*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff920698a0f370, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8051d0f7c7f, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 625
Key : Analysis.Elapsed.mSec
Value: 6235
Key : Analysis.IO.Other.Mb
Value: 3
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 3
Key : Analysis.Init.CPU.mSec
Value: 62
Key : Analysis.Init.Elapsed.mSec
Value: 6222
Key : Analysis.Memory.CommitPeak.Mb
Value: 147
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Failure.Bucket
Value: AV_nt!KiAcquireKobjectLockSafe
Key : Failure.Hash
Value: {87978629-0a82-b7ad-caa7-eb2c5ba684a3}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1417df84
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffff920698a0f370
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8051d0f7c7f
FILE_IN_CAB: 061823-18140-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
WRITE_ADDRESS: fffff8051db1c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff920698a0f370
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: msedge.exe
TRAP_FRAME: ffffea07f5b2ef70 -- (.trap 0xffffea07f5b2ef70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff920698a0f370
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8051d0f7c7f rsp=ffffea07f5b2f100 rbp=ffffea07f5b2f499
r8=0000000000000000 r9=ffffea07f5b2f528 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiAcquireKobjectLockSafe+0xf:
fffff805`1d0f7c7f f00fba2907 lock bts dword ptr [rcx],7 ds:ffff9206`98a0f370=00060000
Resetting default scope
STACK_TEXT:
ffffea07`f5b2ee28 fffff805`1d2418a9 : 00000000`0000000a ffff9206`98a0f370 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffea07`f5b2ee30 fffff805`1d23cf34 : 00000000`00000001 ffffea07`f5b2f520 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69
ffffea07`f5b2ef70 fffff805`1d0f7c7f : 00000000`00000000 fffff805`1d039e5a 00000000`00000010 00000000`00050286 : nt!KiPageFault+0x474
ffffea07`f5b2f100 fffff805`1d039ebb : ffffd907`14cc9080 ffff9206`98a0f370 00000000`00000000 00000000`00000000 : nt!KiAcquireKobjectLockSafe+0xf
ffffea07`f5b2f130 fffff805`1d3b7f32 : 00000000`00000001 ffffea07`f5b2f499 00000000`00000000 00000000`00000000 : nt!KeSetEvent+0x6b
ffffea07`f5b2f1c0 fffff805`1d13b2eb : 00000000`00000000 00000000`00000001 ffffd907`14cc9080 ffff9206`8ad53b50 : nt!PsDispatchIumService+0x96e
ffffea07`f5b2f430 fffff805`1d758a17 : 00000001`40000340 ffffd907`274ac0c0 ffffd907`274ac518 00000000`000039b4 : nt!VslpEnterIumSecureMode+0x287
ffffea07`f5b2f500 fffff805`1d3894f1 : ffffd907`284680a0 00000000`000000a0 ffffd907`284680a0 ffffd907`284680a0 : nt!VslRundownSecureProcess+0x47
ffffea07`f5b2f5b0 fffff805`1d6caa95 : ffffffff`ffffffff 00000000`00000001 ffffd907`274ac0c0 fffff805`1d5031e8 : nt!KeRundownSecureProcess+0x15
ffffea07`f5b2f5e0 fffff805`1d504fea : ffffd907`274ac0c0 ffff9206`7d83e060 ffffea07`f5b2f809 00000000`00000000 : nt!PspRundownSingleProcess+0x1ed9fd
ffffea07`f5b2f670 fffff805`1d5062b8 : 00000000`00000000 00000000`00000001 ffffd907`14cc90f4 00000028`ffdc0000 : nt!PspExitThread+0x64e
ffffea07`f5b2f770 fffff805`1d11350d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffea07`f5b2f7b0 fffff805`1d232420 : 00000000`00000001 ffffea07`f5b2f870 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x47d
ffffea07`f5b2f870 fffff805`1d24108f : 00000000`00000000 00000000`00000000 00000000`00000000 fffff805`1d5a50a0 : nt!KiInitiateUserApc+0x70
ffffea07`f5b2f9b0 00007ffa`a751acf4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000028`8a7ff968 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`a751acf4
SYMBOL_NAME: nt!KiAcquireKobjectLockSafe+f
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.1848
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: f
FAILURE_BUCKET_ID: AV_nt!KiAcquireKobjectLockSafe
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {87978629-0a82-b7ad-caa7-eb2c5ba684a3}
Followup: MachineOwner
---------