pastebin - collaborative debugging tool
nrubsig.kpaste.net RSS


win10, Windows crashed in MsMpEng.exe when installing FireFox on case-insensitive NFSv4.2 filesystem (NFS server FreeBSD 16.0 with ZFS)
Posted by Anonymous on Sat 9th May 2026 12:53
raw | new post

  1. # win10, Windows crashed in MsMpEng.exe when installing FireFox on case-insensitive NFSv4.2 filesystem (NFS server FreeBSD 16.0 with ZFS)
  2. Microsoft (R) Windows Debugger Version 10.0.19041.685 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\MEMORY.DMP]
  7. Kernel Bitmap Dump File: Full address space is available
  8.  
  9. Symbol search path is: srv*
  10. Executable search path is:
  11. Windows 10 Kernel Version 19041 MP (8 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS
  13. Built by: 19041.1.amd64fre.vb_release.191206-1406
  14. Machine Name:
  15. Kernel base = 0xfffff804`1e200000 PsLoadedModuleList = 0xfffff804`1ee2a420
  16. Debug session time: Sat May  9 13:32:05.591 2026 (UTC + 2:00)
  17. System Uptime: 0 days 0:49:54.502
  18. Loading Kernel Symbols
  19. ...............................................................
  20. ................................................................
  21. ................................................................
  22. ........................
  23. Loading User Symbols
  24. ................................................................
  25. .....................
  26. Loading unloaded module list
  27. .....................................................
  28. For analysis of this file, run !analyze -v
  29. 5: kd> !analyze -v
  30. *******************************************************************************
  31. *                                                                             *
  32. *                        Bugcheck Analysis                                    *
  33. *                                                                             *
  34. *******************************************************************************
  35.  
  36. MEMORY_MANAGEMENT (1a)
  37.     # Any other values for parameter 1 must be individually examined.
  38. Arguments:
  39. Arg1: 0000000000041791, The subtype of the bugcheck.
  40. Arg2: fffffb00068aa890
  41. Arg3: ffffd406c6711400
  42. Arg4: 020000200003ab04
  43.  
  44. Debugging Details:
  45. ------------------
  46.  
  47.  
  48. KEY_VALUES_STRING: 1
  49.  
  50.     Key  : Analysis.CPU.Sec
  51.     Value: 4
  52.  
  53.     Key  : Analysis.DebugAnalysisProvider.CPP
  54.     Value: Create: 8007007e on WINGRENDEL02
  55.  
  56.     Key  : Analysis.DebugData
  57.     Value: CreateObject
  58.  
  59.     Key  : Analysis.DebugModel
  60.     Value: CreateObject
  61.  
  62.     Key  : Analysis.Elapsed.Sec
  63.     Value: 15
  64.  
  65.     Key  : Analysis.Memory.CommitPeak.Mb
  66.     Value: 155
  67.  
  68.     Key  : Analysis.System
  69.     Value: CreateObject
  70.  
  71.  
  72. BUGCHECK_CODE:  1a
  73.  
  74. BUGCHECK_P1: 41791
  75.  
  76. BUGCHECK_P2: fffffb00068aa890
  77.  
  78. BUGCHECK_P3: ffffd406c6711400
  79.  
  80. BUGCHECK_P4: 20000200003ab04
  81.  
  82. BLACKBOXBSD: 1 (!blackboxbsd)
  83.  
  84.  
  85. BLACKBOXNTFS: 1 (!blackboxntfs)
  86.  
  87.  
  88. BLACKBOXPNP: 1 (!blackboxpnp)
  89.  
  90.  
  91. BLACKBOXWINLOGON: 1
  92.  
  93. PROCESS_NAME:  MsMpEng.exe
  94.  
  95. STACK_TEXT:  
  96. ffff960b`b7987478 fffff804`1e445169 : 00000000`0000001a 00000000`00041791 fffffb00`068aa890 ffffd406`c6711400 : nt!KeBugCheckEx
  97. ffff960b`b7987480 fffff804`1e7f7586 : ffff960b`b79876c0 00000000`00000103 ffff960b`00000002 00000000`00000000 : nt!MmUnlockPages+0xd89
  98. ffff960b`b7987570 fffff804`1e7f62e3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmCopyVirtualMemory+0x7d6
  99. ffff960b`b79879c0 fffff804`1e7f617b : ffffa882`132de080 0000002e`fce7da78 0000017c`f040bfb0 0000002e`fce7dbf0 : nt!MiReadWriteVirtualMemory+0x153
  100. ffff960b`b7987a50 fffff804`1e611505 : 0000002e`fce7d7f0 0000017c`f0417814 ffffa882`07cd2da0 ffff9801`6af80180 : nt!NtReadVirtualMemory+0x1b
  101. ffff960b`b7987a90 00007ffa`6c3add84 : 00007ffa`69b2fed5 00007ffa`53373600 00000000`00116000 0000017c`e3dfd090 : nt!KiSystemServiceCopyEnd+0x25
  102. 0000002e`fce7da58 00007ffa`69b2fed5 : 00007ffa`53373600 00000000`00116000 0000017c`e3dfd090 00007ffa`53372f75 : ntdll!NtReadVirtualMemory+0x14
  103. 0000002e`fce7da60 00007ffa`5394e79c : 0000017c`e3dfd090 00000000`7ffee000 00000000`00000000 00000000`0000001b : KERNELBASE!ReadProcessMemory+0x15
  104. 0000002e`fce7dab0 00007ffa`5337250b : 0000017c`e3dfd090 0000017c`e3dfd178 0000017c`e3dfd090 0000017c`81bb3920 : mpengine!ReadProcessMemoryInternal+0x11c
  105. 0000002e`fce7db40 00007ffa`53371b3d : 0000017c`81bb3850 00007ffa`53a9bc84 0000017c`e3dfd090 0000017c`81bb3920 : mpengine!CSMSProcess::ScanRange+0x12b
  106. 0000002e`fce7dc10 00007ffa`53371018 : 0000017c`e3dfd090 0000017c`e3dfd090 00000000`00000002 00000000`00000000 : mpengine!CSMSProcess::Scan1Worker+0x2ed
  107. 0000002e`fce7dcd0 00007ffa`533706fc : 0000017c`e3dfd090 00000000`00000000 0000002e`00000000 00000000`00000604 : mpengine!CSMSProcess::Scan+0x4b0
  108. 0000002e`fce7ddb0 00007ffa`5327abf0 : 0000017c`f102dc00 0000017c`00000579 00007ffa`53d17ab0 00000000`00000c70 : mpengine!CEMSContext::EmsScan+0x350
  109. 0000002e`fce7deb0 00007ffa`5327a6e2 : 0000017c`84711f20 0000017c`84711f20 0000017c`84712d60 00000000`00000000 : mpengine!RunEMS+0x474
  110. 0000002e`fce7e040 00007ffa`5327a0ba : 0000017c`d4110480 0000002e`fce7e1b0 00000000`00000000 0000017c`d4110488 : mpengine!CResmgrems::ScanImpl+0x23e
  111. 0000002e`fce7e120 00007ffa`5330f36f : 00000000`00000000 00000000`0000008e 00000000`0000008e 00000000`00000000 : mpengine!CResmgrems::Scan+0x1a
  112. 0000002e`fce7e260 00007ffa`53abd3de : 0000017c`82d52940 0000002e`fce7e550 00000000`00000000 0000017c`f102dc00 : mpengine!ResmgrProcessResource+0x22b
  113. 0000002e`fce7e410 00007ffa`53abb386 : 0000017c`f0d549b0 00000000`00000000 00000000`00000000 0000017c`f0d549b0 : mpengine!ResScan+0x946
  114. 0000002e`fce7e860 00007ffa`53505aa5 : 0000017c`80e712f0 0000017c`f0d54ba0 0000017c`f0d549b0 00007ffa`53ff6260 : mpengine!ScanOpenWithContext+0x1bb6
  115. 0000002e`fce7ec70 00007ffa`5340f861 : 0000017c`d41c9fd0 00000000`00000078 0000017c`80e712f0 00000000`0000800c : mpengine!UberScanOpen+0x1c9
  116. 0000002e`fce7ed90 00007ffa`534f902c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : mpengine!ksignal+0xde1
  117. 0000002e`fce7f030 00007ffa`534f8104 : 00000000`00000000 0000002e`fce7f9a0 00000000`00000000 00000000`00000000 : mpengine!DispatchSignalHelper+0xdc
  118. 0000002e`fce7f090 00007ffa`5b71e395 : 00000000`00004026 00000000`00000078 0000017c`80d2c930 00007ffa`5b8b4fb7 : mpengine!DispatchSignalOnHandle+0x7c
  119. 0000002e`fce7f880 00007ffa`5b766b3e : 00007ffa`5bc76268 00007ffa`5b815478 00000000`ffffffff 00000000`ffffffff : mpsvc!rsignal_wrapper+0x205
  120. 0000002e`fce7f940 00007ffa`5b81509a : 0000017c`80d353c0 0000017c`80d353c0 0000017c`d31fbf80 00007ffa`5bb4d550 : mpsvc!OnDemandScanWorker+0x5de
  121. 0000002e`fce7f9d0 00007ffa`5b814f33 : 0000017c`d3100388 0000017c`80d353c0 0000017c`d38ce7d0 0000017c`d38ce880 : mpsvc!MpService::CMpSvcScanWorkItem::Run+0xca
  122. 0000002e`fce7fa40 00007ffa`5b849a9d : 0000017c`d3236890 00007ffa`6c380f96 0000017c`80d353c0 0000017c`80d353d0 : mpsvc!MpService::CMpSvcScansQueue::Dispatch+0x33
  123. 0000002e`fce7fa80 00007ffa`5ab3be98 : 0000002e`fce7faf8 0000017c`80d39ad0 0000017c`d38fdc90 00001a3d`757a3072 : mpsvc!MpService::CMpSvcScanWorkItem::OnAction+0x1d
  124. 0000002e`fce7fab0 00007ffa`5ab3bd83 : 0000017c`d31fbf80 0000017c`d31fbf90 0000017c`d31fbf80 0000017c`d31fbf90 : MpClient!CommonUtil::CMpSimpleThreadPool::Call+0x5c
  125. 0000002e`fce7fb00 00007ffa`6c373720 : 0000017c`d3236890 0000017c`d3236958 0000017c`e89a15f0 0000017c`d38fdc90 : MpClient!CommonUtil::CMpSimpleThreadPool::AsyncDequeue+0xdf
  126. 0000002e`fce7fb70 00007ffa`6c35d79a : 00000000`00000000 00000000`00000000 0000017c`d38fdc90 0000017c`80d39ad0 : ntdll!TppWorkpExecuteCallback+0x130
  127. 0000002e`fce7fbc0 00007ffa`6b3c7374 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!TppWorkerThread+0x68a
  128. 0000002e`fce7fec0 00007ffa`6c35cc91 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : KERNEL32!BaseThreadInitThunk+0x14
  129. 0000002e`fce7fef0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21
  130.  
  131.  
  132. SYMBOL_NAME:  nt!MmUnlockPages+d89
  133.  
  134. MODULE_NAME: nt
  135.  
  136. STACK_COMMAND:  .thread ; .cxr ; kb
  137.  
  138. IMAGE_NAME:  memory_corruption
  139.  
  140. BUCKET_ID_FUNC_OFFSET:  d89
  141.  
  142. FAILURE_BUCKET_ID:  0x1a_41791_nt!MmUnlockPages
  143.  
  144. OS_VERSION:  10.0.19041.1
  145.  
  146. BUILDLAB_STR:  vb_release
  147.  
  148. OSPLATFORM_TYPE:  x64
  149.  
  150. OSNAME:  Windows 10
  151.  
  152. FAILURE_ID_HASH:  {257cd050-e4e1-a6f4-7c65-0c6aaef71f68}
  153.  
  154. Followup:     MachineOwner
  155. ---------
  156.  
  157. 5: kd> !analyze -v
  158. *******************************************************************************
  159. *                                                                             *
  160. *                        Bugcheck Analysis                                    *
  161. *                                                                             *
  162. *******************************************************************************
  163.  
  164. MEMORY_MANAGEMENT (1a)
  165.     # Any other values for parameter 1 must be individually examined.
  166. Arguments:
  167. Arg1: 0000000000041791, The subtype of the bugcheck.
  168. Arg2: fffffb00068aa890
  169. Arg3: ffffd406c6711400
  170. Arg4: 020000200003ab04
  171.  
  172. Debugging Details:
  173. ------------------
  174.  
  175.  
  176. KEY_VALUES_STRING: 1
  177.  
  178.     Key  : Analysis.CPU.Sec
  179.     Value: 2
  180.  
  181.     Key  : Analysis.DebugAnalysisProvider.CPP
  182.     Value: Create: 8007007e on WINGRENDEL02
  183.  
  184.     Key  : Analysis.DebugData
  185.     Value: CreateObject
  186.  
  187.     Key  : Analysis.DebugModel
  188.     Value: CreateObject
  189.  
  190.     Key  : Analysis.Elapsed.Sec
  191.     Value: 2
  192.  
  193.     Key  : Analysis.Memory.CommitPeak.Mb
  194.     Value: 155
  195.  
  196.     Key  : Analysis.System
  197.     Value: CreateObject
  198.  
  199.  
  200. BUGCHECK_CODE:  1a
  201.  
  202. BUGCHECK_P1: 41791
  203.  
  204. BUGCHECK_P2: fffffb00068aa890
  205.  
  206. BUGCHECK_P3: ffffd406c6711400
  207.  
