DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000001500003, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff801869c58c6, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for rtwlanu.sys
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5577
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 11735
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: 1500003
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff801869c58c6
READ_ADDRESS: fffff8017b6fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8017b60f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8017b60f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000001500003
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8017da6ab90 -- (.trap 0xfffff8017da6ab90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff801888b5780
rdx=ffffa08ff2931a70 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801869c58c6 rsp=fffff8017da6ad20 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000fffff8018819
r11=ffffbd7b46a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
wdiwifi!Wdi_NdisMIndicateStatusEx+0xe1f6:
fffff801`869c58c6 488b3f mov rdi,qword ptr [rdi] ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
fffff801`7da6aa48 fffff801`7ae05e69 : 00000000`0000000a 00000000`01500003 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff801`7da6aa50 fffff801`7ae02169 : 00005f70`1d5f7ac8 00000000`0000000f ffffa08f`e5310010 fffff801`7c3ba976 : nt!KiBugCheckDispatch+0x69
fffff801`7da6ab90 fffff801`869c58c6 : ffffa08f`e2ffda10 ffffa08f`ef90df80 00000000`00000aed 00000000`000000c0 : nt!KiPageFault+0x469
fffff801`7da6ad20 fffff801`869c9ec5 : ffffa08f`e2ffda10 ffffa08f`f2931a70 00000000`00000000 00000000`00000000 : wdiwifi!Wdi_NdisMIndicateStatusEx+0xe1f6
fffff801`7da6ad70 fffff801`869c9b23 : 00000000`00000000 ffffa08f`f2931a70 ffffa08f`f2931a70 00000000`00000000 : wdiwifi!Wdi_NdisMIndicateStatusEx+0x127f5
fffff801`7da6add0 fffff801`869c66f6 : 00000000`00000001 fffff801`86a84670 fffff801`86a8c040 00000000`00000000 : wdiwifi!Wdi_NdisMIndicateStatusEx+0x12453
fffff801`7da6ae10 fffff801`869b7f20 : fffff801`869b7f10 ffffa08f`00000000 ffffa08f`73556f01 fffff801`7c41d21f : wdiwifi!Wdi_NdisMIndicateStatusEx+0xf026
fffff801`7da6aed0 fffff801`88178d4b : ffffa08f`dd9d8bf0 00000000`00000007 ffffa08f`e5310440 fffff801`7ac64c71 : wdiwifi!Wdi_NdisMIndicateStatusEx+0x850
fffff801`7da6af00 ffffa08f`dd9d8bf0 : 00000000`00000007 ffffa08f`e5310440 fffff801`7ac64c71 ffffa08f`ddd8c701 : rtwlanu+0x48d4b
fffff801`7da6af08 00000000`00000007 : ffffa08f`e5310440 fffff801`7ac64c71 ffffa08f`ddd8c701 ffffa08f`ddd8c760 : 0xffffa08f`dd9d8bf0
fffff801`7da6af10 ffffa08f`e5310440 : fffff801`7ac64c71 ffffa08f`ddd8c701 ffffa08f`ddd8c760 00000000`00000000 : 0x7
fffff801`7da6af18 fffff801`7ac64c71 : ffffa08f`ddd8c701 ffffa08f`ddd8c760 00000000`00000000 00000000`00000000 : 0xffffa08f`e5310440
fffff801`7da6af20 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IoSetCompletionRoutineEx+0x51
SYMBOL_NAME: wdiwifi!Wdi_NdisMIndicateStatusEx+e1f6
MODULE_NAME: wdiwifi
IMAGE_NAME: wdiwifi.sys
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: e1f6
FAILURE_BUCKET_ID: AV_wdiwifi!Wdi_NdisMIndicateStatusEx
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {44b699e9-9f11-8f8c-410f-31a917f3c7cf}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffbc0f6e0fff7f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8061eacc2d1, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for rtwlanu.sys
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6124
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8467
Key : Analysis.Memory.CommitPeak.Mb
Value: 90
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffbc0f6e0fff7f
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8061eacc2d1
WRITE_ADDRESS: fffff8061f4fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061f40f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8061f40f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffbc0f6e0fff7f
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff80621e6aa90 -- (.trap 0xfffff80621e6aa90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000001d9 rbx=0000000000000000 rcx=00000000000efcf0
rdx=ffffbc0f768651e8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8061eacc2d1 rsp=fffff80621e6ac20 rbp=ffffbc0f6e010280
r8=00000000000efcf0 r9=00000000000e84f0 r10=0000000000001fff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!RtlpHpVsContextAllocateInternal+0x2d1:
fffff806`1eacc2d1 c64431ff00 mov byte ptr [rcx+rsi-1],0 ds:00000000`000efcef=??
Resetting default scope
STACK_TEXT:
fffff806`21e6a948 fffff806`1ec05e69 : 00000000`0000000a ffffbc0f`6e0fff7f 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff806`21e6a950 fffff806`1ec02169 : ffffbc0f`75c00001 00000000`00000000 ffffbc0f`75c00000 ffffbc0f`75c00000 : nt!KiBugCheckDispatch+0x69
fffff806`21e6aa90 fffff806`1eacc2d1 : 0000007e`0000007e ffffbc0f`7b814fe0 00000000`0000007e 00000000`00000000 : nt!KiPageFault+0x469
fffff806`21e6ac20 fffff806`1eacf5dd : 00000000`00007800 fffff806`00007800 fffff806`21e6ad61 00000000`3133724d : nt!RtlpHpVsContextAllocateInternal+0x2d1
fffff806`21e6ac80 fffff806`1eaceebf : ffffbc0f`00000000 ffffbc0f`75c00000 00000000`3133724d 00000000`00000000 : nt!ExAllocateHeapPool+0x6ed
fffff806`21e6adc0 fffff806`1eacee30 : 00000000`00000010 00000000`3133724d 00000000`00007800 ffffbc0f`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f
fffff806`21e6ae10 fffff806`212b67a6 : ffffbc0f`76687448 ffffbc0f`75c00000 ffffbc0f`75c00000 ffffbc0f`80adee10 : nt!ExAllocatePoolWithTagPriority+0x70
fffff806`21e6ae50 fffff806`3136ee17 : fffff806`31ac5780 fffff806`313d8bc2 ffffbc0f`7a200000 fffff806`21e6aed0 : ndis!NdisAllocateMemoryWithTagPriority+0x26
fffff806`21e6ae80 fffff806`31ac5780 : fffff806`313d8bc2 ffffbc0f`7a200000 fffff806`21e6aed0 00000000`00007800 : rtwlanu+0x2ee17
fffff806`21e6ae88 fffff806`313d8bc2 : ffffbc0f`7a200000 fffff806`21e6aed0 00000000`00007800 fffff806`313d7b67 : rtwlanu+0x785780
fffff806`21e6ae90 ffffbc0f`7a200000 : fffff806`21e6aed0 00000000`00007800 fffff806`313d7b67 ffffbc0f`76687448 : rtwlanu+0x98bc2
fffff806`21e6ae98 fffff806`21e6aed0 : 00000000`00007800 fffff806`313d7b67 ffffbc0f`76687448 ffffbc0f`75c3c698 : 0xffffbc0f`7a200000
fffff806`21e6aea0 00000000`00007800 : fffff806`313d7b67 ffffbc0f`76687448 ffffbc0f`75c3c698 ffffbc0f`76be0038 : 0xfffff806`21e6aed0
fffff806`21e6aea8 fffff806`313d7b67 : ffffbc0f`76687448 ffffbc0f`75c3c698 ffffbc0f`76be0038 fffff806`313d7412 : 0x7800
fffff806`21e6aeb0 ffffbc0f`76687448 : ffffbc0f`75c3c698 ffffbc0f`76be0038 fffff806`313d7412 ffffbc0f`76687048 : rtwlanu+0x97b67
fffff806`21e6aeb8 ffffbc0f`75c3c698 : ffffbc0f`76be0038 fffff806`313d7412 ffffbc0f`76687048 fffff806`3137fab4 : 0xffffbc0f`76687448
fffff806`21e6aec0 ffffbc0f`76be0038 : fffff806`313d7412 ffffbc0f`76687048 fffff806`3137fab4 ffffbc0f`75c00000 : 0xffffbc0f`75c3c698
fffff806`21e6aec8 fffff806`313d7412 : ffffbc0f`76687048 fffff806`3137fab4 ffffbc0f`75c00000 fffff806`3173c000 : 0xffffbc0f`76be0038
fffff806`21e6aed0 ffffbc0f`76687048 : fffff806`3137fab4 ffffbc0f`75c00000 fffff806`3173c000 fffff806`316f20b0 : rtwlanu+0x97412
fffff806`21e6aed8 fffff806`3137fab4 : ffffbc0f`75c00000 fffff806`3173c000 fffff806`316f20b0 00000000`0000002b : 0xffffbc0f`76687048
fffff806`21e6aee0 ffffbc0f`75c00000 : fffff806`3173c000 fffff806`316f20b0 00000000`0000002b ffffbc0f`76687048 : rtwlanu+0x3fab4
fffff806`21e6aee8 fffff806`3173c000 : fffff806`316f20b0 00000000`0000002b ffffbc0f`76687048 fffff806`313d8200 : 0xffffbc0f`75c00000
fffff806`21e6aef0 fffff806`316f20b0 : 00000000`0000002b ffffbc0f`76687048 fffff806`313d8200 ffffbc0f`726fb5e0 : rtwlanu+0x3fc000
fffff806`21e6aef8 00000000`0000002b : ffffbc0f`76687048 fffff806`313d8200 ffffbc0f`726fb5e0 ffffbc0f`75c00000 : rtwlanu+0x3b20b0
fffff806`21e6af00 ffffbc0f`76687048 : fffff806`313d8200 ffffbc0f`726fb5e0 ffffbc0f`75c00000 fffff806`3173c000 : 0x2b
fffff806`21e6af08 fffff806`313d8200 : ffffbc0f`726fb5e0 ffffbc0f`75c00000 fffff806`3173c000 ffffbc0f`75c00000 : 0xffffbc0f`76687048
fffff806`21e6af10 ffffbc0f`726fb5e0 : ffffbc0f`75c00000 fffff806`3173c000 ffffbc0f`75c00000 76be0001`00000319 : rtwlanu+0x98200
fffff806`21e6af18 ffffbc0f`75c00000 : fffff806`3173c000 ffffbc0f`75c00000 76be0001`00000319 00000000`00000000 : 0xffffbc0f`726fb5e0
fffff806`21e6af20 fffff806`3173c000 : ffffbc0f`75c00000 76be0001`00000319 00000000`00000000 00000000`00000000 : 0xffffbc0f`75c00000
fffff806`21e6af28 ffffbc0f`75c00000 : 76be0001`00000319 00000000`00000000 00000000`00000000 00000000`00000002 : rtwlanu+0x3fc000
fffff806`21e6af30 76be0001`00000319 : 00000000`00000000 00000000`00000000 00000000`00000002 ffffbc0f`75c00000 : 0xffffbc0f`75c00000
fffff806`21e6af38 00000000`00000000 : 00000000`00000000 00000000`00000002 ffffbc0f`75c00000 00000000`00000148 : 0x76be0001`00000319
SYMBOL_NAME: rtwlanu+2ee17
MODULE_NAME: rtwlanu
IMAGE_NAME: rtwlanu.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2ee17
FAILURE_BUCKET_ID: AV_rtwlanu!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ba94ae44-1665-76da-0bc4-d0359d32d7d0}
Followup: MachineOwner
---------