*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80600000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8063b66566b, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6999
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 62533
Key : Analysis.Init.CPU.mSec
Value: 921
Key : Analysis.Init.Elapsed.mSec
Value: 8570
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: fffff80600000000
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8063b66566b
WRITE_ADDRESS: fffff8063c0fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff80600000000
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff8f87edfbd600 -- (.trap 0xffff8f87edfbd600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80600000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8063b66566b rsp=ffff8f87edfbd790 rbp=0000000000000000
r8=00000000ffffffff r9=000000000000003f r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiSwapThread+0x31b:
fffff806`3b66566b 8808 mov byte ptr [rax],cl ds:fffff806`00000000=??
Resetting default scope
STACK_TEXT:
ffff8f87`edfbd4b8 fffff806`3b807d69 : 00000000`0000000a fffff806`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffff8f87`edfbd4c0 fffff806`3b804069 : ffffc580`69280180 fffff806`3b7fd052 000f8067`b4bbbdff 00000000`00000001 : nt!KiBugCheckDispatch+0x69
ffff8f87`edfbd600 fffff806`3b66566b : ffffc580`fffffffe 00000000`ffffffff 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffff8f87`edfbd790 fffff806`3b664d7f : ffffe602`00000005 ffffe602`00000000 ffff8f87`edfbd980 fffff806`00000000 : nt!KiSwapThread+0x31b
ffff8f87`edfbd840 fffff806`3b643d5e : 00000000`00000000 ffff8f87`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x14f
ffff8f87`edfbd8e0 fffff806`47fdf0ed : ffff8f87`edfbda00 00000000`00989680 00000001`b0888fa6 00000000`00000002 : nt!KeWaitForMultipleObjects+0x2be
ffff8f87`edfbd9f0 fffff806`47f6a8ea : 00000000`00000000 ffffe602`ae227000 ffff8f87`edfbdb19 ffffe602`ae227000 : dxgmms2!VidSchiWaitForSchedulerEvents+0x25d
ffff8f87`edfbdac0 fffff806`47fed2e5 : ffffe602`b1229200 ffffe602`ae227000 ffffe602`b1229220 ffffe602`b190a010 : dxgmms2!VidSchiScheduleCommandToRun+0x2ca
ffff8f87`edfbdb80 fffff806`47fed29a : ffffe602`ae227400 fffff806`47fed1d0 ffffe602`ae227000 ffffc580`69280100 : dxgmms2!VidSchiRun_PriorityTable+0x35
ffff8f87`edfbdbd0 fffff806`3b717e85 : ffffe602`ae232380 fffff806`00000001 ffffe602`ae227000 000f8067`b4bbbdff : dxgmms2!VidSchiWorkerThread+0xca
ffff8f87`edfbdc10 fffff806`3b7fd498 : ffffc580`69280180 ffffe602`ae232380 fffff806`3b717e30 48b60f41`425089ca : nt!PspSystemThreadStartup+0x55
ffff8f87`edfbdc60 00000000`00000000 : ffff8f87`edfbe000 ffff8f87`edfb8000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: dxgmms2!VidSchiWaitForSchedulerEvents+25d
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.906
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 25d
FAILURE_BUCKET_ID: AV_dxgmms2!VidSchiWaitForSchedulerEvents
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {bc4e47cb-ae8f-ff68-f36c-4e9884412115}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000000c8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8021d66585c, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7375
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 16551
Key : Analysis.Init.CPU.mSec
Value: 1046
Key : Analysis.Init.Elapsed.mSec
Value: 9073
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: c8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8021d66585c
READ_ADDRESS: fffff8021e0fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
00000000000000c8
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicGamesLauncher.exe
TRAP_FRAME: ffffd1885d5a8760 -- (.trap 0xffffd1885d5a8760)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000001cd7ed4000 rbx=0000000000000000 rcx=ffffd1885d5a88b0
rdx=000000000000001c rsi=0000000000000000 rdi=0000000000000000
rip=fffff8021d66585c rsp=ffffd1885d5a88f0 rbp=0000000000000000
r8=0000000100000037 r9=ffffe4812f600180 r10=ffff908923abe340
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiSwapThread+0x50c:
fffff802`1d66585c 488b9ec8000000 mov rbx,qword ptr [rsi+0C8h] ds:00000000`000000c8=????????????????