  208. BUGCHECK_P4: 20000200003ab04
  209.  
  210. BLACKBOXBSD: 1 (!blackboxbsd)
  211.  
  212.  
  213. BLACKBOXNTFS: 1 (!blackboxntfs)
  214.  
  215.  
  216. BLACKBOXPNP: 1 (!blackboxpnp)
  217.  
  218.  
  219. BLACKBOXWINLOGON: 1
  220.  
  221. PROCESS_NAME:  MsMpEng.exe
  222.  
  223. STACK_TEXT:  
  224. ffff960b`b7987478 fffff804`1e445169 : 00000000`0000001a 00000000`00041791 fffffb00`068aa890 ffffd406`c6711400 : nt!KeBugCheckEx
  225. ffff960b`b7987480 fffff804`1e7f7586 : ffff960b`b79876c0 00000000`00000103 ffff960b`00000002 00000000`00000000 : nt!MmUnlockPages+0xd89
  226. ffff960b`b7987570 fffff804`1e7f62e3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmCopyVirtualMemory+0x7d6
  227. ffff960b`b79879c0 fffff804`1e7f617b : ffffa882`132de080 0000002e`fce7da78 0000017c`f040bfb0 0000002e`fce7dbf0 : nt!MiReadWriteVirtualMemory+0x153
  228. ffff960b`b7987a50 fffff804`1e611505 : 0000002e`fce7d7f0 0000017c`f0417814 ffffa882`07cd2da0 ffff9801`6af80180 : nt!NtReadVirtualMemory+0x1b
  229. ffff960b`b7987a90 00007ffa`6c3add84 : 00007ffa`69b2fed5 00007ffa`53373600 00000000`00116000 0000017c`e3dfd090 : nt!KiSystemServiceCopyEnd+0x25
  230. 0000002e`fce7da58 00007ffa`69b2fed5 : 00007ffa`53373600 00000000`00116000 0000017c`e3dfd090 00007ffa`53372f75 : ntdll!NtReadVirtualMemory+0x14
  231. 0000002e`fce7da60 00007ffa`5394e79c : 0000017c`e3dfd090 00000000`7ffee000 00000000`00000000 00000000`0000001b : KERNELBASE!ReadProcessMemory+0x15
  232. 0000002e`fce7dab0 00007ffa`5337250b : 0000017c`e3dfd090 0000017c`e3dfd178 0000017c`e3dfd090 0000017c`81bb3920 : mpengine!ReadProcessMemoryInternal+0x11c
  233. 0000002e`fce7db40 00007ffa`53371b3d : 0000017c`81bb3850 00007ffa`53a9bc84 0000017c`e3dfd090 0000017c`81bb3920 : mpengine!CSMSProcess::ScanRange+0x12b
  234. 0000002e`fce7dc10 00007ffa`53371018 : 0000017c`e3dfd090 0000017c`e3dfd090 00000000`00000002 00000000`00000000 : mpengine!CSMSProcess::Scan1Worker+0x2ed
  235. 0000002e`fce7dcd0 00007ffa`533706fc : 0000017c`e3dfd090 00000000`00000000 0000002e`00000000 00000000`00000604 : mpengine!CSMSProcess::Scan+0x4b0
  236. 0000002e`fce7ddb0 00007ffa`5327abf0 : 0000017c`f102dc00 0000017c`00000579 00007ffa`53d17ab0 00000000`00000c70 : mpengine!CEMSContext::EmsScan+0x350
  237. 0000002e`fce7deb0 00007ffa`5327a6e2 : 0000017c`84711f20 0000017c`84711f20 0000017c`84712d60 00000000`00000000 : mpengine!RunEMS+0x474
  238. 0000002e`fce7e040 00007ffa`5327a0ba : 0000017c`d4110480 0000002e`fce7e1b0 00000000`00000000 0000017c`d4110488 : mpengine!CResmgrems::ScanImpl+0x23e
  239. 0000002e`fce7e120 00007ffa`5330f36f : 00000000`00000000 00000000`0000008e 00000000`0000008e 00000000`00000000 : mpengine!CResmgrems::Scan+0x1a
  240. 0000002e`fce7e260 00007ffa`53abd3de : 0000017c`82d52940 0000002e`fce7e550 00000000`00000000 0000017c`f102dc00 : mpengine!ResmgrProcessResource+0x22b
  241. 0000002e`fce7e410 00007ffa`53abb386 : 0000017c`f0d549b0 00000000`00000000 00000000`00000000 0000017c`f0d549b0 : mpengine!ResScan+0x946
  242. 0000002e`fce7e860 00007ffa`53505aa5 : 0000017c`80e712f0 0000017c`f0d54ba0 0000017c`f0d549b0 00007ffa`53ff6260 : mpengine!ScanOpenWithContext+0x1bb6
  243. 0000002e`fce7ec70 00007ffa`5340f861 : 0000017c`d41c9fd0 00000000`00000078 0000017c`80e712f0 00000000`0000800c : mpengine!UberScanOpen+0x1c9
  244. 0000002e`fce7ed90 00007ffa`534f902c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : mpengine!ksignal+0xde1
  245. 0000002e`fce7f030 00007ffa`534f8104 : 00000000`00000000 0000002e`fce7f9a0 00000000`00000000 00000000`00000000 : mpengine!DispatchSignalHelper+0xdc
  246. 0000002e`fce7f090 00007ffa`5b71e395 : 00000000`00004026 00000000`00000078 0000017c`80d2c930 00007ffa`5b8b4fb7 : mpengine!DispatchSignalOnHandle+0x7c
  247. 0000002e`fce7f880 00007ffa`5b766b3e : 00007ffa`5bc76268 00007ffa`5b815478 00000000`ffffffff 00000000`ffffffff : mpsvc!rsignal_wrapper+0x205
  248. 0000002e`fce7f940 00007ffa`5b81509a : 0000017c`80d353c0 0000017c`80d353c0 0000017c`d31fbf80 00007ffa`5bb4d550 : mpsvc!OnDemandScanWorker+0x5de
  249. 0000002e`fce7f9d0 00007ffa`5b814f33 : 0000017c`d3100388 0000017c`80d353c0 0000017c`d38ce7d0 0000017c`d38ce880 : mpsvc!MpService::CMpSvcScanWorkItem::Run+0xca
  250. 0000002e`fce7fa40 00007ffa`5b849a9d : 0000017c`d3236890 00007ffa`6c380f96 0000017c`80d353c0 0000017c`80d353d0 : mpsvc!MpService::CMpSvcScansQueue::Dispatch+0x33
  251. 0000002e`fce7fa80 00007ffa`5ab3be98 : 0000002e`fce7faf8 0000017c`80d39ad0 0000017c`d38fdc90 00001a3d`757a3072 : mpsvc!MpService::CMpSvcScanWorkItem::OnAction+0x1d
  252. 0000002e`fce7fab0 00007ffa`5ab3bd83 : 0000017c`d31fbf80 0000017c`d31fbf90 0000017c`d31fbf80 0000017c`d31fbf90 : MpClient!CommonUtil::CMpSimpleThreadPool::Call+0x5c
  253. 0000002e`fce7fb00 00007ffa`6c373720 : 0000017c`d3236890 0000017c`d3236958 0000017c`e89a15f0 0000017c`d38fdc90 : MpClient!CommonUtil::CMpSimpleThreadPool::AsyncDequeue+0xdf
  254. 0000002e`fce7fb70 00007ffa`6c35d79a : 00000000`00000000 00000000`00000000 0000017c`d38fdc90 0000017c`80d39ad0 : ntdll!TppWorkpExecuteCallback+0x130
  255. 0000002e`fce7fbc0 00007ffa`6b3c7374 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!TppWorkerThread+0x68a
  256. 0000002e`fce7fec0 00007ffa`6c35cc91 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : KERNEL32!BaseThreadInitThunk+0x14
  257. 0000002e`fce7fef0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21
  258.  
  259.  
  260. SYMBOL_NAME:  nt!MmUnlockPages+d89
  261.  
  262. MODULE_NAME: nt
  263.  
  264. STACK_COMMAND:  .thread ; .cxr ; kb
  265.  
  266. IMAGE_NAME:  memory_corruption
  267.  
  268. BUCKET_ID_FUNC_OFFSET:  d89
  269.  
  270. FAILURE_BUCKET_ID:  0x1a_41791_nt!MmUnlockPages
  271.  
  272. OS_VERSION:  10.0.19041.1
  273.  
  274. BUILDLAB_STR:  vb_release
  275.  
  276. OSPLATFORM_TYPE:  x64
  277.  
  278. OSNAME:  Windows 10
  279.  
  280. FAILURE_ID_HASH:  {257cd050-e4e1-a6f4-7c65-0c6aaef71f68}
  281.  
  282. Followup:     MachineOwner
  283. ---------

Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.

Syntax highlighting:

To highlight particular lines, prefix each line with {%HIGHLIGHT}




All content is user-submitted.
The administrators of this site (kpaste.net) are not responsible for their content.
Abuse reports should be emailed to us at