IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffd5d99bc5a698, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80143c279c6, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffffd5d99bc5a698
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80143c279c6
READ_ADDRESS: fffff801441733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffd5d99bc5a698
CURRENT_IRQL: 2
FAULTING_IP:
nt!KeIntSteerSnapPerf+c6
fffff801`43c279c6 4d39542408 cmp qword ptr [r12+8],r10
CPU_COUNT: 8
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 18
CPU_STEPPING: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: Steam.exe
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-25-2020 14:59:49.0924
ANALYSIS_VERSION: 10.0.18362.1 x86fre
DPC_STACK_BASE: FFFFF90C2D684FB0
TRAP_FRAME: fffff90c2d6844f0 -- (.trap 0xfffff90c2d6844f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80143c279c6 rsp=fffff90c2d684680 rbp=fffff90c2d684764
r8=0000000000000000 r9=fffff80144048dc0 r10=ffffd5069b9c7690
r11=ffffd5069bc5a680 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KeIntSteerSnapPerf+0xc6:
fffff801`43c279c6 4d39542408 cmp qword ptr [r12+8],r10 ds:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80143dd32e9 to fffff80143dc14e0
STACK_TEXT:
fffff90c`2d6843a8 fffff801`43dd32e9 : 00000000`0000000a ffffd5d9`9bc5a698 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff90c`2d6843b0 fffff801`43dcf62b : 00000000`00000004 fffff90c`2d684690 fffff90c`2d684510 fffff801`43c68c32 : nt!KiBugCheckDispatch+0x69
fffff90c`2d6844f0 fffff801`43c279c6 : 000003ac`5ed55fe5 00000000`00192c9c fffff801`4403b5a0 ffffd506`98a85670 : nt!KiPageFault+0x46b
fffff90c`2d684680 fffff801`43c27064 : ffff9780`f1a02f80 ffffd506`9b2ff410 00000000`00000002 00000000`00000e6d : nt!KeIntSteerSnapPerf+0xc6
fffff90c`2d6846f0 fffff801`43d04b80 : fffff801`4403b5a0 ffff9780`f1a00180 00000000`00000000 ffff9780`f1a00180 : nt!PpmParkSteerInterrupts+0x104
fffff90c`2d684bb0 fffff801`43c6ae95 : ffff9780`f1a02f80 ffffd506`98c20000 ffff9780`f1a05f90 ffff9780`00000002 : nt!PpmCheckRun+0x40
fffff90c`2d684c40 fffff801`43c6a4ef : ffff9780`f1a00180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x305
fffff90c`2d684d80 fffff801`43dc8525 : 00000000`00000000 ffff9780`f1a00180 00000000`00000000 00000000`6c3b7670 : nt!KiRetireDpcList+0x1ef
fffff90c`2d684fb0 fffff801`43dc8310 : ffffffff`ffe17b80 00000000`00b49000 00000000`77143620 00000000`0922f760 : nt!KxRetireDpcList+0x5
fffff90c`31cf4ad0 fffff801`43dc79e0 : ffffd506`a64bd080 00000000`00000000 fffff90c`31cf4b18 ffffffff`ffe17b80 : nt!KiDispatchInterruptContinue
fffff90c`31cf4b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0x2f0
THREAD_SHA1_HASH_MOD_FUNC: d5c65ce1d39ac520735ae68b165acc16f19543cb
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 860bed51a34fc91ca31683049fdad9c1c8214f79
THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c
FOLLOWUP_IP:
nt!KeIntSteerSnapPerf+c6
fffff801`43c279c6 4d39542408 cmp qword ptr [r12+8],r10
FAULT_INSTR_CODE: 2454394d
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KeIntSteerSnapPerf+c6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: c6
FAILURE_BUCKET_ID: AV_nt!KeIntSteerSnapPerf
BUCKET_ID: AV_nt!KeIntSteerSnapPerf
PRIMARY_PROBLEM_CLASS: AV_nt!KeIntSteerSnapPerf
TARGET_TIME: 2020-01-21T17:46:44.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 77c5
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!keintsteersnapperf
FAILURE_ID_HASH: {5b1f888f-b1da-166b-4e6f-953ec93fccba}
Followup: MachineOwner
---------
EVENT_TRACING_FATAL_ERROR (11d)
Event Tracing subsystem has encountered an unexpected fatal error. First parameter indicates
the type of failure.
Arguments:
Arg1: 0000000000000007, Trace buffer corruption.
Arg2: ffff9682429ff000
Arg3: 0000000000001000
Arg4: 00000000006c1000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 7
BUGCHECK_P2: ffff9682429ff000
BUGCHECK_P3: 1000
BUGCHECK_P4: 6c1000
CPU_COUNT: 8
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 18
CPU_STEPPING: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x11D
PROCESS_NAME: System
CURRENT_IRQL: b
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-25-2020 14:59:53.0846
ANALYSIS_VERSION: 10.0.18362.1 x86fre
EXCEPTION_RECORD: ffffffff00000000 -- (.exr 0xffffffff00000000)
Cannot read Exception record @ ffffffff00000000
LAST_CONTROL_TRANSFER: from fffff8054a207402 to fffff8054a1c14e0
STACK_TEXT:
ffffcb01`f7f3ecf8 fffff805`4a207402 : 00000000`0000011d 00000000`00000007 ffff9682`429ff000 00000000`00001000 : nt!KeBugCheckEx
ffffcb01`f7f3ed00 fffff805`4a065e2f : ffffcb01`f7f3ee00 ffff9682`42543040 ffff9682`429ff000 ffff9682`429ff000 : nt!EtwpEnqueueAvailableBuffer+0x1a17b2
ffffcb01`f7f3ed40 fffff805`4a06594e : ffff9682`429ff00e 00000000`00000000 ffff9682`429ff000 fffff805`5b7b20a5 : nt!EtwpPrepareDirtyBuffer+0x2b
ffffcb01`f7f3ed70 fffff805`4a06b8bf : 00000000`00000000 ffff9682`429ff000 00000000`002d09f0 00000000`00000000 : nt!EtwpSwitchBuffer+0xc6
ffffcb01`f7f3edd0 fffff805`4a06b22b : 00000000`00000000 00000000`00000000 00000000`00000000 ffffcb01`f7f3ee98 : nt!EtwpReserveTraceBuffer+0x1af
ffffcb01`f7f3ee60 fffff805`4a069ccc : 00000000`00000000 ffff9682`425f0000 ffffcb01`f8d65470 ffffcb01`00000002 : nt!EtwpLogKernelEvent+0x1eb
ffffcb01`f7f3ef10 fffff805`4a1c2d1b : ffffcb01`f81db180 ffffa802`ce629b50 ffffcb01`f8d653c0 ffffcb01`f8d653c0 : nt!PerfInfoLogInterrupt+0xec
ffffcb01`f7f3ef90 fffff805`4a1c2fc7 : 00000000`00000001 ffffcb01`f81db180 ffffa802`ce629c00 00000000`00000001 : nt!KiInterruptSubDispatch+0x13b
ffffa802`ce629ad0 fffff805`4a1c4fee : ffffffff`00000000 ffffcb01`f81db180 ffff9682`56460080 00000000`00001892 : nt!KiInterruptDispatch+0x37
ffffa802`ce629c60 00000000`00000000 : ffffa802`ce62a000 ffffa802`ce624000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x4e
THREAD_SHA1_HASH_MOD_FUNC: 7f94a6d8cab80d75cd2242ebeb92312adc1485a8
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bad4b160e57810fe1b7858beb1115c816ad98c41
THREAD_SHA1_HASH_MOD: bc100a5647b828107ac4e18055e00abcbe1ec406
FOLLOWUP_IP:
nt!EtwpEnqueueAvailableBuffer+1a17b2
fffff805`4a207402 cc int 3
FAULT_INSTR_CODE: 438d4ccc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!EtwpEnqueueAvailableBuffer+1a17b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1a17b2
FAILURE_BUCKET_ID: 0x11D_nt!EtwpEnqueueAvailableBuffer
BUCKET_ID: 0x11D_nt!EtwpEnqueueAvailableBuffer
PRIMARY_PROBLEM_CLASS: 0x11D_nt!EtwpEnqueueAvailableBuffer
TARGET_TIME: 2020-01-23T22:37:06.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 5515
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x11d_nt!etwpenqueueavailablebuffer
FAILURE_ID_HASH: {9082fc0e-b919-27ea-ba62-61b267b092b3}
Followup: MachineOwner
---------
EVENT_TRACING_FATAL_ERROR (11d)
Event Tracing subsystem has encountered an unexpected fatal error. First parameter indicates
the type of failure.
