DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8050000363c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff80553ff363c, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7139
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 22981
Key : Analysis.Init.CPU.mSec
Value: 859
Key : Analysis.Init.Elapsed.mSec
Value: 1669
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: d1
BUGCHECK_P1: fffff8050000363c
BUGCHECK_P2: 2
BUGCHECK_P3: 8
BUGCHECK_P4: fffff80553ff363c
READ_ADDRESS: fffff8054f4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff8050000363c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff805549fd3a0 -- (.trap 0xfffff805549fd3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=ffff80073410b630
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80553ff363c rsp=fffff805549fd538 rbp=fffff805549fd640
r8=00000000000305ce r9=0000000000032dbf r10=ffff80073410b000
r11=ffff80073410ba30 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
NETIO!RtlGetNextExpirationTimerWheelTick+0x4c:
fffff805`53ff363c 4883c118 add rcx,18h
Resetting default scope
STACK_TEXT:
fffff805`549fd258 fffff805`4ec07b69 : 00000000`0000000a fffff805`0000363c 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff805`549fd260 fffff805`4ec03e69 : 00000000`ffffffff 00000000`00000000 00000000`00000000 ffff8007`3a4f77c8 : nt!KiBugCheckDispatch+0x69
fffff805`549fd3a0 fffff805`53ff363c : fffff805`540cf512 00000000`0002d527 00000000`00000000 fffff805`00000006 : nt!KiPageFault+0x469
fffff805`549fd538 fffff805`540cf512 : 00000000`0002d527 00000000`00000000 fffff805`00000006 00000000`0002d527 : NETIO!RtlGetNextExpirationTimerWheelTick+0x4c
fffff805`549fd540 fffff805`4ea0781e : fffff805`4ba5a240 00000000`00000000 fffff805`549fda20 fffff805`4ba57180 : tcpip!TcpPeriodicTimeoutHandler+0xa72
fffff805`549fd760 fffff805`4ea06b04 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff805`549fd8d0 fffff805`4ebf97be : 00000000`00000000 fffff805`4ba57180 fffff805`4f527600 ffff8007`4048c080 : nt!KiRetireDpcList+0x1f4
fffff805`549fdb60 00000000`00000000 : fffff805`549fe000 fffff805`549f7000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: NETIO!RtlGetNextExpirationTimerWheelTick+4c
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4c
FAILURE_BUCKET_ID: AV_NETIO!RtlGetNextExpirationTimerWheelTick
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {832c4dc1-73b9-2c91-516c-cde32f637c45}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff807089f3630, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff8076b9f3630, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8155
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 34458
Key : Analysis.Init.CPU.mSec
Value: 780
Key : Analysis.Init.Elapsed.mSec
Value: 1670
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: d1
BUGCHECK_P1: fffff807089f3630
BUGCHECK_P2: 2
BUGCHECK_P3: 8
BUGCHECK_P4: fffff8076b9f3630
READ_ADDRESS: fffff80768cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff807089f3630
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8076c3fd3a0 -- (.trap 0xfffff8076c3fd3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=ffffd0062b70d180
rdx=0000000000000033 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8076b9f3630 rsp=fffff8076c3fd538 rbp=fffff8076c3fd640
r8=00000000000272c6 r9=000000000002730c r10=ffffd0062b70d000
r11=ffffd0062b70d5d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
NETIO!RtlGetNextExpirationTimerWheelTick+0x40:
fffff807`6b9f3630 448b09 mov r9d,dword ptr [rcx] ds:ffffd006`2b70d180=00000000
Resetting default scope
STACK_TEXT:
fffff807`6c3fd258 fffff807`68407b69 : 00000000`0000000a fffff807`089f3630 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff807`6c3fd260 fffff807`68403e69 : 00000000`ffffff00 00000000`00000000 00000000`00000000 ffffd006`2bedf601 : nt!KiBugCheckDispatch+0x69
fffff807`6c3fd3a0 fffff807`6b9f3630 : fffff807`6bacf512 00000000`0001c73b 00000000`00000000 fffff807`00000006 : nt!KiPageFault+0x469
fffff807`6c3fd538 fffff807`6bacf512 : 00000000`0001c73b 00000000`00000000 fffff807`00000006 00000000`0001c73b : NETIO!RtlGetNextExpirationTimerWheelTick+0x40
fffff807`6c3fd540 fffff807`6820781e : fffff807`6344a240 00000000`00000000 fffff807`6c3fda20 fffff807`63447180 : tcpip!TcpPeriodicTimeoutHandler+0xa72
fffff807`6c3fd760 fffff807`68206b04 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff807`6c3fd8d0 fffff807`683f97be : 00000000`00000000 fffff807`63447180 fffff807`68d27600 ffffd006`39885080 : nt!KiRetireDpcList+0x1f4
fffff807`6c3fdb60 00000000`00000000 : fffff807`6c3fe000 fffff807`6c3f7000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: NETIO!RtlGetNextExpirationTimerWheelTick+40
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 40
FAILURE_BUCKET_ID: AV_NETIO!RtlGetNextExpirationTimerWheelTick
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {832c4dc1-73b9-2c91-516c-cde32f637c45}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80600003630, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff806401f3630, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 11686
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 55070
Key : Analysis.Init.CPU.mSec
Value: 749
Key : Analysis.Init.Elapsed.mSec
Value: 1706
Key : Analysis.Memory.CommitPeak.Mb
Value: 97
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: d1
BUGCHECK_P1: fffff80600003630
BUGCHECK_P2: 2
BUGCHECK_P3: 8
BUGCHECK_P4: fffff806401f3630
READ_ADDRESS: fffff8063c2fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff80600003630
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff80640bfd3a0 -- (.trap 0xfffff80640bfd3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=ffffdf8fb6eec4e0
rdx=000000000000000f rsi=0000000000000000 rdi=0000000000000000
rip=fffff806401f3630 rsp=fffff80640bfd538 rbp=fffff80640bfd640
r8=0000000000088bd3 r9=0000000000000000 r10=ffffdf8fb6eec000
r11=fffff80640bfcd60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po nc
NETIO!RtlGetNextExpirationTimerWheelTick+0x40:
fffff806`401f3630 448b09 mov r9d,dword ptr [rcx] ds:ffffdf8f`b6eec4e0=00000000
Resetting default scope
STACK_TEXT:
fffff806`40bfd258 fffff806`3ba07b69 : 00000000`0000000a fffff806`00003630 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff806`40bfd260 fffff806`3ba03e69 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff806`40bfd3a0 fffff806`401f3630 : fffff806`402cf512 00000000`00088aeb 00000000`00000000 fffff806`00000006 : nt!KiPageFault+0x469
fffff806`40bfd538 fffff806`402cf512 : 00000000`00088aeb 00000000`00000000 fffff806`00000006 00000000`00088aeb : NETIO!RtlGetNextExpirationTimerWheelTick+0x40
fffff806`40bfd540 fffff806`3b80781e : fffff806`37d4a240 00000000`00000000 fffff806`40bfda20 fffff806`37d47180 : tcpip!TcpPeriodicTimeoutHandler+0xa72
fffff806`40bfd760 fffff806`3b806b04 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff806`40bfd8d0 fffff806`3b9f97be : 00000000`00000000 fffff806`37d47180 fffff806`3c327600 ffffdf8f`bebe8080 : nt!KiRetireDpcList+0x1f4
fffff806`40bfdb60 00000000`00000000 : fffff806`40bfe000 fffff806`40bf7000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: NETIO!RtlGetNextExpirationTimerWheelTick+40
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 40
FAILURE_BUCKET_ID: AV_NETIO!RtlGetNextExpirationTimerWheelTick
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {832c4dc1-73b9-2c91-516c-cde32f637c45}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80562d09c20, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7593
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 15611
Key : Analysis.Init.CPU.mSec
Value: 1140
Key : Analysis.Init.Elapsed.mSec
Value: 78117
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80562d09c20
WRITE_ADDRESS: fffff805636fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
DPC_STACK_BASE: FFFFF80567275FB0
TRAP_FRAME: fffff80567271b80 -- (.trap 0xfffff80567271b80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff8055f326180
rdx=fffff8056726d6c8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80562d09c20 rsp=fffff80567271d13 rbp=fffff8056726d640
r8=0000000000000000 r9=0000000000016fe8 r10=fffff80562d09be0
r11=fffff8056726d020 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x40:
fffff805`62d09c20 488713 xchg rdx,qword ptr [rbx] ds:00000000`00000000=????????????????
