*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffac89aba01008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff803587a17dc, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1624
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 8036
Key : Analysis.Init.CPU.mSec
Value: 296
Key : Analysis.Init.Elapsed.mSec
Value: 642400
Key : Analysis.Memory.CommitPeak.Mb
Value: 133
Key : Bugcheck.Code.DumpHeader
Value: 0xd1
Key : Bugcheck.Code.Register
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 090622-15234-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffac89aba01008
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff803587a17dc
READ_ADDRESS: fffff80327905450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffac89aba01008
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff80323478dc0 -- (.trap 0xfffff80323478dc0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803587a17dc rsp=fffff80323478f50 rbp=ffffac89aba01006
r8=0000000000000000 r9=ffffac89a8bd21b8 r10=fffff80323478e90
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
SynTP+0x717dc:
fffff803`587a17dc 0fb75502 movzx edx,word ptr [rbp+2] ss:0018:ffffac89`aba01008=????
Resetting default scope
STACK_TEXT:
fffff803`23478c78 fffff803`2702d9a9 : 00000000`0000000a ffffac89`aba01008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff803`23478c80 fffff803`27029b00 : 00000000`00000000 ffffac89`ab5e7e60 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff803`23478dc0 fffff803`587a17dc : ffffac89`a8bd49a0 ffffac89`aba00ffa 00000000`ae4eb604 ffffac89`a8bd4998 : nt!KiPageFault+0x440
fffff803`23478f50 ffffac89`a8bd49a0 : ffffac89`aba00ffa 00000000`ae4eb604 ffffac89`a8bd4998 ffffac89`a9831d28 : SynTP+0x717dc
fffff803`23478f58 ffffac89`aba00ffa : 00000000`ae4eb604 ffffac89`a8bd4998 ffffac89`a9831d28 fffff803`23479c00 : 0xffffac89`a8bd49a0
fffff803`23478f60 00000000`ae4eb604 : ffffac89`a8bd4998 ffffac89`a9831d28 fffff803`23479c00 00000000`00000000 : 0xffffac89`aba00ffa
fffff803`23478f68 ffffac89`a8bd4998 : ffffac89`a9831d28 fffff803`23479c00 00000000`00000000 ffffac89`a8bd4a80 : 0xae4eb604
fffff803`23478f70 ffffac89`a9831d28 : fffff803`23479c00 00000000`00000000 ffffac89`a8bd4a80 00000000`00000001 : 0xffffac89`a8bd4998
fffff803`23478f78 fffff803`23479c00 : 00000000`00000000 ffffac89`a8bd4a80 00000000`00000001 fffff803`587a1b47 : 0xffffac89`a9831d28
fffff803`23478f80 00000000`00000000 : ffffac89`a8bd4a80 00000000`00000001 fffff803`587a1b47 fffff803`23479000 : 0xfffff803`23479c00
SYMBOL_NAME: SynTP+717dc
MODULE_NAME: SynTP
IMAGE_NAME: SynTP.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 717dc
FAILURE_BUCKET_ID: AV_SynTP!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5a0e0965-29dd-7a5b-d737-1762e0ecb848}
Followup: MachineOwner
---------