DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000005, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff800396013d1, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
DUMP_TYPE: 2
BUGCHECK_P1: 5
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff800396013d1
WRITE_ADDRESS: GetUlongFromAddress: unable to read from fffff8002fd7a4c0
fffff8002fdf5390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000005
CURRENT_IRQL: 2
FAULTING_IP:
afd!AfdIndicateEventSelectEvent+d1
fffff800`396013d1 0000 add byte ptr [rax],al
CPU_COUNT: c
CPU_MHZ: d42
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: r5apex.exe
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 03-13-2019 21:32:27.0047
ANALYSIS_VERSION: 10.0.18317.1001 amd64fre
TRAP_FRAME: ffffaa0d7f5aa260 -- (.trap 0xffffaa0d7f5aa260)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000005 rbx=0000000000000000 rcx=ffffbd8ef2d239a0
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800396013d1 rsp=ffffaa0d7f5aa3f0 rbp=ffffaa0d7f5aab80
r8=0000000000000000 r9=0000000000000001 r10=fffff80039631050
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
afd!AfdIndicateEventSelectEvent+0xd1:
fffff800`396013d1 0000 add byte ptr [rax],al ds:00000000`00000005=??
Resetting default scope
MISALIGNED_IP:
afd!AfdIndicateEventSelectEvent+d1
fffff800`396013d1 0000 add byte ptr [rax],al
LAST_CONTROL_TRANSFER: from fffff8002fa77c69 to fffff8002fa66440
STACK_TEXT:
ffffaa0d`7f5aa118 fffff800`2fa77c69 : 00000000`0000000a 00000000`00000005 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffaa0d`7f5aa120 fffff800`2fa7408e : 00000000`00000000 00000000`00000000 ffff77e1`7fa1142c ffffaa0d`7ee23000 : nt!KiBugCheckDispatch+0x69
ffffaa0d`7f5aa260 fffff800`396013d1 : 00000000`00000000 fffff925`2295c666 ffffbd8e`f14ab7e0 00000000`ffffffff : nt!KiPageFault+0x44e
ffffaa0d`7f5aa3f0 fffff800`3964c660 : ffffbd8e`f2d239a0 00000000`00000000 006b006f`006f0048 00000000`00000000 : afd!AfdIndicateEventSelectEvent+0xd1
ffffaa0d`7f5aa440 fffff800`39631ebb : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : afd!AfdFastDatagramReceive+0x680
ffffaa0d`7f5aa560 fffff800`2ff5116e : ffffad00`00000000 00000000`00000000 ffffaa0d`7f5aab80 00000000`0001201b : afd!AfdFastIoDeviceControl+0xe6b
ffffaa0d`7f5aa8e0 fffff800`2fede086 : 00000000`00000000 00000000`000003cc 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x3ae
ffffaa0d`7f5aaa20 fffff800`2fa77685 : ffffaa0d`7f5aab80 ffff97a7`af0bebe7 ffff77e1`7fa11c1c 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
ffffaa0d`7f5aaa90 00007ffb`266af754 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000fc`883ac2e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`266af754
THREAD_SHA1_HASH_MOD_FUNC: 1f20e9a96adf9da402594aac48a905f68b5bae01
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 615180a028729c3ae2525351ff723dbddc630c9b
THREAD_SHA1_HASH_MOD: ade14996ead118a3cdb86ff68fa698838aacf8d3
FOLLOWUP_IP:
afd!AfdIndicateEventSelectEvent+d1
fffff800`396013d1 0000 add byte ptr [rax],al
FAULT_INSTR_CODE: 8b000000
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: afd!AfdIndicateEventSelectEvent+d1
FOLLOWUP_NAME: MachineOwner
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.17763.316
STACK_COMMAND: .thread ; .cxr ; kb
MODULE_NAME: hardware
IMAGE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED
BUCKET_ID: IP_MISALIGNED
PRIMARY_PROBLEM_CLASS: IP_MISALIGNED
TARGET_TIME: 2019-02-22T14:32:52.000Z
OSBUILD: 17763
OSSERVICEPACK: 316
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: e35c
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:ip_misaligned
FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}
Followup: MachineOwner
---------
8: kd> lmvm hardware
start end module name
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000048092b01, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804433d2e4e, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
DUMP_TYPE: 2
