*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffa98c25abbf3c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80669ea32d2, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for HKKbdFltr.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6217
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 20601
Key : Analysis.IO.Other.Mb
Value: 1
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 1
Key : Analysis.Init.CPU.mSec
Value: 452
Key : Analysis.Init.Elapsed.mSec
Value: 9675
Key : Analysis.Memory.CommitPeak.Mb
Value: 90
Key : Bugcheck.Code.DumpHeader
Value: 0xd1
Key : Bugcheck.Code.Register
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
FILE_IN_CAB: 041723-18765-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffa98c25abbf3c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80669ea32d2
READ_ADDRESS: fffff8062971c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa98c25abbf3c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8062c4e1a00 -- (.trap 0xfffff8062c4e1a00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa98762aace40 rbx=0000000000000000 rcx=ffffa98762aace40
rdx=00000004c300f0fc rsi=0000000000000000 rdi=0000000000000000
rip=fffff80669ea32d2 rsp=fffff8062c4e1b98 rbp=fffff8062c4e1c10
r8=00000000000000c0 r9=0000000000000038 r10=ffffa987520b9000
r11=ffffa98c25abbffc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff806`69ea32d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffa98c`25abbf3c=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff806`2c4e18b8 fffff806`28e3e9a9 : 00000000`0000000a ffffa98c`25abbf3c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`2c4e18c0 fffff806`28e3a034 : 000000c8`1f5830df 00000000`00000000 ffffa987`51eec180 fffff806`46212ed2 : nt!KiBugCheckDispatch+0x69
fffff806`2c4e1a00 fffff806`69ea32d2 : fffff806`69ea5b5d 00000000`2c6c0024 fffff806`2c4e1c10 ffffa987`607c0aa0 : nt!KiPageFault+0x474
fffff806`2c4e1b98 fffff806`69ea5b5d : 00000000`2c6c0024 fffff806`2c4e1c10 ffffa987`607c0aa0 fffff806`69e62d5c : kbdclass!memcpy+0x92
fffff806`2c4e1ba0 fffff806`69e91511 : ffffa987`4bd06190 fffff806`2c4e1d68 ffffa987`51fb6310 fffff806`2c4e1d68 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff806`2c4e1c40 ffffa987`4bd06190 : fffff806`2c4e1d68 ffffa987`51fb6310 fffff806`2c4e1d68 00000000`00000008 : HKKbdFltr+0x1511
fffff806`2c4e1c48 fffff806`2c4e1d68 : ffffa987`51fb6310 fffff806`2c4e1d68 00000000`00000008 fffff806`2c4e1cc0 : 0xffffa987`4bd06190
fffff806`2c4e1c50 ffffa987`51fb6310 : fffff806`2c4e1d68 00000000`00000008 fffff806`2c4e1cc0 ffffa987`4bd06040 : 0xfffff806`2c4e1d68
fffff806`2c4e1c58 fffff806`2c4e1d68 : 00000000`00000008 fffff806`2c4e1cc0 ffffa987`4bd06040 fffff806`69e913f0 : 0xffffa987`51fb6310
fffff806`2c4e1c60 00000000`00000008 : fffff806`2c4e1cc0 ffffa987`4bd06040 fffff806`69e913f0 fffff806`24f58180 : 0xfffff806`2c4e1d68
fffff806`2c4e1c68 fffff806`2c4e1cc0 : ffffa987`4bd06040 fffff806`69e913f0 fffff806`24f58180 fffff806`69e6b848 : 0x8
fffff806`2c4e1c70 ffffa987`4bd06040 : fffff806`69e913f0 fffff806`24f58180 fffff806`69e6b848 ffffa987`4bd06190 : 0xfffff806`2c4e1cc0
fffff806`2c4e1c78 fffff806`69e913f0 : fffff806`24f58180 fffff806`69e6b848 ffffa987`4bd06190 fffff806`2c4e1cf9 : 0xffffa987`4bd06040
fffff806`2c4e1c80 fffff806`24f58180 : fffff806`69e6b848 ffffa987`4bd06190 fffff806`2c4e1cf9 ffffa987`49c6cde0 : HKKbdFltr+0x13f0
fffff806`2c4e1c88 fffff806`69e6b848 : ffffa987`4bd06190 fffff806`2c4e1cf9 ffffa987`49c6cde0 fffff806`69e70258 : 0xfffff806`24f58180
fffff806`2c4e1c90 fffff806`28c2a1da : 00000000`00000000 ffffa987`00000010 00000000`00000000 ffff8001`ed1c7970 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff806`2c4e1d60 fffff806`28c299e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x54a
fffff806`2c4e22b0 fffff806`28e2e19e : 00000000`00000000 fffff806`24f58180 fffff806`2974c6c0 ffffa987`60bd0080 : nt!KiRetireDpcList+0xfe4
fffff806`2c4e2540 00000000`00000000 : fffff806`2c4e3000 fffff806`2c4dc000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.23435.1000
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner