Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\temp\Raufbold\022322-10453-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`18600000 PsLoadedModuleList = 0xfffff805`1922a270
Debug session time: Wed Feb 23 20:15:31.068 2022 (UTC + 1:00)
System Uptime: 0 days 0:07:35.738
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`189f71b0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffbd8f`d91bf3f0=000000000000000a
3: kd> !analyze -v
*******************************************************************************
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8051880c842, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3359
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 5992
Key : Analysis.Init.CPU.mSec
Value: 483
Key : Analysis.Init.Elapsed.mSec
Value: 4464
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 022322-10453-01.dmp
BUGCHECK_CODE: a
BUGCHECK_P1: 1
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8051880c842
WORKER_ROUTINE:
+0
00000000`00000001 ?? ???
WORK_ITEM: fffff8051880c842
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: msedge.exe
TRAP_FRAME: ffffbd8fd91bf530 -- (.trap 0xffffbd8fd91bf530)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=00000000000000f3 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8051880c842 rsp=ffffbd8fd91bf6c0 rbp=0000000000000000
r8=000000010000011c r9=ffffc081f3bac180 r10=ffffa10fc9ace340
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiSwapThread+0x542:
fffff805`1880c842 488901 mov qword ptr [rcx],rax ds:00000000`00000001=????????????????
Resetting default scope
STACK_TEXT:
ffffbd8f`d91bf3e8 fffff805`18a09169 : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffbd8f`d91bf3f0 fffff805`18a05469 : ffffc081`f3bac180 fffff805`189fe3c2 000f8067`b4bbbdff 00000000`00000001 : nt!KiBugCheckDispatch+0x69
ffffbd8f`d91bf530 fffff805`1880c842 : ffffc081`00000000 00000000`00000000 ffffa10f`bb010100 00000000`00000001 : nt!KiPageFault+0x469
ffffbd8f`d91bf6c0 fffff805`1880bd2f : ffff9109`00000003 fffff805`00000002 00000000`00000001 ffffa10f`00000000 : nt!KiSwapThread+0x542
ffffbd8f`d91bf770 fffff805`1880f663 : ffffa10f`00000000 ffffa10f`00000000 00000000`00000000 00000000`00000001 : nt!KiCommitThreadWait+0x14f
ffffbd8f`d91bf810 fffff805`1880f098 : ffffa10f`c8020380 00000000`00000001 ffffa10f`cba24330 fffff805`00000000 : nt!KeRemoveQueueEx+0x263
ffffbd8f`d91bf8b0 fffff805`18cd6f2d : 00000000`00000000 00000000`00000000 ffffc081`f3bac180 fffff805`18886ada : nt!IoRemoveIoCompletion+0x98
ffffbd8f`d91bf9e0 fffff805`18a08bb8 : ffffa10f`c9ae8080 000000f3`99bfeea8 ffffbd8f`d91bfaa8 00000eec`002c0aa8 : nt!NtRemoveIoCompletion+0x13d
ffffbd8f`d91bfa90 00007ff8`50a0ce94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f3`99bfee88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`50a0ce94
SYMBOL_NAME: nt!KiPageFault+469
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1288
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 469
FAILURE_BUCKET_ID: AV_nt!KiPageFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ec3e2762-48ae-ffe9-5b16-fbcb853e8320}
Followup: MachineOwner
---------
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\temp\Raufbold\022322-10843-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802`07a00000 PsLoadedModuleList = 0xfffff802`0862a270
Debug session time: Wed Feb 23 19:33:56.951 2022 (UTC + 1:00)
System Uptime: 0 days 0:10:36.459
Loading Kernel Symbols
...............................................................
................................................................
.........................................................
Loading User Symbols
Loading unloaded module list
....................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`07df71b0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff909`88c68550=000000000000000a
3: kd> !analyze -v
*******************************************************************************
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff9a01000000c0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80207ced01f, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4718
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 37510
Key : Analysis.Init.CPU.mSec
Value: 531
Key : Analysis.Init.Elapsed.mSec
Value: 2522
Key : Analysis.Memory.CommitPeak.Mb
Value: 114
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 022322-10843-01.dmp
BUGCHECK_CODE: a
BUGCHECK_P1: ffff9a01000000c0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80207ced01f
READ_ADDRESS: fffff802086fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff9a01000000c0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff90988c68690 -- (.trap 0xfffff90988c68690)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000004 rbx=0000000000000000 rcx=0000000000000008
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80207ced01f rsp=fffff90988c68820 rbp=fffff90988c68860
r8=0000000000000000 r9=0000000000000000 r10=0000000000000037
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiCheckPreferredHeteroProcessor+0x4f:
fffff802`07ced01f 4c8bbfc0000000 mov r15,qword ptr [rdi+0C0h] ds:00000000`000000c0=????????????????
Resetting default scope
STACK_TEXT:
fffff909`88c68548 fffff802`07e09169 : 00000000`0000000a ffff9a01`000000c0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff909`88c68550 fffff802`07e05469 : fffff802`18354000 00000000`001f0000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff909`88c68690 fffff802`07ced01f : fffff802`07a00000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
fffff909`88c68820 fffff802`07f1ade6 : 00000000`00000000 ffff8381`64f58040 00000000`00000000 00000000`00000000 : nt!KiCheckPreferredHeteroProcessor+0x4f
fffff909`88c68890 fffff802`07f1ac44 : 00000000`00000004 fffff909`88c68958 fffff909`88c68950 ffff9a01`2f9e8180 : nt!KiSendHeteroRescheduleIntRequestHelper+0x156
fffff909`88c68920 fffff802`07e19d70 : ffff9a01`ffffffff 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSendHeteroRescheduleIntRequest+0x74
fffff909`88c68950 fffff802`07c0bd2f : ffffffff`00000003 ffff8381`00000001 fffff909`88c68b10 fffff802`00000000 : nt!KiSwapThread+0x20da70
fffff909`88c68a00 fffff802`07c0b5d3 : 00000000`000000fd 00000000`00000000 00000000`00000000 ffff8381`57535180 : nt!KiCommitThreadWait+0x14f
fffff909`88c68aa0 fffff802`0b6c8e0f : ffff8381`572fa518 00000000`00000000 00000000`00000000 ffff8381`572fa500 : nt!KeWaitForSingleObject+0x233
fffff909`88c68b90 fffff802`18265cb7 : ffff8381`572fa500 ffff8381`572fa538 ffffffff`ff676980 ffff8381`57518b38 : ndis!NdisWaitEvent+0x3f
fffff909`88c68bd0 fffff802`07d55855 : ffff8381`57535040 00000000`00000080 fffff802`18265ba0 000f8067`b4bbbdff : rtwlane!Ndis6EventTrigerThreadCallback+0x117
fffff909`88c68c10 fffff802`07dfe808 : ffff9a01`2faa3180 ffff8381`57535040 fffff802`07d55800 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff909`88c68c60 00000000`00000000 : fffff909`88c69000 fffff909`88c63000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: rtwlane!Ndis6EventTrigerThreadCallback+117
MODULE_NAME: rtwlane
IMAGE_NAME: rtwlane.sys
IMAGE_VERSION: 2024.0.8.108
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 117
FAILURE_BUCKET_ID: AV_rtwlane!Ndis6EventTrigerThreadCallback
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ec8dff55-73b7-eccc-67f3-058f610fa49e}
Followup: MachineOwner
---------
3: kd> lmvm rtwlane
start end module name
fffff802`17e10000 fffff802`18927000 rtwlane (pdb symbols) C:\ProgramData\Dbg\sym\rtwlane.pdb\48E3B5FAC1994701B16D46EE0FCE3EC61\rtwlane.pdb
Loaded symbol image file: rtwlane.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\rtwlane.sys\5D247755b17000\rtwlane.sys
Image path: \SystemRoot\System32\drivers\rtwlane.sys
Image name: rtwlane.sys
Timestamp: Tue Jul 9 13:15:33 2019 (5D247755)
CheckSum: 00AFCC3B
ImageSize: 00B17000
File version: 2024.0.8.108
Product version: 2024.0.8.108
File flags: 8 (Mask 3F) Private
File OS: 40004 NT Win32
File type: 3.6 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Realtek Semiconductor Corporation
ProductName: Realtek PCIEWireless LAN PCI-E NIC
InternalName: rtwlane.sys
OriginalFilename: rtwlane.sys
ProductVersion: 2024.0.8.108
FileVersion: 2024.0.8.108
FileDescription: Realtek PCIE NDIS Driver 80225 36661
LegalCopyright: Copyright (C) 2013 Realtek Semiconductor Corporation
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\temp\Raufbold\022722-10468-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802`37600000 PsLoadedModuleList = 0xfffff802`3822a2d0
Debug session time: Sun Feb 27 08:06:17.295 2022 (UTC + 1:00)
System Uptime: 2 days 3:02:18.997
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..
Loading User Symbols
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`379f73b0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffed81`2fc379c0=000000000000004a
3: kd> !analyze -v
*******************************************************************************
*******************************************************************************
IRQL_GT_ZERO_AT_SYSTEM_SERVICE (4a)
Returning to usermode from a system call at an IRQL > PASSIVE_LEVEL.
Arguments:
Arg1: 00007ffe1124ceb4, Address of system function (system call routine)
Arg2: 0000000000000002, Current IRQL
Arg3: 0000000000000000, 0
Arg4: ffffed812fc37b80, 0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3515
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 12273
Key : Analysis.Init.CPU.mSec
Value: 1046
Key : Analysis.Init.Elapsed.mSec
Value: 41466
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 022722-10468-01.dmp
BUGCHECK_CODE: 4a
BUGCHECK_P1: 7ffe1124ceb4
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: ffffed812fc37b80
PROCESS_NAME: mmc.exe
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffffed81`2fc379b8 fffff802`37a09369 : 00000000`0000004a 00007ffe`1124ceb4 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffed81`2fc379c0 fffff802`37a09233 : ffffcd86`b12eb080 00000000`053fda28 00000000`053fda28 ffffffff`f4143e01 : nt!KiBugCheckDispatch+0x69
ffffed81`2fc37b00 00007ffe`1124ceb4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
00000000`053fd988 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`1124ceb4
SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1526
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1fe
FAILURE_BUCKET_ID: RAISED_IRQL_FAULT_mmc.exe_nt!KiSystemServiceExitPico
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {62110572-bef5-9f95-d35a-3a94790eeea7}
Followup: MachineOwner
---------
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\temp\Raufbold\022722-10500-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`34a00000 PsLoadedModuleList = 0xfffff804`3562a2d0
Debug session time: Sun Feb 27 20:21:19.110 2022 (UTC + 1:00)
System Uptime: 0 days 1:55:04.778
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`34df73b0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8104`1a0454d0=000000000000000a
3: kd> !analyze -v
*******************************************************************************
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000004, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80434e0a2cf, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4608
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 19911
Key : Analysis.Init.CPU.mSec
Value: 577
Key : Analysis.Init.Elapsed.mSec
Value: 2776
Key : Analysis.Memory.CommitPeak.Mb
Value: 96
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 022722-10500-01.dmp
BUGCHECK_CODE: a
BUGCHECK_P1: 4
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80434e0a2cf
READ_ADDRESS: fffff804356fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000004
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff81041a045610 -- (.trap 0xffff81041a045610)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffda0b7c9b65c8 rbx=0000000000000000 rcx=ffffda0b7c9b65c8
rdx=0000000000000004 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80434e0a2cf rsp=ffff81041a0457a8 rbp=ffff81041a045820
r8=0000000000000008 r9=0000000000001000 r10=0000000000000000
r11=ffff81041a045780 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!memcpy+0xf:
fffff804`34e0a2cf 4c8b1a mov r11,qword ptr [rdx] ds:00000000`00000004=????????????????