Arguments:
Arg1: 0000000000000007, Trace buffer corruption.
Arg2: ffffe185b65ff000
Arg3: 0000000000001000
Arg4: 0000000000781000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 7
BUGCHECK_P2: ffffe185b65ff000
BUGCHECK_P3: 1000
BUGCHECK_P4: 781000
CPU_COUNT: 8
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 18
CPU_STEPPING: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x11D
PROCESS_NAME: NVDi
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-25-2020 14:59:57.0968
ANALYSIS_VERSION: 10.0.18362.1 x86fre
DPC_STACK_BASE: FFFFAF05BDC5AFB0
LAST_CONTROL_TRANSFER: from fffff80155007402 to fffff80154fc14e0
STACK_TEXT:
ffffaf05`bdc5a9f8 fffff801`55007402 : 00000000`0000011d 00000000`00000007 ffffe185`b65ff000 00000000`00001000 : nt!KeBugCheckEx
ffffaf05`bdc5aa00 fffff801`54e65e2f : ffffaf05`bdc5aa00 ffffe185`b6354040 ffffe185`b65ff000 ffffe185`b65ff000 : nt!EtwpEnqueueAvailableBuffer+0x1a17b2
ffffaf05`bdc5aa40 fffff801`54e6594e : ffffe185`b65ff00e 00000000`00000000 ffffe185`b65ff000 00000000`00000000 : nt!EtwpPrepareDirtyBuffer+0x2b
ffffaf05`bdc5aa70 fffff801`54e6b8bf : 00000000`00000000 ffffe185`b65ff000 00000000`000b0b08 00000000`00000000 : nt!EtwpSwitchBuffer+0xc6
ffffaf05`bdc5aad0 fffff801`54e6b22b : 00000000`00000000 00000000`00000000 00000000`00000000 ffffaf05`bdc5ab98 : nt!EtwpReserveTraceBuffer+0x1af
ffffaf05`bdc5ab60 fffff801`54f12cd8 : 00000000`00000004 ffffe185`b642d000 ffffe185`b827ef80 fffff801`00000002 : nt!EtwpLogKernelEvent+0x1eb
ffffaf05`bdc5ac10 fffff801`54e6bc0b : ffffe185`b827bf20 00000000`00000002 00000000`00000080 0000004d`00000002 : nt!EtwTraceTimedEvent+0xd0
ffffaf05`bdc5ac90 fffff801`54e6a7e9 : 00000000`0000000e 00000000`00989680 00000000`00134cdc 00000000`000000f4 : nt!KiProcessExpiredTimerList+0x2eb
ffffaf05`bdc5ad80 fffff801`54fc8525 : 7c890000`0002b841 ffffb000`af800180 00000000`00000000 ffffe185`bef11118 : nt!KiRetireDpcList+0x4e9
ffffaf05`bdc5afb0 fffff801`54fc8310 : 00000000`00000000 00000000`00000000 00000001`00000003 00000000`00000000 : nt!KxRetireDpcList+0x5
ffffaf05`c1bf32e0 fffff801`54fc79e0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
ffffaf05`c1bf3310 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0x2f0
THREAD_SHA1_HASH_MOD_FUNC: 0db2494fbd212e25dc2c62c5642ab2ace1ce9862
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 59d05478ad5e62c625e8f35a1edb9de90e0763e6
THREAD_SHA1_HASH_MOD: dc844b1b94baa204d070855e43bbbd27eee98b94
FOLLOWUP_IP:
nt!EtwpEnqueueAvailableBuffer+1a17b2
fffff801`55007402 cc int 3
FAULT_INSTR_CODE: 438d4ccc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!EtwpEnqueueAvailableBuffer+1a17b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1a17b2
FAILURE_BUCKET_ID: 0x11D_nt!EtwpEnqueueAvailableBuffer
BUCKET_ID: 0x11D_nt!EtwpEnqueueAvailableBuffer
PRIMARY_PROBLEM_CLASS: 0x11D_nt!EtwpEnqueueAvailableBuffer
TARGET_TIME: 2020-01-25T06:59:11.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 474d
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x11d_nt!etwpenqueueavailablebuffer
FAILURE_ID_HASH: {9082fc0e-b919-27ea-ba62-61b267b092b3}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff801717df00f, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: fffff801717df00f, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: fffff801717df00f
BUGCHECK_P2: 10
BUGCHECK_P3: fffff801717df00f
BUGCHECK_P4: 2
READ_ADDRESS: fffff801781733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff801717df00f
FAULTING_IP:
+0
fffff801`717df00f ?? ???
MM_INTERNAL_CODE: 2
CPU_COUNT: 8
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 18
CPU_STEPPING: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: GTA5.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-25-2020 15:00:01.0456
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffff82054c356200 -- (.trap 0xffff82054c356200)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000bf8 rbx=0000000000000000 rcx=0000000000040000
rdx=000000007bc38000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801717df00f rsp=ffff82054c356398 rbp=000000007bc397ff
r8=0000000000000bf8 r9=0000000000000001 r10=000000007bc38800
r11=ffff82054c356330 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
fffff801`717df00f ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80177de35d6 to fffff80177dc14e0
FAILED_INSTRUCTION_ADDRESS:
+0
fffff801`717df00f ?? ???
STACK_TEXT:
ffff8205`4c355f58 fffff801`77de35d6 : 00000000`00000050 fffff801`717df00f 00000000`00000010 ffff8205`4c356200 : nt!KeBugCheckEx
ffff8205`4c355f60 fffff801`77c72eef : 00000000`00000000 00000000`00000010 00000000`00000000 fffff801`717df00f : nt!MiSystemFault+0x1d6866
ffff8205`4c356060 fffff801`77dcf520 : 00000000`0000003d 00000000`00000000 ffffa403`1f9d1860 00000000`00000000 : nt!MmAccessFault+0x34f
ffff8205`4c356200 fffff801`717df00f : fffff801`77c7e0ca ffffa403`0fc94520 ffffa403`1ec14a28 ffffa403`1b347aa8 : nt!KiPageFault+0x360
ffff8205`4c356398 fffff801`77c7e0ca : ffffa403`0fc94520 ffffa403`1ec14a28 ffffa403`1b347aa8 00000000`00000000 : 0xfffff801`717df00f
ffff8205`4c3563a0 fffff801`7821ef89 : 00000000`7bc38800 00000000`00000000 00000000`00000001 ffff8205`4c3564b0 : nt!CcFetchDataForRead+0x4a
ffff8205`4c356400 fffff801`77c7deb5 : ffffa403`1f9d1860 00000000`7bc38800 00000000`00007800 ffffa403`1ed92001 : nt!CcMapAndCopyFromCache+0xd9
ffff8205`4c3564a0 fffff801`7a84a68d : ffff8205`4c3565f0 00000000`00000000 ffff8a08`00000bf8 00000000`00000bf8 : nt!CcCopyReadEx+0x135
ffff8205`4c356540 fffff801`79ce5f77 : 00000000`00000000 00000000`000002b0 ffffa403`1e8af660 00000000`00000000 : Ntfs!NtfsCopyReadA+0x2ed
ffff8205`4c356830 fffff801`79ce2fa3 : ffff8205`4c356920 00000000`00000000 00000000`00000000 ffffa403`1ec148c0 : FLTMGR!FltpPerformFastIoCall+0x197
ffff8205`4c356890 fffff801`79d1c7c5 : ffff8205`4c3569f8 ffff8205`4c356b80 ffffa403`1ed92080 ffffa403`1e8af660 : FLTMGR!FltpPassThroughFastIo+0xd3
ffff8205`4c3568f0 fffff801`781e55bf : ffffa403`1e8af660 00000000`00000000 00000000`00000000 ffffa403`00000000 : FLTMGR!FltpFastIoRead+0x165
ffff8205`4c3569a0 fffff801`77dd2d18 : 00000000`00000001 00000000`00000000 00000000`00000000 000000fe`bf3ffc70 : nt!NtReadFile+0x39f
ffff8205`4c356a90 00007ff9`2f7fc184 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000fe`bf3ffbb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`2f7fc184
THREAD_SHA1_HASH_MOD_FUNC: 30c82dfb1a5cfcb2deece258b07dee5c8a42e4bd
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 11833d0c02c51f6cbf0ab3f51c738e356bae89fa
THREAD_SHA1_HASH_MOD: 2ec661c556f10b0ccbd42b0b8c8043e2f435ee98
FOLLOWUP_IP:
nt!MiSystemFault+1d6866
fffff801`77de35d6 cc int 3
FAULT_INSTR_CODE: 4d8d48cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiSystemFault+1d6866
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 1d6866
FAILURE_BUCKET_ID: AV_INVALID_BAD_IP_nt!MiSystemFault
BUCKET_ID: AV_INVALID_BAD_IP_nt!MiSystemFault
PRIMARY_PROBLEM_CLASS: AV_INVALID_BAD_IP_nt!MiSystemFault
TARGET_TIME: 2020-01-25T07:28:46.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 54ae
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_invalid_bad_ip_nt!misystemfault
FAILURE_ID_HASH: {48ad9531-e3f8-1044-fc5f-d917677674c7}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000000, A stack-based buffer has been overrun.
Arg2: 0000000000000000, Address of the trap frame for the exception that caused the bugcheck
Arg3: 0000000000000000, Address of the exception record for the exception that caused the bugcheck
Arg4: 56706e500208ff00, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 0
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 56706e500208ff00
TRAP_FRAME: 0000000000000000 -- (.trap 0x0)
EXCEPTION_RECORD: 0000000000000000 -- (.exr 0x0)
Cannot read Exception record @ 0000000000000000
CPU_COUNT: 8
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 18
CPU_STEPPING: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x139
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-25-2020 15:00:05.0062
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff801635c9f5b to fffff801635c14e0
STACK_TEXT:
ffffa505`74053778 fffff801`635c9f5b : 00000000`00000139 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffa505`74053780 fffff801`70ffa863 : ffff9104`b90d44c0 00000000`00989680 ffffba80`d9400100 000022da`d201e2e1 : nt!guard_icall_bugcheck+0x1b
ffffa505`740537b0 fffff801`63421e7c : 00000000`000000f8 00000000`00000000 ffff9104`b90e2010 00000000`000000f8 : amdppm!AcpiCStateIdleExecute+0x23
ffffa505`740537e0 fffff801`634215ce : 00000000`00000003 00000000`00000002 ffff9104`b90e2100 00000000`00000008 : nt!PpmIdleExecuteTransition+0x70c
ffffa505`74053b00 fffff801`635c4fe8 : ffffffff`00000000 ffffba80`d9400180 ffff9104`be359080 00000000`00000b46 : nt!PoIdle+0x36e
ffffa505`74053c60 00000000`00000000 : ffffa505`74054000 ffffa505`7404e000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48
THREAD_SHA1_HASH_MOD_FUNC: 4ad303352e7fc6dc8de58c57f76990acc63a9026
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1d7e4bca1040623174babf8af3919e2dd4aa0c62
THREAD_SHA1_HASH_MOD: 001485d3748cc5dcc52d627ba0da0940a61545bc
FOLLOWUP_IP:
amdppm!AcpiCStateIdleExecute+23
fffff801`70ffa863 90 nop
FAULT_INSTR_CODE: 48c03390
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: amdppm!AcpiCStateIdleExecute+23
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: amdppm
IMAGE_NAME: amdppm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.387
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 23
FAILURE_BUCKET_ID: 0x139_0_LEGACY_GS_VIOLATION_amdppm!AcpiCStateIdleExecute
BUCKET_ID: 0x139_0_LEGACY_GS_VIOLATION_amdppm!AcpiCStateIdleExecute
PRIMARY_PROBLEM_CLASS: 0x139_0_LEGACY_GS_VIOLATION_amdppm!AcpiCStateIdleExecute
TARGET_TIME: 2020-01-25T11:18:47.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 4c9b
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_0_legacy_gs_violation_amdppm!acpicstateidleexecute
FAILURE_ID_HASH: {d6b6f22d-4285-fca1-565c-5adc5725dac8}
Followup: MachineOwner
---------