*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 00000000000000f0, The system failed to complete(suspend) a power transition in a timely manner.
Arg2: 0000000000000004, The system power state in transition.
Arg3: 000000000000000e, The sleep checkpoint most recently reached.
Arg4: ffff9d85787cc040, A pointer to the thread currently processing the request.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7812
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 16859
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a0
BUGCHECK_P1: f0
BUGCHECK_P2: 4
BUGCHECK_P3: e
BUGCHECK_P4: ffff9d85787cc040
FAULTING_THREAD: ffff9d85787cc040
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff286`4edf06b0 fffff807`69a65850 : 00000000`00000000 00000000`00000000 fffff807`00000000 00000000`ea3eb180 : nt!KiSwapContext+0x76
fffff286`4edf07f0 fffff807`69a64d7f : 00000000`7ce36609 00000000`00000000 fffff286`4edf09b0 00001f80`00000000 : nt!KiSwapThread+0x500
fffff286`4edf08a0 fffff807`69a64623 : 00000000`00000000 00000000`00000000 00000000`00000000 ffff9d85`787cc180 : nt!KiCommitThreadWait+0x14f
fffff286`4edf0940 fffff807`6a191b41 : fffff286`4f3cd7e0 fffff286`00000000 fffff807`6a402a00 ffff9d85`79be0100 : nt!KeWaitForSingleObject+0x233
fffff286`4edf0a30 fffff807`6a18c8c3 : 00000000`00000000 ffffffff`ffffffff 00000000`00000000 00000000`00000000 : nt!PopEndMirroring+0x91
fffff286`4edf0af0 fffff807`6a18c675 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MmDuplicateMemory+0x1f7
fffff286`4edf0b80 fffff807`69b17e25 : ffff9d85`787cc000 ffff9d85`787cc040 fffff807`6a18c540 00000000`00000001 : nt!PopTransitionToSleep+0x135
fffff286`4edf0c10 fffff807`69bfcdd8 : ffff8400`ea55f180 ffff9d85`787cc040 fffff807`69b17dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff286`4edf0c60 00000000`00000000 : fffff286`4edf1000 fffff286`4edeb000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
STACK_COMMAND: .thread 0xffff9d85787cc040 ; kb
SYMBOL_NAME: nt!KiSwapContext+76
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
BUCKET_ID_FUNC_OFFSET: 76
FAILURE_BUCKET_ID: 0xa0_f0_nt!KiSwapContext
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {168f8d2f-e77e-7dcf-020c-035a9129b0ab}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000048, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8053e0430be, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7093
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 12173
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 48
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8053e0430be
READ_ADDRESS: fffff8053e8fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8053e80f330: Unable to get Flags value from nt!KdVersionBlock
fffff8053e80f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000048
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
TRAP_FRAME: ffff8487a22c91f0 -- (.trap 0xffff8487a22c91f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffd28862de55d0
rdx=00000000000000a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8053e0430be rsp=ffff8487a22c9380 rbp=0000000000000009
r8=00000000ffffffff r9=ffffd28862de54e0 r10=00000000ffffffff
r11=ffff988000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!MiStartingOffset+0x1a42fe:
fffff805`3e0430be 482b5848 sub rbx,qword ptr [rax+48h] ds:00000000`00000048=????????????????
Resetting default scope
STACK_TEXT:
ffff8487`a22c90a8 fffff805`3e007769 : 00000000`0000000a 00000000`00000048 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8487`a22c90b0 fffff805`3e003a69 : ffff8487`a22c9278 ffff8487`a22c9288 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8487`a22c91f0 fffff805`3e0430be : fffffd80`000261f8 ffff8487`a22c9540 00000000`00000001 ffff8487`a22c94c8 : nt!KiPageFault+0x469
ffff8487`a22c9380 fffff805`3deb5063 : d28862de`55d00420 fffffd80`000261f8 ffff9880`05190330 8a000001`b3011005 : nt!MiStartingOffset+0x1a42fe
ffff8487`a22c93b0 fffff805`3deb44f9 : fffffd80`000261a8 fffffd80`000261a8 ffff8487`a22c9500 80000001`00000010 : nt!MiCompleteRestrictedImageFault+0x183
ffff8487`a22c9480 fffff805`3e236781 : 00000000`00000000 00000000`0000004a ffffd288`60edd890 00000000`00000000 : nt!MiSoftFaultMappedView+0x509
ffff8487`a22c95c0 fffff805`3e231f5c : ffffd288`62de54e0 00000000`00000000 ffff8487`a22c9798 ffff8487`a22c98f0 : nt!MiMapViewOfImageSection+0x9c1
ffff8487`a22c9740 fffff805`3e24cf07 : 00000000`00000000 ffff8487`a22c9b09 00000000`00000000 ffffd288`68b5f340 : nt!MiMapViewOfSection+0x3fc
ffff8487`a22c9890 fffff805`3dec15a3 : ffffc208`6af877b0 00000000`00000000 ffffd288`00000001 ffff8487`a22c9b78 : nt!MiMapViewOfSectionExCommon+0x1d7
ffff8487`a22c9a20 fffff805`3e24e6d7 : ffffd288`689aa7c0 ffffd288`69207a68 ffff8487`a22ca310 00000000`00000001 : nt!MmMapViewOfSectionEx+0x73
ffff8487`a22c9aa0 fffff805`3e24eb5b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiMapProcessExecutable+0xb7
ffff8487`a22c9b70 fffff805`3e2f53c2 : 00000000`000062a0 ffff8487`a22ca350 00000000`000062a0 00000000`00000000 : nt!MmInitializeProcessAddressSpace+0x1cf
ffff8487`a22c9d60 fffff805`3e26c477 : 00000000`00000000 ffff8487`a22ca350 00000000`00000000 00000000`00000000 : nt!PspAllocateProcess+0x1d42
ffff8487`a22ca2d0 fffff805`3e0071b8 : 00000000`09f1fda0 00000000`0a024000 00000000`00000000 00000000`09f1e5e8 : nt!NtCreateUserProcess+0xa17
ffff8487`a22caa90 00007ffa`fa18d8a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`09f1e248 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`fa18d8a4
SYMBOL_NAME: nt!MiStartingOffset+1a42fe
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 1a42fe
FAILURE_BUCKET_ID: AV_nt!MiStartingOffset
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4ff16e87-b5e0-759b-5df2-e0f10fb2c49c}
Followup: MachineOwner
---------