IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a005a6f2ac, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003f3f7cb, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for netr28x.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.18738.amd64fre.win7sp1_gdr.150128-1513
SYSTEM_MANUFACTURER: ASUSTeK COMPUTER INC.
SYSTEM_PRODUCT_NAME: X55C
SYSTEM_SKU: ASUS-NotebookSKU
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: X55C.409
BIOS_DATE: 01/09/2013
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: X55C
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: fffff8a005a6f2ac
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80003f3f7cb
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ef8100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80003ef82e0
GetUlongPtrFromAddress: unable to read from fffff80003ef8490
GetPointerFromAddress: unable to read from fffff80003ef80b8
fffff8a005a6f2ac Paged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!CmpAddValueToList+5b
fffff800`03f3f7cb 894504 mov dword ptr [rbp+4],eax
CPU_COUNT: 4
CPU_MHZ: 893
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 2a
CPU_STEPPING: 7
CPU_MICROCODE: 6,2a,7,0 (F,M,S,R) SIG: 28'00000000 (cache) 28'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-JC78BRD
ANALYSIS_SESSION_TIME: 06-06-2020 21:02:11.0700
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: fffff80000b9ba20 -- (.trap 0xfffff80000b9ba20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000001922e80 rbx=0000000000000000 rcx=fffff8a000023010
rdx=0000000001922e80 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003f3f7cb rsp=fffff80000b9bbb0 rbp=fffff8a005a6f2a8
r8=fffff8a000063440 r9=0000000000000001 r10=00000000000000ff
r11=fffff80000b9bbc0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!CmpAddValueToList+0x5b:
fffff800`03f3f7cb 894504 mov dword ptr [rbp+4],eax ss:0018:fffff8a0`05a6f2ac=01922e80
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003cbe469 to fffff80003cbeec0
STACK_TEXT:
fffff800`00b9b8d8 fffff800`03cbe469 : 00000000`0000000a fffff8a0`05a6f2ac 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9b8e0 fffff800`03cbd0e0 : fffff800`015e3000 fffff800`00000005 fffff800`00000030 00000000`0000004b : nt!KiBugCheckDispatch+0x69
fffff800`00b9ba20 fffff800`03f3f7cb : 00000000`0000004b fffff8a0`05a6f2a8 fffff8a0`00023010 00000000`0000004a : nt!KiPageFault+0x260
fffff800`00b9bbb0 fffff800`03f3f618 : fffff8a0`00023010 00000000`00000000 fffff8a0`05a6f2a8 fffff800`00b9bdc8 : nt!CmpAddValueToList+0x5b
fffff800`00b9bbf0 fffff800`03f753ef : 01d63c25`91093a75 fffff800`00b9bfa0 fffff8a0`0127c6f8 00000000`00000000 : nt!CmpSetValueKeyNew+0x94
fffff800`00b9bc40 fffff800`03f75baa : fffff8a0`0a956550 fffff800`00b9bdc8 fffffa80`00000004 fffff800`00b9c1c0 : nt!CmSetValueKey+0x39b
fffff800`00b9bd80 fffff800`03cbe153 : ffffffff`80000ad8 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x349
fffff800`00b9beb0 fffff800`03cba710 : fffff800`040713b2 fffff800`00b9c1f8 fffff880`01cc1f02 00000000`00000001 : nt!KiSystemServiceCopyEnd+0x13
fffff800`00b9c0b8 fffff800`040713b2 : fffff800`00b9c1f8 fffff880`01cc1f02 00000000`00000001 fffff800`00b9c220 : nt!KiServiceLinkage
fffff800`00b9c0c0 fffff880`01cc8da6 : 00000000`00000004 fffffa80`041d4b10 fffff880`00fde1a0 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`00b9c120 fffff880`05e9198d : fffff800`00b9c220 fffff880`060a0c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`00b9c180 fffff800`00b9c220 : fffff880`060a0c28 00000000`00000000 00000000`00000000 fffffa80`001801a9 : netr28x+0x4b98d
fffff800`00b9c188 fffff880`060a0c28 : 00000000`00000000 00000000`00000000 fffffa80`001801a9 fffffa80`04ff81a0 : 0xfffff800`00b9c220
fffff800`00b9c190 00000000`00000000 : 00000000`00000000 fffffa80`001801a9 fffffa80`04ff81a0 fffffa80`00000000 : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 72fcf4995449a22c969472a3565df17f8c43ab0d
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 836e2da6f92fe24b92f89814387e74c010e78ca7
THREAD_SHA1_HASH_MOD: 7921e317582c7f98a7f13cfbcd3c02a86fdcafec
FOLLOWUP_IP:
netr28x+4b98d
fffff880`05e9198d ?? ???
SYMBOL_STACK_INDEX: b
SYMBOL_NAME: netr28x+4b98d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d
BUCKET_ID: X64_0xA_netr28x+4b98d
PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d
TARGET_TIME: 2020-06-06T17:11:49.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2015-01-29 05:11:20
BUILDDATESTAMP_STR: 150128-1513
BUILDLAB_STR: win7sp1_gdr
BUILDOSVER_STR: 6.1.7601.18738.amd64fre.win7sp1_gdr.150128-1513
ANALYSIS_SESSION_ELAPSED_TIME: 4231
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d
FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}
Followup: MachineOwner
---------