************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : true AllowNugetExeUpdate : true AllowNugetMSCredentialProviderInstall : true AllowParallelInitializationOfLocalRepositories : true -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds ************* Waiting for Debugger Extensions Gallery to Initialize ************** >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.312 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 36 Microsoft (R) Windows Debugger Version 10.0.25921.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [D:\Downloads\greg\112423-10812-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 22621 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Kernel base = 0xfffff806`7d600000 PsLoadedModuleList = 0xfffff806`7e2134a0 Debug session time: Fri Nov 24 10:15:24.617 2023 (UTC + 0:00) System Uptime: 0 days 1:10:32.270 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ......................... Loading User Symbols Loading unloaded module list .............. For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff806`7da16980 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff60c`93b7d5c0=000000000000000a 7: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: fffff8058a89be20, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff8068a87f6bf, address which referenced memory Debugging Details: ------------------ *** WARNING: Check Image - Checksum mismatch - Dump: 0x20397e, File: 0x2039f2 - C:\ProgramData\Dbg\sym\BTHport.sys\5249EE07202000\BTHport.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6187 Key : Analysis.Elapsed.mSec Value: 16522 Key : Analysis.IO.Other.Mb Value: 12 Key : Analysis.IO.Read.Mb Value: 13 Key : Analysis.IO.Write.Mb Value: 41 Key : Analysis.Init.CPU.mSec Value: 1453 Key : Analysis.Init.Elapsed.mSec Value: 51396 Key : Analysis.Memory.CommitPeak.Mb Value: 92 Key : Bugcheck.Code.LegacyAPI Value: 0xd1 Key : Dump.Attributes.AsUlong Value: 1008 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 Key : Failure.Bucket Value: AV_bddci!unknown_function Key : Failure.Hash Value: {26543f81-49dd-6bd2-b0fe-b3443123a4f7} BUGCHECK_CODE: d1 BUGCHECK_P1: fffff8058a89be20 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff8068a87f6bf FILE_IN_CAB: 112423-10812-01.dmp DUMP_FILE_ATTRIBUTES: 0x1008 Kernel Generated Triage Dump READ_ADDRESS: fffff8067e31d470: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse fffff8058a89be20 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: fffff60c93b7d700 -- (.trap 0xfffff60c93b7d700) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff8058a89be18 rbx=0000000000000000 rcx=f2c34a74d0870000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8068a87f6bf rsp=fffff60c93b7d890 rbp=fffff60c93b7d911 r8=00000000000054eb r9=000010c4000008b8 r10=0000000000000000 r11=fffff60c93b7d7c0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc bddci+0x2f6bf: fffff806`8a87f6bf 488b5808 mov rbx,qword ptr [rax+8] ds:fffff805`8a89be20=???????????????? Resetting default scope STACK_TEXT: fffff60c`93b7d5b8 fffff806`7da2bfa9 : 00000000`0000000a fffff805`8a89be20 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff60c`93b7d5c0 fffff806`7da27634 : fffff60c`93b7d850 fffff60c`93b7d848 fffff60c`93b7d828 fffff806`7e0accae : nt!KiBugCheckDispatch+0x69 fffff60c`93b7d700 fffff806`8a87f6bf : ffffe609`3f10eb20 00000000`00000000 00000000`00000000 fffff806`8ca76fc0 : nt!KiPageFault+0x474 fffff60c`93b7d890 ffffe609`3f10eb20 : 00000000`00000000 00000000`00000000 fffff806`8ca76fc0 fffff60c`93b7d8c0 : bddci+0x2f6bf fffff60c`93b7d898 00000000`00000000 : 00000000`00000000 fffff806`8ca76fc0 fffff60c`93b7d8c0 fffff806`7da59970 : 0xffffe609`3f10eb20 SYMBOL_NAME: bddci+2f6bf MODULE_NAME: bddci IMAGE_NAME: bddci.sys STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 2f6bf FAILURE_BUCKET_ID: AV_bddci!unknown_function OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {26543f81-49dd-6bd2-b0fe-b3443123a4f7} Followup: MachineOwner --------- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Usb4Kd.natvis' ************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : true AllowNugetExeUpdate : true AllowNugetMSCredentialProviderInstall : true AllowParallelInitializationOfLocalRepositories : true -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds ************* Waiting for Debugger Extensions Gallery to Initialize ************** >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 36 Microsoft (R) Windows Debugger Version 10.0.25921.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [D:\Downloads\greg\112423-11187-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 22621 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Kernel base = 0xfffff801`0ce00000 PsLoadedModuleList = 0xfffff801`0da134a0 Debug session time: Fri Nov 24 09:04:37.047 2023 (UTC + 0:00) System Uptime: 0 days 10:06:38.705 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ......................... Loading User Symbols PEB is paged out (Peb.Ldr = 00000087`7f16c018). Type ".hh dbgerr001" for details Loading unloaded module list ................. For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff801`0d216980 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8001`4dfc5fb0=???????????????? 4: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the BugCheck Arg2: fffff8010d014df7, Address of the instruction which caused the BugCheck Arg3: ffff80014dfc6900, Address of the context record for the exception that caused the BugCheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ *** WARNING: Check Image - Checksum mismatch - Dump: 0x20397e, File: 0x2039f2 - C:\ProgramData\Dbg\sym\BTHport.sys\5249EE07202000\BTHport.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 5061 Key : Analysis.Elapsed.mSec Value: 15668 Key : Analysis.IO.Other.Mb Value: 2 Key : Analysis.IO.Read.Mb Value: 5 Key : Analysis.IO.Write.Mb Value: 12 Key : Analysis.Init.CPU.mSec Value: 1249 Key : Analysis.Init.Elapsed.mSec Value: 14834 Key : Analysis.Memory.CommitPeak.Mb Value: 101 Key : Bugcheck.Code.LegacyAPI Value: 0x3b Key : Dump.Attributes.AsUlong Value: 1008 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 Key : Failure.Bucket Value: AV_Npfs!NpCommonCleanup Key : Failure.Hash Value: {636ae15b-e9e0-3480-4f9c-b8877da98d9c} BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff8010d014df7 BUGCHECK_P3: ffff80014dfc6900 BUGCHECK_P4: 0 FILE_IN_CAB: 112423-11187-01.dmp DUMP_FILE_ATTRIBUTES: 0x1008 Kernel Generated Triage Dump CONTEXT: ffff80014dfc6900 -- (.cxr 0xffff80014dfc6900) rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000 rdx=ffffbb09dbd56180 rsi=ffffd287cdab8b80 rdi=ffffd288d146e7d0 rip=fffff8010d014df7 rsp=ffffbb09dbd56110 rbp=ffffbb09dbd56189 r8=ffffd287cdab8bc0 r9=ffffd288cd800000 r10=0000000000000004 r11=ffffd288cd85dff0 r12=ffffffffffffffff r13=ffffffffc000014b r14=0000000000000002 r15=0000000000000002 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246 nt!IopfCompleteRequest+0x577: fffff801`0d014df7 498710 xchg rdx,qword ptr [r8] ds:002b:ffffd287`cdab8bc0=???????????????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: chrome.exe STACK_TEXT: ffffbb09`dbd56110 fffff801`0d014867 : ffffd288`d146e7d0 00000000`00000002 ffffd288`c94528f0 00000000`00000000 : nt!IopfCompleteRequest+0x577 ffffbb09`dbd561f0 fffff801`1b48efe8 : ffff9182`b179c440 ffff9182`b179c440 ffffd288`00000010 ffffbb09`dbd56260 : nt!IofCompleteRequest+0x17 ffffbb09`dbd56220 fffff801`1b48ee57 : 00000000`00000000 00000000`00000000 ffffd288`baef10b0 ffffd288`d1448a48 : Npfs!NpCommonCleanup+0x158 ffffbb09`dbd562b0 fffff801`0d0ec015 : ffffd288`cf11ea10 fffff801`0f798029 ffffbb09`dbd57000 ffffbb09`dbd51000 : Npfs!NpFsdCleanup+0x27 ffffbb09`dbd562e0 fffff801`0f79a1db : ffffd288`b8010380 ffffd288`cf11ea10 ffffd288`b8010380 00000000`00000000 : nt!IofCallDriver+0x55 ffffbb09`dbd56320 fffff801`0f797e23 : ffffbb09`dbd563b0 00000000`00000000 00000000`00000000 ffffd288`ba531d40 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15b ffffbb09`dbd56390 fffff801`0d0ec015 : ffffd288`c94528f0 fffff801`0d0e9da8 00000000`00000000 ffff9182`ac0b1080 : FLTMGR!FltpDispatch+0xa3 ffffbb09`dbd563f0 fffff801`0d4f999f : ffffd288`c94528f0 ffffd288`baf2a620 ffffd288`cb4130c0 ffffd288`d1448930 : nt!IofCallDriver+0x55 ffffbb09`dbd56430 fffff801`0d4dd53e : ffffd288`b9178220 fffff801`00000000 ffffffff`00000000 00000000`00000001 : nt!IopCloseFile+0x18f ffffbb09`dbd564c0 fffff801`0d4dd388 : 00000000`ffff8004 00000000`00000001 00000000`00007ff5 fffff801`0d0e60aa : nt!ObpDecrementHandleCount+0x10a ffffbb09`dbd56570 fffff801`0d4dd218 : ffffd288`ca9cc080 fffff801`0d06ad61 ffffd288`cf731060 00000000`00000840 : nt!ObCloseHandleTableEntry+0xe4 ffffbb09`dbd56630 fffff801`0d48c91d : 00000000`00000000 00000000`00000001 ffffffff`ffffff01 ffffd288`cb4130c0 : nt!ExSweepHandleTable+0xd8 ffffbb09`dbd566e0 fffff801`0d48da65 : ffffffff`ffffffff ffffd288`cb4130c0 ffffffff`ffffffff fffff801`0d4be7a4 : nt!ObKillProcess+0x35 ffffbb09`dbd56710 fffff801`0d4dc6a2 : ffffd288`cb4130c0 ffff9182`b0ddf060 ffffbb09`dbd56939 00000000`00000000 : nt!PspRundownSingleProcess+0xb9 ffffbb09`dbd567a0 fffff801`0d5cdf88 : 00000000`00000000 00000000`00000001 ffffd288`ca9cc0f4 00000087`7f185000 : nt!PspExitThread+0x64e ffffbb09`dbd568a0 fffff801`0d10b9ad : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38 ffffbb09`dbd568e0 fffff801`0d21cb20 : 00000000`00000001 ffffbb09`dbd569a0 00000000`00000000 ffffd288`cb4130c0 : nt!KiDeliverApc+0x47d ffffbb09`dbd569a0 fffff801`0d22b78f : ffffd288`ca9cc080 00000000`00000011 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70 ffffbb09`dbd56ae0 00007ffd`cbaef3f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f 00000087`05fff4f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`cbaef3f4 SYMBOL_NAME: Npfs!NpCommonCleanup+158 MODULE_NAME: Npfs IMAGE_NAME: Npfs.SYS IMAGE_VERSION: 10.0.22621.2771 STACK_COMMAND: .cxr 0xffff80014dfc6900 ; kb BUCKET_ID_FUNC_OFFSET: 158 FAILURE_BUCKET_ID: AV_Npfs!NpCommonCleanup OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {636ae15b-e9e0-3480-4f9c-b8877da98d9c} Followup: MachineOwner --------- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2308.2002.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Usb4Kd.natvis' ************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : true AllowNugetExeUpdate : true AllowNugetMSCredentialProviderInstall : true AllowParallelInitializationOfLocalRepositories : true -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.016 seconds ************* Waiting for Debugger Extensions Gallery to Initialize ************** >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 36 Microsoft (R) Windows Debugger Version 10.0.25921.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [D:\Downloads\greg\112423-11531-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 22621 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Kernel base = 0xfffff804`6d600000 PsLoadedModuleList = 0xfffff804`6e2134a0 Debug session time: Fri Nov 24 12:32:21.651 2023 (UTC + 0:00) System Uptime: 0 days 2:16:42.304 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ ........................... Loading User Symbols Loading unloaded module list ................. For analysis of this file, run !analyze -v nt!IopfCompleteRequest+0x577: fffff804`6d814df7 498710 xchg rdx,qword ptr [r8] ds:002b:ffffa184`e1919c80=???????????????? 