DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000009350, memory referenced
Arg2: 000000000000000a, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8009ff27e80, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
GetUlongPtrFromAddress: unable to read from fffff801cf1d6308
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1781
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11741
Key : Analysis.Init.CPU.mSec
Value: 483
Key : Analysis.Init.Elapsed.mSec
Value: 13507
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : Bugcheck.Code.DumpHeader
Value: 0xd1
Key : Bugcheck.Code.Register
Value: 0xa
Key : WER.OS.Branch
Value: winblue_ltsb
Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.20012
FILE_IN_CAB: 081822-7265-01.dmp
BUGCHECK_CODE: d1
BUGCHECK_P1: 9350
BUGCHECK_P2: a
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8009ff27e80
READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff801cf1d62a8
GetUlongPtrFromAddress: unable to read from fffff801cf1d6530
0000000000009350
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff801d089eac0 -- (.trap 0xfffff801d089eac0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe0011290e3a8
rdx=0000000000000003 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8009ff27e80 rsp=fffff801d089ec50 rbp=fffff801d089ed50
r8=000000000026a7cb r9=0000000000000000 r10=0000000000800002
r11=0000000000000007 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nvlddmkm+0xf3e80:
fffff800`9ff27e80 4d8bb750930000 mov r14,qword ptr [r15+9350h] ds:00000000`00009350=????????????????
Resetting default scope
STACK_TEXT:
fffff801`d089e978 fffff801`cefd7769 : 00000000`0000000a 00000000`00009350 00000000`0000000a 00000000`00000000 : nt!KeBugCheckEx
fffff801`d089e980 fffff801`cefd4ca8 : 00000000`80000103 fffff800`9fefa9e5 fffff801`d089ed00 00000000`0026a7cb : nt!KiBugCheckDispatch+0x69
fffff801`d089eac0 fffff800`9ff27e80 : 00000000`00000000 00000000`00000005 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x428
fffff801`d089ec50 00000000`00000000 : 00000000`00000005 00000000`00000000 00000000`00000002 fffff800`9ff27f60 : nvlddmkm+0xf3e80
SYMBOL_NAME: nvlddmkm+f3e80
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: f3e80
FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function
OS_VERSION: 8.1.9600.20012
BUILDLAB_STR: winblue_ltsb
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff801867deef0, Address of the instruction which caused the BugCheck
Arg3: ffffd000fe894340, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
GetUlongPtrFromAddress: unable to read from fffff80362f57308
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1577
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 6795
Key : Analysis.Init.CPU.mSec
Value: 374
Key : Analysis.Init.Elapsed.mSec
Value: 11239
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: winblue_ltsb
Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.20012
FILE_IN_CAB: 081622-4562-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff801867deef0
BUGCHECK_P3: ffffd000fe894340
BUGCHECK_P4: 0
CONTEXT: ffffd000fe894340 -- (.cxr 0xffffd000fe894340)
rax=ffffd000fe894e40 rbx=ffffe001ede80800 rcx=0000000000000000
rdx=ffffe001ed5bc3d0 rsi=0000000000000009 rdi=ffffe001ed5bc3d0
rip=fffff801867deef0 rsp=ffffd000fe894d60 rbp=0000000000000000
r8=0000000000000003 r9=0000000000000000 r10=ffffd000fe894d60
r11=ffffd000fe894d50 r12=0000000000000000 r13=0000000000000000
r14=ffffe001ec9b6000 r15=0000000000000001
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nvlddmkm+0x2fbef0:
fffff801`867deef0 448b4968 mov r9d,dword ptr [rcx+68h] ds:002b:00000000`00000068=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
STACK_TEXT:
ffffd000`fe894d60 ffffe001`ede80800 : ffffe001`ede80800 00000000`00000009 ffffe001`ede80d98 ffffe001`00000000 : nvlddmkm+0x2fbef0
ffffd000`fe894d68 ffffe001`ede80800 : 00000000`00000009 ffffe001`ede80d98 ffffe001`00000000 fffff801`00000001 : 0xffffe001`ede80800
ffffd000`fe894d70 00000000`00000009 : ffffe001`ede80d98 ffffe001`00000000 fffff801`00000001 ffffe001`ede80d98 : 0xffffe001`ede80800
ffffd000`fe894d78 ffffe001`ede80d98 : ffffe001`00000000 fffff801`00000001 ffffe001`ede80d98 ffffe001`ede83e48 : 0x9
ffffd000`fe894d80 ffffe001`00000000 : fffff801`00000001 ffffe001`ede80d98 ffffe001`ede83e48 00000000`00000000 : 0xffffe001`ede80d98
ffffd000`fe894d88 fffff801`00000001 : ffffe001`ede80d98 ffffe001`ede83e48 00000000`00000000 ffffe001`ede80d70 : 0xffffe001`00000000
ffffd000`fe894d90 ffffe001`ede80d98 : ffffe001`ede83e48 00000000`00000000 ffffe001`ede80d70 ffffe001`ede83d38 : 0xfffff801`00000001
ffffd000`fe894d98 ffffe001`ede83e48 : 00000000`00000000 ffffe001`ede80d70 ffffe001`ede83d38 ffffe001`ede80d98 : 0xffffe001`ede80d98
ffffd000`fe894da0 00000000`00000000 : ffffe001`ede80d70 ffffe001`ede83d38 ffffe001`ede80d98 00000000`00781dc9 : 0xffffe001`ede83e48
SYMBOL_NAME: nvlddmkm+2fbef0
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr 0xffffd000fe894340 ; kb
BUCKET_ID_FUNC_OFFSET: 2fbef0
FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function
OS_VERSION: 8.1.9600.20012
BUILDLAB_STR: winblue_ltsb
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff800d993aef0, Address of the instruction which caused the BugCheck
Arg3: ffffd000795e2430, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
GetUlongPtrFromAddress: unable to read from fffff801c05d7308
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1359
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 10246
Key : Analysis.Init.CPU.mSec
Value: 421
Key : Analysis.Init.Elapsed.mSec
Value: 11867
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: winblue_ltsb
Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.20012
FILE_IN_CAB: 081622-4390-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff800d993aef0
BUGCHECK_P3: ffffd000795e2430
BUGCHECK_P4: 0
CONTEXT: ffffd000795e2430 -- (.cxr 0xffffd000795e2430)
rax=ffffd000795e2f30 rbx=ffffe0014a67d3f0 rcx=0000000000000000
rdx=ffffe0014a1dc3d0 rsi=0000000000000011 rdi=ffffe0014a1dc3d0
rip=fffff800d993aef0 rsp=ffffd000795e2e50 rbp=0000000000000000
r8=0000000000000003 r9=0000000000000000 r10=ffffd000795e2e50
r11=ffffd000795e2e40 r12=0000000000000000 r13=0000000000000000
r14=ffffe001495f1000 r15=0000000000000001
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nvlddmkm+0x2fbef0:
fffff800`d993aef0 448b4968 mov r9d,dword ptr [rcx+68h] ds:002b:00000000`00000068=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
STACK_TEXT:
ffffd000`795e2e50 ffffe001`4a67d3f0 : ffffe001`4a67d3f0 00000000`00000011 ffffe001`4a67d988 ffffe001`00000000 : nvlddmkm+0x2fbef0
ffffd000`795e2e58 ffffe001`4a67d3f0 : 00000000`00000011 ffffe001`4a67d988 ffffe001`00000000 fffff800`00000001 : 0xffffe001`4a67d3f0
ffffd000`795e2e60 00000000`00000011 : ffffe001`4a67d988 ffffe001`00000000 fffff800`00000001 ffffe001`4a67d988 : 0xffffe001`4a67d3f0
ffffd000`795e2e68 ffffe001`4a67d988 : ffffe001`00000000 fffff800`00000001 ffffe001`4a67d988 ffffe001`4a67fe48 : 0x11
ffffd000`795e2e70 ffffe001`00000000 : fffff800`00000001 ffffe001`4a67d988 ffffe001`4a67fe48 00000000`00000000 : 0xffffe001`4a67d988
ffffd000`795e2e78 fffff800`00000001 : ffffe001`4a67d988 ffffe001`4a67fe48 00000000`00000000 ffffe001`4a67d960 : 0xffffe001`00000000
ffffd000`795e2e80 ffffe001`4a67d988 : ffffe001`4a67fe48 00000000`00000000 ffffe001`4a67d960 ffffe001`4a67fd38 : 0xfffff800`00000001
ffffd000`795e2e88 ffffe001`4a67fe48 : 00000000`00000000 ffffe001`4a67d960 ffffe001`4a67fd38 ffffe001`4a67d988 : 0xffffe001`4a67d988
ffffd000`795e2e90 00000000`00000000 : ffffe001`4a67d960 ffffe001`4a67fd38 ffffe001`4a67d988 00000000`00781dc9 : 0xffffe001`4a67fe48
SYMBOL_NAME: nvlddmkm+2fbef0
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr 0xffffd000795e2430 ; kb
BUCKET_ID_FUNC_OFFSET: 2fbef0
FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function
OS_VERSION: 8.1.9600.20012
BUILDLAB_STR: winblue_ltsb
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8007f5beef0, Address of the instruction which caused the BugCheck
Arg3: ffffd0005c16e340, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
GetUlongPtrFromAddress: unable to read from fffff80079d69308
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1296
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 5868
Key : Analysis.Init.CPU.mSec
Value: 390
Key : Analysis.Init.Elapsed.mSec
Value: 11881
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: winblue_ltsb
Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.20012
FILE_IN_CAB: 081722-7468-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8007f5beef0
BUGCHECK_P3: ffffd0005c16e340
BUGCHECK_P4: 0
CONTEXT: ffffd0005c16e340 -- (.cxr 0xffffd0005c16e340)
rax=ffffd0005c16ee40 rbx=ffffe00067aaa9a0 rcx=0000000000000000
rdx=ffffe00068356010 rsi=0000000000000009 rdi=ffffe00068356010
rip=fffff8007f5beef0 rsp=ffffd0005c16ed60 rbp=0000000000000000
r8=0000000000000003 r9=0000000000000000 r10=ffffd0005c16ed60
r11=ffffd0005c16ed50 r12=0000000000000000 r13=0000000000000000
r14=ffffe00067915000 r15=0000000000000001
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nvlddmkm+0x2fbef0:
fffff800`7f5beef0 448b4968 mov r9d,dword ptr [rcx+68h] ds:002b:00000000`00000068=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
STACK_TEXT:
ffffd000`5c16ed60 ffffe000`67aaa9a0 : ffffe000`67aaa9a0 00000000`00000009 ffffe000`67aaaf38 ffffe000`00000000 : nvlddmkm+0x2fbef0
ffffd000`5c16ed68 ffffe000`67aaa9a0 : 00000000`00000009 ffffe000`67aaaf38 ffffe000`00000000 fffff800`00000001 : 0xffffe000`67aaa9a0
ffffd000`5c16ed70 00000000`00000009 : ffffe000`67aaaf38 ffffe000`00000000 fffff800`00000001 ffffe000`67aaaf38 : 0xffffe000`67aaa9a0
ffffd000`5c16ed78 ffffe000`67aaaf38 : ffffe000`00000000 fffff800`00000001 ffffe000`67aaaf38 ffffe000`67aa7e48 : 0x9
ffffd000`5c16ed80 ffffe000`00000000 : fffff800`00000001 ffffe000`67aaaf38 ffffe000`67aa7e48 00000000`00000000 : 0xffffe000`67aaaf38
ffffd000`5c16ed88 fffff800`00000001 : ffffe000`67aaaf38 ffffe000`67aa7e48 00000000`00000000 ffffe000`67aaaf10 : 0xffffe000`00000000
ffffd000`5c16ed90 ffffe000`67aaaf38 : ffffe000`67aa7e48 00000000`00000000 ffffe000`67aaaf10 ffffe000`67aa7d38 : 0xfffff800`00000001
ffffd000`5c16ed98 ffffe000`67aa7e48 : 00000000`00000000 ffffe000`67aaaf10 ffffe000`67aa7d38 ffffe000`67aaaf38 : 0xffffe000`67aaaf38
ffffd000`5c16eda0 00000000`00000000 : ffffe000`67aaaf10 ffffe000`67aa7d38 ffffe000`67aaaf38 00000000`00781dc9 : 0xffffe000`67aa7e48
SYMBOL_NAME: nvlddmkm+2fbef0
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr 0xffffd0005c16e340 ; kb
BUCKET_ID_FUNC_OFFSET: 2fbef0
FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function
OS_VERSION: 8.1.9600.20012
BUILDLAB_STR: winblue_ltsb
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3}
Followup: MachineOwner
---------