Resetting default scope
UNALIGNED_STACK_POINTER: fffff80567271d13
STACK_TEXT:
fffff805`67271a38 fffff805`62e07169 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff805`67271a40 fffff805`62e03469 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff805`67271b80 fffff805`62d09c20 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
fffff805`67271d13 fffff805`6696edc0 : 00000000`00016f44 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x40
fffff805`67271d43 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpPeriodicTimeoutHandler+0xa30
SYMBOL_NAME: tcpip!TcpPeriodicTimeoutHandler+a30
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: a30
FAILURE_BUCKET_ID: AV_tcpip!TcpPeriodicTimeoutHandler
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {eea1ea46-f92b-7c89-673c-92993741d2b7}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff803166be600, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8032f4b3630, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6717
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 21264
Key : Analysis.Init.CPU.mSec
Value: 890
Key : Analysis.Init.Elapsed.mSec
Value: 67759
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: d1
BUGCHECK_P1: fffff803166be600
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8032f4b3630
WRITE_ADDRESS: fffff8032d6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff803166be600
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8032fe6d3a0 -- (.trap 0xfffff8032fe6d3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=ffff8001933030f0
rdx=0000000000000039 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8032f4b3630 rsp=fffff8032fe6d538 rbp=fffff8032fe6d640
r8=0000000000038586 r9=0000000000038586 r10=ffff800193303000
r11=ffff800193303fe8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
NETIO!RtlGetNextExpirationTimerWheelTick+0x40:
fffff803`2f4b3630 448b09 mov r9d,dword ptr [rcx] ds:ffff8001`933030f0=00000000
Resetting default scope
STACK_TEXT:
fffff803`2fe6d258 fffff803`2ce07169 : 00000000`0000000a fffff803`166be600 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff803`2fe6d260 fffff803`2ce03469 : 00000000`00000000 00000000`00000000 00000000`00000004 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff803`2fe6d3a0 fffff803`2f4b3630 : fffff803`2f58ee02 00000000`00038564 00000000`00000000 fffff803`00000006 : nt!KiPageFault+0x469
fffff803`2fe6d538 fffff803`2f58ee02 : 00000000`00038564 00000000`00000000 fffff803`00000006 00000000`00038564 : NETIO!RtlGetNextExpirationTimerWheelTick+0x40
fffff803`2fe6d540 fffff803`2cce535e : fffff803`28078240 fffff803`28075180 fffff803`2fe6da20 fffff803`28075180 : tcpip!TcpPeriodicTimeoutHandler+0xa72
fffff803`2fe6d760 fffff803`2cce4644 : 00000000`00000000 00000000`00000000 00000000`00000008 00000000`00002274 : nt!KiExecuteAllDpcs+0x30e
fffff803`2fe6d8d0 fffff803`2cdf8d7e : 00000000`00000000 fffff803`28075180 fffff803`2d727600 ffff8001`93278040 : nt!KiRetireDpcList+0x1f4
fffff803`2fe6db60 00000000`00000000 : fffff803`2fe6e000 fffff803`2fe67000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: NETIO!RtlGetNextExpirationTimerWheelTick+40
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 40
FAILURE_BUCKET_ID: AV_NETIO!RtlGetNextExpirationTimerWheelTick
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {832c4dc1-73b9-2c91-516c-cde32f637c45}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffffffffff93, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8040552b752, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7781
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 26011
Key : Analysis.Init.CPU.mSec
Value: 1187
Key : Analysis.Init.Elapsed.mSec
Value: 80385
Key : Analysis.Memory.CommitPeak.Mb
Value: 97
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffffffffffff93
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8040552b752
WRITE_ADDRESS: fffff80405efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffff93
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8040aa6b920 -- (.trap 0xfffff8040aa6b920)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000003f rbx=0000000000000000 rcx=0000000000000010
rdx=ffffcefb6fd16630 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8040552b752 rsp=fffff8040aa6bab0 rbp=fffff80405e4ee00
r8=ffffffffffffffff r9=ffffcefb6fd16bb0 r10=0000000000000020
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiReservePtes+0x502:
fffff804`0552b752 4883c208 add rdx,8
Resetting default scope
STACK_TEXT:
fffff804`0aa6b7d8 fffff804`05607169 : 00000000`0000000a ffffffff`ffffff93 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff804`0aa6b7e0 fffff804`05603469 : 00000000`00000001 00060080`01000000 00000000`00000000 fffff804`1f7a32fd : nt!KiBugCheckDispatch+0x69
fffff804`0aa6b920 fffff804`0552b752 : fffff804`05e4ee00 fffff804`00000000 ffffae0e`00000000 00000000`000001c0 : nt!KiPageFault+0x469
fffff804`0aa6bab0 fffff804`0552ba34 : ffffae0e`00000000 fffff804`00000000 00000000`00000000 ffffae0e`2b28a1a0 : nt!MiReservePtes+0x502
fffff804`0aa6bb80 fffff804`0a097ce2 : 00000000`00000af0 00000000`00000000 00000000`00000af0 fffff804`0aa6bd28 : nt!MmMapLockedPagesSpecifyCache+0xd4
fffff804`0aa6bbe0 fffff804`0a171380 : fffff804`0aa6bd20 fffff804`0aa6bcdc fffff804`0aa6bd28 fffff804`0aa6bce0 : NETIO!RtlCopyMdlToMdlIndirect+0x242
fffff804`0aa6bc60 fffff804`0a171ae4 : fffff804`0aa6c0d0 fffff804`0a098d88 00000000`00000000 fffff804`0aa6bed9 : tcpip!TcpSatisfyReceiveRequests+0x100
fffff804`0aa6be60 fffff804`0a171815 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpDeliverDataToClient+0xe4
fffff804`0aa6bfe0 fffff804`0a175ebb : 00000000`00000007 00000000`00000000 00000000`00000000 00000000`ffffffff : tcpip!TcpDeliverReceive+0xb5
fffff804`0aa6c0d0 fffff804`0a174c5f : 00000000`00000000 fffff804`0a1932d4 ffffae0e`28b319c8 00000000`00000007 : tcpip!TcpTcbFastDatagram+0xfcb
fffff804`0aa6c2a0 fffff804`0a173fff : 00000000`00000028 ffffae0e`28b51000 00000000`2b28b0c0 ffffae0e`28b51000 : tcpip!TcpTcbReceive+0x18f
fffff804`0aa6c4f0 fffff804`0a173088 : 00000000`000197e0 fffff804`0a35dc00 00000000`f5beb2c1 fffff804`0a358598 : tcpip!TcpMatchReceive+0x51f
fffff804`0aa6c7a0 fffff804`0a1d8a52 : ffffae0e`2899cc00 00000000`00005000 00000000`00000000 ffffae0e`28b51001 : tcpip!TcpReceive+0x358
fffff804`0aa6c890 fffff804`0a199b31 : ffffae0e`33a63a40 fffff804`0aa6c640 00000000`0aa60000 ffffae0e`2889f320 : tcpip!TcpNlClientReceiveDatagrams+0x22
fffff804`0aa6c8d0 fffff804`0a19647b : 00000000`00000001 00000000`00000000 00000000`00000000 ffffae0e`28b51000 : tcpip!IppProcessDeliverList+0xc1
fffff804`0aa6c9b0 fffff804`0a1959ff : fffff804`0a358230 ffffae0e`28b778c0 ffffae0e`28b51000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x21b
fffff804`0aa6cab0 fffff804`0a192d9c : ffffae0e`32773a80 ffffae0e`33a63a40 00000000`00000001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x32f
fffff804`0aa6cbd0 fffff804`0a1defd0 : ffffae0e`33a63a40 00000000`00000000 fffff804`0aa6cca1 00000000`00000000 : tcpip!IpFlcReceivePackets+0xc
fffff804`0aa6cc00 fffff804`0a1de5cc : 00000000`00000001 ffffae0e`28fe8000 fffff804`0a1d1a50 fffff804`0aa6cfdc : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x270
fffff804`0aa6cd00 fffff804`0540d468 : ffffae0e`28bc0780 00000000`00000002 fffff804`05f27600 fffff804`0aa6cff8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x17c
fffff804`0aa6ce50 fffff804`0540d3dd : fffff804`0a1de450 fffff804`0aa6cff8 ffffae0e`28b5ca20 00000000`00000202 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff804`0aa6cec0 fffff804`0a1d15ed : 00000000`00000014 fffff804`0a236b2a ffffae0e`33a63a40 fffff804`0a236b9d : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff804`0aa6cf00 fffff804`0a1d0ccd : 00000000`00000001 fffff804`0aa6d060 ffffae0e`28fe8010 fffff804`0aa6d070 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff804`0aa6cf60 fffff804`09f11eb1 : ffffae0e`33aebe01 ffffae0e`33aebeb1 00000000`00000020 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff804`0aa6d210 fffff804`09f11ccb : ffffae0e`329c2b20 fffff804`00000001 fffff804`00000000 00000000`00000002 : ndis!ndisMIndicateNetBufferListsToOpen+0x141
fffff804`0aa6d2f0 fffff804`09f17ef1 : ffffae0e`2b28a1a0 ffffae0e`33a63a01 ffffae0e`2b28a1a0 00000000`00000001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff804`0aa6d370 fffff804`09f4dee3 : ffffae0e`33a63a40 fffff804`0aa6d441 00000000`00000000 ffffae0e`2b245910 : ndis!ndisCallReceiveHandler+0x61
fffff804`0aa6d3c0 fffff804`09f14a94 : 00000000`00001a10 00000000`00000001 ffffae0e`2b28a1a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff804`0aa6d490 fffff804`282261d8 : ffffae0e`2b28e000 ffffae0e`2b28e000 00000000`00000000 ffffae0e`2b28e5f0 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff804`0aa6d520 fffff804`282125a8 : 00000000`00000000 00000000`3e3cc101 ffffae0e`00000400 fffff804`0aa6d698 : rt640x64!MpHandleRecvIntPriVLanJumbo+0x2c4
fffff804`0aa6d610 fffff804`09f17887 : 00000000`00000000 ffffae0e`2b28b9a0 ffffae0e`2b07b0f0 00000000`00000000 : rt640x64!MPHandleMessageInterrupt+0x398
fffff804`0aa6d680 fffff804`054e535e : fffff804`02b91240 00000000`00000000 00000000`00000004 fffff804`02b8e180 : ndis!ndisInterruptDpc+0x197
fffff804`0aa6d760 fffff804`054e4644 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff804`0aa6d8d0 fffff804`055f8d7e : 00000000`00000000 fffff804`02b8e180 fffff804`05f27600 ffffae0e`26cb4040 : nt!KiRetireDpcList+0x1f4
fffff804`0aa6db60 00000000`00000000 : fffff804`0aa6e000 fffff804`0aa67000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: NETIO!RtlCopyMdlToMdlIndirect+242
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 242
FAILURE_BUCKET_ID: AV_NETIO!RtlCopyMdlToMdlIndirect
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d357dedb-61ef-0759-396f-911f270bccf3}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000be129d80, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 000000000000009f, value 0 = read operation, 1 = write operation
Arg4: fffff8038be9363a, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for rt640x64.sys
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6514
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11750
Key : Analysis.Init.CPU.mSec
Value: 764
Key : Analysis.Init.Elapsed.mSec
Value: 3995
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: d1
BUGCHECK_P1: be129d80
BUGCHECK_P2: ff
BUGCHECK_P3: 9f
BUGCHECK_P4: fffff8038be9363a
ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff803719fd610 -- (.trap 0xfffff803719fd610)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000be11da37 rbx=0000000000000000 rcx=0000000000002710
rdx=00000000be12bd74 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8038be9363a rsp=fffff803719fd7a0 rbp=00000000be1116e7
r8=00000000be128296 r9=00000000be105b42 r10=fffff80368c1b180
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na pe cy
rt640x64+0x363a:
fffff803`8be9363a 89bb84450000 mov dword ptr [rbx+4584h],edi ds:00000000`00004584=????????
Resetting default scope
STACK_TEXT:
fffff803`719fd4c8 fffff803`6ce07b69 : 00000000`0000000a 00000000`be129d80 00000000`000000ff 00000000`0000009f : nt!KeBugCheckEx
fffff803`719fd4d0 fffff803`6ce03e69 : ffffe708`473b5320 00000000`be280a54 ffffe708`473b5300 fffff803`719fd7a0 : nt!KiBugCheckDispatch+0x69
fffff803`719fd610 fffff803`8be9363a : fffff803`68c1b180 00000000`be1116e7 00000000`00000001 fffff803`719fd800 : nt!KiPageFault+0x469
fffff803`719fd7a0 fffff803`68c1b180 : 00000000`be1116e7 00000000`00000001 fffff803`719fd800 fffff803`68c1b180 : rt640x64+0x363a
fffff803`719fd7a8 00000000`be1116e7 : 00000000`00000001 fffff803`719fd800 fffff803`68c1b180 00000000`00000008 : 0xfffff803`68c1b180
fffff803`719fd7b0 00000000`00000001 : fffff803`719fd800 fffff803`68c1b180 00000000`00000008 ffffe708`473b5000 : 0xbe1116e7
fffff803`719fd7b8 fffff803`719fd800 : fffff803`68c1b180 00000000`00000008 ffffe708`473b5000 00000000`00000000 : 0x1
fffff803`719fd7c0 fffff803`68c1b180 : 00000000`00000008 ffffe708`473b5000 00000000`00000000 00000000`00000002 : 0xfffff803`719fd800
fffff803`719fd7c8 00000000`00000008 : ffffe708`473b5000 00000000`00000000 00000000`00000002 fffff803`719fd900 : 0xfffff803`68c1b180
fffff803`719fd7d0 ffffe708`473b5000 : 00000000`00000000 00000000`00000002 fffff803`719fd900 00000000`be113d6f : 0x8
fffff803`719fd7d8 00000000`00000000 : 00000000`00000002 fffff803`719fd900 00000000`be113d6f fffff803`6cc73301 : 0xffffe708`473b5000
SYMBOL_NAME: rt640x64+363a
MODULE_NAME: rt640x64
IMAGE_NAME: rt640x64.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 363a
FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_rt640x64!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ba14d03f-87b2-86f6-7e1e-1db53222cfa1}
Followup: MachineOwner
---------
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: fffff8023021ae50
Arg3: fffff8022f88f512
Arg4: fffff8022f7f3633
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 68062
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 75105
Key : Analysis.Init.CPU.mSec
Value: 781
Key : Analysis.Init.Elapsed.mSec
Value: 1892
Key : Analysis.Memory.CommitPeak.Mb
Value: 307
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 7f
BUGCHECK_P1: 8
BUGCHECK_P2: fffff8023021ae50
BUGCHECK_P3: fffff8022f88f512
BUGCHECK_P4: fffff8022f7f3633
TRAP_FRAME: fffff8023021ae50 -- (.trap 0xfffff8023021ae50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffc40501d053c0
rdx=000000000000001b rsi=0000000000000000 rdi=0000000000000000
rip=fffff8022f7f3633 rsp=fffff8022f88f512 rbp=fffff802301fd640
r8=000000000002e28d r9=0000000000000000 r10=ffffc40501d05000
r11=ffffc40501d05cb8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
NETIO!RtlGetNextExpirationTimerWheelTick+0x43:
fffff802`2f7f3633 458b4208 mov r8d,dword ptr [r10+8] ds:ffffc405`01d05008=0002e28d
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 2
PROCESS_NAME: System
BAD_STACK_POINTER: fffff8022f88f512
UNALIGNED_STACK_POINTER: fffff8022f88f512
SYMBOL_NAME: NETIO!RtlGetNextExpirationTimerWheelTick+43
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 43
FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_NETIO!RtlGetNextExpirationTimerWheelTick
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0cd6a240-b2ce-b305-b086-130997ee7c49}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000000200c0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8056f3f3632, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 12906
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 22300
Key : Analysis.Init.CPU.mSec
Value: 781
Key : Analysis.Init.Elapsed.mSec
Value: 1976
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: d1
BUGCHECK_P1: 200c0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8056f3f3632
READ_ADDRESS: fffff80569cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
00000000000200c0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8056fdfd3a0 -- (.trap 0xfffff8056fdfd3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=ffffdc89197051c8
rdx=0000000000000030 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8056f3f3632 rsp=fffff8056fdfd538 rbp=fffff8056fdfd640
r8=0000000000020088 r9=0000000000000000 r10=ffffdc8919705000
r11=ffffdc8919705688 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
NETIO!RtlGetNextExpirationTimerWheelTick+0x42:
fffff805`6f3f3632 09458b or dword ptr [rbp-75h],eax ss:0018:fffff805`6fdfd5cb=fff80569
Resetting default scope
MISALIGNED_IP:
NETIO!RtlGetNextExpirationTimerWheelTick+42
fffff805`6f3f3632 09458b or dword ptr [rbp-75h],eax
STACK_TEXT:
fffff805`6fdfd258 fffff805`69407b69 : 00000000`0000000a 00000000`000200c0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff805`6fdfd260 fffff805`69403e69 : 00000000`00000000 ffffdc89`19a51420 00000000`00140001 00000000`0000003f : nt!KiBugCheckDispatch+0x69
fffff805`6fdfd3a0 fffff805`6f3f3632 : fffff805`6f4cf512 00000000`00020080 00000000`00000000 fffff805`00000006 : nt!KiPageFault+0x469
fffff805`6fdfd538 fffff805`6f4cf512 : 00000000`00020080 00000000`00000000 fffff805`00000006 00000000`00020080 : NETIO!RtlGetNextExpirationTimerWheelTick+0x42
fffff805`6fdfd540 fffff805`6920781e : fffff805`66f09240 ffffdc89`17afa000 fffff805`6fdfda30 fffff805`66f06180 : tcpip!TcpPeriodicTimeoutHandler+0xa72
fffff805`6fdfd760 fffff805`69206b04 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`0000139f : nt!KiExecuteAllDpcs+0x30e
fffff805`6fdfd8d0 fffff805`693f97be : 00000000`00000000 fffff805`66f06180 fffff805`69d27600 ffffdc89`22bbe040 : nt!KiRetireDpcList+0x1f4
fffff805`6fdfdb60 00000000`00000000 : fffff805`6fdfe000 fffff805`6fdf7000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: NETIO!RtlGetNextExpirationTimerWheelTick+42
IMAGE_NAME: hardware
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED_NETIO.SYS
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3000662e-945a-e78f-7508-f07b767bf8de}
Followup: MachineOwner
---------
0: kd> !sysinfo machineid
Machine ID Information [From Smbios 3.1, DMIVersion 0, Size=4491]
BiosMajorRelease = 5
BiosMinorRelease = 12
BiosVendor = American Megatrends Inc.
