Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If kernel debugger is available get stack backtrace.
- Arguments:
- Arg1: 000000001bd11158, memory referenced
- Arg2: 000000000000000a, IRQL
- Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
- Arg4: fffff8034a47029f, address which referenced memory
- Debugging Details:
- ------------------
- TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
- READ_ADDRESS: unable to get nt!MmSpecialPoolStart
- unable to get nt!MmSpecialPoolEnd
- unable to get nt!MmPagedPoolEnd
- unable to get nt!MmNonPagedPoolStart
- unable to get nt!MmSizeOfNonPagedPoolInBytes
- 000000001bd11158
- CURRENT_IRQL: a
- FAULTING_IP:
- atikmdag+173029f
- fffff803`4a47029f 83780800 cmp dword ptr [rax+8],0
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- BUGCHECK_STR: AV
- PROCESS_NAME: System
- TRAP_FRAME: fffff80343052680 -- (.trap 0xfffff80343052680)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=000000001bd11150 rbx=0000000000000000 rcx=ffff87011bd11010
- rdx=000000001bd11150 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8034a47029f rsp=fffff80343052818 rbp=fffff80343052b60
- r8=ffff87011bd11138 r9=ffff87011bce1000 r10=0000000000000001
- r11=ffff87011bd11058 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz ac po nc
- atikmdag+0x173029f:
- fffff803`4a47029f 83780800 cmp dword ptr [rax+8],0 ds:00000000`1bd11158=????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff8034117a8a9 to fffff8034116f560
- STACK_TEXT:
- fffff803`43052538 fffff803`4117a8a9 : 00000000`0000000a 00000000`1bd11158 00000000`0000000a 00000000`00000000 : nt!KeBugCheckEx
- fffff803`43052540 fffff803`41178e7d : ffff8701`1bce10b4 ffff8701`1bd11010 ffff8701`1bd110e0 ffff8701`1bce10b4 : nt!KiBugCheckDispatch+0x69
- fffff803`43052680 fffff803`4a47029f : fffff803`4a470acf ffff8701`1bd11010 00000000`1bd11150 ffff8701`1bce10b4 : nt!KiPageFault+0x23d
- fffff803`43052818 fffff803`4a470acf : ffff8701`1bd11010 00000000`1bd11150 ffff8701`1bce10b4 00000000`00000000 : atikmdag+0x173029f
- fffff803`43052820 ffff8701`1bd11010 : 00000000`1bd11150 ffff8701`1bce10b4 00000000`00000000 00000400`00000001 : atikmdag+0x1730acf
- fffff803`43052828 00000000`1bd11150 : ffff8701`1bce10b4 00000000`00000000 00000400`00000001 ffff8701`1bce1364 : 0xffff8701`1bd11010
- fffff803`43052830 ffff8701`1bce10b4 : 00000000`00000000 00000400`00000001 ffff8701`1bce1364 00000000`00000000 : 0x1bd11150
- fffff803`43052838 00000000`00000000 : 00000400`00000001 ffff8701`1bce1364 00000000`00000000 fffff803`4a46b40b : 0xffff8701`1bce10b4
- STACK_COMMAND: kb
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
- BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
- Followup: memory_corruption
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement