Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\maksu\Desktop\minidump\071620-43093-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff804`64600000 PsLoadedModuleList = 0xfffff804`64a48170
Debug session time: Thu Jul 16 22:33:39.704 2020 (UTC + 3:00)
System Uptime: 2 days 21:22:50.957
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
...................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`647c2390 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd20a`34394650=000000000000000a
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000002d, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804646a5436, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4124
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8731
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: 2d
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff804646a5436
READ_ADDRESS: fffff80464b733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80464a2a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff80464a2a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000000000002d
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffd20a34394790 -- (.trap 0xffffd20a34394790)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000004ff rbx=0000000000000000 rcx=ffff988703002340
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804646a5436 rsp=ffffd20a34394920 rbp=0000000000000001
r8=00000000ffffffff r9=0000000000000001 r10=0000000000000001
r11=ffff988709a96050 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!RtlpHpLfhSubsegmentDecommitPages+0xc6:
fffff804`646a5436 410fb6472d movzx eax,byte ptr [r15+2Dh] ds:00000000`0000002d=??
Resetting default scope
STACK_TEXT:
ffffd20a`34394648 fffff804`647d41e9 : 00000000`0000000a 00000000`0000002d 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd20a`34394650 fffff804`647d0529 : 00000000`00000000 00000000`00000000 00000000`00000001 fffff804`6461bd76 : nt!KiBugCheckDispatch+0x69
ffffd20a`34394790 fffff804`646a5436 : 00000000`00000003 00000000`00003000 00000000`00001000 fffff804`6471cd53 : nt!KiPageFault+0x469
ffffd20a`34394920 fffff804`646a491f : ffff9887`03002340 ffffd20a`34394a80 ffff9887`0fd9d6ff ffff9887`00000001 : nt!RtlpHpLfhSubsegmentDecommitPages+0xc6
ffffd20a`343949b0 fffff804`646a496d : ffff9887`03006200 ffff9887`03002280 00000000`00000004 00000000`00000001 : nt!RtlpHpLfhOwnerCompact+0x67
ffffd20a`34394a10 fffff804`646a4882 : ffff9887`030023e0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpLfhOwnerCompact+0xb5
ffffd20a`34394a70 fffff804`64641daa : ffff9887`03002000 00000000`00000001 ffff9887`03002280 ffff9887`03002280 : nt!RtlpHpLfhContextCompact+0xae
ffffd20a`34394ab0 fffff804`646a45b1 : 00000000`00000001 ffff9887`03002000 00000000`00000000 ffff9887`0e24e180 : nt!RtlpHpHeapCompact+0x76
ffffd20a`34394ae0 fffff804`646f43b5 : 00000000`00000001 ffff9887`00000000 ffff9887`0000003f 00000000`00000000 : nt!ExpHpCompactionRoutine+0x211
ffffd20a`34394b70 fffff804`6466bcd5 : ffff9887`0e24e040 00000000`00000080 ffff9887`036802c0 fffffc42`00000001 : nt!ExpWorkerThread+0x105
ffffd20a`34394c10 fffff804`647c9998 : ffffb180`dcdc0180 ffff9887`0e24e040 fffff804`6466bc80 00000000`00000001 : nt!PspSystemThreadStartup+0x55
ffffd20a`34394c60 00000000`00000000 : ffffd20a`34395000 ffffd20a`3438f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!RtlpHpLfhSubsegmentDecommitPages+c6
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.836
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: c6
FAILURE_BUCKET_ID: AV_nt!RtlpHpLfhSubsegmentDecommitPages
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3ea916f4-98f1-2e2d-978b-851f95bd1f17}
Followup: MachineOwner
---------