INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 000000000000000b, The hibernation file is too small.
Arg2: 00000000bd039000, Size of the hibernation file.
Arg3: 0000000000000003, HIBERFILE_PROGRESS_SECURE_RANGES
Arg4: 00000000272c0000
Debugging Details:
------------------
fffff800030390e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800030f4300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2343
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 23069
Key : Analysis.Memory.CommitPeak.Mb
Value: 65
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2020-06-10T19:07:00Z
Key : WER.OS.Version
Value: 7.1.7601.24557
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a0
BUGCHECK_P1: b
BUGCHECK_P2: bd039000
BUGCHECK_P3: 3
BUGCHECK_P4: 272c0000
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff880`09a1e078 fffff800`030fd043 : 00000000`000000a0 00000000`0000000b 00000000`bd039000 00000000`00000003 : nt!KeBugCheckEx
fffff880`09a1e080 fffff800`030fd6eb : fffffa80`09e69e70 00000000`0000e000 fffffa80`09e69e70 00000000`000088e0 : nt!PopWriteHiberPages+0xa3
fffff880`09a1e280 fffff800`030fd855 : 000010f6`03af5b60 fffff880`09a1e588 fffff880`0000e000 00000000`00000010 : nt!PopAddPagesToCompressedPageSet+0x1eb
fffff880`09a1e310 fffff800`030fec62 : fffff880`0bc78000 fffff880`09a1e588 00000000`00000020 00000000`000000df : nt!PopBufferCompressedPageSet+0xd5
fffff880`09a1e380 fffff800`030ff49a : fffffa80`00007bc2 fffff880`0b628000 00000000`000bd02b 00000000`000088e0 : nt!PopWriteHiberImage+0x3d2
fffff880`09a1e570 fffff800`02e1406e : 00000000`00008fb4 00000000`00000000 fffff800`030ff2b0 00000000`00000000 : nt!PopSaveHiberContext+0x1ea
fffff880`09a1e720 fffff800`03105d6a : 00000000`00001406 00000000`00000000 00000000`00000000 fffff880`09a1e8c0 : hal!HaliAcpiSleep+0x18f
fffff880`09a1e790 fffff800`03105e0f : 00000000`00000000 fffffa80`09e69e70 fffff800`03073240 00000000`03100a30 : nt!PopHandleNextState+0x12a
fffff880`09a1e7e0 fffff800`0310b4b0 : 00000000`00000005 00000000`0023ae2d 00000000`00000000 fffff880`09a1e960 : nt!PopIssueNextState+0x1f
fffff880`09a1e810 fffff800`0310b914 : 00000000`00000000 00000000`00158f44 00000000`00000000 00000000`00000001 : nt!PopInvokeSystemStateHandler+0x3c0
fffff880`09a1e9d0 fffff800`03107754 : ffffffff`ffffffff ffffffff`ffffffff 00000000`00158f44 00000000`00000000 : nt!PopEndMirroring+0x84
fffff880`09a1eaa0 fffff800`0310bc95 : fffff880`09a1ebc0 fffff880`00000007 00000000`00000000 00000000`00000007 : nt!MmDuplicateMemory+0xb64
fffff880`09a1eb90 fffff800`03194e68 : fffff880`0357b180 fffffa80`00000002 00000000`00000000 00000000`00000000 : nt!PopTransitionToSleep+0xd5
fffff880`09a1ec00 fffff800`02ef0bc6 : fffff880`0357b180 fffffa80`04962040 fffffa80`075c6b50 00000000`00000000 : nt!PspSystemThreadStartup+0x194
fffff880`09a1ec40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_NAME: nt!PopWriteHiberPages+a3
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 6.1.7601.24557
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0xa0_b_HIBERFILE_TOO_SMALL_nt!PopWriteHiberPages+a3
OS_VERSION: 7.1.7601.24557
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {7921f116-3993-4d78-a596-89c58c5fe28a}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a0054b1004, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800030e40ee, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for ndis.sys
fffff80002ff50e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800030b0300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2234
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 18133
Key : Analysis.Memory.CommitPeak.Mb
Value: 63
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2020-06-10T19:07:00Z
Key : WER.OS.Version
Value: 7.1.7601.24557
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: fffff8a0054b1004
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff800030e40ee
READ_ADDRESS: fffff80002ff50e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ff50e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002ff50e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800030b02f0
GetUlongPtrFromAddress: unable to read from fffff800030b04a8
fffff8a0054b1004 Paged pool
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff80004c91860 -- (.trap 0xfffff80004c91860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a0054b1000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000a27000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030e40ee rsp=fffff80004c919f0 rbp=0000000000000a27
r8=0000000000000027 r9=0000000000000000 r10=0000000000000145
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!HvpScanForFreeCellInViewWindow+0x16a:
fffff800`030e40ee 8b4804 mov ecx,dword ptr [rax+4] ds:fffff8a0`054b1004=????????
Resetting default scope
STACK_TEXT:
fffff800`04c91718 fffff800`02eb4fe9 : 00000000`0000000a fffff8a0`054b1004 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`04c91720 fffff800`02eb2dce : 00000000`00000000 fffff8a0`054b1004 fffff800`03007100 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`04c91860 fffff800`030e40ee : 00000000`00000000 00000000`00986000 00000000`00001000 00000000`00000000 : nt!KiPageFault+0x44e
fffff800`04c919f0 fffff800`030e3efa : fffff800`00a27000 fffff800`00000009 00000000`00000030 fffff800`00000000 : nt!HvpScanForFreeCellInViewWindow+0x16a
fffff800`04c91a70 fffff800`030e3a62 : 00000000`00000030 00000000`00000005 00000000`00000030 00000000`00000000 : nt!HvpFindFreeCell+0x1ba
fffff800`04c91ae0 fffff800`03123e0d : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x72
fffff800`04c91b40 fffff800`03123c9d : 00000000`00000000 fffff8a0`008b7290 00000000`00000008 fffff800`031105ec : nt!HvAllocateCell+0x55
fffff800`04c91b70 fffff800`030d9247 : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`0521e640 fffff800`04c91e18 : nt!CmpAddValueKeyNew+0x69
fffff800`04c91c40 fffff800`032bd4e3 : 01d6a924`5b295744 fffff800`04c91ff0 fffff8a0`0a48d258 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`04c91c90 fffff800`030e2142 : fffff8a0`02494620 fffff800`04c91e18 00000000`00000004 fffff800`04c92210 : nt!CmSetValueKey+0xba3
fffff800`04c91dd0 fffff800`02eb4c53 : ffffffff`80000b4c 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x34e
fffff800`04c91f00 fffff800`02eaa3e0 : fffff800`031f6152 fffff800`04c92248 fffff880`01b58152 fffffa80`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff800`04c92108 fffff800`031f6152 : fffff800`04c92248 fffff880`01b58152 fffffa80`00000000 fffff800`04c92270 : nt!KiServiceLinkage
fffff800`04c92110 fffff880`01b5fd96 : 00000000`00000004 fffffa80`0a38b160 fffffa80`074461a0 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04c92170 00000000`00000004 : fffffa80`0a38b160 fffffa80`074461a0 00000000`000007ff fffff800`04c92210 : ndis+0xafd96
fffff800`04c92178 fffffa80`0a38b160 : fffffa80`074461a0 00000000`000007ff fffff800`04c92210 00000000`00000004 : 0x4
fffff800`04c92180 fffffa80`074461a0 : 00000000`000007ff fffff800`04c92210 00000000`00000004 00000000`00000000 : 0xfffffa80`0a38b160
fffff800`04c92188 00000000`000007ff : fffff800`04c92210 00000000`00000004 00000000`00000000 00000000`ffff0000 : 0xfffffa80`074461a0
fffff800`04c92190 fffff800`04c92210 : 00000000`00000004 00000000`00000000 00000000`ffff0000 fffff880`064914b0 : 0x7ff
fffff800`04c92198 00000000`00000004 : 00000000`00000000 00000000`ffff0000 fffff880`064914b0 fffff880`06486000 : 0xfffff800`04c92210
fffff800`04c921a0 00000000`00000000 : 00000000`ffff0000 fffff880`064914b0 fffff880`06486000 00000000`00000001 : 0x4
SYMBOL_NAME: ndis+afd96
MODULE_NAME: ndis
IMAGE_NAME: ndis.sys
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0xA_ndis+afd96
OS_VERSION: 7.1.7601.24557
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {a5c8f976-7479-4c27-589e-5dc5e53d93c3}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a00531c034, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800031527dc, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for netr28x.sys
fffff800030480e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff80003103300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2139
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 13998
Key : Analysis.Memory.CommitPeak.Mb
Value: 64
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2020-06-10T19:07:00Z
Key : WER.OS.Version
Value: 7.1.7601.24557
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: fffff8a00531c034
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff800031527dc
READ_ADDRESS: fffff800030480e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030480e8: Unable to get Flags value from nt!KdVersionBlock
fffff800030480e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800031032f0
GetUlongPtrFromAddress: unable to read from fffff800031034a8
fffff8a00531c034 Paged pool
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff80004c86990 -- (.trap 0xfffff80004c86990)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000cc2020 rbx=0000000000000000 rcx=fffff80004c86c31
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800031527dc rsp=fffff80004c86b20 rbp=fffff80004c86ff0
r8=fffff8a00531c024 r9=000000000000ffff r10=fffffa8009c13472
r11=fffff8a00531dff1 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!CmpFindValueByNameFromCache+0x12c:
fffff800`031527dc 41f6401001 test byte ptr [r8+10h],1 ds:fffff8a0`0531c034=??
Resetting default scope
STACK_TEXT:
fffff800`04c86848 fffff800`02f07fe9 : 00000000`0000000a fffff8a0`0531c034 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`04c86850 fffff800`02f05dce : 00000000`00000000 fffff8a0`0531c034 fffffa80`046f2000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`04c86990 fffff800`031527dc : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00049840 00000003`a52e2f9b : nt!KiPageFault+0x44e
fffff800`04c86b20 fffff800`03176afc : fffff8a0`03c2ca70 fffff800`04c86e18 fffff800`04c86c60 fffff800`04c86c48 : nt!CmpFindValueByNameFromCache+0x12c
fffff800`04c86bf0 fffff800`0330ffe7 : fffff8a0`03c2ca70 01d6a938`39d370d1 fffff8a0`03c2ca70 fffff800`03075630 : nt!CmpCompareNewValueDataAgainstKCBCache+0x78
fffff800`04c86c90 fffff800`03135142 : fffff8a0`03185f10 fffff800`04c86e18 00000000`00000004 fffff800`04c87210 : nt!CmSetValueKey+0x6a7
fffff800`04c86dd0 fffff800`02f07f39 : ffffffff`80000b7c 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x34e
fffff800`04c86f00 fffff800`02efd3e0 : fffff800`03249152 fffff800`04c87248 fffff880`01b91152 fffffa80`00000000 : nt!KiSystemServiceExit+0x2de
fffff800`04c87108 fffff800`03249152 : fffff800`04c87248 fffff880`01b91152 fffffa80`00000000 fffff800`04c87270 : nt!KiServiceLinkage
fffff800`04c87110 fffff880`01b98d96 : 00000000`00000004 fffffa80`09c13470 fffff800`0304a180 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`04c87170 fffff880`05ec798d : fffff800`04c87270 fffff880`060d6c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`04c871d0 fffff800`04c87270 : fffff880`060d6c28 00000000`00000000 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b98d
fffff800`04c871d8 fffff880`060d6c28 : 00000000`00000000 00000000`00000000 fffffa80`001801a9 fffffa80`0737d1a0 : 0xfffff800`04c87270
fffff800`04c871e0 00000000`00000000 : 00000000`00000000 fffffa80`001801a9 fffffa80`0737d1a0 00000000`00000000 : netr28x+0x25ac28
SYMBOL_NAME: netr28x+4b98d
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0xA_netr28x+4b98d
OS_VERSION: 7.1.7601.24557
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {5ef59956-668a-318f-f13d-779ad8e5e0f7}
Followup: MachineOwner
---------