******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000100000002, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80230cc625e, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-CS068K2 Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 1 Key : Analysis.Memory.CommitPeak.Mb Value: 85 Key : Analysis.System Value: CreateObject TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b DUMP_FILE_ATTRIBUTES: 0x808 Kernel Generated Triage Dump BUGCHECK_CODE: a BUGCHECK_P1: 100000002 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80230cc625e READ_ADDRESS: fffff8023171c468: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff802316099b8: Unable to get Flags value from nt!KdVersionBlock fffff802316099b8: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse 0000000100000002 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: CrossEXService IRP_ADDRESS: ffffd2875f3657c0 DEVICE_OBJECT: ffffd28750780ca0 TRAP_FRAME: ffff900029d9b0f0 -- (.trap 0xffff900029d9b0f0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000100000002 rbx=0000000000000000 rcx=ffffd2875f365a90 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80230cc625e rsp=ffff900029d9b280 rbp=0000000000000000 r8=0000000000000000 r9=0000000000000000 r10=00000000ffffffff r11=000000000000ab80 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz ac po cy nt!KeSetEvent+0x8e: fffff802`30cc625e 488b08 mov rcx,qword ptr [rax] ds:00000001`00000002=???????????????? Resetting default scope STACK_TEXT: ffff9000`29d9afa8 fffff802`30e3eaa9 : 00000000`0000000a 00000001`00000002 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffff9000`29d9afb0 fffff802`30e3a134 : ffffa580`00000000 ffffa580`06851180 00000001`00000000 fffff802`31749ac0 : nt!KiBugCheckDispatch+0x69 ffff9000`29d9b0f0 fffff802`30cc625e : 00000000`00000000 ffffd287`5f365a90 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x474 ffff9000`29d9b280 fffff802`30cd447b : ffffd287`00000000 ffff9000`29d9b439 ffffd287`649a5300 00000000`00000000 : nt!KeSetEvent+0x8e ffff9000`29d9b310 fffff802`30c1b236 : ffffd287`5f365838 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopCompleteRequest+0x22b ffff9000`29d9b3e0 fffff802`30ccbaea : ffffa580`06851100 00000000`00000000 00000000`00000004 ffffa580`00000000 : nt!KiDeliverApc+0x186 ffff9000`29d9b4a0 fffff802`30cccae7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwapThread+0xf2a ffff9000`29d9b5f0 fffff802`30ccf106 : ffffd287`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x137 ffff9000`29d9b6a0 fffff802`310d915c : ffffd287`664130c0 ffffd287`66f513e0 00000000`00000000 00000000`00000001 : nt!KeWaitForSingleObject+0x256 ffff9000`29d9ba40 fffff802`310d907b : ffffd287`649a5300 00000000`00000000 00000000`00000000 00000000`00000028 : nt!ObWaitForSingleObject+0xcc ffff9000`29d9baa0 fffff802`30e3e1e8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWaitForSingleObject+0x6b ffff9000`29d9bae0 00000000`77191cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`036ff078 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77191cf3 SYMBOL_NAME: nt!KeSetEvent+8e MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.22621.1413 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 8e FAILURE_BUCKET_ID: AV_nt!KeSetEvent OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {c42bf4ac-5ef0-4bd6-418f-0d54b7c20876} Followup: MachineOwner ---------