IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff801393a9a67, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2390
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6830
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: 994
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff801393a9a67
READ_ADDRESS: fffff801397733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8013962a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8013962a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff838082206fe0 -- (.trap 0xffff838082206fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffff838082207250
rdx=ffffd6855dc64890 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801393a9a67 rsp=ffff838082207170 rbp=ffff8380822071e9
r8=ffffd6855dc64860 r9=0000000000000003 r10=0000000000000000
r11=ffff8380822073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiSwInterruptDispatch+0x27:
fffff801`393a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope
STACK_TEXT:
ffff8380`82206e98 fffff801`393d41e9 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8380`82206ea0 fffff801`393d0529 : 00000000`ffff8001 ffffd685`5dc93e30 ffffd685`00000000 ffffd685`5dc93e30 : nt!KiBugCheckDispatch+0x69
ffff8380`82206fe0 fffff801`393a9a67 : 00000000`00000000 ffffd685`5dc64040 ffffd685`5dc64040 fffff801`393d3c15 : nt!KiPageFault+0x469
ffff8380`82207170 fffff801`393c8308 : ffff8380`82207250 7fffd685`5dc93e40 ffff8380`822072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffff8380`82207250 fffff801`4069154f : fffff801`40b732c0 00000000`00000000 ffffffff`800001b8 00000000`00000008 : nt!KiSwInterrupt+0x368
ffff8380`822073e8 fffff801`40b732c0 : 00000000`00000000 ffffffff`800001b8 00000000`00000008 ffffd685`5eb09d60 : vgk+0x154f
ffff8380`822073f0 00000000`00000000 : ffffffff`800001b8 00000000`00000008 ffffd685`5eb09d60 fffff801`39829060 : vgk+0x4e32c0
SYMBOL_NAME: vgk+154f
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 154f
FAILURE_BUCKET_ID: AV_vgk!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804529a9a67, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2468
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6917
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: 994
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff804529a9a67
READ_ADDRESS: fffff80452d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80452c2a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff80452c2a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffd784dea06fe0 -- (.trap 0xffffd784dea06fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffffd784dea07250
rdx=ffff80068986bdd0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804529a9a67 rsp=ffffd784dea07170 rbp=ffffd784dea071e9
r8=ffff80068986bda0 r9=0000000000000003 r10=0000000000000000
r11=ffffd784dea073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiSwInterruptDispatch+0x27:
fffff804`529a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope
STACK_TEXT:
ffffd784`dea06e98 fffff804`529d41e9 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd784`dea06ea0 fffff804`529d0529 : 00000000`ffff8001 ffff8006`89893070 ffff8006`00000000 ffff8006`89893070 : nt!KiBugCheckDispatch+0x69
ffffd784`dea06fe0 fffff804`529a9a67 : 00000000`00000000 ffff8006`8986b580 ffff8006`8986b580 fffff804`529d3c15 : nt!KiPageFault+0x469
ffffd784`dea07170 fffff804`529c8308 : ffffd784`dea07250 7fff8006`89893080 ffffd784`dea072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffd784`dea07250 fffff804`5985154f : fffff804`59d332c0 00000000`00000000 ffffffff`8000020c 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffd784`dea073e8 fffff804`59d332c0 : 00000000`00000000 ffffffff`8000020c 00000000`00000008 ffff8006`8b9998f0 : vgk+0x154f
ffffd784`dea073f0 00000000`00000000 : ffffffff`8000020c 00000000`00000008 ffff8006`8b9998f0 fffff804`52e29060 : vgk+0x4e32c0
SYMBOL_NAME: vgk+154f
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 154f
FAILURE_BUCKET_ID: AV_vgk!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff805049a9a67, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2687
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6618
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: 994
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff805049a9a67
READ_ADDRESS: fffff80504d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80504c2a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff80504c2a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffc18803a06fe0 -- (.trap 0xffffc18803a06fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffffc18803a07250
rdx=ffff9c0290a618d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805049a9a67 rsp=ffffc18803a07170 rbp=ffffc18803a071e9
r8=ffff9c0290a618a0 r9=0000000000000003 r10=0000000000000000
r11=ffffc18803a073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiSwInterruptDispatch+0x27:
fffff805`049a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope
STACK_TEXT:
ffffc188`03a06e98 fffff805`049d41e9 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffc188`03a06ea0 fffff805`049d0529 : 00000000`ffff8001 ffff9c02`90a931b0 ffff9c02`00000000 ffff9c02`90a931b0 : nt!KiBugCheckDispatch+0x69
ffffc188`03a06fe0 fffff805`049a9a67 : 00000000`00000000 ffff9c02`90a61080 ffff9c02`90a61080 fffff805`049d3c15 : nt!KiPageFault+0x469
ffffc188`03a07170 fffff805`049c8308 : ffffc188`03a07250 7fff9c02`90a931c0 ffffc188`03a072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffc188`03a07250 fffff805`0a20154f : fffff805`0a6e32c0 00000000`00000000 ffffffff`800001bc 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffc188`03a073e8 fffff805`0a6e32c0 : 00000000`00000000 ffffffff`800001bc 00000000`00000008 ffff9c02`92fb9e00 : vgk+0x154f
ffffc188`03a073f0 00000000`00000000 : ffffffff`800001bc 00000000`00000008 ffff9c02`92fb9e00 fffff805`04e29060 : vgk+0x4e32c0
SYMBOL_NAME: vgk+154f
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 154f
FAILURE_BUCKET_ID: AV_vgk!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802175a9a67, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2874
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7166
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: 994
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff802175a9a67
READ_ADDRESS: fffff802179733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8021782a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8021782a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffd6081a606fe0 -- (.trap 0xffffd6081a606fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffffd6081a607250
rdx=ffff870cde261b90 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802175a9a67 rsp=ffffd6081a607170 rbp=ffffd6081a6071e9
r8=ffff870cde261b60 r9=0000000000000003 r10=0000000000000000
r11=ffffd6081a6073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiSwInterruptDispatch+0x27:
fffff802`175a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope
STACK_TEXT:
ffffd608`1a606e98 fffff802`175d41e9 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd608`1a606ea0 fffff802`175d0529 : 00000000`ffff8001 ffff870c`de293f70 ffff870c`00000000 ffff870c`de293f70 : nt!KiBugCheckDispatch+0x69
ffffd608`1a606fe0 fffff802`175a9a67 : 00000000`00000000 ffff870c`de261340 ffff870c`de261340 fffff802`175d3c15 : nt!KiPageFault+0x469
ffffd608`1a607170 fffff802`175c8308 : ffffd608`1a607250 7fff870c`de293f80 ffffd608`1a6072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffd608`1a607250 fffff802`1e38154f : fffff802`1e8632c0 00000000`00000000 ffffffff`80000198 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffd608`1a6073e8 fffff802`1e8632c0 : 00000000`00000000 ffffffff`80000198 00000000`00000008 ffff870c`e043ce10 : vgk+0x154f
ffffd608`1a6073f0 00000000`00000000 : ffffffff`80000198 00000000`00000008 ffff870c`e043ce10 fffff802`17a29060 : vgk+0x4e32c0
SYMBOL_NAME: vgk+154f
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 154f
FAILURE_BUCKET_ID: AV_vgk!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804481a9a67, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2858
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6856
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: 994
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff804481a9a67
READ_ADDRESS: fffff804485733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8044842a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8044842a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff48572a06fe0 -- (.trap 0xfffff48572a06fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=fffff48572a07250
rdx=ffff9f0fd066fb50 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804481a9a67 rsp=fffff48572a07170 rbp=fffff48572a071e9
r8=ffff9f0fd066fb20 r9=0000000000000003 r10=0000000000000000
r11=fffff48572a073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiSwInterruptDispatch+0x27:
fffff804`481a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope
STACK_TEXT:
fffff485`72a06e98 fffff804`481d41e9 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff485`72a06ea0 fffff804`481d0529 : 00000000`ffff8001 ffff9f0f`d06982f0 ffff9f0f`00000000 ffff9f0f`d06982f0 : nt!KiBugCheckDispatch+0x69
fffff485`72a06fe0 fffff804`481a9a67 : 00000000`00000000 ffff9f0f`d066f300 ffff9f0f`d066f300 fffff804`481d3c15 : nt!KiPageFault+0x469
fffff485`72a07170 fffff804`481c8308 : fffff485`72a07250 7fff9f0f`d0698300 fffff485`72a072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
fffff485`72a07250 fffff804`4de0154f : fffff804`4e2e32c0 00000000`00000000 ffffffff`8000019c 00000000`00000008 : nt!KiSwInterrupt+0x368
fffff485`72a073e8 fffff804`4e2e32c0 : 00000000`00000000 ffffffff`8000019c 00000000`00000008 ffff9f0f`d276dd40 : vgk+0x154f
fffff485`72a073f0 00000000`00000000 : ffffffff`8000019c 00000000`00000008 ffff9f0f`d276dd40 fffff804`48629060 : vgk+0x4e32c0
SYMBOL_NAME: vgk+154f
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 154f
FAILURE_BUCKET_ID: AV_vgk!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803479a9a67, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2765
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7111
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: 994
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff803479a9a67
READ_ADDRESS: fffff80347d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80347c2a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff80347c2a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff95086b206fe0 -- (.trap 0xffff95086b206fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffff95086b207250
rdx=ffffe10ae7e64890 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803479a9a67 rsp=ffff95086b207170 rbp=ffff95086b2071e9
r8=ffffe10ae7e64860 r9=0000000000000003 r10=0000000000000000
r11=ffff95086b2073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiSwInterruptDispatch+0x27:
fffff803`479a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope
STACK_TEXT:
ffff9508`6b206e98 fffff803`479d41e9 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff9508`6b206ea0 fffff803`479d0529 : 00000000`ffff8001 ffffe10a`e7e93c50 ffffe10a`00000000 ffffe10a`e7e93c50 : nt!KiBugCheckDispatch+0x69
ffff9508`6b206fe0 fffff803`479a9a67 : 00000000`00000000 ffffe10a`e7e64040 ffffe10a`e7e64040 fffff803`479d3c15 : nt!KiPageFault+0x469
ffff9508`6b207170 fffff803`479c8308 : ffff9508`6b207250 7fffe10a`e7e93c60 ffff9508`6b2072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffff9508`6b207250 fffff803`4b84154f : fffff803`4bd232c0 00000000`00000000 ffffffff`80000284 00000000`00000008 : nt!KiSwInterrupt+0x368
ffff9508`6b2073e8 fffff803`4bd232c0 : 00000000`00000000 ffffffff`80000284 00000000`00000008 ffffe10a`eb043d10 : vgk+0x154f
ffff9508`6b2073f0 00000000`00000000 : ffffffff`80000284 00000000`00000008 ffffe10a`eb043d10 fffff803`47e29060 : vgk+0x4e32c0
SYMBOL_NAME: vgk+154f
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 154f
FAILURE_BUCKET_ID: AV_vgk!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8033c3a9a67, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4546
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7624
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: 994
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8033c3a9a67
READ_ADDRESS: fffff8033c7733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8033c62a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8033c62a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffd10966006fe0 -- (.trap 0xffffd10966006fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffffd10966007250