BiosVersion = 5.12
BiosReleaseDate = 03/22/2019
SystemManufacturer = ECS
SystemProductName = H310CH5-M7
SystemFamily = Default string
SystemVersion = 1.0
SystemSKU = Default string
BaseBoardManufacturer = ECS
BaseBoardProduct = H310CH5-M7
BaseBoardVersion = 1.0
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000005ce8f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff80509df3633, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 14265
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 21249
Key : Analysis.Init.CPU.mSec
Value: 796
Key : Analysis.Init.Elapsed.mSec
Value: 2015
Key : Analysis.Memory.CommitPeak.Mb
Value: 87
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: d1
BUGCHECK_P1: 5ce8f
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80509df3633
WRITE_ADDRESS: fffff80504efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
000000000005ce8f
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8050a7fd3a0 -- (.trap 0xfffff8050a7fd3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=ffffe10a78cd4180
rdx=0000000000000033 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80509df3633 rsp=fffff8050a7fd538 rbp=fffff8050a7fd640
r8=0000000000058f4c r9=0000000000058f4c r10=ffffe10a78cd4000
r11=ffffe10a78cd4a18 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
NETIO!RtlGetNextExpirationTimerWheelTick+0x43:
fffff805`09df3633 458b4208 mov r8d,dword ptr [r10+8] ds:ffffe10a`78cd4008=00058f4c
Resetting default scope
STACK_TEXT:
fffff805`0a7fd258 fffff805`04607b69 : 00000000`0000000a 00000000`0005ce8f 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff805`0a7fd260 fffff805`04603e69 : 00000000`00000000 ffffe10a`7bde47e0 00000000`00000001 ffffe10a`7f7fd061 : nt!KiBugCheckDispatch+0x69
fffff805`0a7fd3a0 fffff805`09df3633 : fffff805`09ecf512 00000000`00058f26 00000000`00000000 fffff805`00000006 : nt!KiPageFault+0x469
fffff805`0a7fd538 fffff805`09ecf512 : 00000000`00058f26 00000000`00000000 fffff805`00000006 00000000`00058f26 : NETIO!RtlGetNextExpirationTimerWheelTick+0x43
fffff805`0a7fd540 fffff805`0440781e : fffff805`018ea240 00000000`00000000 fffff805`0a7fda20 fffff805`018e7180 : tcpip!TcpPeriodicTimeoutHandler+0xa72
fffff805`0a7fd760 fffff805`04406b04 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff805`0a7fd8d0 fffff805`045f97be : 00000000`00000000 fffff805`018e7180 fffff805`04f27600 ffffe10a`8044b280 : nt!KiRetireDpcList+0x1f4
fffff805`0a7fdb60 00000000`00000000 : fffff805`0a7fe000 fffff805`0a7f7000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: NETIO!RtlGetNextExpirationTimerWheelTick+43
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 43
FAILURE_BUCKET_ID: AV_NETIO!RtlGetNextExpirationTimerWheelTick
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {832c4dc1-73b9-2c91-516c-cde32f637c45}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80482bf3630, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff80486ff3630, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 10421
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 18579
Key : Analysis.Init.CPU.mSec
Value: 859
Key : Analysis.Init.Elapsed.mSec
Value: 2055
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: d1
BUGCHECK_P1: fffff80482bf3630
BUGCHECK_P2: 2
BUGCHECK_P3: 8
BUGCHECK_P4: fffff80486ff3630
READ_ADDRESS: fffff804844fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff80482bf3630
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff804879fd3a0 -- (.trap 0xfffff804879fd3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=ffffb58f4f10c1e0
rdx=000000000000002f rsi=0000000000000000 rdi=0000000000000000
rip=fffff80486ff3630 rsp=fffff804879fd538 rbp=fffff804879fd640
r8=0000000000021e42 r9=0000000000027950 r10=ffffb58f4f10c000
r11=ffffb58f4f10ce20 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
NETIO!RtlGetNextExpirationTimerWheelTick+0x40:
fffff804`86ff3630 448b09 mov r9d,dword ptr [rcx] ds:ffffb58f`4f10c1e0=00000000
Resetting default scope
STACK_TEXT:
fffff804`879fd258 fffff804`83c07b69 : 00000000`0000000a fffff804`82bf3630 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff804`879fd260 fffff804`83c03e69 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff804`879fd3a0 fffff804`86ff3630 : fffff804`870cf512 00000000`0001cad1 00000000`00000000 fffff804`00000006 : nt!KiPageFault+0x469
fffff804`879fd538 fffff804`870cf512 : 00000000`0001cad1 00000000`00000000 fffff804`00000006 00000000`0001cad1 : NETIO!RtlGetNextExpirationTimerWheelTick+0x40
fffff804`879fd540 fffff804`83a0781e : fffff804`7eb93240 ffffb58f`4a8fb000 fffff804`879fda30 fffff804`7eb90180 : tcpip!TcpPeriodicTimeoutHandler+0xa72
fffff804`879fd760 fffff804`83a06b04 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00001192 : nt!KiExecuteAllDpcs+0x30e
fffff804`879fd8d0 fffff804`83bf97be : 00000000`00000000 fffff804`7eb90180 00000000`00000000 fffff804`84527600 : nt!KiRetireDpcList+0x1f4
fffff804`879fdb60 00000000`00000000 : fffff804`879fe000 fffff804`879f7000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: NETIO!RtlGetNextExpirationTimerWheelTick+40
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 40
FAILURE_BUCKET_ID: AV_NETIO!RtlGetNextExpirationTimerWheelTick
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {832c4dc1-73b9-2c91-516c-cde32f637c45}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000001bbe7, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff802536080c0, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for Rt630x64.sys
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 10124
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 27866
Key : Analysis.Init.CPU.mSec
Value: 749
Key : Analysis.Init.Elapsed.mSec
Value: 4551
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: d1
BUGCHECK_P1: 1bbe7
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff802536080c0
READ_ADDRESS: fffff80239cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
000000000001bbe7
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8023e5cd3a0 -- (.trap 0xfffff8023e5cd3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000001bb4a
rdx=000000000001bb47 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802536080c0 rsp=fffff8023e5cd530 rbp=fffff8023e5cd640
r8=0000000000022ec2 r9=0000000000024098 r10=ffffa3834db3e000
r11=fffff8023e5cd510 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
Rt630x64+0x880c0:
fffff802`536080c0 488b82a0000000 mov rax,qword ptr [rdx+0A0h] ds:00000000`0001bbe7=????????????????
Resetting default scope
STACK_TEXT:
fffff802`3e5cd258 fffff802`39407b69 : 00000000`0000000a 00000000`0001bbe7 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff802`3e5cd260 fffff802`39403e69 : ffffa383`541388a0 fffff802`3dcc8d0e ffffa383`55a5c040 ffffa383`543b9171 : nt!KiBugCheckDispatch+0x69
fffff802`3e5cd3a0 fffff802`536080c0 : fffff802`535a3643 fffff802`3dc5f512 00000000`0001bb4a 00000000`0001bb4a : nt!KiPageFault+0x469
fffff802`3e5cd530 fffff802`535a3643 : fffff802`3dc5f512 00000000`0001bb4a 00000000`0001bb4a fffff802`3e5cd640 : Rt630x64+0x880c0
fffff802`3e5cd538 fffff802`3dc5f512 : 00000000`0001bb4a 00000000`0001bb4a fffff802`3e5cd640 00000000`00000000 : Rt630x64+0x23643
fffff802`3e5cd540 fffff802`3920781e : fffff802`3582d240 00000000`00000000 fffff802`3e5cda20 fffff802`3582a180 : tcpip!TcpPeriodicTimeoutHandler+0xa72
fffff802`3e5cd760 fffff802`39206b04 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff802`3e5cd8d0 fffff802`393f97be : 00000000`00000000 fffff802`3582a180 fffff802`39d27600 ffffa383`51f60140 : nt!KiRetireDpcList+0x1f4
fffff802`3e5cdb60 00000000`00000000 : fffff802`3e5ce000 fffff802`3e5c7000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: Rt630x64+880c0
MODULE_NAME: Rt630x64
IMAGE_NAME: Rt630x64.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 880c0
FAILURE_BUCKET_ID: AV_Rt630x64!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5e5e7311-2d42-08f4-f9f1-9709493bc906}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80400003630, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff80483043630, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 11890
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 22065
Key : Analysis.Init.CPU.mSec
Value: 874
Key : Analysis.Init.Elapsed.mSec
Value: 2153
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: d1
BUGCHECK_P1: fffff80400003630
BUGCHECK_P2: 2
BUGCHECK_P3: 8
BUGCHECK_P4: fffff80483043630
READ_ADDRESS: fffff8047f8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff80400003630
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff80483c6d3a0 -- (.trap 0xfffff80483c6d3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=ffffae867c505168
rdx=0000000000000034 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80483043630 rsp=fffff80483c6d538 rbp=fffff80483c6d640
r8=000000000002540b r9=000000000002540b r10=ffffae867c505000
r11=ffffae867c505be0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
NETIO!RtlGetNextExpirationTimerWheelTick+0x40:
fffff804`83043630 448b09 mov r9d,dword ptr [rcx] ds:ffffae86`7c505168=00000000
Resetting default scope
STACK_TEXT:
fffff804`83c6d258 fffff804`7f007b69 : 00000000`0000000a fffff804`00003630 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff804`83c6d260 fffff804`7f003e69 : ffffae86`8ac52d10 ffffae86`8ac5d000 00000000`00000246 fffff804`7eef3fe4 : nt!KiBugCheckDispatch+0x69
fffff804`83c6d3a0 fffff804`83043630 : fffff804`8311f512 00000000`0001d039 00000000`00000000 fffff804`00000006 : nt!KiPageFault+0x469
fffff804`83c6d538 fffff804`8311f512 : 00000000`0001d039 00000000`00000000 fffff804`00000006 00000000`0001d039 : NETIO!RtlGetNextExpirationTimerWheelTick+0x40
fffff804`83c6d540 fffff804`7ee0781e : fffff804`7b56a240 00000000`00000000 fffff804`83c6da20 fffff804`7b567180 : tcpip!TcpPeriodicTimeoutHandler+0xa72
fffff804`83c6d760 fffff804`7ee06b04 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff804`83c6d8d0 fffff804`7eff97be : 00000000`00000000 fffff804`7b567180 fffff804`7f927600 ffffae86`90edd080 : nt!KiRetireDpcList+0x1f4
fffff804`83c6db60 00000000`00000000 : fffff804`83c6e000 fffff804`83c67000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: NETIO!RtlGetNextExpirationTimerWheelTick+40
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 40
FAILURE_BUCKET_ID: AV_NETIO!RtlGetNextExpirationTimerWheelTick
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {832c4dc1-73b9-2c91-516c-cde32f637c45}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff806484d3632, The address that the exception occurred at
Arg3: fffff80645d27600, Parameter 0 of the exception
Arg4: ffffe20b74531638, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8530
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 18556
Key : Analysis.Init.CPU.mSec
Value: 796
Key : Analysis.Init.Elapsed.mSec
Value: 2288
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc000001d
BUGCHECK_P2: fffff806484d3632
BUGCHECK_P3: fffff80645d27600
BUGCHECK_P4: ffffe20b74531638
EXCEPTION_PARAMETER1: fffff80645d27600
EXCEPTION_PARAMETER2: ffffe20b74531638
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
FAILED_INSTRUCTION_ADDRESS:
NETIO!RtlGetNextExpirationTimerWheelTick+42
fffff806`484d3632 09458b or dword ptr [rbp-75h],eax
STACK_TEXT:
fffff806`4b3e38e8 fffff806`4549158f : 00000000`0000001e ffffffff`c000001d fffff806`484d3632 fffff806`45d27600 : nt!KeBugCheckEx
fffff806`4b3e38f0 fffff806`453f6ae2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x166b2f
fffff806`4b3e3fb0 fffff806`453f6ab0 : fffff806`45407ca5 ffffe20b`00000000 00000000`00000000 ffffe20b`7966b860 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff806`4b3cd2c8 fffff806`45407ca5 : ffffe20b`00000000 00000000`00000000 ffffe20b`7966b860 ffffe20b`796d1040 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff806`4b3cd2d0 fffff806`454021e9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125
fffff806`4b3cd4b0 fffff806`484d3632 : 00000000`00000000 00000000`00000000 ffffe20b`71dc43f0 00000000`00000000 : nt!KiInvalidOpcodeFault+0x329
fffff806`4b3cd648 00000000`00000000 : 00000000`00000000 ffffe20b`71dc43f0 00000000`00000000 ffffe20b`745da7e0 : NETIO!RtlGetNextExpirationTimerWheelTick+0x42
SYMBOL_NAME: NETIO!RtlGetNextExpirationTimerWheelTick+42
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 42
FAILURE_BUCKET_ID: 0x1E_c000001d_BAD_IP_NETIO!RtlGetNextExpirationTimerWheelTick
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b01e7b3f-a893-d618-acd0-696aecb64915}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000696c162093f0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80043ccb917, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for Rt630x64.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2624
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 44728
Key : Analysis.Init.CPU.mSec
Value: 1077
Key : Analysis.Init.Elapsed.mSec
Value: 31595
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : WER.OS.Branch
Value: winblue_r4
Key : WER.OS.Timestamp
Value: 2014-10-28T15:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.17415
BUGCHECK_CODE: d1
BUGCHECK_P1: 696c162093f0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80043ccb917
READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff801265d3298
GetUlongPtrFromAddress: unable to read from fffff801265d3520
0000696c162093f0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff80128849750 -- (.trap 0xfffff80128849750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000080 rbx=0000000000000000 rcx=0000696c162093d0
rdx=346dc5d63886594b rsi=0000000000000000 rdi=0000000000000000
rip=fffff80043ccb917 rsp=fffff801288498e8 rbp=fffff801288499b9
r8=0624dd2f1a9fbe77 r9=fffff78000000008 r10=fffff80043e24370
r11=0000000000000010 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
tcpip!_security_check_cookie+0x7:
fffff800`43ccb917 7510 jne tcpip!_security_check_cookie+0x19 (fffff800`43ccb929) [br=1]
Resetting default scope
STACK_TEXT:
fffff801`28849608 fffff801`263cc4e9 : 00000000`0000000a 0000696c`162093f0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff801`28849610 fffff801`263cad3a : 00000000`00000000 00000000`00000000 00000000`00009400 fffff800`43e1f4f0 : nt!KiBugCheckDispatch+0x69
fffff801`28849750 fffff800`43ccb917 : fffff800`43ccf641 ffffe000`0d9a9302 ffffe000`0d931760 ffffe000`0da5ea20 : nt!KiPageFault+0x23a
fffff801`288498e8 fffff800`43ccf641 : ffffe000`0d9a9302 ffffe000`0d931760 ffffe000`0da5ea20 fffff801`28849958 : tcpip!_security_check_cookie+0x7
fffff801`288498f0 fffff800`43ccd900 : 00000000`00000000 ffffe000`0ce95550 fffff800`43e1f180 ffffe000`0c632000 : tcpip!IppReceiveHeaderBatch+0x351
fffff801`28849a20 fffff800`43ccbd22 : ffffe000`0d896400 00000000`00000000 fffff801`28849e01 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x680
fffff801`28849da0 fffff800`43ccc745 : ffffe000`0d890002 00000000`00000000 fffff800`43ccc790 fffff801`00000101 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x318
fffff801`28849e80 fffff801`262ae873 : 00000000`00000001 00000000`00000000 ffffe000`0c60a310 fffff801`28844000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x155
fffff801`28849fb0 fffff800`43ccc936 : fffff800`43ccc5f0 fffff801`2884a0d0 00000000`00000010 00000000`00000001 : nt!KeExpandKernelStackAndCalloutInternal+0xf3
fffff801`2884a0a0 fffff800`43a7ea53 : 00000000`00000000 fffff801`2884a181 ffffd001`00000001 fffff800`42b39f8b : tcpip!FlReceiveNetBufferListChain+0xb6
fffff801`2884a120 fffff800`43a7ee7f : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x123
fffff801`2884a1e0 fffff800`43a7f6b2 : ffffe000`0c65e1a0 00000000`00000001 fffff800`43a8b4e0 00000000`00000001 : ndis!ndisMTopReceiveNetBufferLists+0x22f
fffff801`2884a270 fffff800`452ccd4d : ffffe000`00000000 ffffe000`0ccad000 ffffe000`0cdbe580 ffffe000`0ce956b0 : ndis!NdisMIndicateReceiveNetBufferLists+0x732
fffff801`2884a460 ffffe000`00000000 : ffffe000`0ccad000 ffffe000`0cdbe580 ffffe000`0ce956b0 00000000`00000001 : Rt630x64+0x24d4d
fffff801`2884a468 ffffe000`0ccad000 : ffffe000`0cdbe580 ffffe000`0ce956b0 00000000`00000001 fffff801`262964ba : 0xffffe000`00000000
fffff801`2884a470 ffffe000`0cdbe580 : ffffe000`0ce956b0 00000000`00000001 fffff801`262964ba 00000000`53020001 : 0xffffe000`0ccad000
fffff801`2884a478 ffffe000`0ce956b0 : 00000000`00000001 fffff801`262964ba 00000000`53020001 8000d000`00000001 : 0xffffe000`0cdbe580
fffff801`2884a480 00000000`00000001 : fffff801`262964ba 00000000`53020001 8000d000`00000001 ffff0000`00000001 : 0xffffe000`0ce956b0
fffff801`2884a488 fffff801`262964ba : 00000000`53020001 8000d000`00000001 ffff0000`00000001 00205600`00000000 : 0x1
fffff801`2884a490 ffffe000`0ce95550 : 00000000`00000000 ffffe000`0ccb3500 ffffe000`0cd15bc0 ffffe000`0c65e1a0 : nt!PoFxIdleComponent+0xe
fffff801`2884a500 00000000`00000000 : ffffe000`0ccb3500 ffffe000`0cd15bc0 ffffe000`0c65e1a0 ffffe000`0cd0acc0 : 0xffffe000`0ce95550
SYMBOL_NAME: Rt630x64+24d4d
MODULE_NAME: Rt630x64
IMAGE_NAME: Rt630x64.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 24d4d
FAILURE_BUCKET_ID: AV_Rt630x64!unknown_function
OS_VERSION: 8.1.9600.17415
BUILDLAB_STR: winblue_r4
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {5e5e7311-2d42-08f4-f9f1-9709493bc906}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80000003630, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff80060fc3630, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 11108
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 15936
Key : Analysis.Init.CPU.mSec
Value: 843
Key : Analysis.Init.Elapsed.mSec
Value: 1885
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: d1
BUGCHECK_P1: fffff80000003630
BUGCHECK_P2: 2
BUGCHECK_P3: 8
BUGCHECK_P4: fffff80060fc3630
READ_ADDRESS: fffff8005ccfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff80000003630
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff800619cd3a0 -- (.trap 0xfffff800619cd3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=ffffaa0b72b03300
rdx=0000000000000023 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80060fc3630 rsp=fffff800619cd538 rbp=fffff800619cd640
r8=000000000002e215 r9=0000000000000000 r10=ffffaa0b72b03000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
NETIO!RtlGetNextExpirationTimerWheelTick+0x40:
fffff800`60fc3630 448b09 mov r9d,dword ptr [rcx] ds:ffffaa0b`72b03300=00000000
Resetting default scope
STACK_TEXT:
fffff800`619cd258 fffff800`5c407b69 : 00000000`0000000a fffff800`00003630 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff800`619cd260 fffff800`5c403e69 : ffffaa0b`76eebf40 fffff800`7436c1d5 00000000`00000000 ffffaa0b`76feebd0 : nt!KiBugCheckDispatch+0x69
fffff800`619cd3a0 fffff800`60fc3630 : fffff800`6105f512 00000000`0002e0ec 00000000`00000000 fffff800`00000006 : nt!KiPageFault+0x469
fffff800`619cd538 fffff800`6105f512 : 00000000`0002e0ec 00000000`00000000 fffff800`00000006 00000000`0002e0ec : NETIO!RtlGetNextExpirationTimerWheelTick+0x40
fffff800`619cd540 fffff800`5c20781e : fffff800`58b27240 fffff800`619cd860 fffff800`619cda20 fffff800`58b24180 : tcpip!TcpPeriodicTimeoutHandler+0xa72
fffff800`619cd760 fffff800`5c206b04 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff800`619cd8d0 fffff800`5c3f97be : 00000000`00000000 fffff800`58b24180 fffff800`5cd27600 ffffaa0b`79ee0040 : nt!KiRetireDpcList+0x1f4
fffff800`619cdb60 00000000`00000000 : fffff800`619ce000 fffff800`619c7000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: NETIO!RtlGetNextExpirationTimerWheelTick+40
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 40
FAILURE_BUCKET_ID: AV_NETIO!RtlGetNextExpirationTimerWheelTick
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {832c4dc1-73b9-2c91-516c-cde32f637c45}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8000f8ab65c, memory referenced
Arg2: 0000000000000006, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff80014a7b65c, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for Rt630x64.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3171
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 30976
Key : Analysis.Init.CPU.mSec
Value: 1265
Key : Analysis.Init.Elapsed.mSec
Value: 30438
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
Key : WER.OS.Branch
Value: winblue_r4
Key : WER.OS.Timestamp
Value: 2014-10-28T15:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.17415
BUGCHECK_CODE: d1
BUGCHECK_P1: fffff8000f8ab65c
BUGCHECK_P2: 6
BUGCHECK_P3: 8
BUGCHECK_P4: fffff80014a7b65c
READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff8010fbdf298
GetUlongPtrFromAddress: unable to read from fffff8010fbdf520
fffff8000f8ab65c
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
TRAP_FRAME: fffff8011165ccc0 -- (.trap 0xfffff8011165ccc0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd001215aa0fe rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000084 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80014a7b65c rsp=fffff8011165ce50 rbp=0000000000000001
r8=0000000000000000 r9=0000000000000000 r10=0000000000000001
r11=0000000000008000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
Rt630x64+0x565c:
fffff800`14a7b65c 44388b67750000 cmp byte ptr [rbx+7567h],r9b ds:00000000`00007567=??
Resetting default scope
STACK_TEXT:
fffff801`1165cb78 fffff801`0f9d84e9 : 00000000`0000000a fffff800`0f8ab65c 00000000`00000006 00000000`00000008 : nt!KeBugCheckEx
fffff801`1165cb80 fffff801`0f9d6d3a : 00000000`00000008 ffffe000`67c6d000 ffffe275`79b29000 00000000`0000000d : nt!KiBugCheckDispatch+0x69
fffff801`1165ccc0 fffff800`14a7b65c : 00000000`00000000 fffff801`0f9471d7 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23a
fffff801`1165ce50 00000000`00000000 : fffff801`0f9471d7 00000000`00000000 00000000`00000000 00000000`00000000 : Rt630x64+0x565c
SYMBOL_NAME: Rt630x64+565c
MODULE_NAME: Rt630x64
IMAGE_NAME: Rt630x64.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 565c
FAILURE_BUCKET_ID: AV_Rt630x64!unknown_function
OS_VERSION: 8.1.9600.17415
BUILDLAB_STR: winblue_r4
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {5e5e7311-2d42-08f4-f9f1-9709493bc906}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Recep\Downloads\Compressed\032021-11265-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`60600000 PsLoadedModuleList = 0xfffff801`6122a490
Debug session time: Sat Mar 20 19:25:33.893 2021 (UTC + 3:00)
System Uptime: 0 days 0:01:38.605
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`609f5c50 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff801`64c6d260=000000000000000a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80160503630, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff80163fc3630, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 11390
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 18336
Key : Analysis.Init.CPU.mSec
Value: 734
Key : Analysis.Init.Elapsed.mSec
Value: 2036
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: d1
BUGCHECK_P1: fffff80160503630
BUGCHECK_P2: 2
BUGCHECK_P3: 8
BUGCHECK_P4: fffff80163fc3630
READ_ADDRESS: fffff801612fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff80160503630
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff80164c6d3a0 -- (.trap 0xfffff80164c6d3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=ffffdd8fe1e991e0
rdx=000000000000002f rsi=0000000000000000 rdi=0000000000000000
rip=fffff80163fc3630 rsp=fffff80164c6d538 rbp=fffff80164c6d640
r8=000000000001830f r9=0000000000023350 r10=ffffdd8fe1e99000
r11=ffffdd8fe1e99cd0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
NETIO!RtlGetNextExpirationTimerWheelTick+0x40:
fffff801`63fc3630 448b09 mov r9d,dword ptr [rcx] ds:ffffdd8f`e1e991e0=00000000
Resetting default scope
STACK_TEXT:
fffff801`64c6d258 fffff801`60a07b69 : 00000000`0000000a fffff801`60503630 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff801`64c6d260 fffff801`60a03e69 : 00000000`00000000 ffffdd8f`e8abe5f0 ffffdd8f`f1987520 ffffdd8f`ee8a9ac0 : nt!KiBugCheckDispatch+0x69
fffff801`64c6d3a0 fffff801`63fc3630 : fffff801`6409f512 00000000`000181c3 00000000`00000000 fffff801`00000006 : nt!KiPageFault+0x469
fffff801`64c6d538 fffff801`6409f512 : 00000000`000181c3 00000000`00000000 fffff801`00000006 00000000`000181c3 : NETIO!RtlGetNextExpirationTimerWheelTick+0x40
fffff801`64c6d540 fffff801`6080781e : fffff801`5c612240 00000000`00000000 fffff801`64c6da20 fffff801`5c60f180 : tcpip!TcpPeriodicTimeoutHandler+0xa72
fffff801`64c6d760 fffff801`60806b04 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff801`64c6d8d0 fffff801`609f97be : 00000000`00000000 fffff801`5c60f180 fffff801`61327600 ffffdd8f`f9836080 : nt!KiRetireDpcList+0x1f4
fffff801`64c6db60 00000000`00000000 : fffff801`64c6e000 fffff801`64c67000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: NETIO!RtlGetNextExpirationTimerWheelTick+40
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 40
FAILURE_BUCKET_ID: AV_NETIO!RtlGetNextExpirationTimerWheelTick
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {832c4dc1-73b9-2c91-516c-cde32f637c45}
Followup: MachineOwner
---------
0: kd> lmvm NETIO
Browse full module list
start end module name
fffff801`63fb0000 fffff801`64048000 NETIO # (pdb symbols) C:\ProgramData\Dbg\sym\netio.pdb\F2507BD039FA9728FF27C4D5831A36B81\netio.pdb
Loaded symbol image file: NETIO.SYS
Mapped memory image file: C:\ProgramData\Dbg\sym\NETIO.SYS\B358C89B98000\NETIO.SYS
Image path: \SystemRoot\system32\drivers\NETIO.SYS
Image name: NETIO.SYS
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: B358C89B (This is a reproducible build file hash, not a timestamp)
CheckSum: 00093D64
ImageSize: 00098000
File version: 10.0.19041.610
Product version: 10.0.19041.610
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.6 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: netio.sys
OriginalFilename: netio.sys
ProductVersion: 10.0.19041.610
FileVersion: 10.0.19041.610 (WinBuild.160101.0800)
FileDescription: Network I/O Subsystem
LegalCopyright: © Microsoft Corporation. All rights reserved.
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000040, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8002b043630, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8406
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 38204
Key : Analysis.Init.CPU.mSec
Value: 765
Key : Analysis.Init.Elapsed.mSec
Value: 1949
Key : Analysis.Memory.CommitPeak.Mb
Value: 89
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: d1
BUGCHECK_P1: 40
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8002b043630
WRITE_ADDRESS: fffff800278fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000040
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8002bc6d3a0 -- (.trap 0xfffff8002bc6d3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=ffffb288b3aef438
rdx=0000000000000016 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8002b043630 rsp=fffff8002bc6d538 rbp=fffff8002bc6d640
r8=000000000002448e r9=0000000000000000 r10=ffffb288b3aef000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
NETIO!RtlGetNextExpirationTimerWheelTick+0x40:
fffff800`2b043630 448b09 mov r9d,dword ptr [rcx] ds:ffffb288`b3aef438=00000000
Resetting default scope
STACK_TEXT:
fffff800`2bc6d258 fffff800`27007b69 : 00000000`0000000a 00000000`00000040 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`2bc6d260 fffff800`27003e69 : 00000000`00000000 ffffb288`be992000 00000000`00000200 fffff800`26ef3fe4 : nt!KiBugCheckDispatch+0x69
fffff800`2bc6d3a0 fffff800`2b043630 : fffff800`2b11f512 00000000`000232d0 00000000`00000000 fffff800`00000006 : nt!KiPageFault+0x469
fffff800`2bc6d538 fffff800`2b11f512 : 00000000`000232d0 00000000`00000000 fffff800`00000006 00000000`000232d0 : NETIO!RtlGetNextExpirationTimerWheelTick+0x40
fffff800`2bc6d540 fffff800`26e0781e : fffff800`2363b240 fffff800`2bc6da10 fffff800`2bc6da30 fffff800`23638180 : tcpip!TcpPeriodicTimeoutHandler+0xa72
fffff800`2bc6d760 fffff800`26e06b04 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`0000158a : nt!KiExecuteAllDpcs+0x30e
fffff800`2bc6d8d0 fffff800`26ff97be : 00000000`00000000 fffff800`23638180 fffff800`27927600 ffffb288`c4dae080 : nt!KiRetireDpcList+0x1f4
fffff800`2bc6db60 00000000`00000000 : fffff800`2bc6e000 fffff800`2bc67000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: NETIO!RtlGetNextExpirationTimerWheelTick+40
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 40
FAILURE_BUCKET_ID: AV_NETIO!RtlGetNextExpirationTimerWheelTick
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {832c4dc1-73b9-2c91-516c-cde32f637c45}
Followup: MachineOwner
---------