*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8013a46ae65, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450M S2H
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F3
BIOS_DATE: 01/25/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450M S2H
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: 20
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8013a46ae65
WRITE_ADDRESS: fffff8013a9733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000020
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiExecuteAllDpcs+2e5
fffff801`3a46ae65 49894720 mov qword ptr [r15+20h],rax
CPU_COUNT: 4
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 11-18-2019 21:27:42.0900
ANALYSIS_VERSION: 10.0.18362.1 x86fre
DPC_STACK_BASE: FFFFF801405FEFB0
TRAP_FRAME: fffff801405feab0 -- (.trap 0xfffff801405feab0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00002821a2af0ee7 rbx=0000000000000000 rcx=ffff9187a8002000
rdx=0000282100000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8013a46ae65 rsp=fffff801405fec40 rbp=fffff801405fed40
r8=0000000000000000 r9=0000000000000000 r10=ffff9187a8a2df98
r11=fffff801405fee60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiExecuteAllDpcs+0x2e5:
fffff801`3a46ae65 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8013a5d30e9 to fffff8013a5c1220
STACK_TEXT:
fffff801`405fe968 fffff801`3a5d30e9 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff801`405fe970 fffff801`3a5cf42b : ffffdd01`dd1b3ab0 fffff801`405fee70 ffff9187`aba43000 fffff801`46607913 : nt!KiBugCheckDispatch+0x69
fffff801`405feab0 fffff801`3a46ae65 : fffff801`386d3f80 ffff9187`a7fcc000 fffff801`386d6f90 fffff801`00000002 : nt!KiPageFault+0x46b
fffff801`405fec40 fffff801`3a46a4df : fffff801`386d1180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x2e5
fffff801`405fed80 fffff801`3a5c8265 : 00000000`00000000 fffff801`386d1180 00000000`00000000 00000000`0000000b : nt!KiRetireDpcList+0x1ef
fffff801`405fefb0 fffff801`3a5c8050 : 00000000`00000000 fffff801`3a76f0a9 ffff9187`b0f14bf0 ffff9187`000004a0 : nt!KxRetireDpcList+0x5
ffffb907`f60ae870 fffff801`3a5c7720 : 00000000`00000000 fffff801`46437bd5 00000000`00000000 ffff9187`abc6d000 : nt!KiDispatchInterruptContinue
ffffb907`f60ae8a0 fffff801`3a45fa3e : ffff9187`af1bf010 00000000`0000000b ffff9187`b0be6010 00000000`00000000 : nt!KiDpcInterrupt+0x2f0
ffffb907`f60aea30 fffff801`4643f69d : 00000000`00000002 00000000`00000000 00000000`00000000 ffff9187`00000000 : nt!KzLowerIrql+0x1e
ffffb907`f60aea60 fffff801`464b9ae2 : ffff9187`b396fb00 ffff9187`abc6d000 ffff9187`00000000 ffff9187`0000000b : dxgmms2!VidSchiSubmitMmIoFlipCommand+0x82d
ffffb907`f60aeb80 fffff801`464b994a : ffff9187`abc6d400 fffff801`464b9880 ffff9187`abc6d000 00000000`00000000 : dxgmms2!VidSchiRun_PriorityTable+0x182
ffffb907`f60aebd0 fffff801`3a52a725 : ffff9187`abcb0680 fffff801`00000001 ffff9187`abc6d000 00000067`b4bbbdff : dxgmms2!VidSchiWorkerThread+0xca
ffffb907`f60aec10 fffff801`3a5c886a : ffffdd01`dcb23180 ffff9187`abcb0680 fffff801`3a52a6d0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffb907`f60aec60 00000000`00000000 : ffffb907`f60af000 ffffb907`f60a9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
THREAD_SHA1_HASH_MOD_FUNC: b2ae1ab07b9fb13d38f5d71646b8c1472dc7e32e
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 2bd02632b46b4c9c3e30312e2d9034dddbb74423
THREAD_SHA1_HASH_MOD: 0dccb91bdc1351d3239adf1e286aab134bb117e6
FOLLOWUP_IP:
dxgmms2!VidSchiSubmitMmIoFlipCommand+82d
fffff801`4643f69d 40387597 cmp byte ptr [rbp-69h],sil
FAULT_INSTR_CODE: 97753840
SYMBOL_STACK_INDEX: 9
