0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff8291a57d3940, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8005b8a32d2, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for HKKbdFltr.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2374
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3671
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 358
Key : Analysis.Init.Elapsed.mSec
Value: 8141
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : Bugcheck.Code.DumpHeader
Value: 0xd1
Key : Bugcheck.Code.Register
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
FILE_IN_CAB: 060423-21265-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
BUGCHECK_CODE: d1
BUGCHECK_P1: ffff8291a57d3940
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8005b8a32d2
READ_ADDRESS: fffff8001751c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff8291a57d3940
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff80019bc59f0 -- (.trap 0xfffff80019bc59f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff828a974ac940 rbx=0000000000000000 rcx=ffff828a974ac940
rdx=000000070e327000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8005b8a32d2 rsp=fffff80019bc5b88 rbp=fffff80019bc5c00
r8=00000000000000c0 r9=0000000000000038 r10=ffff828a69edc000
r11=ffff8291a57d3a00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff800`5b8a32d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffff8291`a57d3940=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff800`19bc58a8 fffff800`16c417a9 : 00000000`0000000a ffff8291`a57d3940 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`19bc58b0 fffff800`16c3ce34 : 00021a13`a5ac837c 00000000`00000000 ffff828a`69df2180 fffff800`2cc12ac2 : nt!KiBugCheckDispatch+0x69
fffff800`19bc59f0 fffff800`5b8a32d2 : fffff800`5b8a5b5d 00000000`c8d5c390 fffff800`19bc5c00 ffff828a`85c73aa0 : nt!KiPageFault+0x474
fffff800`19bc5b88 fffff800`5b8a5b5d : 00000000`c8d5c390 fffff800`19bc5c00 ffff828a`85c73aa0 fffff800`5b862d5c : kbdclass!memcpy+0x92
fffff800`19bc5b90 fffff800`5b891511 : ffff828a`69dcc190 fffff800`19bc5d58 ffff828a`69d98310 fffff800`19bc5d58 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff800`19bc5c30 ffff828a`69dcc190 : fffff800`19bc5d58 ffff828a`69d98310 fffff800`19bc5d58 00000000`00000008 : HKKbdFltr+0x1511
fffff800`19bc5c38 fffff800`19bc5d58 : ffff828a`69d98310 fffff800`19bc5d58 00000000`00000008 fffff800`19bc5cb0 : 0xffff828a`69dcc190
fffff800`19bc5c40 ffff828a`69d98310 : fffff800`19bc5d58 00000000`00000008 fffff800`19bc5cb0 ffff828a`69dcc040 : 0xfffff800`19bc5d58
fffff800`19bc5c48 fffff800`19bc5d58 : 00000000`00000008 fffff800`19bc5cb0 ffff828a`69dcc040 fffff800`5b8913f0 : 0xffff828a`69d98310
fffff800`19bc5c50 00000000`00000008 : fffff800`19bc5cb0 ffff828a`69dcc040 fffff800`5b8913f0 fffff800`10ecb180 : 0xfffff800`19bc5d58
fffff800`19bc5c58 fffff800`19bc5cb0 : ffff828a`69dcc040 fffff800`5b8913f0 fffff800`10ecb180 fffff800`5b86b848 : 0x8
fffff800`19bc5c60 ffff828a`69dcc040 : fffff800`5b8913f0 fffff800`10ecb180 fffff800`5b86b848 ffff828a`69dcc190 : 0xfffff800`19bc5cb0
fffff800`19bc5c68 fffff800`5b8913f0 : fffff800`10ecb180 fffff800`5b86b848 ffff828a`69dcc190 fffff800`19bc5ce9 : 0xffff828a`69dcc040
fffff800`19bc5c70 fffff800`10ecb180 : fffff800`5b86b848 ffff828a`69dcc190 fffff800`19bc5ce9 ffff828a`69b78ae0 : HKKbdFltr+0x13f0
fffff800`19bc5c78 fffff800`5b86b848 : ffff828a`69dcc190 fffff800`19bc5ce9 ffff828a`69b78ae0 fffff800`5b870258 : 0xfffff800`10ecb180
fffff800`19bc5c80 fffff800`16ab3f6c : 00000000`00000000 ffffb900`00000010 00000000`00000000 ffffb900`241c2970 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff800`19bc5d50 fffff800`16ab2f5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x42c
fffff800`19bc6290 fffff800`16c30eee : 00000000`00000000 fffff800`10ecb180 fffff800`1754c6c0 ffff828a`729bd080 : nt!KiRetireDpcList+0x1ba
fffff800`19bc6540 00000000`00000000 : fffff800`19bc7000 fffff800`19bc0000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.23435.1000
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_kbdclass!memcpy
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}
Followup: MachineOwner
---------