Facebook
From shpark, 1 Year ago, written in Plain Text.
Embed
Download Paste or View Raw
Hits: 106
  1. *******************************************************************************
  2. *                                                                             *
  3. *                        Bugcheck Analysis                                    *
  4. *                                                                             *
  5. *******************************************************************************
  6.  
  7. IRQL_NOT_LESS_OR_EQUAL (a)
  8. An attempt was made to access a pageable (or completely invalid) address at an
  9. interrupt request level (IRQL) that is too high.  This is usually
  10. caused by drivers using improper addresses.
  11. If a kernel debugger is available get the stack backtrace.
  12. Arguments:
  13. Arg1: 0000000100000002, memory referenced
  14. Arg2: 0000000000000002, IRQL
  15. Arg3: 0000000000000000, bitfield :
  16.         bit 0 : value 0 = read operation, 1 = write operation
  17.         bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  18. Arg4: fffff80230cc625e, address which referenced memory
  19.  
  20. Debugging Details:
  21. ------------------
  22.  
  23.  
  24. KEY_VALUES_STRING: 1
  25.  
  26.     Key  : Analysis.CPU.Sec
  27.     Value: 1
  28.  
  29.     Key  : Analysis.DebugAnalysisProvider.CPP
  30.     Value: Create: 8007007e on DESKTOP-CS068K2
  31.  
  32.     Key  : Analysis.DebugData
  33.     Value: CreateObject
  34.  
  35.     Key  : Analysis.DebugModel
  36.     Value: CreateObject
  37.  
  38.     Key  : Analysis.Elapsed.Sec
  39.     Value: 1
  40.  
  41.     Key  : Analysis.Memory.CommitPeak.Mb
  42.     Value: 85
  43.  
  44.     Key  : Analysis.System
  45.     Value: CreateObject
  46.  
  47.  
  48. TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b
  49.  
  50.  
  51. DUMP_FILE_ATTRIBUTES: 0x808
  52.   Kernel Generated Triage Dump
  53.  
  54. BUGCHECK_CODE:  a
  55.  
  56. BUGCHECK_P1: 100000002
  57.  
  58. BUGCHECK_P2: 2
  59.  
  60. BUGCHECK_P3: 0
  61.  
  62. BUGCHECK_P4: fffff80230cc625e
  63.  
  64. READ_ADDRESS: fffff8023171c468: Unable to get MiVisibleState
  65. Unable to get NonPagedPoolStart
  66. Unable to get NonPagedPoolEnd
  67. Unable to get PagedPoolStart
  68. Unable to get PagedPoolEnd
  69. fffff802316099b8: Unable to get Flags value from nt!KdVersionBlock
  70. fffff802316099b8: Unable to get Flags value from nt!KdVersionBlock
  71. unable to get nt!MmSpecialPagesInUse
  72.  0000000100000002
  73.  
  74. CUSTOMER_CRASH_COUNT:  1
  75.  
  76. PROCESS_NAME:  CrossEXService
  77.  
  78. IRP_ADDRESS: ffffd2875f3657c0
  79.  
  80. DEVICE_OBJECT: ffffd28750780ca0
  81.  
  82. TRAP_FRAME:  ffff900029d9b0f0 -- (.trap 0xffff900029d9b0f0)
  83. NOTE: The trap frame does not contain all registers.
  84. Some register values may be zeroed or incorrect.
  85. rax=0000000100000002 rbx=0000000000000000 rcx=ffffd2875f365a90
  86. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
  87. rip=fffff80230cc625e rsp=ffff900029d9b280 rbp=0000000000000000
  88.  r8=0000000000000000  r9=0000000000000000 r10=00000000ffffffff
  89. r11=000000000000ab80 r12=0000000000000000 r13=0000000000000000
  90. r14=0000000000000000 r15=0000000000000000
  91. iopl=0         nv up ei pl nz ac po cy
  92. nt!KeSetEvent+0x8e:
  93. fffff802`30cc625e 488b08          mov     rcx,qword ptr [rax] ds:00000001`00000002=????????????????
  94. Resetting default scope
  95.  
  96. STACK_TEXT:  
  97. ffff9000`29d9afa8 fffff802`30e3eaa9 : 00000000`0000000a 00000001`00000002 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
  98. ffff9000`29d9afb0 fffff802`30e3a134 : ffffa580`00000000 ffffa580`06851180 00000001`00000000 fffff802`31749ac0 : nt!KiBugCheckDispatch+0x69
  99. ffff9000`29d9b0f0 fffff802`30cc625e : 00000000`00000000 ffffd287`5f365a90 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x474
  100. ffff9000`29d9b280 fffff802`30cd447b : ffffd287`00000000 ffff9000`29d9b439 ffffd287`649a5300 00000000`00000000 : nt!KeSetEvent+0x8e
  101. ffff9000`29d9b310 fffff802`30c1b236 : ffffd287`5f365838 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopCompleteRequest+0x22b
  102. ffff9000`29d9b3e0 fffff802`30ccbaea : ffffa580`06851100 00000000`00000000 00000000`00000004 ffffa580`00000000 : nt!KiDeliverApc+0x186
  103. ffff9000`29d9b4a0 fffff802`30cccae7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwapThread+0xf2a
  104. ffff9000`29d9b5f0 fffff802`30ccf106 : ffffd287`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x137
  105. ffff9000`29d9b6a0 fffff802`310d915c : ffffd287`664130c0 ffffd287`66f513e0 00000000`00000000 00000000`00000001 : nt!KeWaitForSingleObject+0x256
  106. ffff9000`29d9ba40 fffff802`310d907b : ffffd287`649a5300 00000000`00000000 00000000`00000000 00000000`00000028 : nt!ObWaitForSingleObject+0xcc
  107. ffff9000`29d9baa0 fffff802`30e3e1e8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWaitForSingleObject+0x6b
  108. ffff9000`29d9bae0 00000000`77191cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
  109. 00000000`036ff078 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77191cf3
  110.  
  111.  
  112. SYMBOL_NAME:  nt!KeSetEvent+8e
  113.  
  114. MODULE_NAME: nt
  115.  
  116. IMAGE_NAME:  ntkrnlmp.exe
  117.  
  118. IMAGE_VERSION:  10.0.22621.1413
  119.  
  120. STACK_COMMAND:  .thread ; .cxr ; kb
  121.  
  122. BUCKET_ID_FUNC_OFFSET:  8e
  123.  
  124. FAILURE_BUCKET_ID:  AV_nt!KeSetEvent
  125.  
  126. OSPLATFORM_TYPE:  x64
  127.  
  128. OSNAME:  Windows 10
  129.  
  130. FAILURE_ID_HASH:  {c42bf4ac-5ef0-4bd6-418f-0d54b7c20876}
  131.  
  132. Followup:     MachineOwner
  133. ---------
  134.  
  135.