*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
extents for the thread.
Arg2: ffff9c80b0739ff0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff9c80b0739f48, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 4
BUGCHECK_P2: ffff9c80b0739ff0
BUGCHECK_P3: ffff9c80b0739f48
BUGCHECK_P4: 0
TRAP_FRAME: ffff9c80b0739ff0 -- (.trap 0xffff9c80b0739ff0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff818ca06be000 rbx=0000000000000000 rcx=0000000000000004
rdx=ffff818ca06c4000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8023aa4f1df rsp=ffff9c80b073a180 rbp=ffff9c80b073a6f0
r8=ffff818ca06c4000 r9=ffff9c80b073a700 r10=ffff9c80b0725440
r11=ffffd0811a2c8f90 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!RtlpGetStackLimitsEx+0x12ea53:
fffff802`3aa4f1df cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff9c80b0739f48 -- (.exr 0xffff9c80b0739f48)
ExceptionAddress: fffff8023aa4f1df (nt!RtlpGetStackLimitsEx+0x000000000012ea53)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK
CPU_COUNT: 10
CPU_MHZ: e10
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: System
CURRENT_IRQL: 0
DEFAULT_BUCKET_ID: FAIL_FAST_INCORRECT_STACK
WATSON_BKT_EVENT: BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000004
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-07-2019 16:47:48.0650
ANALYSIS_VERSION: 10.0.18362.1 x86fre
BAD_STACK_POINTER: ffff9c80b0739cc8
LAST_CONTROL_TRANSFER: from fffff8023a9d32e9 to fffff8023a9c14e0
STACK_TEXT:
ffff9c80`b0739cc8 fffff802`3a9d32e9 : 00000000`00000139 00000000`00000004 ffff9c80`b0739ff0 ffff9c80`b0739f48 : nt!KeBugCheckEx
ffff9c80`b0739cd0 fffff802`3a9d3710 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9c80`b0739e10 fffff802`3a9d1aa5 : fffff802`3a927368 fffff802`3ac0ec84 ffff9c80`b073a7d0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff9c80`b0739ff0 fffff802`3aa4f1df : fffff802`3ac0edc4 00000000`00000000 ffff9c80`b073a1f0 fffff802`3a9c3730 : nt!KiRaiseSecurityCheckFailure+0x325
ffff9c80`b073a180 fffff802`3aa2e919 : ffff818c`a06c1a00 fffff802`3ac0edc4 ffff9c80`b073a6f0 00000000`00000003 : nt!RtlpGetStackLimitsEx+0x12ea53
ffff9c80`b073a1b0 fffff802`3a8c795e : ffff818c`a06c3508 ffff9c80`b073ae30 ffff818c`a06c3508 ffff9c80`b0714180 : nt!RtlDispatchException+0x16b9f9
ffff9c80`b073a900 fffff802`3a9c2362 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
ffff9c80`b073afb0 fffff802`3a9c2330 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffff818c`a06c33c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
THREAD_SHA1_HASH_MOD_FUNC: 9be8e2d65604a89c1f9c8df1b4abc21efb751398
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: dee98a898510a409a322c767f1045877c16cbf70
THREAD_SHA1_HASH_MOD: 9f457f347057f10e1df248e166a3e95e6570ecfe
FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff802`3a9d3710 c644242000 mov byte ptr [rsp+20h],0
FAULT_INSTR_CODE: 202444c6
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiFastFailDispatch+d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4efcf7a9
IMAGE_VERSION: 10.0.18362.476
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
PRIMARY_PROBLEM_CLASS: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
TARGET_TIME: 2019-12-06T20:14:58.000Z
OSBUILD: 18362
OSSERVICEPACK: 476
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2011-12-30 02:28:41
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 29ce
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_missing_gsframe_stackptr_error_nt!kifastfaildispatch
FAILURE_ID_HASH: {7b0febb5-6007-4f2b-3d38-57fef278d8d5}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 000000000000000d, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 0
BUGCHECK_P2: d
BUGCHECK_P3: 8
BUGCHECK_P4: 0
READ_ADDRESS: fffff80236f733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000000
CURRENT_IRQL: d
FAULTING_IP:
+0
00000000`00000000 ?? ???
PROCESS_NAME: System
CPU_COUNT: 10
CPU_MHZ: e10
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-07-2019 16:47:41.0698
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffff9a018cbdfdd0 -- (.trap 0xffff9a018cbdfdd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff7c10021e001 rbx=0000000000000000 rcx=0000000000000286
rdx=0000000000000027 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=ffff9a018cbdff60 rbp=ffffee072c4d1660
r8=000000000000fc01 r9=0000000000000000 r10=fffff80236a1ec90
r11=ffff9a018cbdff00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
00000000`00000000 ?? ???
Resetting default scope
IP_IN_FREE_BLOCK: 0
LAST_CONTROL_TRANSFER: from fffff80236bd32e9 to fffff80236bc14e0
FAILED_INSTRUCTION_ADDRESS:
+0
00000000`00000000 ?? ???
STACK_TEXT:
ffff9a01`8cbdfc88 fffff802`36bd32e9 : 00000000`0000000a 00000000`00000000 00000000`0000000d 00000000`00000008 : nt!KeBugCheckEx
ffff9a01`8cbdfc90 fffff802`36bcf62b : 00000000`00000053 ffffee07`2c4d1660 00000000`00000246 fffff802`374b7d97 : nt!KiBugCheckDispatch+0x69
ffff9a01`8cbdfdd0 00000000`00000000 : ffffb787`344cc800 00000000`00000000 00000000`00000000 ffff498d`6702171b : nt!KiPageFault+0x46b
THREAD_SHA1_HASH_MOD_FUNC: bf99962f16aee8a6a536cfcc5454c0cd4db15ac9
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 497aaf2f8d4f907c0c9bce6ce025c930b885e2b8
THREAD_SHA1_HASH_MOD: 2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b
FOLLOWUP_IP:
nt!KiPageFault+46b
fffff802`36bcf62b 33c0 xor eax,eax
FAULT_INSTR_CODE: ffb0c033
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+46b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4efcf7a9
IMAGE_VERSION: 10.0.18362.476
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 46b
FAILURE_BUCKET_ID: AV_CODE_AV_NULL_IP_nt!KiPageFault
BUCKET_ID: AV_CODE_AV_NULL_IP_nt!KiPageFault
PRIMARY_PROBLEM_CLASS: AV_CODE_AV_NULL_IP_nt!KiPageFault
TARGET_TIME: 2019-12-06T20:32:47.000Z
OSBUILD: 18362
OSSERVICEPACK: 476
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2011-12-30 02:28:41
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 6121
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_code_av_null_ip_nt!kipagefault
FAILURE_ID_HASH: {4ce35ff9-c5cf-d66d-0323-0f05e33f6692}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000096, The exception code that was not handled
Arg2: fffff805799fa8bd, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000096
BUGCHECK_P2: fffff805799fa8bd
BUGCHECK_P3: 0
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000096 - <Unable to get error code text>
FAULTING_IP:
amdppm!C1Idle+2d
fffff805`799fa8bd 0f30 wrmsr
BUGCHECK_STR: 0x1E_c0000096
CPU_COUNT: 10
CPU_MHZ: e10
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-07-2019 16:47:44.0750
ANALYSIS_VERSION: 10.0.18362.1 x86fre
EXCEPTION_RECORD: ffffb50b5a844a28 -- (.exr 0xffffb50b5a844a28)
ExceptionAddress: 0000000000000003
ExceptionCode: 00000000
ExceptionFlags: 00000003
NumberParameters: 1
Parameter[0]: 0000000100060000
LAST_CONTROL_TRANSFER: from fffff805676a653e to fffff805675c14e0
STACK_TEXT:
fffffb8a`c70c2598 fffff805`676a653e : 00000000`0000001e ffffffff`c0000096 fffff805`799fa8bd 00000000`00000000 : nt!KeBugCheckEx
fffffb8a`c70c25a0 fffff805`675ca312 : fffff805`67911000 fffff805`67400000 0005e560`00ab6000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22
fffffb8a`c70c25e0 fffff805`674c33c5 : 00000000`00000000 00000000`00000000 fffffb8a`c70c2b50 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
fffffb8a`c70c2610 fffff805`674c795e : fffffb8a`c70c3548 fffffb8a`c70c3290 fffffb8a`c70c3548 ffffc701`48b23180 : nt!RtlDispatchException+0x4a5
fffffb8a`c70c2d60 fffff805`675d341d : ffffb50b`5a844a28 00000000`000000c8 00000000`00000000 ffffb50b`5a841010 : nt!KiDispatchException+0x16e
fffffb8a`c70c3410 fffff805`675cf1a2 : ffffb50b`57acbd00 00000000`00000000 00000000`00000000 00001f80`00eb0000 : nt!KiExceptionDispatch+0x11d
fffffb8a`c70c35f0 fffff805`799fa8bd : 00000000`00000000 ffffb50b`5ab98340 00000000`00000002 ffffb50b`57bf64c0 : nt!KiGeneralProtectionFault+0x322
fffffb8a`c70c3780 fffff805`799fa863 : ffffb50b`606f7060 00000000`00989680 ffffc701`48b23100 0000005c`1c6aa7e3 : amdppm!C1Idle+0x2d
fffffb8a`c70c37b0 fffff805`67421e7c : 00000000`0000001e 00000000`00000000 ffffb50b`5fbbe010 00000000`0000001e : amdppm!AcpiCStateIdleExecute+0x23
fffffb8a`c70c37e0 fffff805`674215ce : 00000000`00000001 3ff67930`b17f0000 00000000`00000001 00000000`00000000 : nt!PpmIdleExecuteTransition+0x70c
fffffb8a`c70c3b00 fffff805`675c4fe8 : ffffffff`00000000 ffffc701`48b23180 ffffb50b`61b2c080 00000000`000001f8 : nt!PoIdle+0x36e
fffffb8a`c70c3c60 00000000`00000000 : fffffb8a`c70c4000 fffffb8a`c70be000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48
THREAD_SHA1_HASH_MOD_FUNC: df09734c4143233ed78c1447192041dd7b715337
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: b82f34663e2f9536d85e66159c854528e3f17c56
THREAD_SHA1_HASH_MOD: a60d30349ae0db9fd556e9bf02f1bd0e3c94e0b6
FOLLOWUP_IP:
amdppm!C1Idle+2d
fffff805`799fa8bd 0f30 wrmsr
FAULT_INSTR_CODE: 3eb300f
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: amdppm!C1Idle+2d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: amdppm
IMAGE_NAME: amdppm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.387
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2d
FAILURE_BUCKET_ID: 0x1E_c0000096_amdppm!C1Idle
BUCKET_ID: 0x1E_c0000096_amdppm!C1Idle
PRIMARY_PROBLEM_CLASS: 0x1E_c0000096_amdppm!C1Idle
TARGET_TIME: 2019-12-06T19:57:52.000Z
OSBUILD: 18362
OSSERVICEPACK: 476
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2011-12-30 02:28:41
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 80e5
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000096_amdppm!c1idle
FAILURE_ID_HASH: {f14e7d56-f10d-e495-44a0-dba70772f8da}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00001802590275c8, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8025a3542f9, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 1802590275c8
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8025a3542f9
READ_ADDRESS: fffff8025a5733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
00001802590275c8
CURRENT_IRQL: d
FAULTING_IP:
nt!_guard_retpoline_indirect_rax+19
fffff802`5a3542f9 4d0fa313 bt qword ptr [r11],r10
CPU_COUNT: 10
CPU_MHZ: e10
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-07-2019 16:47:52.0212
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffbc05f0aed410 -- (.trap 0xffffbc05f0aed410)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80259f766c0 rbx=0000000000000000 rcx=ffffc101f90c0e00
