- Microsoft (R) Windows Debugger Version 10.0.19041.685 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\MEMORY.DMP]
- Kernel Bitmap Dump File: Full address space is available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 19041 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 19041.1.amd64fre.vb_release.191206-1406
- Machine Name:
- Kernel base = 0xfffff802`15c00000 PsLoadedModuleList = 0xfffff802`1682a420
- Debug session time: Thu Mar 5 16:16:40.842 2026 (UTC + 1:00)
- System Uptime: 0 days 2:07:42.293
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................................
- .....................
- Loading User Symbols
- .....
- Loading unloaded module list
- ...............
- Loading Wow64 Symbols
- ............
- For analysis of this file, run !analyze -v
- 4: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If kernel debugger is available get stack backtrace.
- Arguments:
- Arg1: ffffca074cf9497a, memory referenced
- Arg2: 000000000000000c, IRQL
- Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
- Arg4: fffff802331515a1, address which referenced memory
- Debugging Details:
- ------------------
- "C:\Windows\System32\KERNELBASE.dll" was not found in the image list.
- Debugger will attempt to load "C:\Windows\System32\KERNELBASE.dll" at given base 00000000`00000000.
- Please provide the full image name, including the extension (i.e. kernel32.dll)
- for more reliable results.Base address and size overrides can be given as
- .reload <image.ext>=<base>,<size>.
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.Sec
- Value: 5
- Key : Analysis.DebugAnalysisProvider.CPP
- Value: Create: 8007007e on WINGRENDEL02
- Key : Analysis.DebugData
- Value: CreateObject
- Key : Analysis.DebugModel
- Value: CreateObject
- Key : Analysis.Elapsed.Sec
- Value: 11
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 90
- Key : Analysis.System
- Value: CreateObject
- BUGCHECK_CODE: d1
- BUGCHECK_P1: ffffca074cf9497a
- BUGCHECK_P2: c
- BUGCHECK_P3: 1
- BUGCHECK_P4: fffff802331515a1
- WRITE_ADDRESS: ffffca074cf9497a Nonpaged pool
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- PROCESS_NAME: cc1.exe
- TRAP_FRAME: fffff60743b32b90 -- (.trap 0xfffff60743b32b90)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=00000000000005ba rbx=0000000000000000 rcx=0000000000000000
- rdx=000000000000009d rsi=0000000000000000 rdi=0000000000000000
- rip=fffff802331515a1 rsp=fffff60743b32d20 rbp=000000000000000c
- r8=0000000000000000 r9=fffff60743b32900 r10=fffff802331553f8
- r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- Dbgv+0x15a1:
- fffff802`331515a1 894314 mov dword ptr [rbx+14h],eax ds:00000000`00000014=????????
- Resetting default scope
- STACK_TEXT:
- fffff607`43b32a48 fffff802`16011da9 : 00000000`0000000a ffffca07`4cf9497a 00000000`0000000c 00000000`00000001 : nt!KeBugCheckEx
- fffff607`43b32a50 fffff802`1600d778 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
- fffff607`43b32b90 fffff802`331515a1 : 00000000`00000000 fffff802`15f720eb fffff607`43b32e7f 00000000`fffffffe : nt!KiPageFault+0x478
- fffff607`43b32d20 fffff802`160a886c : fffff802`33152ec0 fffff607`43b32e80 ffffca06`e697d810 fffff607`43b32e00 : Dbgv+0x15a1
- fffff607`43b32d60 fffff802`15f7f000 : ffffca06`e7f32a20 00000000`c0000016 00000000`00000008 fffff802`1abb1f60 : nt!vDbgPrintExWithPrefixInternal+0x14448c
- fffff607`43b32ee0 fffff802`1ab832b5 : fffff607`43b32f80 00000000`00000200 fffff802`1aba8750 00000000`00002234 : nt!DbgPrintEx+0x30
- fffff607`43b32f30 fffff802`1ab9d2f6 : fffff802`1abb1f60 00000000`000000c0 fffff802`1aba8c68 ffffca06`e5c047f0 : nfs41_driver!DbgP+0xe5 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41sys_debug.c @ 96]
- fffff607`43b331a0 fffff802`1ab95a23 : ffffca06`e5c047f0 00000000`0000005a 00000279`22a28540 00000279`22f1d590 : nfs41_driver!nfs41_UpcallWaitForReply+0x1e6 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41sys_updowncall.c @ 551]
- fffff607`43b33210 fffff802`1abc93de : ffffca06`e7f32a20 00000000`c0000016 ffffca06`e5dd6c60 ffff8509`5ab43050 : nfs41_driver!nfs41_CloseSrvOpen+0x233 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41sys_openclose.c @ 1650]
- fffff607`43b332c0 fffff802`1abc99a7 : ffffca06`e7f32a20 ffff8509`5ab43580 ffffca06`c0000016 ffff8509`5ab433b8 : nfs41_driver!RxCloseAssociatedSrvOpen+0x23e [base\fs\rdr2\rdbss\close.c @ 515]
