DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80088aa5891, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for ipfnd630.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-HH6FM2D
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 16
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: d1
BUGCHECK_P1: 8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80088aa5891
READ_ADDRESS: fffff80771b713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80771a283b8: Unable to get Flags value from nt!KdVersionBlock
fffff80771a283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000008
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
DPC_STACK_BASE: FFFFF80777C6EFB0
TRAP_FRAME: fffff80777c6e830 -- (.trap 0xfffff80777c6e830)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000186bf071c5ca rbx=0000000000000000 rcx=ffffb50cb7a6f000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80088aa5891 rsp=fffff80777c6e9c0 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=ffffb50cb779ad80
r11=fffff80777c6e9d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
ipfnd630+0x5891:
fffff800`88aa5891 488b4a08 mov rcx,qword ptr [rdx+8] ds:00000000`00000008=????????????????
Resetting default scope
STACK_TEXT:
fffff807`77c6e6e8 fffff807`717d1ae9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff807`77c6e6f0 fffff807`717cde2b : 00000000`00000000 ffffb50c`bd948080 ffffb50c`b77c41a0 fffff807`771616d6 : nt!KiBugCheckDispatch+0x69
fffff807`77c6e830 fffff800`88aa5891 : ffff3e01`8cc8bb83 00000000`00000000 00000000`00000000 fffff807`77c6ead8 : nt!KiPageFault+0x46b
fffff807`77c6e9c0 ffff3e01`8cc8bb83 : 00000000`00000000 00000000`00000000 fffff807`77c6ead8 00000000`00000001 : ipfnd630+0x5891
fffff807`77c6e9c8 00000000`00000000 : 00000000`00000000 fffff807`77c6ead8 00000000`00000001 00000000`00000000 : 0xffff3e01`8cc8bb83
SYMBOL_NAME: ipfnd630+5891
MODULE_NAME: ipfnd630
IMAGE_NAME: ipfnd630.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5891
FAILURE_BUCKET_ID: AV_ipfnd630!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4d815167-cd26-031a-8c6c-14cbfbfca37f}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80752f75891, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for ipfnd630.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-HH6FM2D
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 14
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: d1
BUGCHECK_P1: 8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80752f75891
READ_ADDRESS: fffff80533f713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80533e283b8: Unable to get Flags value from nt!KdVersionBlock
fffff80533e283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000008
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
DPC_STACK_BASE: FFFFF9043A030FB0
TRAP_FRAME: fffff9043a030830 -- (.trap 0xfffff9043a030830)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00001ba9b5a85ccc rbx=0000000000000000 rcx=ffffa48fe4d25000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80752f75891 rsp=fffff9043a0309c0 rbp=0000000000000000
r8=fffff9043a030ad8 r9=0000000000000000 r10=fffff80752f71408
r11=fffff9043a0309d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
ipfnd630+0x5891:
fffff807`52f75891 488b4a08 mov rcx,qword ptr [rdx+8] ds:00000000`00000008=????????????????
Resetting default scope
STACK_TEXT:
fffff904`3a0306e8 fffff805`33bd1ae9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff904`3a0306f0 fffff805`33bcde2b : 00000000`00000001 ffffa48f`e8d520c0 00000000`00000000 ffffbc81`9d340180 : nt!KiBugCheckDispatch+0x69
fffff904`3a030830 fffff807`52f75891 : ffff0b81`6e5625be ffffa48f`e43231c0 00000000`00000000 fffff904`3a030ad8 : nt!KiPageFault+0x46b
fffff904`3a0309c0 ffff0b81`6e5625be : ffffa48f`e43231c0 00000000`00000000 fffff904`3a030ad8 00000000`00000001 : ipfnd630+0x5891
fffff904`3a0309c8 ffffa48f`e43231c0 : 00000000`00000000 fffff904`3a030ad8 00000000`00000001 00000000`00000000 : 0xffff0b81`6e5625be
fffff904`3a0309d0 00000000`00000000 : fffff904`3a030ad8 00000000`00000001 00000000`00000000 00000000`00000000 : 0xffffa48f`e43231c0
SYMBOL_NAME: ipfnd630+5891
MODULE_NAME: ipfnd630
IMAGE_NAME: ipfnd630.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5891
FAILURE_BUCKET_ID: AV_ipfnd630!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4d815167-cd26-031a-8c6c-14cbfbfca37f}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80e8e375891, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for ipfnd630.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-HH6FM2D
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 11
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: d1
BUGCHECK_P1: 8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80e8e375891
READ_ADDRESS: fffff80256b713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80256a283b8: Unable to get Flags value from nt!KdVersionBlock
fffff80256a283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000008
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
DPC_STACK_BASE: FFFFFB04DF430FB0
TRAP_FRAME: fffffb04df430830 -- (.trap 0xfffffb04df430830)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000028d6eb3823c rbx=0000000000000000 rcx=ffff9c06fb8cd000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80e8e375891 rsp=fffffb04df4309c0 rbp=0000000000000000
r8=fffffb04df430ad8 r9=0000000000000000 r10=fffff80e8e371408
r11=fffffb04df4309d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
ipfnd630+0x5891:
fffff80e`8e375891 488b4a08 mov rcx,qword ptr [rdx+8] ds:00000000`00000008=????????????????
Resetting default scope
STACK_TEXT:
fffffb04`df4306e8 fffff802`567d1ae9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffb04`df4306f0 fffff802`567cde2b : 00000000`00000001 ffff9c07`0058e080 00000000`00000000 ffff8781`53e00180 : nt!KiBugCheckDispatch+0x69
fffffb04`df430830 fffff80e`8e375891 : ffff07a6`b2a1a9b8 ffff9c06`f8f231c0 00000000`00000000 fffffb04`df430ad8 : nt!KiPageFault+0x46b
fffffb04`df4309c0 ffff07a6`b2a1a9b8 : ffff9c06`f8f231c0 00000000`00000000 fffffb04`df430ad8 00000000`00000001 : ipfnd630+0x5891
fffffb04`df4309c8 ffff9c06`f8f231c0 : 00000000`00000000 fffffb04`df430ad8 00000000`00000001 00000000`00000000 : 0xffff07a6`b2a1a9b8
fffffb04`df4309d0 00000000`00000000 : fffffb04`df430ad8 00000000`00000001 00000000`00000000 00000000`00000000 : 0xffff9c06`f8f231c0
SYMBOL_NAME: ipfnd630+5891
MODULE_NAME: ipfnd630
IMAGE_NAME: ipfnd630.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5891
FAILURE_BUCKET_ID: AV_ipfnd630!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4d815167-cd26-031a-8c6c-14cbfbfca37f}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80182015891, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for ipfnd630.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-HH6FM2D
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 16
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: d1
BUGCHECK_P1: 8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80182015891
READ_ADDRESS: fffff8033a3713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8033a2283b8: Unable to get Flags value from nt!KdVersionBlock
fffff8033a2283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000008
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
DPC_STACK_BASE: FFFFC00284630FB0
TRAP_FRAME: ffffc00284630830 -- (.trap 0xffffc00284630830)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000e94d7c3f282 rbx=0000000000000000 rcx=ffff828dd100f000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80182015891 rsp=ffffc002846309c0 rbp=0000000000000000
r8=ffffc00284630ad8 r9=0000000000000000 r10=fffff80182011408
r11=ffffc002846309d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
ipfnd630+0x5891:
fffff801`82015891 488b4a08 mov rcx,qword ptr [rdx+8] ds:00000000`00000008=????????????????
Resetting default scope
STACK_TEXT:
ffffc002`846306e8 fffff803`39fd1ae9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffc002`846306f0 fffff803`39fcde2b : 00000000`00000000 ffff828d`d64d4080 ffff828d`ced051a0 fffff803`3f4c16d6 : nt!KiBugCheckDispatch+0x69
ffffc002`84630830 fffff801`82015891 : ffff2c87`91cbd077 fffff803`3ee1208d 00000000`00000000 ffffc002`84630ad8 : nt!KiPageFault+0x46b
ffffc002`846309c0 ffff2c87`91cbd077 : fffff803`3ee1208d 00000000`00000000 ffffc002`84630ad8 00000000`00000001 : ipfnd630+0x5891
ffffc002`846309c8 fffff803`3ee1208d : 00000000`00000000 ffffc002`84630ad8 00000000`00000001 00000000`00000000 : 0xffff2c87`91cbd077
ffffc002`846309d0 ffffc002`84630ad8 : ffff828d`ced051a0 00000000`00000002 ffff828d`d10106e0 fffff801`82011499 : WppRecorder!WppAutoLogTrace+0x1bd
ffffc002`84630a30 ffff828d`ced051a0 : 00000000`00000002 ffff828d`d10106e0 fffff801`82011499 ffffac00`0f10dc00 : 0xffffc002`84630ad8
ffffc002`84630a38 00000000`00000002 : ffff828d`d10106e0 fffff801`82011499 ffffac00`0f10dc00 00000000`00000004 : 0xffff828d`ced051a0
ffffc002`84630a40 ffff828d`d10106e0 : fffff801`82011499 ffffac00`0f10dc00 00000000`00000004 ffffc002`84630b39 : 0x2
ffffc002`84630a48 fffff801`82011499 : ffffac00`0f10dc00 00000000`00000004 ffffc002`84630b39 ffff828d`d100f000 : 0xffff828d`d10106e0
ffffc002`84630a50 ffffac00`0f10dc00 : 00000000`00000004 ffffc002`84630b39 ffff828d`d100f000 ffff828d`ced051a0 : ipfnd630+0x1499
ffffc002`84630a58 00000000`00000004 : ffffc002`84630b39 ffff828d`d100f000 ffff828d`ced051a0 fffff803`3f4d747a : 0xffffac00`0f10dc00
ffffc002`84630a60 ffffc002`84630b39 : ffff828d`d100f000 ffff828d`ced051a0 fffff803`3f4d747a ffffac00`0f10dc00 : 0x4
ffffc002`84630a68 ffff828d`d100f000 : ffff828d`ced051a0 fffff803`3f4d747a ffffac00`0f10dc00 00000000`00000000 : 0xffffc002`84630b39
ffffc002`84630a70 ffff828d`ced051a0 : fffff803`3f4d747a ffffac00`0f10dc00 00000000`00000000 ffff828d`ceff1cc0 : 0xffff828d`d100f000
ffffc002`84630a78 fffff803`3f4d747a : ffffac00`0f10dc00 00000000`00000000 ffff828d`ceff1cc0 00000000`00000000 : 0xffff828d`ced051a0
ffffc002`84630a80 fffff803`3f49faeb : ffff828d`ce691520 ffff828d`ceff1e78 ffff828d`ce635980 00000000`00020000 : ndis!ndisQueuedMiniportDpcWorkItem+0x3898a
ffffc002`84630ba0 fffff803`39e6a985 : ffffac00`0e802f80 ffff828d`ce635980 ffffac00`0e800180 ffffac00`00000002 : ndis!ndisPeriodicReceivesTimer+0xeb
ffffc002`84630c40 fffff803`39e69fdf : ffffac00`0e800180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x305
ffffc002`84630d80 fffff803`39fc6d05 : 00000000`00000000 ffffac00`0e800180 00000000`00000000 00000000`00000000 : nt!KiRetireDpcList+0x1ef
ffffc002`84630fb0 fffff803`39fc6af0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
ffffc002`84c5f5a0 fffff803`39fc61c0 : 00000000`00000000 00000000`00000000 00000000`00000001 ffff828d`d1978080 : nt!KiDispatchInterruptContinue
ffffc002`84c5f5d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0x2f0
SYMBOL_NAME: ipfnd630+5891
MODULE_NAME: ipfnd630
IMAGE_NAME: ipfnd630.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5891
FAILURE_BUCKET_ID: AV_ipfnd630!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4d815167-cd26-031a-8c6c-14cbfbfca37f}
Followup: MachineOwner
---------
1: kd> lmvm ipfnd630
Browse full module list
start end module name
fffff801`82010000 fffff801`82021000 ipfnd630 T (no symbols)
Loaded symbol image file: ipfnd630.sys
Image path: \SystemRoot\System32\drivers\ipfnd630.sys
Image name: ipfnd630.sys
Browse all global symbols functions data
Timestamp: Fri May 17 09:27:15 2013 (5195CDC3)
CheckSum: 00010DF9
ImageSize: 00011000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables: