Untitled
11 months ago in Plain Text
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.015 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.235 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25921.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff804`38e00000 PsLoadedModuleList = 0xfffff804`39a2a730
Debug session time: Sat Dec 16 09:28:49.738 2023 (UTC - 6:00)
System Uptime: 0 days 0:02:54.381
Loading Kernel Symbols
...............................................................
................................................................
................................................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`391fd6c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8907`82060b20=000000000000000a
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000000c0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8043905a8c0, address which referenced memory
Debugging Details:
------------------
*** WARNING: Check Image - Checksum mismatch - Dump: 0xd94f, File: 0x954c - C:\ProgramData\Dbg\sym\hal.dll\1A7BE8E96000\hal.dll
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4343
Key : Analysis.Elapsed.mSec
Value: 4405
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 608
Key : Analysis.Init.Elapsed.mSec
Value: 4585
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Bugcheck.Code.KiBugCheckData
Value: 0xa
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Failure.Bucket
Value: AV_nt!KiIntSteerCalculateDistribution
Key : Failure.Hash
Value: {3035e70d-e1a6-b78e-ff73-da6251b6f39c}
Key : Hypervisor.Enlightenments.Value
Value: 0
Key : Hypervisor.Enlightenments.ValueHex
Value: 0
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 0
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 0
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 0
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 0
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 0
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 0
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 0
Key : Hypervisor.Flags.Phase0InitDone
Value: 0
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 0
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 16777216
Key : Hypervisor.Flags.ValueHex
Value: 1000000
Key : Hypervisor.Flags.VpAssistPage
Value: 0
Key : Hypervisor.Flags.VsmAvailable
Value: 0
Key : Hypervisor.RootFlags.AccessStats
Value: 0
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 0
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 0
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 0
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 0
Key : Hypervisor.RootFlags.MceEnlightened
Value: 0
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 0
Key : Hypervisor.RootFlags.Value
Value: 0
Key : Hypervisor.RootFlags.ValueHex
Value: 0
Key : SecureKernel.HalpHvciEnabled
Value: 0
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: c0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8043905a8c0
FILE_IN_CAB: MEMORY.DMP
READ_ADDRESS: 00000000000000c0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
TRAP_FRAME: ffff890782060c60 -- (.trap 0xffff890782060c60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000057 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043905a8c0 rsp=ffff890782060df0 rbp=ffff890782061260
r8=0000000000000004 r9=fffff80439a2b090 r10=0000000000000001
r11=ffff890782061250 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
nt!KiIntSteerCalculateDistribution+0x120:
fffff804`3905a8c0 4839b8c0000000 cmp qword ptr [rax+0C0h],rdi ds:00000000`000000c0=????????????????
Resetting default scope
STACK_TEXT:
ffff8907`82060b18 fffff804`39211729 : 00000000`0000000a 00000000`000000c0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8907`82060b20 fffff804`3920d2e3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8907`82060c60 fffff804`3905a8c0 : 00000000`00000000 ffffcb02`7cfc4040 00000000`00000007 00000000`00000000 : nt!KiPageFault+0x463
ffff8907`82060df0 fffff804`3905a587 : 00000000`00000002 00000000`00000002 00000000`00000001 ffff8907`82061440 : nt!KiIntSteerCalculateDistribution+0x120
ffff8907`820612b0 fffff804`3905a347 : 00000000`00000001 0f0f0f0f`00000000 00000000`00000001 ffff8907`82061b30 : nt!KeIntSteerPeriodic+0x67
ffff8907`820613c0 fffff804`390b41b0 : ffff8907`82061b30 ffff8a81`ff91b180 000000b9`173745ed ffffcb02`76ff9000 : nt!PpmParkSteerInterrupts+0x447
ffff8907`820617f0 fffff804`390c166e : ffff8a81`ff91e240 ffff8907`82061960 00000000`00000000 ffff8a81`00000002 : nt!PpmCheckRun+0x40
ffff8907`82061860 fffff804`390c0954 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
ffff8907`820619d0 fffff804`39201fbe : ffffffff`00000000 ffff8a81`ff91b180 ffff8a81`ff926240 ffffcb02`7cfc4040 : nt!KiRetireDpcList+0x1f4
ffff8907`82061c60 00000000`00000000 : ffff8907`82062000 ffff8907`8205c000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiIntSteerCalculateDistribution+120
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 120
FAILURE_BUCKET_ID: AV_nt!KiIntSteerCalculateDistribution
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3035e70d-e1a6-b78e-ff73-da6251b6f39c}
Followup: MachineOwner
---------