Resetting default scope
STACK_TEXT:
ffffd188`5d5a8618 fffff802`1d807d69 : 00000000`0000000a 00000000`000000c8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd188`5d5a8620 fffff802`1d804069 : ffffe481`2f600180 fffff802`1d7fd052 000f8067`b4bbbdff 000f8067`00000001 : nt!KiBugCheckDispatch+0x69
ffffd188`5d5a8760 fffff802`1d66585c : 00000000`00000008 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffffd188`5d5a88f0 fffff802`1d664d7f : ffff9089`2206f080 fffff802`1d678387 00000000`00000000 00000000`00989600 : nt!KiSwapThread+0x50c
ffffd188`5d5a89a0 fffff802`1d6296d2 : 00000000`0000007a 00000000`00000000 ffff9089`00000001 0000001c`e1abf450 : nt!KiCommitThreadWait+0x14f
ffffd188`5d5a8a40 fffff802`1d9edeef : 00000000`00000320 00000000`00000320 00000000`00000000 0000018b`00000002 : nt!KeDelayExecutionThread+0x122
ffffd188`5d5a8ad0 fffff802`1d8077b8 : 00000000`00000000 00000000`00000000 ffffffff`fffe7960 0000018b`f57e8ab0 : nt!NtDelayExecution+0x5f
ffffd188`5d5a8b00 00007ffc`ca20d3a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000001c`e1abedc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`ca20d3a4
SYMBOL_NAME: nt!KiSwapThread+50c
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 50c
FAILURE_BUCKET_ID: AV_nt!KiSwapThread
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000000c0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8043433223f, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5359
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11572
Key : Analysis.Init.CPU.mSec
Value: 764
Key : Analysis.Init.Elapsed.mSec
Value: 6326
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: c0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8043433223f
READ_ADDRESS: fffff80434cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
00000000000000c0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: ffffd209c4cd8560 -- (.trap 0xffffd209c4cd8560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000004 rbx=0000000000000000 rcx=0000000000000016
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043433223f rsp=ffffd209c4cd86f0 rbp=ffffd209c4cd8730
r8=0000000000000000 r9=0000000000000000 r10=0000000000000037
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiCheckPreferredHeteroProcessor+0x4f:
fffff804`3433223f 4c8bbfc0000000 mov r15,qword ptr [rdi+0C0h] ds:00000000`000000c0=????????????????
Resetting default scope
STACK_TEXT:
ffffd209`c4cd8418 fffff804`34407d69 : 00000000`0000000a 00000000`000000c0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd209`c4cd8420 fffff804`34404069 : ffff8301`00000000 ffffa986`959840c0 00000000`0000000b ffffd209`c4cd859c : nt!KiBugCheckDispatch+0x69
ffffd209`c4cd8560 fffff804`3433223f : ffff4923`65744c6a 00000000`00000000 00000000`00000000 00000000`00000001 : nt!KiPageFault+0x469
ffffd209`c4cd86f0 fffff804`3451a646 : ffffa986`95747c88 ffffa986`956ad080 00000000`00000000 00000000`00000000 : nt!KiCheckPreferredHeteroProcessor+0x4f
ffffd209`c4cd8760 fffff804`3451a4a4 : 00000000`00000005 ffffd209`c4cd8828 ffffd209`c4cd8820 ffff8301`4a280180 : nt!KiSendHeteroRescheduleIntRequestHelper+0x156
ffffd209`c4cd87f0 fffff804`34435634 : ffff8301`ffffffff 00000000`00000000 ffffa986`97a9c560 ffffa986`97a9c560 : nt!KiSendHeteroRescheduleIntRequest+0x74
ffffd209`c4cd8820 fffff804`34264d7f : 00000000`00000001 00000000`00000005 ffffd209`c4cd89e0 fffff804`00000000 : nt!KiSwapThread+0x1d02e4
ffffd209`c4cd88d0 fffff804`34264623 : ffffa986`00000000 fffff804`00000000 00000000`00000000 ffffa986`956af1c0 : nt!KiCommitThreadWait+0x14f
ffffd209`c4cd8970 fffff804`3462cb91 : ffffa986`954aae60 000000ff`00000006 00000000`00000001 fffff804`34261100 : nt!KeWaitForSingleObject+0x233
