************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\071823-7437-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff801`6d800000 PsLoadedModuleList = 0xfffff801`6e4134b0
Debug session time: Tue Jul 18 03:52:49.166 2023 (UTC + 8:00)
System Uptime: 0 days 6:39:02.840
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
...................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`6dc2c280 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff801`71b14b50=000000000000000a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000100000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8016dae446d, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2171
Key : Analysis.Elapsed.mSec
Value: 18752
Key : Analysis.IO.Other.Mb
Value: 11
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 37
Key : Analysis.Init.CPU.mSec
Value: 374
Key : Analysis.Init.Elapsed.mSec
Value: 113379
Key : Analysis.Memory.CommitPeak.Mb
Value: 161
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_nt!KeAcquireSpinLockRaiseToDpc
Key : Failure.Hash
Value: {beabd92d-48bd-948c-305d-56eaee7a5e78}
BUGCHECK_CODE: a
BUGCHECK_P1: 100000020
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8016dae446d
FILE_IN_CAB: 071823-7437-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
WRITE_ADDRESS: fffff8016e51c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000100000020
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8016e54c6c0 -- (.trap 0xfffff8016e54c6c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=0002000200000000 rbp=fffff8016e54c6c0
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na pe nc
00000000`00000000 ?? ???
Resetting default scope
IP_IN_FREE_BLOCK: 0
STACK_TEXT:
fffff801`71b14b48 fffff801`6dc418a9 : 00000000`0000000a 00000001`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff801`71b14b50 fffff801`6dc3cf34 : 00000037`bf0ba373 00000000`00000001 fffff801`696c8180 00000000`00027100 : nt!KiBugCheckDispatch+0x69
fffff801`71b14c90 fffff801`6dae446d : 00004e43`cedf42a1 fffff801`71b14e48 ffffaa08`00400a02 00000000`000004a4 : nt!KiPageFault+0x474
fffff801`71b14e20 fffff801`703f2c11 : ffffaa08`ec8cfca0 ffffaa08`ec7e0600 00000000`00000010 ffffaa08`ec8cf000 : nt!KeAcquireSpinLockRaiseToDpc+0x2d
fffff801`71b14e50 fffff801`703f00d2 : 00000000`00000000 ffffaa08`f49f0000 ffff9980`4b97d970 ffff9980`4b9b9ab0 : Wdf01000!FxWakeInterruptMachine::ProcessEvent+0x31 [minkernel\wdf\framework\shared\irphandlers\pnp\wakeinterruptstatemachine.cpp @ 153]
fffff801`71b14ed0 fffff801`7037c56e : 00000000`0000000c ffff923c`b175a5e6 00000000`00000000 ffffaa08`ec361040 : Wdf01000!FxInterrupt::WakeInterruptIsr+0x1a [minkernel\wdf\framework\shared\irphandlers\pnp\interruptobject.cpp @ 313]
fffff801`71b14f10 fffff801`6db1764d : ffff9980`4b9b9a00 fffff801`6db4429c fffff801`696c8180 ffff9980`4b9b9a00 : Wdf01000!FxInterrupt::_InterruptThunk+0x346e [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 346]
fffff801`71b14f50 fffff801`6dc2e15f : fffff801`71b054b0 ffff9980`4b9b9a00 ffffaa08`fb5f8040 fffff801`6dc35670 : nt!KiCallInterruptServiceRoutine+0x16d
fffff801`71b14f90 fffff801`6dc2e427 : 00000037`bf5174f9 ffff9980`00000000 00000037`bf0ba9d7 00000000`00000000 : nt!KiInterruptSubDispatch+0x11f
fffff801`71b05430 fffff801`6dc3103a : 00000000`00000000 fffff801`69353930 fffff801`6e54c6c0 ffffaa08`f958b480 : nt!KiInterruptDispatch+0x37
fffff801`71b055c0 00000000`00000000 : fffff801`71b06000 fffff801`71aff000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
SYMBOL_NAME: nt!KeAcquireSpinLockRaiseToDpc+2d
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.1848
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 2d
FAILURE_BUCKET_ID: AV_nt!KeAcquireSpinLockRaiseToDpc
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {beabd92d-48bd-948c-305d-56eaee7a5e78}
Followup: MachineOwner
---------
Please contact me if there is any progress, thank you!!!