Facebook
From shpark, 1 Year ago, written in Plain Text.
Embed
Download Paste or View Raw
Hits: 118
  1. *******************************************************************************
  2. *                                                                             *
  3. *                        Bugcheck Analysis                                    *
  4. *                                                                             *
  5. *******************************************************************************
  6.  
  7. IRQL_NOT_LESS_OR_EQUAL (a)
  8. An attempt was made to access a pageable (or completely invalid) address at an
  9. interrupt request level (IRQL) that is too high.  This is usually
  10. caused by drivers using improper addresses.
  11. If a kernel debugger is available get the stack backtrace.
  12. Arguments:
  13. Arg1: 0000000000001fb0, memory referenced
  14. Arg2: 0000000000000002, IRQL
  15. Arg3: 0000000000000001, bitfield :
  16.         bit 0 : value 0 = read operation, 1 = write operation
  17.         bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  18. Arg4: fffff80456a1f1c5, address which referenced memory
  19.  
  20. Debugging Details:
  21. ------------------
  22.  
  23.  
  24. KEY_VALUES_STRING: 1
  25.  
  26.     Key  : Analysis.CPU.Sec
  27.     Value: 1
  28.  
  29.     Key  : Analysis.DebugAnalysisProvider.CPP
  30.     Value: Create: 8007007e on DESKTOP-CS068K2
  31.  
  32.     Key  : Analysis.DebugData
  33.     Value: CreateObject
  34.  
  35.     Key  : Analysis.DebugModel
  36.     Value: CreateObject
  37.  
  38.     Key  : Analysis.Elapsed.Sec
  39.     Value: 1
  40.  
  41.     Key  : Analysis.Memory.CommitPeak.Mb
  42.     Value: 83
  43.  
  44.     Key  : Analysis.System
  45.     Value: CreateObject
  46.  
  47.  
  48. TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b
  49.  
  50.  
  51. DUMP_FILE_ATTRIBUTES: 0x1808
  52.   Kernel Generated Triage Dump
  53.  
  54. BUGCHECK_CODE:  a
  55.  
  56. BUGCHECK_P1: 1fb0
  57.  
  58. BUGCHECK_P2: 2
  59.  
  60. BUGCHECK_P3: 1
  61.  
  62. BUGCHECK_P4: fffff80456a1f1c5
  63.  
  64. WRITE_ADDRESS: fffff8045751c468: Unable to get MiVisibleState
  65. Unable to get NonPagedPoolStart
  66. Unable to get NonPagedPoolEnd
  67. Unable to get PagedPoolStart
  68. Unable to get PagedPoolEnd
  69. fffff804574099b8: Unable to get Flags value from nt!KdVersionBlock
  70. fffff804574099b8: Unable to get Flags value from nt!KdVersionBlock
  71. unable to get nt!MmSpecialPagesInUse
  72.  0000000000001fb0
  73.  
  74. BLACKBOXBSD: 1 (!blackboxbsd)
  75.  
  76.  
  77. BLACKBOXNTFS: 1 (!blackboxntfs)
  78.  
  79.  
  80. BLACKBOXPNP: 1 (!blackboxpnp)
  81.  
  82.  
  83. BLACKBOXWINLOGON: 1
  84.  
  85. CUSTOMER_CRASH_COUNT:  1
  86.  
  87. PROCESS_NAME:  nvcontainer.ex
  88.  
  89. TRAP_FRAME:  ffffa484730a4f10 -- (.trap 0xffffa484730a4f10)
  90. NOTE: The trap frame does not contain all registers.
  91. Some register values may be zeroed or incorrect.
  92. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
  93. rdx=0000000000001f80 rsi=0000000000000000 rdi=0000000000000000
  94. rip=fffff80456a1f1c5 rsp=ffffa484730a50a8 rbp=ffffa484730a51b0
  95.  r8=ffffa484730a50b0  r9=0000000000000000 r10=fffff8045219e180
  96. r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
  97. r14=0000000000000000 r15=0000000000000000
  98. iopl=0         nv up ei pl zr na po nc
  99. nt!KiReleasePrcbLocksForIsolationUnit+0x35:
  100. fffff804`56a1f1c5 f04883623000    lock and qword ptr [rdx+30h],0 ds:00000000`00001fb0=????????????????
  101. Resetting default scope
  102.  
  103. STACK_TEXT:  
  104. ffffa484`730a4dc8 fffff804`56c3eaa9 : 00000000`0000000a 00000000`00001fb0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
  105. ffffa484`730a4dd0 fffff804`56c3a134 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69
  106. ffffa484`730a4f10 fffff804`56a1f1c5 : fffff804`56acc3b6 00000000`00001f80 fffff804`5219e180 ffffc009`00000001 : nt!KiPageFault+0x474
  107. ffffa484`730a50a8 fffff804`56acc3b6 : 00000000`00001f80 fffff804`5219e180 ffffc009`00000001 ffffa484`730a51b0 : nt!KiReleasePrcbLocksForIsolationUnit+0x35
  108. ffffa484`730a50b0 fffff804`56acb480 : ffff1ac7`732d67d5 00000000`00000000 00000000`00000000 ffffc009`7765d540 : nt!KiSearchForNewThread+0x836
  109. ffffa484`730a54a0 fffff804`56accae7 : ffffc009`7765d528 ffffc009`7765d5d1 ffffc009`7765d5d2 00000000`00000000 : nt!KiSwapThread+0x8c0
  110. ffffa484`730a55f0 fffff804`56acf106 : 00000000`00000000 ffffc009`00000001 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x137
  111. ffffa484`730a56a0 fffff804`56ed915c : ffffc009`551540c0 ffffc009`49ef1460 00000000`00000000 00000000`00040201 : nt!KeWaitForSingleObject+0x256
  112. ffffa484`730a5a40 fffff804`56ed907b : ffffc009`4a35c080 000001b6`b837e610 00000000`00000000 00000000`00000020 : nt!ObWaitForSingleObject+0xcc
  113. ffffa484`730a5aa0 fffff804`56c3e1e8 : 00000000`00000000 ffffc009`49ee0ee0 00000000`00000000 00000000`00000000 : nt!NtWaitForSingleObject+0x6b
  114. ffffa484`730a5ae0 00007ffc`8a26ecd4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
  115. 00000048`f74ff678 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`8a26ecd4
  116.  
  117.  
  118. SYMBOL_NAME:  nt!KiReleasePrcbLocksForIsolationUnit+35
  119.  
  120. MODULE_NAME: nt
  121.  
  122. IMAGE_NAME:  ntkrnlmp.exe
  123.  
  124. IMAGE_VERSION:  10.0.22621.1413
  125.  
  126. STACK_COMMAND:  .thread ; .cxr ; kb
  127.  
  128. BUCKET_ID_FUNC_OFFSET:  35
  129.  
  130. FAILURE_BUCKET_ID:  AV_nt!KiReleasePrcbLocksForIsolationUnit
  131.  
  132. OSPLATFORM_TYPE:  x64
  133.  
  134. OSNAME:  Windows 10
  135.  
  136. FAILURE_ID_HASH:  {a2b6060b-e8e1-a5a4-9e51-cb2c3ec738d7}
  137.  
  138. Followup:     MachineOwner
  139. ---------
  140.  
  141.