IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800166e9a1e, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4936
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 74586
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 20
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff800166e9a1e
WRITE_ADDRESS: fffff800170fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8001700f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8001700f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000020
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8001ba6b6d0 -- (.trap 0xfffff8001ba6b6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000004559e231800 rbx=0000000000000000 rcx=ffffe68f02b46000
rdx=0000045500000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800166e9a1e rsp=fffff8001ba6b860 rbp=fffff8001ba6b960
r8=0000000000000000 r9=0000000000000000 r10=ffffe68f0b3afc88
r11=fffff8001ba6bb10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff800`166e9a1e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope
STACK_TEXT:
fffff800`1ba6b588 fffff800`16805e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`1ba6b590 fffff800`16802169 : ffffab00`ae17b6f0 ffffe68f`08fcc6e8 ffffe68f`0b523000 fffff800`290bb717 : nt!KiBugCheckDispatch+0x69
fffff800`1ba6b6d0 fffff800`166e9a1e : fffff800`13857240 ffffe68f`02ce5000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469
fffff800`1ba6b860 fffff800`166e8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee
fffff800`1ba6b9d0 fffff800`167f7a0e : 00000000`00000000 fffff800`13854180 fffff800`17126600 ffffe68f`0dc16080 : nt!KiRetireDpcList+0x1f4
fffff800`1ba6bc60 00000000`00000000 : fffff800`1ba6c000 fffff800`1ba66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiExecuteAllDpcs+2ee
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2ee
FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}
Followup: MachineOwner
---------
0: kd> kb
# RetAddr : Args to Child : Call Site
00 fffff800`16805e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
01 fffff800`16802169 : ffffab00`ae17b6f0 ffffe68f`08fcc6e8 ffffe68f`0b523000 fffff800`290bb717 : nt!KiBugCheckDispatch+0x69
02 fffff800`166e9a1e : fffff800`13857240 ffffe68f`02ce5000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469
03 fffff800`166e8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee
04 fffff800`167f7a0e : 00000000`00000000 fffff800`13854180 fffff800`17126600 ffffe68f`0dc16080 : nt!KiRetireDpcList+0x1f4
05 00000000`00000000 : fffff800`1ba6c000 fffff800`1ba66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
0: kd> kv
# Child-SP RetAddr : Args to Child : Call Site
00 fffff800`1ba6b588 fffff800`16805e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
01 fffff800`1ba6b590 fffff800`16802169 : ffffab00`ae17b6f0 ffffe68f`08fcc6e8 ffffe68f`0b523000 fffff800`290bb717 : nt!KiBugCheckDispatch+0x69
02 fffff800`1ba6b6d0 fffff800`166e9a1e : fffff800`13857240 ffffe68f`02ce5000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469 (TrapFrame @ fffff800`1ba6b6d0)
03 fffff800`1ba6b860 fffff800`166e8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee
04 fffff800`1ba6b9d0 fffff800`167f7a0e : 00000000`00000000 fffff800`13854180 fffff800`17126600 ffffe68f`0dc16080 : nt!KiRetireDpcList+0x1f4
05 fffff800`1ba6bc60 00000000`00000000 : fffff800`1ba6c000 fffff800`1ba66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
0: kd> .trap fffff800`1ba6b6d0
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000004559e231800 rbx=0000000000000000 rcx=ffffe68f02b46000
rdx=0000045500000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800166e9a1e rsp=fffff8001ba6b860 rbp=fffff8001ba6b960
r8=0000000000000000 r9=0000000000000000 r10=ffffe68f0b3afc88
r11=fffff8001ba6bb10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff800`166e9a1e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
0: kd> kb
*** Stack trace for last set context - .thread/.cxr resets it
# RetAddr : Args to Child : Call Site
00 fffff800`166e8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee
01 fffff800`167f7a0e : 00000000`00000000 fffff800`13854180 fffff800`17126600 ffffe68f`0dc16080 : nt!KiRetireDpcList+0x1f4
02 00000000`00000000 : fffff800`1ba6c000 fffff800`1ba66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80459ce9a1e, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4593
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 66280
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 20
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80459ce9a1e
WRITE_ADDRESS: fffff8045a6fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8045a60f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8045a60f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000020
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8045dc6b6d0 -- (.trap 0xfffff8045dc6b6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00001e35bc85306d rbx=0000000000000000 rcx=ffffa58d69735000
rdx=00001e3500000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80459ce9a1e rsp=fffff8045dc6b860 rbp=fffff8045dc6b960
r8=0000000000000000 r9=0000000000000000 r10=ffffa58d7219fc88
r11=fffff8045dc6bb10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff804`59ce9a1e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope
STACK_TEXT:
fffff804`5dc6b588 fffff804`59e05e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff804`5dc6b590 fffff804`59e02169 : ffff8080`845c06f0 ffffa58d`707756e8 ffffa58d`77fc5000 fffff804`6a8ab717 : nt!KiBugCheckDispatch+0x69
fffff804`5dc6b6d0 fffff804`59ce9a1e : fffff804`559a2240 ffffa58d`698f5000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469
fffff804`5dc6b860 fffff804`59ce8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee
fffff804`5dc6b9d0 fffff804`59df7a0e : 00000000`00000000 fffff804`5599f180 fffff804`5a726600 ffffa58d`700ad080 : nt!KiRetireDpcList+0x1f4
fffff804`5dc6bc60 00000000`00000000 : fffff804`5dc6c000 fffff804`5dc66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiExecuteAllDpcs+2ee
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2ee
FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802834e9a1e, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4359
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 49402
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 20
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff802834e9a1e
WRITE_ADDRESS: fffff80283efa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80283e0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff80283e0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000020
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8028706b6d0 -- (.trap 0xfffff8028706b6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00017b9d122a9cb4 rbx=0000000000000000 rcx=ffff968dfa135000
rdx=00017b9d00000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802834e9a1e rsp=fffff8028706b860 rbp=fffff8028706b960
r8=0000000000000000 r9=0000000000000000 r10=ffff968e01a59f88
r11=fffff8028706bb10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff802`834e9a1e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope
STACK_TEXT:
fffff802`8706b588 fffff802`83605e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff802`8706b590 fffff802`83602169 : 00000000`00000000 ffff968e`042176e8 00000000`00000000 fffff802`9390b978 : nt!KiBugCheckDispatch+0x69
fffff802`8706b6d0 fffff802`834e9a1e : fffff802`7ed7b240 ffff968d`fa2f5000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469
fffff802`8706b860 fffff802`834e8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee
fffff802`8706b9d0 fffff802`835f7a0e : 00000000`00000000 fffff802`7ed78180 fffff802`83f26600 ffff968e`068a1080 : nt!KiRetireDpcList+0x1f4
fffff802`8706bc60 00000000`00000000 : fffff802`8706c000 fffff802`87066000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiExecuteAllDpcs+2ee
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2ee
FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8016a4e9a1e, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4812
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 80069
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 20
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8016a4e9a1e
WRITE_ADDRESS: fffff8016aefa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8016ae0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8016ae0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000020
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8016fe6b6d0 -- (.trap 0xfffff8016fe6b6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000d01fe6c4b44 rbx=0000000000000000 rcx=ffffb186a8735000
rdx=00000d0100000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8016a4e9a1e rsp=fffff8016fe6b860 rbp=fffff8016fe6b960
r8=0000000000000000 r9=0000000000000000 r10=ffffb186b0fd9f48
r11=fffff8016fe6bb10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff801`6a4e9a1e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope
STACK_TEXT:
fffff801`6fe6b588 fffff801`6a605e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff801`6fe6b590 fffff801`6a602169 : ffff9681`dd4a46f0 ffffb186`af7986e8 ffffb186`b0f54000 fffff801`7c76b717 : nt!KiBugCheckDispatch+0x69
fffff801`6fe6b6d0 fffff801`6a4e9a1e : fffff801`67ca9240 ffffb186`a88f5000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469
fffff801`6fe6b860 fffff801`6a4e8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee
fffff801`6fe6b9d0 fffff801`6a5f7a0e : 00000000`00000000 fffff801`67ca6180 fffff801`6af26600 ffffb186`b1c48080 : nt!KiRetireDpcList+0x1f4
fffff801`6fe6bc60 00000000`00000000 : fffff801`6fe6c000 fffff801`6fe66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiExecuteAllDpcs+2ee
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2ee
FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}
Followup: MachineOwner
---------
0: kd> lm
start end module name
ffffa68d`dee00000 ffffa68d`df0e2000 win32kbase (deferred)
ffffa68d`df0f0000 ffffa68d`df4a6000 win32kfull (deferred)
ffffa68d`df4c0000 ffffa68d`df55a000 win32k C (pdb symbols) C:\ProgramData\Dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
ffffa68d`df560000 ffffa68d`df5a8000 cdd (deferred)
fffff801`68b50000 fffff801`68b78000 mcupdate_AuthenticAMD (deferred)
fffff801`68b80000 fffff801`68b86000 hal (deferred)
fffff801`68b90000 fffff801`68b9b000 kd (deferred)
fffff801`68ba0000 fffff801`68bc7000 tm (deferred)
fffff801`68bd0000 fffff801`68c39000 CLFS (deferred)
fffff801`68c40000 fffff801`68c5a000 PSHED (deferred)
fffff801`68c60000 fffff801`68c6b000 BOOTVID (deferred)
fffff801`68c70000 fffff801`68d83000 clipsp (deferred)
fffff801`68d90000 fffff801`68dff000 FLTMGR (deferred)
fffff801`68e00000 fffff801`68e29000 ksecdd (deferred)
fffff801`68e30000 fffff801`68e92000 msrpc (deferred)
fffff801`68ea0000 fffff801`68eae000 cmimcext (deferred)
fffff801`68eb0000 fffff801`68ec1000 werkernel (deferred)
fffff801`68ed0000 fffff801`68edc000 ntosext (deferred)
fffff801`68ee0000 fffff801`68ef3000 WDFLDR (deferred)
fffff801`68f00000 fffff801`68f0f000 SleepStudyHelper (deferred)
fffff801`68f10000 fffff801`68f21000 WppRecorder (deferred)
fffff801`68f30000 fffff801`68f4a000 SgrmAgent (deferred)
fffff801`6a200000 fffff801`6b246000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\641F55C592201DCC4F59FACC72EA54DA1\ntkrnlmp.pdb
fffff801`6e400000 fffff801`6e4e3000 CI (deferred)
fffff801`6e4f0000 fffff801`6e5a7000 cng (deferred)
fffff801`6e5b0000 fffff801`6e681000 Wdf01000 (deferred)
fffff801`6e690000 fffff801`6e6b6000 acpiex (deferred)
fffff801`6e6c0000 fffff801`6e70b000 mssecflt (deferred)
fffff801`6e710000 fffff801`6e7dc000 ACPI (deferred)
fffff801`6e7e0000 fffff801`6e7ec000 WMILIB (deferred)
fffff801`6e810000 fffff801`6e87b000 intelpep (deferred)
fffff801`6e880000 fffff801`6e897000 WindowsTrustedRT (deferred)
fffff801`6e8a0000 fffff801`6e8ab000 IntelTA (deferred)
fffff801`6e8b0000 fffff801`6e8bb000 WindowsTrustedRTProxy (deferred)
fffff801`6e8c0000 fffff801`6e8d4000 pcw (deferred)
fffff801`6e8e0000 fffff801`6e8eb000 msisadrv (deferred)
fffff801`6e8f0000 fffff801`6e968000 pci (deferred)
fffff801`6e970000 fffff801`6e985000 vdrvroot (deferred)
fffff801`6e990000 fffff801`6e9a6000 amdkmpfd (deferred)
fffff801`6e9b0000 fffff801`6e9df000 pdc (deferred)
fffff801`6e9e0000 fffff801`6e9f9000 CEA (deferred)
fffff801`6ea00000 fffff801`6ea31000 partmgr (deferred)
fffff801`6ea40000 fffff801`6eaea000 spaceport (deferred)
fffff801`6eaf0000 fffff801`6eb09000 volmgr (deferred)
fffff801`6eb10000 fffff801`6eb73000 volmgrx (deferred)
fffff801`6eb80000 fffff801`6eb9e000 mountmgr (deferred)
fffff801`6eba0000 fffff801`6ebd2000 storahci (deferred)
fffff801`6ebe0000 fffff801`6ebfc000 EhStorClass (deferred)
fffff801`6ec00000 fffff801`6ecb0000 storport (deferred)
fffff801`6ecc0000 fffff801`6ecda000 fileinfo (deferred)
fffff801`6ece0000 fffff801`6ed20000 Wof (deferred)
fffff801`6ed30000 fffff801`6ed9c000 WdFilter (deferred)
fffff801`6eda0000 fffff801`6edad000 Fs_Rec (deferred)
fffff801`6edb0000 fffff801`6ef1f000 ndis (deferred)
fffff801`6ef20000 fffff801`6efb8000 NETIO (deferred)
fffff801`6efc0000 fffff801`6eff2000 ksecpkg (deferred)
fffff801`6f000000 fffff801`6f2d9000 Ntfs (deferred)
fffff801`6f2e0000 fffff801`6f301000 amdpsp (deferred)
fffff801`6f310000 fffff801`6f5fc000 tcpip (deferred)
fffff801`6f600000 fffff801`6f67f000 fwpkclnt (deferred)
fffff801`6f680000 fffff801`6f6b0000 wfplwfs (deferred)
fffff801`6f6c0000 fffff801`6f789000 fvevol (deferred)
fffff801`6f790000 fffff801`6f79b000 volume (deferred)
fffff801`6f7a0000 fffff801`6f80d000 volsnap (deferred)
fffff801`6f810000 fffff801`6f860000 rdyboost (deferred)
fffff801`6f870000 fffff801`6f896000 mup (deferred)
fffff801`6f8a0000 fffff801`6f8b2000 iorate (deferred)
fffff801`6f8e0000 fffff801`6f8fc000 disk (deferred)
fffff801`6f900000 fffff801`6f96c000 CLASSPNP (deferred)
fffff801`760a0000 fffff801`760be000 crashdmp (deferred)
fffff801`76800000 fffff801`76830000 cdrom (deferred)
fffff801`76840000 fffff801`76855000 filecrypt (deferred)
fffff801`76860000 fffff801`7686e000 tbs (deferred)
fffff801`76870000 fffff801`7687a000 Null (deferred)
fffff801`76880000 fffff801`7688a000 Beep (deferred)
fffff801`76890000 fffff801`76dc7000 vgk (deferred)
fffff801`76e00000 fffff801`76e10000 TDI (deferred)
fffff801`76e20000 fffff801`76e7c000 netbt (deferred)
fffff801`76e80000 fffff801`76e93000 afunix (deferred)
fffff801`76ea0000 fffff801`76f43000 afd (deferred)
fffff801`76f50000 fffff801`76f6a000 vwififlt (deferred)
fffff801`76f70000 fffff801`76f9b000 pacer (deferred)
fffff801`76fa0000 fffff801`76fb4000 ndiscap (deferred)
fffff801`76fc0000 fffff801`76fd4000 netbios (deferred)
fffff801`76fe0000 fffff801`77081000 Vid (deferred)
fffff801`77090000 fffff801`770b1000 winhvr (deferred)
fffff801`770c0000 fffff801`7713b000 rdbss (deferred)
fffff801`77140000 fffff801`771d4000 csc (deferred)
fffff801`771e0000 fffff801`771f2000 nsiproxy (deferred)
fffff801`77200000 fffff801`7720e000 npsvctrig (deferred)
fffff801`77210000 fffff801`77220000 mssmbios (deferred)
fffff801`77230000 fffff801`7723a000 gpuenergydrv (deferred)
fffff801`77240000 fffff801`77248000 GLCKIO2 (deferred)
fffff801`77250000 fffff801`77257000 ene (deferred)
fffff801`77260000 fffff801`7728c000 dfsc (deferred)
fffff801`772b0000 fffff801`7731c000 fastfat (deferred)
fffff801`77320000 fffff801`77337000 bam (deferred)
fffff801`77340000 fffff801`77349000 AsIO2 (deferred)
fffff801`77350000 fffff801`77359000 AsUpIO (deferred)
fffff801`77360000 fffff801`77366000 AsIO (deferred)
fffff801`77370000 fffff801`773be000 ahcache (deferred)
fffff801`773c0000 fffff801`773d2000 CompositeBus (deferred)
fffff801`773e0000 fffff801`773ed000 kdnic (deferred)
fffff801`773f0000 fffff801`77405000 umbus (deferred)
fffff801`77410000 fffff801`77411f80 AiCharger (deferred)
fffff801`77420000 fffff801`774b8000 USBXHCI (deferred)
fffff801`774c0000 fffff801`77504000 ucx01000 (deferred)
fffff801`77510000 fffff801`77626000 rt640x64 (deferred)
fffff801`77630000 fffff801`776c2000 atikmpag (deferred)
fffff801`776d0000 fffff801`777a6000 peauth (deferred)
fffff801`777b0000 fffff801`77877000 srv2 (deferred)
fffff801`77880000 fffff801`778a1000 raspptp (deferred)
fffff801`778b0000 fffff801`778cc000 raspppoe (deferred)
fffff801`778d0000 fffff801`7790a000 ndiswan (deferred)
fffff801`77910000 fffff801`77926000 WdNisDrv (deferred)
fffff801`77930000 fffff801`77943000 condrv (deferred)
fffff801`77d50000 fffff801`780f4000 dxgkrnl (deferred)
fffff801`78100000 fffff801`78118000 watchdog (deferred)
fffff801`78120000 fffff801`78136000 BasicDisplay (deferred)
fffff801`78140000 fffff801`78151000 BasicRender (deferred)
fffff801`78160000 fffff801`7817c000 Npfs (deferred)
fffff801`78180000 fffff801`78191000 Msfs (deferred)
fffff801`781a0000 fffff801`781bb000 CimFS (deferred)
fffff801`781c0000 fffff801`781e2000 tdx (deferred)
fffff801`78a00000 fffff801`78a11000 kbdhid (deferred)
fffff801`78a20000 fffff801`78a34000 kbdclass (deferred)
fffff801`78a40000 fffff801`78a50000 mouhid (deferred)
fffff801`78a60000 fffff801`78a73000 mouclass (deferred)
fffff801`78a90000 fffff801`78a9e000 dump_diskdump (deferred)
fffff801`78ae0000 fffff801`78b12000 dump_storahci (deferred)
fffff801`78b40000 fffff801`78b5d000 dump_dumpfve (deferred)
fffff801`78b60000 fffff801`78c41000 dxgmms2 (deferred)
fffff801`78c50000 fffff801`78c6b000 monitor (deferred)
fffff801`78c70000 fffff801`78c84000 qwavedrv (deferred)
fffff801`78d10000 fffff801`78d39000 luafv (deferred)
fffff801`78d40000 fffff801`78d76000 wcifs (deferred)
fffff801`78d80000 fffff801`78e00000 cldflt (deferred)
fffff801`78e10000 fffff801`78e2a000 storqosflt (deferred)
fffff801`78e30000 fffff801`78e57000 bindflt (deferred)
fffff801`78e60000 fffff801`78e78000 mslldp (deferred)
fffff801`78e80000 fffff801`78e98000 lltdio (deferred)
fffff801`78ea0000 fffff801`78ebb000 rspndr (deferred)
fffff801`78ec0000 fffff801`78edd000 wanarp (deferred)
fffff801`78ee0000 fffff801`78f36000 msquic (deferred)
fffff801`78f40000 fffff801`790c6000 HTTP (deferred)
fffff801`790d0000 fffff801`790f5000 bowser (deferred)
fffff801`79100000 fffff801`7911a000 mpsdrv (deferred)
fffff801`79120000 fffff801`79165000 mrxsmb20 (deferred)
fffff801`79170000 fffff801`791a4000 AMDRyzenMasterDriver (deferred)
fffff801`791b0000 fffff801`7983c000 RTKVHD64 (deferred)
fffff801`79850000 fffff801`79883000 usbccgp (deferred)
fffff801`79890000 fffff801`798e2000 srvnet (deferred)
fffff801`798f0000 fffff801`79904000 mmcss (deferred)
fffff801`79910000 fffff801`7991f000 ndistapi (deferred)
fffff801`79920000 fffff801`79931000 UAExt (deferred)
fffff801`79940000 fffff801`79977000 usbaudio (deferred)
fffff801`79980000 fffff801`79992000 hidusb (deferred)
fffff801`799a0000 fffff801`799df000 HIDCLASS (deferred)
fffff801`799e0000 fffff801`799f3000 HIDPARSE (deferred)
fffff801`7c200000 fffff801`7c221000 drmk (deferred)
fffff801`7c230000 fffff801`7c2a6000 ks (deferred)
fffff801`7c2b0000 fffff801`7c2ba000 AMDPCIDev (deferred)
fffff801`7c2c0000 fffff801`7c2dc000 serial (deferred)
fffff801`7c2e0000 fffff801`7c2ef000 serenum (deferred)
fffff801`7c2f0000 fffff801`7c2fd000 amdgpio2 (deferred)
fffff801`7c300000 fffff801`7c332000 msgpioclx (deferred)
fffff801`7c340000 fffff801`7c34c000 wmiacpi (deferred)
fffff801`7c350000 fffff801`7c38b000 amdppm (deferred)
fffff801`7c390000 fffff801`7c39a000 amdgpio3 (deferred)
fffff801`7c3a0000 fffff801`7c3ae000 UEFI (deferred)
fffff801`7c3b0000 fffff801`7c3bd000 NdisVirtualBus (deferred)
fffff801`7c3c0000 fffff801`7c3cc000 swenum (deferred)
fffff801`7c3d0000 fffff801`7c3de000 rdpbus (deferred)
fffff801`7c3e0000 fffff801`7c483000 UsbHub3 (deferred)
fffff801`7c490000 fffff801`7c49e000 USBD (deferred)
fffff801`7c4a0000 fffff801`7c4bd000 AtihdWT6 (deferred)
fffff801`7c4c0000 fffff801`7c4cf000 ksthunk (deferred)
fffff801`7c4d0000 fffff801`7c563000 mrxsmb (deferred)
fffff801`7c570000 fffff801`7c597000 Ndu (deferred)
fffff801`7c5a0000 fffff801`7c5b5000 tcpipreg (deferred)
fffff801`7c5c0000 fffff801`7c5dc000 rassstp (deferred)
fffff801`7c5e0000 fffff801`7c5fd000 NDProxy (deferred)
fffff801`7c600000 fffff801`7c627000 AgileVpn (deferred)
fffff801`7c630000 fffff801`7c651000 rasl2tp (deferred)
fffff801`7c660000 fffff801`7c669000 IOMap64 (deferred)
fffff801`7c670000 fffff801`80556000 atikmdag (deferred)
fffff801`80560000 fffff801`80585000 HDAudBus (deferred)
fffff801`80590000 fffff801`805f6000 portcls (deferred)
Unloaded modules:
fffff801`768b0000 fffff801`76df5000 vgk.sys
fffff801`79840000 fffff801`7984e000 AppleLowerFi
fffff801`78d00000 fffff801`78d0f000 WpdUpFltr.sy
fffff801`78ca0000 fffff801`78cf5000 WUDFRd.sys
fffff801`78c70000 fffff801`78c91000 WinUSB.SYS
fffff801`760d0000 fffff801`760df000 dump_storpor
fffff801`76120000 fffff801`76153000 dump_storahc
fffff801`76180000 fffff801`7619e000 dump_dumpfve
fffff801`79890000 fffff801`798b1000 WinUSB.SYS
fffff801`798c0000 fffff801`79915000 WUDFRd.sys
fffff801`77290000 fffff801`772ac000 dam.sys
fffff801`6e7f0000 fffff801`6e801000 WdBoot.sys
fffff801`6f8c0000 fffff801`6f8d1000 hwpolicy.sys
0: kd> lmDvmmonitor
Browse full module list
start end module name
fffff801`78c50000 fffff801`78c6b000 monitor (deferred)
Mapped memory image file: C:\ProgramData\Dbg\sym\monitor.sys\1CD682D71b000\monitor.sys
Image path: \SystemRoot\System32\drivers\monitor.sys
Image name: monitor.sys
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 1CD682D7 (This is a reproducible build file hash, not a timestamp)
