Hey I have been getting bsod with Both ram sticks (same pair) installed but when I removed 1 stick pc was working fine but rare game crashes with SYSTEM_THREAD_EXCEPTION_NOT_HANDLED.. So i thought it was the ram issue and RMA'ed both ram sticks but found out that i was getting the same bsod and error.
Things that I have done: Changed ram sticks, Installed windows twice, updated chipset drivers and nvidia drivers, Tested both ram sticks with windows memory tool. Interestingly I got an error with 2 sticks but got no error with 1 and individually both got no error
BTW I do have warranty for every hardware but i wanna know which hardware is causing this issue
Things that I have done: Changed ram sticks, Installed windows twice, updated chipset drivers and nvidia drivers, Tested both ram sticks with windows memory tool. Interestingly I got an error with 2 sticks but got no error with 1 and individually both got no error
BTW I do have warranty for every hardware but i wanna know which hardware is causing this issue
CRASH REPORT WITH SINGLE STICK
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`795fd730 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9e81`41f110f0=000000000000007e
14: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8037943a600, The address that the exception occurred at
Arg3: fffff386f3489958, Exception Record Address
Arg4: ffff9e8141f11920, Context Record Address
Debugging Details:
------------------
*** WARNING: Check Image - Checksum mismatch - Dump: 0x1848f8, File: 0x1849c6 - C:\ProgramData\Dbg\sym\BTHport.sys\FCDE5FB0187000\BTHport.sys
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1905
Key : Analysis.Elapsed.mSec
Value: 3898
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 249
Key : Analysis.Init.Elapsed.mSec
Value: 5999
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Bugcheck.Code.LegacyAPI
Value: 0x1000007e
Key : Failure.Bucket
Value: AV_nt!RtlpHpVsContextFree
Key : Failure.Hash
Value: {a3a70975-d33b-54e0-8fd5-b41d85acac01}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8037943a600
BUGCHECK_P3: fffff386f3489958
BUGCHECK_P4: ffff9e8141f11920
FILE_IN_CAB: 120223-14031-01.dmp
EXCEPTION_RECORD: fffff386f3489958 -- (.exr 0xfffff386f3489958)
ExceptionAddress: fffff8037943a600 (nt!RtlpHpVsContextFree+0x0000000000000380)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffff9e8141f11920 -- (.cxr 0xffff9e8141f11920)
rax=feffc8832d121ae8 rbx=ffffc8833a565000 rcx=0000000000260000
rdx=feffc8832d121ae8 rsi=ffffc88317010280 rdi=3333333333333333
rip=fffff8037943a600 rsp=fffff386f3489b90 rbp=fffff386f3489c00
r8=0000000000260000 r9=69ec18335bd7d38b r10=0000000000000000
r11=ffffc88317010290 r12=0000000000000000 r13=ffffc8833cedfff0
r14=ffffc8833a565710 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!RtlpHpVsContextFree+0x380:
fffff803`7943a600 8b4af8 mov ecx,dword ptr [rdx-8] ds:002b:feffc883`2d121ae0=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff80379efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff386`f3489b90 fffff803`7943c524 : ffff8241`00000000 fffff803`00000000 00000000`00000000 fffff803`00000000 : nt!RtlpHpVsContextFree+0x380
fffff386`f3489c30 fffff803`79bb60b9 : 00000000`00000c10 fffff803`79e4f100 00000000`00000171 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
fffff386`f3489d10 fffff803`79420205 : fffff386`f3489ee0 00000000`00000000 00000000`00000001 fffff803`00000000 : nt!ExFreePool+0x9
fffff386`f3489d40 fffff803`7941f7e9 : 00000000`00000000 00000000`00000000 ffff9e81`8609b1c0 00000000`00000000 : nt!MiAgeWorkingSet+0x4f5
fffff386`f348a250 fffff803`7941eff7 : 00000000`00000000 fffff386`f348a400 fffff386`f348a3c0 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
fffff386`f348a340 fffff803`794145c0 : fffff803`79e50c00 fffff386`f348a400 00000000`00001d1b ffff9e81`00000203 : nt!MiProcessWorkingSets+0x227
fffff386`f348a3e0 fffff803`795b91b7 : 00000000`00000005 00000000`00000005 00000000`ffffffff ffff9e81`41900180 : nt!MiWorkingSetManager+0x110
fffff386`f348a4a0 fffff803`795078e5 : ffffc883`16da0080 00000000`00000080 fffff803`795b9060 00390031`002e0030 : nt!KeBalanceSetManager+0x157
fffff386`f348a590 fffff803`79606368 : ffff9e81`41a80180 ffffc883`16da0080 fffff803`79507890 00040000`00180400 : nt!PspSystemThreadStartup+0x55
fffff386`f348a5e0 00000000`00000000 : fffff386`f348b000 fffff386`f3484000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!RtlpHpVsContextFree+380
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.3693
STACK_COMMAND: .cxr 0xffff9e8141f11920 ; kb
BUCKET_ID_FUNC_OFFSET: 380
FAILURE_BUCKET_ID: AV_nt!RtlpHpVsContextFree
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a3a70975-d33b-54e0-8fd5-b41d85acac01}
CRASH REPORT WHEN BOTH STICKS INSTALLED
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000b4`85d84018). Type ".hh dbgerr001" for details
Loading unloaded module list
............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`33dfc0c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff509`582d64c0=000000000000000a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8073615f5d2, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1437
Key : Analysis.Elapsed.mSec
Value: 2266
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 186
Key : Analysis.Init.Elapsed.mSec
Value: 5301
Key : Analysis.Memory.CommitPeak.Mb
Value: 100
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Failure.Bucket
Value: IP_MISALIGNED_AuthenticAMD.sys
Key : Failure.Hash
Value: {716d112a-8330-4bbb-160c-ec98297019d2}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: d1
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8073615f5d2
FILE_IN_CAB: 072823-10531-01.dmp
WRITE_ADDRESS: fffff807346fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff509582d6600 -- (.trap 0xfffff509582d6600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffaa872562f7c8
rdx=000000000fc084fd rsi=0000000000000000 rdi=0000000000000000
rip=fffff8073615f5d2 rsp=fffff509582d6790 rbp=fffff509582d6890
r8=0000000000000000 r9=0000000000000000 r10=fffff80733d01430
r11=ffffb1f95aa00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
tcpip!IppFindNextHopAtDpc+0xd22:
fffff807`3615f5d2 2108 and dword ptr [rax],ecx ds:00000000`00000000=????????
Resetting default scope
MISALIGNED_IP:
tcpip!IppFindNextHopAtDpc+d22
fffff807`3615f5d2 2108 and dword ptr [rax],ecx
STACK_TEXT:
fffff509`582d64b8 fffff807`33e10129 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff509`582d64c0 fffff807`33e0bce3 : fffff807`34650c00 fffff300`de0d30c0 00000000`007c854d 00000000`007c854d : nt!KiBugCheckDispatch+0x69
fffff509`582d6600 fffff807`3615f5d2 : 00000000`e0000001 00000000`e0000001 fffff509`582d6890 00000000`00000000 : nt!KiPageFault+0x463
fffff509`582d6790 fffff807`3615e64c : 00000000`00000000 fffff807`340bd94f 00000000`e0000001 fffff807`34029e50 : tcpip!IppFindNextHopAtDpc+0xd22
fffff509`582d6a50 fffff807`3615c765 : ffffaa87`21d0a8a0 fffff807`00000000 ffffaa87`32bb84dc 00000000`00000000 : tcpip!IppFindNextHopAtDpcHelper+0xac
fffff509`582d6af0 fffff807`3615c3e8 : 00000000`00000200 fffff807`33c11fe0 00000000`00000000 00000000`7249534e : tcpip!IppGetAllBestRouteParameters+0x369
fffff509`582d6da0 fffff807`35d66276 : ffffaa87`32bb8470 fffff509`582d6ef0 00000000`00000098 ffffaa87`32bb8470 : tcpip!Ipv6GetAllBestRouteParameters+0x68
fffff509`582d6df0 fffff807`661a24f4 : 000000b4`865fe670 ffffaa87`32bb8470 00000000`00000000 000000b4`865fe670 : NETIO!NsiGetParameterEx+0x3a6
fffff509`582d6fa0 fffff807`661a26ce : 00000000`00000000 ffffaa87`321f8ac0 ffffaa87`321f89f0 000000b4`865fe670 : nsiproxy!NsippGetParameter+0x1e4
fffff509`582d7130 fffff807`33c113a5 : ffffaa87`328ade20 00000000`00000000 00000000`00000000 00000000`00000000 : nsiproxy!NsippDispatch+0x6e
fffff509`582d7180 fffff807`3401121c : 00000000`00000002 00000000`00000000 ffffaa87`328ade20 00000000`00000050 : nt!IofCallDriver+0x55
fffff509`582d71c0 fffff807`34010e71 : 00000000`00000000 fffff509`582d7500 00000000`00040800 ffffaa87`321f8ac0 : nt!IopSynchronousServiceTail+0x34c
fffff509`582d7260 fffff807`340101e6 : 00000000`00000001 00000000`000009c0 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xc71
fffff509`582d73a0 fffff807`33e0f8f8 : ffffaa87`32a1e080 000000b4`865fe578 fffff509`582d7428 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
fffff509`582d7410 00007fff`82fcd0c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b4`865fe608 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`82fcd0c4
SYMBOL_NAME: NETIO!NsiGetParameterEx+3a6
IMAGE_VERSION: 10.0.19041.3205
STACK_COMMAND: .cxr; .ecxr ; kb
MODULE_NAME: AuthenticAMD
IMAGE_NAME: AuthenticAMD.sys
FAILURE_BUCKET_ID: IP_MISALIGNED_AuthenticAMD.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {716d112a-8330-4bbb-160c-ec98297019d2}
Loading User Symbols
Loading unloaded module list
...............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`789fc0c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff60f`ad4ae9c0=000000000000000a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000fdd1, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800788df798, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2093
Key : Analysis.Elapsed.mSec
Value: 3552
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 218
Key : Analysis.Init.Elapsed.mSec
Value: 4572
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Failure.Bucket
Value: AV_nt!KiUpdateSpeculationControl
Key : Failure.Hash
Value: {431d2158-d4ba-bb46-b2a9-7d404cafa803}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: fdd1
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: fffff800788df798
FILE_IN_CAB: 072823-10078-01.dmp
READ_ADDRESS: fffff800792fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
000000000000fdd1
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff60fad4aeb00 -- (.trap 0xfffff60fad4aeb00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000042 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000400000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800788df798 rsp=fffff60fad4aec90 rbp=fffff80074172180
r8=000000000e1070f6 r9=0000000000000082 r10=0000000008000000
r11=ffffd47909a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na po nc
nt!KiUpdateSpeculationControl+0x1d8:
fffff800`788df798 41808ffd00000002 or byte ptr [r15+0FDh],2 ds:00000000`000000fd=??
Resetting default scope
STACK_TEXT:
fffff60f`ad4ae9b8 fffff800`78a10129 : 00000000`0000000a 00000000`0000fdd1 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
fffff60f`ad4ae9c0 fffff800`78a0bce3 : ffff8988`4aa08080 ffff8988`440f8d00 ffff8988`4aa08080 ffff8988`440f8d00 : nt!KiBugCheckDispatch+0x69
fffff60f`ad4aeb00 fffff800`788df798 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff60f`ad4aed78 : nt!KiPageFault+0x463
fffff60f`ad4aec90 fffff800`78a04782 : 001fe067`bcbbbdff 00000000`00000000 ffffe480`00002000 fffff800`00000001 : nt!KiUpdateSpeculationControl+0x1d8
fffff60f`ad4aed10 fffff800`78a042f6 : 00000000`00000000 fffff800`788dbd1b fffff60f`ad4aee90 ffff8988`00000000 : nt!SwapContext+0x1b2
fffff60f`ad4aed50 fffff800`7881c9e0 : fffff800`00000000 00000000`00000000 00000000`00000000 00000000`0000009c : nt!KiSwapContext+0x76
fffff60f`ad4aee90 fffff800`7881bf0f : ffff8988`00000000 fffff800`00000016 00000000`00000000 00000000`00000000 : nt!KiSwapThread+0x500
fffff60f`ad4aef40 fffff800`788da582 : 00000000`000000ec 00000000`00000000 ffff8988`00000000 00000000`00000001 : nt!KiCommitThreadWait+0x14f
fffff60f`ad4aefe0 fffff800`78944be5 : ffff8988`5aef13f0 00000000`c0000054 00000000`ffffff00 00000000`00000002 : nt!KeDelayExecutionThread+0x122
fffff60f`ad4af070 fffff800`789b660b : fffff800`79250c00 00000000`00000011 ffff8988`5aef13f0 00000000`00000000 : nt!MiGatherMappedPages+0xa1
fffff60f`ad4af130 fffff800`78926915 : ffff8988`4aa08080 ffff8988`4aa08080 00000000`00000080 001fe067`bcbbbdff : nt!MiMappedPageWriter+0x18b
fffff60f`ad4af590 fffff800`78a04cf8 : fffff800`74172180 ffff8988`4aa08080 fffff800`789268c0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff60f`ad4af5e0 00000000`00000000 : fffff60f`ad4b0000 fffff60f`ad4a9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!KiUpdateSpeculationControl+1d8
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.3208
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1d8
FAILURE_BUCKET_ID: AV_nt!KiUpdateSpeculationControl
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {431d2158-d4ba-bb46-b2a9-7d404cafa803}
Loading unloaded module list
............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`5d1fc0c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffc107`ab106d90=000000000000000a
9: kd> !analyze -v
*** WARNING: Unable to verify timestamp for mtkwl6ex.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000fdd1, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000031, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8015d0df798, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1937
Key : Analysis.Elapsed.mSec
Value: 4178
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 234
Key : Analysis.Init.Elapsed.mSec
Value: 4429
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Failure.Bucket
Value: AV_mtkwl6ex!unknown_function
Key : Failure.Hash
Value: {7fbea1c0-2ec4-7d26-2ed6-cb151c611289}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: fdd1
BUGCHECK_P2: ff
BUGCHECK_P3: 31
BUGCHECK_P4: fffff8015d0df798
FILE_IN_CAB: 072823-10203-01.dmp
WRITE_ADDRESS: fffff8015dafb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
000000000000fdd1
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffc107ab106ed0 -- (.trap 0xffffc107ab106ed0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000042 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000400000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015d0df798 rsp=ffffc107ab107060 rbp=ffffd6802cb40180
r8=000000000e1070f6 r9=0000000000000082 r10=0000000008000000
r11=ffffd6802cb48200 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na po nc
nt!KiUpdateSpeculationControl+0x1d8:
fffff801`5d0df798 41808ffd00000002 or byte ptr [r15+0FDh],2 ds:00000000`000000fd=??
Resetting default scope
STACK_TEXT:
ffffc107`ab106d88 fffff801`5d210129 : 00000000`0000000a 00000000`0000fdd1 00000000`000000ff 00000000`00000031 : nt!KeBugCheckEx
ffffc107`ab106d90 fffff801`5d20bce3 : ffffc107`ab106f30 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc107`ab106ed0 fffff801`5d0df798 : 00000000`0000000f fffff801`5d01a126 ffffd680`00000000 ffffad83`9efee040 : nt!KiPageFault+0x463
ffffc107`ab107060 fffff801`5d204782 : 001fe067`bcbbbdff 00000000`00000000 ffffd680`00002000 fffff801`00000001 : nt!KiUpdateSpeculationControl+0x1d8
ffffc107`ab1070e0 fffff801`5d2042f6 : 00000000`00000000 fffff801`5d0dbd1b 00000000`00000000 00000000`00000000 : nt!SwapContext+0x1b2
ffffc107`ab107120 fffff801`5d01c9e0 : ffffd680`00000000 00000000`00000000 00000000`0cb80cf0 ffffc107`ab107330 : nt!KiSwapContext+0x76
ffffc107`ab107260 fffff801`5d01bf0f : ffffad83`00000009 ffffad83`00000011 ffffc107`ab107420 ffffad83`00000000 : nt!KiSwapThread+0x500
ffffc107`ab107310 fffff801`5d01b7b3 : ffffad83`00000000 ffffad83`00000000 ffffad83`a3010000 ffffad83`9efec180 : nt!KiCommitThreadWait+0x14f
ffffc107`ab1073b0 fffff801`5fa18fff : ffffad83`9df97a30 fffff801`00000000 00000000`00000000 ffffad83`9dc30000 : nt!KeWaitForSingleObject+0x233
ffffc107`ab1074a0 fffff801`9ac4dac2 : 00000000`00000000 fffff801`9ad90728 00000000`00000000 ffffad83`9df977d0 : ndis!NdisWaitEvent+0x3f
ffffc107`ab1074e0 00000000`00000000 : fffff801`9ad90728 00000000`00000000 ffffad83`9df977d0 ffffad83`9ccbcaa8 : mtkwl6ex+0xdac2
SYMBOL_NAME: mtkwl6ex+dac2
MODULE_NAME: mtkwl6ex
IMAGE_NAME: mtkwl6ex.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: dac2
FAILURE_BUCKET_ID: AV_mtkwl6ex!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7fbea1c0-2ec4-7d26-2ed6-cb151c611289}
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`795fd730 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9e81`41f110f0=000000000000007e
14: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8037943a600, The address that the exception occurred at
Arg3: fffff386f3489958, Exception Record Address
Arg4: ffff9e8141f11920, Context Record Address
Debugging Details:
------------------
*** WARNING: Check Image - Checksum mismatch - Dump: 0x1848f8, File: 0x1849c6 - C:\ProgramData\Dbg\sym\BTHport.sys\FCDE5FB0187000\BTHport.sys
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1905
Key : Analysis.Elapsed.mSec
Value: 3898
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 249
Key : Analysis.Init.Elapsed.mSec
Value: 5999
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Bugcheck.Code.LegacyAPI
Value: 0x1000007e
Key : Failure.Bucket
Value: AV_nt!RtlpHpVsContextFree
Key : Failure.Hash
Value: {a3a70975-d33b-54e0-8fd5-b41d85acac01}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8037943a600
BUGCHECK_P3: fffff386f3489958
BUGCHECK_P4: ffff9e8141f11920
FILE_IN_CAB: 120223-14031-01.dmp
EXCEPTION_RECORD: fffff386f3489958 -- (.exr 0xfffff386f3489958)
ExceptionAddress: fffff8037943a600 (nt!RtlpHpVsContextFree+0x0000000000000380)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffff9e8141f11920 -- (.cxr 0xffff9e8141f11920)
rax=feffc8832d121ae8 rbx=ffffc8833a565000 rcx=0000000000260000
rdx=feffc8832d121ae8 rsi=ffffc88317010280 rdi=3333333333333333
rip=fffff8037943a600 rsp=fffff386f3489b90 rbp=fffff386f3489c00
r8=0000000000260000 r9=69ec18335bd7d38b r10=0000000000000000
r11=ffffc88317010290 r12=0000000000000000 r13=ffffc8833cedfff0
r14=ffffc8833a565710 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!RtlpHpVsContextFree+0x380:
fffff803`7943a600 8b4af8 mov ecx,dword ptr [rdx-8] ds:002b:feffc883`2d121ae0=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff80379efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff386`f3489b90 fffff803`7943c524 : ffff8241`00000000 fffff803`00000000 00000000`00000000 fffff803`00000000 : nt!RtlpHpVsContextFree+0x380
fffff386`f3489c30 fffff803`79bb60b9 : 00000000`00000c10 fffff803`79e4f100 00000000`00000171 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
fffff386`f3489d10 fffff803`79420205 : fffff386`f3489ee0 00000000`00000000 00000000`00000001 fffff803`00000000 : nt!ExFreePool+0x9
fffff386`f3489d40 fffff803`7941f7e9 : 00000000`00000000 00000000`00000000 ffff9e81`8609b1c0 00000000`00000000 : nt!MiAgeWorkingSet+0x4f5
fffff386`f348a250 fffff803`7941eff7 : 00000000`00000000 fffff386`f348a400 fffff386`f348a3c0 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
fffff386`f348a340 fffff803`794145c0 : fffff803`79e50c00 fffff386`f348a400 00000000`00001d1b ffff9e81`00000203 : nt!MiProcessWorkingSets+0x227
fffff386`f348a3e0 fffff803`795b91b7 : 00000000`00000005 00000000`00000005 00000000`ffffffff ffff9e81`41900180 : nt!MiWorkingSetManager+0x110
fffff386`f348a4a0 fffff803`795078e5 : ffffc883`16da0080 00000000`00000080 fffff803`795b9060 00390031`002e0030 : nt!KeBalanceSetManager+0x157
fffff386`f348a590 fffff803`79606368 : ffff9e81`41a80180 ffffc883`16da0080 fffff803`79507890 00040000`00180400 : nt!PspSystemThreadStartup+0x55
fffff386`f348a5e0 00000000`00000000 : fffff386`f348b000 fffff386`f3484000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!RtlpHpVsContextFree+380
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.3693
STACK_COMMAND: .cxr 0xffff9e8141f11920 ; kb
BUCKET_ID_FUNC_OFFSET: 380
FAILURE_BUCKET_ID: AV_nt!RtlpHpVsContextFree
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a3a70975-d33b-54e0-8fd5-b41d85acac01}
CRASH REPORT WHEN BOTH STICKS INSTALLED
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000b4`85d84018). Type ".hh dbgerr001" for details
Loading unloaded module list
............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`33dfc0c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff509`582d64c0=000000000000000a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8073615f5d2, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1437
Key : Analysis.Elapsed.mSec
Value: 2266
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 186
Key : Analysis.Init.Elapsed.mSec
Value: 5301
Key : Analysis.Memory.CommitPeak.Mb
Value: 100
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Failure.Bucket
Value: IP_MISALIGNED_AuthenticAMD.sys
Key : Failure.Hash
Value: {716d112a-8330-4bbb-160c-ec98297019d2}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: d1
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8073615f5d2
FILE_IN_CAB: 072823-10531-01.dmp
WRITE_ADDRESS: fffff807346fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff509582d6600 -- (.trap 0xfffff509582d6600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffaa872562f7c8
rdx=000000000fc084fd rsi=0000000000000000 rdi=0000000000000000
rip=fffff8073615f5d2 rsp=fffff509582d6790 rbp=fffff509582d6890
r8=0000000000000000 r9=0000000000000000 r10=fffff80733d01430
r11=ffffb1f95aa00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
tcpip!IppFindNextHopAtDpc+0xd22:
fffff807`3615f5d2 2108 and dword ptr [rax],ecx ds:00000000`00000000=????????
Resetting default scope
MISALIGNED_IP:
tcpip!IppFindNextHopAtDpc+d22
fffff807`3615f5d2 2108 and dword ptr [rax],ecx
STACK_TEXT:
fffff509`582d64b8 fffff807`33e10129 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff509`582d64c0 fffff807`33e0bce3 : fffff807`34650c00 fffff300`de0d30c0 00000000`007c854d 00000000`007c854d : nt!KiBugCheckDispatch+0x69
fffff509`582d6600 fffff807`3615f5d2 : 00000000`e0000001 00000000`e0000001 fffff509`582d6890 00000000`00000000 : nt!KiPageFault+0x463
fffff509`582d6790 fffff807`3615e64c : 00000000`00000000 fffff807`340bd94f 00000000`e0000001 fffff807`34029e50 : tcpip!IppFindNextHopAtDpc+0xd22
fffff509`582d6a50 fffff807`3615c765 : ffffaa87`21d0a8a0 fffff807`00000000 ffffaa87`32bb84dc 00000000`00000000 : tcpip!IppFindNextHopAtDpcHelper+0xac
fffff509`582d6af0 fffff807`3615c3e8 : 00000000`00000200 fffff807`33c11fe0 00000000`00000000 00000000`7249534e : tcpip!IppGetAllBestRouteParameters+0x369
fffff509`582d6da0 fffff807`35d66276 : ffffaa87`32bb8470 fffff509`582d6ef0 00000000`00000098 ffffaa87`32bb8470 : tcpip!Ipv6GetAllBestRouteParameters+0x68
fffff509`582d6df0 fffff807`661a24f4 : 000000b4`865fe670 ffffaa87`32bb8470 00000000`00000000 000000b4`865fe670 : NETIO!NsiGetParameterEx+0x3a6
fffff509`582d6fa0 fffff807`661a26ce : 00000000`00000000 ffffaa87`321f8ac0 ffffaa87`321f89f0 000000b4`865fe670 : nsiproxy!NsippGetParameter+0x1e4
fffff509`582d7130 fffff807`33c113a5 : ffffaa87`328ade20 00000000`00000000 00000000`00000000 00000000`00000000 : nsiproxy!NsippDispatch+0x6e
fffff509`582d7180 fffff807`3401121c : 00000000`00000002 00000000`00000000 ffffaa87`328ade20 00000000`00000050 : nt!IofCallDriver+0x55
fffff509`582d71c0 fffff807`34010e71 : 00000000`00000000 fffff509`582d7500 00000000`00040800 ffffaa87`321f8ac0 : nt!IopSynchronousServiceTail+0x34c
fffff509`582d7260 fffff807`340101e6 : 00000000`00000001 00000000`000009c0 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xc71
fffff509`582d73a0 fffff807`33e0f8f8 : ffffaa87`32a1e080 000000b4`865fe578 fffff509`582d7428 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
fffff509`582d7410 00007fff`82fcd0c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b4`865fe608 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`82fcd0c4
SYMBOL_NAME: NETIO!NsiGetParameterEx+3a6
IMAGE_VERSION: 10.0.19041.3205
STACK_COMMAND: .cxr; .ecxr ; kb
MODULE_NAME: AuthenticAMD
IMAGE_NAME: AuthenticAMD.sys
FAILURE_BUCKET_ID: IP_MISALIGNED_AuthenticAMD.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {716d112a-8330-4bbb-160c-ec98297019d2}
Loading User Symbols
Loading unloaded module list
...............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`789fc0c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff60f`ad4ae9c0=000000000000000a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000fdd1, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800788df798, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2093
Key : Analysis.Elapsed.mSec
Value: 3552
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 218
Key : Analysis.Init.Elapsed.mSec
Value: 4572
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Failure.Bucket
Value: AV_nt!KiUpdateSpeculationControl
Key : Failure.Hash
Value: {431d2158-d4ba-bb46-b2a9-7d404cafa803}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: fdd1
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: fffff800788df798
FILE_IN_CAB: 072823-10078-01.dmp
READ_ADDRESS: fffff800792fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
000000000000fdd1
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff60fad4aeb00 -- (.trap 0xfffff60fad4aeb00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000042 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000400000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800788df798 rsp=fffff60fad4aec90 rbp=fffff80074172180
r8=000000000e1070f6 r9=0000000000000082 r10=0000000008000000
r11=ffffd47909a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na po nc
nt!KiUpdateSpeculationControl+0x1d8:
fffff800`788df798 41808ffd00000002 or byte ptr [r15+0FDh],2 ds:00000000`000000fd=??
Resetting default scope
STACK_TEXT:
fffff60f`ad4ae9b8 fffff800`78a10129 : 00000000`0000000a 00000000`0000fdd1 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
fffff60f`ad4ae9c0 fffff800`78a0bce3 : ffff8988`4aa08080 ffff8988`440f8d00 ffff8988`4aa08080 ffff8988`440f8d00 : nt!KiBugCheckDispatch+0x69
fffff60f`ad4aeb00 fffff800`788df798 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff60f`ad4aed78 : nt!KiPageFault+0x463
fffff60f`ad4aec90 fffff800`78a04782 : 001fe067`bcbbbdff 00000000`00000000 ffffe480`00002000 fffff800`00000001 : nt!KiUpdateSpeculationControl+0x1d8
fffff60f`ad4aed10 fffff800`78a042f6 : 00000000`00000000 fffff800`788dbd1b fffff60f`ad4aee90 ffff8988`00000000 : nt!SwapContext+0x1b2
fffff60f`ad4aed50 fffff800`7881c9e0 : fffff800`00000000 00000000`00000000 00000000`00000000 00000000`0000009c : nt!KiSwapContext+0x76
fffff60f`ad4aee90 fffff800`7881bf0f : ffff8988`00000000 fffff800`00000016 00000000`00000000 00000000`00000000 : nt!KiSwapThread+0x500
fffff60f`ad4aef40 fffff800`788da582 : 00000000`000000ec 00000000`00000000 ffff8988`00000000 00000000`00000001 : nt!KiCommitThreadWait+0x14f
fffff60f`ad4aefe0 fffff800`78944be5 : ffff8988`5aef13f0 00000000`c0000054 00000000`ffffff00 00000000`00000002 : nt!KeDelayExecutionThread+0x122
fffff60f`ad4af070 fffff800`789b660b : fffff800`79250c00 00000000`00000011 ffff8988`5aef13f0 00000000`00000000 : nt!MiGatherMappedPages+0xa1
fffff60f`ad4af130 fffff800`78926915 : ffff8988`4aa08080 ffff8988`4aa08080 00000000`00000080 001fe067`bcbbbdff : nt!MiMappedPageWriter+0x18b
fffff60f`ad4af590 fffff800`78a04cf8 : fffff800`74172180 ffff8988`4aa08080 fffff800`789268c0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff60f`ad4af5e0 00000000`00000000 : fffff60f`ad4b0000 fffff60f`ad4a9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!KiUpdateSpeculationControl+1d8
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.3208
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1d8
FAILURE_BUCKET_ID: AV_nt!KiUpdateSpeculationControl
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {431d2158-d4ba-bb46-b2a9-7d404cafa803}
Loading unloaded module list
............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`5d1fc0c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffc107`ab106d90=000000000000000a
9: kd> !analyze -v
*** WARNING: Unable to verify timestamp for mtkwl6ex.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000fdd1, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000031, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8015d0df798, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1937
Key : Analysis.Elapsed.mSec
Value: 4178
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 234
Key : Analysis.Init.Elapsed.mSec
Value: 4429
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Failure.Bucket
Value: AV_mtkwl6ex!unknown_function
Key : Failure.Hash
Value: {7fbea1c0-2ec4-7d26-2ed6-cb151c611289}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: fdd1
BUGCHECK_P2: ff
BUGCHECK_P3: 31
BUGCHECK_P4: fffff8015d0df798
FILE_IN_CAB: 072823-10203-01.dmp
WRITE_ADDRESS: fffff8015dafb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
000000000000fdd1
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffc107ab106ed0 -- (.trap 0xffffc107ab106ed0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000042 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000400000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015d0df798 rsp=ffffc107ab107060 rbp=ffffd6802cb40180
r8=000000000e1070f6 r9=0000000000000082 r10=0000000008000000
r11=ffffd6802cb48200 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na po nc
nt!KiUpdateSpeculationControl+0x1d8:
fffff801`5d0df798 41808ffd00000002 or byte ptr [r15+0FDh],2 ds:00000000`000000fd=??
Resetting default scope
STACK_TEXT:
ffffc107`ab106d88 fffff801`5d210129 : 00000000`0000000a 00000000`0000fdd1 00000000`000000ff 00000000`00000031 : nt!KeBugCheckEx
ffffc107`ab106d90 fffff801`5d20bce3 : ffffc107`ab106f30 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc107`ab106ed0 fffff801`5d0df798 : 00000000`0000000f fffff801`5d01a126 ffffd680`00000000 ffffad83`9efee040 : nt!KiPageFault+0x463
ffffc107`ab107060 fffff801`5d204782 : 001fe067`bcbbbdff 00000000`00000000 ffffd680`00002000 fffff801`00000001 : nt!KiUpdateSpeculationControl+0x1d8
ffffc107`ab1070e0 fffff801`5d2042f6 : 00000000`00000000 fffff801`5d0dbd1b 00000000`00000000 00000000`00000000 : nt!SwapContext+0x1b2
ffffc107`ab107120 fffff801`5d01c9e0 : ffffd680`00000000 00000000`00000000 00000000`0cb80cf0 ffffc107`ab107330 : nt!KiSwapContext+0x76
ffffc107`ab107260 fffff801`5d01bf0f : ffffad83`00000009 ffffad83`00000011 ffffc107`ab107420 ffffad83`00000000 : nt!KiSwapThread+0x500
ffffc107`ab107310 fffff801`5d01b7b3 : ffffad83`00000000 ffffad83`00000000 ffffad83`a3010000 ffffad83`9efec180 : nt!KiCommitThreadWait+0x14f
ffffc107`ab1073b0 fffff801`5fa18fff : ffffad83`9df97a30 fffff801`00000000 00000000`00000000 ffffad83`9dc30000 : nt!KeWaitForSingleObject+0x233
ffffc107`ab1074a0 fffff801`9ac4dac2 : 00000000`00000000 fffff801`9ad90728 00000000`00000000 ffffad83`9df977d0 : ndis!NdisWaitEvent+0x3f
ffffc107`ab1074e0 00000000`00000000 : fffff801`9ad90728 00000000`00000000 ffffad83`9df977d0 ffffad83`9ccbcaa8 : mtkwl6ex+0xdac2
SYMBOL_NAME: mtkwl6ex+dac2
MODULE_NAME: mtkwl6ex
IMAGE_NAME: mtkwl6ex.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: dac2
FAILURE_BUCKET_ID: AV_mtkwl6ex!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7fbea1c0-2ec4-7d26-2ed6-cb151c611289}
Last edited by a moderator: