Hasan Gürlek
Megapat
Daha fazla
- Cinsiyet
- Erkek
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000005, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff800396013d1, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
DUMP_TYPE: 2
BUGCHECK_P1: 5
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff800396013d1
WRITE_ADDRESS: GetUlongFromAddress: unable to read from fffff8002fd7a4c0
fffff8002fdf5390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000005
CURRENT_IRQL: 2
FAULTING_IP:
afd!AfdIndicateEventSelectEvent+d1
fffff800`396013d1 0000 add byte ptr [rax],al
CPU_COUNT: c
CPU_MHZ: d42
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: r5apex.exe
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 03-13-2019 21:32:27.0047
ANALYSIS_VERSION: 10.0.18317.1001 amd64fre
TRAP_FRAME: ffffaa0d7f5aa260 -- (.trap 0xffffaa0d7f5aa260)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000005 rbx=0000000000000000 rcx=ffffbd8ef2d239a0
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800396013d1 rsp=ffffaa0d7f5aa3f0 rbp=ffffaa0d7f5aab80
r8=0000000000000000 r9=0000000000000001 r10=fffff80039631050
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
afd!AfdIndicateEventSelectEvent+0xd1:
fffff800`396013d1 0000 add byte ptr [rax],al ds:00000000`00000005=??
Resetting default scope
MISALIGNED_IP:
afd!AfdIndicateEventSelectEvent+d1
fffff800`396013d1 0000 add byte ptr [rax],al
LAST_CONTROL_TRANSFER: from fffff8002fa77c69 to fffff8002fa66440
STACK_TEXT:
ffffaa0d`7f5aa118 fffff800`2fa77c69 : 00000000`0000000a 00000000`00000005 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffaa0d`7f5aa120 fffff800`2fa7408e : 00000000`00000000 00000000`00000000 ffff77e1`7fa1142c ffffaa0d`7ee23000 : nt!KiBugCheckDispatch+0x69
ffffaa0d`7f5aa260 fffff800`396013d1 : 00000000`00000000 fffff925`2295c666 ffffbd8e`f14ab7e0 00000000`ffffffff : nt!KiPageFault+0x44e
ffffaa0d`7f5aa3f0 fffff800`3964c660 : ffffbd8e`f2d239a0 00000000`00000000 006b006f`006f0048 00000000`00000000 : afd!AfdIndicateEventSelectEvent+0xd1
ffffaa0d`7f5aa440 fffff800`39631ebb : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : afd!AfdFastDatagramReceive+0x680
ffffaa0d`7f5aa560 fffff800`2ff5116e : ffffad00`00000000 00000000`00000000 ffffaa0d`7f5aab80 00000000`0001201b : afd!AfdFastIoDeviceControl+0xe6b
ffffaa0d`7f5aa8e0 fffff800`2fede086 : 00000000`00000000 00000000`000003cc 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x3ae
ffffaa0d`7f5aaa20 fffff800`2fa77685 : ffffaa0d`7f5aab80 ffff97a7`af0bebe7 ffff77e1`7fa11c1c 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
ffffaa0d`7f5aaa90 00007ffb`266af754 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000fc`883ac2e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`266af754
THREAD_SHA1_HASH_MOD_FUNC: 1f20e9a96adf9da402594aac48a905f68b5bae01
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 615180a028729c3ae2525351ff723dbddc630c9b
THREAD_SHA1_HASH_MOD: ade14996ead118a3cdb86ff68fa698838aacf8d3
FOLLOWUP_IP:
afd!AfdIndicateEventSelectEvent+d1
fffff800`396013d1 0000 add byte ptr [rax],al
FAULT_INSTR_CODE: 8b000000
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: afd!AfdIndicateEventSelectEvent+d1
FOLLOWUP_NAME: MachineOwner
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.17763.316
STACK_COMMAND: .thread ; .cxr ; kb
MODULE_NAME: hardware
IMAGE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED
BUCKET_ID: IP_MISALIGNED
PRIMARY_PROBLEM_CLASS: IP_MISALIGNED
TARGET_TIME: 2019-02-22T14:32:52.000Z
OSBUILD: 17763
OSSERVICEPACK: 316
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: e35c
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:ip_misaligned
FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}
Followup: MachineOwner
---------
8: kd> lmvm hardware
start end module name
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000048092b01, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804433d2e4e, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
DUMP_TYPE: 2
BUGCHECK_P1: 48092b01
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff804433d2e4e
READ_ADDRESS: GetUlongFromAddress: unable to read from fffff804437794c0
fffff804437f4390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000048092b01
CURRENT_IRQL: 2
FAULTING_IP:
nt!MmDeleteKernelStack+47e
fffff804`433d2e4e 0f83ba000000 jae nt!MmDeleteKernelStack+0x53e (fffff804`433d2f0e)
CPU_COUNT: c
CPU_MHZ: d42
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: r5apex.exe
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 03-13-2019 21:32:24.0772
ANALYSIS_VERSION: 10.0.18317.1001 amd64fre
TRAP_FRAME: ffff8488bfb39fd0 -- (.trap 0xffff8488bfb39fd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff93c9e4f27000 rbx=0000000000000000 rcx=8a00000092b01963
rdx=0000000000092b01 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804433d2e4e rsp=ffff8488bfb3a160 rbp=00000000ffffffff
r8=ffff8488be710000 r9=fffffe000000afb0 r10=0000000000000001
r11=ffff93c9e4f27000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!MmDeleteKernelStack+0x47e:
fffff804`433d2e4e 0f83ba000000 jae nt!MmDeleteKernelStack+0x53e (fffff804`433d2f0e) [br=0]
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80443476c69 to fffff80443465440
STACK_TEXT:
ffff8488`bfb39e88 fffff804`43476c69 : 00000000`0000000a 00000000`48092b01 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8488`bfb39e90 fffff804`4347308e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8488`bfb39fd0 fffff804`433d2e4e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x44e
ffff8488`bfb3a160 fffff804`43956a92 : 00000000`00000001 ffff8488`00000000 ffff93c9`00000000 ffff8488`00000000 : nt!MmDeleteKernelStack+0x47e
ffff8488`bfb3a230 ffff9511`ad4bfcfe : ffff8488`0000004b ffff8488`bfb3a3a0 00000000`00000070 ffff8488`bfb3a308 : nt!KeUserModeCallback+0x2d2
ffff8488`bfb3a2d0 ffff8488`0000004b : ffff8488`bfb3a3a0 00000000`00000070 ffff8488`bfb3a308 ffff8488`bfb3a304 : win32kfull+0xbfcfe
ffff8488`bfb3a2d8 ffff8488`bfb3a3a0 : 00000000`00000070 ffff8488`bfb3a308 ffff8488`bfb3a304 00000000`00000200 : 0xffff8488`0000004b
ffff8488`bfb3a2e0 00000000`00000070 : ffff8488`bfb3a308 ffff8488`bfb3a304 00000000`00000200 00000018`00000000 : 0xffff8488`bfb3a3a0
ffff8488`bfb3a2e8 ffff8488`bfb3a308 : ffff8488`bfb3a304 00000000`00000200 00000018`00000000 00000062`f55ad478 : 0x70
ffff8488`bfb3a2f0 ffff8488`bfb3a304 : 00000000`00000200 00000018`00000000 00000062`f55ad478 ffff8488`bfb3a3a0 : 0xffff8488`bfb3a308
ffff8488`bfb3a2f8 00000000`00000200 : 00000018`00000000 00000062`f55ad478 ffff8488`bfb3a3a0 00000000`00000000 : 0xffff8488`bfb3a304
ffff8488`bfb3a300 00000018`00000000 : 00000062`f55ad478 ffff8488`bfb3a3a0 00000000`00000000 ffff93c9`e4f27000 : 0x200
ffff8488`bfb3a308 00000062`f55ad478 : ffff8488`bfb3a3a0 00000000`00000000 ffff93c9`e4f27000 fffff804`43396b87 : 0x00000018`00000000
ffff8488`bfb3a310 ffff8488`bfb3a3a0 : 00000000`00000000 ffff93c9`e4f27000 fffff804`43396b87 ffff8488`bfb3a430 : 0x00000062`f55ad478
ffff8488`bfb3a318 00000000`00000000 : ffff93c9`e4f27000 fffff804`43396b87 ffff8488`bfb3a430 01000002`fc30a825 : 0xffff8488`bfb3a3a0
THREAD_SHA1_HASH_MOD_FUNC: c34ffb98277f2adb424aca92a3dad4c126553012
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e5287492e9e77756e32ff2be031c08bb7ab63394
THREAD_SHA1_HASH_MOD: 2ca252e3b050396d78f57aae196f99e02587acfe
FOLLOWUP_IP:
win32kfull+bfcfe
ffff9511`ad4bfcfe 0f1f440000 nop dword ptr [rax+rax]
FAULT_INSTR_CODE: 441f0f
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: win32kfull+bfcfe
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: bfcfe
FAILURE_BUCKET_ID: AV_win32kfull!unknown_function
BUCKET_ID: AV_win32kfull!unknown_function
PRIMARY_PROBLEM_CLASS: AV_win32kfull!unknown_function
TARGET_TIME: 2019-02-22T19:35:27.000Z
OSBUILD: 17763
OSSERVICEPACK: 316
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: cc4b
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_win32kfull!unknown_function
FAILURE_ID_HASH: {c6dafecf-8cc3-1961-c365-a138465d78d7}
Followup: MachineOwner
---------
8: kd> lmvm win32kfull
start end module name
ffff9511`ad400000 ffff9511`ad792000 win32kfull T (no symbols)
Loaded symbol image file: win32kfull.sys
Image path: \SystemRoot\System32\win32kfull.sys
Image name: win32kfull.sys
Timestamp: unavailable (00000000)
CheckSum: 00000000
ImageSize: 00392000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffd28e40511500, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
ETW minidump data unavailable
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
DUMP_TYPE: 2
BUGCHECK_P1: ffffd28e40511500
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
EXCEPTION_RECORD: 0000000000001000 -- (.exr 0x1000)
Cannot read Exception record @ 0000000000001000
EXCEPTION_CODE: (Win32) 0x4121f080 (1092743296) - <Unable to get error code text>
ERROR_CODE: (NTSTATUS) 0x4121f080 - <Unable to get error code text>
CPU_COUNT: c
CPU_MHZ: d42
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0xEF
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 03-13-2019 21:32:22.0669
ANALYSIS_VERSION: 10.0.18317.1001 amd64fre
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
LAST_CONTROL_TRANSFER: from fffff8041e726ccd to fffff8041e04e440
STACK_TEXT:
fffff88a`b8044d98 fffff804`1e726ccd : 00000000`000000ef ffffd28e`40511500 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff88a`b8044da0 fffff804`1e620413 : 00000000`00000001 fffff804`1ded9c65 ffffd28e`40511500 fffff804`1ded9b64 : nt!PspCatchCriticalBreak+0xfd
fffff88a`b8044e40 fffff804`1e47d74c : ffffd28e`00000000 00000000`00000000 ffffd28e`40511500 ffffd28e`405117d8 : nt!PspTerminateAllThreads+0x1a3e3f
fffff88a`b8044eb0 fffff804`1e47f289 : ffffffff`ffffffff fffff88a`b8044fe0 ffffd28e`40511500 fffff804`1dfac900 : nt!PspTerminateProcess+0xe0
fffff88a`b8044ef0 fffff804`1e05f685 : 00000000`000003b4 ffffd28e`4121f080 ffffd28e`40511500 00000000`b8045130 : nt!NtTerminateProcess+0xa9
fffff88a`b8044f60 fffff804`1e052140 : fffff804`1e091204 fffff88a`b8045a58 fffff88a`b8045a58 00000000`b8045130 : nt!KiSystemServiceCopyEnd+0x25
fffff88a`b80450f8 fffff804`1e091204 : fffff88a`b8045a58 fffff88a`b8045a58 00000000`b8045130 00000000`00023ec1 : nt!KiServiceLinkage
fffff88a`b8045100 fffff804`1e05fd42 : 00000000`00001000 fffff88a`b8045b00 ffff8000`00000000 00000000`c0ecbc27 : nt!KiDispatchException+0x18a4d4
fffff88a`b8045920 fffff804`1e05c068 : 00000076`5407d790 fffff88a`b8045b80 00007ff8`c0d83e8e ffffd28e`00000000 : nt!KiExceptionDispatch+0xc2
fffff88a`b8045b00 00007ff8`c0d66ad2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x428
00000076`5407d140 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00007ff8`c0eca000 : 0x00007ff8`c0d66ad2
THREAD_SHA1_HASH_MOD_FUNC: f6b0f7fafbd5253fc3d42ad0a11af14fddabdcf0
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bf04d85c07deb5d2e5807caac296afdb458c1aac
THREAD_SHA1_HASH_MOD: bc100a5647b828107ac4e18055e00abcbe1ec406
FOLLOWUP_IP:
nt!PspCatchCriticalBreak+fd
fffff804`1e726ccd cc int 3
FAULT_INSTR_CODE: ed8440cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!PspCatchCriticalBreak+fd
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.17763.316
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: fd
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_4121f080_nt!PspCatchCriticalBreak
BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_4121f080_nt!PspCatchCriticalBreak
PRIMARY_PROBLEM_CLASS: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_4121f080_nt!PspCatchCriticalBreak
TARGET_TIME: 2019-02-21T23:35:03.000Z
OSBUILD: 17763
OSSERVICEPACK: 316
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: a3f9
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xef_svchost.exe_bugcheck_critical_process_4121f080_nt!pspcatchcriticalbreak
FAILURE_ID_HASH: {7031da97-b1a4-414d-5a51-9b7361b05b33}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: ffffb7eb25a25d94, Address of the instruction which caused the bugcheck
Arg3: ffffcf07af9b0c00, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32kfull.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
DUMP_TYPE: 2
BUGCHECK_P1: c000001d
BUGCHECK_P2: ffffb7eb25a25d94
BUGCHECK_P3: ffffcf07af9b0c00
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>
FAULTING_IP:
win32kfull+25d94
ffffb7eb`25a25d94 ff ???
CONTEXT: ffffcf07af9b0c00 -- (.cxr 0xffffcf07af9b0c00)
rax=ffff6972787f18a1 rbx=ffffb792c4283010 rcx=a675d7e409e10000
rdx=8001000000040000 rsi=0000000000b8e000 rdi=0000000000000001
rip=ffffb7eb25a25d94 rsp=ffffcf07af9b15f0 rbp=0000000000000000
r8=0000000000b8e000 r9=00000000ffffffff r10=7ffffffffffffffc
r11=ffffcf07af9b15c0 r12=0000000000003dff r13=0000000000000001
r14=0000000000001c07 r15=fffff78000000320
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
win32kfull+0x25d94:
ffffb7eb`25a25d94 ff ???
Resetting default scope
BUGCHECK_STR: 0x3B_c000001d
CPU_COUNT: c
CPU_MHZ: d42
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: Metro Exodus v1.0 Plus 10 Trainer.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D
ANALYSIS_SESSION_TIME: 03-14-2019 12:01:10.0897
ANALYSIS_VERSION: 10.0.18317.1001 amd64fre
MISALIGNED_IP:
win32kfull+25d94
ffffb7eb`25a25d94 ff ???
LAST_CONTROL_TRANSFER: from ffffba0a0b002340 to ffffb7eb25a25d94
STACK_TEXT:
ffffcf07`af9b15f0 ffffba0a`0b002340 : ffffb792`c4283010 00000000`00b8e000 ffff8d03`01d00060 00000000`00000000 : win32kfull+0x25d94
ffffcf07`af9b15f8 ffffb792`c4283010 : 00000000`00b8e000 ffff8d03`01d00060 00000000`00000000 ffffb7eb`25a249a8 : 0xffffba0a`0b002340
ffffcf07`af9b1600 00000000`00b8e000 : ffff8d03`01d00060 00000000`00000000 ffffb7eb`25a249a8 ffffb792`c4283010 : 0xffffb792`c4283010
ffffcf07`af9b1608 ffff8d03`01d00060 : 00000000`00000000 ffffb7eb`25a249a8 ffffb792`c4283010 ffffcf07`af9b1b80 : 0xb8e000
ffffcf07`af9b1610 00000000`00000000 : ffffb7eb`25a249a8 ffffb792`c4283010 ffffcf07`af9b1b80 ffffcf07`af9b1aa8 : 0xffff8d03`01d00060
THREAD_SHA1_HASH_MOD_FUNC: 14611e83184b4796f67b5b507273df7a53d42cfd
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 106c8af20a7c28aab670036f054a9cdc95c8807b
THREAD_SHA1_HASH_MOD: 14611e83184b4796f67b5b507273df7a53d42cfd
FOLLOWUP_IP:
win32kfull+25d94
ffffb7eb`25a25d94 ff ???
FAULT_INSTR_CODE: 7fffffff
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32kfull+25d94
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .cxr 0xffffcf07af9b0c00 ; kb
FAILURE_BUCKET_ID: IP_MISALIGNED_win32kfull.sys
BUCKET_ID: IP_MISALIGNED_win32kfull.sys
PRIMARY_PROBLEM_CLASS: IP_MISALIGNED_win32kfull.sys
TARGET_TIME: 2019-03-13T22:12:01.000Z
OSBUILD: 17763
OSSERVICEPACK: 379
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: 12e79
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:ip_misaligned_win32kfull.sys
FAILURE_ID_HASH: {a4dbea1d-84d7-234f-0297-2512e5417445}
Followup: MachineOwner
---------