pastebin - collaborative debugging tool
nrubsig.kpaste.net RSS


Windows 11 crash with global mount building bash
Posted by Anonymous on Sat 30th Aug 2025 10:33
raw | new post

  1. ************* Preparing the environment for Debugger Extensions Gallery repositories **************
  2.    ExtensionRepository : Implicit
  3.    UseExperimentalFeatureForNugetShare : true
  4.    AllowNugetExeUpdate : true
  5.    NonInteractiveNuget : true
  6.    AllowNugetMSCredentialProviderInstall : true
  7.    AllowParallelInitializationOfLocalRepositories : true
  8.  
  9.    EnableRedirectToV8JsProvider : false
  10.  
  11.    -- Configuring repositories
  12.       ----> Repository : LocalInstalled, Enabled: true
  13.       ----> Repository : UserExtensions, Enabled: true
  14.  
  15. >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.063 seconds
  16.  
  17. ************* Waiting for Debugger Extensions Gallery to Initialize **************
  18.  
  19. >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.047 seconds
  20.    ----> Repository : UserExtensions, Enabled: true, Packages count: 0
  21.    ----> Repository : LocalInstalled, Enabled: true, Packages count: 29
  22.  
  23. Microsoft (R) Windows Debugger Version 10.0.26100.1591 X86
  24. Copyright (c) Microsoft Corporation. All rights reserved.
  25.  
  26.  
  27. Loading Dump File [C:\Windows\MEMORY.DMP]
  28. Kernel Bitmap Dump File: Active memory is available
  29.  
  30. Primary dump contents written successfully
  31.  
  32. Symbol search path is: srv*
  33. Executable search path is:
  34. Page 200102875 too large to be in the dump file.
  35. Windows 10 Kernel Version 26100 MP (6 procs) Free x64
  36. Product: WinNt, suite: TerminalServer SingleUserTS
  37. Edition build lab: 26100.1.amd64fre.ge_release.240331-1435
  38. Kernel base = 0xfffff804`91400000 PsLoadedModuleList = 0xfffff804`922f4e80
  39. Debug session time: Sat Aug 30 11:23:12.637 2025 (UTC + 2:00)
  40. System Uptime: 0 days 0:12:59.832
  41. Loading Kernel Symbols
  42. ...............................................................
  43. ................................................................
  44. .............................Page 1083b2 not present in the dump file. Type ".hh dbgerr004" for details
  45. ...................................
  46.  
  47. Loading User Symbols
  48. ................................................................
  49. .................................
  50. Loading unloaded module list
  51. .....................................................
  52. For analysis of this file, run !analyze -v
  53. 5: kd> !analyze -v
  54. *******************************************************************************
  55. *                                                                             *
  56. *                        Bugcheck Analysis                                    *
  57. *                                                                             *
  58. *******************************************************************************
  59.  
  60. MEMORY_MANAGEMENT (1a)
  61.     # Any other values for parameter 1 must be individually examined.
  62. Arguments:
  63. Arg1: 0000000000041791, The subtype of the BugCheck.
  64. Arg2: ffffd40005683290
  65. Arg3: ffffa0000808cc18
  66. Arg4: 05da4400001eda44
  67.  
  68. Debugging Details:
  69. ------------------
  70.  
  71. Page 1083b2 not present in the dump file. Type ".hh dbgerr004" for details
  72.  
  73. KEY_VALUES_STRING: 1
  74.  
  75.     Key  : Analysis.CPU.mSec
  76.     Value: 6108
  77.  
  78.     Key  : Analysis.Elapsed.mSec
  79.     Value: 15000
  80.  
  81.     Key  : Analysis.IO.Other.Mb
  82.     Value: 2
  83.  
