Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If kernel debugger is available get stack backtrace.
- Arguments:
- Arg1: fffffffffffb6c20, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
- Arg4: fffffffffffb6c20, address which referenced memory
- Debugging Details:
- ------------------
- READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eaf100
- fffffffffffb6c20
- CURRENT_IRQL: 2
- FAULTING_IP:
- +629b952f0447dd70
- ffffffff`fffb6c20 ?? ???
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
- BUGCHECK_STR: 0xD1
- PROCESS_NAME: System
- TRAP_FRAME: fffff80000b9c290 -- (.trap 0xfffff80000b9c290)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000003 rbx=0000000000000000 rcx=fffffa800af60100
- rdx=0000000000000102 rsi=0000000000000000 rdi=0000000000000000
- rip=fffffffffffb6c20 rsp=fffff80000b9c428 rbp=fffffa800af60128
- r8=fffff80002df5001 r9=0000000000000003 r10=0000000000000057
- r11=fffffa800a978360 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na pe nc
- ffffffff`fffb6c20 ?? ???
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff80002c77169 to fffff80002c77bc0
- FAILED_INSTRUCTION_ADDRESS:
- +629b952f0447dd70
- ffffffff`fffb6c20 ?? ???
- STACK_TEXT:
- fffff800`00b9c148 fffff800`02c77169 : 00000000`0000000a ffffffff`fffb6c20 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
- fffff800`00b9c150 fffff800`02c75de0 : fffff800`00b9cb00 fffff880`04d67f68 fffffa80`0a47e400 fffffa80`0af60128 : nt!KiBugCheckDispatch+0x69
- fffff800`00b9c290 ffffffff`fffb6c20 : fffff800`02c8285c 00000000`00000000 fffffa80`00000000 00000002`40581288 : nt!KiPageFault+0x260
- fffff800`00b9c428 fffff800`02c8285c : 00000000`00000000 fffffa80`00000000 00000002`40581288 00000000`00000001 : 0xffffffff`fffb6c20
- fffff800`00b9c430 fffff800`02c8269d : fffffa80`0af60120 00000000`00006157 00000000`00000000 00000000`00000102 : nt!KiProcessTimerDpcTable+0x6c
- fffff800`00b9c4a0 fffff800`02c825de : 00000000`e7b597a8 fffff800`00b9cb18 00000000`00006157 fffff800`02df5d68 : nt!KiProcessExpiredTimerList+0x6d
- fffff800`00b9caf0 fffff800`02c823c7 : 00000000`4f5630c2 00000000`00006157 00000000`4f563086 00000000`00000057 : nt!KiTimerExpiration+0x1be
- fffff800`00b9cb90 fffff800`02c6f8ca : fffff800`02df2e80 fffff800`02e00cc0 00000000`00000001 fffff880`00000000 : nt!KiRetireDpcList+0x277
- fffff800`00b9cc40 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cc00 00000000`00000000 : nt!KiIdleLoop+0x5a
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- nt!KiPageFault+260
- fffff800`02c75de0 440f20c0 mov rax,cr8
- SYMBOL_STACK_INDEX: 2
- SYMBOL_NAME: nt!KiPageFault+260
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 521ea035
- FAILURE_BUCKET_ID: X64_0xD1_CODE_AV_BAD_IP_nt!KiPageFault+260
- BUCKET_ID: X64_0xD1_CODE_AV_BAD_IP_nt!KiPageFault+260
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement