*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff9a8ce4ecef28, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8049d7132d2, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 31
Key : Analysis.Elapsed.mSec
Value: 11805
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 46
Key : Analysis.Init.Elapsed.mSec
Value: 7415
Key : Analysis.Memory.CommitPeak.Mb
Value: 89
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Bugcheck.Code.TargetModel
Value: 0xd1
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_kbdclass!memcpy
Key : Failure.Hash
Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1417df84
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
BUGCHECK_CODE: d1
BUGCHECK_P1: ffff9a8ce4ecef28
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8049d7132d2
FILE_IN_CAB: 033024-23250-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
READ_ADDRESS: fffff80453d1c470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff9a8ce4ecef28
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64
DPC_STACK_BASE: FFFFF80450F6FFB0
TRAP_FRAME: fffff80450f6f460 -- (.trap 0xfffff80450f6f460)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9a89b9a539c0 rbx=0000000000000000 rcx=ffff9a89b9a539c0
rdx=000000032b47b568 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8049d7132d2 rsp=fffff80450f6f5f8 rbp=fffff80450f6f670
r8=00000000000000c0 r9=0000000000000038 r10=ffff9a89a5b93000
r11=ffff9a8ce4ecefe8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff804`9d7132d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffff9a8c`e4ecef28=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff804`50f6f318 fffff804`5342d329 : 00000000`0000000a ffff9a8c`e4ecef28 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff804`50f6f320 fffff804`53428834 : ffff9a89`a5a421c0 fffff804`50f6f508 00000000`ffffff02 fffff804`95a3306f : nt!KiBugCheckDispatch+0x69
fffff804`50f6f460 fffff804`9d7132d2 : fffff804`9d715b5d 00000000`c0c4a008 fffff804`50f6f670 ffff9a89`b62e1010 : nt!KiPageFault+0x474
fffff804`50f6f5f8 fffff804`9d715b5d : 00000000`c0c4a008 fffff804`50f6f670 ffff9a89`b62e1010 fffff804`9d6d2d5c : kbdclass!memcpy+0x92
fffff804`50f6f600 fffff804`9d701511 : ffff9a89`a4881ae0 fffff804`50f6f7c8 ffff9a89`a5b38310 fffff804`50f6f7c8 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff804`50f6f6a0 ffff9a89`a4881ae0 : fffff804`50f6f7c8 ffff9a89`a5b38310 fffff804`50f6f7c8 00000000`00000008 : HKKbdFltr+0x1511
fffff804`50f6f6a8 fffff804`50f6f7c8 : ffff9a89`a5b38310 fffff804`50f6f7c8 00000000`00000008 fffff804`50f6f720 : 0xffff9a89`a4881ae0
fffff804`50f6f6b0 ffff9a89`a5b38310 : fffff804`50f6f7c8 00000000`00000008 fffff804`50f6f720 ffff9a89`a4881990 : 0xfffff804`50f6f7c8
fffff804`50f6f6b8 fffff804`50f6f7c8 : 00000000`00000008 fffff804`50f6f720 ffff9a89`a4881990 fffff804`9d7013f0 : 0xffff9a89`a5b38310
fffff804`50f6f6c0 00000000`00000008 : fffff804`50f6f720 ffff9a89`a4881990 fffff804`9d7013f0 fffff804`4f8e6180 : 0xfffff804`50f6f7c8
fffff804`50f6f6c8 fffff804`50f6f720 : ffff9a89`a4881990 fffff804`9d7013f0 fffff804`4f8e6180 fffff804`9d6db848 : 0x8
fffff804`50f6f6d0 ffff9a89`a4881990 : fffff804`9d7013f0 fffff804`4f8e6180 fffff804`9d6db848 ffff9a89`a4881ae0 : 0xfffff804`50f6f720
fffff804`50f6f6d8 fffff804`9d7013f0 : fffff804`4f8e6180 fffff804`9d6db848 ffff9a89`a4881ae0 fffff804`50f6f759 : 0xffff9a89`a4881990
fffff804`50f6f6e0 fffff804`4f8e6180 : fffff804`9d6db848 ffff9a89`a4881ae0 fffff804`50f6f759 ffff9a89`a554d9e0 : HKKbdFltr+0x13f0
fffff804`50f6f6e8 fffff804`9d6db848 : ffff9a89`a4881ae0 fffff804`50f6f759 ffff9a89`a554d9e0 fffff804`9d6e0258 : 0xfffff804`4f8e6180
fffff804`50f6f6f0 fffff804`532251bc : 00000000`00000000 ffffd880`00000010 00000000`00000000 ffffd880`32cc20b0 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff804`50f6f7c0 fffff804`53226471 : 00000000`00000000 fffff804`50f6fe00 ffff9a89`b5ac8990 00000000`000002d7 : nt!KiExecuteAllDpcs+0x42c
fffff804`50f6fd00 fffff804`53420f75 : 00000000`00000000 00000000`00000000 fffff804`4f8e6180 00000226`41633330 : nt!KiRetireDpcList+0x1b1
fffff804`50f6ffb0 fffff804`53420f1f : ffff9686`67b8f989 fffff804`53229ef5 00000000`00000000 ffff9a89`b4ea2be0 : nt!KxSwapStacksAndRetireDpcList+0x5
ffff9686`67b8f8f0 fffff804`53229ef5 : 00000000`00000000 ffff9a89`b4ea2be0 00000000`00040246 fffff804`5321cf2b : nt!KiPlatformSwapStacksAndCallReturn
ffff9686`67b8f900 fffff804`534206cb : 00000000`00000000 00000000`000000ff 00000225`dad1edc0 00000226`41633330 : nt!KiDispatchInterrupt+0xd5
ffff9686`67b8f9f0 fffff804`53419ac1 : ffff9686`67b8faa0 00000226`415ec020 00000225`c353bbc0 00000226`41633388 : nt!KiDpcInterruptBypass+0x1b
ffff9686`67b8fa20 00007ff7`dedc3056 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
000000ae`e4f7d940 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff7`dedc3056
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.22621.1774
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner
---------