*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff38000000008, memory referenced.
Arg2: 000000000000000f, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8061c02605c, address which referenced memory.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 233.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 3524.
Key : Analysis.IO.Other.Mb
Value: 20.
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 23.
Key : Analysis.Init.CPU.mSec
Value: 203.
Key : Analysis.Init.Elapsed.mSec
Value: 79461.
Key : Analysis.Memory.CommitPeak.Mb
Value: 89.
Key : Bugcheck.Code.DumpHeader
Value: 0xa.
Key : Bugcheck.Code.Register
Value: 0xa.
Key : Dump.Attributes.AsUlong
Value: 1808.
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
FILE_IN_CAB: 031323-7921-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b.
DUMP_FILE_ATTRIBUTES: 0x1808.
Kernel Generated Triage Dump.
BUGCHECK_CODE: a
BUGCHECK_P1: fffff38000000008.
BUGCHECK_P2: f
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8061c02605c.
READ_ADDRESS: fffff8061cb1c468: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
fffff38000000008.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System.
TRAP_FRAME: ffff93018c954480 -- (.trap 0xffff93018c954480)
Unable to read trap frame at ffff9301`8c954480
STACK_TEXT:
ffffba01`5466b8f8 fffff806`1c23e9a9 : 00000000`0000000a fffff380`00000008 00000000`0000000f 00000000`00000000 : nt!KeBugCheckEx
ffffba01`5466b900 fffff806`1c23a034 : 00001388`00000000 fffff806`0005e992 ffff9301`8910b030 00000000`00008000 : nt!KiBugCheckDispatch+0x69
ffffba01`5466ba40 fffff806`1c02605c : 00000000`0000000c 00000000`00000000 ffffba01`54651180 0000000e`18a2cd00 : nt!KiPageFault+0x474
ffffba01`5466bbd0 fffff806`1c024a8e : 00000000`00000000 ffffba01`54651180 ffffffff`ffffffff 00000000`00000000 : nt!KiUpdateTime+0xbdc
ffffba01`5466be90 fffff806`1c02429a : fffff806`1ca5fdf8 ffff9301`835452b0 ffff9301`835452b0 00000000`00000000 : nt!KeClockInterruptNotify+0x3de
ffffba01`5466bf40 fffff806`1c1453fe : 0000000e`18a67c6a ffff9301`83545200 ffffba01`54651180 00000000`37d7eac0 : nt!HalpTimerClockInterrupt+0x10a
ffffba01`5466bf70 fffff806`1c22b4da : ffffe30d`9885fa70 ffff9301`83545200 ffff9301`8c954480 00000000`000004c0 : nt!KiCallInterruptServiceRoutine+0x19e
ffffba01`5466bfb0 fffff806`1c22bd47 : 0000000e`18a67783 00000000`00000000 0000000e`18a36981 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffe30d`9885f9f0 fffff806`1c22e13a : 00000000`00000000 ffff9301`83602080 ffff9301`8c954480 ffff9301`9a2e0080 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffe30d`9885fb80 00000000`00000000 : ffffe30d`98860000 ffffe30d`98859000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
SYMBOL_NAME: nt!KiUpdateTime+bdc
MODULE_NAME: nt.
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.1344
STACK_COMMAND: .cxr; .ecxr ; kb.
BUCKET_ID_FUNC_OFFSET: bdc.
FAILURE_BUCKET_ID: AV_nt!KiUpdateTime
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {edeb9661-cfeb-6c16-cbb5-a5877e23fee7}
Followup: MachineOwner.
---------