IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a001f293a0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000372e341, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for netr28x.sys
GetUlongPtrFromAddress: unable to read from fffff800036bb300
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.24545.amd64fre.win7sp1_ldr_escrow.200102-1707
DUMP_TYPE: 2
BUGCHECK_P1: fffff8a001f293a0
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8000372e341
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800036bb100
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800036bb2f0
GetUlongPtrFromAddress: unable to read from fffff800036bb4a8
GetPointerFromAddress: unable to read from fffff800036bb0d8
fffff8a001f293a0 Paged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!HvpDoAllocateCell+101
fffff800`0372e341 89443d00 mov dword ptr [rbp+rdi],eax
CPU_COUNT: 4
CPU_MHZ: 8f6
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-7KGVC4E
ANALYSIS_SESSION_TIME: 04-02-2020 23:11:25.0687
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: fffff80003c0a950 -- (.trap 0xfffff80003c0a950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000c60 rbx=0000000000000000 rcx=0000000000000370
rdx=0000000000000007 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000372e341 rsp=fffff80003c0aae0 rbp=0000000000000030
r8=fffff8a000024010 r9=0000000000000005 r10=fffff8a001f29000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!HvpDoAllocateCell+0x101:
fffff800`0372e341 89443d00 mov dword ptr [rbp+rdi],eax ss:0018:00000000`00000030=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800034c02e9 to fffff800034b1ea0
STACK_TEXT:
fffff800`03c0a808 fffff800`034c02e9 : 00000000`0000000a fffff8a0`01f293a0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`03c0a810 fffff800`034be0ce : 00000000`00000001 fffff8a0`01f293a0 00000000`00000000 fffff8a0`00024010 : nt!KiBugCheckDispatch+0x69
fffff800`03c0a950 fffff800`0372e341 : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`00049c20 00000000`00000000 : nt!KiPageFault+0x44e
fffff800`03c0aae0 fffff800`036ed6bd : fffff8a0`00024010 00000000`00000000 00000000`00000000 00000000`ffffffff : nt!HvpDoAllocateCell+0x101
fffff800`03c0ab40 fffff800`036ed731 : 00000000`00000000 fffff8a0`04dede40 00000000`00000008 fffff800`03701b5c : nt!HvAllocateCell+0x55
fffff800`03c0ab70 fffff800`03738977 : fffff8a0`00024010 fffff8a0`00024010 fffff8a0`04e7c720 fffff800`03c0ae18 : nt!CmpAddValueKeyNew+0x69
fffff800`03c0ac40 fffff800`038c97c3 : 01d6081c`8a808614 fffff800`03c0aff0 fffff8a0`04ba3948 00000000`00000000 : nt!CmpSetValueKeyNew+0x77
fffff800`03c0ac90 fffff800`0372fd5e : fffff8a0`09b586b0 fffff800`03c0ae18 00000000`00000004 fffff800`03c0b210 : nt!CmSetValueKey+0xba3
fffff800`03c0add0 fffff800`034bff53 : ffffffff`8000042c 00000000`00000002 fffffa80`00000000 fffff800`00000004 : nt!NtSetValueKey+0x34e
fffff800`03c0af00 fffff800`034b56c0 : fffff800`03802d12 fffff800`03c0b248 fffff880`01b19152 fffffa80`08bc21b0 : nt!KiSystemServiceCopyEnd+0x13
fffff800`03c0b108 fffff800`03802d12 : fffff800`03c0b248 fffff880`01b19152 fffffa80`08bc21b0 fffff800`03c0b270 : nt!KiServiceLinkage
fffff800`03c0b110 fffff880`01b20d96 : 00000000`00000004 fffffa80`0476e520 00000000`00000000 00000000`000007ff : nt!RtlWriteRegistryValue+0x62
fffff800`03c0b170 fffff880`05d4198d : fffff800`03c0b270 fffff880`05f50c28 00000000`00000000 00000000`00000000 : ndis!NdisWriteConfiguration+0x156
fffff800`03c0b1d0 fffff800`03c0b270 : fffff880`05f50c28 00000000`00000000 00000000`00000000 00000000`001801a9 : netr28x+0x4b98d
fffff800`03c0b1d8 fffff880`05f50c28 : 00000000`00000000 00000000`00000000 00000000`001801a9 fffffa80`072eb1a0 : 0xfffff800`03c0b270
fffff800`03c0b1e0 00000000`00000000 : 00000000`00000000 00000000`001801a9 fffffa80`072eb1a0 00000000`00000000 : netr28x+0x25ac28
THREAD_SHA1_HASH_MOD_FUNC: 80858fdf941bd645ff48b6997b30f63ac59926fb
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 2077ce58d7ce81492071df22666b77e7a2a74067
THREAD_SHA1_HASH_MOD: 5d50876435db08b990ce5928fe5c90526c26b16c
FOLLOWUP_IP:
netr28x+4b98d
fffff880`05d4198d ?? ???
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: netr28x+4b98d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netr28x
IMAGE_NAME: netr28x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5534d37a
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0xA_netr28x+4b98d
BUCKET_ID: X64_0xA_netr28x+4b98d
PRIMARY_PROBLEM_CLASS: X64_0xA_netr28x+4b98d
TARGET_TIME: 2020-04-01T11:56:12.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2020-01-03 05:56:30
BUILDDATESTAMP_STR: 200102-1707
BUILDLAB_STR: win7sp1_ldr_escrow
BUILDOSVER_STR: 6.1.7601.24545.amd64fre.win7sp1_ldr_escrow.200102-1707
ANALYSIS_SESSION_ELAPSED_TIME: 995
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xa_netr28x+4b98d
FAILURE_ID_HASH: {a6eb3f60-a5c3-0bd6-051c-41bf4427925d}
Followup: MachineOwner
---------