0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffa287aef5b8c8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8038c9b32d2, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1921
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 1911
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 358
Key : Analysis.Init.Elapsed.mSec
Value: 10120
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : Bugcheck.Code.DumpHeader
Value: 0xd1
Key : Bugcheck.Code.Register
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
FILE_IN_CAB: 120922-19828-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffa287aef5b8c8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8038c9b32d2
READ_ADDRESS: fffff8035731c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa287aef5b8c8
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff80353182a00 -- (.trap 0xfffff80353182a00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa2835ce88280 rbx=0000000000000000 rcx=ffffa2835ce88280
rdx=00000004520d3648 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8038c9b32d2 rsp=fffff80353182b98 rbp=fffff80353182c10
r8=00000000000000c0 r9=0000000000000038 r10=ffffa2834d6ed000
r11=ffffa287aef5b988 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff803`8c9b32d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffa287`aef5b8c8=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff803`531828b8 fffff803`56a3b0a9 : 00000000`0000000a ffffa287`aef5b8c8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff803`531828c0 fffff803`56a36fe8 : ffffa283`4a65a6e8 00000000`00000000 ffffa283`4a65a180 fffff803`72ab2d22 : nt!KiBugCheckDispatch+0x69
fffff803`53182a00 fffff803`8c9b32d2 : fffff803`8c9b5b5d 00000000`a3c0d408 fffff803`53182c10 ffffa283`52ab6aa0 : nt!KiPageFault+0x468
fffff803`53182b98 fffff803`8c9b5b5d : 00000000`a3c0d408 fffff803`53182c10 ffffa283`52ab6aa0 fffff803`9b8e2d5c : kbdclass!memcpy+0x92
fffff803`53182ba0 fffff803`9dfe1511 : ffffa283`4d20c190 fffff803`53182d68 ffffa283`4a78a310 fffff803`53182d68 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff803`53182c40 ffffa283`4d20c190 : fffff803`53182d68 ffffa283`4a78a310 fffff803`53182d68 00000000`00000008 : HKKbdFltr+0x1511
fffff803`53182c48 fffff803`53182d68 : ffffa283`4a78a310 fffff803`53182d68 00000000`00000008 fffff803`53182cc0 : 0xffffa283`4d20c190
fffff803`53182c50 ffffa283`4a78a310 : fffff803`53182d68 00000000`00000008 fffff803`53182cc0 ffffa283`4d20c040 : 0xfffff803`53182d68
fffff803`53182c58 fffff803`53182d68 : 00000000`00000008 fffff803`53182cc0 ffffa283`4d20c040 fffff803`9dfe13f0 : 0xffffa283`4a78a310
fffff803`53182c60 00000000`00000008 : fffff803`53182cc0 ffffa283`4d20c040 fffff803`9dfe13f0 fffff803`52dff180 : 0xfffff803`53182d68
fffff803`53182c68 fffff803`53182cc0 : ffffa283`4d20c040 fffff803`9dfe13f0 fffff803`52dff180 fffff803`9b8eb848 : 0x8
fffff803`53182c70 ffffa283`4d20c040 : fffff803`9dfe13f0 fffff803`52dff180 fffff803`9b8eb848 ffffa283`4d20c190 : 0xfffff803`53182cc0
fffff803`53182c78 fffff803`9dfe13f0 : fffff803`52dff180 fffff803`9b8eb848 ffffa283`4d20c190 fffff803`53182cf9 : 0xffffa283`4d20c040
fffff803`53182c80 fffff803`52dff180 : fffff803`9b8eb848 ffffa283`4d20c190 fffff803`53182cf9 ffffa283`4d33adb0 : HKKbdFltr+0x13f0
fffff803`53182c88 fffff803`9b8eb848 : ffffa283`4d20c190 fffff803`53182cf9 ffffa283`4d33adb0 fffff803`9b8f0258 : 0xfffff803`52dff180
fffff803`53182c90 fffff803`568b98ba : 00000000`00000000 ffffa283`00000010 00000000`00000000 ffffc901`23856ab0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff803`53182d60 fffff803`568b90c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x54a
fffff803`531832b0 fffff803`56a2c0ae : 00000000`00000000 fffff803`52dff180 fffff803`5734c6c0 ffffa283`57a7c040 : nt!KiRetireDpcList+0xfe4
fffff803`53183540 00000000`00000000 : fffff803`53184000 fffff803`5317d000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.23435.1000
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner