0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffd08f999378b8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8014a1532d2, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for HKKbdFltr.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2249
Key : Analysis.Elapsed.mSec
Value: 10721
Key : Analysis.IO.Other.Mb
Value: 16
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 24
Key : Analysis.Init.CPU.mSec
Value: 874
Key : Analysis.Init.Elapsed.mSec
Value: 232989
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_kbdclass!memcpy
Key : Failure.Hash
Value: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1417df84
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffd08f999378b8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8014a1532d2
FILE_IN_CAB: 111223-23250-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
READ_ADDRESS: fffff80109d1d468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffd08f999378b8
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8010dcff9f0 -- (.trap 0xfffff8010dcff9f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd08e2a32f480 rbx=0000000000000000 rcx=ffffd08e2a32f480
rdx=000000016f608438 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8014a1532d2 rsp=fffff8010dcffb88 rbp=fffff8010dcffc00
r8=00000000000000c0 r9=0000000000000038 r10=ffffd08e11afd000
r11=ffffd08f99937978 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff801`4a1532d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffd08f`999378b8=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff801`0dcff8a8 fffff801`09427da9 : 00000000`0000000a ffffd08f`999378b8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff801`0dcff8b0 fffff801`09423434 : 0003431d`1b9b8978 00000000`00000000 ffffd08e`0dd6e180 fffff801`27213242 : nt!KiBugCheckDispatch+0x69
fffff801`0dcff9f0 fffff801`4a1532d2 : fffff801`4a155b5d 00000000`74346158 fffff801`0dcffc00 ffffd08e`2f992960 : nt!KiPageFault+0x474
fffff801`0dcffb88 fffff801`4a155b5d : 00000000`74346158 fffff801`0dcffc00 ffffd08e`2f992960 fffff801`4a112d5c : kbdclass!memcpy+0x92
fffff801`0dcffb90 fffff801`4a141511 : ffffd08e`0dfa5ae0 fffff801`0dcffd58 ffffd08e`0dc0d310 fffff801`0dcffd58 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff801`0dcffc30 ffffd08e`0dfa5ae0 : fffff801`0dcffd58 ffffd08e`0dc0d310 fffff801`0dcffd58 00000000`00000008 : HKKbdFltr+0x1511
fffff801`0dcffc38 fffff801`0dcffd58 : ffffd08e`0dc0d310 fffff801`0dcffd58 00000000`00000008 fffff801`0dcffcb0 : 0xffffd08e`0dfa5ae0
fffff801`0dcffc40 ffffd08e`0dc0d310 : fffff801`0dcffd58 00000000`00000008 fffff801`0dcffcb0 ffffd08e`0dfa5990 : 0xfffff801`0dcffd58
fffff801`0dcffc48 fffff801`0dcffd58 : 00000000`00000008 fffff801`0dcffcb0 ffffd08e`0dfa5990 fffff801`4a1413f0 : 0xffffd08e`0dc0d310
fffff801`0dcffc50 00000000`00000008 : fffff801`0dcffcb0 ffffd08e`0dfa5990 fffff801`4a1413f0 fffff801`06475180 : 0xfffff801`0dcffd58
fffff801`0dcffc58 fffff801`0dcffcb0 : ffffd08e`0dfa5990 fffff801`4a1413f0 fffff801`06475180 fffff801`4a11b848 : 0x8
fffff801`0dcffc60 ffffd08e`0dfa5990 : fffff801`4a1413f0 fffff801`06475180 fffff801`4a11b848 ffffd08e`0dfa5ae0 : 0xfffff801`0dcffcb0
fffff801`0dcffc68 fffff801`4a1413f0 : fffff801`06475180 fffff801`4a11b848 ffffd08e`0dfa5ae0 fffff801`0dcffce9 : 0xffffd08e`0dfa5990
fffff801`0dcffc70 fffff801`06475180 : fffff801`4a11b848 ffffd08e`0dfa5ae0 fffff801`0dcffce9 ffffd08e`0daa2090 : HKKbdFltr+0x13f0
fffff801`0dcffc78 fffff801`4a11b848 : ffffd08e`0dfa5ae0 fffff801`0dcffce9 ffffd08e`0daa2090 fffff801`4a120258 : 0xfffff801`06475180
fffff801`0dcffc80 fffff801`0922a72c : 00000000`00000000 ffff9980`00000010 00000000`00000000 ffff9980`a7fd1830 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff801`0dcffd50 fffff801`09229731 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x42c
fffff801`0dd00290 fffff801`0941753e : 00000000`00000000 fffff801`06475180 fffff801`09d4d6c0 ffffd08e`13dfa080 : nt!KiRetireDpcList+0x1b1
fffff801`0dd00540 00000000`00000000 : fffff801`0dd01000 fffff801`0dcfa000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.22621.1774
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner
---------