4: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e) This is a very common BugCheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff8046d814df7, The address that the exception occurred at Arg3: fffffb84d1c60a18, Exception Record Address Arg4: ffff8000215c6900, Context Record Address Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : AV.Fault Value: Write Key : Analysis.CPU.mSec Value: 6687 Key : Analysis.Elapsed.mSec Value: 65429 Key : Analysis.IO.Other.Mb Value: 6 Key : Analysis.IO.Read.Mb Value: 10 Key : Analysis.IO.Write.Mb Value: 21 Key : Analysis.Init.CPU.mSec Value: 1077 Key : Analysis.Init.Elapsed.mSec Value: 31437 Key : Analysis.Memory.CommitPeak.Mb Value: 105 Key : Bugcheck.Code.LegacyAPI Value: 0x1000007e Key : Dump.Attributes.AsUlong Value: 1008 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 Key : Failure.Bucket Value: AV_klwtp!unknown_function Key : Failure.Hash Value: {c2c3e109-24c7-92df-d028-f2419ec87f25} BUGCHECK_CODE: 7e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff8046d814df7 BUGCHECK_P3: fffffb84d1c60a18 BUGCHECK_P4: ffff8000215c6900 FILE_IN_CAB: 112423-11531-01.dmp DUMP_FILE_ATTRIBUTES: 0x1008 Kernel Generated Triage Dump EXCEPTION_RECORD: fffffb84d1c60a18 -- (.exr 0xfffffb84d1c60a18) ExceptionAddress: fffff8046d814df7 (nt!IopfCompleteRequest+0x0000000000000577) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000001 Parameter[1]: ffffa184e1919c80 Attempt to write to address ffffa184e1919c80 CONTEXT: ffff8000215c6900 -- (.cxr 0xffff8000215c6900) rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000 rdx=fffffb84d1c60cc0 rsi=ffffa184e1919c40 rdi=ffffa185eb2277b0 rip=fffff8046d814df7 rsp=fffffb84d1c60c50 rbp=fffffb84d1c60cc9 r8=ffffa184e1919c80 r9=fffffb84d1c60d08 r10=0000000000000004 r11=fffffb84d1c60d28 r12=ffffffffffffffff r13=0000000000000000 r14=0000000000000002 r15=0000000000000002 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246 nt!IopfCompleteRequest+0x577: fffff804`6d814df7 498710 xchg rdx,qword ptr [r8] ds:002b:ffffa184`e1919c80=???????????????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System WRITE_ADDRESS: fffff8046e31d470: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse ffffa184e1919c80 ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s. EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 0000000000000001 EXCEPTION_PARAMETER2: ffffa184e1919c80 EXCEPTION_STR: 0xc0000005 STACK_TEXT: fffffb84`d1c60c50 fffff804`6d814867 : ffffa185`eb2277b0 ffffa185`e8f24902 ffffa185`e4b58360 00000000`00000000 : nt!IopfCompleteRequest+0x577 fffffb84`d1c60d30 fffff804`7ff87562 : ffffa185`e241cb20 fffffb84`d1c60dc9 ffffa185`e241cbb8 fffff804`728b4c42 : nt!IofCompleteRequest+0x17 fffffb84`d1c60d60 ffffa185`e241cb20 : fffffb84`d1c60dc9 ffffa185`e241cbb8 fffff804`728b4c42 fffffb84`00000003 : klwtp+0x37562 fffffb84`d1c60d68 fffffb84`d1c60dc9 : ffffa185`e241cbb8 fffff804`728b4c42 fffffb84`00000003 fffffb84`d1c60d90 : 0xffffa185`e241cb20 fffffb84`d1c60d70 ffffa185`e241cbb8 : fffff804`728b4c42 fffffb84`00000003 fffffb84`d1c60d90 ffffa185`eb2277b0 : 0xfffffb84`d1c60dc9 fffffb84`d1c60d78 fffff804`728b4c42 : fffffb84`00000003 fffffb84`d1c60d90 ffffa185`eb2277b0 ffffa185`ea131030 : 0xffffa185`e241cbb8 fffffb84`d1c60d80 ffffa185`e3b42000 : 00000000`00000000 ffffa185`e241cbb8 00000000`00000002 00000000`00000000 : fwpkclnt!FwpsAllocateCloneNetBufferList0+0x62 fffffb84`d1c60dc0 00000000`00000000 : ffffa185`e241cbb8 00000000`00000002 00000000`00000000 fffffb84`d1c60e30 : 0xffffa185`e3b42000 SYMBOL_NAME: klwtp+37562 MODULE_NAME: klwtp IMAGE_NAME: klwtp.sys STACK_COMMAND: .cxr 0xffff8000215c6900 ; kb BUCKET_ID_FUNC_OFFSET: 37562 FAILURE_BUCKET_ID: AV_klwtp!unknown_function OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {c2c3e109-24c7-92df-d028-f2419ec87f25} Followup: MachineOwner --------- 4: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e) This is a very common BugCheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff8046d814df7, The address that the exception occurred at Arg3: fffffb84d1c60a18, Exception Record Address Arg4: ffff8000215c6900, Context Record Address Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : AV.Fault Value: Write Key : Analysis.CPU.mSec Value: 6405 Key : Analysis.Elapsed.mSec Value: 6433 Key : Analysis.IO.Other.Mb Value: 6 Key : Analysis.IO.Read.Mb Value: 10 Key : Analysis.IO.Write.Mb Value: 21 Key : Analysis.Init.CPU.mSec Value: 13827 Key : Analysis.Init.Elapsed.mSec Value: 103011 Key : Analysis.Memory.CommitPeak.Mb Value: 106 Key : Bugcheck.Code.LegacyAPI Value: 0x1000007e Key : Dump.Attributes.AsUlong Value: 1008 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 Key : Failure.Bucket Value: AV_klwtp!unknown_function Key : Failure.Hash Value: {c2c3e109-24c7-92df-d028-f2419ec87f25} BUGCHECK_CODE: 7e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff8046d814df7 BUGCHECK_P3: fffffb84d1c60a18 BUGCHECK_P4: ffff8000215c6900 FILE_IN_CAB: 112423-11531-01.dmp DUMP_FILE_ATTRIBUTES: 0x1008 Kernel Generated Triage Dump EXCEPTION_RECORD: fffffb84d1c60a18 -- (.exr 0xfffffb84d1c60a18) ExceptionAddress: fffff8046d814df7 (nt!IopfCompleteRequest+0x0000000000000577) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000001 Parameter[1]: ffffa184e1919c80 Attempt to write to address ffffa184e1919c80 CONTEXT: ffff8000215c6900 -- (.cxr 0xffff8000215c6900) rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000 rdx=fffffb84d1c60cc0 rsi=ffffa184e1919c40 rdi=ffffa185eb2277b0 rip=fffff8046d814df7 rsp=fffffb84d1c60c50 rbp=fffffb84d1c60cc9 r8=ffffa184e1919c80 r9=fffffb84d1c60d08 r10=0000000000000004 r11=fffffb84d1c60d28 r12=ffffffffffffffff r13=0000000000000000 r14=0000000000000002 r15=0000000000000002 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246 nt!IopfCompleteRequest+0x577: fffff804`6d814df7 498710 xchg rdx,qword ptr [r8] ds:002b:ffffa184`e1919c80=???????????????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System WRITE_ADDRESS: Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd ffffa184e1919c80 ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s. EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 0000000000000001 EXCEPTION_PARAMETER2: ffffa184e1919c80 EXCEPTION_STR: 0xc0000005 STACK_TEXT: fffffb84`d1c60c50 fffff804`6d814867 : ffffa185`eb2277b0 ffffa185`e8f24902 ffffa185`e4b58360 00000000`00000000 : nt!IopfCompleteRequest+0x577 fffffb84`d1c60d30 fffff804`7ff87562 : ffffa185`e241cb20 fffffb84`d1c60dc9 ffffa185`e241cbb8 fffff804`728b4c42 : nt!IofCompleteRequest+0x17 fffffb84`d1c60d60 ffffa185`e241cb20 : fffffb84`d1c60dc9 ffffa185`e241cbb8 fffff804`728b4c42 fffffb84`00000003 : klwtp+0x37562 fffffb84`d1c60d68 fffffb84`d1c60dc9 : ffffa185`e241cbb8 fffff804`728b4c42 fffffb84`00000003 fffffb84`d1c60d90 : 0xffffa185`e241cb20 fffffb84`d1c60d70 ffffa185`e241cbb8 : fffff804`728b4c42 fffffb84`00000003 fffffb84`d1c60d90 ffffa185`eb2277b0 : 0xfffffb84`d1c60dc9 fffffb84`d1c60d78 fffff804`728b4c42 : fffffb84`00000003 fffffb84`d1c60d90 ffffa185`eb2277b0 ffffa185`ea131030 : 0xffffa185`e241cbb8 fffffb84`d1c60d80 ffffa185`e3b42000 : 00000000`00000000 ffffa185`e241cbb8 00000000`00000002 00000000`00000000 : fwpkclnt!FwpsAllocateCloneNetBufferList0+0x62 fffffb84`d1c60dc0 00000000`00000000 : ffffa185`e241cbb8 00000000`00000002 00000000`00000000 fffffb84`d1c60e30 : 0xffffa185`e3b42000 SYMBOL_NAME: klwtp+37562 MODULE_NAME: klwtp IMAGE_NAME: klwtp.sys STACK_COMMAND: .cxr 0xffff8000215c6900 ; kb BUCKET_ID_FUNC_OFFSET: 37562 FAILURE_BUCKET_ID: AV_klwtp!unknown_function OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {c2c3e109-24c7-92df-d028-f2419ec87f25} Followup: MachineOwner ---------