************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.312 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25921.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\Downloads\greg\112423-10812-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff806`7d600000 PsLoadedModuleList = 0xfffff806`7e2134a0
Debug session time: Fri Nov 24 10:15:24.617 2023 (UTC + 0:00)
System Uptime: 0 days 1:10:32.270
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
..............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`7da16980 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff60c`93b7d5c0=000000000000000a
7: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8058a89be20, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8068a87f6bf, address which referenced memory
Debugging Details:
------------------
*** WARNING: Check Image - Checksum mismatch - Dump: 0x20397e, File: 0x2039f2 - C:\ProgramData\Dbg\sym\BTHport.sys\5249EE07202000\BTHport.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6187
Key : Analysis.Elapsed.mSec
Value: 16522
Key : Analysis.IO.Other.Mb
Value: 12
Key : Analysis.IO.Read.Mb
Value: 13
Key : Analysis.IO.Write.Mb
Value: 41
Key : Analysis.Init.CPU.mSec
Value: 1453
Key : Analysis.Init.Elapsed.mSec
Value: 51396
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_bddci!unknown_function
Key : Failure.Hash
Value: {26543f81-49dd-6bd2-b0fe-b3443123a4f7}
BUGCHECK_CODE: d1
BUGCHECK_P1: fffff8058a89be20
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8068a87f6bf
FILE_IN_CAB: 112423-10812-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
READ_ADDRESS: fffff8067e31d470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff8058a89be20
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff60c93b7d700 -- (.trap 0xfffff60c93b7d700)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8058a89be18 rbx=0000000000000000 rcx=f2c34a74d0870000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8068a87f6bf rsp=fffff60c93b7d890 rbp=fffff60c93b7d911
r8=00000000000054eb r9=000010c4000008b8 r10=0000000000000000
r11=fffff60c93b7d7c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
bddci+0x2f6bf:
fffff806`8a87f6bf 488b5808 mov rbx,qword ptr [rax+8] ds:fffff805`8a89be20=????????????????
Resetting default scope
STACK_TEXT:
fffff60c`93b7d5b8 fffff806`7da2bfa9 : 00000000`0000000a fffff805`8a89be20 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff60c`93b7d5c0 fffff806`7da27634 : fffff60c`93b7d850 fffff60c`93b7d848 fffff60c`93b7d828 fffff806`7e0accae : nt!KiBugCheckDispatch+0x69
fffff60c`93b7d700 fffff806`8a87f6bf : ffffe609`3f10eb20 00000000`00000000 00000000`00000000 fffff806`8ca76fc0 : nt!KiPageFault+0x474
fffff60c`93b7d890 ffffe609`3f10eb20 : 00000000`00000000 00000000`00000000 fffff806`8ca76fc0 fffff60c`93b7d8c0 : bddci+0x2f6bf
fffff60c`93b7d898 00000000`00000000 : 00000000`00000000 fffff806`8ca76fc0 fffff60c`93b7d8c0 fffff806`7da59970 : 0xffffe609`3f10eb20
SYMBOL_NAME: bddci+2f6bf
MODULE_NAME: bddci
IMAGE_NAME: bddci.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 2f6bf
FAILURE_BUCKET_ID: AV_bddci!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {26543f81-49dd-6bd2-b0fe-b3443123a4f7}
Followup: MachineOwner
---------
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Usb4Kd.natvis'
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25921.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\Downloads\greg\112423-11187-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff801`0ce00000 PsLoadedModuleList = 0xfffff801`0da134a0
Debug session time: Fri Nov 24 09:04:37.047 2023 (UTC + 0:00)
System Uptime: 0 days 10:06:38.705
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000087`7f16c018). Type ".hh dbgerr001" for details
Loading unloaded module list
.................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`0d216980 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8001`4dfc5fb0=????????????????
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8010d014df7, Address of the instruction which caused the BugCheck
Arg3: ffff80014dfc6900, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Check Image - Checksum mismatch - Dump: 0x20397e, File: 0x2039f2 - C:\ProgramData\Dbg\sym\BTHport.sys\5249EE07202000\BTHport.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5061
Key : Analysis.Elapsed.mSec
Value: 15668
Key : Analysis.IO.Other.Mb
Value: 2
Key : Analysis.IO.Read.Mb
Value: 5
Key : Analysis.IO.Write.Mb
Value: 12
Key : Analysis.Init.CPU.mSec
Value: 1249
Key : Analysis.Init.Elapsed.mSec
Value: 14834
Key : Analysis.Memory.CommitPeak.Mb
Value: 101
Key : Bugcheck.Code.LegacyAPI
Value: 0x3b
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_Npfs!NpCommonCleanup
Key : Failure.Hash
Value: {636ae15b-e9e0-3480-4f9c-b8877da98d9c}
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8010d014df7
BUGCHECK_P3: ffff80014dfc6900
BUGCHECK_P4: 0
FILE_IN_CAB: 112423-11187-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
CONTEXT: ffff80014dfc6900 -- (.cxr 0xffff80014dfc6900)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffbb09dbd56180 rsi=ffffd287cdab8b80 rdi=ffffd288d146e7d0
rip=fffff8010d014df7 rsp=ffffbb09dbd56110 rbp=ffffbb09dbd56189
r8=ffffd287cdab8bc0 r9=ffffd288cd800000 r10=0000000000000004
r11=ffffd288cd85dff0 r12=ffffffffffffffff r13=ffffffffc000014b
r14=0000000000000002 r15=0000000000000002
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!IopfCompleteRequest+0x577:
fffff801`0d014df7 498710 xchg rdx,qword ptr [r8] ds:002b:ffffd287`cdab8bc0=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffffbb09`dbd56110 fffff801`0d014867 : ffffd288`d146e7d0 00000000`00000002 ffffd288`c94528f0 00000000`00000000 : nt!IopfCompleteRequest+0x577
ffffbb09`dbd561f0 fffff801`1b48efe8 : ffff9182`b179c440 ffff9182`b179c440 ffffd288`00000010 ffffbb09`dbd56260 : nt!IofCompleteRequest+0x17
ffffbb09`dbd56220 fffff801`1b48ee57 : 00000000`00000000 00000000`00000000 ffffd288`baef10b0 ffffd288`d1448a48 : Npfs!NpCommonCleanup+0x158
ffffbb09`dbd562b0 fffff801`0d0ec015 : ffffd288`cf11ea10 fffff801`0f798029 ffffbb09`dbd57000 ffffbb09`dbd51000 : Npfs!NpFsdCleanup+0x27
ffffbb09`dbd562e0 fffff801`0f79a1db : ffffd288`b8010380 ffffd288`cf11ea10 ffffd288`b8010380 00000000`00000000 : nt!IofCallDriver+0x55
ffffbb09`dbd56320 fffff801`0f797e23 : ffffbb09`dbd563b0 00000000`00000000 00000000`00000000 ffffd288`ba531d40 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15b
ffffbb09`dbd56390 fffff801`0d0ec015 : ffffd288`c94528f0 fffff801`0d0e9da8 00000000`00000000 ffff9182`ac0b1080 : FLTMGR!FltpDispatch+0xa3
ffffbb09`dbd563f0 fffff801`0d4f999f : ffffd288`c94528f0 ffffd288`baf2a620 ffffd288`cb4130c0 ffffd288`d1448930 : nt!IofCallDriver+0x55
ffffbb09`dbd56430 fffff801`0d4dd53e : ffffd288`b9178220 fffff801`00000000 ffffffff`00000000 00000000`00000001 : nt!IopCloseFile+0x18f
ffffbb09`dbd564c0 fffff801`0d4dd388 : 00000000`ffff8004 00000000`00000001 00000000`00007ff5 fffff801`0d0e60aa : nt!ObpDecrementHandleCount+0x10a
ffffbb09`dbd56570 fffff801`0d4dd218 : ffffd288`ca9cc080 fffff801`0d06ad61 ffffd288`cf731060 00000000`00000840 : nt!ObCloseHandleTableEntry+0xe4
ffffbb09`dbd56630 fffff801`0d48c91d : 00000000`00000000 00000000`00000001 ffffffff`ffffff01 ffffd288`cb4130c0 : nt!ExSweepHandleTable+0xd8
ffffbb09`dbd566e0 fffff801`0d48da65 : ffffffff`ffffffff ffffd288`cb4130c0 ffffffff`ffffffff fffff801`0d4be7a4 : nt!ObKillProcess+0x35
ffffbb09`dbd56710 fffff801`0d4dc6a2 : ffffd288`cb4130c0 ffff9182`b0ddf060 ffffbb09`dbd56939 00000000`00000000 : nt!PspRundownSingleProcess+0xb9
ffffbb09`dbd567a0 fffff801`0d5cdf88 : 00000000`00000000 00000000`00000001 ffffd288`ca9cc0f4 00000087`7f185000 : nt!PspExitThread+0x64e
ffffbb09`dbd568a0 fffff801`0d10b9ad : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffbb09`dbd568e0 fffff801`0d21cb20 : 00000000`00000001 ffffbb09`dbd569a0 00000000`00000000 ffffd288`cb4130c0 : nt!KiDeliverApc+0x47d
ffffbb09`dbd569a0 fffff801`0d22b78f : ffffd288`ca9cc080 00000000`00000011 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffffbb09`dbd56ae0 00007ffd`cbaef3f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000087`05fff4f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`cbaef3f4
SYMBOL_NAME: Npfs!NpCommonCleanup+158
MODULE_NAME: Npfs
IMAGE_NAME: Npfs.SYS
IMAGE_VERSION: 10.0.22621.2771
STACK_COMMAND: .cxr 0xffff80014dfc6900 ; kb
BUCKET_ID_FUNC_OFFSET: 158
FAILURE_BUCKET_ID: AV_Npfs!NpCommonCleanup
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {636ae15b-e9e0-3480-4f9c-b8877da98d9c}
Followup: MachineOwner
---------
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Usb4Kd.natvis'
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.016 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25921.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\Downloads\greg\112423-11531-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff804`6d600000 PsLoadedModuleList = 0xfffff804`6e2134a0
Debug session time: Fri Nov 24 12:32:21.651 2023 (UTC + 0:00)
System Uptime: 0 days 2:16:42.304
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
.................
For analysis of this file, run !analyze -v
nt!IopfCompleteRequest+0x577:
fffff804`6d814df7 498710 xchg rdx,qword ptr [r8] ds:002b:ffffa184`e1919c80=????????????????
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8046d814df7, The address that the exception occurred at
Arg3: fffffb84d1c60a18, Exception Record Address
Arg4: ffff8000215c6900, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Write
Key : Analysis.CPU.mSec
Value: 6687
Key : Analysis.Elapsed.mSec
Value: 65429
Key : Analysis.IO.Other.Mb
Value: 6
Key : Analysis.IO.Read.Mb
Value: 10
Key : Analysis.IO.Write.Mb
Value: 21
Key : Analysis.Init.CPU.mSec
Value: 1077
Key : Analysis.Init.Elapsed.mSec
Value: 31437
Key : Analysis.Memory.CommitPeak.Mb
Value: 105
Key : Bugcheck.Code.LegacyAPI
Value: 0x1000007e
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_klwtp!unknown_function
Key : Failure.Hash
Value: {c2c3e109-24c7-92df-d028-f2419ec87f25}
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8046d814df7
BUGCHECK_P3: fffffb84d1c60a18
BUGCHECK_P4: ffff8000215c6900
FILE_IN_CAB: 112423-11531-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
EXCEPTION_RECORD: fffffb84d1c60a18 -- (.exr 0xfffffb84d1c60a18)
ExceptionAddress: fffff8046d814df7 (nt!IopfCompleteRequest+0x0000000000000577)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000001
Parameter[1]: ffffa184e1919c80
Attempt to write to address ffffa184e1919c80
CONTEXT: ffff8000215c6900 -- (.cxr 0xffff8000215c6900)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffb84d1c60cc0 rsi=ffffa184e1919c40 rdi=ffffa185eb2277b0
rip=fffff8046d814df7 rsp=fffffb84d1c60c50 rbp=fffffb84d1c60cc9
r8=ffffa184e1919c80 r9=fffffb84d1c60d08 r10=0000000000000004
r11=fffffb84d1c60d28 r12=ffffffffffffffff r13=0000000000000000
r14=0000000000000002 r15=0000000000000002
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!IopfCompleteRequest+0x577:
fffff804`6d814df7 498710 xchg rdx,qword ptr [r8] ds:002b:ffffa184`e1919c80=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
WRITE_ADDRESS: fffff8046e31d470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa184e1919c80
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: ffffa184e1919c80
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffffb84`d1c60c50 fffff804`6d814867 : ffffa185`eb2277b0 ffffa185`e8f24902 ffffa185`e4b58360 00000000`00000000 : nt!IopfCompleteRequest+0x577
fffffb84`d1c60d30 fffff804`7ff87562 : ffffa185`e241cb20 fffffb84`d1c60dc9 ffffa185`e241cbb8 fffff804`728b4c42 : nt!IofCompleteRequest+0x17
fffffb84`d1c60d60 ffffa185`e241cb20 : fffffb84`d1c60dc9 ffffa185`e241cbb8 fffff804`728b4c42 fffffb84`00000003 : klwtp+0x37562
fffffb84`d1c60d68 fffffb84`d1c60dc9 : ffffa185`e241cbb8 fffff804`728b4c42 fffffb84`00000003 fffffb84`d1c60d90 : 0xffffa185`e241cb20
fffffb84`d1c60d70 ffffa185`e241cbb8 : fffff804`728b4c42 fffffb84`00000003 fffffb84`d1c60d90 ffffa185`eb2277b0 : 0xfffffb84`d1c60dc9
fffffb84`d1c60d78 fffff804`728b4c42 : fffffb84`00000003 fffffb84`d1c60d90 ffffa185`eb2277b0 ffffa185`ea131030 : 0xffffa185`e241cbb8
fffffb84`d1c60d80 ffffa185`e3b42000 : 00000000`00000000 ffffa185`e241cbb8 00000000`00000002 00000000`00000000 : fwpkclnt!FwpsAllocateCloneNetBufferList0+0x62
fffffb84`d1c60dc0 00000000`00000000 : ffffa185`e241cbb8 00000000`00000002 00000000`00000000 fffffb84`d1c60e30 : 0xffffa185`e3b42000
SYMBOL_NAME: klwtp+37562
MODULE_NAME: klwtp
IMAGE_NAME: klwtp.sys
STACK_COMMAND: .cxr 0xffff8000215c6900 ; kb
BUCKET_ID_FUNC_OFFSET: 37562
FAILURE_BUCKET_ID: AV_klwtp!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c2c3e109-24c7-92df-d028-f2419ec87f25}
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8046d814df7, The address that the exception occurred at
Arg3: fffffb84d1c60a18, Exception Record Address
Arg4: ffff8000215c6900, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Write
Key : Analysis.CPU.mSec
Value: 6405
Key : Analysis.Elapsed.mSec
Value: 6433
Key : Analysis.IO.Other.Mb
Value: 6
Key : Analysis.IO.Read.Mb
Value: 10
Key : Analysis.IO.Write.Mb
Value: 21
Key : Analysis.Init.CPU.mSec
Value: 13827
Key : Analysis.Init.Elapsed.mSec
Value: 103011
Key : Analysis.Memory.CommitPeak.Mb
Value: 106
Key : Bugcheck.Code.LegacyAPI
Value: 0x1000007e
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_klwtp!unknown_function
Key : Failure.Hash
Value: {c2c3e109-24c7-92df-d028-f2419ec87f25}
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8046d814df7
BUGCHECK_P3: fffffb84d1c60a18
BUGCHECK_P4: ffff8000215c6900
FILE_IN_CAB: 112423-11531-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
EXCEPTION_RECORD: fffffb84d1c60a18 -- (.exr 0xfffffb84d1c60a18)
ExceptionAddress: fffff8046d814df7 (nt!IopfCompleteRequest+0x0000000000000577)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000001
Parameter[1]: ffffa184e1919c80
Attempt to write to address ffffa184e1919c80
CONTEXT: ffff8000215c6900 -- (.cxr 0xffff8000215c6900)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffb84d1c60cc0 rsi=ffffa184e1919c40 rdi=ffffa185eb2277b0
rip=fffff8046d814df7 rsp=fffffb84d1c60c50 rbp=fffffb84d1c60cc9
r8=ffffa184e1919c80 r9=fffffb84d1c60d08 r10=0000000000000004
r11=fffffb84d1c60d28 r12=ffffffffffffffff r13=0000000000000000
r14=0000000000000002 r15=0000000000000002
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!IopfCompleteRequest+0x577:
fffff804`6d814df7 498710 xchg rdx,qword ptr [r8] ds:002b:ffffa184`e1919c80=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
WRITE_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffa184e1919c80
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: ffffa184e1919c80
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffffb84`d1c60c50 fffff804`6d814867 : ffffa185`eb2277b0 ffffa185`e8f24902 ffffa185`e4b58360 00000000`00000000 : nt!IopfCompleteRequest+0x577
fffffb84`d1c60d30 fffff804`7ff87562 : ffffa185`e241cb20 fffffb84`d1c60dc9 ffffa185`e241cbb8 fffff804`728b4c42 : nt!IofCompleteRequest+0x17
fffffb84`d1c60d60 ffffa185`e241cb20 : fffffb84`d1c60dc9 ffffa185`e241cbb8 fffff804`728b4c42 fffffb84`00000003 : klwtp+0x37562
fffffb84`d1c60d68 fffffb84`d1c60dc9 : ffffa185`e241cbb8 fffff804`728b4c42 fffffb84`00000003 fffffb84`d1c60d90 : 0xffffa185`e241cb20
fffffb84`d1c60d70 ffffa185`e241cbb8 : fffff804`728b4c42 fffffb84`00000003 fffffb84`d1c60d90 ffffa185`eb2277b0 : 0xfffffb84`d1c60dc9
fffffb84`d1c60d78 fffff804`728b4c42 : fffffb84`00000003 fffffb84`d1c60d90 ffffa185`eb2277b0 ffffa185`ea131030 : 0xffffa185`e241cbb8
fffffb84`d1c60d80 ffffa185`e3b42000 : 00000000`00000000 ffffa185`e241cbb8 00000000`00000002 00000000`00000000 : fwpkclnt!FwpsAllocateCloneNetBufferList0+0x62
fffffb84`d1c60dc0 00000000`00000000 : ffffa185`e241cbb8 00000000`00000002 00000000`00000000 fffffb84`d1c60e30 : 0xffffa185`e3b42000
SYMBOL_NAME: klwtp+37562
MODULE_NAME: klwtp
IMAGE_NAME: klwtp.sys
STACK_COMMAND: .cxr 0xffff8000215c6900 ; kb
BUCKET_ID_FUNC_OFFSET: 37562
FAILURE_BUCKET_ID: AV_klwtp!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c2c3e109-24c7-92df-d028-f2419ec87f25}
Followup: MachineOwner
---------
