*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff80061d18c08, Virtual address for the attempted write.
Arg2: 0a000000034001a1, PTE contents.
Arg3: fffff80067e6c450, (reserved)
Arg4: 000000000000000f, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7718
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 36634
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: be
BUGCHECK_P1: fffff80061d18c08
BUGCHECK_P2: a000000034001a1
BUGCHECK_P3: fffff80067e6c450
BUGCHECK_P4: f
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff80067e6c450 -- (.trap 0xfffff80067e6c450)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=1ebf6f13cae80000
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80061abbe6f rsp=fffff80067e6c5e0 rbp=fffff8005fe60180
r8=0000000000000001 r9=00000000000000c4 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KeSetTimerEx+0xbf:
fffff800`61abbe6f 6689473a mov word ptr [rdi+3Ah],ax ds:00000000`0000003a=????
Resetting default scope
STACK_TEXT:
fffff800`67e6c258 fffff800`61c413a6 : 00000000`000000be fffff800`61d18c08 0a000000`034001a1 fffff800`67e6c450 : nt!KeBugCheckEx
fffff800`67e6c260 fffff800`61aea58f : 00000000`00000000 00000000`00000003 fffff800`67e6c4d0 00000000`00000000 : nt!MiRaisedIrqlFault+0x1bf59a
fffff800`67e6c2b0 fffff800`61c0335e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MmAccessFault+0x4ef
fffff800`67e6c450 fffff800`61abbe6f : ffffa181`3b6e8010 00000000`00000002 ffffa181`3b5f7220 00000000`00000000 : nt!KiPageFault+0x35e
fffff800`67e6c5e0 fffff800`6732f01d : 00000000`024d9960 fffff800`67e6c740 fffff800`00000000 00000059`f7131028 : nt!KeSetTimerEx+0xbf
fffff800`67e6c640 fffff800`61ae535e : fffff800`5fe63240 fffff800`67e6cb10 fffff800`67e6cb20 fffff800`5fe60180 : tcpip!TcpPeriodicTimeoutHandler+0xc8d
fffff800`67e6c860 fffff800`61ae4644 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00167ddc : nt!KiExecuteAllDpcs+0x30e
fffff800`67e6c9d0 fffff800`61bf8d7e : 00000000`00000000 fffff800`5fe60180 fffff800`62527600 ffffa181`43547080 : nt!KiRetireDpcList+0x1f4
fffff800`67e6cc60 00000000`00000000 : fffff800`67e6d000 fffff800`67e67000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: tcpip!TcpPeriodicTimeoutHandler+c8d
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
IMAGE_VERSION: 10.0.19041.602
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: c8d
FAILURE_BUCKET_ID: 0xBE_tcpip!TcpPeriodicTimeoutHandler
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {02283085-76a2-b75e-8397-04a5c046d9aa}
Followup: MachineOwner
---------*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffd18cffffffe8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8010d6d8f61, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7061
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 64165
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffd18cffffffe8
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8010d6d8f61
BUGCHECK_P4: 2
READ_ADDRESS: fffff8010dcfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8010dc0f340: Unable to get Flags value from nt!KdVersionBlock
fffff8010dc0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffd18cffffffe8
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: nvsphelper64.exe
TRAP_FRAME: fffffe817a032230 -- (.trap 0xfffffe817a032230)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffe817a032480 rbx=0000000000000000 rcx=ffffa78fb7861a50
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8010d6d8f61 rsp=fffffe817a0323c0 rbp=fffffe817a0325a9
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=ffffd37f38e00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!SeDefaultObjectMethod+0xb1:
fffff801`0d6d8f61 488b4708 mov rax,qword ptr [rdi+8] ds:00000000`00000008=????????????????
Resetting default scope
STACK_TEXT:
fffffe81`7a031f88 fffff801`0d47a665 : 00000000`00000050 ffffd18c`ffffffe8 00000000`00000000 fffffe81`7a032230 : nt!KeBugCheckEx
fffffe81`7a031f90 fffff801`0d2ea4a0 : 00000000`00000000 00000000`00000000 fffffe81`7a0322b0 00000000`00000000 : nt!MiSystemFault+0x172315
fffffe81`7a032090 fffff801`0d40335e : fffff801`0dc483b0 00000000`00000000 ffffa78f`b0683080 01800080`51a63c10 : nt!MmAccessFault+0x400
fffffe81`7a032230 fffff801`0d6d8f61 : 00000000`00000103 00000000`00000000 ffffa78f`a68c5900 ffffa78f`afb3fd00 : nt!KiPageFault+0x35e
fffffe81`7a0323c0 fffff801`0d6bff56 : ffffa78f`b7861a20 fffffe81`7a0325a9 fffffe81`7a032518 ffffa78f`b7861a50 : nt!SeDefaultObjectMethod+0xb1
fffffe81`7a032420 fffff801`0d2db967 : 00000000`00000000 00000000`00000000 fffffe81`7a0325a9 ffffa78f`b7861a50 : nt!ObpRemoveObjectRoutine+0xd6
fffffe81`7a032480 fffff801`0d6ed70e : ffffa78f`a68c5900 ffffa78f`b7861a50 ffffa78f`00000000 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0xc7
fffffe81`7a0324c0 fffff801`0d6a4dc5 : 00000000`00000103 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObCloseHandleTableEntry+0x29e
fffffe81`7a032600 fffff801`0d6a70ad : 00000000`00000000 ffffa78f`b0683080 ffffffff`ffffff01 ffffa78f`b5879718 : nt!ExSweepHandleTable+0xd5
fffffe81`7a0326b0 fffff801`0d5f1647 : ffffffff`ffffffff ffffa78f`b58792c0 fffffe81`7a032700 ffffa78f`00000000 : nt!ObKillProcess+0x35
fffffe81`7a0326e0 fffff801`0d5e6f96 : ffffa78f`b58792c0 ffffd18d`531460a0 fffffe81`7a032920 00000000`00000000 : nt!PspRundownSingleProcess+0x133
fffffe81`7a032760 fffff801`0d67a978 : 00000000`40010004 00000000`00000001 00000000`00000000 00000088`9535f000 : nt!PspExitThread+0x5f6
fffffe81`7a032860 fffff801`0d2e25c7 : 00000000`00000101 00000000`00000000 ffffa78f`b5cd15d0 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
fffffe81`7a0328a0 fffff801`0d3f97b0 : 000001fb`9fb3d9e0 fffffe81`7a032950 00000088`959ff5b8 ffffa78f`00000000 : nt!KiDeliverApc+0x487
fffffe81`7a032950 fffff801`0d406c5f : ffffa78f`b0683080 00000088`959ff408 00000000`00000000 000001fb`9fb6ce98 : nt!KiInitiateUserApc+0x70
fffffe81`7a032a90 00007ffa`420ef7f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000088`959ff568 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`420ef7f4
SYMBOL_NAME: nt!SeDefaultObjectMethod+b1
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: b1
FAILURE_BUCKET_ID: AV_R_INVALID_nt!SeDefaultObjectMethod
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8bff512c-58e1-d26a-5bbd-ae3d1ad0e774}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000fff, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff805100083f8, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6468
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 30022
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: fff
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff805100083f8
WRITE_ADDRESS: fffff805108fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8051080f340: Unable to get Flags value from nt!KdVersionBlock
fffff8051080f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000fff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8051666c630 -- (.trap 0xfffff8051666c630)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000fff rbx=0000000000000000 rcx=0000000000000fff
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805100083f8 rsp=fffff8051666c7c8 rbp=fffff8051666c8a9
r8=0000000000041000 r9=0101010101010101 r10=ffff870e2b5f4f50
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po nc
nt!memset+0x78:
fffff805`100083f8 0f1101 movups xmmword ptr [rcx],xmm0 ds:00000000`00000fff=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff805`1666c4e8 fffff805`10007169 : 00000000`0000000a 00000000`00000fff 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff805`1666c4f0 fffff805`10003469 : 00000000`00000003 00000000`00000000 00000000`0fe75440 00000000`00000008 : nt!KiBugCheckDispatch+0x69
fffff805`1666c630 fffff805`100083f8 : fffff805`1003cd8e fffff805`1666c832 00000000`00000000 fffff805`1666c8a9 : nt!KiPageFault+0x469
fffff805`1666c7c8 fffff805`1003cd8e : fffff805`1666c832 00000000`00000000 fffff805`1666c8a9 ffff870e`2b5f4f50 : nt!memset+0x78
fffff805`1666c7d0 fffff805`0febdee3 : ffff870e`2b5f4f50 fffff805`16113b90 00000000`00000000 00000000`00000000 : nt!KiResetGlobalDpcWatchdogProfiler+0x1c7446
fffff805`1666c800 fffff805`0febd735 : fffff805`1666c948 00000000`00000000 fffff805`1666cb10 ffff870e`2b5f4f68 : nt!KiExpireTimer2+0x413
fffff805`1666c910 fffff805`0fee4cc4 : 00000000`00000000 00000000`00000000 00000000`00000008 00000000`001701e2 : nt!KiTimer2Expiration+0x165
fffff805`1666c9d0 fffff805`0fff8d7e : 00000000`00000000 fffff805`0e608180 fffff805`10927600 ffff870e`36bb7080 : nt!KiRetireDpcList+0x874
fffff805`1666cc60 00000000`00000000 : fffff805`1666d000 fffff805`16667000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiPageFault+469
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 469
FAILURE_BUCKET_ID: AV_nt!KiPageFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ec3e2762-48ae-ffe9-5b16-fbcb853e8320}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa00759d7b058, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8068b25f8d7, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8140
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 88456
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffa00759d7b058
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8068b25f8d7
BUGCHECK_P4: 2
READ_ADDRESS: fffff806802fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8068020f340: Unable to get Flags value from nt!KdVersionBlock
fffff8068020f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffa00759d7b058
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
TRAP_FRAME: ffffcb08d262fd40 -- (.trap 0xffffcb08d262fd40)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffe180187ab000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8068b25f8d7 rsp=ffffcb08d262fed0 rbp=fffff8068b25f840
r8=0000000000000004 r9=fffff8068b25f840 r10=fffff8067fca8e40
r11=ffffd17e67000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
dxgkrnl!DXGALLOCATIONREFERENCE::~DXGALLOCATIONREFERENCE+0x97:
fffff806`8b25f8d7 488b4758 mov rax,qword ptr [rdi+58h] ds:00000000`00000058=????????????????
Resetting default scope
STACK_TEXT:
ffffcb08`d262fa98 fffff806`7fa7a665 : 00000000`00000050 ffffa007`59d7b058 00000000`00000000 ffffcb08`d262fd40 : nt!KeBugCheckEx
ffffcb08`d262faa0 fffff806`7f8ea4a0 : fffff806`8b1ae0a0 00000000`00000000 ffffcb08`d262fdc0 00000000`00000000 : nt!MiSystemFault+0x172315
ffffcb08`d262fba0 fffff806`7fa0335e : 00000000`00000000 ffffcb08`d262fff0 ffffa007`3f800100 fffff806`7f8c7262 : nt!MmAccessFault+0x400
ffffcb08`d262fd40 fffff806`8b25f8d7 : 00000000`00000000 00000000`00000000 ffffcd8a`56090ba0 00000000`00000000 : nt!KiPageFault+0x35e
ffffcb08`d262fed0 fffff806`8b18c022 : 00000000`00000004 00000000`00000008 00000000`00000000 ffffcd8a`56090ba0 : dxgkrnl!DXGALLOCATIONREFERENCE::~DXGALLOCATIONREFERENCE+0x97
ffffcb08`d262ff00 fffff806`8b2ca846 : ffffcb08`d2630118 ffffcb08`d26300b0 ffffcb08`d26308d0 ffffcb08`d26308d0 : dxgkrnl!`vector destructor iterator'+0x3a
ffffcb08`d262ff30 fffff806`8b410ec6 : 00000000`00000000 ffffcb08`d26300b0 ffffcb08`d26308d0 00000000`00000000 : dxgkrnl!PagedPoolArray<DXGALLOCATIONREFERENCE,4>::~PagedPoolArray<DXGALLOCATIONREFERENCE,4>+0x2e
ffffcb08`d262ff60 fffff806`8b413ee0 : ffffcb08`d2630960 ffffffff`c000000d 00000000`00000001 ffffcb08`d2630998 : dxgkrnl!DXGCONTEXT::PresentMultiPlaneOverlay3+0x170e
ffffcb08`d2630860 fffff806`7fa06bb8 : ffffcd8a`59459080 ffffcd8a`59459080 00000000`00000001 00000000`00000000 : dxgkrnl!DxgkPresentMultiPlaneOverlay3+0x780
ffffcb08`d2630b00 00007ff8`81095484 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000054`312fab48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`81095484
SYMBOL_NAME: dxgkrnl!DXGALLOCATIONREFERENCE::~DXGALLOCATIONREFERENCE+97
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.19041.546
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 97
FAILURE_BUCKET_ID: AV_R_INVALID_dxgkrnl!DXGALLOCATIONREFERENCE::_DXGALLOCATIONREFERENCE
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {eb39dd60-ae3d-4a8f-9219-c001e3e70a58}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000008000, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000075, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000a926ee7, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6796
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 34104
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 8000
BUGCHECK_P2: ff
BUGCHECK_P3: 75
BUGCHECK_P4: fffff8000a926ee7
WRITE_ADDRESS: fffff8000b2fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8000b20f340: Unable to get Flags value from nt!KdVersionBlock
fffff8000b20f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000008000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8000e86c960 -- (.trap 0xfffff8000e86c960)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=00000000000000f8
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000a926ee7 rsp=fffff8000e86caf0 rbp=fffff8000e86cbf0
r8=00000000ffffffff r9=0000000000000000 r10=ffffde8643cf6600
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na pe nc
nt!PoIdle+0x257:
fffff800`0a926ee7 4d8ba600800000 mov r12,qword ptr [r14+8000h] ds:00000000`00008000=????????????????
Resetting default scope
STACK_TEXT:
fffff800`0e86c818 fffff800`0aa07169 : 00000000`0000000a 00000000`00008000 00000000`000000ff 00000000`00000075 : nt!KeBugCheckEx
fffff800`0e86c820 fffff800`0aa03469 : ffffde86`43f11080 00000000`00000000 ffffffff`00000000 ffffde86`43f11268 : nt!KiBugCheckDispatch+0x69
fffff800`0e86c960 fffff800`0a926ee7 : 00000000`00000000 00001f80`00000000 00000000`00000003 00000000`00000002 : nt!KiPageFault+0x469
fffff800`0e86caf0 fffff800`0a9f8d34 : 00000000`00000000 fffff800`0b327600 ffffde86`4aeb5080 00000000`00000af8 : nt!PoIdle+0x257
fffff800`0e86cc60 00000000`00000000 : fffff800`0e86d000 fffff800`0e867000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME: nt!PoIdle+257
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 257
FAILURE_BUCKET_ID: AV_nt!PoIdle
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0f00f4f4-fc66-441c-10bf-8ccc2952f11b}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80b2ac27310, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80510f18ccf, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7078
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 32607
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: fffff80b2ac27310
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80510f18ccf
READ_ADDRESS: fffff805116fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8051160f340: Unable to get Flags value from nt!KdVersionBlock
fffff8051160f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff80b2ac27310
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8051746c450 -- (.trap 0xfffff8051746c450)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000410e0141 rbx=0000000000000000 rcx=fffff80511725440
rdx=0000000000000fff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80510f18ccf rsp=fffff8051746c5e8 rbp=fffff8051746c659
r8=00000000c32a03c3 r9=fffff8051746c650 r10=0000000000000037
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiGenerateHeteroSets+0x7:
fffff805`10f18ccf 4e8b9cc1b8000000 mov r11,qword ptr [rcx+r8*8+0B8h] ds:fffff80b`2ac27310=????????????????
Resetting default scope
STACK_TEXT:
fffff805`1746c308 fffff805`10e07169 : 00000000`0000000a fffff80b`2ac27310 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff805`1746c310 fffff805`10e03469 : 00000000`00000003 00000000`0000002f fffff805`10c75440 fffff805`10c69d00 : nt!KiBugCheckDispatch+0x69
fffff805`1746c450 fffff805`10f18ccf : fffff805`10f18fb7 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
fffff805`1746c5e8 fffff805`10f18fb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGenerateHeteroSets+0x7
fffff805`1746c5f0 fffff805`10e67082 : fffff805`0f46b180 ffff8a09`b7f6f000 00000000`410e0141 fffff805`1746c6fc : nt!KiHeteroChooseTargetProcessor+0xa7
fffff805`1746c6c0 fffff805`10cbf3bd : 00000000`001eb890 fffff805`1746cb10 00000000`00000080 fffff805`0f46b180 : nt!KiDeferredReadySingleThread+0x1a1dc2
fffff805`1746c8b0 fffff805`10cbf7a0 : fffff805`0f46b180 00000000`00000000 ffff8a09`bb1f11f0 00000000`00000000 : nt!KiReadyThread+0x4d
fffff805`1746c8e0 fffff805`10ce4a2d : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`001eb890 : nt!KiProcessExpiredTimerList+0x290
fffff805`1746c9d0 fffff805`10df8d7e : 00000000`00000000 fffff805`0f46b180 fffff805`11727600 ffff8a09`bce9d080 : nt!KiRetireDpcList+0x5dd
fffff805`1746cc60 00000000`00000000 : fffff805`1746d000 fffff805`17467000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiGenerateHeteroSets+7
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 7
FAILURE_BUCKET_ID: AV_nt!KiGenerateHeteroSets
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e12c4c11-0ff5-f5ca-55be-f1d53353b217}
Followup: MachineOwner
---------