SYMBOL_NAME: dxgmms2!VidSchiSubmitMmIoFlipCommand+82d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.449
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 82d
FAILURE_BUCKET_ID: AV_dxgmms2!VidSchiSubmitMmIoFlipCommand
BUCKET_ID: AV_dxgmms2!VidSchiSubmitMmIoFlipCommand
PRIMARY_PROBLEM_CLASS: AV_dxgmms2!VidSchiSubmitMmIoFlipCommand
TARGET_TIME: 2019-11-10T15:44:42.000Z
OSBUILD: 18362
OSSERVICEPACK: 418
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 1449a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_dxgmms2!vidschisubmitmmioflipcommand
FAILURE_ID_HASH: {10ee4543-a3ed-1d4b-e6a6-be87ded8170d}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8021106ae75, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450M S2H
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F3
BIOS_DATE: 01/25/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450M S2H
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: 20
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8021106ae75
WRITE_ADDRESS: fffff802115733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000020
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiExecuteAllDpcs+2e5
fffff802`1106ae75 49894720 mov qword ptr [r15+20h],rax
CPU_COUNT: 4
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: amdow.exe
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 11-18-2019 21:27:47.0576
ANALYSIS_VERSION: 10.0.18362.1 x86fre
DPC_STACK_BASE: FFFFF802147FEFB0
TRAP_FRAME: fffff802147feab0 -- (.trap 0xfffff802147feab0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00002ca82f39f7d1 rbx=0000000000000000 rcx=ffff8d0900a02000
rdx=00002ca800000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8021106ae75 rsp=fffff802147fec40 rbp=fffff802147fed40
r8=0000000000000000 r9=0000000000000000 r10=ffff8d09033ddfd8
r11=fffff802147fee60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiExecuteAllDpcs+0x2e5:
fffff802`1106ae75 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff802111d32e9 to fffff802111c14e0
STACK_TEXT:
fffff802`147fe968 fffff802`111d32e9 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff802`147fe970 fffff802`111cf62b : 00000000`00000000 fffff802`147fee70 00000000`00000000 fffff802`1a307b74 : nt!KiBugCheckDispatch+0x69
fffff802`147feab0 fffff802`1106ae75 : fffff802`0c908f80 ffff8d09`009da000 ffff8d09`076f81f0 fffff802`00000002 : nt!KiPageFault+0x46b
fffff802`147fec40 fffff802`1106a4ef : 00000000`00000014 00000000`00989680 00000000`0007bb94 00000000`000000ac : nt!KiExecuteAllDpcs+0x2e5
fffff802`147fed80 fffff802`111c8525 : 00000000`00000000 fffff802`0c906180 00000000`00000000 ffff8d09`090c0a40 : nt!KiRetireDpcList+0x1ef
fffff802`147fefb0 fffff802`111c8310 : ffff8d09`08c0a080 00000067`b4bbbdff ffffffff`ffffff92 fffff802`111c87df : nt!KxRetireDpcList+0x5
ffffb103`d05806a0 fffff802`111c79e0 : ffffb103`d05806e0 00000000`00000000 00000067`b4bbbdff 00000000`00000001 : nt!KiDispatchInterruptContinue
ffffb103`d05806d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0x2f0
THREAD_SHA1_HASH_MOD_FUNC: be9c7f66c06ca302e2336a21f0915afd40ea41fa
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 05a16ddebfa86a93833754145439b45617645fd9
THREAD_SHA1_HASH_MOD: cb5f414824c2521bcc505eaa03e92fa10922dad8
FOLLOWUP_IP:
nt!KiExecuteAllDpcs+2e5
fffff802`1106ae75 49894720 mov qword ptr [r15+20h],rax
FAULT_INSTR_CODE: 20478949
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiExecuteAllDpcs+2e5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4efcf7a9
IMAGE_VERSION: 10.0.18362.476
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2e5
FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs
BUCKET_ID: AV_nt!KiExecuteAllDpcs
PRIMARY_PROBLEM_CLASS: AV_nt!KiExecuteAllDpcs
TARGET_TIME: 2019-11-18T17:33:03.000Z
OSBUILD: 18362
OSSERVICEPACK: 476
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2011-12-30 02:28:41
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: b242
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!kiexecutealldpcs
FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80633e6ae75, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450M S2H
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F3
BIOS_DATE: 01/25/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450M S2H
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: 20
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80633e6ae75
WRITE_ADDRESS: fffff806343733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000020
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiExecuteAllDpcs+2e5
fffff806`33e6ae75 49894720 mov qword ptr [r15+20h],rax
CPU_COUNT: 4
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: AMDRSServ.exe
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 11-18-2019 21:27:51.0860
ANALYSIS_VERSION: 10.0.18362.1 x86fre
DPC_STACK_BASE: FFFFF806379FEFB0
TRAP_FRAME: fffff806379feab0 -- (.trap 0xfffff806379feab0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000083e4d5fd31 rbx=0000000000000000 rcx=ffffb30427e02000
rdx=0000008300000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80633e6ae75 rsp=fffff806379fec40 rbp=fffff806379fed40
r8=0000000000000000 r9=0000000000000000 r10=ffffb3042c93ffa8
r11=fffff806379fee60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiExecuteAllDpcs+0x2e5:
fffff806`33e6ae75 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80633fd32e9 to fffff80633fc14e0
STACK_TEXT:
fffff806`379fe968 fffff806`33fd32e9 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff806`379fe970 fffff806`33fcf62b : ffffdf80`5ec69ab0 fffff806`379fee70 ffffb304`2c85e000 fffff806`3d8e7913 : nt!KiBugCheckDispatch+0x69
fffff806`379feab0 fffff806`33e6ae75 : fffff806`2fabff80 ffffb304`27dcc000 fffff806`2fac2f90 fffff806`00000002 : nt!KiPageFault+0x46b
fffff806`379fec40 fffff806`33e6a4ef : fffff806`2fabd180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x2e5
fffff806`379fed80 fffff806`33fc8525 : 00000000`00000000 fffff806`2fabd180 00000000`00000000 00000000`00000000 : nt!KiRetireDpcList+0x1ef
fffff806`379fefb0 fffff806`33fc8310 : ffffb304`306ee080 00000067`b4bbbdff ffffffff`ffffff92 fffff806`33fc88b2 : nt!KxRetireDpcList+0x5
ffffc48e`37c846a0 fffff806`33fc79e0 : ffffc48e`37c846e0 00000000`00000018 ffffdf80`5e680180 33333333`33333333 : nt!KiDispatchInterruptContinue
ffffc48e`37c846d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0x2f0
THREAD_SHA1_HASH_MOD_FUNC: be9c7f66c06ca302e2336a21f0915afd40ea41fa
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 05a16ddebfa86a93833754145439b45617645fd9
THREAD_SHA1_HASH_MOD: cb5f414824c2521bcc505eaa03e92fa10922dad8
FOLLOWUP_IP:
nt!KiExecuteAllDpcs+2e5
fffff806`33e6ae75 49894720 mov qword ptr [r15+20h],rax
FAULT_INSTR_CODE: 20478949
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiExecuteAllDpcs+2e5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4efcf7a9
IMAGE_VERSION: 10.0.18362.476
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2e5
FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs
BUCKET_ID: AV_nt!KiExecuteAllDpcs
PRIMARY_PROBLEM_CLASS: AV_nt!KiExecuteAllDpcs
TARGET_TIME: 2019-11-18T17:39:54.000Z
OSBUILD: 18362
OSSERVICEPACK: 476
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2011-12-30 02:28:41
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 14096
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!kiexecutealldpcs
FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80572c6ae75, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450M S2H
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F3
BIOS_DATE: 01/25/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450M S2H
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: 20
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80572c6ae75
WRITE_ADDRESS: fffff805731733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000020
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiExecuteAllDpcs+2e5
fffff805`72c6ae75 49894720 mov qword ptr [r15+20h],rax
CPU_COUNT: 4
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: AMDRSServ.exe
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 11-18-2019 21:27:56.0690
ANALYSIS_VERSION: 10.0.18362.1 x86fre
DPC_STACK_BASE: FFFFF805771FEFB0
TRAP_FRAME: fffffb80dc556b80 -- (.trap 0xfffffb80dc556b80)
Unable to read trap frame at fffffb80`dc556b80
EXCEPTION_RECORD: ffffa70763be5080 -- (.exr 0xffffa70763be5080)
ExceptionAddress: ffffa70763be5088
ExceptionCode: 00200006
ExceptionFlags: 00000000
NumberParameters: 0
LAST_CONTROL_TRANSFER: from fffff80572dd32e9 to fffff80572dc14e0
STACK_TEXT:
fffff805`771fe968 fffff805`72dd32e9 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff805`771fe970 fffff805`72dcf62b : ffffbc00`a95baab0 fffff805`771fee70 ffffa707`6128f000 fffff805`7db17913 : nt!KiBugCheckDispatch+0x69
fffff805`771feab0 fffff805`72c6ae75 : fffff805`6f36df80 ffffa707`5cdda000 fffff805`6f370f90 fffff805`00000002 : nt!KiPageFault+0x46b
fffff805`771fec40 fffff805`72c6a4ef : fffff805`6f36b180 00000000`00000000 00000000`00000002 00000000`00000014 : nt!KiExecuteAllDpcs+0x2e5
fffff805`771fed80 fffff805`72dc8525 : 00000000`00000000 fffff805`6f36b180 ffffbc00`a95baa00 00000000`0000c071 : nt!KiRetireDpcList+0x1ef
fffff805`771fefb0 fffff805`72dc8310 : fffff805`736cf6c0 fffff805`736b92ca 00000000`00000000 00000000`00000001 : nt!KxRetireDpcList+0x5
fffffb80`dc556930 fffff805`72dc7bc5 : 00000000`0000c071 fffff805`72dc3041 ffffa707`63be5080 fffffb80`dc5569f0 : nt!KiDispatchInterruptContinue
fffffb80`dc556960 fffff805`72dc3041 : ffffa707`63be5080 fffffb80`dc5569f0 ffffbc00`a95baa00 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
fffffb80`dc556970 fffff805`72dd2b72 : ffffa707`63be5080 00000140`23f7ae98 fffffb80`dc556b80 ffffa707`63be5080 : nt!KiInterruptDispatch+0xb1
fffffb80`dc556b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceUser+0xf0
THREAD_SHA1_HASH_MOD_FUNC: 75a1db93098271335e713be53f5c74e0fa4b0a5c
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: cf9cff607cdd4e4fba303093ee4d31df166445de
THREAD_SHA1_HASH_MOD: bc100a5647b828107ac4e18055e00abcbe1ec406
FOLLOWUP_IP:
nt!KiExecuteAllDpcs+2e5
fffff805`72c6ae75 49894720 mov qword ptr [r15+20h],rax
FAULT_INSTR_CODE: 20478949
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiExecuteAllDpcs+2e5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4efcf7a9
IMAGE_VERSION: 10.0.18362.476
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2e5
FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs
BUCKET_ID: AV_nt!KiExecuteAllDpcs
PRIMARY_PROBLEM_CLASS: AV_nt!KiExecuteAllDpcs
TARGET_TIME: 2019-11-18T17:36:58.000Z
OSBUILD: 18362
OSSERVICEPACK: 476
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2011-12-30 02:28:41
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 18bdc
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!kiexecutealldpcs
FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}
Followup: MachineOwner
---------