JustPaste.it

Minidumps

1)

IRQL_NOT_LESS_OR_EQUAL (a)

An attempt was made to access a pageable (or completely invalid) address at an

interrupt request level (IRQL) that is too high.  This is usually

caused by drivers using improper addresses.

If a kernel debugger is available get the stack backtrace.

Arguments:

Arg1: 0000000000000001, memory referenced

Arg2: 00000000000000ff, IRQL

Arg3: 0000000000000000, bitfield :

bit 0 : value 0 = read operation, 1 = write operation

bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)

Arg4: fffff802158627de, address which referenced memory

 

Debugging Details:

------------------



KEY_VALUES_STRING: 1

 

    Key  : Analysis.CPU.mSec

    Value: 1905

 

    Key  : Analysis.Elapsed.mSec

    Value: 2000

 

    Key  : Analysis.IO.Other.Mb

    Value: 0

 

    Key  : Analysis.IO.Read.Mb

    Value: 0

 

    Key  : Analysis.IO.Write.Mb

    Value: 0

 

    Key  : Analysis.Init.CPU.mSec

    Value: 358

 

    Key  : Analysis.Init.Elapsed.mSec

    Value: 4509

 

    Key  : Analysis.Memory.CommitPeak.Mb

    Value: 98

 

    Key  : Bugcheck.Code.LegacyAPI

    Value: 0xa

 

    Key  : Dump.Attributes.AsUlong

    Value: 1008

 

    Key  : Dump.Attributes.DiagDataWrittenToHeader

    Value: 1

 

    Key  : Dump.Attributes.ErrorCode

    Value: 0

 

    Key  : Dump.Attributes.KernelGeneratedTriageDump

    Value: 1

 

    Key  : Dump.Attributes.LastLine

    Value: Dump completed successfully.

 

    Key  : Dump.Attributes.ProgressPercentage

    Value: 0

 

    Key  : Failure.Bucket

    Value: IP_MISALIGNED_GenuineIntel.sys

 

    Key  : Failure.Hash

    Value: {e930d917-b247-3f7f-23cb-88a0c9f1b274}



BUGCHECK_CODE:  a

 

BUGCHECK_P1: 1

 

BUGCHECK_P2: ff

 

BUGCHECK_P3: 0

 

BUGCHECK_P4: fffff802158627de

 

FILE_IN_CAB:  062023-6375-01.dmp

 

DUMP_FILE_ATTRIBUTES: 0x1008

  Kernel Generated Triage Dump

 

READ_ADDRESS: fffff8021611c468: Unable to get MiVisibleState

Unable to get NonPagedPoolStart

Unable to get NonPagedPoolEnd

Unable to get PagedPoolStart

Unable to get PagedPoolEnd

unable to get nt!MmSpecialPagesInUse

 0000000000000001 

 

BLACKBOXBSD: 1 (!blackboxbsd)



BLACKBOXNTFS: 1 (!blackboxntfs)



BLACKBOXPNP: 1 (!blackboxpnp)



BLACKBOXWINLOGON: 1

 

CUSTOMER_CRASH_COUNT:  1

 

PROCESS_NAME:  System

 

TRAP_FRAME:  ffff980f882478e0 -- (.trap 0xffff980f882478e0)

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000

rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000

rip=fffff802158627de rsp=ffff980f88247a70 rbp=0000000000000000

 r8=00000000041212fe  r9=0000000000000000 r10=0000000000000000

r11=0000000000000000 r12=0000000000000000 r13=0000000000000000

r14=0000000000000000 r15=0000000000000000

iopl=0         nv up di pl zr na po nc

nt!KiUpdateSpeculationControl+0x1454ee:

fffff802`158627de ad              lods    dword ptr [rsi] ds:00000000`00000000=????????

Resetting default scope

 

MISALIGNED_IP: 

nt!KiUpdateSpeculationControl+1454ee

fffff802`158627de ad              lods    dword ptr [rsi]

 

STACK_TEXT:  

ffff980f`88247798 fffff802`158418a9     : 00000000`0000000a 00000000`00000001 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx

ffff980f`882477a0 fffff802`1583cf34     : ffffffff`00000000 ffffae81`ffffffff ffffdb9e`a7003312 ffffd284`dcfea5c0 : nt!KiBugCheckDispatch+0x69

ffff980f`882478e0 fffff802`158627de     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x474

ffff980f`88247a70 fffff802`158359b7     : 004fa4ef`bd9bbfff ffffd284`00000000 ffffd284`00400000 ffffae81`0465127b : nt!KiUpdateSpeculationControl+0x1454ee

ffff980f`88247b00 fffff802`15831156     : 00000000`00000000 00000000`00000000 ffffd284`d6735040 ffffd284`e6b175c0 : nt!SwapContext+0x1c7

ffff980f`88247b40 00000000`00000000     : ffff980f`88248000 ffff980f`88241000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x176



SYMBOL_NAME:  nt!KiUpdateSpeculationControl+1454ee

 

IMAGE_VERSION:  10.0.22621.1848

 

STACK_COMMAND:  .cxr; .ecxr ; kb

 

MODULE_NAME: GenuineIntel

 

IMAGE_NAME:  GenuineIntel.sys

 

FAILURE_BUCKET_ID:  IP_MISALIGNED_GenuineIntel.sys

 

OSPLATFORM_TYPE:  x64

 

OSNAME:  Windows 10

 

FAILURE_ID_HASH:  {e930d917-b247-3f7f-23cb-88a0c9f1b274}

 

Followup:     MachineOwner













2)

IRQL_NOT_LESS_OR_EQUAL (a)

An attempt was made to access a pageable (or completely invalid) address at an

interrupt request level (IRQL) that is too high.  This is usually

caused by drivers using improper addresses.

If a kernel debugger is available get the stack backtrace.

Arguments:

Arg1: 0000000000000004, memory referenced

Arg2: 00000000000000ff, IRQL

Arg3: 000000000000002b, bitfield :

bit 0 : value 0 = read operation, 1 = write operation

bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)

Arg4: fffff80630ee1a8d, address which referenced memory

 

Debugging Details:

------------------



KEY_VALUES_STRING: 1

 

    Key  : Analysis.CPU.mSec

    Value: 1609

 

    Key  : Analysis.Elapsed.mSec

    Value: 1629

 

    Key  : Analysis.IO.Other.Mb

    Value: 0

 

    Key  : Analysis.IO.Read.Mb

    Value: 0

 

    Key  : Analysis.IO.Write.Mb

    Value: 0

 

    Key  : Analysis.Init.CPU.mSec

    Value: 342

 

    Key  : Analysis.Init.Elapsed.mSec

    Value: 4745

 

    Key  : Analysis.Memory.CommitPeak.Mb

    Value: 86

 

    Key  : Bugcheck.Code.LegacyAPI

    Value: 0xa

 

    Key  : Dump.Attributes.AsUlong

    Value: 1008

 

    Key  : Dump.Attributes.DiagDataWrittenToHeader

    Value: 1

 

    Key  : Dump.Attributes.ErrorCode

    Value: 0

 

    Key  : Dump.Attributes.KernelGeneratedTriageDump

    Value: 1

 

    Key  : Dump.Attributes.LastLine

    Value: Dump completed successfully.

 

    Key  : Dump.Attributes.ProgressPercentage

    Value: 0

 

    Key  : Failure.Bucket

    Value: AV_CODE_AV_nt!EtwpLevelKeywordEnabled

 

    Key  : Failure.Hash

    Value: {568a980c-750f-2c52-bdd7-8f69b0c91d59}



BUGCHECK_CODE:  a

 

BUGCHECK_P1: 4

 

BUGCHECK_P2: ff

 

BUGCHECK_P3: 2b

 

BUGCHECK_P4: fffff80630ee1a8d

 

FILE_IN_CAB:  062023-6390-01.dmp

 

DUMP_FILE_ATTRIBUTES: 0x1008

  Kernel Generated Triage Dump

 

WRITE_ADDRESS: fffff8063191c468: Unable to get MiVisibleState

Unable to get NonPagedPoolStart

Unable to get NonPagedPoolEnd

Unable to get PagedPoolStart

Unable to get PagedPoolEnd

unable to get nt!MmSpecialPagesInUse

 0000000000000004 

 

BLACKBOXBSD: 1 (!blackboxbsd)



BLACKBOXNTFS: 1 (!blackboxntfs)



BLACKBOXPNP: 1 (!blackboxpnp)



BLACKBOXWINLOGON: 1

 

CUSTOMER_CRASH_COUNT:  1

 

PROCESS_NAME:  Diablo IV.exe

 

TRAP_FRAME:  ffffb9805457aaf0 -- (.trap 0xffffb9805457aaf0)

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=00000000000003a1 rbx=0000000000000000 rcx=ffff8505733fd770

rdx=0000000000000004 rsi=0000000000000000 rdi=0000000000000000

rip=fffff80630ee1a8d rsp=ffffb9805457ac88 rbp=0000000000027100

 r8=4000000000000004  r9=4000000000000004 r10=fffff80630f6a7e0

r11=0000000000000000 r12=0000000000000000 r13=0000000000000000

r14=0000000000000000 r15=0000000000000000

iopl=0         nv up di pl zr na po nc

nt!EtwpLevelKeywordEnabled+0x1d:

fffff806`30ee1a8d 7508            jne     nt!EtwpLevelKeywordEnabled+0x27 (fffff806`30ee1a97) [br=0]

Resetting default scope

 

STACK_TEXT:  

ffffb980`5457a9a8 fffff806`310418a9     : 00000000`0000000a 00000000`00000004 00000000`000000ff 00000000`0000002b : nt!KeBugCheckEx

ffffb980`5457a9b0 fffff806`3103cf34     : b903ed9b`e8496a0f fffff806`93949ed3 ffff8505`80c1e4e0 00000000`00000007 : nt!KiBugCheckDispatch+0x69

ffffb980`5457aaf0 fffff806`30ee1a8d     : fffff806`30ee09e9 0000001d`ad8060d5 00000000`00000001 ffffb980`54560180 : nt!KiPageFault+0x474

ffffb980`5457ac88 fffff806`30ee09e9     : 0000001d`ad8060d5 00000000`00000001 ffffb980`54560180 00000000`00027100 : nt!EtwpLevelKeywordEnabled+0x1d

ffffb980`5457ac90 fffff806`30edfb6f     : 00000000`00000003 ffffb980`54560180 00000000`00027100 00000000`00027100 : nt!EtwEventEnabled+0x59

ffffb980`5457acc0 fffff806`30edcaa6     : 00000000`0000000d 00000000`00000000 ffffb980`54560180 00000000`00000c7e : nt!KiSetNextClockTickDueTime+0x46f

ffffb980`5457aea0 fffff806`30edc219     : fffff806`3185ff20 00000000`00000001 00000000`00000001 00000000`00000000 : nt!KeClockInterruptNotify+0x366

ffffb980`5457af40 fffff806`30f1757c     : 0000001d`add48570 ffff8505`72d59fe0 ffff8505`72d5a090 00000000`00000000 : nt!HalpTimerClockInterrupt+0x109

ffffb980`5457af70 fffff806`3102e3da     : ffffc987`34b5fa60 ffff8505`72d59fe0 0000025d`e5d767b0 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0x9c

ffffb980`5457afb0 fffff806`3102ec47     : 0000025e`106b8380 ffff8505`72d59b60 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa

ffffc987`34b5f9e0 00007ff6`eb4c3c82     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37

000000fa`232fe8c0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff6`eb4c3c82



SYMBOL_NAME:  nt!EtwpLevelKeywordEnabled+1d

 

MODULE_NAME: nt

 

IMAGE_NAME:  ntkrnlmp.exe

 

IMAGE_VERSION:  10.0.22621.1848

 

STACK_COMMAND:  .cxr; .ecxr ; kb

 

BUCKET_ID_FUNC_OFFSET:  1d

 

FAILURE_BUCKET_ID:  AV_CODE_AV_nt!EtwpLevelKeywordEnabled

 

OSPLATFORM_TYPE:  x64

 

OSNAME:  Windows 10

 

FAILURE_ID_HASH:  {568a980c-750f-2c52-bdd7-8f69b0c91d59}

 

Followup:     MachineOwner

 

 

 

 

 

3)

SYSTEM_SERVICE_EXCEPTION (3b)

An exception happened while executing a system service routine.

Arguments:

Arg1: 00000000c0000005, Exception code that caused the BugCheck

Arg2: fffff8013f0b6542, Address of the instruction which caused the BugCheck

Arg3: ffff800717f7e7c0, Address of the context record for the exception that caused the BugCheck

Arg4: 0000000000000000, zero.

 

Debugging Details:

------------------



KEY_VALUES_STRING: 1

 

    Key  : Analysis.CPU.mSec

    Value: 1546

 

    Key  : Analysis.Elapsed.mSec

    Value: 1555

 

    Key  : Analysis.IO.Other.Mb

    Value: 0

 

    Key  : Analysis.IO.Read.Mb

    Value: 0

 

    Key  : Analysis.IO.Write.Mb

    Value: 0

 

    Key  : Analysis.Init.CPU.mSec

    Value: 327

 

    Key  : Analysis.Init.Elapsed.mSec

    Value: 4986

 

    Key  : Analysis.Memory.CommitPeak.Mb

    Value: 91

 

    Key  : Bugcheck.Code.LegacyAPI

    Value: 0x3b

 

    Key  : Dump.Attributes.AsUlong

    Value: 1008

 

    Key  : Dump.Attributes.DiagDataWrittenToHeader

    Value: 1

 

    Key  : Dump.Attributes.ErrorCode

    Value: 0

 

    Key  : Dump.Attributes.KernelGeneratedTriageDump

    Value: 1

 

    Key  : Dump.Attributes.LastLine

    Value: Dump completed successfully.

 

    Key  : Dump.Attributes.ProgressPercentage

    Value: 0

 

    Key  : Failure.Bucket

    Value: AV_nt!ObWaitForMultipleObjects

 

    Key  : Failure.Hash

    Value: {53188f0d-e1b8-788f-a37a-25a7a83704bd}



BUGCHECK_CODE:  3b

 

BUGCHECK_P1: c0000005

 

BUGCHECK_P2: fffff8013f0b6542

 

BUGCHECK_P3: ffff800717f7e7c0

 

BUGCHECK_P4: 0

 

FILE_IN_CAB:  062023-6453-01.dmp

 

DUMP_FILE_ATTRIBUTES: 0x1008

  Kernel Generated Triage Dump

 

CONTEXT:  ffff800717f7e7c0 -- (.cxr 0xffff800717f7e7c0)

rax=0000000000000000 rbx=0000000017f7f488 rcx=8bdf0a28619c0000

rdx=000000007457624f rsi=0000000000000000 rdi=0000000000000003

rip=fffff8013f0b6542 rsp=ffff800717f7f1e0 rbp=ffff800717f7f220

 r8=0000000000000001  r9=00000000000000a0 r10=00000000000000a0

r11=ffff800717f7f290 r12=0000000000000000 r13=ffff950b3b31d700

r14=ffff950b3a591080 r15=ffff950b3a695080

iopl=0         ov up ei pl nz ac pe nc

cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00050a12

nt!ObWaitForMultipleObjects+0x322:

fffff801`3f0b6542 488b0b          mov     rcx,qword ptr [rbx] ds:002b:00000000`17f7f488=????????????????

Resetting default scope

 

BLACKBOXBSD: 1 (!blackboxbsd)



BLACKBOXNTFS: 1 (!blackboxntfs)



BLACKBOXPNP: 1 (!blackboxpnp)



BLACKBOXWINLOGON: 1

 

CUSTOMER_CRASH_COUNT:  1

 

PROCESS_NAME:  MsMpEng.exe

 

STACK_TEXT:  

ffff8007`17f7f1e0 fffff801`3f19ce2c     : ffff950b`00000000 fffff801`00000001 ffff8007`17f7f728 ffffaa01`0ca8f180 : nt!ObWaitForMultipleObjects+0x322

ffff8007`17f7f6e0 fffff801`3ee40fe5     : ffff950b`38635dc8 fffff801`3ee6f7de ffff950b`3a591080 00000000`00000000 : nt!NtWaitForMultipleObjects+0x11c

ffff8007`17f7f970 00007fff`9e22f7a4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25

00000081`1f47f238 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`9e22f7a4



SYMBOL_NAME:  nt!ObWaitForMultipleObjects+322

 

MODULE_NAME: nt

 

IMAGE_NAME:  ntkrnlmp.exe

 

IMAGE_VERSION:  10.0.22621.1848

 

STACK_COMMAND:  .cxr 0xffff800717f7e7c0 ; kb

 

BUCKET_ID_FUNC_OFFSET:  322

 

FAILURE_BUCKET_ID:  AV_nt!ObWaitForMultipleObjects

 

OSPLATFORM_TYPE:  x64

 

OSNAME:  Windows 10

 

FAILURE_ID_HASH:  {53188f0d-e1b8-788f-a37a-25a7a83704bd}

 

Followup:     MachineOwner

---------




4)

IRQL_NOT_LESS_OR_EQUAL (a)

An attempt was made to access a pageable (or completely invalid) address at an

interrupt request level (IRQL) that is too high.  This is usually

caused by drivers using improper addresses.

If a kernel debugger is available get the stack backtrace.

Arguments:

Arg1: 000000004588c122, memory referenced

Arg2: 00000000000000ff, IRQL

Arg3: 0000000000000056, bitfield :

bit 0 : value 0 = read operation, 1 = write operation

bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)

Arg4: fffff8045542e2fc, address which referenced memory

 

Debugging Details:

------------------



KEY_VALUES_STRING: 1

 

    Key  : Analysis.CPU.mSec

    Value: 1562

 

    Key  : Analysis.Elapsed.mSec

    Value: 1561

 

    Key  : Analysis.IO.Other.Mb

    Value: 0

 

    Key  : Analysis.IO.Read.Mb

    Value: 0

 

    Key  : Analysis.IO.Write.Mb

    Value: 0

 

    Key  : Analysis.Init.CPU.mSec

    Value: 328

 

    Key  : Analysis.Init.Elapsed.mSec

    Value: 4357

 

    Key  : Analysis.Memory.CommitPeak.Mb

    Value: 97

 

    Key  : Bugcheck.Code.LegacyAPI

    Value: 0xa

 

    Key  : Dump.Attributes.AsUlong

    Value: 1008

 

    Key  : Dump.Attributes.DiagDataWrittenToHeader

    Value: 1

 

    Key  : Dump.Attributes.ErrorCode

    Value: 0

 

    Key  : Dump.Attributes.KernelGeneratedTriageDump

    Value: 1

 

    Key  : Dump.Attributes.LastLine

    Value: Dump completed successfully.

