*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80542ebfb94, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 10202
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 16586
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80542ebfb94
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff805438fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8054380f340: Unable to get Flags value from nt!KdVersionBlock
fffff8054380f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
EXCEPTION_PARAMETER2: ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
BAD_STACK_POINTER: fffff80546a80158
STACK_TEXT:
fffff805`46a80158 fffff805`430f465e : 00000000`0000001e ffffffff`c0000005 fffff805`42ebfb94 00000000`00000000 : nt!KeBugCheckEx
fffff805`46a80160 fffff805`42ffd462 : fffff805`430f463c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
fffff805`46a801a0 fffff805`42e52d97 : fffff805`46a80710 00000000`00000000 fffff805`46a6bc60 fffff805`42ff810e : nt!RtlpExecuteHandlerForException+0x12
fffff805`46a801d0 fffff805`42e519a6 : fffff805`46a6b5f8 fffff805`46a80e20 fffff805`46a6b5f8 ffffd50a`54e3ae50 : nt!RtlDispatchException+0x297
fffff805`46a808f0 fffff805`42ff5432 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
fffff805`46a80fb0 fffff805`42ff5400 : fffff805`430066a5 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff805`46a6b4b8 fffff805`430066a5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff805`46a6b4c0 fffff805`430023e0 : 00000000`00000003 00000000`0003b3a2 fffff805`3e14c180 fffff805`42f29d20 : nt!KiExceptionDispatch+0x125
fffff805`46a6b6a0 fffff805`42ebfb94 : ffffd50a`55732188 00000000`00000000 ffffd50a`55732250 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
fffff805`46a6b830 fffff805`42ebf72c : ffffd50a`54e3ae50 00000000`00000000 fffff805`46a6bb18 00000000`00000000 : nt!KiTimerWaitTest+0x1f4
fffff805`46a6b8e0 fffff805`42ee4b6d : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`000234ed : nt!KiProcessExpiredTimerList+0xdc
fffff805`46a6b9d0 fffff805`42ff810e : 00000000`00000000 fffff805`3e14c180 fffff805`43927600 ffffd50a`577c3080 : nt!KiRetireDpcList+0x5dd
fffff805`46a6bc60 00000000`00000000 : fffff805`46a6c000 fffff805`46a66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiTimerWaitTest+1f4
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1f4
FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_nt!KiTimerWaitTest
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f041f7bb-0f90-5a0a-bcb8-16931f251832}
Followup: MachineOwner
---------*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80321ee547e, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6827
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10941
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: 20
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80321ee547e
WRITE_ADDRESS: fffff803228fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8032280f340: Unable to get Flags value from nt!KdVersionBlock
fffff8032280f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000020
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8032786b6d0 -- (.trap 0xfffff8032786b6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00005f6ea0e87236 rbx=0000000000000000 rcx=ffffa00f29346000
rdx=00005f6e00000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80321ee547e rsp=fffff8032786b860 rbp=fffff8032786b960
r8=0000000000000000 r9=0000000000000000 r10=ffffa00f3086ff88
r11=fffff8032786bb10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff803`21ee547e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope
STACK_TEXT:
fffff803`2786b588 fffff803`22006569 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff803`2786b590 fffff803`22002869 : 00005f6e`a0e58922 00000000`00000000 ffffa00f`30623000 fffff803`360ca7c7 : nt!KiBugCheckDispatch+0x69
fffff803`2786b6d0 fffff803`21ee547e : fffff803`1efcf240 ffffa00f`294fa000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469
fffff803`2786b860 fffff803`21ee4784 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee
fffff803`2786b9d0 fffff803`21ff810e : 00000000`00000000 fffff803`1efcc180 fffff803`22927600 ffffa00f`35418080 : nt!KiRetireDpcList+0x1f4
fffff803`2786bc60 00000000`00000000 : fffff803`2786c000 fffff803`27866000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiExecuteAllDpcs+2ee
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2ee
FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}
Followup: MachineOwner
---------