************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : true AllowNugetExeUpdate : true NonInteractiveNuget : true AllowNugetMSCredentialProviderInstall : true AllowParallelInitializationOfLocalRepositories : true EnableRedirectToChakraJsProvider : false -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.016 seconds ************* Waiting for Debugger Extensions Gallery to Initialize ************** >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 42 Microsoft (R) Windows Debugger Version 10.0.27668.1000 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\082324-7843-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 22621 MP (24 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Edition build lab: 22621.1.amd64fre.ni_release.220506-1250 Kernel base = 0xfffff803`16c00000 PsLoadedModuleList = 0xfffff803`178134f0 Debug session time: Fri Aug 23 20:52:49.670 2024 (UTC + 2:00) System Uptime: 0 days 2:22:43.334 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ .. Loading User Symbols PEB is paged out (Peb.Ldr = 00000000`00204018). Type ".hh dbgerr001" for details Loading unloaded module list ............... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff803`17015cb0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff38a`5fbb6060=000000000000000a 14: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000801000000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80316e81d55, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1046 Key : Analysis.Elapsed.mSec Value: 2839 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 515 Key : Analysis.Init.Elapsed.mSec Value: 8698 Key : Analysis.Memory.CommitPeak.Mb Value: 93 Key : Bugcheck.Code.LegacyAPI Value: 0xa Key : Bugcheck.Code.TargetModel Value: 0xa Key : Failure.Bucket Value: AV_ACE_BASE!unknown_function Key : Failure.Hash Value: {2a7f67f1-b324-eb93-e618-e903b45ded5c} Key : Hypervisor.Enlightenments.ValueHex Value: 1417df84 Key : Hypervisor.Flags.AnyHypervisorPresent Value: 1 Key : Hypervisor.Flags.ApicEnlightened Value: 0 Key : Hypervisor.Flags.ApicVirtualizationAvailable Value: 1 Key : Hypervisor.Flags.AsyncMemoryHint Value: 0 Key : Hypervisor.Flags.CoreSchedulerRequested Value: 0 Key : Hypervisor.Flags.CpuManager Value: 1 Key : Hypervisor.Flags.DeprecateAutoEoi Value: 1 Key : Hypervisor.Flags.DynamicCpuDisabled Value: 1 Key : Hypervisor.Flags.Epf Value: 0 Key : Hypervisor.Flags.ExtendedProcessorMasks Value: 1 Key : Hypervisor.Flags.HardwareMbecAvailable Value: 1 Key : Hypervisor.Flags.MaxBankNumber Value: 0 Key : Hypervisor.Flags.MemoryZeroingControl Value: 0 Key : Hypervisor.Flags.NoExtendedRangeFlush Value: 0 Key : Hypervisor.Flags.NoNonArchCoreSharing Value: 1 Key : Hypervisor.Flags.Phase0InitDone Value: 1 Key : Hypervisor.Flags.PowerSchedulerQos Value: 0 Key : Hypervisor.Flags.RootScheduler Value: 0 Key : Hypervisor.Flags.SynicAvailable Value: 1 Key : Hypervisor.Flags.UseQpcBias Value: 0 Key : Hypervisor.Flags.Value Value: 21631230 Key : Hypervisor.Flags.ValueHex Value: 14a10fe Key : Hypervisor.Flags.VpAssistPage Value: 1 Key : Hypervisor.Flags.VsmAvailable Value: 1 Key : Hypervisor.RootFlags.AccessStats Value: 1 Key : Hypervisor.RootFlags.CrashdumpEnlightened