1)
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802158627de, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1905
Key : Analysis.Elapsed.mSec
Value: 2000
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 358
Key : Analysis.Init.Elapsed.mSec
Value: 4509
Key : Analysis.Memory.CommitPeak.Mb
Value: 98
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: IP_MISALIGNED_GenuineIntel.sys
Key : Failure.Hash
Value: {e930d917-b247-3f7f-23cb-88a0c9f1b274}
BUGCHECK_CODE: a
BUGCHECK_P1: 1
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: fffff802158627de
FILE_IN_CAB: 062023-6375-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
READ_ADDRESS: fffff8021611c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000001
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff980f882478e0 -- (.trap 0xffff980f882478e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802158627de rsp=ffff980f88247a70 rbp=0000000000000000
r8=00000000041212fe r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!KiUpdateSpeculationControl+0x1454ee:
fffff802`158627de ad lods dword ptr [rsi] ds:00000000`00000000=????????
Resetting default scope
MISALIGNED_IP:
nt!KiUpdateSpeculationControl+1454ee
fffff802`158627de ad lods dword ptr [rsi]
STACK_TEXT:
ffff980f`88247798 fffff802`158418a9 : 00000000`0000000a 00000000`00000001 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffff980f`882477a0 fffff802`1583cf34 : ffffffff`00000000 ffffae81`ffffffff ffffdb9e`a7003312 ffffd284`dcfea5c0 : nt!KiBugCheckDispatch+0x69
ffff980f`882478e0 fffff802`158627de : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x474
ffff980f`88247a70 fffff802`158359b7 : 004fa4ef`bd9bbfff ffffd284`00000000 ffffd284`00400000 ffffae81`0465127b : nt!KiUpdateSpeculationControl+0x1454ee
ffff980f`88247b00 fffff802`15831156 : 00000000`00000000 00000000`00000000 ffffd284`d6735040 ffffd284`e6b175c0 : nt!SwapContext+0x1c7
ffff980f`88247b40 00000000`00000000 : ffff980f`88248000 ffff980f`88241000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x176
SYMBOL_NAME: nt!KiUpdateSpeculationControl+1454ee
IMAGE_VERSION: 10.0.22621.1848
STACK_COMMAND: .cxr; .ecxr ; kb
MODULE_NAME: GenuineIntel
IMAGE_NAME: GenuineIntel.sys
FAILURE_BUCKET_ID: IP_MISALIGNED_GenuineIntel.sys
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e930d917-b247-3f7f-23cb-88a0c9f1b274}
Followup: MachineOwner
2)
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000004, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 000000000000002b, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80630ee1a8d, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1609
Key : Analysis.Elapsed.mSec
Value: 1629
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 342
Key : Analysis.Init.Elapsed.mSec
Value: 4745
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_CODE_AV_nt!EtwpLevelKeywordEnabled
Key : Failure.Hash
Value: {568a980c-750f-2c52-bdd7-8f69b0c91d59}
BUGCHECK_CODE: a
BUGCHECK_P1: 4
BUGCHECK_P2: ff
BUGCHECK_P3: 2b
BUGCHECK_P4: fffff80630ee1a8d
FILE_IN_CAB: 062023-6390-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
WRITE_ADDRESS: fffff8063191c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000004
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Diablo IV.exe
TRAP_FRAME: ffffb9805457aaf0 -- (.trap 0xffffb9805457aaf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000003a1 rbx=0000000000000000 rcx=ffff8505733fd770
rdx=0000000000000004 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80630ee1a8d rsp=ffffb9805457ac88 rbp=0000000000027100
r8=4000000000000004 r9=4000000000000004 r10=fffff80630f6a7e0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!EtwpLevelKeywordEnabled+0x1d:
fffff806`30ee1a8d 7508 jne nt!EtwpLevelKeywordEnabled+0x27 (fffff806`30ee1a97) [br=0]
Resetting default scope
STACK_TEXT:
ffffb980`5457a9a8 fffff806`310418a9 : 00000000`0000000a 00000000`00000004 00000000`000000ff 00000000`0000002b : nt!KeBugCheckEx
ffffb980`5457a9b0 fffff806`3103cf34 : b903ed9b`e8496a0f fffff806`93949ed3 ffff8505`80c1e4e0 00000000`00000007 : nt!KiBugCheckDispatch+0x69
ffffb980`5457aaf0 fffff806`30ee1a8d : fffff806`30ee09e9 0000001d`ad8060d5 00000000`00000001 ffffb980`54560180 : nt!KiPageFault+0x474
ffffb980`5457ac88 fffff806`30ee09e9 : 0000001d`ad8060d5 00000000`00000001 ffffb980`54560180 00000000`00027100 : nt!EtwpLevelKeywordEnabled+0x1d
ffffb980`5457ac90 fffff806`30edfb6f : 00000000`00000003 ffffb980`54560180 00000000`00027100 00000000`00027100 : nt!EtwEventEnabled+0x59
ffffb980`5457acc0 fffff806`30edcaa6 : 00000000`0000000d 00000000`00000000 ffffb980`54560180 00000000`00000c7e : nt!KiSetNextClockTickDueTime+0x46f
ffffb980`5457aea0 fffff806`30edc219 : fffff806`3185ff20 00000000`00000001 00000000`00000001 00000000`00000000 : nt!KeClockInterruptNotify+0x366
ffffb980`5457af40 fffff806`30f1757c : 0000001d`add48570 ffff8505`72d59fe0 ffff8505`72d5a090 00000000`00000000 : nt!HalpTimerClockInterrupt+0x109
ffffb980`5457af70 fffff806`3102e3da : ffffc987`34b5fa60 ffff8505`72d59fe0 0000025d`e5d767b0 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0x9c
ffffb980`5457afb0 fffff806`3102ec47 : 0000025e`106b8380 ffff8505`72d59b60 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffc987`34b5f9e0 00007ff6`eb4c3c82 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
000000fa`232fe8c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff6`eb4c3c82
SYMBOL_NAME: nt!EtwpLevelKeywordEnabled+1d
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.1848
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1d
FAILURE_BUCKET_ID: AV_CODE_AV_nt!EtwpLevelKeywordEnabled
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {568a980c-750f-2c52-bdd7-8f69b0c91d59}
Followup: MachineOwner
3)
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8013f0b6542, Address of the instruction which caused the BugCheck
Arg3: ffff800717f7e7c0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1546
Key : Analysis.Elapsed.mSec
Value: 1555
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 327
Key : Analysis.Init.Elapsed.mSec
Value: 4986
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Bugcheck.Code.LegacyAPI
Value: 0x3b
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_nt!ObWaitForMultipleObjects
Key : Failure.Hash
Value: {53188f0d-e1b8-788f-a37a-25a7a83704bd}
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8013f0b6542
BUGCHECK_P3: ffff800717f7e7c0
BUGCHECK_P4: 0
FILE_IN_CAB: 062023-6453-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
CONTEXT: ffff800717f7e7c0 -- (.cxr 0xffff800717f7e7c0)
rax=0000000000000000 rbx=0000000017f7f488 rcx=8bdf0a28619c0000
rdx=000000007457624f rsi=0000000000000000 rdi=0000000000000003
rip=fffff8013f0b6542 rsp=ffff800717f7f1e0 rbp=ffff800717f7f220
r8=0000000000000001 r9=00000000000000a0 r10=00000000000000a0
r11=ffff800717f7f290 r12=0000000000000000 r13=ffff950b3b31d700
r14=ffff950b3a591080 r15=ffff950b3a695080
iopl=0 ov up ei pl nz ac pe nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050a12
nt!ObWaitForMultipleObjects+0x322:
fffff801`3f0b6542 488b0b mov rcx,qword ptr [rbx] ds:002b:00000000`17f7f488=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MsMpEng.exe
STACK_TEXT:
ffff8007`17f7f1e0 fffff801`3f19ce2c : ffff950b`00000000 fffff801`00000001 ffff8007`17f7f728 ffffaa01`0ca8f180 : nt!ObWaitForMultipleObjects+0x322
ffff8007`17f7f6e0 fffff801`3ee40fe5 : ffff950b`38635dc8 fffff801`3ee6f7de ffff950b`3a591080 00000000`00000000 : nt!NtWaitForMultipleObjects+0x11c
ffff8007`17f7f970 00007fff`9e22f7a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000081`1f47f238 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`9e22f7a4
SYMBOL_NAME: nt!ObWaitForMultipleObjects+322
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.1848
STACK_COMMAND: .cxr 0xffff800717f7e7c0 ; kb
BUCKET_ID_FUNC_OFFSET: 322
FAILURE_BUCKET_ID: AV_nt!ObWaitForMultipleObjects
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {53188f0d-e1b8-788f-a37a-25a7a83704bd}
Followup: MachineOwner
---------
4)
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000004588c122, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000056, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8045542e2fc, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1562
Key : Analysis.Elapsed.mSec
Value: 1561
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 328
Key : Analysis.Init.Elapsed.mSec
Value: 4357
Key : Analysis.Memory.CommitPeak.Mb
Value: 97
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_CODE_AV_nt!KiInterruptSubDispatchNoLockNoEtw
Key : Failure.Hash
Value: {6a9bf971-fd09-0acd-c057-c021331220bb}
BUGCHECK_CODE: a
BUGCHECK_P1: 4588c122
BUGCHECK_P2: ff
BUGCHECK_P3: 56
BUGCHECK_P4: fffff8045542e2fc
FILE_IN_CAB: 062023-6406-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
READ_ADDRESS: fffff80455d1c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
000000004588c122
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: ffff99003e57ae20 -- (.trap 0xffff99003e57ae20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000000f
rdx=ffffde8c532079e0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8045542e2fc rsp=ffff99003e57afb0 rbp=ffffde8c53207a60
r8=00000000fc8c5b53 r9=0000000078620c25 r10=fffff8045542ec10
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!KiInterruptSubDispatchNoLockNoEtw+0x1c:
fffff804`5542e2fc 440f22c1 mov cr8,rcx
Resetting default scope
STACK_TEXT:
ffff9900`3e57acd8 fffff804`554418a9 : 00000000`0000000a 00000000`4588c122 00000000`000000ff 00000000`00000056 : nt!KeBugCheckEx
ffff9900`3e57ace0 fffff804`5543cf34 : 00000000`00000001 000000b2`1759ab62 00000023`c49ab003 00000026`ffcda0b1 : nt!KiBugCheckDispatch+0x69
ffff9900`3e57ae20 fffff804`5542e2fc : ffffde8c`53207a60 ffffa98e`8ff48b60 00000000`01bffd40 00000000`00000000 : nt!KiPageFault+0x474
ffff9900`3e57afb0 fffff804`5542ec47 : 0000271c`00000000 ffffa98e`00000001 0000271c`014de000 0000271c`006b33c0 : nt!KiInterruptSubDispatchNoLockNoEtw+0x1c
ffffde8c`532079e0 00007ffa`e8ff6288 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
00000005`0ddff3c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`e8ff6288
SYMBOL_NAME: nt!KiInterruptSubDispatchNoLockNoEtw+1c
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.1848
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1c
FAILURE_BUCKET_ID: AV_CODE_AV_nt!KiInterruptSubDispatchNoLockNoEtw
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6a9bf971-fd09-0acd-c057-c021331220bb}
Followup: MachineOwner
---------
5)
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffffffffffffd13, memory referenced.