rdx=ffff88022e47cd90 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8033c3a9a67 rsp=ffffd10966007170 rbp=ffffd109660071e9
r8=ffff88022e47cd60 r9=0000000000000003 r10=0000000000000000
r11=ffffd109660073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiSwInterruptDispatch+0x27:
fffff803`3c3a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope
STACK_TEXT:
ffffd109`66006e98 fffff803`3c3d41e9 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd109`66006ea0 fffff803`3c3d0529 : 00000000`ffff8001 ffff8802`2e4989d0 ffff8802`00000000 ffff8802`2e4989d0 : nt!KiBugCheckDispatch+0x69
ffffd109`66006fe0 fffff803`3c3a9a67 : 00000000`00000000 ffff8802`2e47c540 ffff8802`2e47c540 fffff803`3c3d3c15 : nt!KiPageFault+0x469
ffffd109`66007170 fffff803`3c3c8308 : ffffd109`66007250 ffffd109`660074f0 ffffd109`660072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffd109`66007250 fffff803`42a0154f : fffff803`42f2f9d5 00000000`00000000 ffffffff`80000288 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffd109`660073e8 fffff803`42f2f9d5 : 00000000`00000000 ffffffff`80000288 00000000`00000008 00000000`00000000 : vgk+0x154f
ffffd109`660073f0 00000000`00000000 : ffffffff`80000288 00000000`00000008 00000000`00000000 fffff803`3c829060 : vgk+0x52f9d5
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8033c3a95f6-fffff8033c3a95fb 6 bytes - nt!KiLockExtendedServiceTable+8ee
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff8033c3a99da-fffff8033c3a99df 6 bytes - nt!KiMarkBugCheckRegions+3de (+0x3e4)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff8033c3a9a3a-fffff8033c3a9a3f 6 bytes - nt!KiMarkBugCheckRegions+43e (+0x60)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff8033c3c236a-fffff8033c3c236b 2 bytes - nt!ZwLoadKey3+2a (+0x18930)
[ 84 00:4c 87 ]
fffff8033c3c236d-fffff8033c3c236f 3 bytes - nt!ZwLoadKey3+2d (+0x03)
[ 00 00 00:98 c3 90 ]
fffff8033c3c238a-fffff8033c3c238b 2 bytes - nt!KiBugCheckReturn+16 (+0x1d)
[ 84 00:4c 87 ]
fffff8033c3c238d-fffff8033c3c238f 3 bytes - nt!KiBugCheckReturn+19 (+0x03)
[ 00 00 00:98 c3 90 ]
fffff8033c3c24ba-fffff8033c3c24bb 2 bytes - nt!KeBugCheckEx+12a (+0x12d)
[ 84 00:4c 87 ]
fffff8033c3c24bd-fffff8033c3c24bf 3 bytes - nt!KeBugCheckEx+12d (+0x03)
[ 00 00 00:98 c3 90 ]
fffff8033c3c25ba-fffff8033c3c25bb 2 bytes - nt!KeContextToKframes+fa (+0xfd)
[ 84 00:4c 87 ]
fffff8033c3c25bd-fffff8033c3c25bf 3 bytes - nt!KeContextToKframes+fd (+0x03)
[ 00 00 00:98 c3 90 ]
fffff8033c3c260a-fffff8033c3c260b 2 bytes - nt!KiSaveInitialProcessorControlState+4a (+0x4d)
[ 84 00:4c 87 ]
fffff8033c3c260d-fffff8033c3c260f 3 bytes - nt!KiSaveInitialProcessorControlState+4d (+0x03)
[ 00 00 00:98 c3 90 ]
fffff8033c3c26da-fffff8033c3c26df 6 bytes - nt!KiRestoreProcessorControlState+ca (+0xcd)
[ 66 0f 1f 44 00 00:4c 87 00 98 c3 90 ]
fffff8033c3c285a-fffff8033c3c285b 2 bytes - nt!KiSaveProcessorControlState+17a (+0x180)
[ 84 00:4c 87 ]
fffff8033c3c285d-fffff8033c3c285f 3 bytes - nt!KiSaveProcessorControlState+17d (+0x03)
[ 00 00 00:98 c3 90 ]
fffff8033c3c28da-fffff8033c3c28df 6 bytes - nt!KiRestoreDebugRegisterState+7a (+0x7d)
[ cc 0f 1f 44 00 00:4c 87 00 98 c3 90 ]
fffff8033c3c2a6a-fffff8033c3c2a6b 2 bytes - nt!KiSaveDebugRegisterState+18a (+0x190)
[ 84 00:4c 87 ]
fffff8033c3c2a6d-fffff8033c3c2a6f 3 bytes - nt!KiSaveDebugRegisterState+18d (+0x03)
[ 00 00 00:98 c3 90 ]
fffff8033c3c2a7a-fffff8033c3c2a7f 6 bytes - nt!KeGetCurrentStackPointer+a (+0x0d)
[ cc cc 0f 1f 40 00:4c 87 00 98 c3 90 ]
fffff8033c3c2a8a-fffff8033c3c2a8b 2 bytes - nt!KeResetLegacyFloatingPointState+a (+0x10)
[ 1f 80:4c 87 ]
fffff8033c3c2a8d-fffff8033c3c2a8f 3 bytes - nt!KeResetLegacyFloatingPointState+d (+0x03)
[ 00 00 00:98 c3 90 ]
fffff8033c3c2a9a-fffff8033c3c2a9f 6 bytes - nt!KeSaveLegacyFloatingPointControlWord+a (+0x0d)
[ cc cc 0f 1f 40 00:4c 87 00 98 c3 90 ]
fffff8033c3c2aba-fffff8033c3c2abb 2 bytes - nt!KeRestoreLegacyFloatingPointControlWord+1a (+0x20)
[ 84 00:4c 87 ]
fffff8033c3c2abd-fffff8033c3c2abf 3 bytes - nt!KeRestoreLegacyFloatingPointControlWord+1d (+0x03)
[ 00 00 00:98 c3 90 ]
fffff8033c3c2d7a-fffff8033c3c2d7f 6 bytes - nt!NtContinue+2ba (+0x2bd)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
93 errors : !nt (fffff8033c3a95f6-fffff8033c3c2d7f)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff805291a9a67, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2624
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6688
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: 994
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff805291a9a67
READ_ADDRESS: fffff805295733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8052942a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8052942a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffb08bb5e06fe0 -- (.trap 0xffffb08bb5e06fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffffb08bb5e07250
rdx=ffff818de4c7cd90 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805291a9a67 rsp=ffffb08bb5e07170 rbp=ffffb08bb5e071e9
r8=ffff818de4c7cd60 r9=0000000000000003 r10=0000000000000000
r11=ffffb08bb5e073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiSwInterruptDispatch+0x27:
fffff805`291a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope
STACK_TEXT:
ffffb08b`b5e06e98 fffff805`291d41e9 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffb08b`b5e06ea0 fffff805`291d0529 : 00000000`ffff8001 ffff818d`e4c98cf0 ffff818d`00000000 ffff818d`e4c98cf0 : nt!KiBugCheckDispatch+0x69
ffffb08b`b5e06fe0 fffff805`291a9a67 : 00000000`00000000 ffff818d`e4c7c540 ffff818d`e4c7c540 fffff805`291d3c15 : nt!KiPageFault+0x469
ffffb08b`b5e07170 fffff805`291c8308 : ffffb08b`b5e07250 7fff818d`e4c98d00 ffffb08b`b5e072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffb08b`b5e07250 fffff805`2be0154f : fffff805`2c2e32c0 00000000`00000000 ffffffff`800002a4 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffb08b`b5e073e8 fffff805`2c2e32c0 : 00000000`00000000 ffffffff`800002a4 00000000`00000008 ffff818d`e5e89d40 : vgk+0x154f
ffffb08b`b5e073f0 00000000`00000000 : ffffffff`800002a4 00000000`00000008 ffff818d`e5e89d40 fffff805`29629060 : vgk+0x4e32c0
SYMBOL_NAME: vgk+154f
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 154f
FAILURE_BUCKET_ID: AV_vgk!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803441a9a67, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3796
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9923
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: 994
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff803441a9a67
READ_ADDRESS: fffff803445733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8034442a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8034442a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffea0c71fe7000 -- (.trap 0xffffea0c71fe7000)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000022000 rbx=0000000000000000 rcx=ffffea0c71fe7270
rdx=ffffd503e4dd7890 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803441a9a67 rsp=ffffea0c71fe7190 rbp=ffffea0c71fe7209
r8=ffffd503e4dd7860 r9=0000000000000003 r10=0000000000000000
r11=ffffea0c71fe73e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KiSwInterruptDispatch+0x27:
fffff803`441a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope
STACK_TEXT:
ffffea0c`71fe6eb8 fffff803`441d41e9 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffea0c`71fe6ec0 fffff803`441d0529 : 00000000`ffff8001 ffffd503`da8931b0 ffffd503`00000000 ffffd503`da8931b0 : nt!KiBugCheckDispatch+0x69
ffffea0c`71fe7000 fffff803`441a9a67 : 00000000`00000000 ffffd503`e4dd7040 ffffd503`e4dd7040 fffff803`441d3c15 : nt!KiPageFault+0x469
ffffea0c`71fe7190 fffff803`441c8308 : ffffea0c`71fe7270 ffffea0c`71fe7510 ffffea0c`71fe72f0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffea0c`71fe7270 fffff803`44c0154f : fffff803`4512f9d5 00000000`00000000 ffffffff`80003454 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffea0c`71fe7408 fffff803`4512f9d5 : 00000000`00000000 ffffffff`80003454 00000000`00000008 00000000`00000000 : vgk+0x154f
ffffea0c`71fe7410 00000000`00000000 : ffffffff`80003454 00000000`00000008 00000000`00000000 fffff803`44629060 : vgk+0x52f9d5
SYMBOL_NAME: vgk+154f
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 154f
FAILURE_BUCKET_ID: AV_vgk!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803791a9a67, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2890
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7349
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: 994
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff803791a9a67
READ_ADDRESS: fffff803795733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8037942a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8037942a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff858c73406fe0 -- (.trap 0xffff858c73406fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffff858c73407250
rdx=ffffc584bb67cb50 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803791a9a67 rsp=ffff858c73407170 rbp=ffff858c734071e9
r8=ffffc584bb67cb20 r9=0000000000000003 r10=0000000000000000
r11=ffff858c734073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiSwInterruptDispatch+0x27:
fffff803`791a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope
STACK_TEXT:
ffff858c`73406e98 fffff803`791d41e9 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff858c`73406ea0 fffff803`791d0529 : 00000000`ffff8001 ffffc584`bb698430 ffffc584`00000000 ffffc584`bb698430 : nt!KiBugCheckDispatch+0x69
ffff858c`73406fe0 fffff803`791a9a67 : 00000000`00000000 ffffc584`bb67c300 ffffc584`bb67c300 fffff803`791d3c15 : nt!KiPageFault+0x469
ffff858c`73407170 fffff803`791c8308 : ffff858c`73407250 7fffc584`bb698440 ffff858c`734072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffff858c`73407250 fffff803`7cc0154f : fffff803`7d0e32c0 00000000`00000000 ffffffff`80000278 00000000`00000008 : nt!KiSwInterrupt+0x368
ffff858c`734073e8 fffff803`7d0e32c0 : 00000000`00000000 ffffffff`80000278 00000000`00000008 ffffc584`bd508dc0 : vgk+0x154f
ffff858c`734073f0 00000000`00000000 : ffffffff`80000278 00000000`00000008 ffffc584`bd508dc0 fffff803`79629060 : vgk+0x4e32c0
SYMBOL_NAME: vgk+154f
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 154f
FAILURE_BUCKET_ID: AV_vgk!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80538fa9a67, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5015
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9780
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: 994
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80538fa9a67
READ_ADDRESS: fffff805393733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8053922a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8053922a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffb6814e806fe0 -- (.trap 0xffffb6814e806fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffffb6814e807250
rdx=ffffd001f807cd90 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80538fa9a67 rsp=ffffb6814e807170 rbp=ffffb6814e8071e9
r8=ffffd001f807cd60 r9=0000000000000003 r10=0000000000000000
r11=ffffb6814e8073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiSwInterruptDispatch+0x27:
fffff805`38fa9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope
STACK_TEXT:
ffffb681`4e806e98 fffff805`38fd41e9 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffb681`4e806ea0 fffff805`38fd0529 : 00000000`ffff8001 ffffd001`f8098d90 ffffd001`00000000 ffffd001`f8098d90 : nt!KiBugCheckDispatch+0x69
ffffb681`4e806fe0 fffff805`38fa9a67 : 00000000`00000000 ffffd001`f807c540 ffffd001`f807c540 fffff805`38fd3c15 : nt!KiPageFault+0x469
ffffb681`4e807170 fffff805`38fc8308 : ffffb681`4e807250 7fffd001`f8098da0 ffffb681`4e8072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffb681`4e807250 fffff805`3cc0154f : fffff805`3d0e32c0 00000000`00000000 ffffffff`80000190 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffb681`4e8073e8 fffff805`3d0e32c0 : 00000000`00000000 ffffffff`80000190 00000000`00000008 ffffd001`fb5d2dc0 : vgk+0x154f
ffffb681`4e8073f0 00000000`00000000 : ffffffff`80000190 00000000`00000008 ffffd001`fb5d2dc0 fffff805`39429060 : vgk+0x4e32c0
SYMBOL_NAME: vgk+154f
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 154f
FAILURE_BUCKET_ID: AV_vgk!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}
Followup: MachineOwner
---------