Facebook
From shpark, 1 Year ago, written in Plain Text.
Embed
Download Paste or View Raw
Hits: 77
  1. *******************************************************************************
  2. *                                                                             *
  3. *                        Bugcheck Analysis                                    *
  4. *                                                                             *
  5. *******************************************************************************
  6.  
  7. IRQL_NOT_LESS_OR_EQUAL (a)
  8. An attempt was made to access a pageable (or completely invalid) address at an
  9. interrupt request level (IRQL) that is too high.  This is usually
  10. caused by drivers using improper addresses.
  11. If a kernel debugger is available get the stack backtrace.
  12. Arguments:
  13. Arg1: 00000000000000e8, memory referenced
  14. Arg2: 0000000000000002, IRQL
  15. Arg3: 0000000000000001, bitfield :
  16.         bit 0 : value 0 = read operation, 1 = write operation
  17.         bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  18. Arg4: fffff806670357e7, address which referenced memory
  19.  
  20. Debugging Details:
  21. ------------------
  22.  
  23.  
  24. KEY_VALUES_STRING: 1
  25.  
  26.     Key  : Analysis.CPU.Sec
  27.     Value: 1
  28.  
  29.     Key  : Analysis.DebugAnalysisProvider.CPP
  30.     Value: Create: 8007007e on DESKTOP-CS068K2
  31.  
  32.     Key  : Analysis.DebugData
  33.     Value: CreateObject
  34.  
  35.     Key  : Analysis.DebugModel
  36.     Value: CreateObject
  37.  
  38.     Key  : Analysis.Elapsed.Sec
  39.     Value: 1
  40.  
  41.     Key  : Analysis.Memory.CommitPeak.Mb
  42.     Value: 86
  43.  
  44.     Key  : Analysis.System
  45.     Value: CreateObject
  46.  
  47.  
  48. TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b
  49.  
  50.  
  51. DUMP_FILE_ATTRIBUTES: 0x808
  52.   Kernel Generated Triage Dump
  53.  
  54. BUGCHECK_CODE:  a
  55.  
  56. BUGCHECK_P1: e8
  57.  
  58. BUGCHECK_P2: 2
  59.  
  60. BUGCHECK_P3: 1
  61.  
  62. BUGCHECK_P4: fffff806670357e7
  63.  
  64. WRITE_ADDRESS: fffff80667b1c468: Unable to get MiVisibleState
  65. Unable to get NonPagedPoolStart
  66. Unable to get NonPagedPoolEnd
  67. Unable to get PagedPoolStart
  68. Unable to get PagedPoolEnd
  69. fffff80667a099b8: Unable to get Flags value from nt!KdVersionBlock
  70. fffff80667a099b8: Unable to get Flags value from nt!KdVersionBlock
  71. unable to get nt!MmSpecialPagesInUse
  72.  00000000000000e8
  73.  
  74. CUSTOMER_CRASH_COUNT:  1
  75.  
  76. PROCESS_NAME:  OP.GG.exe
  77.  
  78. TRAP_FRAME:  ffff8d062371d9c0 -- (.trap 0xffff8d062371d9c0)
  79. NOTE: The trap frame does not contain all registers.
  80. Some register values may be zeroed or incorrect.
  81. rax=0000000000000001 rbx=0000000000000000 rcx=00000000000000e8
  82. rdx=007051f200009036 rsi=0000000000000000 rdi=0000000000000000
  83. rip=fffff806670357e7 rsp=ffff8d062371db50 rbp=7fffffffffffff11
  84.  r8=0000000000000001  r9=0000000000000001 r10=0000000000000032
  85. r11=0000003fffffffff r12=0000000000000000 r13=0000000000000000
  86. r14=0000000000000000 r15=0000000000000000
  87. iopl=0         nv up ei pl zr na po nc
  88. nt!ExAcquireSpinLockExclusiveAtDpcLevel+0x27:
  89. fffff806`670357e7 f00fba291f      lock bts dword ptr [rcx],1Fh ds:00000000`000000e8=????????
  90. Resetting default scope
  91.  
  92. STACK_TEXT:  
  93. ffff8d06`2371d878 fffff806`6723eaa9 : 00000000`0000000a 00000000`000000e8 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
  94. ffff8d06`2371d880 fffff806`6723a134 : 00000000`00000000 00000000`00000000 ffff8000`15f9f988 fffff806`67a6c218 : nt!KiBugCheckDispatch+0x69
  95. ffff8d06`2371d9c0 fffff806`670357e7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x474
  96. ffff8d06`2371db50 fffff806`67126c53 : 00000000`007051f2 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExAcquireSpinLockExclusiveAtDpcLevel+0x27
  97. ffff8d06`2371db80 fffff806`670eab5e : fffff806`67a6afc0 00000000`00000001 ffff8000`00000001 ffffa18f`00000001 : nt!MiReleasePageFileInfo+0x14f
  98. ffff8d06`2371dbf0 fffff806`670e7207 : fffffe26`00000000 00000000`00000000 ffff8d06`2371dd11 ffffa18f`00000001 : nt!MiDeleteTransitionPte+0x2ae
  99. ffff8d06`2371dc80 fffff806`67066798 : 00000000`004d4ec3 fffff806`6706a3fe ffff8000`00000001 ffff8d06`00000001 : nt!MiTryDeleteTransitionPte+0x3b
  100. ffff8d06`2371dcb0 fffff806`67069275 : ffff8d06`2371e390 00000000`00000000 00000000`00000005 ffff8d06`2371e200 : nt!MiDeletePteRun+0xaa8
  101. ffff8d06`2371deb0 fffff806`6705bed8 : 00000000`00000000 ffffa18f`15124740 ffff8d06`2371e2e0 00000000`00000000 : nt!MiDeleteVaTail+0x55
  102. ffff8d06`2371dee0 fffff806`6705bacd : fffffe26`00000000 00000000`00000000 00000000`00000000 ffffa18f`15124740 : nt!MiWalkPageTablesRecursively+0xd38
  103. ffff8d06`2371df70 fffff806`6705bacd : fffffe7f`00000000 00000000`00000000 00000000`00000001 ffffa18f`15124740 : nt!MiWalkPageTablesRecursively+0x92d
  104. ffff8d06`2371e000 fffff806`6705bacd : fffffe7f`00000000 00000000`00000000 00000000`00000002 ffffa18f`15124740 : nt!MiWalkPageTablesRecursively+0x92d
  105. ffff8d06`2371e090 fffff806`6707eb91 : 00000000`00000000 ffffa18f`00000000 00000000`00000003 ffffa18f`15124740 : nt!MiWalkPageTablesRecursively+0x92d
  106. ffff8d06`2371e120 fffff806`6706ab77 : ffff8d06`2371e2e0 00001f80`00000001 fffffe00`00000002 ffffa18f`00000000 : nt!MiWalkPageTables+0x371
  107. ffff8d06`2371e220 fffff806`670a6582 : 00000000`00000000 fffff806`670a674d ffff8d06`2371e5e8 ffffa18f`234cc080 : nt!MiDeletePagablePteRange+0x747
  108. ffff8d06`2371e550 fffff806`674cb6c8 : 00000000`00000000 00000000`00000001 00000000`00000000 ffff8d06`2371e620 : nt!MiDeleteVirtualAddresses+0x52
  109. ffff8d06`2371e5a0 fffff806`674fbd96 : ffffa18f`151240c0 ffffa18f`1a4d0220 ffffa18f`00000000 00000000`00000000 : nt!MiDeleteVad+0x1a8
  110. ffff8d06`2371e660 fffff806`674fb8fd : ffffa18f`3751e330 ffffa18f`3751e330 ffffa18f`3751e330 ffffa18f`151240c0 : nt!MiCleanVad+0x42
  111. ffff8d06`2371e690 fffff806`67545691 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffa18f`151240c0 : nt!MmCleanProcessAddressSpace+0x10d
  112. ffff8d06`2371e710 fffff806`674a86e4 : ffffa18f`151240c0 ffffde05`cbe318b0 ffff8d06`2371e939 00000000`00000000 : nt!PspRundownSingleProcess+0xc1
  113. ffff8d06`2371e7a0 fffff806`675e6218 : ffff8000`80000001 ffff8d06`2371ea01 ffffa18f`234cc0f4 00000032`fb8ef000 : nt!PspExitThread+0x63c
  114. ffff8d06`2371e8a0 fffff806`6701b557 : 0000445a`00274080 00000000`00000004 ffff8d06`2371eae0 fffffe22`2d0013a0 : nt!KiSchedulerApcTerminate+0x38
  115. ffff8d06`2371e8e0 fffff806`6722f5a0 : 0000445a`00273001 ffff8d06`2371e9a0 00000000`00000000 fffff806`67057652 : nt!KiDeliverApc+0x4a7
  116. ffff8d06`2371e9a0 fffff806`6723e28f : 0000445a`00274000 ffff8d06`2371eb60 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
  117. ffff8d06`2371eae0 00007fff`0c1aecd4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
  118. 00000032`827ff238 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`0c1aecd4
  119.  
  120.  
  121. SYMBOL_NAME:  nt!ExAcquireSpinLockExclusiveAtDpcLevel+27
  122.  
  123. MODULE_NAME: nt
  124.  
  125. IMAGE_NAME:  ntkrnlmp.exe
  126.  
  127. IMAGE_VERSION:  10.0.22621.1413
  128.  
  129. STACK_COMMAND:  .thread ; .cxr ; kb
  130.  
  131. BUCKET_ID_FUNC_OFFSET:  27
  132.  
  133. FAILURE_BUCKET_ID:  AV_nt!ExAcquireSpinLockExclusiveAtDpcLevel
  134.  
  135. OSPLATFORM_TYPE:  x64
  136.  
  137. OSNAME:  Windows 10
  138.  
  139. FAILURE_ID_HASH:  {2d838a6f-0e2e-fbf8-f6b6-d687446804d5}
  140.  
  141. Followup:     MachineOwner
  142. ---------
  143.  
  144.