*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000014, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 00000000000000f7, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80743a70d7d, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5187
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 17320
Key : Analysis.Init.CPU.mSec
Value: 1093
Key : Analysis.Init.Elapsed.mSec
Value: 19819
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: 14
BUGCHECK_P2: ff
BUGCHECK_P3: f7
BUGCHECK_P4: fffff80743a70d7d
WRITE_ADDRESS: fffff807444fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000014
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff608b2853560 -- (.trap 0xfffff608b2853560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000004 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80743a70d7d rsp=fffff608b28536f0 rbp=0000000000000000
r8=0000000000000001 r9=0000000000000005 r10=0000fffff80743ae
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!PpmIdleExecuteTransition+0xaad:
fffff807`43a70d7d 897e14 mov dword ptr [rsi+14h],edi ds:00000000`00000014=????????
Resetting default scope
STACK_TEXT:
fffff608`b2853418 fffff807`43c07b69 : 00000000`0000000a 00000000`00000014 00000000`000000ff 00000000`000000f7 : nt!KeBugCheckEx
fffff608`b2853420 fffff807`43c03e69 : 00000000`00000000 fffff807`46c499f3 fffff608`b2853740 fffff807`43b9f74d : nt!KiBugCheckDispatch+0x69
fffff608`b2853560 fffff807`43a70d7d : ffffc782`a1f1d1e0 00000000`00000000 00000000`00000000 ffffb781`723a4440 : nt!KiPageFault+0x469
fffff608`b28536f0 fffff807`43a70154 : 00000000`00000000 00001f80`00b3009b 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0xaad
fffff608`b2853af0 fffff807`43bf9774 : ffffffff`00000000 ffffb781`718f0240 ffffc782`f5856080 00000000`00000654 : nt!PoIdle+0x374
fffff608`b2853c60 00000000`00000000 : fffff608`b2854000 fffff608`b284e000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME: nt!PpmIdleExecuteTransition+aad
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.867
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: aad
FAILURE_BUCKET_ID: AV_CODE_AV_nt!PpmIdleExecuteTransition
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3d77750b-80a6-c195-659c-ebcffecd3d05}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000000c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804534089bd, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 10452
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 19000
Key : Analysis.Init.CPU.mSec
Value: 890
Key : Analysis.Init.Elapsed.mSec
Value: 4846
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: c
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff804534089bd
WRITE_ADDRESS: fffff80453efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
000000000000000c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: LightKeeperService.exe
DPC_STACK_BASE: FFFFF20062A5AFB0
TRAP_FRAME: fffff20062a5a970 -- (.trap 0xfffff20062a5a970)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd68f319e900e rbx=0000000000000000 rcx=ffffd68f319e900e
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804534089bd rsp=fffff20062a5ab00 rbp=fffff20062a5ab70
r8=0000000000000008 r9=0000000000001000 r10=0000000000000000
r11=fffff8045346e680 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po nc
nt!EtwpLogKernelEvent+0x40d:
fffff804`534089bd f0ff4a0c lock dec dword ptr [rdx+0Ch] ds:00000000`0000000c=????????
Resetting default scope
STACK_TEXT:
fffff200`62a5a828 fffff804`53607b69 : 00000000`0000000a 00000000`0000000c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff200`62a5a830 fffff804`53603e69 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff200`62a5a970 fffff804`534089bd : fffff200`62a5aa00 ffff9a01`322e8200 fffff200`62a5ab70 00000000`00000002 : nt!KiPageFault+0x469
fffff200`62a5ab00 fffff804`5340792d : ffff9a01`322e8240 ffffd68f`31ae2000 fffff200`62a5ae90 ffffd68f`00000002 : nt!EtwpLogKernelEvent+0x40d
fffff200`62a5abb0 fffff804`53406b04 : ffff9a01`322e5180 89480000`00000000 00000000`00000008 00000000`000309d3 : nt!KiExecuteAllDpcs+0x41d
fffff200`62a5ad20 fffff804`535fcc95 : 00155a74`850fc985 ffff9a01`322e5180 00000000`00000000 00000000`00000000 : nt!KiRetireDpcList+0x1f4
fffff200`62a5afb0 fffff804`535fca80 : 00000000`008f3000 00000000`008f3000 00000000`03fefd00 00000000`00000002 : nt!KxRetireDpcList+0x5
fffff200`64e61ad0 fffff804`535fc14e : 00000000`00000064 00000000`00000000 ffffffff`fff0bdc0 ffffd68f`3b942080 : nt!KiDispatchInterruptContinue
fffff200`64e61b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0x2ee
SYMBOL_NAME: nt!EtwpLogKernelEvent+40d
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.867
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 40d
FAILURE_BUCKET_ID: AV_nt!EtwpLogKernelEvent
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2dd8433c-c071-e8df-14a1-7a8aa408eedb}
Followup: MachineOwner
---------