pastebin - collaborative debugging tool
nrubsig.kpaste.net RSS


Crash in DbgPrintEx()
Posted by Anonymous on Thu 5th Mar 2026 15:27
raw | new post

  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.19041.685 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\MEMORY.DMP]
  7. Kernel Bitmap Dump File: Full address space is available
  8.  
  9. Symbol search path is: srv*
  10. Executable search path is:
  11. Windows 10 Kernel Version 19041 MP (8 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS
  13. Built by: 19041.1.amd64fre.vb_release.191206-1406
  14. Machine Name:
  15. Kernel base = 0xfffff802`15c00000 PsLoadedModuleList = 0xfffff802`1682a420
  16. Debug session time: Thu Mar  5 16:16:40.842 2026 (UTC + 1:00)
  17. System Uptime: 0 days 2:07:42.293
  18. Loading Kernel Symbols
  19. ...............................................................
  20. ................................................................
  21. ................................................................
  22. .....................
  23. Loading User Symbols
  24. .....
  25. Loading unloaded module list
  26. ...............
  27. Loading Wow64 Symbols
  28. ............
  29. For analysis of this file, run !analyze -v
  30. 4: kd> !analyze -v
  31. *******************************************************************************
  32. *                                                                             *
  33. *                        Bugcheck Analysis                                    *
  34. *                                                                             *
  35. *******************************************************************************
  36.  
  37. DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
  38. An attempt was made to access a pageable (or completely invalid) address at an
  39. interrupt request level (IRQL) that is too high.  This is usually
  40. caused by drivers using improper addresses.
  41. If kernel debugger is available get stack backtrace.
  42. Arguments:
  43. Arg1: ffffca074cf9497a, memory referenced
  44. Arg2: 000000000000000c, IRQL
  45. Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
  46. Arg4: fffff802331515a1, address which referenced memory
  47.  
  48. Debugging Details:
  49. ------------------
  50.  
  51.  
  52. "C:\Windows\System32\KERNELBASE.dll" was not found in the image list.
  53. Debugger will attempt to load "C:\Windows\System32\KERNELBASE.dll" at given base 00000000`00000000.
  54.  
  55. Please provide the full image name, including the extension (i.e. kernel32.dll)
  56. for more reliable results.Base address and size overrides can be given as
  57. .reload <image.ext>=<base>,<size>.
  58.  
  59. KEY_VALUES_STRING: 1
  60.  
  61.     Key  : Analysis.CPU.Sec
  62.     Value: 5
  63.  
  64.     Key  : Analysis.DebugAnalysisProvider.CPP
  65.     Value: Create: 8007007e on WINGRENDEL02
  66.  
  67.     Key  : Analysis.DebugData
  68.     Value: CreateObject
  69.  
  70.     Key  : Analysis.DebugModel
  71.     Value: CreateObject
  72.  
  73.     Key  : Analysis.Elapsed.Sec
  74.     Value: 11
  75.  
  76.     Key  : Analysis.Memory.CommitPeak.Mb
  77.     Value: 90
  78.  
  79.     Key  : Analysis.System
  80.     Value: CreateObject
  81.  
  82.  
  83. BUGCHECK_CODE:  d1
  84.  
  85. BUGCHECK_P1: ffffca074cf9497a
  86.  
  87. BUGCHECK_P2: c
  88.  
  89. BUGCHECK_P3: 1
  90.  
  91. BUGCHECK_P4: fffff802331515a1
  92.  
  93. WRITE_ADDRESS:  ffffca074cf9497a Nonpaged pool
  94.  
  95. BLACKBOXBSD: 1 (!blackboxbsd)
  96.  
  97.  
  98. BLACKBOXNTFS: 1 (!blackboxntfs)
  99.  
  100.  
  101. BLACKBOXPNP: 1 (!blackboxpnp)
  102.  
  103.  
  104. BLACKBOXWINLOGON: 1
  105.  
  106. PROCESS_NAME:  cc1.exe
  107.  
  108. TRAP_FRAME:  fffff60743b32b90 -- (.trap 0xfffff60743b32b90)
  109. NOTE: The trap frame does not contain all registers.
  110. Some register values may be zeroed or incorrect.
  111. rax=00000000000005ba rbx=0000000000000000 rcx=0000000000000000
  112. rdx=000000000000009d rsi=0000000000000000 rdi=0000000000000000
  113. rip=fffff802331515a1 rsp=fffff60743b32d20 rbp=000000000000000c
  114.  r8=0000000000000000  r9=fffff60743b32900 r10=fffff802331553f8
  115. r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
  116. r14=0000000000000000 r15=0000000000000000
  117. iopl=0         nv up ei pl zr na po nc
  118. Dbgv+0x15a1:
  119. fffff802`331515a1 894314          mov     dword ptr [rbx+14h],eax ds:00000000`00000014=????????
  120. Resetting default scope
  121.  
  122. STACK_TEXT:  
  123. fffff607`43b32a48 fffff802`16011da9 : 00000000`0000000a ffffca07`4cf9497a 00000000`0000000c 00000000`00000001 : nt!KeBugCheckEx
  124. fffff607`43b32a50 fffff802`1600d778 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
  125. fffff607`43b32b90 fffff802`331515a1 : 00000000`00000000 fffff802`15f720eb fffff607`43b32e7f 00000000`fffffffe : nt!KiPageFault+0x478
  126. fffff607`43b32d20 fffff802`160a886c : fffff802`33152ec0 fffff607`43b32e80 ffffca06`e697d810 fffff607`43b32e00 : Dbgv+0x15a1
  127. fffff607`43b32d60 fffff802`15f7f000 : ffffca06`e7f32a20 00000000`c0000016 00000000`00000008 fffff802`1abb1f60 : nt!vDbgPrintExWithPrefixInternal+0x14448c
  128. fffff607`43b32ee0 fffff802`1ab832b5 : fffff607`43b32f80 00000000`00000200 fffff802`1aba8750 00000000`00002234 : nt!DbgPrintEx+0x30
  129. fffff607`43b32f30 fffff802`1ab9d2f6 : fffff802`1abb1f60 00000000`000000c0 fffff802`1aba8c68 ffffca06`e5c047f0 : nfs41_driver!DbgP+0xe5 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41sys_debug.c @ 96]
  130. fffff607`43b331a0 fffff802`1ab95a23 : ffffca06`e5c047f0 00000000`0000005a 00000279`22a28540 00000279`22f1d590 : nfs41_driver!nfs41_UpcallWaitForReply+0x1e6 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41sys_updowncall.c @ 551]
  131. fffff607`43b33210 fffff802`1abc93de : ffffca06`e7f32a20 00000000`c0000016 ffffca06`e5dd6c60 ffff8509`5ab43050 : nfs41_driver!nfs41_CloseSrvOpen+0x233 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41sys_openclose.c @ 1650]
  132. fffff607`43b332c0 fffff802`1abc99a7 : ffffca06`e7f32a20 ffff8509`5ab43580 ffffca06`c0000016 ffff8509`5ab433b8 : nfs41_driver!RxCloseAssociatedSrvOpen+0x23e [base\fs\rdr2\rdbss\close.c @ 515]
  133. fffff607`43b33370 fffff802`1aba34c2 : ffffca06`e7f32a20 ffffca06`00000000 ffff8509`5ab43050 ffff8509`5ab43580 : nfs41_driver!RxCommonClose+0x3d7 [base\fs\rdr2\rdbss\close.c @ 220]
  134. fffff607`43b33430 fffff802`1abc39ad : fffff802`1abb6160 00000000`ffffbf01 ffffca06`ddd386e0 ffffca06`ddf306a0 : nfs41_driver!RxFsdCommonDispatch+0x442 [base\fs\rdr2\rdbss\ntfsd.c @ 848]
  135. fffff607`43b33530 fffff802`1ab890b7 : ffffca06`e5884a90 ffffca06`e79b6b50 fffff607`43b337b0 ffffca06`e1b0d478 : nfs41_driver!RxFsdDispatch+0xfd [base\fs\rdr2\rdbss\ntfsd.c @ 442]
  136. fffff607`43b33560 fffff802`15ed21c5 : ffffca06`ddf306a0 ffffca06`e5dd6b00 ffffca06`e48f06d0 fffff802`15ecb32b : nfs41_driver!nfs41_FsdDispatch+0x67 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41sys_driver.c @ 1250]
  137. fffff607`43b335a0 fffff802`187ff558 : 00000000`00000000 00000000`00000000 ffffca06`ddc328f0 ffffca06`e46d5268 : nt!IofCallDriver+0x55
  138. fffff607`43b335e0 fffff802`187ff0a9 : ffff8509`49cf7aa0 fffff802`187f8000 fffff802`187f8000 ffffca06`e79b6b50 : mup!MupiCallUncProvider+0xb8
  139. fffff607`43b33650 fffff802`18804c51 : 00000000`00000000 ffffca06`e46d5260 ffffca06`e5dd6b00 ffffca06`e79b6b50 : mup!MupStateMachine+0x59
  140. fffff607`43b33680 fffff802`15ed21c5 : ffffca06`e1b0d390 00000000`00000000 ffffca06`e5884a90 fffff802`17125021 : mup!MupClose+0xa1
  141. fffff607`43b336e0 fffff802`1712710f : fffff98a`e9cf0004 fffff607`43b33790 00000000`00000000 ffffca06`e48f0118 : nt!IofCallDriver+0x55
  142. fffff607`43b33720 fffff802`17124a43 : fffff607`43b337b0 00000000`00000001 00000000`00000001 ffffca06`ddb91ac0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
  143. fffff607`43b33790 fffff802`15ed21c5 : ffffca06`e79b6b50 fffff802`15ed20ad 00000000`00000000 00000000`00000001 : FLTMGR!FltpDispatch+0xa3
  144. fffff607`43b337f0 fffff802`16250f3f : fffff607`43b33a39 ffffca06`e79b6b50 00000000`00000000 fffff802`15ecbaf8 : nt!IofCallDriver+0x55
  145. fffff607`43b33830 fffff802`1623dbe0 : ffffca06`db502a60 00000000`00000001 ffffca06`e79b6b20 ffffca06`e5dd6b00 : nt!IopDeleteFile+0x14f
  146. fffff607`43b338b0 fffff802`15ecb917 : 00000000`00000000 00000000`00000000 fffff607`43b33a39 ffffca06`e79b6b50 : nt!ObpRemoveObjectRoutine+0x80
  147. fffff607`43b33910 fffff802`16243449 : ffffca06`e79b6b20 00000000`00000000 ffff8509`00000000 ffffca06`e79b6b20 : nt!ObfDereferenceObjectWithTag+0xc7
  148. fffff607`43b33950 fffff802`1623e18c : 00000000`000000dc 00000000`00000000 00000000`00000000 fffff607`43b33ae8 : nt!ObCloseHandleTableEntry+0x6c9
  149. fffff607`43b33a90 fffff802`16011505 : ffffca06`e48f0000 00000000`00000001 fffff607`43b33b80 00000000`0009e5e8 : nt!NtClose+0xec
  150. fffff607`43b33b00 00000000`77891cfc : 00000000`77891cbb 00000023`7791461c 00007ffb`284d0023 00000000`02620001 : nt!KiSystemServiceCopyEnd+0x25
  151. 00000000`0009eee8 00000000`77891cbb : 00000023`7791461c 00007ffb`284d0023 00000000`02620001 00000000`0245fff0 : wow64cpu!CpupSyscallStub+0xc
  152. 00000000`0009eef0 00000000`778911b9 : 00000000`0245fd24 00007ffb`27bc3a74 00000000`0009efc0 00007ffb`27bc3b6f : wow64cpu!Thunk0Arg+0x5
  153. 00000000`0009efa0 00007ffb`27bc3989 : 00000000`00307000 00000000`00400080 00000000`00000000 00000000`0009f800 : wow64cpu!BTCpuSimulate+0x9
  154. 00000000`0009efe0 00007ffb`27bc337d : 00000000`00000000 00000000`025e3998 00000000`00000000 00000000`00000000 : wow64!RunCpuSimulation+0xd
  155. 00000000`0009f010 00007ffb`285636f1 : 00007ffb`285b5910 00007ffb`285b5910 00000000`00000010 00000000`00306000 : wow64!Wow64LdrpInitialize+0x12d
  156. 00000000`0009f2c0 00007ffb`28505deb : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000001 : ntdll!LdrpInitializeProcess+0x18e1
  157. 00000000`0009f6e0 00007ffb`28505c73 : 00000000`00000000 00007ffb`28490000 00000000`00000000 00000000`00308000 : ntdll!LdrpInitialize+0x15f
  158. 00000000`0009f780 00007ffb`28505c1e : 00000000`0009f800 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!LdrpInitialize+0x3b
  159. 00000000`0009f7b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!LdrInitializeThunk+0xe
  160.  
  161.  
  162. SYMBOL_NAME:  Dbgv+15a1
  163.  
  164. MODULE_NAME: Dbgv
  165.  
  166. IMAGE_NAME:  Dbgv.sys
  167.  
  168. STACK_COMMAND:  .thread ; .cxr ; kb
  169.  
  170. BUCKET_ID_FUNC_OFFSET:  15a1
  171.  
  172. FAILURE_BUCKET_ID:  AV_Dbgv!unknown_function
  173.  
  174. OS_VERSION:  10.0.19041.1
  175.  
  176. BUILDLAB_STR:  vb_release
  177.  
  178. OSPLATFORM_TYPE:  x64
  179.  
  180. OSNAME:  Windows 10
  181.  
  182. FAILURE_ID_HASH:  {bb0d4c6e-0053-b7ec-2fc8-83bedf6106af}
  183.  
  184. Followup:     MachineOwner
  185. ---------

Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.

Syntax highlighting:

To highlight particular lines, prefix each line with {%HIGHLIGHT}




All content is user-submitted.
The administrators of this site (kpaste.net) are not responsible for their content.
Abuse reports should be emailed to us at