- fffff607`43b33370 fffff802`1aba34c2 : ffffca06`e7f32a20 ffffca06`00000000 ffff8509`5ab43050 ffff8509`5ab43580 : nfs41_driver!RxCommonClose+0x3d7 [base\fs\rdr2\rdbss\close.c @ 220]
- fffff607`43b33430 fffff802`1abc39ad : fffff802`1abb6160 00000000`ffffbf01 ffffca06`ddd386e0 ffffca06`ddf306a0 : nfs41_driver!RxFsdCommonDispatch+0x442 [base\fs\rdr2\rdbss\ntfsd.c @ 848]
- fffff607`43b33530 fffff802`1ab890b7 : ffffca06`e5884a90 ffffca06`e79b6b50 fffff607`43b337b0 ffffca06`e1b0d478 : nfs41_driver!RxFsdDispatch+0xfd [base\fs\rdr2\rdbss\ntfsd.c @ 442]
- fffff607`43b33560 fffff802`15ed21c5 : ffffca06`ddf306a0 ffffca06`e5dd6b00 ffffca06`e48f06d0 fffff802`15ecb32b : nfs41_driver!nfs41_FsdDispatch+0x67 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41sys_driver.c @ 1250]
- fffff607`43b335a0 fffff802`187ff558 : 00000000`00000000 00000000`00000000 ffffca06`ddc328f0 ffffca06`e46d5268 : nt!IofCallDriver+0x55
- fffff607`43b335e0 fffff802`187ff0a9 : ffff8509`49cf7aa0 fffff802`187f8000 fffff802`187f8000 ffffca06`e79b6b50 : mup!MupiCallUncProvider+0xb8
- fffff607`43b33650 fffff802`18804c51 : 00000000`00000000 ffffca06`e46d5260 ffffca06`e5dd6b00 ffffca06`e79b6b50 : mup!MupStateMachine+0x59
- fffff607`43b33680 fffff802`15ed21c5 : ffffca06`e1b0d390 00000000`00000000 ffffca06`e5884a90 fffff802`17125021 : mup!MupClose+0xa1
- fffff607`43b336e0 fffff802`1712710f : fffff98a`e9cf0004 fffff607`43b33790 00000000`00000000 ffffca06`e48f0118 : nt!IofCallDriver+0x55
- fffff607`43b33720 fffff802`17124a43 : fffff607`43b337b0 00000000`00000001 00000000`00000001 ffffca06`ddb91ac0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
- fffff607`43b33790 fffff802`15ed21c5 : ffffca06`e79b6b50 fffff802`15ed20ad 00000000`00000000 00000000`00000001 : FLTMGR!FltpDispatch+0xa3
- fffff607`43b337f0 fffff802`16250f3f : fffff607`43b33a39 ffffca06`e79b6b50 00000000`00000000 fffff802`15ecbaf8 : nt!IofCallDriver+0x55
- fffff607`43b33830 fffff802`1623dbe0 : ffffca06`db502a60 00000000`00000001 ffffca06`e79b6b20 ffffca06`e5dd6b00 : nt!IopDeleteFile+0x14f
- fffff607`43b338b0 fffff802`15ecb917 : 00000000`00000000 00000000`00000000 fffff607`43b33a39 ffffca06`e79b6b50 : nt!ObpRemoveObjectRoutine+0x80
- fffff607`43b33910 fffff802`16243449 : ffffca06`e79b6b20 00000000`00000000 ffff8509`00000000 ffffca06`e79b6b20 : nt!ObfDereferenceObjectWithTag+0xc7
- fffff607`43b33950 fffff802`1623e18c : 00000000`000000dc 00000000`00000000 00000000`00000000 fffff607`43b33ae8 : nt!ObCloseHandleTableEntry+0x6c9
- fffff607`43b33a90 fffff802`16011505 : ffffca06`e48f0000 00000000`00000001 fffff607`43b33b80 00000000`0009e5e8 : nt!NtClose+0xec
- fffff607`43b33b00 00000000`77891cfc : 00000000`77891cbb 00000023`7791461c 00007ffb`284d0023 00000000`02620001 : nt!KiSystemServiceCopyEnd+0x25
- 00000000`0009eee8 00000000`77891cbb : 00000023`7791461c 00007ffb`284d0023 00000000`02620001 00000000`0245fff0 : wow64cpu!CpupSyscallStub+0xc
- 00000000`0009eef0 00000000`778911b9 : 00000000`0245fd24 00007ffb`27bc3a74 00000000`0009efc0 00007ffb`27bc3b6f : wow64cpu!Thunk0Arg+0x5
- 00000000`0009efa0 00007ffb`27bc3989 : 00000000`00307000 00000000`00400080 00000000`00000000 00000000`0009f800 : wow64cpu!BTCpuSimulate+0x9
- 00000000`0009efe0 00007ffb`27bc337d : 00000000`00000000 00000000`025e3998 00000000`00000000 00000000`00000000 : wow64!RunCpuSimulation+0xd
- 00000000`0009f010 00007ffb`285636f1 : 00007ffb`285b5910 00007ffb`285b5910 00000000`00000010 00000000`00306000 : wow64!Wow64LdrpInitialize+0x12d
- 00000000`0009f2c0 00007ffb`28505deb : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000001 : ntdll!LdrpInitializeProcess+0x18e1
- 00000000`0009f6e0 00007ffb`28505c73 : 00000000`00000000 00007ffb`28490000 00000000`00000000 00000000`00308000 : ntdll!LdrpInitialize+0x15f
- 00000000`0009f780 00007ffb`28505c1e : 00000000`0009f800 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!LdrpInitialize+0x3b
- 00000000`0009f7b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!LdrInitializeThunk+0xe
- SYMBOL_NAME: Dbgv+15a1
- MODULE_NAME: Dbgv
- IMAGE_NAME: Dbgv.sys
- STACK_COMMAND: .thread ; .cxr ; kb
- BUCKET_ID_FUNC_OFFSET: 15a1
- FAILURE_BUCKET_ID: AV_Dbgv!unknown_function
- OS_VERSION: 10.0.19041.1
- BUILDLAB_STR: vb_release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {bb0d4c6e-0053-b7ec-2fc8-83bedf6106af}
- Followup: MachineOwner
- ---------
Crash in DbgPrintEx()
Posted by Anonymous on Thu 5th Mar 2026 15:27
raw | new post
Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.
nrubsig.kpaste.net RSS