rdx=0000026100000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8025a3542f9 rsp=ffffbc05f0aed5a8 rbp=ffffbc05f0aed660
r8=000000000000b701 r9=0000000000000000 r10=0000fffff80259f7
r11=fffff8025a022a90 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz ac pe nc
nt!_guard_retpoline_indirect_rax+0x19:
fffff802`5a3542f9 4d0fa313 bt qword ptr [r11],r10 ds:fffff802`5a022a90=f72b00002e74b389
Resetting default scope
EXCEPTION_RECORD: fffff802677da8aa -- (.exr 0xfffff802677da8aa)
ExceptionAddress: 0f03eb300f000000
ExceptionCode: 1374db85
ExceptionFlags: 48d38b48
NumberParameters: -2092373842
Parameter[0]: 5340cccccccccccc
Parameter[1]: 8b4cda8b20ec8348
Parameter[2]: 33c0330974d285c1
Parameter[3]: 854d300f48488dd2
Parameter[4]: c3e8c88b490874c0
Parameter[5]: 00003676e8ffff78
Parameter[6]: 48d38b481374db85
Parameter[7]: 48b920eac148c38b
Parameter[8]: 0f03eb300f000000
Parameter[9]: c35b20c48348e8ae
Parameter[10]: 8948cccccccccccc
Parameter[11]: 102474894808245c
Parameter[12]: 8bc03320ec834857
Parameter[13]: 48000092f30587da
Parameter[14]: 484b7501f883f98b
LAST_CONTROL_TRANSFER: from fffff8025a1d32e9 to fffff8025a1c14e0
STACK_TEXT:
ffffbc05`f0aed2c8 fffff802`5a1d32e9 : 00000000`0000000a 00001802`590275c8 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffbc05`f0aed2d0 fffff802`5a1cf62b : 0000002c`fbe6c5d8 00000001`b699de88 00000000`0000000f ffffc101`fbe59010 : nt!KiBugCheckDispatch+0x69
ffffbc05`f0aed410 fffff802`5a3542f9 : fffff802`59f602ca 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x46b
ffffbc05`f0aed5a8 fffff802`59f602ca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!_guard_retpoline_indirect_rax+0x19
ffffbc05`f0aed5b0 fffff802`5a1c34f4 : 00000000`00000000 ffffbc05`f0aed660 ffffc101`f90c0e00 00000000`00000000 : hal!HalPerformEndOfInterrupt+0x1a
ffffbc05`f0aed5e0 fffff802`677ddf72 : fffff802`677da8aa 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x44
ffffbc05`f0aed778 fffff802`677da8aa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : amdppm!C1Halt+0x2
ffffbc05`f0aed780 fffff802`677da863 : ffffc102`0106d820 00000000`00989680 ffffd581`04723100 00000261`928f8048 : amdppm!C1Idle+0x1a
ffffbc05`f0aed7b0 fffff802`5a021e7c : 00000000`00000005 00000000`00000000 ffffc101`ff911010 00000000`00000005 : amdppm!AcpiCStateIdleExecute+0x23
ffffbc05`f0aed7e0 fffff802`5a0215ce : 00000000`00000003 00000000`00000002 ffffc101`ff911100 00000000`00000008 : nt!PpmIdleExecuteTransition+0x70c
ffffbc05`f0aedb00 fffff802`5a1c4fe8 : ffffffff`00000000 ffffd581`04723180 ffffc102`08905080 00000000`00000a68 : nt!PoIdle+0x36e
ffffbc05`f0aedc60 00000000`00000000 : ffffbc05`f0aee000 ffffbc05`f0ae8000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48
THREAD_SHA1_HASH_MOD_FUNC: 25f3cf9317170b1fd8b0a6a89e673450e50d794b
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3dd857807a710cf50e8f4a73cfc51fdc527e0b38
THREAD_SHA1_HASH_MOD: eb73543b9c0dbddc1ffc116fda6eded5338b33b8
FOLLOWUP_IP:
nt!_guard_retpoline_indirect_rax+19
fffff802`5a3542f9 4d0fa313 bt qword ptr [r11],r10
FAULT_INSTR_CODE: 13a30f4d
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!_guard_retpoline_indirect_rax+19
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4efcf7a9
IMAGE_VERSION: 10.0.18362.476
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 19
FAILURE_BUCKET_ID: AV_nt!_guard_retpoline_indirect_rax