CheckSum: 0001751B
ImageSize: 0001B000
File version: 10.0.19041.508
Product version: 10.0.19041.508
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: monitor.sys
OriginalFilename: monitor.sys
ProductVersion: 10.0.19041.508
FileVersion: 10.0.19041.508 (WinBuild.160101.0800)
FileDescription: Monitor Driver
LegalCopyright: © Microsoft Corporation. All rights reserved.
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80203ae9a1e, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5218
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 77906
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 20
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80203ae9a1e
WRITE_ADDRESS: fffff802044fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8020440f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8020440f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000020
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8020946b6d0 -- (.trap 0xfffff8020946b6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000096746f53086 rbx=0000000000000000 rcx=ffffd78eccf46000
rdx=0000096700000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80203ae9a1e rsp=fffff8020946b860 rbp=fffff8020946b960
r8=0000000000000000 r9=0000000000000000 r10=ffffd78ecffbbe38
r11=fffff8020946bb10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff802`03ae9a1e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope
STACK_TEXT:
fffff802`0946b588 fffff802`03c05e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff802`0946b590 fffff802`03c02169 : ffff9480`3c2fe1f0 ffffd78e`cffec6e8 ffffd78e`d68a6000 fffff802`1929bd87 : nt!KiBugCheckDispatch+0x69
fffff802`0946b6d0 fffff802`03ae9a1e : fffff802`00fdf240 ffffd78e`ce0f1000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469
fffff802`0946b860 fffff802`03ae8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee
fffff802`0946b9d0 fffff802`03bf7a0e : 00000000`00000000 fffff802`00fdc180 fffff802`04526600 ffffd78e`d83b7080 : nt!KiRetireDpcList+0x1f4
fffff802`0946bc60 00000000`00000000 : fffff802`0946c000 fffff802`09466000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiExecuteAllDpcs+2ee
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2ee
FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8001f4e9a1e, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6296
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 71698
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 20
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8001f4e9a1e
WRITE_ADDRESS: fffff8001fefa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8001fe0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8001fe0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000020
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AMDRSServ.exe
DPC_STACK_BASE: FFFFF80022C72FB0
TRAP_FRAME: ffff9cad82e97010 -- (.trap 0xffff9cad82e97010)
Unable to read trap frame at ffff9cad`82e97010
STACK_TEXT:
fffff800`22c728d8 fffff800`1f605e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`22c728e0 fffff800`1f602169 : 000022f5`cb0d972c 00000000`00000002 ffffb08d`6d902000 fffff800`2fc59f37 : nt!KiBugCheckDispatch+0x69
fffff800`22c72a20 fffff800`1f4e9a1e : fffff800`1a7b9240 ffffb08d`650f8000 fffff800`22c72e70 fffff800`00000002 : nt!KiPageFault+0x469
fffff800`22c72bb0 fffff800`1f4e8d24 : fffff800`1a7b6180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x2ee
fffff800`22c72d20 fffff800`1f5faee5 : 00000000`00000000 fffff800`1a7b6180 ffff9f80`60cfe140 00000000`00000000 : nt!KiRetireDpcList+0x1f4
fffff800`22c72fb0 fffff800`1f5facd0 : fffff800`1f5eff90 fffff800`1f43f03a ffffb08d`6f192000 00000000`ffffffff : nt!KxRetireDpcList+0x5
ffffc109`a2253850 fffff800`1f5fa585 : 00000000`00000000 fffff800`1f5f5a11 00000000`00300d68 00000000`00000000 : nt!KiDispatchInterruptContinue
ffffc109`a2253880 fffff800`1f5f5a11 : 00000000`00300d68 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
ffffc109`a2253890 ffff9c86`ab6656d4 : 00000000`00300d68 ffffef8b`09542b92 ffff9cad`82e97010 ffffc109`a2253a30 : nt!KiInterruptDispatch+0xb1
ffffc109`a2253a20 ffff9c86`acb6473f : 000001c0`7236dc90 00000000`00300d68 ffffc109`a2253b80 ffff9c86`acafb28a : win32kbase!ValidateHwnd+0x4
ffffc109`a2253a50 ffff9c86`abb75bf1 : ffffb08d`6d7e8300 00000000`00000001 00000000`00000000 000001c0`4f023e70 : win32kfull!NtUserGetClassName+0x4f
ffffc109`a2253ad0 fffff800`1f6058b8 : ffffb08d`6d7e8300 00000000`00000000 00000000`00000000 00000000`00000001 : win32k!NtUserGetClassName+0x15
ffffc109`a2253b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
SYMBOL_NAME: nt!KiExecuteAllDpcs+2ee
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2ee
FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80142ce9a1e, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5218
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 74598
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 20
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80142ce9a1e
WRITE_ADDRESS: fffff801436fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8014360f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8014360f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000020
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: League of Legends.exe
DPC_STACK_BASE: FFFFF80145872FB0
TRAP_FRAME: fffff80145872a20 -- (.trap 0xfffff80145872a20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00004a83da5af6e4 rbx=0000000000000000 rcx=ffff978fb7935000
rdx=00004a8300000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80142ce9a1e rsp=fffff80145872bb0 rbp=fffff80145872cb0
r8=0000000000000000 r9=0000000000000000 r10=ffff978fc11ecf88
r11=fffff80145872e60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff801`42ce9a1e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope
STACK_TEXT:
fffff801`458728d8 fffff801`42e05e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff801`458728e0 fffff801`42e02169 : 00004a83`da570c24 00000000`00000000 ffff978f`c1002000 fffff801`526e9c37 : nt!KiBugCheckDispatch+0x69
fffff801`45872a20 fffff801`42ce9a1e : fffff801`3d759240 ffff978f`b7af7000 fffff801`45872e70 fffff801`00000002 : nt!KiPageFault+0x469
fffff801`45872bb0 fffff801`42ce8d24 : fffff801`3d756180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x2ee
fffff801`45872d20 fffff801`42dfaee5 : 00000000`00000000 fffff801`3d756180 ffff8081`42834640 00000000`7ffea000 : nt!KiRetireDpcList+0x1f4
fffff801`45872fb0 fffff801`42dfacd0 : fffff801`42deff90 fffff801`42c3f03a ffff978f`c8ba9080 00000000`76359560 : nt!KxRetireDpcList+0x5
ffffe80b`8b4d8ac0 fffff801`42dfa585 : 00000000`7ffea000 fffff801`42df5a11 00000000`0000e383 ffff978f`c80cd080 : nt!KiDispatchInterruptContinue
ffffe80b`8b4d8af0 fffff801`42df5a11 : 00000000`0000e383 ffff978f`c80cd080 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
ffffe80b`8b4d8b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
SYMBOL_NAME: nt!KiExecuteAllDpcs+2ee
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2ee
FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}
Followup: MachineOwner
---------