Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa12248.33348\102520-9781-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`5a400000 PsLoadedModuleList = 0xfffff804`5b02a310
Debug session time: Sun Oct 25 21:27:30.488 2020 (UTC + 3:00)
System Uptime: 2 days 6:48:20.442
Loading Kernel Symbols
...............................................................
................................................................
................................................................
........
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`5a7f45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffcd01`2d5f5c40=000000000000000a
7: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff804876e4750, memory referenced
Arg2: 000000000000000f, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff804876e4750, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3358
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-IPC9T25
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 13159
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: fffff804876e4750
BUGCHECK_P2: f
BUGCHECK_P3: 8
BUGCHECK_P4: fffff804876e4750
READ_ADDRESS: fffff8045b0fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8045b00f340: Unable to get Flags value from nt!KdVersionBlock
fffff8045b00f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff804876e4750
IP_MODULE_UNLOADED:
AMDPcore.sys+4750
fffff804`876e4750 ?? ???
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: taskhostw.exe
TRAP_FRAME: ffffcd012d5f5d80 -- (.trap 0xffffcd012d5f5d80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff804876e4750 rbx=0000000000000000 rcx=ffff8504c60df050
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804876e4750 rsp=ffffcd012d5f5f18 rbp=ffff8504c60df0d0
r8=000000000000dfc0 r9=fffff8045a408b20 r10=0000fffff804876e
r11=ffffbcfbc8600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe cy
<Unloaded_AMDPcore.sys>+0x4750:
fffff804`876e4750 ?? ???
Resetting default scope
FAILED_INSTRUCTION_ADDRESS:
AMDPcore.sys+4750
fffff804`876e4750 ?? ???
STACK_TEXT:
ffffcd01`2d5f5c38 fffff804`5a806569 : 00000000`0000000a fffff804`876e4750 00000000`0000000f 00000000`00000008 : nt!KeBugCheckEx
ffffcd01`2d5f5c40 fffff804`5a802869 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69
ffffcd01`2d5f5d80 fffff804`876e4750 : fffff804`5a8b90ea ffffa584`82ffed77 fffff804`00000002 00000000`00000f32 : nt!KiPageFault+0x469
ffffcd01`2d5f5f18 fffff804`5a8b90ea : ffffa584`82ffed77 fffff804`00000002 00000000`00000f32 fffff804`00400a02 : <Unloaded_AMDPcore.sys>+0x4750
ffffcd01`2d5f5f20 fffff804`5a62ecd5 : ffff8a8d`80506b60 ffffcd01`2d5f5f40 00000000`00000010 ffffa584`82ffec27 : nt!HalpPerfInterrupt+0xfa
ffffcd01`2d5f5f60 fffff804`5a7f604a : ffff8504`c60df0d0 ffff8a8d`80506b60 00000000`00000002 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffffcd01`2d5f5fb0 fffff804`5a7f65b7 : ffff8504`c60df200 00000000`00000000 00000000`00000000 00000000`00000001 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff8504`c60df050 fffff804`5a9157e7 : 00000000`00000000 00000000`000000e4 00000000`000003a3 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff8504`c60df1e0 fffff804`5abf60f5 : 00000000`00000000 00000000`00000000 ffff8504`c60df410 ffff8504`c60df410 : nt!KeStartProfile+0xeb
ffff8504`c60df2f0 fffff804`5ab790b3 : ffff8a8d`80633084 00000000`00000008 00000000`00000008 ffff8a8d`80632000 : nt!EtwpEnableKernelTrace+0x7d461
ffff8504`c60df3c0 fffff804`5ab77c5c : ffff8504`c60df630 ffff8504`c60df630 fffff804`00000023 ffff8a8d`9940ecc0 : nt!EtwpUpdateGlobalGroupMasks+0x18b
ffff8504`c60df490 fffff804`5ad34546 : 00000000`00000001 ffff8504`c60dfb80 00000000`00000000 00000039`637fedb0 : nt!EtwpUpdateGroupMasks+0x1ec
ffff8504`c60df550 fffff804`5aa9a480 : 00000002`1a0c8860 ffffb58a`0deefbc0 00000000`00000000 00000039`637fedb0 : nt!EtwSetPerformanceTraceInformation+0x296
ffff8504`c60df770 fffff804`5a805fb8 : ffff8a8d`95f2d000 00000000`00000010 ffff8504`c60dfb80 00000000`00000000 : nt!NtSetSystemInformation+0x210
ffff8504`c60dfb00 00007ffe`dc3ef2c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000039`637fed28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`dc3ef2c4
SYMBOL_NAME: AMDPcore.sys+4750
MODULE_NAME: AMDPcore
IMAGE_NAME: AMDPcore.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4750
FAILURE_BUCKET_ID: AV_CODE_AV_UNLOADED_IP_AMDPcore.sys!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {032bd19c-cad5-0e51-79f9-8aa2b0760295}
Followup: MachineOwner
---------