ffffd209`c4cd8a60 fffff804`3462cc3a : ffffa986`956af080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x91
ffffd209`c4cd8ac0 fffff804`344077b8 : ffffa986`956af080 ffffa986`954aae60 00000000`00000000 00000000`00000000 : nt!NtWaitForSingleObject+0x6a
ffffd209`c4cd8b00 00007ff8`bb78cda4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ff`683ff6f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`bb78cda4
SYMBOL_NAME: nt!KiCheckPreferredHeteroProcessor+4f
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4f
FAILURE_BUCKET_ID: AV_nt!KiCheckPreferredHeteroProcessor
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {068240a0-d6bc-90c5-8c43-0941c938c453}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffbc80000000c0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8031613223f, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6233
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 30933
Key : Analysis.Init.CPU.mSec
Value: 889
Key : Analysis.Init.Elapsed.mSec
Value: 5979
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffbc80000000c0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8031613223f
READ_ADDRESS: fffff80316afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffbc80000000c0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff800fee4996e0 -- (.trap 0xffff800fee4996e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000004 rbx=0000000000000000 rcx=000000000000000a
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8031613223f rsp=ffff800fee499870 rbp=ffff800fee4998b0
r8=0000000000000000 r9=0000000000000000 r10=0000000000000037
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KiCheckPreferredHeteroProcessor+0x4f:
fffff803`1613223f 4c8bbfc0000000 mov r15,qword ptr [rdi+0C0h] ds:00000000`000000c0=????????????????
Resetting default scope
STACK_TEXT:
ffff800f`ee499598 fffff803`16207d69 : 00000000`0000000a ffffbc80`000000c0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff800f`ee4995a0 fffff803`16204069 : ffff8884`942d1040 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff800f`ee4996e0 fffff803`1613223f : 00000000`00000000 ffff8884`00000000 ffff8884`91f8bfe0 fffff803`1604e58c : nt!KiPageFault+0x469
ffff800f`ee499870 fffff803`1631a646 : 00000000`00000000 ffff8884`9457e080 00000000`00000000 00000000`00000000 : nt!KiCheckPreferredHeteroProcessor+0x4f
ffff800f`ee4998e0 fffff803`1631a4a4 : 00000000`00000005 ffff800f`ee4999a8 ffff800f`ee4999a0 ffffbc80`6ba80180 : nt!KiSendHeteroRescheduleIntRequestHelper+0x156
ffff800f`ee499970 fffff803`16235634 : ffffbc80`ffffffff 00000000`00000000 00000000`00000103 00000000`00000000 : nt!KiSendHeteroRescheduleIntRequest+0x74
ffff800f`ee4999a0 fffff803`16064d7f : ffff8884`00000001 fffff803`00000005 00000000`00000000 00000000`00000000 : nt!KiSwapThread+0x1d02e4
ffff800f`ee499a50 fffff803`16025d67 : ffff8884`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x14f
ffff800f`ee499af0 fffff803`16025910 : ffff8884`942d1040 fffff803`264bb370 ffff8884`8a8a4a20 ffff8884`00000000 : nt!KeRemovePriQueue+0x1a7
ffff800f`ee499b70 fffff803`16117e85 : ffff8884`942d1040 00000000`00000080 ffff8884`8a895040 2c303978`3032325f : nt!ExpWorkerThread+0xa0
ffff800f`ee499c10 fffff803`161fd498 : ffffbc80`6ba80180 ffff8884`942d1040 fffff803`16117e30 73646123`202c3039 : nt!PspSystemThreadStartup+0x55
ffff800f`ee499c60 00000000`00000000 : ffff800f`ee49a000 ffff800f`ee494000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!KiCheckPreferredHeteroProcessor+4f
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4f
FAILURE_BUCKET_ID: AV_nt!KiCheckPreferredHeteroProcessor
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {068240a0-d6bc-90c5-8c43-0941c938c453}
Followup: MachineOwner
---------