BUGCHECK_P1: 48092b01
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff804433d2e4e
READ_ADDRESS: GetUlongFromAddress: unable to read from fffff804437794c0
fffff804437f4390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000048092b01
CURRENT_IRQL: 2
FAULTING_IP:
nt!MmDeleteKernelStack+47e
fffff804`433d2e4e 0f83ba000000 jae nt!MmDeleteKernelStack+0x53e (fffff804`433d2f0e)
CPU_COUNT: c
CPU_MHZ: d42
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: r5apex.exe
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 03-13-2019 21:32:24.0772
ANALYSIS_VERSION: 10.0.18317.1001 amd64fre
TRAP_FRAME: ffff8488bfb39fd0 -- (.trap 0xffff8488bfb39fd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff93c9e4f27000 rbx=0000000000000000 rcx=8a00000092b01963
rdx=0000000000092b01 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804433d2e4e rsp=ffff8488bfb3a160 rbp=00000000ffffffff
r8=ffff8488be710000 r9=fffffe000000afb0 r10=0000000000000001
r11=ffff93c9e4f27000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!MmDeleteKernelStack+0x47e:
fffff804`433d2e4e 0f83ba000000 jae nt!MmDeleteKernelStack+0x53e (fffff804`433d2f0e) [br=0]
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80443476c69 to fffff80443465440
STACK_TEXT:
ffff8488`bfb39e88 fffff804`43476c69 : 00000000`0000000a 00000000`48092b01 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8488`bfb39e90 fffff804`4347308e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8488`bfb39fd0 fffff804`433d2e4e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x44e
ffff8488`bfb3a160 fffff804`43956a92 : 00000000`00000001 ffff8488`00000000 ffff93c9`00000000 ffff8488`00000000 : nt!MmDeleteKernelStack+0x47e
ffff8488`bfb3a230 ffff9511`ad4bfcfe : ffff8488`0000004b ffff8488`bfb3a3a0 00000000`00000070 ffff8488`bfb3a308 : nt!KeUserModeCallback+0x2d2
ffff8488`bfb3a2d0 ffff8488`0000004b : ffff8488`bfb3a3a0 00000000`00000070 ffff8488`bfb3a308 ffff8488`bfb3a304 : win32kfull+0xbfcfe
ffff8488`bfb3a2d8 ffff8488`bfb3a3a0 : 00000000`00000070 ffff8488`bfb3a308 ffff8488`bfb3a304 00000000`00000200 : 0xffff8488`0000004b
ffff8488`bfb3a2e0 00000000`00000070 : ffff8488`bfb3a308 ffff8488`bfb3a304 00000000`00000200 00000018`00000000 : 0xffff8488`bfb3a3a0
ffff8488`bfb3a2e8 ffff8488`bfb3a308 : ffff8488`bfb3a304 00000000`00000200 00000018`00000000 00000062`f55ad478 : 0x70
ffff8488`bfb3a2f0 ffff8488`bfb3a304 : 00000000`00000200 00000018`00000000 00000062`f55ad478 ffff8488`bfb3a3a0 : 0xffff8488`bfb3a308
ffff8488`bfb3a2f8 00000000`00000200 : 00000018`00000000 00000062`f55ad478 ffff8488`bfb3a3a0 00000000`00000000 : 0xffff8488`bfb3a304
ffff8488`bfb3a300 00000018`00000000 : 00000062`f55ad478 ffff8488`bfb3a3a0 00000000`00000000 ffff93c9`e4f27000 : 0x200
ffff8488`bfb3a308 00000062`f55ad478 : ffff8488`bfb3a3a0 00000000`00000000 ffff93c9`e4f27000 fffff804`43396b87 : 0x00000018`00000000
ffff8488`bfb3a310 ffff8488`bfb3a3a0 : 00000000`00000000 ffff93c9`e4f27000 fffff804`43396b87 ffff8488`bfb3a430 : 0x00000062`f55ad478
ffff8488`bfb3a318 00000000`00000000 : ffff93c9`e4f27000 fffff804`43396b87 ffff8488`bfb3a430 01000002`fc30a825 : 0xffff8488`bfb3a3a0
THREAD_SHA1_HASH_MOD_FUNC: c34ffb98277f2adb424aca92a3dad4c126553012
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e5287492e9e77756e32ff2be031c08bb7ab63394
THREAD_SHA1_HASH_MOD: 2ca252e3b050396d78f57aae196f99e02587acfe
FOLLOWUP_IP:
win32kfull+bfcfe
ffff9511`ad4bfcfe 0f1f440000 nop dword ptr [rax+rax]
FAULT_INSTR_CODE: 441f0f
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: win32kfull+bfcfe
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: bfcfe
FAILURE_BUCKET_ID: AV_win32kfull!unknown_function
BUCKET_ID: AV_win32kfull!unknown_function
PRIMARY_PROBLEM_CLASS: AV_win32kfull!unknown_function
TARGET_TIME: 2019-02-22T19:35:27.000Z
OSBUILD: 17763
OSSERVICEPACK: 316
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: cc4b
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_win32kfull!unknown_function
FAILURE_ID_HASH: {c6dafecf-8cc3-1961-c365-a138465d78d7}
Followup: MachineOwner
---------
8: kd> lmvm win32kfull
start end module name
ffff9511`ad400000 ffff9511`ad792000 win32kfull T (no symbols)
Loaded symbol image file: win32kfull.sys
Image path: \SystemRoot\System32\win32kfull.sys
Image name: win32kfull.sys
Timestamp: unavailable (00000000)
CheckSum: 00000000
ImageSize: 00392000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffd28e40511500, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
ETW minidump data unavailable
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
DUMP_TYPE: 2
BUGCHECK_P1: ffffd28e40511500
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
EXCEPTION_RECORD: 0000000000001000 -- (.exr 0x1000)
Cannot read Exception record @ 0000000000001000
EXCEPTION_CODE: (Win32) 0x4121f080 (1092743296) - <Unable to get error code text>
ERROR_CODE: (NTSTATUS) 0x4121f080 - <Unable to get error code text>
CPU_COUNT: c
CPU_MHZ: d42
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0xEF
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5
ANALYSIS_SESSION_TIME: 03-13-2019 21:32:22.0669
ANALYSIS_VERSION: 10.0.18317.1001 amd64fre
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
LAST_CONTROL_TRANSFER: from fffff8041e726ccd to fffff8041e04e440
STACK_TEXT:
fffff88a`b8044d98 fffff804`1e726ccd : 00000000`000000ef ffffd28e`40511500 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff88a`b8044da0 fffff804`1e620413 : 00000000`00000001 fffff804`1ded9c65 ffffd28e`40511500 fffff804`1ded9b64 : nt!PspCatchCriticalBreak+0xfd
fffff88a`b8044e40 fffff804`1e47d74c : ffffd28e`00000000 00000000`00000000 ffffd28e`40511500 ffffd28e`405117d8 : nt!PspTerminateAllThreads+0x1a3e3f
fffff88a`b8044eb0 fffff804`1e47f289 : ffffffff`ffffffff fffff88a`b8044fe0 ffffd28e`40511500 fffff804`1dfac900 : nt!PspTerminateProcess+0xe0
fffff88a`b8044ef0 fffff804`1e05f685 : 00000000`000003b4 ffffd28e`4121f080 ffffd28e`40511500 00000000`b8045130 : nt!NtTerminateProcess+0xa9
fffff88a`b8044f60 fffff804`1e052140 : fffff804`1e091204 fffff88a`b8045a58 fffff88a`b8045a58 00000000`b8045130 : nt!KiSystemServiceCopyEnd+0x25
fffff88a`b80450f8 fffff804`1e091204 : fffff88a`b8045a58 fffff88a`b8045a58 00000000`b8045130 00000000`00023ec1 : nt!KiServiceLinkage
fffff88a`b8045100 fffff804`1e05fd42 : 00000000`00001000 fffff88a`b8045b00 ffff8000`00000000 00000000`c0ecbc27 : nt!KiDispatchException+0x18a4d4
fffff88a`b8045920 fffff804`1e05c068 : 00000076`5407d790 fffff88a`b8045b80 00007ff8`c0d83e8e ffffd28e`00000000 : nt!KiExceptionDispatch+0xc2
fffff88a`b8045b00 00007ff8`c0d66ad2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x428
00000076`5407d140 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00007ff8`c0eca000 : 0x00007ff8`c0d66ad2
THREAD_SHA1_HASH_MOD_FUNC: f6b0f7fafbd5253fc3d42ad0a11af14fddabdcf0
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bf04d85c07deb5d2e5807caac296afdb458c1aac
THREAD_SHA1_HASH_MOD: bc100a5647b828107ac4e18055e00abcbe1ec406
FOLLOWUP_IP:
nt!PspCatchCriticalBreak+fd
fffff804`1e726ccd cc int 3
FAULT_INSTR_CODE: ed8440cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!PspCatchCriticalBreak+fd
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.17763.316
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: fd
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_4121f080_nt!PspCatchCriticalBreak
BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_4121f080_nt!PspCatchCriticalBreak
PRIMARY_PROBLEM_CLASS: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_4121f080_nt!PspCatchCriticalBreak
TARGET_TIME: 2019-02-21T23:35:03.000Z
OSBUILD: 17763
OSSERVICEPACK: 316
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: a3f9
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xef_svchost.exe_bugcheck_critical_process_4121f080_nt!pspcatchcriticalbreak
FAILURE_ID_HASH: {7031da97-b1a4-414d-5a51-9b7361b05b33}
Followup: MachineOwner
---------