Value: 1 Key : Hypervisor.RootFlags.CreateVirtualProcessor Value: 1 Key : Hypervisor.RootFlags.DisableHyperthreading Value: 0 Key : Hypervisor.RootFlags.HostTimelineSync Value: 1 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled Value: 0 Key : Hypervisor.RootFlags.IsHyperV Value: 1 Key : Hypervisor.RootFlags.LivedumpEnlightened Value: 1 Key : Hypervisor.RootFlags.MapDeviceInterrupt Value: 1 Key : Hypervisor.RootFlags.MceEnlightened Value: 1 Key : Hypervisor.RootFlags.Nested Value: 0 Key : Hypervisor.RootFlags.StartLogicalProcessor Value: 1 Key : Hypervisor.RootFlags.Value Value: 1015 Key : Hypervisor.RootFlags.ValueHex Value: 3f7 Key : WER.OS.Branch Value: ni_release Key : WER.OS.Version Value: 10.0.22621.1 BUGCHECK_CODE: a BUGCHECK_P1: 801000000 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80316e81d55 FILE_IN_CAB: 082324-7843-01.dmp TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b FAULTING_THREAD: ffff8e0b65df1080 READ_ADDRESS: fffff8031791c470: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000801000000 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: DeltaForceClient-Win64-Shipping.exe TRAP_FRAME: fffff38a5fbb61a0 -- (.trap 0xfffff38a5fbb61a0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000801000000 rbx=0000000000000000 rcx=0000000000000029 rdx=fffff38a5fbb7168 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80316e81d55 rsp=fffff38a5fbb6330 rbp=fffff38a5fbb6a20 r8=0000000000000006 r9=fffff80316d17a70 r10=0000000000000018 r11=fffff80316c00000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc nt!RtlpUnwindPrologue+0x165: fffff803`16e81d55 483b10 cmp rdx,qword ptr [rax] ds:00000008`01000000=???????????????? Resetting default scope STACK_TEXT: fffff38a`5fbb6058 fffff803`1702bc29 : 00000000`0000000a 00000008`01000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff38a`5fbb6060 fffff803`17027089 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff38a`5fbb61a0 fffff803`16e81d55 : ffffe701`80023000 fffff803`16f4eb31 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x489 fffff38a`5fbb6330 fffff803`16e81828 : fffff803`16c00000 fffff803`173d4cf4 fffff38a`5fbb7020 fffff803`16d17a70 : nt!RtlpUnwindPrologue+0x165 fffff38a`5fbb6400 fffff803`16e80254 : 00000000`00000008 00000000`00000013 fffff803`173d4cf4 fffff803`16d17a70 : nt!RtlpxVirtualUnwind+0x108 fffff38a`5fbb64c0 fffff803`16e05d0e : 00000000`00000000 00000000`00000001 00000000`00000003 00000000`00000080 : nt!RtlpWalkFrameChain+0x314 fffff38a`5fbb6bd0 fffff803`16e05c62 : 00000000`00000002 fffff38a`5fbb6c90 fffff38a`5fbb6c78 00000000`00000010 : nt!RtlWalkFrameChain+0x6e fffff38a`5fbb6c00 fffff803`1722ea68 : 00000000`00000080 fffff38a`5fbb6cf9 00000000`00000003 00000000`00000090 : nt!RtlCaptureStackBackTrace+0x42 fffff38a`5fbb6c30 fffff803`17091533 : ffff8180`00000000 ffffe700`00000000 00000000`00000004 00000000`003960cb : nt!MiShowBadMapper+0xac fffff38a`5fbb6d60 fffff803`1722e663 : ffff8e0b`681cf000 ffff8180`08154460 ffff8e0b`00000000 ffff8e0b`681cf700 : nt!MiInsertPhysicalPteMapping+0x1f1ea3 fffff38a`5fbb6da0 fffff803`1762e316 : ffff8180`08163df8 ffff8e0b`65df1080 ffff8e0b`63bc5dd0 00000000`02000000 : nt!MiInsertViewOfPhysicalSection+0x123 fffff38a`5fbb6e10 fffff803`1749eb51 : 00000010`00000001 fffff38a`5fbb7078 fffff38a`5fbb7088 fffff38a`5fbb70b0 : nt!MiMapViewOfPhysicalSection+0x356 fffff38a`5fbb6ee0 fffff803`173d4cf4 : 00000000`00000000 fffff38a`5fbb7250 00000000`00000004 00000000`00000000 : nt!MiMapViewOfSection+0xc9951 fffff38a`5fbb7020 fffff803`1702b305 : ffff8e0b`65df1080 fffff38a`5fbb7388 fffff38a`5fbb73c8 00000000`00000000 : nt!NtMapViewOfSection+0x154 fffff38a`5fbb7160 fffff803`1701b7a0 : fffff803`40c79932 ffff8e0b`5e53d970 ffff8e0b`704a4a50 11f9222a`7a91acb1 : nt!KiSystemServiceCopyEnd+0x25 fffff38a`5fbb7368 fffff803`40c79932 : ffff8e0b`5e53d970 ffff8e0b`704a4a50 11f9222a`7a91acb1 ada0c780`cfe48d8f : nt!KiServiceLinkage fffff38a`5fbb7370 ffff8e0b`5e53d970 : ffff8e0b`704a4a50 11f9222a`7a91acb1 ada0c780`cfe48d8f 00000000`02000000 : ACE_BASE+0x29932 fffff38a`5fbb7378 ffff8e0b`704a4a50 : 11f9222a`7a91acb1 ada0c780`cfe48d8f 00000000`02000000 fffff38a`5fbb73f0 : 0xffff8e0b`5e53d970 fffff38a`5fbb7380 11f9222a`7a91acb1 : ada0c780`cfe48d8f 00000000`02000000 fffff38a`5fbb73f0 fffff38a`5fbb73e0 : 0xffff8e0b`704a4a50 fffff38a`5fbb7388 ada0c780`cfe48d8f : 00000000`02000000 fffff38a`5fbb73f0 fffff38a`5fbb73e0 00000000`00000001 : 0x11f9222a`7a91acb1 fffff38a`5fbb7390 00000000`02000000 : fffff38a`5fbb73f0 fffff38a`5fbb73e0 00000000`00000001 ffff8e0b`00000000 : 0xada0c780`cfe48d8f fffff38a`5fbb7398 fffff38a`5fbb73f0 : fffff38a`5fbb73e0 00000000`00000001 ffff8e0b`00000000 ffff8e0b`00000004 : 0x2000000 fffff38a`5fbb73a0 fffff38a`5fbb73e0 : 00000000`00000001 ffff8e0b`00000000 ffff8e0b`00000004 ffff8e0b`00000000 : 0xfffff38a`5fbb73f0 fffff38a`5fbb73a8 00000000`00000001 : ffff8e0b`00000000 ffff8e0b`00000004 ffff8e0b`00000000 00000000`000104f4 : 0xfffff38a`5fbb73e0 fffff38a`5fbb73b0 ffff8e0b`00000000 : ffff8e0b`00000004 ffff8e0b`00000000 00000000`000104f4 ffff8e0b`5e53d9e8 : 0x1 fffff38a`5fbb73b8 ffff8e0b`00000004 : ffff8e0b`00000000 00000000`000104f4 ffff8e0b`5e53d9e8 ffff8e0b`680d90d8 : 0xffff8e0b`00000000 fffff38a`5fbb73c0 ffff8e0b`00000000 : 00000000`000104f4 ffff8e0b`5e53d9e8 ffff8e0b`680d90d8 00000000`02000000 : 0xffff8e0b`00000004 fffff38a`5fbb73c8 00000000`000104f4 : ffff8e0b`5e53d9e8 ffff8e0b`680d90d8 00000000`02000000 00000000`00000000 : 0xffff8e0b`00000000 fffff38a`5fbb73d0 ffff8e0b`5e53d9e8 : ffff8e0b`680d90d8 00000000`02000000 00000000`00000000 00000003`96000000 : 0x104f4 fffff38a`5fbb73d8 ffff8e0b`680d90d8 : 00000000`02000000 00000000`00000000 00000003`96000000 00000000`00000030 : 0xffff8e0b`5e53d9e8 fffff38a`5fbb73e0 00000000`02000000 : 00000000`00000000 00000003`96000000 00000000`00000030 00000000`00000000 : 0xffff8e0b`680d90d8 fffff38a`5fbb73e8 00000000`00000000 : 00000003`96000000 00000000`00000030 00000000`00000000 fffff38a`5fbb7428 : 0x2000000 SYMBOL_NAME: ACE_BASE+29932 MODULE_NAME: ACE_BASE IMAGE_NAME: ACE-BASE.sys STACK_COMMAND: .process /r /p 0xffff8e0b681cf080; .thread 0xffff8e0b65df1080 ; kb BUCKET_ID_FUNC_OFFSET: 29932 FAILURE_BUCKET_ID: AV_ACE_BASE!unknown_function OS_VERSION: 10.0.22621.1 BUILDLAB_STR: ni_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {2a7f67f1-b324-eb93-e618-e903b45ded5c} Followup: MachineOwner ---------