Arg2: 0000000000000002, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8037608644d, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Write
Key : Analysis.CPU.mSec
Value: 1796
Key : Analysis.Elapsed.mSec
Value: 1833
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 343
Key : Analysis.Init.Elapsed.mSec
Value: 4694
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Bugcheck.Code.LegacyAPI
Value: 0x50
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_W_(null)_nt!ExAllocateHeapPool
Key : Failure.Hash
Value: {40a8fda6-b978-062a-8930-a958e50d0f5f}
BUGCHECK_CODE: 50
BUGCHECK_P1: fffffffffffffd13
BUGCHECK_P2: 2
BUGCHECK_P3: fffff8037608644d
BUGCHECK_P4: 2
FILE_IN_CAB: 062023-6453-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
READ_ADDRESS: fffff80376b1c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffffffffffffd13
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: RtkAudUService
TRAP_FRAME: fffff4086f986ff0 -- (.trap 0xfffff4086f986ff0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=fffff80376a74840
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037608644d rsp=fffff4086f987180 rbp=fffff4086f987241
r8=fffff80375e00000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!ExAllocateHeapPool+0x43d:
fffff803`7608644d 0f8713fdffff ja nt!ExAllocateHeapPool+0x156 (fffff803`76086166) [br=0]
Resetting default scope
STACK_TEXT:
fffff408`6f986dc8 fffff803`7628d6b9 : 00000000`00000050 ffffffff`fffffd13 00000000`00000002 fffff408`6f986ff0 : nt!KeBugCheckEx
fffff408`6f986dd0 fffff803`76033f0c : 00000000`00000000 00000000`00000002 00000000`00000000 ffffffff`fffffd13 : nt!MiSystemFault+0x25d1e9
fffff408`6f986ed0 fffff803`7623ce29 : 00000000`00000000 00000000`00000000 00000000`20206d4d 00000000`00000000 : nt!MmAccessFault+0x29c
fffff408`6f986ff0 fffff803`7608644d : 00000001`00000004 00000000`00000000 00000000`00000000 00000000`00000005 : nt!KiPageFault+0x369
fffff408`6f987180 fffff803`76085fdf : 00000000`00000000 00000000`00000200 00000000`20206d4d ffffa80c`79b662b0 : nt!ExAllocateHeapPool+0x43d
fffff408`6f9872a0 fffff803`7602af76 : 00000000`80000000 00000000`00000410 00000000`20206d4d fffff803`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f
fffff408`6f9872f0 fffff803`766ae602 : ffffa80c`79b662b0 ffffa80c`76690a50 ffffa80c`79b1fd70 00000000`00000000 : nt!MiAllocatePool+0x86
fffff408`6f987340 fffff803`766a65a6 : ffffa80c`6e0f3600 fffff408`6f987490 00000000`00000000 00000000`00000000 : nt!MmGetFileNameForAddress+0x80
fffff408`6f987390 fffff803`766a48b8 : ffffa80c`6e3fdd00 ffffa80c`6e3fdd00 ffffa80c`79b1fd70 ffffa80c`79b1fd70 : nt!EtwpProviderArrivalCallback+0xe5946
fffff408`6f987620 fffff803`7651a393 : 00000000`00000000 00000000`00000001 00000000`0000003e 00000000`00000000 : nt!EtwpAddRegEntryToGroup+0x18cd08
fffff408`6f9877a0 fffff803`7651a1b5 : 00000000`00000000 00000000`00000090 ffffffff`ffffffff 00000000`00a84430 : nt!EtwpSetProviderTraitsCommon+0x1a7
fffff408`6f987850 fffff803`765186af : ffffa80c`79b1fd70 00000000`0000001e 00000042`00000005 ffffa80c`79b1fd70 : nt!EtwpSetProviderTraitsUm+0x16d
fffff408`6f9878d0 fffff803`76240fe5 : 00000000`0000001e 00000042`000fcb68 00000000`00000018 00000042`000fcb80 : nt!NtTraceControl+0x35f
fffff408`6f987970 00007ffb`322b26a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000042`000fcb28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`322b26a4
SYMBOL_NAME: nt!ExAllocateHeapPool+43d
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.1848
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 43d
FAILURE_BUCKET_ID: AV_W_(null)_nt!ExAllocateHeapPool
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {40a8fda6-b978-062a-8930-a958e50d0f5f}
Followup: MachineOwner