Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\040423-29312-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Machine Name:
Kernel base = 0xfffff803
Debug session time: Tue Apr 4 10:58:39.445 2023 (UTC + 1:00)
System Uptime: 1 days 11:23:24.223
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
......................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803
0: kd> !analyze -v
***
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff9292dac7879c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8090b8f2fd2, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1780
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 14653
Key : Analysis.IO.Other.Mb
Value: 23
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 28
Key : Analysis.Init.CPU.mSec
Value: 1046
Key : Analysis.Init.Elapsed.mSec
Value: 83379
Key : Analysis.Memory.CommitPeak.Mb
Value: 105
Key : Bugcheck.Code.DumpHeader
Value: 0xd1
Key : Bugcheck.Code.Register
Value: 0xa
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
FILE_IN_CAB: 040423-29312-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
BUGCHECK_CODE: d1
BUGCHECK_P1: ffff9292dac7879c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8090b8f2fd2
READ_ADDRESS: fffff8031d910450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff9292dac7879c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8031f8823f0 -- (.trap 0xfffff8031f8823f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff928749ce7940 rbx=0000000000000000 rcx=ffff928749ce7940
rdx=0000000b90f90e5c rsi=0000000000000000 rdi=0000000000000000
rip=fffff8090b8f2fd2 rsp=fffff8031f882588 rbp=fffff8031f882600
r8=00000000000000c0 r9=ffff928733b8d700 r10=ffff928733b8d000
r11=ffff9292dac7885c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff809
Resetting default scope
STACK_TEXT:
fffff803
fffff803
fffff803
fffff803
fffff803
fffff803
fffff803
fffff803
fffff803
fffff803
fffff803
fffff803
SYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.22000.653
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_VRF_kbdclass!memcpy
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {84316dad-d1ff-9348-eae9-d835eceab67e}
Followup: MachineOwner
---------
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\040423-29312-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Machine Name:
Kernel base = 0xfffff803
1cc0b000 PsLoadedModuleList = 0xfffff803
1d834b60Debug session time: Tue Apr 4 10:58:39.445 2023 (UTC + 1:00)
System Uptime: 1 days 11:23:24.223
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
......................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803
1d027770 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff803
1f8822b0=000000000000000a0: kd> !analyze -v
***
- *
- Bugcheck Analysis *
- *
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff9292dac7879c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8090b8f2fd2, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1780
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 14653
Key : Analysis.IO.Other.Mb
Value: 23
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 28
Key : Analysis.Init.CPU.mSec
Value: 1046
Key : Analysis.Init.Elapsed.mSec
Value: 83379
Key : Analysis.Memory.CommitPeak.Mb
Value: 105
Key : Bugcheck.Code.DumpHeader
Value: 0xd1
Key : Bugcheck.Code.Register
Value: 0xa
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
FILE_IN_CAB: 040423-29312-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
BUGCHECK_CODE: d1
BUGCHECK_P1: ffff9292dac7879c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8090b8f2fd2
READ_ADDRESS: fffff8031d910450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff9292dac7879c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8031f8823f0 -- (.trap 0xfffff8031f8823f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff928749ce7940 rbx=0000000000000000 rcx=ffff928749ce7940
rdx=0000000b90f90e5c rsi=0000000000000000 rdi=0000000000000000
rip=fffff8090b8f2fd2 rsp=fffff8031f882588 rbp=fffff8031f882600
r8=00000000000000c0 r9=ffff928733b8d700 r10=ffff928733b8d000
r11=ffff9292dac7885c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
kbdclass!memcpy+0x92:
fffff809
0b8f2fd2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffff9292
dac7879c=????????????????????????????????Resetting default scope
STACK_TEXT:
fffff803
1f8822a8 fffff803
1d03ca69 : 000000000000000a ffff9292
dac7879c 0000000000000002 00000000
00000000 : nt!KeBugCheckExfffff803
1f8822b0 fffff803
1d03824c : 0000000000200001 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiBugCheckDispatch+0x69fffff803
1f8823f0 fffff809
0b8f2fd2 : fffff8090b8f57ed 00000000
590981f4 fffff8031f882600 ffff9287
45db5aa0 : nt!KiPageFault+0x44cfffff803
1f882588 fffff809
0b8f57ed : 00000000590981f4 fffff803
1f882600 ffff928745db5aa0 fffff809
0b8b1cac : kbdclass!memcpy+0x92fffff803
1f882590 fffff809
0b8e1511 : ffff9287331261d0 fffff803
1f882758 ffff92872ff4c310 fffff803
1f882758 : kbdclass!KeyboardClassServiceCallback+0x16dfffff803
1f882630 ffff9287
331261d0 : fffff8031f882758 ffff9287
2ff4c310 fffff8031f882758 00000000
00000008 : HKKbdFltr+0x1511fffff803
1f882638 fffff803
1f882758 : ffff92872ff4c310 fffff803
1f882758 0000000000000008 fffff803
1f8826b0 : 0xffff9287331261d0
fffff803
1f882640 ffff92872ff4c310 : fffff803
1f882758 0000000000000008 fffff803
1f8826b0 ffff928733126080 : 0xfffff803
1f882758fffff803
1f882648 fffff803
1f882758 : 0000000000000008 fffff803
1f8826b0 ffff928733126080 fffff809
0b8e13f0 : 0xffff92872ff4c310
fffff803
1f882650 0000000000000008 : fffff803
1f8826b0 ffff928733126080 fffff809
0b8e13f0 00017db0bf1ee855 : 0xfffff803
1f882758fffff803
1f882658 fffff803
1f8826b0 : ffff928733126080 fffff809
0b8e13f0 00017db0bf1ee855 fffff809
0b8bb617 : 0x8fffff803
1f882660 ffff9287
33126080 : fffff8090b8e13f0 00017db0
bf1ee855 fffff8090b8bb617 ffff9287
331261d0 : 0xfffff8031f8826b0
fffff803
1f882668 fffff8090b8e13f0 : 00017db0
bf1ee855 fffff8090b8bb617 ffff9287
331261d0 fffff8031f8826e9 : 0xffff9287
33126080fffff803
1f882670 00017db0
bf1ee855 : fffff8090b8bb617 ffff9287
331261d0 fffff8031f8826e9 ffff9287
33180d80 : HKKbdFltr+0x13f0fffff803
1f882678 fffff809
0b8bb617 : ffff9287331261d0 fffff803
1f8826e9 ffff928733180d80 fffff809
0b8c01c8 : 0x00017db0bf1ee855
fffff803
1f882680 fffff8031ce2c631 : fffff803
1f882ac0 0000000000000010 00000000
00000000 fffff8031b23d4c0 : i8042prt!I8042KeyboardIsrDpc+0x1a7
fffff803
1f882750 fffff8031ce2b632 : 00000000
00000000 0000000000000000 00000000
00000000 0000000000000000 : nt!KiExecuteAllDpcs+0x491
fffff803
1f882950 fffff8031d02c52e : 00000000
00000000 fffff8031b23a180 fffff803
1d940bc0 ffff928742ea0080 : nt!KiRetireDpcList+0x2a2
fffff803
1f882c00 0000000000000000 : fffff803
1f883000 fffff8031f87c000 00000000
00000000 00000000`00000000 : nt!KiIdleLoop+0x9eSYMBOL_NAME: kbdclass!memcpy+92
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
IMAGE_VERSION: 10.0.22000.653
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 92
FAILURE_BUCKET_ID: AV_VRF_kbdclass!memcpy
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {84316dad-d1ff-9348-eae9-d835eceab67e}
Followup: MachineOwner
---------