************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : false AllowNugetExeUpdate : false AllowNugetMSCredentialProviderInstall : false AllowParallelInitializationOfLocalRepositories : true -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.141 seconds ************* Waiting for Debugger Extensions Gallery to Initialize ************** . >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.562 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 36 Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\MEMORY.DMP] Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available. ************* Path validation summary ************** Response Time (ms) Location Deferred SRV*c:\websymbols*https://msdl.microsoft.com/download/symbols Symbol search path is: SRV*c:\websymbols*https://msdl.microsoft.com/download/symbols Executable search path is: Windows 10 Kernel Version 22000 MP (12 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Edition build lab: 22000.1.amd64fre.co_release.210604-1628 Kernel base = 0xfffff805`27800000 PsLoadedModuleList = 0xfffff805`284297e0 Debug session time: Fri Aug 4 05:22:42.702 2023 (UTC + 9:00) System Uptime: 0 days 0:09:35.480 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ .................. Loading User Symbols PEB is paged out (Peb.Ldr = 00000000`00370018). Type ".hh dbgerr001" for details Loading unloaded module list ............. For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff805`27c1d100 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe507`f0986620=000000000000000a 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 000001f4336fc978, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80527c583c5, address which referenced memory Debugging Details: ------------------ *** WARNING: Check Image - Checksum mismatch - Dump: 0xe0c2, File: 0x10f50 - c:\websymbols\hal.dll\EE778D5D6000\hal.dll KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4077 Key : Analysis.Elapsed.mSec Value: 25181 Key : Analysis.IO.Other.Mb Value: 23 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 31 Key : Analysis.Init.CPU.mSec Value: 905 Key : Analysis.Init.Elapsed.mSec Value: 139393 Key : Analysis.Memory.CommitPeak.Mb Value: 104 Key : Bugcheck.Code.KiBugCheckData Value: 0xa Key : Bugcheck.Code.LegacyAPI Value: 0xa Key : Failure.Bucket Value: AV_nt!KiGetHeteroThreadQos Key : Failure.Hash Value: {049b59b0-d37c-55ed-7782-1410db5f2ba6} Key : Hypervisor.Enlightenments.Value Value: 0 Key : Hypervisor.Enlightenments.ValueHex Value: 0 Key : Hypervisor.Flags.AnyHypervisorPresent Value: 0 Key : Hypervisor.Flags.ApicEnlightened Value: 0 Key : Hypervisor.Flags.ApicVirtualizationAvailable Value: 1 Key : Hypervisor.Flags.AsyncMemoryHint Value: 0 Key : Hypervisor.Flags.CoreSchedulerRequested Value: 0 Key : Hypervisor.Flags.CpuManager Value: 0 Key : Hypervisor.Flags.DeprecateAutoEoi Value: 0 Key : Hypervisor.Flags.DynamicCpuDisabled Value: 0 Key : Hypervisor.Flags.Epf Value: 0 Key : Hypervisor.Flags.ExtendedProcessorMasks Value: 0 Key : Hypervisor.Flags.HardwareMbecAvailable Value: 1 Key : Hypervisor.Flags.MaxBankNumber Value: 0 Key : Hypervisor.Flags.MemoryZeroingControl Value: 0 Key : Hypervisor.Flags.NoExtendedRangeFlush Value: 0 Key : Hypervisor.Flags.NoNonArchCoreSharing Value: 0 Key : Hypervisor.Flags.Phase0InitDone Value: 0 Key : Hypervisor.Flags.PowerSchedulerQos Value: 0 Key : Hypervisor.Flags.RootScheduler Value: 0 Key : Hypervisor.Flags.SynicAvailable Value: 0 Key : Hypervisor.Flags.UseQpcBias Value: 0 Key : Hypervisor.Flags.Value Value: 16908288 Key : Hypervisor.Flags.ValueHex Value: 1020000 Key : Hypervisor.Flags.VpAssistPage Value: 0 Key : Hypervisor.Flags.VsmAvailable Value: 0 Key : Hypervisor.RootFlags.AccessStats Value: 0 Key : Hypervisor.RootFlags.CrashdumpEnlightened Value: 0 Key : Hypervisor.RootFlags.CreateVirtualProcessor Value: 0 Key : Hypervisor.RootFlags.DisableHyperthreading Value: 0 Key : Hypervisor.RootFlags.HostTimelineSync Value: 0 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled Value: 0 Key : Hypervisor.RootFlags.IsHyperV Value: 0 Key : Hypervisor.RootFlags.LivedumpEnlightened Value: 0 Key : Hypervisor.RootFlags.MapDeviceInterrupt Value: 0 Key : Hypervisor.RootFlags.MceEnlightened Value: 0 Key : Hypervisor.RootFlags.Nested Value: 0 Key : Hypervisor.RootFlags.StartLogicalProcessor Value: 0 Key : Hypervisor.RootFlags.Value Value: 0 Key : Hypervisor.RootFlags.ValueHex Value: 0 Key : SecureKernel.HalpHvciEnabled Value: 0 Key : WER.OS.Branch Value: co_release Key : WER.OS.Version Value: 10.0.22000.1 BUGCHECK_CODE: a BUGCHECK_P1: 1f4336fc978 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80527c583c5 FILE_IN_CAB: MEMORY.DMP READ_ADDRESS: 000001f4336fc978 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 PROCESS_NAME: BandaiNamcoLauncher.exe TRAP_FRAME: ffffe507f0986760 -- (.trap 0xffffe507f0986760) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=000001f4336fc778 rbx=0000000000000000 rcx=fffff8052388cdb8 rdx=0000000000000100 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80527c583c5 rsp=ffffe507f09868f0 rbp=0000000000000000 r8=ffffe507f0986958 r9=0000000000000fff r10=000000002388cfb0 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!KiGetHeteroThreadQos+0x51: fffff805`27c583c5 8b8800020000 mov ecx,dword ptr [rax+200h] ds:000001f4`336fc978=???????? Resetting default scope STACK_TEXT: ffffe507`f0986618 fffff805`27c32469 : 00000000`0000000a 000001f4`336fc978 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffe507`f0986620 fffff805`27c2dc4c : ffff14b3`caed8730 00000000`00000032 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 ffffe507`f0986760 fffff805`27c583c5 : 00000000`00000000 00000000`00000000 00000000`00000208 00000000`00000000 : nt!KiPageFault+0x44c ffffe507`f09868f0 fffff805`27c582c1 : fffff805`2388cdb8 00000000`1a14f6e0 00000000`00000000 ffffe60a`b3544080 : nt!KiGetHeteroThreadQos+0x51 ffffe507`f0986920 fffff805`27c41460 : ffffc201`231e0101 fffff805`00000000 00000000`00000000 fffff805`2826ea8c : nt!KiConvertDynamicHeteroPolicy+0x1b ffffe507`f0986950 fffff805`27a274c8 : ffffe507`00000008 ffffe60a`ffffffff ffffe507`00000000 fffff805`2388ce90 : nt!KiSelectReadyThread+0x21cfc0 ffffe507`f09869e0 fffff805`27a28ba8 : 00000000`00000000 ffffc201`231e0180 00000000`00000001 00000000`5f8fea90 : nt!KiSelectReadyThreadEx+0x28 ffffe507`f0986a20 fffff805`27e92a2f : 00000000`00000000 00000000`002cc000 00000000`043ffda0 00000000`00000000 : nt!KeDelayExecutionThread+0x148 ffffe507`f0986ab0 fffff805`27c31b88 : 00000000`045863f0 00000000`00000000 00000000`00000000 ffffe60a`00000000 : nt!NtDelayExecution+0x5f ffffe507`f0986ae0 00000000`77241cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`043feaa8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77241cf3 SYMBOL_NAME: nt!KiGetHeteroThreadQos+51 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 51 FAILURE_BUCKET_ID: AV_nt!KiGetHeteroThreadQos OS_VERSION: 10.0.22000.1 BUILDLAB_STR: co_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {049b59b0-d37c-55ed-7782-1410db5f2ba6} Followup: MachineOwner ---------