToChakraJsProvider : false
- -- Configuring repositories
- ----> Repository : LocalInstalled, Enabled: true
- ----> Repository : UserExtensions, Enabled: true
- >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
- ************* Waiting for Debugger Extensions Gallery to Initialize **************
- >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.172 seconds
- ----> Repository : UserExtensions, Enabled: true, Packages count: 0
- ----> Repository : LocalInstalled, Enabled: true, Packages count: 42
- Microsoft (R) Windows Debugger Version 10.0.27668.1000 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Users\kenow\Documents\090824-11531-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 22621 MP (32 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Kernel base = 0xfffff801`35400000 PsLoadedModuleList = 0xfffff801`360134f0
- Debug session time: Sun Sep 8 01:13:55.481 2024 (UTC + 1:00)
- System Uptime: 2 days 9:05:45.734
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................................
- ................................................................
- Loading User Symbols
- PEB is paged out (Peb.Ldr = 00000000`0105d018). Type ".hh dbgerr001" for details
- Loading unloaded module list
- ..................................................
- For analysis of this file, run !analyze -v
- nt!KeBugCheckEx:
- fffff801`35815cb0 48894c2408 mov qword ptr [rsp+8],rcx ss:ffff9607`b4d0eed0=000000000000007a
- 10: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- KERNEL_DATA_INPAGE_ERROR (7a)
- The requested page of kernel data could not be read in. Typically caused by
- a bad block in the paging file or disk controller error. Also see
- KERNEL_STACK_INPAGE_ERROR.
- If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
- it means the disk subsystem has experienced a failure.
- If the error status is 0xC000009A, then it means the request failed because
- a filesystem failed to make forward progress.
- Arguments:
- Arg1: ffff80011a2d19c8, lock type that was held (value 1,2,3, or PTE address)
- Arg2: ffffffffc000000e, error status (normally i/o status code)
- Arg3: 0000000cc72db860, current process (virtual address for lock type 3, or PTE)
- Arg4: fffff8016ba0f00c, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
- Debugging Details:
- ------------------
- *** WARNING: Unable to verify timestamp for HTTP.sys
- PEB is paged out (Peb.Ldr = 00000000`0105d018). Type ".hh dbgerr001" for details
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 2686
- Key : Analysis.Elapsed.mSec
- Value: 7985
- Key : Analysis.IO.Other.Mb
- Value: 0
- Key : Analysis.IO.Read.Mb
- Value: 0
- Key : Analysis.IO.Write.Mb
- Value: 1
- Key : Analysis.Init.CPU.mSec
- Value: 249
- Key : Analysis.Init.Elapsed.mSec
- Value: 5122
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 89
- Key : Bugcheck.Code.LegacyAPI
- Value: 0x7a
- Key : Bugcheck.Code.TargetModel
- Value: 0x7a
- Key : Dump.Attributes.AsUlong
- Value: 1008
- Key : Dump.Attributes.DiagDataWrittenToHeader
- Value: 1
- Key : Dump.Attributes.ErrorCode
- Value: 0
- Key : Dump.Attributes.KernelGeneratedTriageDump
- Value: 1
- Key : Dump.Attributes.LastLine
- Value: Dump completed successfully.
- Key : Dump.Attributes.ProgressPercentage
- Value: 0
- Key : Failure.Bucket
- Value: 0x7a_c000000e_HTTP!unknown_function
- Key : Failure.Hash
- Value: {d781c069-abb4-aa0e-ee7b-ef9cf9904cce}
- BUGCHECK_CODE: 7a
- BUGCHECK_P1: ffff80011a2d19c8
- BUGCHECK_P2: ffffffffc000000e
- BUGCHECK_P3: cc72db860
- BUGCHECK_P4: fffff8016ba0f00c
- FILE_IN_CAB: 090824-11531-01.dmp
- DUMP_FILE_ATTRIBUTES: 0x1008
- Kernel Generated Triage Dump
- FAULTING_THREAD: ffffbe8d06056080
- ERROR_CODE: (NTSTATUS) 0xc000000e - A device which does not exist was specified.
- DISK_HARDWARE_ERROR: There was error with disk hardware
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: GameSDK.exe
- TRAP_FRAME: ffff9607b4d0f1f0 -- (.trap 0xffff9607b4d0f1f0)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=000000004c525443 rbx=0000000000000000 rcx=ffffbe8d0792ce10
- rdx=ffffbe8d115eeca0 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8016ba0f00c rsp=ffff9607b4d0f380 rbp=fffff8016b95eea0
- r8=ffffbe8d05d21450 r9=ffffbe8d0792ce10 r10=0000fffff8016ba0
- r11=ffff99781ea00000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz na pe cy
- HTTP+0x12f00c:
- fffff801`6ba0f00c ?? ???
