nt!KeBugCheckEx:
fffff807de6b8460 48894c2408 mov qword ptr [rsp+8],rcx ss:ffffef032089f5a0=000000000000000a
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000042002904, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff807de543814, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1515
Key : Analysis.Elapsed.mSec
Value: 9498
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 281
Key : Analysis.Init.Elapsed.mSec
Value: 4349
Key : Analysis.Memory.CommitPeak.Mb
Value: 87
Key : Analysis.Version.DbgEng
Value: 10.0.27793.1000
Key : Analysis.Version.Description
Value: 10.2410.02.02 amd64fre
Key : Analysis.Version.Ext
Value: 1.2410.2.2
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Bugcheck.Code.TargetModel
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 0x21008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0x0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_nt!KiSwapThread
Key : Failure.Exception.IP.Address
Value: 0xfffff807de543814
Key : Failure.Exception.IP.Module
Value: nt
Key : Failure.Exception.IP.Offset
Value: 0x343814
Key : Failure.Hash
Value: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}
BUGCHECK_CODE: a
BUGCHECK_P1: 42002904
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff807de543814
FILE_IN_CAB: 032825-4156-01.dmp
DUMP_FILE_ATTRIBUTES: 0x21008
Kernel Generated Triage Dump
FAULTING_THREAD: ffffcf0aea3e7040
WRITE_ADDRESS: fffff807df1c34b0: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000042002904
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffef032089f6e0 -- (.trap 0xffffef032089f6e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000042002904
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807de543814 rsp=ffffef032089f870 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000000000000080
r11=ffffef032089f868 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiSwapThread+0x9a4:
fffff807`de543814 488901 mov qword ptr [rcx],rax ds:00000000`42002904=????????????????
Resetting default scope
STACK_TEXT:
ffffef03`2089f598 fffff807`de88cee9 : 00000000`0000000a 00000000`42002904 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffef03`2089f5a0 fffff807`de8881a8 : 024fe07f`b4bbbdff fffff807`de880eec fffff807`df015340 ffffcf0a`ea3e7040 : nt!KiBugCheckDispatch+0x69
ffffef03`2089f6e0 fffff807`de543814 : 00000000`00000000 ffff8101`f3c51198 00000000`00000000 ffffcf0a`e57cd280 : nt!KiPageFault+0x468
ffffef03`2089f870 fffff807`de472d83 : 00000000`00000000 00000000`00000000 00000000`42002904 ffffcf0a`000000c0 : nt!KiSwapThread+0x9a4
ffffef03`2089f900 fffff807`de570b56 : ffff8101`f3c51180 ffffcf0a`ea3e7040 ffffcf0a`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x483
ffffef03`2089f990 fffff807`de5703e6 : ffffcf0a`ea3e7040 00000000`00000000 ffffcf0a`ea3e7000 ffffef03`00000000 : nt!KeRemovePriQueue+0x1e6
ffffef03`2089fa00 fffff807`de65594a : ffffcf0a`ea3e7040 ffffcf0a`ea3e7040 fffff807`de570300 ffffcf0a`e571fb20 : nt!ExpWorkerThread+0xe6
ffffef03`2089fbb0 fffff807`de87a004 : ffff8101`f3c51180 ffffcf0a`ea3e7040 fffff807`de6558f0 249c8d4c`64adf124 : nt!PspSystemThreadStartup+0x5a
ffffef03`2089fc00 00000000`00000000 : ffffef03`208a0000 ffffef03`20899000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME: nt!KiSwapThread+9a4
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.26100.3194
STACK_COMMAND: .process /r /p 0xffffcf0ae56bd040; .thread 0xffffcf0aea3e7040 ; kb
BUCKET_ID_FUNC_OFFSET: 9a4
FAILURE_BUCKET_ID: AV_nt!KiSwapThread
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}
Followup: MachineOwner