pastebin - collaborative debugging tool
nrubsig.kpaste.net RSS


Another MsMpEng.exe MmUnlockPages() crash
Posted by Anonymous on Thu 30th Oct 2025 01:12
raw | new post

  1.  
  2. ************* Preparing the environment for Debugger Extensions Gallery repositories **************
  3.    ExtensionRepository : Implicit
  4.    UseExperimentalFeatureForNugetShare : true
  5.    AllowNugetExeUpdate : true
  6.    NonInteractiveNuget : true
  7.    AllowNugetMSCredentialProviderInstall : true
  8.    AllowParallelInitializationOfLocalRepositories : true
  9.  
  10.    EnableRedirectToV8JsProvider : false
  11.  
  12.    -- Configuring repositories
  13.       ----> Repository : LocalInstalled, Enabled: true
  14.       ----> Repository : UserExtensions, Enabled: true
  15.  
  16. >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.078 seconds
  17.  
  18. ************* Waiting for Debugger Extensions Gallery to Initialize **************
  19.  
  20. >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.063 seconds
  21.    ----> Repository : UserExtensions, Enabled: true, Packages count: 0
  22.    ----> Repository : LocalInstalled, Enabled: true, Packages count: 29
  23.  
  24. Microsoft (R) Windows Debugger Version 10.0.26100.1591 X86
  25. Copyright (c) Microsoft Corporation. All rights reserved.
  26.  
  27.  
  28. Loading Dump File [C:\Windows\MEMORY.DMP]
  29. Kernel Bitmap Dump File: Active memory is available
  30.  
  31. Primary dump contents written successfully
  32.  
  33. Symbol search path is: srv*
  34. Executable search path is:
  35. Page 200102741 too large to be in the dump file.
  36. Windows 10 Kernel Version 26100 MP (6 procs) Free x64
  37. Product: WinNt, suite: TerminalServer SingleUserTS
  38. Edition build lab: 26100.1.amd64fre.ge_release.240331-1435
  39. Kernel base = 0xfffff806`a6800000 PsLoadedModuleList = 0xfffff806`a76f4f10
  40. Debug session time: Thu Oct 30 02:06:21.271 2025 (UTC + 1:00)
  41. System Uptime: 0 days 0:15:18.898
  42. Loading Kernel Symbols
  43. ...............................................................
  44. ................................................................
  45. ................................................................
  46. ...............
  47. Loading User Symbols
  48. ................................................................
  49. .................................
  50. Loading unloaded module list
  51. ..................................................
  52. For analysis of this file, run !analyze -v
  53. 1: kd> !analyze -v
  54. *******************************************************************************
  55. *                                                                             *
  56. *                        Bugcheck Analysis                                    *
  57. *                                                                             *
  58. *******************************************************************************
  59.  
  60. MEMORY_MANAGEMENT (1a)
  61.     # Any other values for parameter 1 must be individually examined.
  62. Arguments:
  63. Arg1: 0000000000041791, The subtype of the BugCheck.
  64. Arg2: ffffc280055633b0
  65. Arg3: ffffd6016803fb10
  66. Arg4: 0000000000010001
  67.  
  68. Debugging Details:
  69. ------------------
  70.  
  71.  
  72. KEY_VALUES_STRING: 1
  73.  
  74.     Key  : Analysis.CPU.mSec
  75.     Value: 9218
  76.  
  77.     Key  : Analysis.Elapsed.mSec
  78.     Value: 25228
  79.  
  80.     Key  : Analysis.IO.Other.Mb
  81.     Value: 40
  82.  
  83.     Key  : Analysis.IO.Read.Mb
  84.     Value: 0
  85.  
  86.     Key  : Analysis.IO.Write.Mb
  87.     Value: 44
  88.  
  89.     Key  : Analysis.Init.CPU.mSec
  90.     Value: 8859
  91.  
  92.     Key  : Analysis.Init.Elapsed.mSec
  93.     Value: 77880
  94.  
  95.     Key  : Analysis.Memory.CommitPeak.Mb
  96.     Value: 116
  97.  
  98.     Key  : Bugcheck.Code.KiBugCheckData
  99.     Value: 0x1a
  100.  
  101.     Key  : Bugcheck.Code.LegacyAPI
  102.     Value: 0x1a
  103.  
  104.     Key  : Dump.Attributes.AsUlong
  105.     Value: 21040
  106.  
  107.     Key  : Dump.Attributes.DiagDataWrittenToHeader
  108.     Value: 1
  109.  
  110.     Key  : Dump.Attributes.ErrorCode
  111.     Value: 0
  112.  
  113.     Key  : Dump.Attributes.FilterDumpFile
  114.     Value: 1
  115.  
  116.     Key  : Dump.Attributes.LastLine
  117.     Value: Dump completed successfully.
  118.  
  119.     Key  : Dump.Attributes.ProgressPercentage
  120.     Value: 100
  121.  
  122.     Key  : Failure.Bucket
  123.     Value: 0x1a_41791_ntdll!NtReadVirtualMemoryEx
  124.  
  125.     Key  : Failure.Hash
  126.     Value: {abc0be70-0937-b2c3-2815-bc87094da565}
  127.  
  128.     Key  : Hypervisor.Enlightenments.Value
  129.     Value: 12576
  130.  
  131.     Key  : Hypervisor.Enlightenments.ValueHex
  132.     Value: 3120
  133.  
  134.     Key  : Hypervisor.Flags.AnyHypervisorPresent
  135.     Value: 1
  136.  
  137.     Key  : Hypervisor.Flags.ApicEnlightened
  138.     Value: 0
  139.  
  140.     Key  : Hypervisor.Flags.ApicVirtualizationAvailable
  141.     Value: 0
  142.  
  143.     Key  : Hypervisor.Flags.AsyncMemoryHint
  144.     Value: 0
  145.  
  146.     Key  : Hypervisor.Flags.CoreSchedulerRequested
  147.     Value: 0
  148.  
  149.     Key  : Hypervisor.Flags.CpuManager
  150.     Value: 0
  151.  
  152.     Key  : Hypervisor.Flags.DeprecateAutoEoi
  153.     Value: 1
  154.  
  155.     Key  : Hypervisor.Flags.DynamicCpuDisabled
  156.     Value: 0
  157.  
  158.     Key  : Hypervisor.Flags.Epf
  159.     Value: 0
  160.  
  161.     Key  : Hypervisor.Flags.ExtendedProcessorMasks
  162.     Value: 0
  163.  
  164.     Key  : Hypervisor.Flags.HardwareMbecAvailable
  165.     Value: 0
  166.  
  167.     Key  : Hypervisor.Flags.MaxBankNumber
  168.     Value: 0
  169.  
  170.     Key  : Hypervisor.Flags.MemoryZeroingControl
  171.     Value: 0
  172.  
  173.     Key  : Hypervisor.Flags.NoExtendedRangeFlush
  174.     Value: 1
  175.  
  176.     Key  : Hypervisor.Flags.NoNonArchCoreSharing
  177.     Value: 0
  178.  
  179.     Key  : Hypervisor.Flags.Phase0InitDone
  180.     Value: 1
  181.  
  182.     Key  : Hypervisor.Flags.PowerSchedulerQos
  183.     Value: 0
  184.  
  185.     Key  : Hypervisor.Flags.RootScheduler
  186.     Value: 0
  187.  
  188.     Key  : Hypervisor.Flags.SynicAvailable
  189.     Value: 1
  190.  
  191.     Key  : Hypervisor.Flags.UseQpcBias
  192.     Value: 0
  193.  
  194.     Key  : Hypervisor.Flags.Value
  195.     Value: 536632
  196.  
  197.     Key  : Hypervisor.Flags.ValueHex
  198.     Value: 83038
  199.  
  200.     Key  : Hypervisor.Flags.VpAssistPage
  201.     Value: 1
  202.  
  203.     Key  : Hypervisor.Flags.VsmAvailable
  204.     Value: 0
  205.  
  206.     Key  : Hypervisor.RootFlags.AccessStats
  207.     Value: 0
  208.  
  209.     Key  : Hypervisor.RootFlags.CrashdumpEnlightened
  210.     Value: 0
  211.  
  212.     Key  : Hypervisor.RootFlags.CreateVirtualProcessor
  213.     Value: 0
  214.  
  215.     Key  : Hypervisor.RootFlags.DisableHyperthreading
  216.     Value: 0
  217.  
  218.     Key  : Hypervisor.RootFlags.HostTimelineSync
  219.     Value: 0
  220.  
  221.     Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
  222.     Value: 0
  223.  
  224.     Key  : Hypervisor.RootFlags.IsHyperV
  225.     Value: 0
  226.  
  227.     Key  : Hypervisor.RootFlags.LivedumpEnlightened
  228.     Value: 0
  229.  
  230.     Key  : Hypervisor.RootFlags.MapDeviceInterrupt
  231.     Value: 0
  232.  
  233.     Key  : Hypervisor.RootFlags.MceEnlightened
  234.     Value: 0
  235.  
  236.     Key  : Hypervisor.RootFlags.Nested
  237.     Value: 0
  238.  
  239.     Key  : Hypervisor.RootFlags.StartLogicalProcessor
  240.     Value: 0
  241.  
  242.     Key  : Hypervisor.RootFlags.Value
  243.     Value: 0
  244.  
  245.     Key  : Hypervisor.RootFlags.ValueHex
  246.     Value: 0
  247.  
  248.     Key  : SecureKernel.HalpHvciEnabled
  249.     Value: 0
  250.  
  251.     Key  : WER.OS.Branch
  252.     Value: ge_release
  253.  
  254.     Key  : WER.OS.Version
  255.     Value: 10.0.26100.1
  256.  
  257.  
  258. BUGCHECK_CODE:  1a
  259.  
  260. BUGCHECK_P1: 41791
  261.  
  262. BUGCHECK_P2: ffffc280055633b0
  263.  
  264. BUGCHECK_P3: ffffd6016803fb10
  265.  
  266. BUGCHECK_P4: 10001
  267.  
  268. FILE_IN_CAB:  MEMORY.DMP
  269.  
  270. DUMP_FILE_ATTRIBUTES: 0x21040
  271.   Filter Dump
  272.  
  273. BLACKBOXBSD: 1 (!blackboxbsd)
  274.  
  275.  
  276. BLACKBOXNTFS: 1 (!blackboxntfs)
  277.  
  278.  
  279. BLACKBOXPNP: 1 (!blackboxpnp)
  280.  
  281.  
  282. BLACKBOXWINLOGON: 1
  283.  
  284. PROCESS_NAME:  MsMpEng.exe
  285.  
  286. STACK_TEXT:  
  287. fffffa09`17036488 fffff806`a6b1874d     : 00000000`0000001a 00000000`00041791 ffffc280`055633b0 ffffd601`6803fb10 : nt!KeBugCheckEx
  288. fffffa09`17036490 fffff806`a6bae9d8     : 00000000`00000013 fffffa09`17036b60 00000000`00000001 00000000`00000000 : nt!MiUnlockPageTableCharges+0x20d
  289. fffffa09`170364f0 fffff806`a71c2c1e     : fffffa09`170366a0 00000000`00000002 fffffa09`17036b60 00000000`001c7669 : nt!MmUnlockPages+0x378
  290. fffffa09`17036580 fffff806`a71c1f4f     : 00000000`00001290 00000000`00000010 ffffac82`04698ea0 00000000`00000001 : nt!MiCopyVirtualMemory+0x80e
  291. fffffa09`170369a0 fffff806`a6c693c3     : ffffac82`0eaea080 00000233`c2600000 0000022e`97190070 000000b5`3467d6f8 : nt!MiReadWriteVirtualMemory+0x1cf
  292. fffffa09`17036a20 fffff806`a6eb1455     : fffffa09`17036b60 0000022e`8ec80a00 fffffa09`17036b60 00000000`00000002 : nt!NtReadVirtualMemoryEx+0x23
  293. fffffa09`17036a70 00007ffd`93104ac4     : 00007ffd`766e4905 0000022e`8ec80a00 00000000`00000000 00000000`7ffed000 : nt!KiSystemServiceCopyEnd+0x25
  294. 000000b5`3467d6d8 00007ffd`766e4905     : 0000022e`8ec80a00 00000000`00000000 00000000`7ffed000 00000000`00000000 : ntdll!NtReadVirtualMemoryEx+0x14
  295. 000000b5`3467d6e0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : mpengine!MpContainerOpen+0x3c5e5
  296.  
  297.  
  298. SYMBOL_NAME:  ntdll!NtReadVirtualMemoryEx+14
  299.  
  300. MODULE_NAME: ntdll
  301.  
  302. IMAGE_NAME:  ntdll.dll
  303.  
  304. STACK_COMMAND:  .cxr; .ecxr ; kb
  305.  
  306. BUCKET_ID_FUNC_OFFSET:  14
  307.  
  308. FAILURE_BUCKET_ID:  0x1a_41791_ntdll!NtReadVirtualMemoryEx
  309.  
  310. OS_VERSION:  10.0.26100.1
  311.  
  312. BUILDLAB_STR:  ge_release
  313.  
  314. OSPLATFORM_TYPE:  x64
  315.  
  316. OSNAME:  Windows 10
  317.  
  318. FAILURE_ID_HASH:  {abc0be70-0937-b2c3-2815-bc87094da565}
  319.  
  320. Followup:     MachineOwner
  321. ---------

Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.

Syntax highlighting:

To highlight particular lines, prefix each line with {%HIGHLIGHT}




All content is user-submitted.
The administrators of this site (kpaste.net) are not responsible for their content.
Abuse reports should be emailed to us at