- Resetting default scope
- STACK_TEXT:
- ffff9607`b4d0eec8 fffff801`358c78b3 : 00000000`0000007a ffff8001`1a2d19c8 ffffffff`c000000e 0000000c`c72db860 : nt!KeBugCheckEx
- ffff9607`b4d0eed0 fffff801`35743106 : 00000000`00000000 ffff9607`00000000 ffff9607`b4d0f078 fffff801`00000000 : nt!MiWaitForInPageComplete+0x184e63
- ffff9607`b4d0efd0 fffff801`35668071 : 00000000`c0033333 00000000`00000000 fffff801`6ba0f00c fffff801`6ba0f00c : nt!MiIssueHardFault+0x246
- ffff9607`b4d0f0d0 fffff801`35826f7e : ffffbe8d`05a020c0 ffffbe8d`05d21450 00000000`00000000 fffff801`358270ac : nt!MmAccessFault+0x331
- ffff9607`b4d0f1f0 fffff801`6ba0f00c : 00000000`00000010 00000000`00050217 ffff9607`b4d0f3a8 00000000`00000000 : nt!KiPageFault+0x37e
- ffff9607`b4d0f380 00000000`00000010 : 00000000`00050217 ffff9607`b4d0f3a8 00000000`00000000 ffffbe8d`115eeca0 : HTTP+0x12f00c
- ffff9607`b4d0f388 00000000`00050217 : ffff9607`b4d0f3a8 00000000`00000000 ffffbe8d`115eeca0 fffff801`35712655 : 0x10
- ffff9607`b4d0f390 ffff9607`b4d0f3a8 : 00000000`00000000 ffffbe8d`115eeca0 fffff801`35712655 ffffbe8d`05d21450 : 0x50217
- ffff9607`b4d0f398 00000000`00000000 : ffffbe8d`115eeca0 fffff801`35712655 ffffbe8d`05d21450 ffffbe8d`0792ce10 : 0xffff9607`b4d0f3a8
- SYMBOL_NAME: HTTP+12f00c
- MODULE_NAME: HTTP
- IMAGE_NAME: HTTP.sys
- STACK_COMMAND: .process /r /p 0xffffbe8d05a020c0; .thread 0xffffbe8d06056080 ; kb
- BUCKET_ID_FUNC_OFFSET: 12f00c
- FAILURE_BUCKET_ID: 0x7a_c000000e_HTTP!unknown_function
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {d781c069-abb4-aa0e-ee7b-ef9cf9904cce}
- Followup: MachineOwner
- ---------
- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2407.24003.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Usb4Kd.natvis'
- ************* Preparing the environment for Debugger Extensions Gallery repositories **************
- ExtensionRepository : Implicit
- UseExperimentalFeatureForNugetShare : true
- AllowNugetExeUpdate : true
- NonInteractiveNuget : true
- AllowNugetMSCredentialProviderInstall : true
- AllowParallelInitializationOfLocalRepositories : true
- EnableRedirectToChakraJsProvider : false
- -- Configuring repositories
- ----> Repository : LocalInstalled, Enabled: true
- ----> Repository : UserExtensions, Enabled: true
- >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
- ************* Waiting for Debugger Extensions Gallery to Initialize **************
- >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
- ----> Repository : UserExtensions, Enabled: true, Packages count: 0
- ----> Repository : LocalInstalled, Enabled: true, Packages count: 42
- Microsoft (R) Windows Debugger Version 10.0.27668.1000 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Users\xxxxx\Documents\090524-12031-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- ************* Path validation summary **************
- Response Time (ms) Location
- Deferred srv*
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 22621 MP (32 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Kernel base = 0xfffff800`60600000 PsLoadedModuleList = 0xfffff800`612134f0
- Debug session time: Thu Sep 5 14:07:23.529 2024 (UTC + 1:00)
- System Uptime: 0 days 11:27:51.128
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................................
- ................................................................
- ..
- Loading User Symbols
- PEB is paged out (Peb.Ldr = 0000009b`d75a4018). Type ".hh dbgerr001" for details
- Loading unloaded module list
- .........................
- For analysis of this file, run !analyze -v
- nt!KeBugCheckEx:
- fffff800`60a15cb0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffd06`49596d00=00000000000000ef
- 15: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- CRITICAL_PROCESS_DIED (ef)
- A critical system process died
- Arguments:
- Arg1: ffff81842729f140, Process object or thread object
- Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
- Arg3: ffff81842729f140, The process object that initiated the termination.
- Arg4: 0000000000000000
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 2593
- Key : Analysis.Elapsed.mSec
- Value: 3006
- Key : Analysis.IO.Other.Mb
- Value: 0
- Key : Analysis.IO.Read.Mb
- Value: 0
- Key : Analysis.IO.Write.Mb
- Value: 0
- Key : Analysis.Init.CPU.mSec
- Value: 249
- Key : Analysis.Init.Elapsed.mSec
- Value: 5259
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 99
- Key : Bugcheck.Code.LegacyAPI
- Value: 0xef
- Key : Bugcheck.Code.TargetModel
- Value: 0xef
- Key : CriticalProcessDied.ExceptionCode
- Value: 2fbe4080
- Key : CriticalProcessDied.Process
- Value: csrss.exe
- Key : Dump.Attributes.AsUlong
- Value: 1008
- Key : Dump.Attributes.DiagDataWrittenToHeader
- Value: 1
- Key : Dump.Attributes.ErrorCode
- Value: 0
- Key : Dump.Attributes.KernelGeneratedTriageDump
- Value: 1
- Key : Dump.Attributes.LastLine
- Value: Dump completed successfully.
- Key : Dump.Attributes.ProgressPercentage
- Value: 0
- Key : Failure.Bucket
- Value: 0xEF_csrss.exe_BUGCHECK_CRITICAL_PROCESS_2fbe4080_nt!PspCatchCriticalBreak
- Key : Failure.Hash
- Value: {be513464-3c83-3d02-247e-b0e3eaecc076}
- BUGCHECK_CODE: ef
- BUGCHECK_P1: ffff81842729f140
- BUGCHECK_P2: 0
- BUGCHECK_P3: ffff81842729f140
- BUGCHECK_P4: 0
- FILE_IN_CAB: 090524-12031-01.dmp
- DUMP_FILE_ATTRIBUTES: 0x1008
- Kernel Generated Triage Dump
- FAULTING_THREAD: ffff81842fbe4080
- PROCESS_NAME: csrss.exe
- CRITICAL_PROCESS: csrss.exe
- EXCEPTION_RECORD: fffff98000000000 -- (.exr 0xfffff98000000000)
- Cannot read Exception record @ fffff98000000000
- ERROR_CODE: (NTSTATUS) 0x2fbe4080 - <Unable to get error code text>
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- CUSTOMER_CRASH_COUNT: 1
- TRAP_FRAME: fffff9fcfe7f3000 -- (.trap 0xfffff9fcfe7f3000)
- Unable to read trap frame at fffff9fc`fe7f3000
- Resetting default scope
- STACK_TEXT:
- fffffd06`49596cf8 fffff800`60fb0bd9 : 00000000`000000ef ffff8184`2729f140 00000000`00000000 ffff8184`2729f140 : nt!KeBugCheckEx
- fffffd06`49596d00 fffff800`60f02f17 : ffff8184`2729f140 fffff800`60955d7d 00000000`00000000 fffff800`609556bf : nt!PspCatchCriticalBreak+0x119
- fffffd06`49596d90 fffff800`60ddc28f : ffff8184`2729f140 00000000`c0000005 ffff8184`2729f140 00000000`00000001 : nt!PspTerminateAllThreads+0x1277cb
- fffffd06`49596e00 fffff800`60ddc3b1 : ffffffff`ffffffff ffff8184`2729f140 ffff8184`2fbe4080 ffff8184`2729f140 : nt!PspTerminateProcess+0xe7
- fffffd06`49596e40 fffff800`60a2b308 : 0000009b`00000554 ffff8184`2fbe4080 ffff8184`2729f140 fffff800`60f367b7 : nt!NtTerminateProcess+0xb1
- fffffd06`49596ec0 fffff800`60a1b7a0 : fffff800`60ad255f ffffffff`ffffffff 0000009b`d7600db0 00000000`00000001 : nt!KiSystemServiceCopyEnd+0x28
- fffffd06`49597058 fffff800`60ad255f : ffffffff`ffffffff 0000009b`d7600db0 00000000`00000001 fffffd06`49597090 : nt!KiServiceLinkage
- fffffd06`49597060 fffff800`60a2bd7c : fffff980`00000000 00000000`00000000 fffff9fc`fe7f3000 00000000`00000000 : nt!KiDispatchException+0x16fe5f
- fffffd06`495978c0 fffff800`60a27063 : 00000000`00000014 00000000`00000000 0000009b`d76017d0 ffff8184`2fbe4080 : nt!KiExceptionDispatch+0x13c
- fffffd06`49597aa0 00007ffa`0e694039 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x463
- 0000009b`d7601000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`0e694039
- SYMBOL_NAME: nt!PspCatchCriticalBreak+119
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- IMAGE_VERSION: 10.0.22621.4036
- STACK_COMMAND: .process /r /p 0xffff81842729f140; .thread 0xffff81842fbe4080 ; kb
- BUCKET_ID_FUNC_OFFSET: 119
- FAILURE_BUCKET_ID: 0xEF_csrss.exe_BUGCHECK_CRITICAL_PROCESS_2fbe4080_nt!PspCatchCriticalBreak
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {be513464-3c83-3d02-247e-b0e3eaecc076}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment