IRQL_NOT_LESS_OR_EQUAL when playing certain games for a prolonged time


  1. Posts : 11
    Windows 10
       #1

    IRQL_NOT_LESS_OR_EQUAL when playing certain games for a prolonged time


    Hi there. Over the past two months, I have been occasionally experiencing this particular BSOD (as well as other similar ones that also hint towards driver issues) when playing certain games for a prolonged period of time. Other games never cause it. I tried to get help on other sites, but nobody has been willing to even check my minidump file.

    I've already done a Prime95 and a MemTest86+ test on my computer for several hours and passes, without any issues or errors, and temperatures have been stable during the tests. I'm inclined to believe that it may be heat-related, but I have been monitoring my CPU and GPU temperatures and they've always been within safe limits. The only other possibility is that it could be GPU-related, since I have had a GPU start failing on me a long time ago in the past for overheating. If I don't game and just use the computer ordinarily, I don't BSOD for weeks on end.

    If anyone could help diagnose what the possible culprit(s) could be or can help me narrow down suspects, that would be most appreciated. All of the minidumps have pointed towards one single driver: ntoskrnl.exe. But I am well aware that that's really not that helpful to know. Thank you all so much. I don't want to be in constant fear of playing games just because I might end up hitting a BSOD.

    Attachment 228252
    Last edited by Nitori; 23 Mar 2019 at 03:16.
      My Computer


  2. Posts : 1,538
    Windows 8.1 Enterprise x64
       #2

    The DRIVER_IRQL_NOT_LESS_OR_EQUAL bug check has a value of 0x000000D1. This indicates that a kernel-mode driver attempted to access pageable memory at a process IRQL that was too high.
    Code:
    Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\021619-14531-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
    Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 10 Kernel Version 17134 MP (12 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 17134.1.amd64fre.rs4_release.180410-1804
    Machine Name:
    Kernel base = 0xfffff801`45a0b000 PsLoadedModuleList = 0xfffff801`45db9150
    Debug session time: Sun Feb 17 03:11:18.314 2019 (UTC + 1:00)
    System Uptime: 8 days 1:55:51.434
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......................................................
    Loading User Symbols
    Loading unloaded module list
    ..................................................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {fffff8016a8824c0, ff, aa, fffff8016a8824c0}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+425 )
    
    Followup:     MachineOwner
    ---------
    
    11: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: fffff8016a8824c0, memory referenced
    Arg2: 00000000000000ff, IRQL
    Arg3: 00000000000000aa, value 0 = read operation, 1 = write operation
    Arg4: fffff8016a8824c0, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    KEY_VALUES_STRING: 1
    
    
    STACKHASH_ANALYSIS: 1
    
    TIMELINE_ANALYSIS: 1
    
    
    DUMP_CLASS: 1
    
    DUMP_QUALIFIER: 400
    
    BUILD_VERSION_STRING:  17134.1.amd64fre.rs4_release.180410-1804
    
    SYSTEM_MANUFACTURER:  System manufacturer
    
    SYSTEM_PRODUCT_NAME:  PRIME Z390-A
    
    SYSTEM_SKU:  SKU
    
    SYSTEM_VERSION:  0224
    
    BIOS_VENDOR:  American Megatrends Inc.
    
    BIOS_VERSION:  0224
    
    BIOS_DATE:  08/14/2018
    
    BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.
    
    BASEBOARD_PRODUCT:  PRIME Z390-A
    
    BASEBOARD_VERSION:  Rev 1.xx
    
    DUMP_TYPE:  2
    
    BUGCHECK_P1: fffff8016a8824c0
    
    BUGCHECK_P2: ff
    
    BUGCHECK_P3: aa
    
    BUGCHECK_P4: fffff8016a8824c0
    
    READ_ADDRESS: fffff80145e58388: Unable to get MiVisibleState
    Unable to get NonPagedPoolStart
    Unable to get NonPagedPoolEnd
    Unable to get PagedPoolStart
    Unable to get PagedPoolEnd
     fffff8016a8824c0 
    
    CURRENT_IRQL:  0
    
    FAULTING_IP: 
    +0
    fffff801`6a8824c0 ??              ???
    
    ADDITIONAL_DEBUG_TEXT:  The trap occurred when interrupts are disabled on the target.
    
    BUGCHECK_STR:  DISABLED_INTERRUPT_FAULT
    
    CPU_COUNT: c
    
    CPU_MHZ: fa8
    
    CPU_VENDOR:  GenuineIntel
    
    CPU_FAMILY: 6
    
    CPU_MODEL: 9e
    
    CPU_STEPPING: a
    
    CPU_MICROCODE: 6,9e,a,0 (F,M,S,R)  SIG: 96'00000000 (cache) 96'00000000 (init)
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    
    BLACKBOXPNP: 1 (!blackboxpnp)
    
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    PROCESS_NAME:  r5apex.exe
    
    ANALYSIS_SESSION_HOST:  MICHAL
    
    ANALYSIS_SESSION_TIME:  03-23-2019 21:58:04.0024
    
    ANALYSIS_VERSION: 10.0.17763.132 amd64fre
    
    TRAP_FRAME:  ffff908d0371f6d0 -- (.trap 0xffff908d0371f6d0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=00000236726c0000 rbx=0000000000000000 rcx=0000000000000000
    rdx=00000236726c1000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8016a8824c0 rsp=ffff908d0371f860 rbp=ffff908d0371fa80
     r8=0000000000000000  r9=0000000000010000 r10=00007fffffff0000
    r11=ffffab040a85c040 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up di pl zr na po nc
    fffff801`6a8824c0 ??              ???
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80145bc5c69 to fffff80145bb50a0
    
    FAILED_INSTRUCTION_ADDRESS: 
    +0
    fffff801`6a8824c0 ??              ???
    
    STACK_TEXT:  
    ffff908d`0371f588 fffff801`45bc5c69 : 00000000`0000000a fffff801`6a8824c0 00000000`000000ff 00000000`000000aa : nt!KeBugCheckEx
    ffff908d`0371f590 fffff801`45bc28e5 : 00000000`00000000 00000000`00000000 ffff9987`7b943ee0 00000000`00000286 : nt!KiBugCheckDispatch+0x69
    ffff908d`0371f6d0 fffff801`6a8824c0 : 00000000`00000000 fffff801`45f1e949 00000000`00000010 00000000`00010287 : nt!KiPageFault+0x425
    ffff908d`0371f860 00000000`00000000 : fffff801`45f1e949 00000000`00000010 00000000`00010287 ffff908d`0371f890 : 0xfffff801`6a8824c0
    
    
    THREAD_SHA1_HASH_MOD_FUNC:  bf99962f16aee8a6a536cfcc5454c0cd4db15ac9
    
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  79f80cc7f571cb0ec417faf51633559f1df31f0e
    
    THREAD_SHA1_HASH_MOD:  2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b
    
    FOLLOWUP_IP: 
    nt!KiPageFault+425
    fffff801`45bc28e5 33c0            xor     eax,eax
    
    FAULT_INSTR_CODE:  ffb0c033
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiPageFault+425
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  5c2b0c3d
    
    IMAGE_VERSION:  10.0.17134.523
    
    STACK_COMMAND:  .thread ; .cxr ; kb
    
    BUCKET_ID_FUNC_OFFSET:  425
    
    FAILURE_BUCKET_ID:  DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault
    
    BUCKET_ID:  DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault
    
    PRIMARY_PROBLEM_CLASS:  DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault
    
    TARGET_TIME:  2019-02-17T02:11:18.000Z
    
    OSBUILD:  17134
    
    OSSERVICEPACK:  523
    
    SERVICEPACK_NUMBER: 0
    
    OS_REVISION: 0
    
    SUITE_MASK:  272
    
    PRODUCT_TYPE:  1
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS
    
    OS_LOCALE:  
    
    USER_LCID:  0
    
    OSBUILD_TIMESTAMP:  2019-01-01 07:44:13
    
    BUILDDATESTAMP_STR:  180410-1804
    
    BUILDLAB_STR:  rs4_release
    
    BUILDOSVER_STR:  10.0.17134.1.amd64fre.rs4_release.180410-1804
    
    ANALYSIS_SESSION_ELAPSED_TIME:  1075
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:disabled_interrupt_fault_code_av_bad_ip_nt!kipagefault
    
    FAILURE_ID_HASH:  {f2ab72c5-099d-9077-bfcf-ba12aa825b36}
    
    Followup:     MachineOwner
    ---------
    
    11: kd> .trap 0xffff908d0371f6d0
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=00000236726c0000 rbx=0000000000000000 rcx=0000000000000000
    rdx=00000236726c1000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8016a8824c0 rsp=ffff908d0371f860 rbp=ffff908d0371fa80
     r8=0000000000000000  r9=0000000000010000 r10=00007fffffff0000
    r11=ffffab040a85c040 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up di pl zr na po nc
    fffff801`6a8824c0 ??              ???
    11: kd> kb
      *** Stack trace for last set context - .thread/.cxr resets it
     # RetAddr           : Args to Child                                                           : Call Site
    00 00000000`00000000 : fffff801`45f1e949 00000000`00000010 00000000`00010287 ffff908d`0371f890 : 0xfffff801`6a8824c0
    11: kd> .load pde
    =========================================================================================
     PDE v11.3 - Copyright 2017 Andrew Richards
    =========================================================================================
    11: kd> !dpx
    Start memory scan  : 0xffff908d0371f588 ($csp)
    End memory scan    : 0xffff908d03720000 (Kernel Stack Base)
    
    0xffff908d0371f588 : 0xfffff80145bc5c69 : nt!KiBugCheckDispatch+0x69
    0xffff908d0371f6c8 : 0xfffff80145bc28e5 : nt!KiPageFault+0x425
    0xffff908d0371f6d0 : 0x0000000000000000 :  Trap @ ffff908d0371f6d0
    0xffff908d0371f700 : 0x00000236726c0000 :  Trap @ ffff908d0371f700
    0xffff908d0371f738 : 0xfffff80145f080e9 : nt!IopSynchronousServiceTail+0x2b9
    0xffff908d0371f7a8 : 0xfffff80145f06942 : nt!ObpReferenceObjectByHandleWithTag+0x272
    0xffff908d0371f7b8 : 0xfffff80145f0e1ab : nt!RtlpSanitizeContextFlags+0x13
    0xffff908d0371f868 : 0xfffff80145f1e949 : nt!NtReadFile+0x149
    0xffff908d0371f988 : 0xfffff80145bc5743 : nt!KiSystemServiceCopyEnd+0x13
    0xffff908d0371f9f8 : 0xfffff80145bc5509 : nt!KiSystemServiceUser+0x47
    0xffff908d0371fa00 : 0xffff99877bae9080 :  Trap @ ffff908d0371fa00
    Code:
    Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\030919-13359-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
    Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 10 Kernel Version 17134 MP (12 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 17134.1.amd64fre.rs4_release.180410-1804
    Machine Name:
    Kernel base = 0xfffff801`83206000 PsLoadedModuleList = 0xfffff801`835b4150
    Debug session time: Sat Mar  9 06:49:54.375 2019 (UTC + 1:00)
    System Uptime: 14 days 0:15:50.092
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........................................................
    Loading User Symbols
    Loading unloaded module list
    ..................................................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {fffff801a807d4c0, ff, 29, fffff801a807d4c0}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+425 )
    
    Followup:     MachineOwner
    ---------
    
    7: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: fffff801a807d4c0, memory referenced
    Arg2: 00000000000000ff, IRQL
    Arg3: 0000000000000029, value 0 = read operation, 1 = write operation
    Arg4: fffff801a807d4c0, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    KEY_VALUES_STRING: 1
    
    
    STACKHASH_ANALYSIS: 1
    
    TIMELINE_ANALYSIS: 1
    
    
    DUMP_CLASS: 1
    
    DUMP_QUALIFIER: 400
    
    BUILD_VERSION_STRING:  17134.1.amd64fre.rs4_release.180410-1804
    
    SYSTEM_MANUFACTURER:  System manufacturer
    
    SYSTEM_PRODUCT_NAME:  PRIME Z390-A
    
    SYSTEM_SKU:  SKU
    
    SYSTEM_VERSION:  0224
    
    BIOS_VENDOR:  American Megatrends Inc.
    
    BIOS_VERSION:  0224
    
    BIOS_DATE:  08/14/2018
    
    BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.
    
    BASEBOARD_PRODUCT:  PRIME Z390-A
    
    BASEBOARD_VERSION:  Rev 1.xx
    
    DUMP_TYPE:  2
    
    BUGCHECK_P1: fffff801a807d4c0
    
    BUGCHECK_P2: ff
    
    BUGCHECK_P3: 29
    
    BUGCHECK_P4: fffff801a807d4c0
    
    CURRENT_IRQL:  0
    
    FAULTING_IP: 
    +0
    fffff801`a807d4c0 ??              ???
    
    ADDITIONAL_DEBUG_TEXT:  The trap occurred when interrupts are disabled on the target.
    
    BUGCHECK_STR:  DISABLED_INTERRUPT_FAULT
    
    CPU_COUNT: c
    
    CPU_MHZ: fa8
    
    CPU_VENDOR:  GenuineIntel
    
    CPU_FAMILY: 6
    
    CPU_MODEL: 9e
    
    CPU_STEPPING: a
    
    CPU_MICROCODE: 6,9e,a,0 (F,M,S,R)  SIG: 96'00000000 (cache) 96'00000000 (init)
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    
    BLACKBOXPNP: 1 (!blackboxpnp)
    
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    PROCESS_NAME:  r5apex.exe
    
    ANALYSIS_SESSION_HOST:  MICHAL
    
    ANALYSIS_SESSION_TIME:  03-23-2019 22:00:31.0791
    
    ANALYSIS_VERSION: 10.0.17763.132 amd64fre
    
    TRAP_FRAME:  ffffbe053252f6d0 -- (.trap 0xffffbe053252f6d0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=00000129cb0a0000 rbx=0000000000000000 rcx=0000000000000000
    rdx=00000129cb0a1000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff801a807d4c0 rsp=ffffbe053252f860 rbp=ffffbe053252fa80
     r8=0000000000000000  r9=0000000000010000 r10=00007fffffff0000
    r11=ffffbf829adf5040 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up di pl zr na po nc
    fffff801`a807d4c0 ??              ???
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff801833c0c69 to fffff801833b00a0
    
    STACK_TEXT:  
    ffffbe05`3252f588 fffff801`833c0c69 : 00000000`0000000a fffff801`a807d4c0 00000000`000000ff 00000000`00000029 : nt!KeBugCheckEx
    ffffbe05`3252f590 fffff801`833bd8e5 : 00000000`00000000 ffff868e`3a76e260 00000000`00000000 ffff868e`2b355750 : nt!KiBugCheckDispatch+0x69
    ffffbe05`3252f6d0 fffff801`a807d4c0 : 00000000`00000000 fffff801`83719949 00000000`00000010 00000000`00010287 : nt!KiPageFault+0x425
    ffffbe05`3252f860 00000000`00000000 : fffff801`83719949 00000000`00000010 00000000`00010287 ffffbe05`3252f890 : 0xfffff801`a807d4c0
    
    
    THREAD_SHA1_HASH_MOD_FUNC:  bf99962f16aee8a6a536cfcc5454c0cd4db15ac9
    
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  79f80cc7f571cb0ec417faf51633559f1df31f0e
    
    THREAD_SHA1_HASH_MOD:  2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b
    
    FOLLOWUP_IP: 
    nt!KiPageFault+425
    fffff801`833bd8e5 33c0            xor     eax,eax
    
    FAULT_INSTR_CODE:  ffb0c033
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  nt!KiPageFault+425
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  5c2b0c3d
    
    IMAGE_VERSION:  10.0.17134.523
    
    STACK_COMMAND:  .thread ; .cxr ; kb
    
    BUCKET_ID_FUNC_OFFSET:  425
    
    FAILURE_BUCKET_ID:  DISABLED_INTERRUPT_FAULT_nt!KiPageFault
    
    BUCKET_ID:  DISABLED_INTERRUPT_FAULT_nt!KiPageFault
    
    PRIMARY_PROBLEM_CLASS:  DISABLED_INTERRUPT_FAULT_nt!KiPageFault
    
    TARGET_TIME:  2019-03-09T05:49:54.000Z
    
    OSBUILD:  17134
    
    OSSERVICEPACK:  523
    
    SERVICEPACK_NUMBER: 0
    
    OS_REVISION: 0
    
    SUITE_MASK:  272
    
    PRODUCT_TYPE:  1
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS
    
    OS_LOCALE:  
    
    USER_LCID:  0
    
    OSBUILD_TIMESTAMP:  2019-01-01 07:44:13
    
    BUILDDATESTAMP_STR:  180410-1804
    
    BUILDLAB_STR:  rs4_release
    
    BUILDOSVER_STR:  10.0.17134.1.amd64fre.rs4_release.180410-1804
    
    ANALYSIS_SESSION_ELAPSED_TIME:  efb
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:disabled_interrupt_fault_nt!kipagefault
    
    FAILURE_ID_HASH:  {4e9c41db-c8e3-cbef-73a7-1b373e8262de}
    
    Followup:     MachineOwner
    ---------
    
    7: kd> .trap 0xffffbe053252f6d0
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=00000129cb0a0000 rbx=0000000000000000 rcx=0000000000000000
    rdx=00000129cb0a1000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff801a807d4c0 rsp=ffffbe053252f860 rbp=ffffbe053252fa80
     r8=0000000000000000  r9=0000000000010000 r10=00007fffffff0000
    r11=ffffbf829adf5040 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up di pl zr na po nc
    fffff801`a807d4c0 ??              ???
    7: kd> kb
      *** Stack trace for last set context - .thread/.cxr resets it
     # RetAddr           : Args to Child                                                           : Call Site
    00 00000000`00000000 : fffff801`83719949 00000000`00000010 00000000`00010287 ffffbe05`3252f890 : 0xfffff801`a807d4c0
    7: kd> .load pde
    =========================================================================================
     PDE v11.3 - Copyright 2017 Andrew Richards
    =========================================================================================
    7: kd> !dpx
    Start memory scan  : 0xffffbe053252f588 ($csp)
    End memory scan    : 0xffffbe0532530000 (Kernel Stack Base)
    
    0xffffbe053252f588 : 0xfffff801833c0c69 : nt!KiBugCheckDispatch+0x69
    0xffffbe053252f6c8 : 0xfffff801833bd8e5 : nt!KiPageFault+0x425
    0xffffbe053252f6d0 : 0x0000000000000000 :  Trap @ ffffbe053252f6d0
    0xffffbe053252f700 : 0x00000129cb0a0000 :  Trap @ ffffbe053252f700
    0xffffbe053252f738 : 0xfffff801837030e9 : nt!IopSynchronousServiceTail+0x2b9
    0xffffbe053252f7a8 : 0xfffff80183701942 : nt!ObpReferenceObjectByHandleWithTag+0x272
    0xffffbe053252f7b8 : 0xfffff801837091ab : nt!RtlpSanitizeContextFlags+0x13
    0xffffbe053252f868 : 0xfffff80183719949 : nt!NtReadFile+0x149
    0xffffbe053252f988 : 0xfffff801833c0743 : nt!KiSystemServiceCopyEnd+0x13
    0xffffbe053252f9f8 : 0xfffff801833c0509 : nt!KiSystemServiceUser+0x47
    0xffffbe053252fa00 : 0xffff868e3eb05700 :  Trap @ ffffbe053252fa00
    The DRIVER_VERIFIER_DETECTED_VIOLATION bug check has a value of 0x000000C4. This is the general bug check code for fatal errors found by Driver Verifier.
    Code:
    Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\030919-10265-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
    Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 10 Kernel Version 17134 MP (12 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 17134.1.amd64fre.rs4_release.180410-1804
    Machine Name:
    Kernel base = 0xfffff801`bc89d000 PsLoadedModuleList = 0xfffff801`bcc4b150
    Debug session time: Sat Mar  9 07:30:21.815 2019 (UTC + 1:00)
    System Uptime: 0 days 0:00:08.562
    Loading Kernel Symbols
    ...............................................................
    ...........................
    Loading User Symbols
    Loading unloaded module list
    ..
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck C4, {2000, fffff805eb8e16e3, 0, 54525049}
    
    *** WARNING: Unable to verify timestamp for YSDrv.sys
    *** ERROR: Module load completed but symbols could not be loaded for YSDrv.sys
    Probably caused by : YSDrv.sys ( YSDrv+216e3 )
    
    Followup:     MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
    A device driver attempting to corrupt the system has been caught.  This is
    because the driver was specified in the registry as being suspect (by the
    administrator) and the kernel has enabled substantial checking of this driver.
    If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
    be among the most commonly seen crashes.
    Arguments:
    Arg1: 0000000000002000, Code Integrity Issue: The caller specified an executable pool type. (Expected: NonPagedPoolNx)
    Arg2: fffff805eb8e16e3, The address in the driver's code where the error was detected.
    Arg3: 0000000000000000, Pool Type.
    Arg4: 0000000054525049, Pool Tag (if provided).
    
    Debugging Details:
    ------------------
    
    
    KEY_VALUES_STRING: 1
    
    
    STACKHASH_ANALYSIS: 1
    
    TIMELINE_ANALYSIS: 1
    
    
    DUMP_CLASS: 1
    
    DUMP_QUALIFIER: 400
    
    BUILD_VERSION_STRING:  17134.1.amd64fre.rs4_release.180410-1804
    
    DUMP_TYPE:  2
    
    BUGCHECK_P1: 2000
    
    BUGCHECK_P2: fffff805eb8e16e3
    
    BUGCHECK_P3: 0
    
    BUGCHECK_P4: 54525049
    
    BUGCHECK_STR:  0xc4_2000
    
    CPU_COUNT: c
    
    CPU_MHZ: fa8
    
    CPU_VENDOR:  GenuineIntel
    
    CPU_FAMILY: 6
    
    CPU_MODEL: 9e
    
    CPU_STEPPING: a
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    ANALYSIS_SESSION_HOST:  MICHAL
    
    ANALYSIS_SESSION_TIME:  03-23-2019 22:01:48.0825
    
    ANALYSIS_VERSION: 10.0.17763.132 amd64fre
    
    LAST_CONTROL_TRANSFER:  from fffff801bd0bb483 to fffff801bca470a0
    
    STACK_TEXT:  
    ffff8a8c`9ba075a8 fffff801`bd0bb483 : 00000000`000000c4 00000000`00002000 fffff805`eb8e16e3 00000000`00000000 : nt!KeBugCheckEx
    ffff8a8c`9ba075b0 fffff801`bcb473db : fffff801`bcc3b184 00000000`00002000 fffff805`eb8e16e3 00000000`00000000 : nt!VerifierBugCheckIfAppropriate+0xdf
    ffff8a8c`9ba075f0 fffff801`bd0b343c : 00000000`54525049 fffff801`bcc3b184 fffff805`eb8e16e3 00000000`00000000 : nt!VfReportIssueWithOptions+0x103
    ffff8a8c`9ba07640 fffff801`bd0b14e3 : 00000000`00000000 ffff8a8c`9ba07930 00000000`00000038 00000000`00000010 : nt!VfCheckPoolType+0x90
    ffff8a8c`9ba07680 fffff805`eb8e16e3 : 00000000`00000028 ffff8a8c`9ba07740 fffff805`eb8ed0d0 fffff805`eb8de637 : nt!VerifierExAllocatePoolWithTag+0x53
    ffff8a8c`9ba076d0 00000000`00000028 : ffff8a8c`9ba07740 fffff805`eb8ed0d0 fffff805`eb8de637 fffff805`eb8f66f8 : YSDrv+0x216e3
    ffff8a8c`9ba076d8 ffff8a8c`9ba07740 : fffff805`eb8ed0d0 fffff805`eb8de637 fffff805`eb8f66f8 fffff805`eb8d7410 : 0x28
    ffff8a8c`9ba076e0 fffff805`eb8ed0d0 : fffff805`eb8de637 fffff805`eb8f66f8 fffff805`eb8d7410 00000000`00000002 : 0xffff8a8c`9ba07740
    ffff8a8c`9ba076e8 fffff805`eb8de637 : fffff805`eb8f66f8 fffff805`eb8d7410 00000000`00000002 ffff8f05`87d3f9c0 : YSDrv+0x2d0d0
    ffff8a8c`9ba076f0 fffff805`eb8f66f8 : fffff805`eb8d7410 00000000`00000002 ffff8f05`87d3f9c0 fffff805`eb8ed390 : YSDrv+0x1e637
    ffff8a8c`9ba076f8 fffff805`eb8d7410 : 00000000`00000002 ffff8f05`87d3f9c0 fffff805`eb8ed390 00000000`00000000 : YSDrv+0x366f8
    ffff8a8c`9ba07700 00000000`00000002 : ffff8f05`87d3f9c0 fffff805`eb8ed390 00000000`00000000 fffff801`bb444180 : YSDrv+0x17410
    ffff8a8c`9ba07708 ffff8f05`87d3f9c0 : fffff805`eb8ed390 00000000`00000000 fffff801`bb444180 fffff805`eb8d335a : 0x2
    ffff8a8c`9ba07710 fffff805`eb8ed390 : 00000000`00000000 fffff801`bb444180 fffff805`eb8d335a fffff805`eb8ed3f0 : 0xffff8f05`87d3f9c0
    ffff8a8c`9ba07718 00000000`00000000 : fffff801`bb444180 fffff805`eb8d335a fffff805`eb8ed3f0 49656e69`756e6547 : YSDrv+0x2d390
    
    
    THREAD_SHA1_HASH_MOD_FUNC:  64ef13277e4b75d2e1bc7d7236cb4d774c1ffad9
    
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  1509a1bc1fa99ded12654edabdc84334d6307486
    
    THREAD_SHA1_HASH_MOD:  a50acf136ef0f7556e3022101e8ab85eedf8915b
    
    FOLLOWUP_IP: 
    YSDrv+216e3
    fffff805`eb8e16e3 4885c0          test    rax,rax
    
    FAULT_INSTR_CODE:  75c08548
    
    SYMBOL_STACK_INDEX:  5
    
    SYMBOL_NAME:  YSDrv+216e3
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: YSDrv
    
    IMAGE_NAME:  YSDrv.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  58830289
    
    STACK_COMMAND:  .thread ; .cxr ; kb
    
    BUCKET_ID_FUNC_OFFSET:  216e3
    
    FAILURE_BUCKET_ID:  0xc4_2000_VRF_YSDrv!unknown_function
    
    BUCKET_ID:  0xc4_2000_VRF_YSDrv!unknown_function
    
    PRIMARY_PROBLEM_CLASS:  0xc4_2000_VRF_YSDrv!unknown_function
    
    TARGET_TIME:  2019-03-09T06:30:21.000Z
    
    OSBUILD:  17134
    
    OSSERVICEPACK:  523
    
    SERVICEPACK_NUMBER: 0
    
    OS_REVISION: 0
    
    SUITE_MASK:  272
    
    PRODUCT_TYPE:  1
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS
    
    OS_LOCALE:  
    
    USER_LCID:  0
    
    OSBUILD_TIMESTAMP:  2019-01-01 07:44:13
    
    BUILDDATESTAMP_STR:  180410-1804
    
    BUILDLAB_STR:  rs4_release
    
    BUILDOSVER_STR:  10.0.17134.1.amd64fre.rs4_release.180410-1804
    
    ANALYSIS_SESSION_ELAPSED_TIME:  247a
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:0xc4_2000_vrf_ysdrv!unknown_function
    
    FAILURE_ID_HASH:  {2a2f276b-4093-c410-6e0c-46f936b4972c}
    
    Followup:     MachineOwner
    ---------
    
    0: kd> !verifier
    
    Verify Flags Level 0x03adefbb
    
      STANDARD FLAGS:
        [X] (0x00000000) Automatic Checks
        [X] (0x00000001) Special pool
        [X] (0x00000002) Force IRQL checking
        [X] (0x00000008) Pool tracking
        [X] (0x00000010) I/O verification
        [X] (0x00000020) Deadlock detection
        [X] (0x00000080) DMA checking
        [X] (0x00000100) Security checks
        [X] (0x00000800) Miscellaneous checks
        [ ] (0x00020000) DDI compliance checking
    
      ADDITIONAL FLAGS:
        [ ] (0x00000004) Randomized low resources simulation
        [X] (0x00000200) Force pending I/O requests
        [X] (0x00000400) IRP logging
        [X] (0x00002000) Invariant MDL checking for stack
        [X] (0x00004000) Invariant MDL checking for driver
        [X] (0x00008000) Power framework delay fuzzing
        [X] (0x00010000) Port/miniport interface checking
        [X] (0x00040000) Systematic low resources simulation
        [X] (0x00080000) DDI compliance checking (additional)
        [X] (0x00200000) NDIS/WIFI verification
        [X] (0x00800000) Kernel synchronization delay fuzzing
        [X] (0x01000000) VM switch verification
        [X] (0x02000000) Code integrity checks
    
        [X] Indicates flag is enabled
    
    
    Summary of All Verifier Statistics
    
      RaiseIrqls           0x19
      AcquireSpinLocks     0x10
      Synch Executions     0x0
      Trims                0x3d
    
      Pool Allocations Attempted             0x2402
      Pool Allocations Succeeded             0x2402
      Pool Allocations Succeeded SpecialPool 0x2402
      Pool Allocations With NO TAG           0x0
      Pool Allocations Failed                0x0
    
      Current paged pool allocations         0x13 for 0000268A bytes
      Peak paged pool allocations            0x14 for 000026AA bytes
      Current nonpaged pool allocations      0x9f for 02024CA8 bytes
      Peak nonpaged pool allocations         0x9f for 02024CA8 bytes
    
      Execute pool type count                0x0
      Execute page protection count          0x0
      Execute page mapping count             0x0
      Execute-Write section count            0x0
      Section alignment failures             0x0
      IAT Executable Section failures:       0x0
    YSDrv.sys = VirtualBox driver (update it):
    Code:
    0: kd> lmvm ysdrv
    Browse full module list
    start             end                 module name
    fffff805`eb8c0000 fffff805`eb903000   YSDrv    T (no symbols)           
        Loaded symbol image file: YSDrv.sys
        Image path: \??\C:\Program Files (x86)\Bignox\BigNoxVM\RT\YSDrv.sys
        Image name: YSDrv.sys
        Browse all global symbols  functions  data
        Timestamp:        Fri Jan 20 22:41:13 2017 (58830289)
        CheckSum:         00042B72
        ImageSize:        00043000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
        Information from resource tables:
    The KMODE_EXCEPTION_NOT_HANDLED bug check has a value of 0x0000001E. This indicates that a kernel-mode program generated an exception which the error handler did not catch.
    Code:
    Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\030919-12687-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
    Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 10 Kernel Version 17134 MP (12 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 17134.1.amd64fre.rs4_release.180410-1804
    Machine Name:
    Kernel base = 0xfffff803`f460b000 PsLoadedModuleList = 0xfffff803`f49b9150
    Debug session time: Sun Mar 10 05:28:32.872 2019 (UTC + 1:00)
    System Uptime: 0 days 21:56:45.596
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......................................................
    Loading User Symbols
    Loading unloaded module list
    ................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {ffffffffc000001d, fffff803f47b9091, ffffca03c55a3680, fffff803f49dcc00}
    
    *** WARNING: Unable to verify timestamp for win32kfull.sys
    *** ERROR: Module load completed but symbols could not be loaded for win32kfull.sys
    *** WARNING: Unable to verify timestamp for win32k.sys
    *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
    Probably caused by : win32kbase.sys ( win32kbase!LegacyInputDispatcher::WaitAndDispatch+16d )
    
    Followup:     MachineOwner
    ---------
    
    7: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc000001d, The exception code that was not handled
    Arg2: fffff803f47b9091, The address that the exception occurred at
    Arg3: ffffca03c55a3680, Parameter 0 of the exception
    Arg4: fffff803f49dcc00, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    KEY_VALUES_STRING: 1
    
    
    STACKHASH_ANALYSIS: 1
    
    TIMELINE_ANALYSIS: 1
    
    
    DUMP_CLASS: 1
    
    DUMP_QUALIFIER: 400
    
    BUILD_VERSION_STRING:  17134.1.amd64fre.rs4_release.180410-1804
    
    SYSTEM_MANUFACTURER:  System manufacturer
    
    SYSTEM_PRODUCT_NAME:  PRIME Z390-A
    
    SYSTEM_SKU:  SKU
    
    SYSTEM_VERSION:  0224
    
    BIOS_VENDOR:  American Megatrends Inc.
    
    BIOS_VERSION:  0224
    
    BIOS_DATE:  08/14/2018
    
    BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.
    
    BASEBOARD_PRODUCT:  PRIME Z390-A
    
    BASEBOARD_VERSION:  Rev 1.xx
    
    DUMP_TYPE:  2
    
    BUGCHECK_P1: ffffffffc000001d
    
    BUGCHECK_P2: fffff803f47b9091
    
    BUGCHECK_P3: ffffca03c55a3680
    
    BUGCHECK_P4: fffff803f49dcc00
    
    EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION}  Illegal Instruction  An attempt was made to execute an illegal instruction.
    
    FAULTING_IP: 
    nt!KiApcInterrupt+3e1
    fffff803`f47b9091 45              ???
    
    EXCEPTION_PARAMETER1:  ffffca03c55a3680
    
    EXCEPTION_PARAMETER2:  fffff803f49dcc00
    
    BUGCHECK_STR:  0x1E_c000001d
    
    CPU_COUNT: c
    
    CPU_MHZ: fa8
    
    CPU_VENDOR:  GenuineIntel
    
    CPU_FAMILY: 6
    
    CPU_MODEL: 9e
    
    CPU_STEPPING: a
    
    CPU_MICROCODE: 6,9e,a,0 (F,M,S,R)  SIG: 96'00000000 (cache) 96'00000000 (init)
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    
    BLACKBOXPNP: 1 (!blackboxpnp)
    
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    PROCESS_NAME:  csrss.exe
    
    CURRENT_IRQL:  0
    
    ANALYSIS_SESSION_HOST:  MICHAL
    
    ANALYSIS_SESSION_TIME:  03-23-2019 22:04:35.0018
    
    ANALYSIS_VERSION: 10.0.17763.132 amd64fre
    
    EXCEPTION_RECORD:  ffffca03cf6096b0 -- (.exr 0xffffca03cf6096b0)
    ExceptionAddress: 0000000000060940
       ExceptionCode: cc8e8490
      ExceptionFlags: ffffca03
    NumberParameters: -800996160
       Parameter[0]: ffffca03cf6096d0
       Parameter[1]: ffffca03cf6096d0
       Parameter[2]: 0000000000000000
       Parameter[3]: 0000000000000018
       Parameter[4]: 0100000014120100
       Parameter[5]: ffffca03c559d1c0
       Parameter[6]: 0000000000000000
       Parameter[7]: ffff8c30cd10e970
       Parameter[8]: ffffca03c559d0c0
       Parameter[9]: 0000000000000000
       Parameter[10]: ffffca03c559d29c
       Parameter[11]: 0000000000580012
       Parameter[12]: ffffca03c55a3680
       Parameter[13]: ffffca03c55a3718
       Parameter[14]: ffffca03c55a3718
    
    TRAP_FRAME:  ffffca03cf6096b0 -- (.trap 0xffffca03cf6096b0)
    Unable to read trap frame at ffffca03`cf6096b0
    
    LAST_CONTROL_TRANSFER:  from fffff803f484bb5a to fffff803f47b50a0
    
    FAILED_INSTRUCTION_ADDRESS: 
    nt!KiApcInterrupt+3e1
    fffff803`f47b9091 45              ???
    
    STACK_TEXT:  
    ffff8508`52ff61f8 fffff803`f484bb5a : 00000000`0000001e ffffffff`c000001d fffff803`f47b9091 ffffca03`c55a3680 : nt!KeBugCheckEx
    ffff8508`52ff6200 fffff803`f47bd94d : fffff803`f49fc000 fffff803`f460b000 00058224`00953000 000000ef`000000f7 : nt!KiFatalExceptionHandler+0x22
    ffff8508`52ff6240 fffff803`f46c9b16 : ffff8508`52ff6370 ffff8508`52ff6830 00000000`00000000 ffff8508`52ff7148 : nt!RtlpExecuteHandlerForException+0xd
    ffff8508`52ff6270 fffff803`f46cb613 : ffff8508`52ff7148 ffff8508`52ff6e90 ffff8508`52ff7148 ffffca03`c55a3718 : nt!RtlDispatchException+0x416
    ffff8508`52ff6960 fffff803`f47c5d42 : ffffca03`cf6096b0 fffff80f`04912935 ffffca03`cf6096b0 ffffca03`00000000 : nt!KiDispatchException+0x1f3
    ffff8508`52ff7010 fffff803`f47c0ea5 : 00000000`00000000 00000000`00000000 ffffe10a`9c214000 ffffca03`c53542c0 : nt!KiExceptionDispatch+0xc2
    ffff8508`52ff71f0 fffff803`f47b9091 : ffffca03`c55a3718 00000000`00000000 ffffca03`c5345080 fffff803`f48f65f4 : nt!KiInvalidOpcodeFault+0x2e5
    ffff8508`52ff7380 fffff803`f47bd6e7 : fffff803`f46a524b ffffca03`00000001 00000000`00000000 00000000`00000000 : nt!KiApcInterrupt+0x3e1
    ffff8508`52ff7518 fffff803`f46a524b : ffffca03`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!guard_dispatch_icall+0x7
    ffff8508`52ff7520 fffff803`f46a25e1 : 00000000`00000100 00000000`00000000 00000000`00000000 ffffca03`c55a2950 : nt!KiDeliverApc+0x27b
    ffff8508`52ff75b0 fffff803`f46a1b9b : 00000000`00000001 ffffca03`c559d0c0 00000000`00000000 00000000`0000000e : nt!KiSwapThread+0x501
    ffff8508`52ff7680 fffff803`f46a0a97 : ffff8c30`cd1b1bf0 00000000`00000000 00000000`00000000 00000000`0000000a : nt!KiCommitThreadWait+0x13b
    ffff8508`52ff7720 ffff8c30`cd057ead : ffff8c30`0000000a ffffca03`c55aa320 ffff8c30`cd1b1c08 00000000`0000000d : nt!KeWaitForMultipleObjects+0x467
    ffff8508`52ff7800 ffff8c30`cda12a3d : ffff8c05`c0019010 ffff8508`52ff7929 00000000`00000002 ffff8c30`cd1b5601 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x16d
    ffff8508`52ff7850 ffff8c05`c0019010 : ffff8508`52ff7929 00000000`00000002 ffff8c30`cd1b5601 ffff8c30`cd1b5670 : win32kfull+0x42a3d
    ffff8508`52ff7858 ffff8508`52ff7929 : 00000000`00000002 ffff8c30`cd1b5601 ffff8c30`cd1b5670 ffff8c30`cd057aa6 : 0xffff8c05`c0019010
    ffff8508`52ff7860 00000000`00000002 : ffff8c30`cd1b5601 ffff8c30`cd1b5670 ffff8c30`cd057aa6 00000000`00000001 : 0xffff8508`52ff7929
    ffff8508`52ff7868 ffff8c30`cd1b5601 : ffff8c30`cd1b5670 ffff8c30`cd057aa6 00000000`00000001 ffff8c05`00000000 : 0x2
    ffff8508`52ff7870 ffff8c30`cd1b5670 : ffff8c30`cd057aa6 00000000`00000001 ffff8c05`00000000 00000000`00000000 : win32kbase!gTimerId+0xfb1
    ffff8508`52ff7878 ffff8c30`cd057aa6 : 00000000`00000001 ffff8c05`00000000 00000000`00000000 00000000`00000000 : win32kbase!gTermIO
    ffff8508`52ff7880 ffff8c30`cda127d0 : 00000000`00000000 00000000`00000001 00000000`00000001 ffff8c30`cd1b5670 : win32kbase!EnterCrit+0x176
    ffff8508`52ff78d0 00000000`00000000 : 00000000`00000001 00000000`00000001 ffff8c30`cd1b5670 00000000`00000003 : win32kfull+0x427d0
    
    
    THREAD_SHA1_HASH_MOD_FUNC:  71e145d7deb288919979b26ac312912339fe8ff8
    
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  40eebda775585f513d40b69b7580bf42bf002b74
    
    THREAD_SHA1_HASH_MOD:  d1ac573c5477ab82140982708547d3c25c1a6924
    
    FOLLOWUP_IP: 
    win32kbase!LegacyInputDispatcher::WaitAndDispatch+16d
    ffff8c30`cd057ead 8bd8            mov     ebx,eax
    
    FAULT_INSTR_CODE:  c085d88b
    
    SYMBOL_STACK_INDEX:  d
    
    SYMBOL_NAME:  win32kbase!LegacyInputDispatcher::WaitAndDispatch+16d
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32kbase
    
    IMAGE_NAME:  win32kbase.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    IMAGE_VERSION:  10.0.17134.441
    
    STACK_COMMAND:  .thread ; .cxr ; kb
    
    BUCKET_ID_FUNC_OFFSET:  16d
    
    FAILURE_BUCKET_ID:  0x1E_c000001d_BAD_IP_win32kbase!LegacyInputDispatcher::WaitAndDispatch
    
    BUCKET_ID:  0x1E_c000001d_BAD_IP_win32kbase!LegacyInputDispatcher::WaitAndDispatch
    
    PRIMARY_PROBLEM_CLASS:  0x1E_c000001d_BAD_IP_win32kbase!LegacyInputDispatcher::WaitAndDispatch
    
    TARGET_TIME:  2019-03-10T04:28:32.000Z
    
    OSBUILD:  17134
    
    OSSERVICEPACK:  523
    
    SERVICEPACK_NUMBER: 0
    
    OS_REVISION: 0
    
    SUITE_MASK:  272
    
    PRODUCT_TYPE:  1
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS
    
    OS_LOCALE:  
    
    USER_LCID:  0
    
    OSBUILD_TIMESTAMP:  2019-01-01 07:44:13
    
    BUILDDATESTAMP_STR:  180410-1804
    
    BUILDLAB_STR:  rs4_release
    
    BUILDOSVER_STR:  10.0.17134.1.amd64fre.rs4_release.180410-1804
    
    ANALYSIS_SESSION_ELAPSED_TIME:  5db8
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:0x1e_c000001d_bad_ip_win32kbase!legacyinputdispatcher::waitanddispatch
    
    FAILURE_ID_HASH:  {f900b1d0-420d-6cca-34e5-b40029ab573c}
    
    Followup:     MachineOwner
    ---------
    
    7: kd> .load pde
    =========================================================================================
     PDE v11.3 - Copyright 2017 Andrew Richards
    =========================================================================================
    7: kd> !dpx
    Start memory scan  : 0xffff850852ff61f8 ($csp)
    End memory scan    : 0xffff850852ff8000 (Kernel Stack Base)
    
                   rsp : 0xffff850852ff61f8 : 0xfffff803f484bb5a : nt!KiFatalExceptionHandler+0x22
    Unable to load image \SystemRoot\System32\cdd.dll, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for cdd.dll
    *** ERROR: Module load completed but symbols could not be loaded for cdd.dll
    0xffff850852ff61f8 : 0xfffff803f484bb5a : nt!KiFatalExceptionHandler+0x22
    0xffff850852ff6210 : 0xfffff803f47b9091 : nt!KiApcInterrupt+0x3e1
    0xffff850852ff6220 : 0xfffff803f49dcc00 : nt!PspSystemQuotaBlock
    0xffff850852ff6238 : 0xfffff803f47bd94d : nt!RtlpExecuteHandlerForException+0xd
    0xffff850852ff6240 : 0xfffff803f49fc000 : "nt!Ports <PERF> (nt+0x3f1000)"
    0xffff850852ff6248 : 0xfffff803f460b000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff850852ff6260 : 0xffff850852ff6310 : 0xfffff803f47b9091 : nt!KiApcInterrupt+0x3e1
    0xffff850852ff6268 : 0xfffff803f46c9b16 : nt!RtlDispatchException+0x416
    0xffff850852ff62b8 : 0xfffff803f460b000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff850852ff6310 : 0xfffff803f47b9091 : nt!KiApcInterrupt+0x3e1
    0xffff850852ff6318 : 0xfffff803f460b000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff850852ff6320 : 0xfffff803f4a11edc : "nt!Ports <PERF> (nt+0x406edc)"
    0xffff850852ff6340 : 0xfffff803f484bb38 : nt!KiFatalExceptionHandler
    0xffff850852ff6388 : 0xfffff803f4f60f87 : hal!HalpApicRequestInterrupt+0x177
    0xffff850852ff6398 : 0xfffff803f4f60010 : hal!HalpInterruptSendIpi+0x30
    0xffff850852ff63b8 : 0xfffff803f4f60f87 : hal!HalpApicRequestInterrupt+0x177
    0xffff850852ff63f8 : 0xffff850852ff7518 : 0xfffff803f46a524b : nt!KiDeliverApc+0x27b
    0xffff850852ff6428 : 0xfffff803f4f608bd : hal!HalRequestSoftwareInterrupt+0xcd
    0xffff850852ff6458 : 0xfffff803f47bd6e7 : nt!guard_dispatch_icall+0x7
    Unable to load image \SystemRoot\System32\DriverStore\FileRepository\nv_dispi.inf_amd64_5db32447b43ce666\nvlddmkm.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for nvlddmkm.sys
    *** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
    0xffff850852ff64b8 : 0xfffff803f46458fc : nt!EtwWrite+0x2c
    0xffff850852ff6500 : 0xfffff803f4a75400 : nt!KiInitialThread
    0xffff850852ff6538 : 0xfffff803f4f60f87 : hal!HalpApicRequestInterrupt+0x177
    0xffff850852ff6600 : 0xffff850852ff68f0 : 0xfffff803f47b9095 : nt!KiApcInterrupt+0x3e5
    0xffff850852ff6608 : 0xfffff803f4f60f87 : hal!HalpApicRequestInterrupt+0x177
    0xffff850852ff6628 : 0xfffff803f4f614e6 : hal!HalPerformEndOfInterrupt+0x16
    0xffff850852ff6658 : 0xfffff803f4f614e6 : hal!HalPerformEndOfInterrupt+0x16
    0xffff850852ff6670 : 0xfffff803f4a75400 : nt!KiInitialThread
    0xffff850852ff6688 : 0xfffff803f47b628e : nt!KiChainedDispatch+0xbe
    0xffff850852ff66e8 : 0xfffff803f4f614e6 : hal!HalPerformEndOfInterrupt+0x16
    0xffff850852ff6718 : 0xfffff803f47b628e : nt!KiChainedDispatch+0xbe
    0xffff850852ff6730 : 0xfffff803f4a75400 : nt!KiInitialThread
    0xffff850852ff6788 : 0xfffff803f47bbdbf : nt!KiDispatchInterrupt+0xf
    0xffff850852ff67c8 : 0xfffff803f47bbdbf : nt!KiDispatchInterrupt+0xf
    0xffff850852ff67f8 : 0xfffff803f47bb573 : nt!KiDpcInterrupt+0x2a3
    0xffff850852ff6818 : 0xfffff803f47bc175 : nt!SwapContext+0x165
    0xffff850852ff6838 : 0xfffff803f47b8cb0 : nt!KiApcInterrupt
    0xffff850852ff6840 : 0xfffff803f47b90d6 : nt!KiApcInterrupt+0x426
    0xffff850852ff6848 : 0xfffff803f460b000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff850852ff6850 : 0xfffff803f4a11edc : "nt!Ports <PERF> (nt+0x406edc)"
    0xffff850852ff6878 : 0xfffff803f4a73200 : nt!KiInitialProcess+0x840
    0xffff850852ff68a8 : 0xfffff803f46cbaeb : nt!KiPreprocessFault+0x93
    0xffff850852ff68d0 : 0xffff850852ff68e0 : 0xfffff803f47b9091 : nt!KiApcInterrupt+0x3e1
    0xffff850852ff68e0 : 0xfffff803f47b9091 : nt!KiApcInterrupt+0x3e1
    0xffff850852ff68e8 : 0xfffff803f47b90a1 : nt!KiApcInterrupt+0x3f1
    0xffff850852ff68f0 : 0xfffff803f47b9095 : nt!KiApcInterrupt+0x3e5
    0xffff850852ff6908 : 0xfffff803f47b9094 : nt!KiApcInterrupt+0x3e4
    0xffff850852ff6918 : 0xfffff803f46cb9d6 : nt!KdTrap+0x22
    0xffff850852ff6958 : 0xfffff803f46cb613 : nt!KiDispatchException+0x1f3
    0xffff850852ff6a08 : 0xfffff803f47bcd70 : nt!ExpInterlockedPopEntrySListEnd
    0xffff850852ff6a18 : 0xfffff803f47bd6e7 : nt!guard_dispatch_icall+0x7
    0xffff850852ff6a58 : 0xfffff803f49dcc00 : nt!PspSystemQuotaBlock
    0xffff850852ff6a88 : 0xfffff803f47b9091 : nt!KiApcInterrupt+0x3e1
    0xffff850852ff6ae8 : 0xfffff803f46458fc : nt!EtwWrite+0x2c
    0xffff850852ff6df8 : 0xfffff803f469f3fa : nt!ExReleasePushLockExclusiveEx+0x1aa
    0xffff850852ff6e18 : 0xfffff803f46cc00c : nt!RtlGetExtendedContextLength+0x34
    0xffff850852ff6ed8 : 0xfffff80f031f3b29 : dxgkrnl!DXGADAPTERSTOPRESETLOCKSHARED::Release+0x29
    0xffff850852ff6ee0 : 0xffff850852ff6f60 : 0xfffff803f4a73240 : nt!ExNode0
    0xffff850852ff6ee8 : 0xfffff803f46a8f94 : nt!KiChooseTargetProcessor+0x184
    0xffff850852ff6f08 : 0xfffff80f03289211 : "dxgkrnl!OutputDuplThunks<void (__cdecl OUTPUTDUPL_MGR::*)(_DXGKARG_SETPOINTERPOSITION const * __ptr64) __ptr64,_DXGKARG_SETPOINTERPOSITION const * __ptr64>::RunForAdapter"+0x11d
    0xffff850852ff6f30 : 0xfffff803f4a73240 : nt!ExNode0
    0xffff850852ff6f48 : 0xfffff803f46e4f8e : nt!ExTryAcquirePushLockExclusiveEx+0xee
    0xffff850852ff6f60 : 0xfffff803f4a73240 : nt!ExNode0
    0xffff850852ff6f78 : 0xfffff803f469ff47 : nt!ExReleasePushLockSharedEx+0x37
    0xffff850852ff6fa8 : 0xfffff803f4f60df5 : hal!HalSendSoftwareInterrupt+0xa5
    0xffff850852ff7008 : 0xfffff803f47c5d42 : nt!KiExceptionDispatch+0xc2
    0xffff850852ff7018 : 0xfffff80f04912935 : mouclass!MouseClassHandleRead+0x139
    0xffff850852ff70f8 : 0xfffff803f4b080e9 : nt!IopSynchronousServiceTail+0x2b9
    0xffff850852ff7158 : 0xfffff803f47b9091 : nt!KiApcInterrupt+0x3e1
    0xffff850852ff7170 : 0xfffff803f49dcc00 : nt!PspSystemQuotaBlock
    0xffff850852ff71a8 : 0xfffff803f4b1ee92 : nt!NtReadFile+0x692
    0xffff850852ff71c0 : 0xffff8c30cd184ab0 : win32kbase!gZero
    0xffff850852ff71e8 : 0xfffff803f47c0ea5 : nt!KiInvalidOpcodeFault+0x2e5
    0xffff850852ff71f0 : 0x0000000000000000 :  Trap @ ffff850852ff71f0
    0xffff850852ff7220 : 0xfffff803f47bcd70 : nt!ExpInterlockedPopEntrySListEnd
    0xffff850852ff7230 : 0xfffff803f47bd6e7 : nt!guard_dispatch_icall+0x7
    0xffff850852ff7248 : 0xfffff803f49dcc00 : nt!PspSystemQuotaBlock
    0xffff850852ff72c0 : 0xffff8c30cd10e970 : win32kbase!rimInputApc
    0xffff850852ff72e8 : 0xfffff803f46a51c5 : nt!KiDeliverApc+0x1f5
    0xffff850852ff7318 : 0xfffff803f4ace169 : nt!SeCaptureSubjectContextEx+0x59
    0xffff850852ff7338 : 0xfffff803f4aceaca : nt!SeReleaseSubjectContext+0x3a
    0xffff850852ff7358 : 0xfffff803f47b9091 : nt!KiApcInterrupt+0x3e1
    0xffff850852ff7380 : 0xffffca03c55a3718 :  Trap @ ffff850852ff7380
    0xffff850852ff7398 : 0xfffff803f48f65f4 : nt!ExFreePoolWithTag+0x594
    0xffff850852ff73b0 : 0xffff8c30cd10e970 : win32kbase!rimInputApc
    0xffff850852ff73d8 : 0xfffff803f49dcc00 : nt!PspSystemQuotaBlock
    0xffff850852ff7478 : 0xfffff803f464900c : nt!IopFreeIrp+0x15c
    0xffff850852ff74b8 : 0xfffff803f4648e93 : nt!IoFreeIrp+0x13
    0xffff850852ff74e8 : 0xfffff803f47bd6e7 : nt!guard_dispatch_icall+0x7
    0xffff850852ff7500 : 0xffff850852ff7518 : 0xfffff803f46a524b : nt!KiDeliverApc+0x27b
    0xffff850852ff7518 : 0xfffff803f46a524b : nt!KiDeliverApc+0x27b
    0xffff850852ff7550 : 0xffff8c30cd10e970 : win32kbase!rimInputApc
    0xffff850852ff75a8 : 0xfffff803f46a25e1 : nt!KiSwapThread+0x501
    0xffff850852ff7600 : 0xffff8c30cd184190 : win32kbase!WPP_a20f547c004839a46b68b687e82aef7b_Traceguids
    0xffff850852ff7618 : 0xffff8c30cd0f47a9 : win32kbase!RIMReadInput+0x309
    0xffff850852ff7678 : 0xfffff803f46a1b9b : nt!KiCommitThreadWait+0x13b
    0xffff850852ff76a0 : 0xffff8c30cd1b1bf0 : win32kbase!gDomainDummyLock
    0xffff850852ff76a8 : 0xffff8c30cd1821e0 : win32kbase!load_config_used+0x100
    0xffff850852ff76b8 : 0xffff8c30cd1b1c08 : win32kbase!gDomainTlLock
    0xffff850852ff76c0 : 0xffff8c05c0006bb0 :  dt win32kbase!CMouseSensor
    0xffff850852ff7718 : 0xfffff803f46a0a97 : nt!KeWaitForMultipleObjects+0x467
    0xffff850852ff7720 : 0xffff8c30cd1b1bf0 : win32kbase!gDomainDummyLock
    0xffff850852ff7748 : 0xffff8c05c0019770 :  dt win32kbase!LegacyInputDispatcher
    0xffff850852ff7758 : 0xfffff803f469dcf0 : nt!ExReleaseResourceAndLeaveCriticalRegion+0xc0
    0xffff850852ff7780 : 0xffff8c05c0019770 :  dt win32kbase!LegacyInputDispatcher
    0xffff850852ff77a8 : 0xffff8c30cd1b1c08 : win32kbase!gDomainTlLock
    0xffff850852ff77b0 : 0xffff8c30cd1b5601 : win32kbase!gTimerId+0xfb1
    0xffff850852ff77b8 : 0xffff8c30cd0619fa : win32kbase!UserSessionSwitchLeaveCrit+0x4a
    0xffff850852ff77c8 : 0xffff8c05c0019770 :  dt win32kbase!LegacyInputDispatcher
    0xffff850852ff77d0 : 0xffff8c30cd1b5601 : win32kbase!gTimerId+0xfb1
    0xffff850852ff77e0 : 0xffff8c30cd1b1bf0 : win32kbase!gDomainDummyLock
    0xffff850852ff77f0 : 0xffff8c05c0019770 :  dt win32kbase!LegacyInputDispatcher
    0xffff850852ff77f8 : 0xffff8c30cd057ead : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x16d
    0xffff850852ff7810 : 0xffff8c30cd1b1c08 : win32kbase!gDomainTlLock
    *** WARNING: Unable to verify timestamp for win32kfull.sys
    *** ERROR: Module load completed but symbols could not be loaded for win32kfull.sys
    0xffff850852ff7868 : 0xffff8c30cd1b5601 : win32kbase!gTimerId+0xfb1
    0xffff850852ff7870 : 0xffff8c30cd1b5670 : win32kbase!gTermIO
    0xffff850852ff7878 : 0xffff8c30cd057aa6 : win32kbase!EnterCrit+0x176
    0xffff850852ff78c0 : 0xffff8c30cd1b5670 : win32kbase!gTermIO
    0xffff850852ff78e8 : 0xffff8c30cd1b5670 : win32kbase!gTermIO
    0xffff850852ff7908 : 0xffff8c05c0019770 :  dt win32kbase!LegacyInputDispatcher
    0xffff850852ff7930 : 0xffff8c30cdcaccd0 :  !du "IO_DT"
    0xffff850852ff7988 : 0xffff8c30cd0b9112 : win32kbase!xxxCreateSystemThreads+0xb2
    0xffff850852ff79d8 : 0xffff8c30cd1b5670 : win32kbase!gTermIO
    0xffff850852ff79f8 : 0xfffff803f47c5743 : nt!KiSystemServiceCopyEnd+0x13
    0xffff850852ff7a00 : 0xffffca03c55a3680 :  Trap @ ffff850852ff7a00
    NVIDIA driver has guilty:
    Code:
    7: kd> lmvm nvlddmkm
    Browse full module list
    start             end                 module name
    fffff80f`05ab0000 fffff80f`06e91000   nvlddmkm T (no symbols)           
        Loaded symbol image file: nvlddmkm.sys
        Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_dispi.inf_amd64_5db32447b43ce666\nvlddmkm.sys
        Image name: nvlddmkm.sys
        Browse all global symbols  functions  data
        Timestamp:        Fri Jan 11 01:16:04 2019 (5C385ED4)
        CheckSum:         0138C002
        ImageSize:        013E1000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
        Information from resource tables:
    The IRQL_NOT_LESS_OR_EQUAL bug check has a value of 0x0000000A. This indicates that Microsoft Windows or a kernel-mode driver accessed paged memory at DISPATCH_LEVEL or above.
    Code:
    Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\032219-13453-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
    Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 10 Kernel Version 17134 MP (12 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 17134.1.amd64fre.rs4_release.180410-1804
    Machine Name:
    Kernel base = 0xfffff803`ac8aa000 PsLoadedModuleList = 0xfffff803`acc58150
    Debug session time: Fri Mar 22 08:28:36.016 2019 (UTC + 1:00)
    System Uptime: 5 days 16:55:30.722
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......................................................
    Loading User Symbols
    Loading unloaded module list
    ........................................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {8, 2, 1, fffff803ac9420a1}
    
    Probably caused by : hardware ( nt!KiSearchForNewThreadOnProcessor+51 )
    
    Followup:     MachineOwner
    ---------
    
    7: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000008, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff803ac9420a1, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    KEY_VALUES_STRING: 1
    
    
    STACKHASH_ANALYSIS: 1
    
    TIMELINE_ANALYSIS: 1
    
    
    DUMP_CLASS: 1
    
    DUMP_QUALIFIER: 400
    
    BUILD_VERSION_STRING:  17134.1.amd64fre.rs4_release.180410-1804
    
    SYSTEM_MANUFACTURER:  System manufacturer
    
    SYSTEM_PRODUCT_NAME:  PRIME Z390-A
    
    SYSTEM_SKU:  SKU
    
    SYSTEM_VERSION:  0224
    
    BIOS_VENDOR:  American Megatrends Inc.
    
    BIOS_VERSION:  0224
    
    BIOS_DATE:  08/14/2018
    
    BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.
    
    BASEBOARD_PRODUCT:  PRIME Z390-A
    
    BASEBOARD_VERSION:  Rev 1.xx
    
    DUMP_TYPE:  2
    
    BUGCHECK_P1: 8
    
    BUGCHECK_P2: 2
    
    BUGCHECK_P3: 1
    
    BUGCHECK_P4: fffff803ac9420a1
    
    WRITE_ADDRESS: fffff803accf7388: Unable to get MiVisibleState
    Unable to get NonPagedPoolStart
    Unable to get NonPagedPoolEnd
    Unable to get PagedPoolStart
    Unable to get PagedPoolEnd
     0000000000000008 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KiSearchForNewThreadOnProcessor+51
    fffff803`ac9420a1 0000            add     byte ptr [rax],al
    
    CPU_COUNT: c
    
    CPU_MHZ: fa8
    
    CPU_VENDOR:  GenuineIntel
    
    CPU_FAMILY: 6
    
    CPU_MODEL: 9e
    
    CPU_STEPPING: a
    
    CPU_MICROCODE: 6,9e,a,0 (F,M,S,R)  SIG: 96'00000000 (cache) 96'00000000 (init)
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    
    BLACKBOXPNP: 1 (!blackboxpnp)
    
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    BUGCHECK_STR:  AV
    
    PROCESS_NAME:  ACBSP.exe
    
    ANALYSIS_SESSION_HOST:  MICHAL
    
    ANALYSIS_SESSION_TIME:  03-23-2019 22:07:58.0682
    
    ANALYSIS_VERSION: 10.0.17763.132 amd64fre
    
    TRAP_FRAME:  ffffac0ee99874c0 -- (.trap 0xffffac0ee99874c0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000008 rbx=0000000000000000 rcx=ffff9b801e7a6180
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff803ac9420a1 rsp=ffffac0ee9987650 rbp=0000000000000001
     r8=ffff9b801ec86700  r9=fffff803ac8aa000 r10=0000000000000000
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!KiSearchForNewThreadOnProcessor+0x51:
    fffff803`ac9420a1 0000            add     byte ptr [rax],al ds:00000000`00000008=??
    Resetting default scope
    
    MISALIGNED_IP: 
    nt!KiSearchForNewThreadOnProcessor+51
    fffff803`ac9420a1 0000            add     byte ptr [rax],al
    
    LAST_CONTROL_TRANSFER:  from fffff803aca64c69 to fffff803aca540c0
    
    STACK_TEXT:  
    ffffac0e`e9987378 fffff803`aca64c69 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    ffffac0e`e9987380 fffff803`aca618e5 : ffffe381`fe8b2a10 ffffe381`eea30900 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    ffffac0e`e99874c0 fffff803`ac9420a1 : 00000000`0000000f 00000000`00000001 ffffe381`f3413700 ffff9b80`1e7a6180 : nt!KiPageFault+0x425
    ffffac0e`e9987650 fffff803`ac941eac : ffff9b80`1e7a6180 ffffac0e`ffffffff ffff9b80`1e7a6180 00000000`00000fff : nt!KiSearchForNewThreadOnProcessor+0x51
    ffffac0e`e99876d0 fffff803`ac9412ea : ffffe381`00000000 ffffe381`f3413700 00000000`00000001 00007fff`ffff0000 : nt!KiSearchForNewThread+0x46c
    ffffac0e`e9987740 fffff803`ac940bbb : 00000000`00000000 00000000`d4b6c290 00000000`00000000 ffffe382`038121f0 : nt!KiSwapThread+0x1ea
    ffffac0e`e9987810 fffff803`ac9402df : ffffe381`f11b9220 00000000`00000000 00000000`7773ac00 ffffe381`f3413840 : nt!KiCommitThreadWait+0x13b
    ffffac0e`e99878b0 fffff803`acda6d3c : ffffe381`d953d060 ffffac0e`00000006 00000000`00000001 ffffbf8e`d0946700 : nt!KeWaitForSingleObject+0x1ff
    ffffac0e`e9987990 fffff803`aca64743 : ffffe381`f3413700 00000000`00000000 00000000`00000000 ffffe381`d953d060 : nt!NtWaitForSingleObject+0xfc
    ffffac0e`e9987a00 00000000`775e1e4c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0a4cebe8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775e1e4c
    
    
    THREAD_SHA1_HASH_MOD_FUNC:  0a8c613e2426b79e129e92debfbe4c749d763eed
    
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  994b2a4edc74c76018bb5dafde289aef2102a2e2
    
    THREAD_SHA1_HASH_MOD:  bc100a5647b828107ac4e18055e00abcbe1ec406
    
    FOLLOWUP_IP: 
    nt!KiSearchForNewThreadOnProcessor+51
    fffff803`ac9420a1 0000            add     byte ptr [rax],al
    
    FAULT_INSTR_CODE:  f000000
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!KiSearchForNewThreadOnProcessor+51
    
    FOLLOWUP_NAME:  MachineOwner
    
    IMAGE_NAME:  hardware
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    IMAGE_VERSION:  10.0.17134.590
    
    STACK_COMMAND:  .thread ; .cxr ; kb
    
    MODULE_NAME: hardware
    
    FAILURE_BUCKET_ID:  IP_MISALIGNED
    
    BUCKET_ID:  IP_MISALIGNED
    
    PRIMARY_PROBLEM_CLASS:  IP_MISALIGNED
    
    TARGET_TIME:  2019-03-22T07:28:36.000Z
    
    OSBUILD:  17134
    
    OSSERVICEPACK:  590
    
    SERVICEPACK_NUMBER: 0
    
    OS_REVISION: 0
    
    SUITE_MASK:  272
    
    PRODUCT_TYPE:  1
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS
    
    OS_LOCALE:  
    
    USER_LCID:  0
    
    OSBUILD_TIMESTAMP:  2019-02-06 03:25:47
    
    BUILDDATESTAMP_STR:  180410-1804
    
    BUILDLAB_STR:  rs4_release
    
    BUILDOSVER_STR:  10.0.17134.1.amd64fre.rs4_release.180410-1804
    
    ANALYSIS_SESSION_ELAPSED_TIME:  b96
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:ip_misaligned
    
    FAILURE_ID_HASH:  {201b0e5d-db2a-63d2-77be-8ce8ff234750}
    
    Followup:     MachineOwner
    ---------
    
    7: kd> .trap 0xffffac0ee99874c0
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000008 rbx=0000000000000000 rcx=ffff9b801e7a6180
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff803ac9420a1 rsp=ffffac0ee9987650 rbp=0000000000000001
     r8=ffff9b801ec86700  r9=fffff803ac8aa000 r10=0000000000000000
    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!KiSearchForNewThreadOnProcessor+0x51:
    fffff803`ac9420a1 0000            add     byte ptr [rax],al ds:00000000`00000008=??
    7: kd> kb
      *** Stack trace for last set context - .thread/.cxr resets it
     # RetAddr           : Args to Child                                                           : Call Site
    00 fffff803`ac941eac : ffff9b80`1e7a6180 ffffac0e`ffffffff ffff9b80`1e7a6180 00000000`00000fff : nt!KiSearchForNewThreadOnProcessor+0x51
    01 fffff803`ac9412ea : ffffe381`00000000 ffffe381`f3413700 00000000`00000001 00007fff`ffff0000 : nt!KiSearchForNewThread+0x46c
    02 fffff803`ac940bbb : 00000000`00000000 00000000`d4b6c290 00000000`00000000 ffffe382`038121f0 : nt!KiSwapThread+0x1ea
    03 fffff803`ac9402df : ffffe381`f11b9220 00000000`00000000 00000000`7773ac00 ffffe381`f3413840 : nt!KiCommitThreadWait+0x13b
    04 fffff803`acda6d3c : ffffe381`d953d060 ffffac0e`00000006 00000000`00000001 ffffbf8e`d0946700 : nt!KeWaitForSingleObject+0x1ff
    05 fffff803`aca64743 : ffffe381`f3413700 00000000`00000000 00000000`00000000 ffffe381`d953d060 : nt!NtWaitForSingleObject+0xfc
    06 00000000`775e1e4c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    07 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775e1e4c
    7: kd> .load pde
    =========================================================================================
     PDE v11.3 - Copyright 2017 Andrew Richards
    =========================================================================================
    7: kd> !dpx
    Start memory scan  : 0xffffac0ee9987378 ($csp)
    End memory scan    : 0xffffac0ee9988000 (Kernel Stack Base)
    
    0xffffac0ee9987378 : 0xfffff803aca64c69 : nt!KiBugCheckDispatch+0x69
    0xffffac0ee99873a0 : 0xfffff803ac9420a1 : nt!KiSearchForNewThreadOnProcessor+0x51
    0xffffac0ee9987498 : 0x5555555555555555 :  !da "UUUUUUUU"
    0xffffac0ee99874a8 : 0xfffff803acd12240 : nt!ExNode0
    0xffffac0ee99874b8 : 0xfffff803aca618e5 : nt!KiPageFault+0x425
    0xffffac0ee99874c0 : 0xffffe381fe8b2a10 :  Trap @ ffffac0ee99874c0
    0xffffac0ee9987510 : 0xfffff803ac8aa000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffffac0ee9987598 : 0xfffff803aca5b11f : nt!SwapContext+0xef
    0xffffac0ee99875a8 : 0xfffff803aca5a593 : nt!KiDpcInterrupt+0x2a3
    0xffffac0ee99875b8 : 0xfffff803aca5b414 : nt!SwapContext+0x3e4
    0xffffac0ee99875d8 : 0xfffff803ac9b5d6d : nt!KiFindReadyThread+0xcd
    0xffffac0ee99875f8 : 0xfffff803aca5ad66 : nt!KiSwapContext+0x76
    0xffffac0ee9987628 : 0xfffff803ac9420a1 : nt!KiSearchForNewThreadOnProcessor+0x51
    0xffffac0ee9987698 : 0xfffff803acd12240 : nt!ExNode0
    0xffffac0ee99876c8 : 0xfffff803ac941eac : nt!KiSearchForNewThread+0x46c
    0xffffac0ee9987738 : 0xfffff803ac9412ea : nt!KiSwapThread+0x1ea
    0xffffac0ee9987808 : 0xfffff803ac940bbb : nt!KiCommitThreadWait+0x13b
    0xffffac0ee99878a8 : 0xfffff803ac9402df : nt!KeWaitForSingleObject+0x1ff
    0xffffac0ee99878d8 : 0xfffff803acda5942 : nt!ObpReferenceObjectByHandleWithTag+0x272
    0xffffac0ee99878f8 : 0xfffff803acda5942 : nt!ObpReferenceObjectByHandleWithTag+0x272
    0xffffac0ee9987988 : 0xfffff803acda6d3c : nt!NtWaitForSingleObject+0xfc
    0xffffac0ee99879f8 : 0xfffff803aca64743 : nt!KiSystemServiceCopyEnd+0x13
    0xffffac0ee9987a00 : 0xffffe381f3413700 :  Trap @ ffffac0ee9987a00
    You trying update BIOS to version 0903? You trying change drivers for graphics card and VirtualBox? If you do not need Driver Verifier, turn it off
    Last edited by MrPepka; 23 Mar 2019 at 16:47.
      My Computer


  3. Posts : 14,046
    Windows 11 Pro X64 22H2 22621.1848
       #3

    The Driver Verifier enabled dump indicates a problem with YSDrv.sys. This belongs to BigNox VM VirtualBox. Suggest you uninstall this software ad see if that helps to resolve your BSOD problem.

    What do you use that program for?
      My Computers


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 22:34.
Find Us




Windows 10 Forums