  84.     Key  : Analysis.IO.Read.Mb
  85.     Value: 0
  86.  
  87.     Key  : Analysis.IO.Write.Mb
  88.     Value: 21
  89.  
  90.     Key  : Analysis.Init.CPU.mSec
  91.     Value: 4374
  92.  
  93.     Key  : Analysis.Init.Elapsed.mSec
  94.     Value: 34427
  95.  
  96.     Key  : Analysis.Memory.CommitPeak.Mb
  97.     Value: 116
  98.  
  99.     Key  : Bugcheck.Code.KiBugCheckData
  100.     Value: 0x1a
  101.  
  102.     Key  : Bugcheck.Code.LegacyAPI
  103.     Value: 0x1a
  104.  
  105.     Key  : Dump.Attributes.AsUlong
  106.     Value: 21040
  107.  
  108.     Key  : Dump.Attributes.DiagDataWrittenToHeader
  109.     Value: 1
  110.  
  111.     Key  : Dump.Attributes.ErrorCode
  112.     Value: 0
  113.  
  114.     Key  : Dump.Attributes.FilterDumpFile
  115.     Value: 1
  116.  
  117.     Key  : Dump.Attributes.LastLine
  118.     Value: Dump completed successfully.
  119.  
  120.     Key  : Dump.Attributes.ProgressPercentage
  121.     Value: 100
  122.  
  123.     Key  : Failure.Bucket
  124.     Value: 0x1a_41791_ntdll!NtReadVirtualMemoryEx
  125.  
  126.     Key  : Failure.Hash
  127.     Value: {abc0be70-0937-b2c3-2815-bc87094da565}
  128.  
  129.     Key  : Hypervisor.Enlightenments.Value
  130.     Value: 12576
  131.  
  132.     Key  : Hypervisor.Enlightenments.ValueHex
  133.     Value: 3120
  134.  
  135.     Key  : Hypervisor.Flags.AnyHypervisorPresent
  136.     Value: 1
  137.  
  138.     Key  : Hypervisor.Flags.ApicEnlightened
  139.     Value: 0
  140.  
  141.     Key  : Hypervisor.Flags.ApicVirtualizationAvailable
  142.     Value: 0
  143.  
  144.     Key  : Hypervisor.Flags.AsyncMemoryHint
  145.     Value: 0
  146.  
  147.     Key  : Hypervisor.Flags.CoreSchedulerRequested
  148.     Value: 0
  149.  
  150.     Key  : Hypervisor.Flags.CpuManager
  151.     Value: 0
  152.  
  153.     Key  : Hypervisor.Flags.DeprecateAutoEoi
  154.     Value: 1
  155.  
  156.     Key  : Hypervisor.Flags.DynamicCpuDisabled
  157.     Value: 0
  158.  
  159.     Key  : Hypervisor.Flags.Epf
  160.     Value: 0
  161.  
  162.     Key  : Hypervisor.Flags.ExtendedProcessorMasks
  163.     Value: 0
  164.  
  165.     Key  : Hypervisor.Flags.HardwareMbecAvailable
  166.     Value: 0
  167.  
  168.     Key  : Hypervisor.Flags.MaxBankNumber
  169.     Value: 0
  170.  
  171.     Key  : Hypervisor.Flags.MemoryZeroingControl
  172.     Value: 0
  173.  
  174.     Key  : Hypervisor.Flags.NoExtendedRangeFlush
  175.     Value: 1
  176.  
  177.     Key  : Hypervisor.Flags.NoNonArchCoreSharing
  178.     Value: 0
  179.  
  180.     Key  : Hypervisor.Flags.Phase0InitDone
  181.     Value: 1
  182.  
  183.     Key  : Hypervisor.Flags.PowerSchedulerQos
  184.     Value: 0
  185.  
  186.     Key  : Hypervisor.Flags.RootScheduler
  187.     Value: 0
  188.  
  189.     Key  : Hypervisor.Flags.SynicAvailable
  190.     Value: 1
  191.  
  192.     Key  : Hypervisor.Flags.UseQpcBias
  193.     Value: 0
  194.  
  195.     Key  : Hypervisor.Flags.Value
  196.     Value: 536632
  197.  
  198.     Key  : Hypervisor.Flags.ValueHex
  199.     Value: 83038
  200.  
  201.     Key  : Hypervisor.Flags.VpAssistPage
  202.     Value: 1
  203.  
  204.     Key  : Hypervisor.Flags.VsmAvailable
  205.     Value: 0
  206.  
  207.     Key  : Hypervisor.RootFlags.AccessStats
  208.     Value: 0
  209.  
  210.     Key  : Hypervisor.RootFlags.CrashdumpEnlightened
  211.     Value: 0
  212.  
  213.     Key  : Hypervisor.RootFlags.CreateVirtualProcessor
  214.     Value: 0
  215.  
  216.     Key  : Hypervisor.RootFlags.DisableHyperthreading
  217.     Value: 0
  218.  
  219.     Key  : Hypervisor.RootFlags.HostTimelineSync
  220.     Value: 0
  221.  
  222.     Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
  223.     Value: 0
  224.  
  225.     Key  : Hypervisor.RootFlags.IsHyperV
  226.     Value: 0
  227.  
  228.     Key  : Hypervisor.RootFlags.LivedumpEnlightened
  229.     Value: 0
  230.  
  231.     Key  : Hypervisor.RootFlags.MapDeviceInterrupt
  232.     Value: 0
  233.  
  234.     Key  : Hypervisor.RootFlags.MceEnlightened
  235.     Value: 0
  236.  
  237.     Key  : Hypervisor.RootFlags.Nested
  238.     Value: 0
  239.  
  240.     Key  : Hypervisor.RootFlags.StartLogicalProcessor
  241.     Value: 0
  242.  
  243.     Key  : Hypervisor.RootFlags.Value
  244.     Value: 0
  245.  
  246.     Key  : Hypervisor.RootFlags.ValueHex
  247.     Value: 0
  248.  
  249.     Key  : SecureKernel.HalpHvciEnabled
  250.     Value: 0
  251.  
  252.     Key  : WER.OS.Branch
  253.     Value: ge_release
  254.  
  255.     Key  : WER.OS.Version
  256.     Value: 10.0.26100.1
  257.  
  258.  
  259. BUGCHECK_CODE:  1a
  260.  
  261. BUGCHECK_P1: 41791
  262.  
  263. BUGCHECK_P2: ffffd40005683290
  264.  
  265. BUGCHECK_P3: ffffa0000808cc18
  266.  
  267. BUGCHECK_P4: 5da4400001eda44
  268.  
  269. FILE_IN_CAB:  MEMORY.DMP
  270.  
  271. DUMP_FILE_ATTRIBUTES: 0x21040
  272.   Filter Dump
  273.  
  274. BLACKBOXBSD: 1 (!blackboxbsd)
  275.  
  276.  
  277. BLACKBOXNTFS: 1 (!blackboxntfs)
  278.  
  279.  
  280. BLACKBOXPNP: 1 (!blackboxpnp)
  281.  
  282.  
  283. BLACKBOXWINLOGON: 1
  284.  
  285. PROCESS_NAME:  MsMpEng.exe
  286.  
  287. STACK_TEXT:  
  288. ffffe10e`bb8bc498 fffff804`9170335d     : 00000000`0000001a 00000000`00041791 ffffd400`05683290 ffffa000`0808cc18 : nt!KeBugCheckEx
  289. ffffe10e`bb8bc4a0 fffff804`916d3b5d     : 00000000`00000103 ffffe10e`bb8bc6a0 00000000`00000001 00000000`00000000 : nt!MiUnlockPageTableCharges+0x20d
  290. ffffe10e`bb8bc500 fffff804`91dd450e     : ffffe10e`bb8bc6a0 00000000`00000103 ffffe10e`00000002 00000000`001cd663 : nt!MmUnlockPages+0x29d
  291. ffffe10e`bb8bc580 fffff804`91dd383f     : 00000000`00001578 00000000`00000010 ffffe78c`326a93f0 00000000`00000001 : nt!MiCopyVirtualMemory+0x80e
  292. ffffe10e`bb8bc9a0 fffff804`91881e33     : ffffe78c`39ff8080 000001c1`7b850000 0000019b`bd6727a0 00000098`00a7d8d8 : nt!MiReadWriteVirtualMemory+0x1cf
  293. ffffe10e`bb8bca20 fffff804`91ab7c55     : ffffe10e`bb8bcb60 0000019b`b18cbc00 ffffe10e`bb8bcb60 00000000`00000002 : nt!NtReadVirtualMemoryEx+0x23
  294. ffffe10e`bb8bca70 00007ffa`d6a65784     : 00007ffa`b826a01a 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
  295. 00000098`00a7d8b8 00007ffa`b826a01a     : 00000000`00000000 00000000`00000000 00000000`00000000 0000019b`bd6727a0 : ntdll!NtReadVirtualMemoryEx+0x14
  296. 00000098`00a7d8c0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : mpengine!MpContainerOpen+0x3146a
  297.  
  298.  
  299. SYMBOL_NAME:  ntdll!NtReadVirtualMemoryEx+14
  300.  
  301. MODULE_NAME: ntdll
  302.  
  303. IMAGE_NAME:  ntdll.dll
  304.  
  305. STACK_COMMAND:  .cxr; .ecxr ; kb
  306.  
  307. BUCKET_ID_FUNC_OFFSET:  14
  308.  
  309. FAILURE_BUCKET_ID:  0x1a_41791_ntdll!NtReadVirtualMemoryEx
  310.  
  311. OS_VERSION:  10.0.26100.1
  312.  
  313. BUILDLAB_STR:  ge_release
  314.  
  315. OSPLATFORM_TYPE:  x64
  316.  
  317. OSNAME:  Windows 10
  318.  
  319. FAILURE_ID_HASH:  {abc0be70-0937-b2c3-2815-bc87094da565}
  320.  
  321. Followup:     MachineOwner
  322. ---------

Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.

Syntax highlighting:

To highlight particular lines, prefix each line with {%HIGHLIGHT}




All content is user-submitted.
The administrators of this site (kpaste.net) are not responsible for their content.
Abuse reports should be emailed to us at