************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : true AllowNugetExeUpdate : true AllowNugetMSCredentialProviderInstall : true AllowParallelInitializationOfLocalRepositories : true -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.015 seconds ************* Waiting for Debugger Extensions Gallery to Initialize ************** >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.235 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 36 Microsoft (R) Windows Debugger Version 10.0.25921.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\WINDOWS\MEMORY.DMP] Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available. ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Kernel base = 0xfffff804`38e00000 PsLoadedModuleList = 0xfffff804`39a2a730 Debug session time: Sat Dec 16 09:28:49.738 2023 (UTC - 6:00) System Uptime: 0 days 0:02:54.381 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ Loading User Symbols Loading unloaded module list ........ For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff804`391fd6c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8907`82060b20=000000000000000a 5: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 00000000000000c0, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8043905a8c0, address which referenced memory Debugging Details: ------------------ *** WARNING: Check Image - Checksum mismatch - Dump: 0xd94f, File: 0x954c - C:\ProgramData\Dbg\sym\hal.dll\1A7BE8E96000\hal.dll KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4343 Key : Analysis.Elapsed.mSec Value: 4405 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 608 Key : Analysis.Init.Elapsed.mSec Value: 4585 Key : Analysis.Memory.CommitPeak.Mb Value: 91 Key : Bugcheck.Code.KiBugCheckData Value: 0xa Key : Bugcheck.Code.LegacyAPI Value: 0xa Key : Failure.Bucket Value: AV_nt!KiIntSteerCalculateDistribution Key : Failure.Hash Value: {3035e70d-e1a6-b78e-ff73-da6251b6f39c} Key : Hypervisor.Enlightenments.Value Value: 0 Key : Hypervisor.Enlightenments.ValueHex Value: 0 Key : Hypervisor.Flags.AnyHypervisorPresent Value: 0 Key : Hypervisor.Flags.ApicEnlightened Value: 0 Key : Hypervisor.Flags.ApicVirtualizationAvailable Value: 1 Key : Hypervisor.Flags.AsyncMemoryHint Value: 0 Key : Hypervisor.Flags.CoreSchedulerRequested Value: 0 Key : Hypervisor.Flags.CpuManager Value: 0 Key : Hypervisor.Flags.DeprecateAutoEoi Value: 0 Key : Hypervisor.Flags.DynamicCpuDisabled Value: 0 Key : Hypervisor.Flags.Epf Value: 0 Key : Hypervisor.Flags.ExtendedProcessorMasks Value: 0 Key : Hypervisor.Flags.HardwareMbecAvailable Value: 0 Key : Hypervisor.Flags.MaxBankNumber Value: 0 Key : Hypervisor.Flags.MemoryZeroingControl Value: 0 Key : Hypervisor.Flags.NoExtendedRangeFlush Value: 0 Key : Hypervisor.Flags.NoNonArchCoreSharing Value: 0 Key : Hypervisor.Flags.Phase0InitDone Value: 0 Key : Hypervisor.Flags.PowerSchedulerQos Value: 0 Key : Hypervisor.Flags.RootScheduler Value: 0 Key : Hypervisor.Flags.SynicAvailable Value: 0 Key : Hypervisor.Flags.UseQpcBias Value: 0 Key : Hypervisor.Flags.Value Value: 16777216 Key : Hypervisor.Flags.ValueHex Value: 1000000 Key : Hypervisor.Flags.VpAssistPage Value: 0 Key : Hypervisor.Flags.VsmAvailable Value: 0 Key : Hypervisor.RootFlags.AccessStats Value: 0 Key : Hypervisor.RootFlags.CrashdumpEnlightened Value: 0 Key : Hypervisor.RootFlags.CreateVirtualProcessor Value: 0 Key : Hypervisor.RootFlags.DisableHyperthreading Value: 0 Key : Hypervisor.RootFlags.HostTimelineSync Value: 0 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled Value: 0 Key : Hypervisor.RootFlags.IsHyperV Value: 0 Key : Hypervisor.RootFlags.LivedumpEnlightened Value: 0 Key : Hypervisor.RootFlags.MapDeviceInterrupt Value: 0 Key : Hypervisor.RootFlags.MceEnlightened Value: 0 Key : Hypervisor.RootFlags.Nested Value: 0 Key : Hypervisor.RootFlags.StartLogicalProcessor Value: 0 Key : Hypervisor.RootFlags.Value Value: 0 Key : Hypervisor.RootFlags.ValueHex Value: 0 Key : SecureKernel.HalpHvciEnabled Value: 0 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: a BUGCHECK_P1: c0 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff8043905a8c0 FILE_IN_CAB: MEMORY.DMP READ_ADDRESS: 00000000000000c0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 PROCESS_NAME: System TRAP_FRAME: ffff890782060c60 -- (.trap 0xffff890782060c60) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000003 rdx=0000000000000057 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8043905a8c0 rsp=ffff890782060df0 rbp=ffff890782061260 r8=0000000000000004 r9=fffff80439a2b090 r10=0000000000000001 r11=ffff890782061250 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe cy nt!KiIntSteerCalculateDistribution+0x120: fffff804`3905a8c0 4839b8c0000000 cmp qword ptr [rax+0C0h],rdi ds:00000000`000000c0=???????????????? Resetting default scope STACK_TEXT: ffff8907`82060b18 fffff804`39211729 : 00000000`0000000a 00000000`000000c0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffff8907`82060b20 fffff804`3920d2e3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 ffff8907`82060c60 fffff804`3905a8c0 : 00000000`00000000 ffffcb02`7cfc4040 00000000`00000007 00000000`00000000 : nt!KiPageFault+0x463 ffff8907`82060df0 fffff804`3905a587 : 00000000`00000002 00000000`00000002 00000000`00000001 ffff8907`82061440 : nt!KiIntSteerCalculateDistribution+0x120 ffff8907`820612b0 fffff804`3905a347 : 00000000`00000001 0f0f0f0f`00000000 00000000`00000001 ffff8907`82061b30 : nt!KeIntSteerPeriodic+0x67 ffff8907`820613c0 fffff804`390b41b0 : ffff8907`82061b30 ffff8a81`ff91b180 000000b9`173745ed ffffcb02`76ff9000 : nt!PpmParkSteerInterrupts+0x447 ffff8907`820617f0 fffff804`390c166e : ffff8a81`ff91e240 ffff8907`82061960 00000000`00000000 ffff8a81`00000002 : nt!PpmCheckRun+0x40 ffff8907`82061860 fffff804`390c0954 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e ffff8907`820619d0 fffff804`39201fbe : ffffffff`00000000 ffff8a81`ff91b180 ffff8a81`ff926240 ffffcb02`7cfc4040 : nt!KiRetireDpcList+0x1f4 ffff8907`82061c60 00000000`00000000 : ffff8907`82062000 ffff8907`8205c000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e SYMBOL_NAME: nt!KiIntSteerCalculateDistribution+120 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 120 FAILURE_BUCKET_ID: AV_nt!KiIntSteerCalculateDistribution OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {3035e70d-e1a6-b78e-ff73-da6251b6f39c} Followup: MachineOwner ---------