Hello I'm running windows 11 pro on an Acer Nitro an515-55 with RTX 3050Ti. My OS is fully updated. Today I just bought a new Joystick USB Radioshack Invader. I was playing on Dolphin and after 1 hour I got a BSOD. After checking the DMP file I got this:
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff87ffef6bef78, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8013d92a9e3, address which referenced memory
Debugging Details:
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3014
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 6222
Key : Analysis.Init.CPU.mSec
Value: 1406
Key : Analysis.Init.Elapsed.mSec
Value: 54585
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
FILE_IN_CAB: MEMORY.DMP
DUMP_FILE_ATTRIBUTES: 0x1800
BUGCHECK_CODE: a
BUGCHECK_P1: ffff87ffef6bef78
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8013d92a9e3
READ_ADDRESS: ffff87ffef6bef78
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffffd091c677480 -- (.trap 0xfffffd091c677480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff878000000000 rbx=0000000000000000 rcx=ffffe88000000028
rdx=fffffd091c6779e0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8013d92a9e3 rsp=fffffd091c677610 rbp=fffffd091c677800
r8=0000007ffffffff8 r9=000000ffffffffff r10=ffffe88000000000
r11=ffffe88000000018 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiResolveProtoPteFault+0xe3:
fffff8013d92a9e3 488b07 mov rax,qword ptr [rdi] ds:00000000
00000000=????????????????
Resetting default scope
STACK_TEXT:
fffffd091c677338 fffff801
3da295a9 : 000000000000000a ffff87ff
ef6bef78 0000000000000002 00000000
00000000 : nt!KeBugCheckEx
fffffd091c677340 fffff801
3da25700 : 0000000000000000 00000000
00000000 ffffc78d77652060 ffffc78d
77651d60 : nt!KiBugCheckDispatch+0x69
fffffd091c677480 fffff801
3d92a9e3 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiPageFault+0x440
fffffd091c677610 fffff801
3d92a213 : fffffd091c677760 00000000
00000000 fffffd091c677740 ffff87c3
dffe1a70 : nt!MiResolveProtoPteFault+0xe3
fffffd091c677700 fffff801
3d928812 : 0000000000000000 00000000
00000001 00000000c0000016 00000000
0000001e : nt!MiDispatchFault+0x1b3
fffffd091c677840 fffff801
3da255f5 : 0000028a8d84cce0 00000000
00000000 0000000000000001 ffffffff
94b62e00 : nt!MmAccessFault+0x152
fffffd091c6779e0 00007ff8
69de42a4 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiPageFault+0x335
0000009c5e97e548 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : 0x00007ff8`69de42a4
SYMBOL_NAME: nt!MiResolveProtoPteFault+e3
MODULE_NAME: nt
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: e3
FAILURE_BUCKET_ID: AV_nt!MiResolveProtoPteFault
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2f2238e9-4751-e3c3-543c-b0cdf930b219}
Followup: MachineOwner