Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [D:\DavidS\Downloads\MEMORY.DMP] Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available. Symbol search path is: srv* Executable search path is: Windows 8.1 Kernel Version 9600 MP (2 procs) Free x64 Product: Server, suite: TerminalServer SingleUserTS Edition build lab: 9600.19846.amd64fre.winblue_ltsb_escrow.200923-1735 Machine Name: Kernel base = 0xfffff802`5aa81000 PsLoadedModuleList = 0xfffff802`5ad465d0 Debug session time: Tue Oct 27 11:05:53.834 2020 (UTC - 7:00) System Uptime: 0 days 0:08:24.639 Loading Kernel Symbols ............................................................... .................................................Page 1e3e81 not present in the dump file. Type ".hh dbgerr004" for details ............... ... Loading User Symbols PEB is paged out (Peb.Ldr = 00007ff7`f13b7018). Type ".hh dbgerr001" for details Loading unloaded module list .... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff802`5abc14c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd000`b4e9fe90=000000000000000a 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000016, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8025ab0405e, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2421 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on MRWU Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 2424 Key : Analysis.Memory.CommitPeak.Mb Value: 77 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: winblue_ltsb_escrow Key : WER.OS.Timestamp Value: 2020-09-23T17:35:00Z Key : WER.OS.Version Value: 8.1.9600.19846 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 VIRTUAL_MACHINE: VirtualBox BUGCHECK_CODE: a BUGCHECK_P1: 16 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff8025ab0405e WRITE_ADDRESS: 0000000000000016 PROCESS_NAME: java.exe TRAP_FRAME: ffffd000b4e9ffd0 -- (.trap 0xffffd000b4e9ffd0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffffa80120f9000 rbx=0000000000000000 rcx=ffffd000b4ea0228 rdx=0000000000000016 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8025ab0405e rsp=ffffd000b4ea0160 rbp=ffffd000b4ea0200 r8=0000000000000000 r9=0000000000000000 r10=240c8b4000000000 r11=fffffa8012100430 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!KxWaitForLockOwnerShip+0x12: fffff802`5ab0405e 48890a mov qword ptr [rdx],rcx ds:00000000`00000016=???????????????? Resetting default scope STACK_TEXT: ffffd000`b4e9fe88 fffff802`5abd1769 : 00000000`0000000a 00000000`00000016 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx ffffd000`b4e9fe90 fffff802`5abceca8 : 00000000`00000000 fffffa80`09dfdcd0 00000904`c0000000 fffff802`5ab688f6 : nt!KiBugCheckDispatch+0x69 ffffd000`b4e9ffd0 fffff802`5ab0405e : 00000000`00001000 ffffc000`bec3e000 ffffe001`db08c880 00000000`00000000 : nt!KiPageFault+0x428 ffffd000`b4ea0160 fffff802`5aae3480 : fffffa80`09dfffe0 fffff802`5aacbfb9 00000000`00000000 ffffc000`bec3e000 : nt!KxWaitForLockOwnerShip+0x12 ffffd000`b4ea0190 fffff802`5ab22077 : 00000000`0034aaaa fffffa80`09dffff0 00000000`00000000 00000000`00000000 : nt!MiInsertPageInFreeOrZeroedList+0x7e0 ffffd000`b4ea02d0 fffff802`5aae6c6e : ffffffff`ffffffff ffffd000`b4ea0380 00000000`00000000 ffffffff`ffffffff : nt!MiInsertLargePageInFreeOrZeroList+0xdb ffffd000`b4ea0320 fffff802`5ab718d5 : fffffa80`00000077 00000000`00000000 00000000`00000077 00000000`00000000 : nt!MiGetFreeOrZeroPage+0x45e ffffd000`b4ea03c0 fffff802`5ab5ed38 : 0000ffff`00000000 e001db65`718004c0 fffffa80`09dfc620 00000000`00000000 : nt!MiGetPage+0x135 ffffd000`b4ea0430 fffff802`5aabf7c7 : ffffb001`48607000 00000000`2acb1c2e ffffd000`00000000 00000000`00000212 : nt!MmCopyToCachedPage+0x4b8 ffffd000`b4ea0550 fffff802`5aabf4f4 : ffffe001`dbc09520 00000000`2acb1c2e ffffd000`b4ea06a8 ffffe001`00000000 : nt!CcMapAndCopyInToCache+0x21f ffffd000`b4ea0640 fffff800`9b959bcd : 00000000`1e907212 ffffe001`d90b9040 ffffe001`dba49970 ffffe001`d90b9040 : nt!CcCopyWriteEx+0x260 ffffd000`b4ea06e0 fffff800`9b7401f1 : 00000000`00000000 00000000`000002b0 fffff800`9b766801 00000000`00010000 : Ntfs!NtfsCopyWriteA+0x2ed ffffd000`b4ea0960 fffff800`9b7408e6 : ffffd000`b4ea0a50 ffffe001`dba49900 ffffe001`dbc4bbc0 ffffe001`dbc4bad0 : fltmgr!FltpPerformFastIoCall+0x1c1 ffffd000`b4ea09c0 fffff800`9b766a3f : 00000000`00000001 fffff802`5ae0eda8 ffffe001`dba49970 ffffd000`b4ea0b20 : fltmgr!FltpPassThroughFastIo+0x165 ffffd000`b4ea0a20 fffff802`5ae0e8ca : ffffe001`dba49970 00000000`00000000 ffffd000`b4ea0b18 ffffd000`b4ea0b80 : fltmgr!FltpFastIoWrite+0x14f ffffd000`b4ea0ad0 fffff802`5abd13e3 : 00000000`08490000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x422 ffffd000`b4ea0bd0 00007ffb`27df078a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`182893c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`27df078a SYMBOL_NAME: nt!KxWaitForLockOwnerShip+12 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 12 FAILURE_BUCKET_ID: AV_nt!KxWaitForLockOwnerShip OS_VERSION: 8.1.9600.19846 BUILDLAB_STR: winblue_ltsb_escrow OSPLATFORM_TYPE: x64 OSNAME: Windows 8.1 FAILURE_ID_HASH: {724b07b1-4226-85fe-f372-16d33b9a3b93} Followup: MachineOwner ---------