 

    Key  : Dump.Attributes.ProgressPercentage

    Value: 0

 

    Key  : Failure.Bucket

    Value: AV_CODE_AV_nt!KiInterruptSubDispatchNoLockNoEtw

 

    Key  : Failure.Hash

    Value: {6a9bf971-fd09-0acd-c057-c021331220bb}



BUGCHECK_CODE:  a

 

BUGCHECK_P1: 4588c122

 

BUGCHECK_P2: ff

 

BUGCHECK_P3: 56

 

BUGCHECK_P4: fffff8045542e2fc

 

FILE_IN_CAB:  062023-6406-01.dmp

 

DUMP_FILE_ATTRIBUTES: 0x1008

  Kernel Generated Triage Dump

 

READ_ADDRESS: fffff80455d1c468: Unable to get MiVisibleState

Unable to get NonPagedPoolStart

Unable to get NonPagedPoolEnd

Unable to get PagedPoolStart

Unable to get PagedPoolEnd

unable to get nt!MmSpecialPagesInUse

 000000004588c122 

 

BLACKBOXBSD: 1 (!blackboxbsd)



BLACKBOXNTFS: 1 (!blackboxntfs)



BLACKBOXPNP: 1 (!blackboxpnp)



BLACKBOXWINLOGON: 1

 

CUSTOMER_CRASH_COUNT:  1

 

PROCESS_NAME:  chrome.exe

 

TRAP_FRAME:  ffff99003e57ae20 -- (.trap 0xffff99003e57ae20)

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=0000000000000000 rbx=0000000000000000 rcx=000000000000000f

rdx=ffffde8c532079e0 rsi=0000000000000000 rdi=0000000000000000

rip=fffff8045542e2fc rsp=ffff99003e57afb0 rbp=ffffde8c53207a60

 r8=00000000fc8c5b53  r9=0000000078620c25 r10=fffff8045542ec10

r11=0000000000000000 r12=0000000000000000 r13=0000000000000000

r14=0000000000000000 r15=0000000000000000

iopl=0         nv up di pl zr na po nc

nt!KiInterruptSubDispatchNoLockNoEtw+0x1c:

fffff804`5542e2fc 440f22c1        mov     cr8,rcx

Resetting default scope

 

STACK_TEXT:  

ffff9900`3e57acd8 fffff804`554418a9     : 00000000`0000000a 00000000`4588c122 00000000`000000ff 00000000`00000056 : nt!KeBugCheckEx

ffff9900`3e57ace0 fffff804`5543cf34     : 00000000`00000001 000000b2`1759ab62 00000023`c49ab003 00000026`ffcda0b1 : nt!KiBugCheckDispatch+0x69

ffff9900`3e57ae20 fffff804`5542e2fc     : ffffde8c`53207a60 ffffa98e`8ff48b60 00000000`01bffd40 00000000`00000000 : nt!KiPageFault+0x474

ffff9900`3e57afb0 fffff804`5542ec47     : 0000271c`00000000 ffffa98e`00000001 0000271c`014de000 0000271c`006b33c0 : nt!KiInterruptSubDispatchNoLockNoEtw+0x1c

ffffde8c`532079e0 00007ffa`e8ff6288     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37

00000005`0ddff3c0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`e8ff6288



SYMBOL_NAME:  nt!KiInterruptSubDispatchNoLockNoEtw+1c

 

MODULE_NAME: nt

 

IMAGE_NAME:  ntkrnlmp.exe

 

IMAGE_VERSION:  10.0.22621.1848

 

STACK_COMMAND:  .cxr; .ecxr ; kb

 

BUCKET_ID_FUNC_OFFSET:  1c

 

FAILURE_BUCKET_ID:  AV_CODE_AV_nt!KiInterruptSubDispatchNoLockNoEtw

 

OSPLATFORM_TYPE:  x64

 

OSNAME:  Windows 10

 

FAILURE_ID_HASH:  {6a9bf971-fd09-0acd-c057-c021331220bb}

 

Followup:     MachineOwner

---------





5)

PAGE_FAULT_IN_NONPAGED_AREA (50)

Invalid system memory was referenced.  This cannot be protected by try-except.

