DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffa68c77602750, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: ffffa68c77602750, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4515
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 13351
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffa68c77602750
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: ffffa68c77602750
READ_ADDRESS: fffff8074c0fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8074c00f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8074c00f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffa68c77602750
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffd70aab645240 -- (.trap 0xffffd70aab645240)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa68c77602750 rbx=0000000000000000 rcx=0000000010000000
rdx=000000000000082f rsi=0000000000000000 rdi=0000000000000000
rip=ffffa68c77602750 rsp=ffffd70aab6453d8 rbp=ffffd70aab6454d0
r8=ffffd70aab6454e0 r9=000000000000002f r10=0000ffffa68c7760
r11=ffff6ffdd0600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na pe nc
ffffa68c`77602750 8826 mov byte ptr [rsi],ah ds:00000000`00000000=??
Resetting default scope
FAILED_INSTRUCTION_ADDRESS:
+0
ffffa68c`77602750 8826 mov byte ptr [rsi],ah
STACK_TEXT:
ffffd70a`ab6450f8 fffff807`4b805e69 : 00000000`0000000a ffffa68c`77602750 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffd70a`ab645100 fffff807`4b802169 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd70a`ab645240 ffffa68c`77602750 : fffff807`4b63b310 fffff807`4c124440 00000000`0000003f ffffa68c`79542080 : nt!KiPageFault+0x469
ffffd70a`ab6453d8 fffff807`4b63b310 : fffff807`4c124440 00000000`0000003f ffffa68c`79542080 ffff8000`0bb40180 : 0xffffa68c`77602750
ffffd70a`ab6453e0 fffff807`4b703d9d : 00000000`00000000 ffffd70a`ab645510 ffffd70a`ab645758 00000000`00000003 : nt!HalpApicRequestInterrupt+0x90
ffffd70a`ab645450 fffff807`4b6ca3d4 : ffff8000`00000000 fffff807`00000000 ffffa68c`798a9080 ffffd70a`ab6456fc : nt!HalpInterruptSendIpi+0xfd
ffffd70a`ab6456c0 fffff807`4b6c3c1d : 00000000`00dee5c6 ffffd70a`ab645b10 00000000`00000080 ffff8000`0bbea180 : nt!KiDeferredReadySingleThread+0x8b4
ffffd70a`ab6458b0 fffff807`4b6c4000 : ffff8000`0bbea180 00000000`00000000 ffffa68c`78d8b220 00000000`00000000 : nt!KiReadyThread+0x4d
ffffd70a`ab6458e0 fffff807`4b6e910d : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00dee5c6 : nt!KiProcessExpiredTimerList+0x290
ffffd70a`ab6459d0 fffff807`4b7f7a0e : ffffffff`00000000 ffff8000`0bbea180 ffff8000`0bbf51c0 ffffa68c`776650c0 : nt!KiRetireDpcList+0x5dd
ffffd70a`ab645c60 00000000`00000000 : ffffd70a`ab646000 ffffd70a`ab640000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiPageFault+469
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 469
FAILURE_BUCKET_ID: AV_CODE_AV_BAD_IP_nt!KiPageFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {73cd60cc-83fa-6b76-df08-1961c31d7403}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff30a9f3173e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff30a9f317338, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5655
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 15728
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff30a9f3173e0
BUGCHECK_P3: fffff30a9f317338
BUGCHECK_P4: 0
TRAP_FRAME: fffff30a9f3173e0 -- (.trap 0xfffff30a9f3173e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffe08e8511d040 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8061327e8af rsp=fffff30a9f317570 rbp=fffff30a9f317639
r8=0000000000000000 r9=0000000000000000 r10=ffffcc0050ea4180
r11=ffffe08e81e29800 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
nt!KeWaitForMultipleObjects+0x43f:
fffff806`1327e8af cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff30a9f317338 -- (.exr 0xfffff30a9f317338)
ExceptionAddress: fffff8061327e8af (nt!KeWaitForMultipleObjects+0x000000000000043f)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff30a`9f3170b8 fffff806`13405e69 : 00000000`00000139 00000000`00000003 fffff30a`9f3173e0 fffff30a`9f317338 : nt!KeBugCheckEx
fffff30a`9f3170c0 fffff806`13406290 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff30a`9f317200 fffff806`13404623 : ffffcc00`50ea4180 00000000`00000000 00000000`00000000 00000000`0000003f : nt!KiFastFailDispatch+0xd0
fffff30a`9f3173e0 fffff806`1327e8af : ffffe08e`80848080 00000000`00000000 00000000`00040246 fffff806`132c9861 : nt!KiRaiseSecurityCheckFailure+0x323
fffff30a`9f317570 fffff612`1815da08 : fffff612`183ab1d0 fffff30a`9f795240 00000000`00000003 fffff640`c62fc900 : nt!KeWaitForMultipleObjects+0x43f
fffff30a`9f317680 fffff612`178b930f : 00000000`0000000f 00000000`00000003 00002000`00000000 00000000`00000004 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x88
fffff30a`9f3177b0 fffff612`181d1eb3 : ffffe08e`88c07080 ffffe08e`88c07080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7bf
fffff30a`9f317970 fffff612`17858960 : ffffe08e`88c07080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
fffff30a`9f317aa0 fffff612`175d474d : ffffe08e`88c07080 ffffe08e`88c07080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
fffff30a`9f317ad0 fffff806`134058b8 : ffffe08e`00000005 00000000`00000005 0000026f`078041b0 00000000`000016a0 : win32k!NtUserCallNoParam+0x15
fffff30a`9f317b00 00007ffe`d68e10e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b0`65a3f888 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`d68e10e4
SYMBOL_NAME: win32kbase!LegacyInputDispatcher::WaitAndDispatch+88
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 88
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_win32kbase!LegacyInputDispatcher::WaitAndDispatch
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ec713815-b628-d3b4-9812-1937faa1c4d7}
Followup: MachineOwner
---------