The DRIVER_IRQL_NOT_LESS_OR_EQUAL bug check has a value of 0x000000D1. This indicates that a kernel-mode driver attempted to access pageable memory at a process IRQL that was too high.
Code:
Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\021619-14531-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 17134 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 17134.1.amd64fre.rs4_release.180410-1804
Machine Name:
Kernel base = 0xfffff801`45a0b000 PsLoadedModuleList = 0xfffff801`45db9150
Debug session time: Sun Feb 17 03:11:18.314 2019 (UTC + 1:00)
System Uptime: 8 days 1:55:51.434
Loading Kernel Symbols
...............................................................
................................................................
.......................................................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffff8016a8824c0, ff, aa, fffff8016a8824c0}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+425 )
Followup: MachineOwner
---------
11: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8016a8824c0, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 00000000000000aa, value 0 = read operation, 1 = write operation
Arg4: fffff8016a8824c0, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: PRIME Z390-A
SYSTEM_SKU: SKU
SYSTEM_VERSION: 0224
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0224
BIOS_DATE: 08/14/2018
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME Z390-A
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 2
BUGCHECK_P1: fffff8016a8824c0
BUGCHECK_P2: ff
BUGCHECK_P3: aa
BUGCHECK_P4: fffff8016a8824c0
READ_ADDRESS: fffff80145e58388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8016a8824c0
CURRENT_IRQL: 0
FAULTING_IP:
+0
fffff801`6a8824c0 ?? ???
ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.
BUGCHECK_STR: DISABLED_INTERRUPT_FAULT
CPU_COUNT: c
CPU_MHZ: fa8
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: a
CPU_MICROCODE: 6,9e,a,0 (F,M,S,R) SIG: 96'00000000 (cache) 96'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: r5apex.exe
ANALYSIS_SESSION_HOST: MICHAL
ANALYSIS_SESSION_TIME: 03-23-2019 21:58:04.0024
ANALYSIS_VERSION: 10.0.17763.132 amd64fre
TRAP_FRAME: ffff908d0371f6d0 -- (.trap 0xffff908d0371f6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000236726c0000 rbx=0000000000000000 rcx=0000000000000000
rdx=00000236726c1000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8016a8824c0 rsp=ffff908d0371f860 rbp=ffff908d0371fa80
r8=0000000000000000 r9=0000000000010000 r10=00007fffffff0000
r11=ffffab040a85c040 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
fffff801`6a8824c0 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80145bc5c69 to fffff80145bb50a0
FAILED_INSTRUCTION_ADDRESS:
+0
fffff801`6a8824c0 ?? ???
STACK_TEXT:
ffff908d`0371f588 fffff801`45bc5c69 : 00000000`0000000a fffff801`6a8824c0 00000000`000000ff 00000000`000000aa : nt!KeBugCheckEx
ffff908d`0371f590 fffff801`45bc28e5 : 00000000`00000000 00000000`00000000 ffff9987`7b943ee0 00000000`00000286 : nt!KiBugCheckDispatch+0x69
ffff908d`0371f6d0 fffff801`6a8824c0 : 00000000`00000000 fffff801`45f1e949 00000000`00000010 00000000`00010287 : nt!KiPageFault+0x425
ffff908d`0371f860 00000000`00000000 : fffff801`45f1e949 00000000`00000010 00000000`00010287 ffff908d`0371f890 : 0xfffff801`6a8824c0
THREAD_SHA1_HASH_MOD_FUNC: bf99962f16aee8a6a536cfcc5454c0cd4db15ac9
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 79f80cc7f571cb0ec417faf51633559f1df31f0e
THREAD_SHA1_HASH_MOD: 2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b
FOLLOWUP_IP:
nt!KiPageFault+425
fffff801`45bc28e5 33c0 xor eax,eax
FAULT_INSTR_CODE: ffb0c033
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+425
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5c2b0c3d
IMAGE_VERSION: 10.0.17134.523
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 425
FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault
BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault
PRIMARY_PROBLEM_CLASS: DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault
TARGET_TIME: 2019-02-17T02:11:18.000Z
OSBUILD: 17134
OSSERVICEPACK: 523
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-01-01 07:44:13
BUILDDATESTAMP_STR: 180410-1804
BUILDLAB_STR: rs4_release
BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804
ANALYSIS_SESSION_ELAPSED_TIME: 1075
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:disabled_interrupt_fault_code_av_bad_ip_nt!kipagefault
FAILURE_ID_HASH: {f2ab72c5-099d-9077-bfcf-ba12aa825b36}
Followup: MachineOwner
---------
11: kd> .trap 0xffff908d0371f6d0
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000236726c0000 rbx=0000000000000000 rcx=0000000000000000
rdx=00000236726c1000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8016a8824c0 rsp=ffff908d0371f860 rbp=ffff908d0371fa80
r8=0000000000000000 r9=0000000000010000 r10=00007fffffff0000
r11=ffffab040a85c040 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
fffff801`6a8824c0 ?? ???
11: kd> kb
*** Stack trace for last set context - .thread/.cxr resets it
# RetAddr : Args to Child : Call Site
00 00000000`00000000 : fffff801`45f1e949 00000000`00000010 00000000`00010287 ffff908d`0371f890 : 0xfffff801`6a8824c0
11: kd> .load pde
=========================================================================================
PDE v11.3 - Copyright 2017 Andrew Richards
=========================================================================================
11: kd> !dpx
Start memory scan : 0xffff908d0371f588 ($csp)
End memory scan : 0xffff908d03720000 (Kernel Stack Base)
0xffff908d0371f588 : 0xfffff80145bc5c69 : nt!KiBugCheckDispatch+0x69
0xffff908d0371f6c8 : 0xfffff80145bc28e5 : nt!KiPageFault+0x425
0xffff908d0371f6d0 : 0x0000000000000000 : Trap @ ffff908d0371f6d0
0xffff908d0371f700 : 0x00000236726c0000 : Trap @ ffff908d0371f700
0xffff908d0371f738 : 0xfffff80145f080e9 : nt!IopSynchronousServiceTail+0x2b9
0xffff908d0371f7a8 : 0xfffff80145f06942 : nt!ObpReferenceObjectByHandleWithTag+0x272
0xffff908d0371f7b8 : 0xfffff80145f0e1ab : nt!RtlpSanitizeContextFlags+0x13
0xffff908d0371f868 : 0xfffff80145f1e949 : nt!NtReadFile+0x149
0xffff908d0371f988 : 0xfffff80145bc5743 : nt!KiSystemServiceCopyEnd+0x13
0xffff908d0371f9f8 : 0xfffff80145bc5509 : nt!KiSystemServiceUser+0x47
0xffff908d0371fa00 : 0xffff99877bae9080 : Trap @ ffff908d0371fa00
Code:
Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\030919-13359-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 17134 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 17134.1.amd64fre.rs4_release.180410-1804
Machine Name:
Kernel base = 0xfffff801`83206000 PsLoadedModuleList = 0xfffff801`835b4150
Debug session time: Sat Mar 9 06:49:54.375 2019 (UTC + 1:00)
System Uptime: 14 days 0:15:50.092
Loading Kernel Symbols
...............................................................
................................................................
........................................................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffff801a807d4c0, ff, 29, fffff801a807d4c0}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+425 )
Followup: MachineOwner
---------
7: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff801a807d4c0, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000029, value 0 = read operation, 1 = write operation
Arg4: fffff801a807d4c0, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: PRIME Z390-A
SYSTEM_SKU: SKU
SYSTEM_VERSION: 0224
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0224
BIOS_DATE: 08/14/2018
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME Z390-A
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 2
BUGCHECK_P1: fffff801a807d4c0
BUGCHECK_P2: ff
BUGCHECK_P3: 29
BUGCHECK_P4: fffff801a807d4c0
CURRENT_IRQL: 0
FAULTING_IP:
+0
fffff801`a807d4c0 ?? ???
ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.
BUGCHECK_STR: DISABLED_INTERRUPT_FAULT
CPU_COUNT: c
CPU_MHZ: fa8
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: a
CPU_MICROCODE: 6,9e,a,0 (F,M,S,R) SIG: 96'00000000 (cache) 96'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: r5apex.exe
ANALYSIS_SESSION_HOST: MICHAL
ANALYSIS_SESSION_TIME: 03-23-2019 22:00:31.0791
ANALYSIS_VERSION: 10.0.17763.132 amd64fre
TRAP_FRAME: ffffbe053252f6d0 -- (.trap 0xffffbe053252f6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000129cb0a0000 rbx=0000000000000000 rcx=0000000000000000
rdx=00000129cb0a1000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801a807d4c0 rsp=ffffbe053252f860 rbp=ffffbe053252fa80
r8=0000000000000000 r9=0000000000010000 r10=00007fffffff0000
r11=ffffbf829adf5040 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
fffff801`a807d4c0 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff801833c0c69 to fffff801833b00a0
STACK_TEXT:
ffffbe05`3252f588 fffff801`833c0c69 : 00000000`0000000a fffff801`a807d4c0 00000000`000000ff 00000000`00000029 : nt!KeBugCheckEx
ffffbe05`3252f590 fffff801`833bd8e5 : 00000000`00000000 ffff868e`3a76e260 00000000`00000000 ffff868e`2b355750 : nt!KiBugCheckDispatch+0x69
ffffbe05`3252f6d0 fffff801`a807d4c0 : 00000000`00000000 fffff801`83719949 00000000`00000010 00000000`00010287 : nt!KiPageFault+0x425
ffffbe05`3252f860 00000000`00000000 : fffff801`83719949 00000000`00000010 00000000`00010287 ffffbe05`3252f890 : 0xfffff801`a807d4c0
THREAD_SHA1_HASH_MOD_FUNC: bf99962f16aee8a6a536cfcc5454c0cd4db15ac9
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 79f80cc7f571cb0ec417faf51633559f1df31f0e
THREAD_SHA1_HASH_MOD: 2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b
FOLLOWUP_IP:
nt!KiPageFault+425
fffff801`833bd8e5 33c0 xor eax,eax
FAULT_INSTR_CODE: ffb0c033
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+425
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5c2b0c3d
IMAGE_VERSION: 10.0.17134.523
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 425
FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_nt!KiPageFault
BUCKET_ID: DISABLED_INTERRUPT_FAULT_nt!KiPageFault
PRIMARY_PROBLEM_CLASS: DISABLED_INTERRUPT_FAULT_nt!KiPageFault
TARGET_TIME: 2019-03-09T05:49:54.000Z
OSBUILD: 17134
OSSERVICEPACK: 523
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-01-01 07:44:13
BUILDDATESTAMP_STR: 180410-1804
BUILDLAB_STR: rs4_release
BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804
ANALYSIS_SESSION_ELAPSED_TIME: efb
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:disabled_interrupt_fault_nt!kipagefault
FAILURE_ID_HASH: {4e9c41db-c8e3-cbef-73a7-1b373e8262de}
Followup: MachineOwner
---------
7: kd> .trap 0xffffbe053252f6d0
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000129cb0a0000 rbx=0000000000000000 rcx=0000000000000000
rdx=00000129cb0a1000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801a807d4c0 rsp=ffffbe053252f860 rbp=ffffbe053252fa80
r8=0000000000000000 r9=0000000000010000 r10=00007fffffff0000
r11=ffffbf829adf5040 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
fffff801`a807d4c0 ?? ???
7: kd> kb
*** Stack trace for last set context - .thread/.cxr resets it
# RetAddr : Args to Child : Call Site
00 00000000`00000000 : fffff801`83719949 00000000`00000010 00000000`00010287 ffffbe05`3252f890 : 0xfffff801`a807d4c0
7: kd> .load pde
=========================================================================================
PDE v11.3 - Copyright 2017 Andrew Richards
=========================================================================================
7: kd> !dpx
Start memory scan : 0xffffbe053252f588 ($csp)
End memory scan : 0xffffbe0532530000 (Kernel Stack Base)
0xffffbe053252f588 : 0xfffff801833c0c69 : nt!KiBugCheckDispatch+0x69
0xffffbe053252f6c8 : 0xfffff801833bd8e5 : nt!KiPageFault+0x425
0xffffbe053252f6d0 : 0x0000000000000000 : Trap @ ffffbe053252f6d0
0xffffbe053252f700 : 0x00000129cb0a0000 : Trap @ ffffbe053252f700
0xffffbe053252f738 : 0xfffff801837030e9 : nt!IopSynchronousServiceTail+0x2b9
0xffffbe053252f7a8 : 0xfffff80183701942 : nt!ObpReferenceObjectByHandleWithTag+0x272
0xffffbe053252f7b8 : 0xfffff801837091ab : nt!RtlpSanitizeContextFlags+0x13
0xffffbe053252f868 : 0xfffff80183719949 : nt!NtReadFile+0x149
0xffffbe053252f988 : 0xfffff801833c0743 : nt!KiSystemServiceCopyEnd+0x13
0xffffbe053252f9f8 : 0xfffff801833c0509 : nt!KiSystemServiceUser+0x47
0xffffbe053252fa00 : 0xffff868e3eb05700 : Trap @ ffffbe053252fa00
The DRIVER_VERIFIER_DETECTED_VIOLATION bug check has a value of 0x000000C4. This is the general bug check code for fatal errors found by Driver Verifier.
Code:
Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\030919-10265-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 17134 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 17134.1.amd64fre.rs4_release.180410-1804
Machine Name:
Kernel base = 0xfffff801`bc89d000 PsLoadedModuleList = 0xfffff801`bcc4b150
Debug session time: Sat Mar 9 07:30:21.815 2019 (UTC + 1:00)
System Uptime: 0 days 0:00:08.562
Loading Kernel Symbols
...............................................................
...........................
Loading User Symbols
Loading unloaded module list
..
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C4, {2000, fffff805eb8e16e3, 0, 54525049}
*** WARNING: Unable to verify timestamp for YSDrv.sys
*** ERROR: Module load completed but symbols could not be loaded for YSDrv.sys
Probably caused by : YSDrv.sys ( YSDrv+216e3 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
A device driver attempting to corrupt the system has been caught. This is
because the driver was specified in the registry as being suspect (by the
administrator) and the kernel has enabled substantial checking of this driver.
If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
be among the most commonly seen crashes.
Arguments:
Arg1: 0000000000002000, Code Integrity Issue: The caller specified an executable pool type. (Expected: NonPagedPoolNx)
Arg2: fffff805eb8e16e3, The address in the driver's code where the error was detected.
Arg3: 0000000000000000, Pool Type.
Arg4: 0000000054525049, Pool Tag (if provided).
Debugging Details:
------------------
KEY_VALUES_STRING: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804
DUMP_TYPE: 2
BUGCHECK_P1: 2000
BUGCHECK_P2: fffff805eb8e16e3
BUGCHECK_P3: 0
BUGCHECK_P4: 54525049
BUGCHECK_STR: 0xc4_2000
CPU_COUNT: c
CPU_MHZ: fa8
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: a
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: MICHAL
ANALYSIS_SESSION_TIME: 03-23-2019 22:01:48.0825
ANALYSIS_VERSION: 10.0.17763.132 amd64fre
LAST_CONTROL_TRANSFER: from fffff801bd0bb483 to fffff801bca470a0
STACK_TEXT:
ffff8a8c`9ba075a8 fffff801`bd0bb483 : 00000000`000000c4 00000000`00002000 fffff805`eb8e16e3 00000000`00000000 : nt!KeBugCheckEx
ffff8a8c`9ba075b0 fffff801`bcb473db : fffff801`bcc3b184 00000000`00002000 fffff805`eb8e16e3 00000000`00000000 : nt!VerifierBugCheckIfAppropriate+0xdf
ffff8a8c`9ba075f0 fffff801`bd0b343c : 00000000`54525049 fffff801`bcc3b184 fffff805`eb8e16e3 00000000`00000000 : nt!VfReportIssueWithOptions+0x103
ffff8a8c`9ba07640 fffff801`bd0b14e3 : 00000000`00000000 ffff8a8c`9ba07930 00000000`00000038 00000000`00000010 : nt!VfCheckPoolType+0x90
ffff8a8c`9ba07680 fffff805`eb8e16e3 : 00000000`00000028 ffff8a8c`9ba07740 fffff805`eb8ed0d0 fffff805`eb8de637 : nt!VerifierExAllocatePoolWithTag+0x53
ffff8a8c`9ba076d0 00000000`00000028 : ffff8a8c`9ba07740 fffff805`eb8ed0d0 fffff805`eb8de637 fffff805`eb8f66f8 : YSDrv+0x216e3
ffff8a8c`9ba076d8 ffff8a8c`9ba07740 : fffff805`eb8ed0d0 fffff805`eb8de637 fffff805`eb8f66f8 fffff805`eb8d7410 : 0x28
ffff8a8c`9ba076e0 fffff805`eb8ed0d0 : fffff805`eb8de637 fffff805`eb8f66f8 fffff805`eb8d7410 00000000`00000002 : 0xffff8a8c`9ba07740
ffff8a8c`9ba076e8 fffff805`eb8de637 : fffff805`eb8f66f8 fffff805`eb8d7410 00000000`00000002 ffff8f05`87d3f9c0 : YSDrv+0x2d0d0
ffff8a8c`9ba076f0 fffff805`eb8f66f8 : fffff805`eb8d7410 00000000`00000002 ffff8f05`87d3f9c0 fffff805`eb8ed390 : YSDrv+0x1e637
ffff8a8c`9ba076f8 fffff805`eb8d7410 : 00000000`00000002 ffff8f05`87d3f9c0 fffff805`eb8ed390 00000000`00000000 : YSDrv+0x366f8
ffff8a8c`9ba07700 00000000`00000002 : ffff8f05`87d3f9c0 fffff805`eb8ed390 00000000`00000000 fffff801`bb444180 : YSDrv+0x17410
ffff8a8c`9ba07708 ffff8f05`87d3f9c0 : fffff805`eb8ed390 00000000`00000000 fffff801`bb444180 fffff805`eb8d335a : 0x2
ffff8a8c`9ba07710 fffff805`eb8ed390 : 00000000`00000000 fffff801`bb444180 fffff805`eb8d335a fffff805`eb8ed3f0 : 0xffff8f05`87d3f9c0
ffff8a8c`9ba07718 00000000`00000000 : fffff801`bb444180 fffff805`eb8d335a fffff805`eb8ed3f0 49656e69`756e6547 : YSDrv+0x2d390
THREAD_SHA1_HASH_MOD_FUNC: 64ef13277e4b75d2e1bc7d7236cb4d774c1ffad9
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1509a1bc1fa99ded12654edabdc84334d6307486
THREAD_SHA1_HASH_MOD: a50acf136ef0f7556e3022101e8ab85eedf8915b
FOLLOWUP_IP:
YSDrv+216e3
fffff805`eb8e16e3 4885c0 test rax,rax
FAULT_INSTR_CODE: 75c08548
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: YSDrv+216e3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: YSDrv
IMAGE_NAME: YSDrv.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 58830289
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 216e3
FAILURE_BUCKET_ID: 0xc4_2000_VRF_YSDrv!unknown_function
BUCKET_ID: 0xc4_2000_VRF_YSDrv!unknown_function
PRIMARY_PROBLEM_CLASS: 0xc4_2000_VRF_YSDrv!unknown_function
TARGET_TIME: 2019-03-09T06:30:21.000Z
OSBUILD: 17134
OSSERVICEPACK: 523
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-01-01 07:44:13
BUILDDATESTAMP_STR: 180410-1804
BUILDLAB_STR: rs4_release
BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804
ANALYSIS_SESSION_ELAPSED_TIME: 247a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xc4_2000_vrf_ysdrv!unknown_function
FAILURE_ID_HASH: {2a2f276b-4093-c410-6e0c-46f936b4972c}
Followup: MachineOwner
---------
0: kd> !verifier
Verify Flags Level 0x03adefbb
STANDARD FLAGS:
[X] (0x00000000) Automatic Checks
[X] (0x00000001) Special pool
[X] (0x00000002) Force IRQL checking
[X] (0x00000008) Pool tracking
[X] (0x00000010) I/O verification
[X] (0x00000020) Deadlock detection
[X] (0x00000080) DMA checking
[X] (0x00000100) Security checks
[X] (0x00000800) Miscellaneous checks
[ ] (0x00020000) DDI compliance checking
ADDITIONAL FLAGS:
[ ] (0x00000004) Randomized low resources simulation
[X] (0x00000200) Force pending I/O requests
[X] (0x00000400) IRP logging
[X] (0x00002000) Invariant MDL checking for stack
[X] (0x00004000) Invariant MDL checking for driver
[X] (0x00008000) Power framework delay fuzzing
[X] (0x00010000) Port/miniport interface checking
[X] (0x00040000) Systematic low resources simulation
[X] (0x00080000) DDI compliance checking (additional)
[X] (0x00200000) NDIS/WIFI verification
[X] (0x00800000) Kernel synchronization delay fuzzing
[X] (0x01000000) VM switch verification
[X] (0x02000000) Code integrity checks
[X] Indicates flag is enabled
Summary of All Verifier Statistics
RaiseIrqls 0x19
AcquireSpinLocks 0x10
Synch Executions 0x0
Trims 0x3d
Pool Allocations Attempted 0x2402
Pool Allocations Succeeded 0x2402
Pool Allocations Succeeded SpecialPool 0x2402
Pool Allocations With NO TAG 0x0
Pool Allocations Failed 0x0
Current paged pool allocations 0x13 for 0000268A bytes
Peak paged pool allocations 0x14 for 000026AA bytes
Current nonpaged pool allocations 0x9f for 02024CA8 bytes
Peak nonpaged pool allocations 0x9f for 02024CA8 bytes
Execute pool type count 0x0
Execute page protection count 0x0
Execute page mapping count 0x0
Execute-Write section count 0x0
Section alignment failures 0x0
IAT Executable Section failures: 0x0
YSDrv.sys = VirtualBox driver (update it):
Code:
0: kd> lmvm ysdrv
Browse full module list
start end module name
fffff805`eb8c0000 fffff805`eb903000 YSDrv T (no symbols)
Loaded symbol image file: YSDrv.sys
Image path: \??\C:\Program Files (x86)\Bignox\BigNoxVM\RT\YSDrv.sys
Image name: YSDrv.sys
Browse all global symbols functions data
Timestamp: Fri Jan 20 22:41:13 2017 (58830289)
CheckSum: 00042B72
ImageSize: 00043000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
The KMODE_EXCEPTION_NOT_HANDLED bug check has a value of 0x0000001E. This indicates that a kernel-mode program generated an exception which the error handler did not catch.
Code:
Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\030919-12687-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 17134 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 17134.1.amd64fre.rs4_release.180410-1804
Machine Name:
Kernel base = 0xfffff803`f460b000 PsLoadedModuleList = 0xfffff803`f49b9150
Debug session time: Sun Mar 10 05:28:32.872 2019 (UTC + 1:00)
System Uptime: 0 days 21:56:45.596
Loading Kernel Symbols
...............................................................
................................................................
.......................................................
Loading User Symbols
Loading unloaded module list
................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc000001d, fffff803f47b9091, ffffca03c55a3680, fffff803f49dcc00}
*** WARNING: Unable to verify timestamp for win32kfull.sys
*** ERROR: Module load completed but symbols could not be loaded for win32kfull.sys
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : win32kbase.sys ( win32kbase!LegacyInputDispatcher::WaitAndDispatch+16d )
Followup: MachineOwner
---------
7: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff803f47b9091, The address that the exception occurred at
Arg3: ffffca03c55a3680, Parameter 0 of the exception
Arg4: fffff803f49dcc00, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: PRIME Z390-A
SYSTEM_SKU: SKU
SYSTEM_VERSION: 0224
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0224
BIOS_DATE: 08/14/2018
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME Z390-A
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc000001d
BUGCHECK_P2: fffff803f47b9091
BUGCHECK_P3: ffffca03c55a3680
BUGCHECK_P4: fffff803f49dcc00
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
FAULTING_IP:
nt!KiApcInterrupt+3e1
fffff803`f47b9091 45 ???
EXCEPTION_PARAMETER1: ffffca03c55a3680
EXCEPTION_PARAMETER2: fffff803f49dcc00
BUGCHECK_STR: 0x1E_c000001d
CPU_COUNT: c
CPU_MHZ: fa8
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: a
CPU_MICROCODE: 6,9e,a,0 (F,M,S,R) SIG: 96'00000000 (cache) 96'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: MICHAL
ANALYSIS_SESSION_TIME: 03-23-2019 22:04:35.0018
ANALYSIS_VERSION: 10.0.17763.132 amd64fre
EXCEPTION_RECORD: ffffca03cf6096b0 -- (.exr 0xffffca03cf6096b0)
ExceptionAddress: 0000000000060940
ExceptionCode: cc8e8490
ExceptionFlags: ffffca03
NumberParameters: -800996160
Parameter[0]: ffffca03cf6096d0
Parameter[1]: ffffca03cf6096d0
Parameter[2]: 0000000000000000
Parameter[3]: 0000000000000018
Parameter[4]: 0100000014120100
Parameter[5]: ffffca03c559d1c0
Parameter[6]: 0000000000000000
Parameter[7]: ffff8c30cd10e970
Parameter[8]: ffffca03c559d0c0
Parameter[9]: 0000000000000000
Parameter[10]: ffffca03c559d29c
Parameter[11]: 0000000000580012
Parameter[12]: ffffca03c55a3680
Parameter[13]: ffffca03c55a3718
Parameter[14]: ffffca03c55a3718
TRAP_FRAME: ffffca03cf6096b0 -- (.trap 0xffffca03cf6096b0)
Unable to read trap frame at ffffca03`cf6096b0
LAST_CONTROL_TRANSFER: from fffff803f484bb5a to fffff803f47b50a0
FAILED_INSTRUCTION_ADDRESS:
nt!KiApcInterrupt+3e1
fffff803`f47b9091 45 ???
STACK_TEXT:
ffff8508`52ff61f8 fffff803`f484bb5a : 00000000`0000001e ffffffff`c000001d fffff803`f47b9091 ffffca03`c55a3680 : nt!KeBugCheckEx
ffff8508`52ff6200 fffff803`f47bd94d : fffff803`f49fc000 fffff803`f460b000 00058224`00953000 000000ef`000000f7 : nt!KiFatalExceptionHandler+0x22
ffff8508`52ff6240 fffff803`f46c9b16 : ffff8508`52ff6370 ffff8508`52ff6830 00000000`00000000 ffff8508`52ff7148 : nt!RtlpExecuteHandlerForException+0xd
ffff8508`52ff6270 fffff803`f46cb613 : ffff8508`52ff7148 ffff8508`52ff6e90 ffff8508`52ff7148 ffffca03`c55a3718 : nt!RtlDispatchException+0x416
ffff8508`52ff6960 fffff803`f47c5d42 : ffffca03`cf6096b0 fffff80f`04912935 ffffca03`cf6096b0 ffffca03`00000000 : nt!KiDispatchException+0x1f3
ffff8508`52ff7010 fffff803`f47c0ea5 : 00000000`00000000 00000000`00000000 ffffe10a`9c214000 ffffca03`c53542c0 : nt!KiExceptionDispatch+0xc2
ffff8508`52ff71f0 fffff803`f47b9091 : ffffca03`c55a3718 00000000`00000000 ffffca03`c5345080 fffff803`f48f65f4 : nt!KiInvalidOpcodeFault+0x2e5
ffff8508`52ff7380 fffff803`f47bd6e7 : fffff803`f46a524b ffffca03`00000001 00000000`00000000 00000000`00000000 : nt!KiApcInterrupt+0x3e1
ffff8508`52ff7518 fffff803`f46a524b : ffffca03`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!guard_dispatch_icall+0x7
ffff8508`52ff7520 fffff803`f46a25e1 : 00000000`00000100 00000000`00000000 00000000`00000000 ffffca03`c55a2950 : nt!KiDeliverApc+0x27b
ffff8508`52ff75b0 fffff803`f46a1b9b : 00000000`00000001 ffffca03`c559d0c0 00000000`00000000 00000000`0000000e : nt!KiSwapThread+0x501
ffff8508`52ff7680 fffff803`f46a0a97 : ffff8c30`cd1b1bf0 00000000`00000000 00000000`00000000 00000000`0000000a : nt!KiCommitThreadWait+0x13b
ffff8508`52ff7720 ffff8c30`cd057ead : ffff8c30`0000000a ffffca03`c55aa320 ffff8c30`cd1b1c08 00000000`0000000d : nt!KeWaitForMultipleObjects+0x467
ffff8508`52ff7800 ffff8c30`cda12a3d : ffff8c05`c0019010 ffff8508`52ff7929 00000000`00000002 ffff8c30`cd1b5601 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x16d
ffff8508`52ff7850 ffff8c05`c0019010 : ffff8508`52ff7929 00000000`00000002 ffff8c30`cd1b5601 ffff8c30`cd1b5670 : win32kfull+0x42a3d
ffff8508`52ff7858 ffff8508`52ff7929 : 00000000`00000002 ffff8c30`cd1b5601 ffff8c30`cd1b5670 ffff8c30`cd057aa6 : 0xffff8c05`c0019010
ffff8508`52ff7860 00000000`00000002 : ffff8c30`cd1b5601 ffff8c30`cd1b5670 ffff8c30`cd057aa6 00000000`00000001 : 0xffff8508`52ff7929
ffff8508`52ff7868 ffff8c30`cd1b5601 : ffff8c30`cd1b5670 ffff8c30`cd057aa6 00000000`00000001 ffff8c05`00000000 : 0x2
ffff8508`52ff7870 ffff8c30`cd1b5670 : ffff8c30`cd057aa6 00000000`00000001 ffff8c05`00000000 00000000`00000000 : win32kbase!gTimerId+0xfb1
ffff8508`52ff7878 ffff8c30`cd057aa6 : 00000000`00000001 ffff8c05`00000000 00000000`00000000 00000000`00000000 : win32kbase!gTermIO
ffff8508`52ff7880 ffff8c30`cda127d0 : 00000000`00000000 00000000`00000001 00000000`00000001 ffff8c30`cd1b5670 : win32kbase!EnterCrit+0x176
ffff8508`52ff78d0 00000000`00000000 : 00000000`00000001 00000000`00000001 ffff8c30`cd1b5670 00000000`00000003 : win32kfull+0x427d0
THREAD_SHA1_HASH_MOD_FUNC: 71e145d7deb288919979b26ac312912339fe8ff8
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 40eebda775585f513d40b69b7580bf42bf002b74
THREAD_SHA1_HASH_MOD: d1ac573c5477ab82140982708547d3c25c1a6924
FOLLOWUP_IP:
win32kbase!LegacyInputDispatcher::WaitAndDispatch+16d
ffff8c30`cd057ead 8bd8 mov ebx,eax
FAULT_INSTR_CODE: c085d88b
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: win32kbase!LegacyInputDispatcher::WaitAndDispatch+16d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.17134.441
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 16d
FAILURE_BUCKET_ID: 0x1E_c000001d_BAD_IP_win32kbase!LegacyInputDispatcher::WaitAndDispatch
BUCKET_ID: 0x1E_c000001d_BAD_IP_win32kbase!LegacyInputDispatcher::WaitAndDispatch
PRIMARY_PROBLEM_CLASS: 0x1E_c000001d_BAD_IP_win32kbase!LegacyInputDispatcher::WaitAndDispatch
TARGET_TIME: 2019-03-10T04:28:32.000Z
OSBUILD: 17134
OSSERVICEPACK: 523
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-01-01 07:44:13
BUILDDATESTAMP_STR: 180410-1804
BUILDLAB_STR: rs4_release
BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804
ANALYSIS_SESSION_ELAPSED_TIME: 5db8
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c000001d_bad_ip_win32kbase!legacyinputdispatcher::waitanddispatch
FAILURE_ID_HASH: {f900b1d0-420d-6cca-34e5-b40029ab573c}
Followup: MachineOwner
---------
7: kd> .load pde
=========================================================================================
PDE v11.3 - Copyright 2017 Andrew Richards
=========================================================================================
7: kd> !dpx
Start memory scan : 0xffff850852ff61f8 ($csp)
End memory scan : 0xffff850852ff8000 (Kernel Stack Base)
rsp : 0xffff850852ff61f8 : 0xfffff803f484bb5a : nt!KiFatalExceptionHandler+0x22
Unable to load image \SystemRoot\System32\cdd.dll, Win32 error 0n2
*** WARNING: Unable to verify timestamp for cdd.dll
*** ERROR: Module load completed but symbols could not be loaded for cdd.dll
0xffff850852ff61f8 : 0xfffff803f484bb5a : nt!KiFatalExceptionHandler+0x22
0xffff850852ff6210 : 0xfffff803f47b9091 : nt!KiApcInterrupt+0x3e1
0xffff850852ff6220 : 0xfffff803f49dcc00 : nt!PspSystemQuotaBlock
0xffff850852ff6238 : 0xfffff803f47bd94d : nt!RtlpExecuteHandlerForException+0xd
0xffff850852ff6240 : 0xfffff803f49fc000 : "nt!Ports <PERF> (nt+0x3f1000)"
0xffff850852ff6248 : 0xfffff803f460b000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
0xffff850852ff6260 : 0xffff850852ff6310 : 0xfffff803f47b9091 : nt!KiApcInterrupt+0x3e1
0xffff850852ff6268 : 0xfffff803f46c9b16 : nt!RtlDispatchException+0x416
0xffff850852ff62b8 : 0xfffff803f460b000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
0xffff850852ff6310 : 0xfffff803f47b9091 : nt!KiApcInterrupt+0x3e1
0xffff850852ff6318 : 0xfffff803f460b000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
0xffff850852ff6320 : 0xfffff803f4a11edc : "nt!Ports <PERF> (nt+0x406edc)"
0xffff850852ff6340 : 0xfffff803f484bb38 : nt!KiFatalExceptionHandler
0xffff850852ff6388 : 0xfffff803f4f60f87 : hal!HalpApicRequestInterrupt+0x177
0xffff850852ff6398 : 0xfffff803f4f60010 : hal!HalpInterruptSendIpi+0x30
0xffff850852ff63b8 : 0xfffff803f4f60f87 : hal!HalpApicRequestInterrupt+0x177
0xffff850852ff63f8 : 0xffff850852ff7518 : 0xfffff803f46a524b : nt!KiDeliverApc+0x27b
0xffff850852ff6428 : 0xfffff803f4f608bd : hal!HalRequestSoftwareInterrupt+0xcd
0xffff850852ff6458 : 0xfffff803f47bd6e7 : nt!guard_dispatch_icall+0x7
Unable to load image \SystemRoot\System32\DriverStore\FileRepository\nv_dispi.inf_amd64_5db32447b43ce666\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
0xffff850852ff64b8 : 0xfffff803f46458fc : nt!EtwWrite+0x2c
0xffff850852ff6500 : 0xfffff803f4a75400 : nt!KiInitialThread
0xffff850852ff6538 : 0xfffff803f4f60f87 : hal!HalpApicRequestInterrupt+0x177
0xffff850852ff6600 : 0xffff850852ff68f0 : 0xfffff803f47b9095 : nt!KiApcInterrupt+0x3e5
0xffff850852ff6608 : 0xfffff803f4f60f87 : hal!HalpApicRequestInterrupt+0x177
0xffff850852ff6628 : 0xfffff803f4f614e6 : hal!HalPerformEndOfInterrupt+0x16
0xffff850852ff6658 : 0xfffff803f4f614e6 : hal!HalPerformEndOfInterrupt+0x16
0xffff850852ff6670 : 0xfffff803f4a75400 : nt!KiInitialThread
0xffff850852ff6688 : 0xfffff803f47b628e : nt!KiChainedDispatch+0xbe
0xffff850852ff66e8 : 0xfffff803f4f614e6 : hal!HalPerformEndOfInterrupt+0x16
0xffff850852ff6718 : 0xfffff803f47b628e : nt!KiChainedDispatch+0xbe
0xffff850852ff6730 : 0xfffff803f4a75400 : nt!KiInitialThread
0xffff850852ff6788 : 0xfffff803f47bbdbf : nt!KiDispatchInterrupt+0xf
0xffff850852ff67c8 : 0xfffff803f47bbdbf : nt!KiDispatchInterrupt+0xf
0xffff850852ff67f8 : 0xfffff803f47bb573 : nt!KiDpcInterrupt+0x2a3
0xffff850852ff6818 : 0xfffff803f47bc175 : nt!SwapContext+0x165
0xffff850852ff6838 : 0xfffff803f47b8cb0 : nt!KiApcInterrupt
0xffff850852ff6840 : 0xfffff803f47b90d6 : nt!KiApcInterrupt+0x426
0xffff850852ff6848 : 0xfffff803f460b000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
0xffff850852ff6850 : 0xfffff803f4a11edc : "nt!Ports <PERF> (nt+0x406edc)"
0xffff850852ff6878 : 0xfffff803f4a73200 : nt!KiInitialProcess+0x840
0xffff850852ff68a8 : 0xfffff803f46cbaeb : nt!KiPreprocessFault+0x93
0xffff850852ff68d0 : 0xffff850852ff68e0 : 0xfffff803f47b9091 : nt!KiApcInterrupt+0x3e1
0xffff850852ff68e0 : 0xfffff803f47b9091 : nt!KiApcInterrupt+0x3e1
0xffff850852ff68e8 : 0xfffff803f47b90a1 : nt!KiApcInterrupt+0x3f1
0xffff850852ff68f0 : 0xfffff803f47b9095 : nt!KiApcInterrupt+0x3e5
0xffff850852ff6908 : 0xfffff803f47b9094 : nt!KiApcInterrupt+0x3e4
0xffff850852ff6918 : 0xfffff803f46cb9d6 : nt!KdTrap+0x22
0xffff850852ff6958 : 0xfffff803f46cb613 : nt!KiDispatchException+0x1f3
0xffff850852ff6a08 : 0xfffff803f47bcd70 : nt!ExpInterlockedPopEntrySListEnd
0xffff850852ff6a18 : 0xfffff803f47bd6e7 : nt!guard_dispatch_icall+0x7
0xffff850852ff6a58 : 0xfffff803f49dcc00 : nt!PspSystemQuotaBlock
0xffff850852ff6a88 : 0xfffff803f47b9091 : nt!KiApcInterrupt+0x3e1
0xffff850852ff6ae8 : 0xfffff803f46458fc : nt!EtwWrite+0x2c
0xffff850852ff6df8 : 0xfffff803f469f3fa : nt!ExReleasePushLockExclusiveEx+0x1aa
0xffff850852ff6e18 : 0xfffff803f46cc00c : nt!RtlGetExtendedContextLength+0x34
0xffff850852ff6ed8 : 0xfffff80f031f3b29 : dxgkrnl!DXGADAPTERSTOPRESETLOCKSHARED::Release+0x29
0xffff850852ff6ee0 : 0xffff850852ff6f60 : 0xfffff803f4a73240 : nt!ExNode0
0xffff850852ff6ee8 : 0xfffff803f46a8f94 : nt!KiChooseTargetProcessor+0x184
0xffff850852ff6f08 : 0xfffff80f03289211 : "dxgkrnl!OutputDuplThunks<void (__cdecl OUTPUTDUPL_MGR::*)(_DXGKARG_SETPOINTERPOSITION const * __ptr64) __ptr64,_DXGKARG_SETPOINTERPOSITION const * __ptr64>::RunForAdapter"+0x11d
0xffff850852ff6f30 : 0xfffff803f4a73240 : nt!ExNode0
0xffff850852ff6f48 : 0xfffff803f46e4f8e : nt!ExTryAcquirePushLockExclusiveEx+0xee
0xffff850852ff6f60 : 0xfffff803f4a73240 : nt!ExNode0
0xffff850852ff6f78 : 0xfffff803f469ff47 : nt!ExReleasePushLockSharedEx+0x37
0xffff850852ff6fa8 : 0xfffff803f4f60df5 : hal!HalSendSoftwareInterrupt+0xa5
0xffff850852ff7008 : 0xfffff803f47c5d42 : nt!KiExceptionDispatch+0xc2
0xffff850852ff7018 : 0xfffff80f04912935 : mouclass!MouseClassHandleRead+0x139
0xffff850852ff70f8 : 0xfffff803f4b080e9 : nt!IopSynchronousServiceTail+0x2b9
0xffff850852ff7158 : 0xfffff803f47b9091 : nt!KiApcInterrupt+0x3e1
0xffff850852ff7170 : 0xfffff803f49dcc00 : nt!PspSystemQuotaBlock
0xffff850852ff71a8 : 0xfffff803f4b1ee92 : nt!NtReadFile+0x692
0xffff850852ff71c0 : 0xffff8c30cd184ab0 : win32kbase!gZero
0xffff850852ff71e8 : 0xfffff803f47c0ea5 : nt!KiInvalidOpcodeFault+0x2e5
0xffff850852ff71f0 : 0x0000000000000000 : Trap @ ffff850852ff71f0
0xffff850852ff7220 : 0xfffff803f47bcd70 : nt!ExpInterlockedPopEntrySListEnd
0xffff850852ff7230 : 0xfffff803f47bd6e7 : nt!guard_dispatch_icall+0x7
0xffff850852ff7248 : 0xfffff803f49dcc00 : nt!PspSystemQuotaBlock
0xffff850852ff72c0 : 0xffff8c30cd10e970 : win32kbase!rimInputApc
0xffff850852ff72e8 : 0xfffff803f46a51c5 : nt!KiDeliverApc+0x1f5
0xffff850852ff7318 : 0xfffff803f4ace169 : nt!SeCaptureSubjectContextEx+0x59
0xffff850852ff7338 : 0xfffff803f4aceaca : nt!SeReleaseSubjectContext+0x3a
0xffff850852ff7358 : 0xfffff803f47b9091 : nt!KiApcInterrupt+0x3e1
0xffff850852ff7380 : 0xffffca03c55a3718 : Trap @ ffff850852ff7380
0xffff850852ff7398 : 0xfffff803f48f65f4 : nt!ExFreePoolWithTag+0x594
0xffff850852ff73b0 : 0xffff8c30cd10e970 : win32kbase!rimInputApc
0xffff850852ff73d8 : 0xfffff803f49dcc00 : nt!PspSystemQuotaBlock
0xffff850852ff7478 : 0xfffff803f464900c : nt!IopFreeIrp+0x15c
0xffff850852ff74b8 : 0xfffff803f4648e93 : nt!IoFreeIrp+0x13
0xffff850852ff74e8 : 0xfffff803f47bd6e7 : nt!guard_dispatch_icall+0x7
0xffff850852ff7500 : 0xffff850852ff7518 : 0xfffff803f46a524b : nt!KiDeliverApc+0x27b
0xffff850852ff7518 : 0xfffff803f46a524b : nt!KiDeliverApc+0x27b
0xffff850852ff7550 : 0xffff8c30cd10e970 : win32kbase!rimInputApc
0xffff850852ff75a8 : 0xfffff803f46a25e1 : nt!KiSwapThread+0x501
0xffff850852ff7600 : 0xffff8c30cd184190 : win32kbase!WPP_a20f547c004839a46b68b687e82aef7b_Traceguids
0xffff850852ff7618 : 0xffff8c30cd0f47a9 : win32kbase!RIMReadInput+0x309
0xffff850852ff7678 : 0xfffff803f46a1b9b : nt!KiCommitThreadWait+0x13b
0xffff850852ff76a0 : 0xffff8c30cd1b1bf0 : win32kbase!gDomainDummyLock
0xffff850852ff76a8 : 0xffff8c30cd1821e0 : win32kbase!load_config_used+0x100
0xffff850852ff76b8 : 0xffff8c30cd1b1c08 : win32kbase!gDomainTlLock
0xffff850852ff76c0 : 0xffff8c05c0006bb0 : dt win32kbase!CMouseSensor
0xffff850852ff7718 : 0xfffff803f46a0a97 : nt!KeWaitForMultipleObjects+0x467
0xffff850852ff7720 : 0xffff8c30cd1b1bf0 : win32kbase!gDomainDummyLock
0xffff850852ff7748 : 0xffff8c05c0019770 : dt win32kbase!LegacyInputDispatcher
0xffff850852ff7758 : 0xfffff803f469dcf0 : nt!ExReleaseResourceAndLeaveCriticalRegion+0xc0
0xffff850852ff7780 : 0xffff8c05c0019770 : dt win32kbase!LegacyInputDispatcher
0xffff850852ff77a8 : 0xffff8c30cd1b1c08 : win32kbase!gDomainTlLock
0xffff850852ff77b0 : 0xffff8c30cd1b5601 : win32kbase!gTimerId+0xfb1
0xffff850852ff77b8 : 0xffff8c30cd0619fa : win32kbase!UserSessionSwitchLeaveCrit+0x4a
0xffff850852ff77c8 : 0xffff8c05c0019770 : dt win32kbase!LegacyInputDispatcher
0xffff850852ff77d0 : 0xffff8c30cd1b5601 : win32kbase!gTimerId+0xfb1
0xffff850852ff77e0 : 0xffff8c30cd1b1bf0 : win32kbase!gDomainDummyLock
0xffff850852ff77f0 : 0xffff8c05c0019770 : dt win32kbase!LegacyInputDispatcher
0xffff850852ff77f8 : 0xffff8c30cd057ead : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x16d
0xffff850852ff7810 : 0xffff8c30cd1b1c08 : win32kbase!gDomainTlLock
*** WARNING: Unable to verify timestamp for win32kfull.sys
*** ERROR: Module load completed but symbols could not be loaded for win32kfull.sys
0xffff850852ff7868 : 0xffff8c30cd1b5601 : win32kbase!gTimerId+0xfb1
0xffff850852ff7870 : 0xffff8c30cd1b5670 : win32kbase!gTermIO
0xffff850852ff7878 : 0xffff8c30cd057aa6 : win32kbase!EnterCrit+0x176
0xffff850852ff78c0 : 0xffff8c30cd1b5670 : win32kbase!gTermIO
0xffff850852ff78e8 : 0xffff8c30cd1b5670 : win32kbase!gTermIO
0xffff850852ff7908 : 0xffff8c05c0019770 : dt win32kbase!LegacyInputDispatcher
0xffff850852ff7930 : 0xffff8c30cdcaccd0 : !du "IO_DT"
0xffff850852ff7988 : 0xffff8c30cd0b9112 : win32kbase!xxxCreateSystemThreads+0xb2
0xffff850852ff79d8 : 0xffff8c30cd1b5670 : win32kbase!gTermIO
0xffff850852ff79f8 : 0xfffff803f47c5743 : nt!KiSystemServiceCopyEnd+0x13
0xffff850852ff7a00 : 0xffffca03c55a3680 : Trap @ ffff850852ff7a00
NVIDIA driver has guilty:
Code:
7: kd> lmvm nvlddmkm
Browse full module list
start end module name
fffff80f`05ab0000 fffff80f`06e91000 nvlddmkm T (no symbols)
Loaded symbol image file: nvlddmkm.sys
Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_dispi.inf_amd64_5db32447b43ce666\nvlddmkm.sys
Image name: nvlddmkm.sys
Browse all global symbols functions data
Timestamp: Fri Jan 11 01:16:04 2019 (5C385ED4)
CheckSum: 0138C002
ImageSize: 013E1000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
The IRQL_NOT_LESS_OR_EQUAL bug check has a value of 0x0000000A. This indicates that Microsoft Windows or a kernel-mode driver accessed paged memory at DISPATCH_LEVEL or above.
Code:
Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\032219-13453-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 17134 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 17134.1.amd64fre.rs4_release.180410-1804
Machine Name:
Kernel base = 0xfffff803`ac8aa000 PsLoadedModuleList = 0xfffff803`acc58150
Debug session time: Fri Mar 22 08:28:36.016 2019 (UTC + 1:00)
System Uptime: 5 days 16:55:30.722
Loading Kernel Symbols
...............................................................
................................................................
......................................................
Loading User Symbols
Loading unloaded module list
........................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {8, 2, 1, fffff803ac9420a1}
Probably caused by : hardware ( nt!KiSearchForNewThreadOnProcessor+51 )
Followup: MachineOwner
---------
7: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803ac9420a1, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: PRIME Z390-A
SYSTEM_SKU: SKU
SYSTEM_VERSION: 0224
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0224
BIOS_DATE: 08/14/2018
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME Z390-A
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 2
BUGCHECK_P1: 8
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff803ac9420a1
WRITE_ADDRESS: fffff803accf7388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiSearchForNewThreadOnProcessor+51
fffff803`ac9420a1 0000 add byte ptr [rax],al
CPU_COUNT: c
CPU_MHZ: fa8
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: a
CPU_MICROCODE: 6,9e,a,0 (F,M,S,R) SIG: 96'00000000 (cache) 96'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: ACBSP.exe
ANALYSIS_SESSION_HOST: MICHAL
ANALYSIS_SESSION_TIME: 03-23-2019 22:07:58.0682
ANALYSIS_VERSION: 10.0.17763.132 amd64fre
TRAP_FRAME: ffffac0ee99874c0 -- (.trap 0xffffac0ee99874c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=ffff9b801e7a6180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803ac9420a1 rsp=ffffac0ee9987650 rbp=0000000000000001
r8=ffff9b801ec86700 r9=fffff803ac8aa000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiSearchForNewThreadOnProcessor+0x51:
fffff803`ac9420a1 0000 add byte ptr [rax],al ds:00000000`00000008=??
Resetting default scope
MISALIGNED_IP:
nt!KiSearchForNewThreadOnProcessor+51
fffff803`ac9420a1 0000 add byte ptr [rax],al
LAST_CONTROL_TRANSFER: from fffff803aca64c69 to fffff803aca540c0
STACK_TEXT:
ffffac0e`e9987378 fffff803`aca64c69 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffac0e`e9987380 fffff803`aca618e5 : ffffe381`fe8b2a10 ffffe381`eea30900 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffac0e`e99874c0 fffff803`ac9420a1 : 00000000`0000000f 00000000`00000001 ffffe381`f3413700 ffff9b80`1e7a6180 : nt!KiPageFault+0x425
ffffac0e`e9987650 fffff803`ac941eac : ffff9b80`1e7a6180 ffffac0e`ffffffff ffff9b80`1e7a6180 00000000`00000fff : nt!KiSearchForNewThreadOnProcessor+0x51
ffffac0e`e99876d0 fffff803`ac9412ea : ffffe381`00000000 ffffe381`f3413700 00000000`00000001 00007fff`ffff0000 : nt!KiSearchForNewThread+0x46c
ffffac0e`e9987740 fffff803`ac940bbb : 00000000`00000000 00000000`d4b6c290 00000000`00000000 ffffe382`038121f0 : nt!KiSwapThread+0x1ea
ffffac0e`e9987810 fffff803`ac9402df : ffffe381`f11b9220 00000000`00000000 00000000`7773ac00 ffffe381`f3413840 : nt!KiCommitThreadWait+0x13b
ffffac0e`e99878b0 fffff803`acda6d3c : ffffe381`d953d060 ffffac0e`00000006 00000000`00000001 ffffbf8e`d0946700 : nt!KeWaitForSingleObject+0x1ff
ffffac0e`e9987990 fffff803`aca64743 : ffffe381`f3413700 00000000`00000000 00000000`00000000 ffffe381`d953d060 : nt!NtWaitForSingleObject+0xfc
ffffac0e`e9987a00 00000000`775e1e4c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0a4cebe8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775e1e4c
THREAD_SHA1_HASH_MOD_FUNC: 0a8c613e2426b79e129e92debfbe4c749d763eed
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 994b2a4edc74c76018bb5dafde289aef2102a2e2
THREAD_SHA1_HASH_MOD: bc100a5647b828107ac4e18055e00abcbe1ec406
FOLLOWUP_IP:
nt!KiSearchForNewThreadOnProcessor+51
fffff803`ac9420a1 0000 add byte ptr [rax],al
FAULT_INSTR_CODE: f000000
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiSearchForNewThreadOnProcessor+51
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.17134.590
STACK_COMMAND: .thread ; .cxr ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED
BUCKET_ID: IP_MISALIGNED
PRIMARY_PROBLEM_CLASS: IP_MISALIGNED
TARGET_TIME: 2019-03-22T07:28:36.000Z
OSBUILD: 17134
OSSERVICEPACK: 590
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-02-06 03:25:47
BUILDDATESTAMP_STR: 180410-1804
BUILDLAB_STR: rs4_release
BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804
ANALYSIS_SESSION_ELAPSED_TIME: b96
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:ip_misaligned
FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}
Followup: MachineOwner
---------
7: kd> .trap 0xffffac0ee99874c0
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=ffff9b801e7a6180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803ac9420a1 rsp=ffffac0ee9987650 rbp=0000000000000001
r8=ffff9b801ec86700 r9=fffff803ac8aa000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiSearchForNewThreadOnProcessor+0x51:
fffff803`ac9420a1 0000 add byte ptr [rax],al ds:00000000`00000008=??
7: kd> kb
*** Stack trace for last set context - .thread/.cxr resets it
# RetAddr : Args to Child : Call Site
00 fffff803`ac941eac : ffff9b80`1e7a6180 ffffac0e`ffffffff ffff9b80`1e7a6180 00000000`00000fff : nt!KiSearchForNewThreadOnProcessor+0x51
01 fffff803`ac9412ea : ffffe381`00000000 ffffe381`f3413700 00000000`00000001 00007fff`ffff0000 : nt!KiSearchForNewThread+0x46c
02 fffff803`ac940bbb : 00000000`00000000 00000000`d4b6c290 00000000`00000000 ffffe382`038121f0 : nt!KiSwapThread+0x1ea
03 fffff803`ac9402df : ffffe381`f11b9220 00000000`00000000 00000000`7773ac00 ffffe381`f3413840 : nt!KiCommitThreadWait+0x13b
04 fffff803`acda6d3c : ffffe381`d953d060 ffffac0e`00000006 00000000`00000001 ffffbf8e`d0946700 : nt!KeWaitForSingleObject+0x1ff
05 fffff803`aca64743 : ffffe381`f3413700 00000000`00000000 00000000`00000000 ffffe381`d953d060 : nt!NtWaitForSingleObject+0xfc
06 00000000`775e1e4c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
07 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775e1e4c
7: kd> .load pde
=========================================================================================
PDE v11.3 - Copyright 2017 Andrew Richards
=========================================================================================
7: kd> !dpx
Start memory scan : 0xffffac0ee9987378 ($csp)
End memory scan : 0xffffac0ee9988000 (Kernel Stack Base)
0xffffac0ee9987378 : 0xfffff803aca64c69 : nt!KiBugCheckDispatch+0x69
0xffffac0ee99873a0 : 0xfffff803ac9420a1 : nt!KiSearchForNewThreadOnProcessor+0x51
0xffffac0ee9987498 : 0x5555555555555555 : !da "UUUUUUUU"
0xffffac0ee99874a8 : 0xfffff803acd12240 : nt!ExNode0
0xffffac0ee99874b8 : 0xfffff803aca618e5 : nt!KiPageFault+0x425
0xffffac0ee99874c0 : 0xffffe381fe8b2a10 : Trap @ ffffac0ee99874c0
0xffffac0ee9987510 : 0xfffff803ac8aa000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
0xffffac0ee9987598 : 0xfffff803aca5b11f : nt!SwapContext+0xef
0xffffac0ee99875a8 : 0xfffff803aca5a593 : nt!KiDpcInterrupt+0x2a3
0xffffac0ee99875b8 : 0xfffff803aca5b414 : nt!SwapContext+0x3e4
0xffffac0ee99875d8 : 0xfffff803ac9b5d6d : nt!KiFindReadyThread+0xcd
0xffffac0ee99875f8 : 0xfffff803aca5ad66 : nt!KiSwapContext+0x76
0xffffac0ee9987628 : 0xfffff803ac9420a1 : nt!KiSearchForNewThreadOnProcessor+0x51
0xffffac0ee9987698 : 0xfffff803acd12240 : nt!ExNode0
0xffffac0ee99876c8 : 0xfffff803ac941eac : nt!KiSearchForNewThread+0x46c
0xffffac0ee9987738 : 0xfffff803ac9412ea : nt!KiSwapThread+0x1ea
0xffffac0ee9987808 : 0xfffff803ac940bbb : nt!KiCommitThreadWait+0x13b
0xffffac0ee99878a8 : 0xfffff803ac9402df : nt!KeWaitForSingleObject+0x1ff
0xffffac0ee99878d8 : 0xfffff803acda5942 : nt!ObpReferenceObjectByHandleWithTag+0x272
0xffffac0ee99878f8 : 0xfffff803acda5942 : nt!ObpReferenceObjectByHandleWithTag+0x272
0xffffac0ee9987988 : 0xfffff803acda6d3c : nt!NtWaitForSingleObject+0xfc
0xffffac0ee99879f8 : 0xfffff803aca64743 : nt!KiSystemServiceCopyEnd+0x13
0xffffac0ee9987a00 : 0xffffe381f3413700 : Trap @ ffffac0ee9987a00
You trying update BIOS to version 0903? You trying change drivers for graphics card and VirtualBox? If you do not need Driver Verifier, turn it off