*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff9b8e96466df4, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff802975432d2, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for HKKbdFltr.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2952
Key : Analysis.Elapsed.mSec
Value: 9928
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 124
Key : Analysis.Init.Elapsed.mSec
Value: 7893
Key : Analysis.Memory.CommitPeak.Mb
Value: 155
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_kbdclass!memcpy
Key : Failure.Hash
Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1417df84
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
BUGCHECK_CODE: d1
BUGCHECK_P1: ffff9b8e96466df4
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff802975432d2
FILE_IN_CAB: 062423-17531-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
READ_ADDRESS: fffff8026f51c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff9b8e96466df4
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: DayZ_x64.exe
DPC_STACK_BASE: FFFFF80270308FB0
TRAP_FRAME: fffff80270308460 -- (.trap 0xfffff80270308460)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9b8ba33bbbc0 rbx=0000000000000000 rcx=ffff9b8ba33bbbc0
rdx=00000002f30ab234 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802975432d2 rsp=fffff802703085f8 rbp=fffff80270308670
r8=00000000000000c0 r9=0000000000000038 r10=ffff9b8b969f4000
r11=ffff9b8e96466eb4 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff802`975432d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffff9b8e`96466df4=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff802`70308318 fffff802`6ec418a9 : 00000000`0000000a ffff9b8e`96466df4 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff802`70308320 fffff802`6ec3cf34 : 00002876`2a8df30a 00000000`00000000 ffff9b8b`96532180 fffff802`71f72ac2 : nt!KiBugCheckDispatch+0x69
fffff802`70308460 fffff802`975432d2 : fffff802`97545b5d 00000000`0000015c fffff802`70308670 ffff9b8b`aa4cbaa0 : nt!KiPageFault+0x474
fffff802`703085f8 fffff802`97545b5d : 00000000`0000015c fffff802`70308670 ffff9b8b`aa4cbaa0 fffff802`97512d5c : kbdclass!memcpy+0x92
fffff802`70308600 fffff802`a4fe1511 : ffff9b8b`96421190 fffff802`703087c8 ffff9b8b`9643e310 fffff802`703087c8 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff802`703086a0 ffff9b8b`96421190 : fffff802`703087c8 ffff9b8b`9643e310 fffff802`703087c8 00000000`00000008 : HKKbdFltr+0x1511
fffff802`703086a8 fffff802`703087c8 : ffff9b8b`9643e310 fffff802`703087c8 00000000`00000008 fffff802`70308720 : 0xffff9b8b`96421190
fffff802`703086b0 ffff9b8b`9643e310 : fffff802`703087c8 00000000`00000008 fffff802`70308720 ffff9b8b`96421040 : 0xfffff802`703087c8
fffff802`703086b8 fffff802`703087c8 : 00000000`00000008 fffff802`70308720 ffff9b8b`96421040 fffff802`a4fe13f0 : 0xffff9b8b`9643e310
fffff802`703086c0 00000000`00000008 : fffff802`70308720 ffff9b8b`96421040 fffff802`a4fe13f0 fffff802`68f6f180 : 0xfffff802`703087c8
fffff802`703086c8 fffff802`70308720 : ffff9b8b`96421040 fffff802`a4fe13f0 fffff802`68f6f180 fffff802`9751b848 : 0x8
fffff802`703086d0 ffff9b8b`96421040 : fffff802`a4fe13f0 fffff802`68f6f180 fffff802`9751b848 ffff9b8b`96421190 : 0xfffff802`70308720
fffff802`703086d8 fffff802`a4fe13f0 : fffff802`68f6f180 fffff802`9751b848 ffff9b8b`96421190 fffff802`70308759 : 0xffff9b8b`96421040
fffff802`703086e0 fffff802`68f6f180 : fffff802`9751b848 ffff9b8b`96421190 fffff802`70308759 ffff9b8b`9640ac50 : HKKbdFltr+0x13f0
fffff802`703086e8 fffff802`9751b848 : ffff9b8b`96421190 fffff802`70308759 ffff9b8b`9640ac50 fffff802`97520258 : 0xfffff802`68f6f180
fffff802`703086f0 fffff802`6eaa7a4c : 00000000`00000000 ffffc900`00000010 00000000`00000000 ffffc900`5927b830 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff802`703087c0 fffff802`6eaa6a3a : 00000000`00000022 fffff802`68f6f180 00000000`00000000 00000000`0000000f : nt!KiExecuteAllDpcs+0x42c
fffff802`70308d00 fffff802`6ec356f5 : 00000000`00000000 00000000`00000000 fffff802`68f6f180 00000000`00000036 : nt!KiRetireDpcList+0x1ba
fffff802`70308fb0 fffff802`6ec3569f : fffff882`bf947349 fffff802`6ea418a5 ffffc900`57d62180 00000253`23bb8030 : nt!KxSwapStacksAndRetireDpcList+0x5
fffff882`bf9472b0 fffff802`6ea418a5 : ffffc900`57d62180 00000253`23bb8030 00000000`0000004a ffff9b8b`9d784080 : nt!KiPlatformSwapStacksAndCallReturn
fffff882`bf9472c0 fffff802`6ec34e6b : 00000000`00000000 00000000`00000049 00000000`00000000 00000256`63eb78b0 : nt!KiDispatchInterrupt+0xd5
fffff882`bf9473b0 fffff802`6ec2e4a1 : 000000ce`109e7a20 ffffc900`5927b780 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x1b
fffff882`bf9473e0 00007ff6`7c3e94f6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
000000ce`109e7980 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff6`7c3e94f6
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.22621.601
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner
---------