Typically the address is just plain bad or it is pointing at freed memory.

Arguments:

Arg1: fffffffffffffd13, memory referenced.

Arg2: 0000000000000002, X64: bit 0 set if the fault was due to a not-present PTE.

bit 1 is set if the fault was due to a write, clear if a read.

bit 3 is set if the processor decided the fault was due to a corrupted PTE.

bit 4 is set if the fault was due to attempted execute of a no-execute PTE.

- ARM64: bit 1 is set if the fault was due to a write, clear if a read.

bit 3 is set if the fault was due to attempted execute of a no-execute PTE.

Arg3: fffff8037608644d, If non-zero, the instruction address which referenced the bad memory

address.

Arg4: 0000000000000002, (reserved)

 

Debugging Details:

------------------



KEY_VALUES_STRING: 1

 

    Key  : AV.Type

    Value: Write

 

    Key  : Analysis.CPU.mSec

    Value: 1796

 

    Key  : Analysis.Elapsed.mSec

    Value: 1833

 

    Key  : Analysis.IO.Other.Mb

    Value: 0

 

    Key  : Analysis.IO.Read.Mb

    Value: 0

 

    Key  : Analysis.IO.Write.Mb

    Value: 0

 

    Key  : Analysis.Init.CPU.mSec

    Value: 343

 

    Key  : Analysis.Init.Elapsed.mSec

    Value: 4694

 

    Key  : Analysis.Memory.CommitPeak.Mb

    Value: 91

 

    Key  : Bugcheck.Code.LegacyAPI

    Value: 0x50

 

    Key  : Dump.Attributes.AsUlong

    Value: 1008

 

    Key  : Dump.Attributes.DiagDataWrittenToHeader

    Value: 1

 

    Key  : Dump.Attributes.ErrorCode

    Value: 0

 

    Key  : Dump.Attributes.KernelGeneratedTriageDump

    Value: 1

 

    Key  : Dump.Attributes.LastLine

    Value: Dump completed successfully.

 

    Key  : Dump.Attributes.ProgressPercentage

    Value: 0

 

    Key  : Failure.Bucket

    Value: AV_W_(null)_nt!ExAllocateHeapPool

 

    Key  : Failure.Hash

    Value: {40a8fda6-b978-062a-8930-a958e50d0f5f}



BUGCHECK_CODE:  50

 

BUGCHECK_P1: fffffffffffffd13

 

BUGCHECK_P2: 2

 

BUGCHECK_P3: fffff8037608644d

 

BUGCHECK_P4: 2

 

FILE_IN_CAB:  062023-6453-01.dmp

 

DUMP_FILE_ATTRIBUTES: 0x1008

  Kernel Generated Triage Dump

 

READ_ADDRESS: fffff80376b1c468: Unable to get MiVisibleState

Unable to get NonPagedPoolStart

Unable to get NonPagedPoolEnd

Unable to get PagedPoolStart

Unable to get PagedPoolEnd

unable to get nt!MmSpecialPagesInUse

 fffffffffffffd13 

 

MM_INTERNAL_CODE:  2

 

BLACKBOXBSD: 1 (!blackboxbsd)



BLACKBOXNTFS: 1 (!blackboxntfs)



BLACKBOXWINLOGON: 1

 

CUSTOMER_CRASH_COUNT:  1

 

PROCESS_NAME:  RtkAudUService

 

TRAP_FRAME:  fffff4086f986ff0 -- (.trap 0xfffff4086f986ff0)

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=0000000000000002 rbx=0000000000000000 rcx=fffff80376a74840

rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000

rip=fffff8037608644d rsp=fffff4086f987180 rbp=fffff4086f987241

 r8=fffff80375e00000  r9=0000000000000000 r10=0000000000000000

r11=0000000000000000 r12=0000000000000000 r13=0000000000000000

r14=0000000000000000 r15=0000000000000000

iopl=0         nv up ei ng nz na po cy

nt!ExAllocateHeapPool+0x43d:

fffff803`7608644d 0f8713fdffff    ja      nt!ExAllocateHeapPool+0x156 (fffff803`76086166) [br=0]

Resetting default scope

 

STACK_TEXT:  

fffff408`6f986dc8 fffff803`7628d6b9     : 00000000`00000050 ffffffff`fffffd13 00000000`00000002 fffff408`6f986ff0 : nt!KeBugCheckEx

fffff408`6f986dd0 fffff803`76033f0c     : 00000000`00000000 00000000`00000002 00000000`00000000 ffffffff`fffffd13 : nt!MiSystemFault+0x25d1e9

fffff408`6f986ed0 fffff803`7623ce29     : 00000000`00000000 00000000`00000000 00000000`20206d4d 00000000`00000000 : nt!MmAccessFault+0x29c

fffff408`6f986ff0 fffff803`7608644d     : 00000001`00000004 00000000`00000000 00000000`00000000 00000000`00000005 : nt!KiPageFault+0x369

fffff408`6f987180 fffff803`76085fdf     : 00000000`00000000 00000000`00000200 00000000`20206d4d ffffa80c`79b662b0 : nt!ExAllocateHeapPool+0x43d

fffff408`6f9872a0 fffff803`7602af76     : 00000000`80000000 00000000`00000410 00000000`20206d4d fffff803`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f

fffff408`6f9872f0 fffff803`766ae602     : ffffa80c`79b662b0 ffffa80c`76690a50 ffffa80c`79b1fd70 00000000`00000000 : nt!MiAllocatePool+0x86

fffff408`6f987340 fffff803`766a65a6     : ffffa80c`6e0f3600 fffff408`6f987490 00000000`00000000 00000000`00000000 : nt!MmGetFileNameForAddress+0x80

fffff408`6f987390 fffff803`766a48b8     : ffffa80c`6e3fdd00 ffffa80c`6e3fdd00 ffffa80c`79b1fd70 ffffa80c`79b1fd70 : nt!EtwpProviderArrivalCallback+0xe5946

fffff408`6f987620 fffff803`7651a393     : 00000000`00000000 00000000`00000001 00000000`0000003e 00000000`00000000 : nt!EtwpAddRegEntryToGroup+0x18cd08

fffff408`6f9877a0 fffff803`7651a1b5     : 00000000`00000000 00000000`00000090 ffffffff`ffffffff 00000000`00a84430 : nt!EtwpSetProviderTraitsCommon+0x1a7

fffff408`6f987850 fffff803`765186af     : ffffa80c`79b1fd70 00000000`0000001e 00000042`00000005 ffffa80c`79b1fd70 : nt!EtwpSetProviderTraitsUm+0x16d

fffff408`6f9878d0 fffff803`76240fe5     : 00000000`0000001e 00000042`000fcb68 00000000`00000018 00000042`000fcb80 : nt!NtTraceControl+0x35f

fffff408`6f987970 00007ffb`322b26a4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25

00000042`000fcb28 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`322b26a4



SYMBOL_NAME:  nt!ExAllocateHeapPool+43d

 

MODULE_NAME: nt

 

IMAGE_NAME:  ntkrnlmp.exe

 

IMAGE_VERSION:  10.0.22621.1848

 

STACK_COMMAND:  .cxr; .ecxr ; kb

 

BUCKET_ID_FUNC_OFFSET:  43d

 

FAILURE_BUCKET_ID:  AV_W_(null)_nt!ExAllocateHeapPool

 

OSPLATFORM_TYPE:  x64

 

OSNAME:  Windows 10

 

FAILURE_ID_HASH:  {40a8fda6-b978-062a-8930-a958e50d0f5f}

 

Followup:     MachineOwner