Resetting default scope
STACK_TEXT:
ffff8104`1a0454c8 fffff804`34e09369 : 00000000`0000000a 00000000`00000004 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8104`1a0454d0 fffff804`34e05669 : 00000000`00000003 ffffda0b`8102a4d8 00000000`00000009 00000000`00000001 : nt!KiBugCheckDispatch+0x69
ffff8104`1a045610 fffff804`34e0a2cf : fffff804`34c9b3d9 00000000`00000000 ffffb100`0adaf200 ffff8104`1a045820 : nt!KiPageFault+0x469
ffff8104`1a0457a8 fffff804`34c9b3d9 : 00000000`00000000 ffffb100`0adaf200 ffff8104`1a045820 00000000`00000002 : nt!memcpy+0xf
ffff8104`1a0457b0 fffff804`34c9a50d : ffffb100`0adaf240 ffffda0b`7c99a000 ffff8104`1a045b20 ffffb100`00000002 : nt!EtwpLogKernelEvent+0x249
ffff8104`1a045860 fffff804`34c996e4 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x41d
ffff8104`1a0459d0 fffff804`34dfaf1e : ffffffff`00000000 ffffb100`0adac180 ffffb100`0adb71c0 ffffda0b`7f0eb080 : nt!KiRetireDpcList+0x1f4
ffff8104`1a045c60 00000000`00000000 : ffff8104`1a046000 ffff8104`1a040000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiPageFault+469
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1526
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 469
FAILURE_BUCKET_ID: AV_nt!KiPageFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ec3e2762-48ae-ffe9-5b16-fbcb853e8320}
Followup: MachineOwner
---------
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\temp\Raufbold\022722-10671-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800`6e400000 PsLoadedModuleList = 0xfffff800`6f02a2d0
Debug session time: Sun Feb 27 18:25:42.303 2022 (UTC + 1:00)
System Uptime: 0 days 10:18:53.972
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`6e7f73b0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffac00`3d846020=000000000000003b
3: kd> !analyze -v
*******************************************************************************
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8006e6745c6, Address of the instruction which caused the BugCheck
Arg3: ffffac003d846920, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2983
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 4663
Key : Analysis.Init.CPU.mSec
Value: 452
Key : Analysis.Init.Elapsed.mSec
Value: 28483
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 022722-10671-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8006e6745c6
BUGCHECK_P3: ffffac003d846920
BUGCHECK_P4: 0
CONTEXT: ffffac003d846920 -- (.cxr 0xffffac003d846920)
rax=ffffe08fe59702e8 rbx=ffffe08fe6768080 rcx=e08fe59702b058b1
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffe08fe59702e0
rip=fffff8006e6745c6 rsp=fffff609710fb940 rbp=fffff609710fba01
r8=0000000000000000 r9=00000056759410c4 r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=e08fe59702b058b1
r14=0000000000000000 r15=ffffe08fe67681c0
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
nt!KeAbPreWait+0x6:
fffff800`6e6745c6 0fb64120 movzx eax,byte ptr [rcx+20h] ds:002b:e08fe597`02b058d1=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: TextInputHost.exe
STACK_TEXT:
fffff609`710fb940 fffff800`6e81947d : ffffac00`00000064 fffff800`6e9f5f71 000f8067`b4bbbd01 ffffe08f`e67681c0 : nt!KeAbPreWait+0x6
fffff609`710fb970 fffff800`6e9f7bc1 : ffffe08f`e59702e0 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x20e0dd
fffff609`710fba60 fffff800`6e9f7c6a : ffffe08f`e6768080 00000056`4f71f9f8 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x91
fffff609`710fbac0 fffff800`6e808db8 : 0000020e`fd1d5ee0 00000000`0000000e fffff609`710fbb18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
fffff609`710fbb00 00007ffd`bb7ecdf4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000056`4f71f9c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`bb7ecdf4
SYMBOL_NAME: nt!KeAbPreWait+6
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1526
STACK_COMMAND: .cxr 0xffffac003d846920 ; kb
BUCKET_ID_FUNC_OFFSET: 6
FAILURE_BUCKET_ID: AV_nt!KeAbPreWait
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {65496c65-f012-a1f5-2c21-5d59c06ec487}
Followup: MachineOwner
---------