BUCKET_ID: AV_nt!_guard_retpoline_indirect_rax
PRIMARY_PROBLEM_CLASS: AV_nt!_guard_retpoline_indirect_rax
TARGET_TIME: 2019-12-06T20:55:36.000Z
OSBUILD: 18362
OSSERVICEPACK: 476
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2011-12-30 02:28:41
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 48f7
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!_guard_retpoline_indirect_rax
FAILURE_ID_HASH: {ecb1e4bb-da69-101a-7ebc-fefbb5cc154a}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffffffffffa9, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803373c3580, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffffffffa9
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: fffff803373c3580
READ_ADDRESS: fffff803377733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffa9
CURRENT_IRQL: d
FAULTING_IP:
nt!KiInterruptDispatchNoLockNoEtw+d0
fffff803`373c3580 0fb64da9 movzx ecx,byte ptr [rbp-57h]
CPU_COUNT: 10
CPU_MHZ: e10
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-07-2019 16:47:56.0133
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: fffff50ddf8c3450 -- (.trap 0xfffff50ddf8c3450)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000b88 rbx=0000000000000000 rcx=ffff8c01c5523180
rdx=ffff8c01c5528d00 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803373c3580 rsp=fffff50ddf8c35e0 rbp=0000000000000000
r8=0000000000000678 r9=0000000000000000 r10=0000fffff80337cc
r11=ffff7bfa0c200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!KiInterruptDispatchNoLockNoEtw+0xd0:
fffff803`373c3580 0fb64da9 movzx ecx,byte ptr [rbp-57h] ss:0018:ffffffff`ffffffa9=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff803373d32e9 to fffff803373c14e0
STACK_TEXT:
fffff50d`df8c3308 fffff803`373d32e9 : 00000000`0000000a ffffffff`ffffffa9 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
fffff50d`df8c3310 fffff803`373cf62b : ffff396c`151b5bc2 fffff803`37263350 ffffc70b`7de32000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff50d`df8c3450 fffff803`373c3580 : 00000000`00000000 00000000`00000000 ffffc70b`7acd0d00 00000000`00000001 : nt!KiPageFault+0x46b
fffff50d`df8c35e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xd0
THREAD_SHA1_HASH_MOD_FUNC: f19b917bdc8ec225dc20eaf3d5d2796b819ae012
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d619259f9814ba0695f6a0888471d2925dd924e4
THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791
FOLLOWUP_IP:
nt!KiInterruptDispatchNoLockNoEtw+d0
fffff803`373c3580 0fb64da9 movzx ecx,byte ptr [rbp-57h]
FAULT_INSTR_CODE: a94db60f
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiInterruptDispatchNoLockNoEtw+d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4efcf7a9
IMAGE_VERSION: 10.0.18362.476
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: AV_nt!KiInterruptDispatchNoLockNoEtw
BUCKET_ID: AV_nt!KiInterruptDispatchNoLockNoEtw
PRIMARY_PROBLEM_CLASS: AV_nt!KiInterruptDispatchNoLockNoEtw
TARGET_TIME: 2019-12-06T20:42:23.000Z
OSBUILD: 18362
OSSERVICEPACK: 476
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2011-12-30 02:28:41
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 841e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!kiinterruptdispatchnolocknoetw
FAILURE_ID_HASH: {bcca90df-4502-e14c-7f58-c4a4248ee927}
Followup: MachineOwner
---------