Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\kcool\Desktop\MEMORY.DMP] Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available. Primary dump contents written successfully ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 22621 MP (24 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Edition build lab: 22621.1.amd64fre.ni_release.220506-1250 Machine Name: Kernel base = 0xfffff806`1d600000 PsLoadedModuleList = 0xfffff806`1e2133d0 Debug session time: Sat Oct 22 03:09:27.674 2022 (UTC + 3:00) System Uptime: 0 days 0:01:27.341 Loading Kernel Symbols ............................................................... ................................................................ .................................................. Loading User Symbols PEB is paged out (Peb.Ldr = 0000004c`55712018). Type ".hh dbgerr001" for details Loading unloaded module list ......... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff806`1da280f0 48894c2408 mov qword ptr [rsp+8],rcx ss:ffff838b`a79a72d0=000000000000000a 16: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000004, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8061d8bae98, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 436 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 929 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 77 Key : Analysis.Init.Elapsed.mSec Value: 2470 Key : Analysis.Memory.CommitPeak.Mb Value: 121 Key : Bugcheck.Code.DumpHeader Value: 0xa Key : Bugcheck.Code.KiBugCheckData Value: 0xa Key : Bugcheck.Code.Register Value: 0xa Key : Dump.Attributes.AsUlong Value: 1800 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 100 Key : WER.OS.Branch Value: ni_release Key : WER.OS.Timestamp Value: 2022-05-06T12:50:00Z Key : WER.OS.Version Value: 10.0.22621.1 FILE_IN_CAB: MEMORY.DMP TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b DUMP_FILE_ATTRIBUTES: 0x1800 BUGCHECK_CODE: a BUGCHECK_P1: 4 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff8061d8bae98 WRITE_ADDRESS: 0000000000000004 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 PROCESS_NAME: dwm.exe DPC_STACK_BASE: FFFF838BA79A7FB0 TRAP_FRAME: ffff838ba79a7410 -- (.trap 0xffff838ba79a7410) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffffe281bdbc0180 rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8061d8bae98 rsp=ffff838ba79a75a0 rbp=ffff838ba79a76a0 r8=0000000000000000 r9=ffff838ba79a7750 r10=0000000000000000 r11=0000000000000002 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!KiEnterLongDpcProcessing+0x498: fffff806`1d8bae98 4d8bcc mov r9,r12 Resetting default scope STACK_TEXT: ffff838b`a79a72c8 fffff806`1da3b0a9 : 00000000`0000000a 00000000`00000004 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx ffff838b`a79a72d0 fffff806`1da36fe8 : ffffd286`bb4c5000 fffff806`4e1ce6e3 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 ffff838b`a79a7410 fffff806`1d8bae98 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x468 ffff838b`a79a75a0 fffff806`1d8b9526 : 00000000`00000000 ffffd286`afed5000 00000000`00000000 ffffe281`00000002 : nt!KiEnterLongDpcProcessing+0x498 ffff838b`a79a77d0 fffff806`1d8b90c4 : 00000000`000001b7 ffff838b`a79a7e20 ffffd286`bbd4e080 00000000`00000000 : nt!KiExecuteAllDpcs+0x1b6 ffff838b`a79a7d20 fffff806`1da2fd85 : 00000000`00000000 00000000`00000000 ffffd286`bbd4e080 ffffc201`9704fd10 : nt!KiRetireDpcList+0xfe4 ffff838b`a79a7fb0 fffff806`1da2fd2f : ffff838b`a93a5be9 fffff806`1d8bb7a9 ffff838b`a93a5be9 ffffc201`96334000 : nt!KxSwapStacksAndRetireDpcList+0x5 ffff838b`a93a5b50 fffff806`1d8bb7a9 : ffff838b`a93a5be9 ffffc201`96334000 ffffe281`bdbc0180 ffffd286`af5d0200 : nt!KiPlatformSwapStacksAndCallReturn ffff838b`a93a5b60 fffff806`1da2f65b : ffffd286`00000000 ffffd286`00000000 00000000`00000000 ffffd286`bbd4e7e0 : nt!KiDispatchInterrupt+0xd9 ffff838b`a93a5c50 fffff806`1da29de1 : 00000000`00006d39 fffff806`1d8765c9 ffffd286`bbd4e7f1 fffff806`1e2fc050 : nt!KiDpcInterruptBypass+0x1b ffff838b`a93a5c80 fffff806`1d876046 : 00000000`00000500 ffff838b`a93a5fe1 00000000`00000056 ffffc201`9704f800 : nt!KiInterruptDispatch+0xb1 ffff838b`a93a5e10 fffff806`1d875187 : 00010000`00000000 ffffc201`00000000 00000005`00000005 ffffc201`00000051 : nt!RtlpHpVsChunkSplit+0xd26 ffff838b`a93a5ec0 fffff806`1d8d2062 : 00000000`00000051 ffff838b`00000500 00000000`00000052 ffff838b`00000060 : nt!RtlpHpVsContextAllocateInternal+0x227 ffff838b`a93a5f30 fffff806`1d8d191f : 00000000`00000002 00000000`484c764e 00000000`484c764e 00000000`00000000 : nt!ExAllocateHeapPool+0x712 ffff838b`a93a6040 fffff806`1e09a68d : 00000000`00000100 00000000`00000001 00000000`00000401 00000000`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f ffff838b`a93a6090 fffff806`4eee93f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExAllocatePool2+0xdd ffff838b`a93a6140 fffff806`4eea5c3a : 00000000`000004c0 ffffd286`ba143000 00000000`00000000 ffffd286`bae072b8 : nvlddmkm+0x8e93f4 ffff838b`a93a6170 fffff806`4eed33c8 : 00000000`00000000 00000000`000004c0 00000000`00000000 ffffc201`9603dd60 : nvlddmkm+0x8a5c3a ffff838b`a93a61b0 fffff806`4e605bbc : 00000000`00000000 fffff806`4ee6881c 00000000`00000003 ffffd286`bb16efd0 : nvlddmkm+0x8d33c8 ffff838b`a93a61f0 fffff806`4f2c15d3 : ffffe281`be97e000 ffff838b`a93a6330 00000000`00000000 00000000`00000000 : nvlddmkm+0x5bbc ffff838b`a93a6230 fffff806`4f2e461c : fffff806`4ef1c3c0 00000000`00000000 fffff806`4ef29268 00000000`00000000 : nvlddmkm+0xcc15d3 ffff838b`a93a63d0 fffff806`4f2a5637 : 00000000`00000000 ffffd286`bb166000 ffffd286`bb166000 00000000`00000000 : nvlddmkm+0xce461c ffff838b`a93a6470 fffff806`4f2a7117 : 00000000`00000000 ffffd286`bb166000 ffff838b`a93a6579 00000000`00000000 : nvlddmkm+0xca5637 ffff838b`a93a64a0 fffff806`4f4964fd : ffffd286`bb144001 ffff838b`a93a6601 ffff838b`a93a6800 ffffd286`bb144000 : nvlddmkm+0xca7117 ffff838b`a93a65e0 fffff806`38369965 : ffffd286`bb498010 ffffd286`bbcd1690 fffff806`4f496433 ffffd286`b9fc26e0 : nvlddmkm+0xe964fd ffff838b`a93a66b0 fffff806`38528b81 : 00000000`00000000 ffff838b`a93a6890 00000000`00000000 ffffd286`bb5d9008 : dxgkrnl!ADAPTER_DISPLAY::DdiSetPointerPosition+0xcd ffff838b`a93a6790 fffff806`38527381 : 00000000`0000bb0c ffff838b`a93a69b0 00000000`00000000 ffffd286`bb5d9008 : dxgkrnl!SetPointerPositionForDisplaySource+0x92d ffff838b`a93a6940 fffff806`38527058 : 00000000`00000000 ffffd286`bb4c0001 ffffd286`bb4c0000 ffff838b`a93a6a40 : dxgkrnl!DxgkSetPointerPosition+0x311 ffff838b`a93a69e0 ffff858c`c3b32e39 : ffffc201`91c0d480 00000000`0000068b ffffd286`b4817540 fffff806`4e0310ed : dxgkrnl!DxgkCddSetPointerPosition+0x48 ffff838b`a93a6a20 ffff858c`c3b32dc4 : 00000000`0000068b fffff806`4e031269 00000000`00015520 ffffc201`91a65000 : cdd!MovePointerInternal+0x61 ffff838b`a93a6a70 ffff858c`c37e9b95 : 00000000`0000068b ffff858c`c37e9a57 00000000`00000002 ffff838b`a93a6b30 : cdd!DrvMovePointerEx+0x14 ffff838b`a93a6aa0 ffff858c`c37e9732 : 00000000`00000000 ffff838b`a93a6b30 ffffc201`92415310 00000000`00000000 : win32kfull!vMovePointer+0x71 ffff838b`a93a6ae0 ffff858c`c37df842 : 00000000`00000000 fffff806`0000068b 00000000`00000351 00000000`00000000 : win32kfull!GreMovePointer+0x152 ffff838b`a93a6b70 ffff858c`c37df092 : ffff858c`c3ab4570 00000000`00000000 ffff838b`a93a6c81 00000000`00000001 : win32kfull!CursorApiRouter::MovePointer+0x8e ffff838b`a93a6bc0 ffff858c`c37de727 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32kfull!xxxMoveEventAbsolute+0x43e ffff838b`a93a6cd0 ffff858c`c367b1c8 : 00000000`00000000 ffff838b`a93a6ea8 ffff838b`a93a7418 00000000`00000000 : win32kfull!EditionCommitMousePosAndMove+0x97 ffff838b`a93a6d40 ffff858c`c3645985 : 00000000`00000001 00000000`00000000 00000000`00000001 ffffc201`9179d610 : win32kbase!EditionCommitMousePosAndMove+0x84 ffff838b`a93a6db0 ffff858c`c34f79ba : 00000000`00000001 ffff838b`a93a6eb9 00000000`00000000 00000000`00000000 : win32kbase!ApiSetEditionCommitMousePosAndMove+0x125 ffff838b`a93a6e40 ffff858c`c3526817 : 00000350`0000068b ffff838b`a93a7020 ffff838b`a93a7400 00000000`00000000 : win32kbase!CMouseProcessor::CommitMousePosAndMoveCursor+0x17a ffff838b`a93a6f20 ffff858c`c34f87bf : 00000351`0000068b 00000350`0000068b 00000000`00000000 00000000`00000001 : win32kbase!CMouseProcessor::ProcessMouseInputData+0xbacd7 ffff838b`a93a7280 ffff858c`c34f6caa : ffffc201`91a8f800 ffff858c`c34f6d28 ffffc201`91a8fde0 ffffc201`91a8f8a0 : win32kbase!CMouseProcessor::ProcessInput+0x61b ffff838b`a93a74b0 ffff858c`c34f6ee3 : ffffc201`91a8f8a0 00000000`34127276 ffffc201`91a8fde0 ffffd286`bbc6c0b8 : win32kbase!CMouseSensor::FlushMouseReports+0x42 ffff838b`a93a74f0 ffff858c`c34f6e14 : ffffc201`91a8f8f0 00000000`00000018 ffffc201`91a8f800 ffffc201`91a8f8a0 : win32kbase!CMouseSensor::ProcessInputWithRateLimitingIfEnabled+0xb3 ffff838b`a93a7540 ffff858c`c34038a0 : 00000000`00000000 ffff838b`a93a7680 ffffc201`91a8f801 00000000`00000000 : win32kbase!CMouseSensor::ProcessInput+0x54 ffff838b`a93a7580 ffff858c`c34792e2 : 00000000`00000002 00000000`00000002 ffffc201`91a8f8a0 00000000`00000002 : win32kbase!CBaseInput::OnReadNotification+0xf0 ffff838b`a93a76c0 ffff858c`c34791e2 : 00000000`00000001 00000000`00000001 ffffc201`923fb010 00000000`00000000 : win32kbase!CBaseInput::OnDispatcherObjectSignaled+0xf2 ffff838b`a93a77f0 ffff858c`c347a1ae : 00000000`00000001 00000000`00000001 ffffc201`923fb010 ffffc201`923fb010 : win32kbase!CBaseInput::_OnDispatcherObjectSignaled+0x12 ffff838b`a93a7820 ffff858c`c347a115 : 00000000`00000000 00000000`00000000 00000000`00000000 ffff858c`c34eacaf : win32kbase!IOCPDispatcher::HandleSensorDispatcherSignal+0x76 ffff838b`a93a7880 ffff858c`c3479eb8 : 00000000`00000001 00000000`00000001 00000000`00000000 1d3c98ac`d9cb5074 : win32kbase!IOCPDispatcher::Dispatch+0x15 ffff838b`a93a78e0 ffff858c`c34d2211 : 00000000`00000000 00000153`08c71250 00000000`00000020 00000153`08c71250 : win32kbase!UserKSTWait+0x130 ffff838b`a93a79c0 ffff858c`c4180a52 : 00000000`00000010 00000000`00050246 ffffd286`bbd4e080 00000000`00000018 : win32kbase!NtKSTWait+0x21 ffff838b`a93a79f0 fffff806`1da3aa65 : ffffd286`0000032f 00000000`000002fc 00000000`00000300 00000000`00000000 : win32k!NtKSTWait+0x16 ffff838b`a93a7a20 00007ffb`50717ab4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 0000004c`55b7f968 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`50717ab4 SYMBOL_NAME: nt!KiEnterLongDpcProcessing+498 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 498 FAILURE_BUCKET_ID: AV_nt!KiEnterLongDpcProcessing OS_VERSION: 10.0.22621.1 BUILDLAB_STR: ni_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {b31ef152-ac1e-b3c0-1296-807bb7d71685} Followup: MachineOwner