DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000042c2d07c, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: 000000006b5e8cdc, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 13
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: 42c2d07c
BUGCHECK_P2: ff
BUGCHECK_P3: 1
BUGCHECK_P4: 6b5e8cdc
PROCESS_NAME: metin2client.exe
ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffffc386`123179b8 fffff800`4e1d32e9 : 00000000`0000000a 00000000`42c2d07c 00000000`000000ff 00000000`00000001 : nt!KeBugCheckEx
ffffc386`123179c0 fffff800`4e1cf62b : 00000000`00033a00 ffffc386`12317b80 ffffffff`ffffd8f0 ffffc386`12317b80 : nt!KiBugCheckDispatch+0x69
ffffc386`12317b00 00000000`6b5e8cdc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x46b
00000000`0733ed4c 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6b5e8cdc
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_ANALYSIS_INCONCLUSIVE!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4db28eb8-8dc1-6fa7-07d1-5c7a4037b53c}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8048bcaf76f, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffc985cdbbb22d, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 6
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 8
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8048bcaf76f
BUGCHECK_P3: 0
BUGCHECK_P4: ffffc985cdbbb22d
READ_ADDRESS: fffff804799733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8047982a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8047982a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffc985cdbbb22d
EXCEPTION_PARAMETER2: ffffc985cdbbb22d
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: metin2client.exe
DPC_STACK_BASE: FFFFF8047FA6EFB0
STACK_TEXT:
fffff804`7fa6d938 fffff804`796a695e : 00000000`0000001e ffffffff`c0000005 fffff804`8bcaf76f 00000000`00000000 : nt!KeBugCheckEx
fffff804`7fa6d940 fffff804`795cb182 : fffff804`79911000 fffff804`79400000 0005e380`00ab7000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22
fffff804`7fa6d980 fffff804`794fa2c5 : 00000000`00000000 00000000`00000000 fffff804`7fa6def0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
fffff804`7fa6d9b0 fffff804`794fe85e : fffff804`7fa6e8e8 fffff804`7fa6e630 fffff804`7fa6e8e8 ffffc986`3e7c8050 : nt!RtlDispatchException+0x4a5
fffff804`7fa6e100 fffff804`795d431d : 00000000`00000003 00000000`00000001 00000000`00000000 fffff804`7fa6e8b0 : nt!KiDispatchException+0x16e
fffff804`7fa6e7b0 fffff804`795d0503 : ffffc986`3e7c81a0 ffffc986`4272b22c ffffa180`f0533d00 00000000`01f2fbda : nt!KiExceptionDispatch+0x11d
fffff804`7fa6e990 fffff804`8bcaf76f : ffffc986`3e7c8d58 ffffc986`3e7c8d58 00000000`dd685095 00000000`00000000 : nt!KiPageFault+0x443
fffff804`7fa6eb20 fffff804`8bcb818d : ffffc986`3e7c8d58 000070da`c97bc102 ffffc986`3a0f6970 ffffc986`3e7c8d58 : USBPORT!USBPORT_Core_UsbDoneDpc_Worker+0x87f
fffff804`7fa6ebc0 fffff804`794c115a : fffff804`7fa6ed40 ffffc986`3a0d5000 ffffc986`3e7c8d70 fffff804`7824c180 : USBPORT!USBPORT_Xdpc_Worker_DoneDpc+0x17d
fffff804`7fa6ec40 fffff804`794c07af : 00000000`00000014 00000000`00989680 00000000`00248900 00000000`00000018 : nt!KiExecuteAllDpcs+0x30a
fffff804`7fa6ed80 fffff804`795c9395 : 00000000`00000000 fffff804`7824c180 ffffa180`f01ca640 00000000`00000002 : nt!KiRetireDpcList+0x1ef
fffff804`7fa6efb0 fffff804`795c9180 : fffff804`79375b50 fffff804`7935f37a ffffffff`ffffd8f0 00000000`0b21fda0 : nt!KxRetireDpcList+0x5
fffffb03`6003eac0 fffff804`795c8a35 : 00000000`00000002 fffff804`795c36c1 00000000`20e05084 fffffb03`6003eb80 : nt!KiDispatchInterruptContinue
fffffb03`6003eaf0 fffff804`795c36c1 : 00000000`20e05084 fffffb03`6003eb80 ffffa180`f01ca640 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
fffffb03`6003eb00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0xb1
SYMBOL_NAME: USBPORT!USBPORT_Core_UsbDoneDpc_Worker+87f
MODULE_NAME: USBPORT
IMAGE_NAME: USBPORT.SYS
IMAGE_VERSION: 10.0.18362.1059
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 87f
FAILURE_BUCKET_ID: 0x1E_c0000005_R_USBPORT!USBPORT_Core_UsbDoneDpc_Worker
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ddef6789-684a-c57d-78a3-ee390a7db6ad}
Followup: MachineOwner
---------
0: kd> lmvm USBPORT
Browse full module list
start end module name
fffff804`8bca0000 fffff804`8bd1a000 USBPORT # (pdb symbols) C:\ProgramData\Dbg\sym\usbport.pdb\3807A28D857903C3A952450EC335E5101\usbport.pdb
Loaded symbol image file: USBPORT.SYS
Mapped memory image file: C:\ProgramData\Dbg\sym\USBPORT.SYS\A13767BB7a000\USBPORT.SYS
Image path: \SystemRoot\System32\drivers\USBPORT.SYS
Image name: USBPORT.SYS
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: A13767BB (This is a reproducible build file hash, not a timestamp)
CheckSum: 0007EE32
ImageSize: 0007A000
File version: 10.0.18362.1059
Product version: 10.0.18362.1059
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 2.0 Dll
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: usbport.sys
OriginalFilename: usbport.sys
ProductVersion: 10.0.18362.1059
FileVersion: 10.0.18362.1059 (WinBuild.160101.0800)
FileDescription: USB 1.1 & 2.0 Port Driver
LegalCopyright: © Microsoft Corporation. All rights reserved.