*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000012774e3f03a, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000022, value 0 = read operation, 1 = write operation
Arg4: 0000012774e3f03a, address which referenced memory
Debugging Details:
------------------
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
0000012774e3f03a
CURRENT_IRQL: 2
FAULTING_IP:
+29af9474679359
00000127`74e3f03a ?? ???
PROCESS_NAME: System
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
DPC_STACK_BASE: FFFFF30108230FB0
TRAP_FRAME: fffff30108229910 -- (.trap 0xfffff30108229910)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80674feff90 rbx=0000000000000000 rcx=fffff7d5c000f000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000012774e3f03a rsp=fffff30108229aa0 rbp=fffff30108229b50
r8=0000000000000008 r9=0000000000000000 r10=0000fffff80674fe
r11=ffffbdfc2a600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz ac pe cy
00000127`74e3f03a ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80675005e69 to fffff80674ff3ea0
FAILED_INSTRUCTION_ADDRESS:
+29af9474679359
00000127`74e3f03a ?? ???
STACK_TEXT:
fffff301`082297c8 fffff806`75005e69 : 00000000`0000000a 00000127`74e3f03a 00000000`000000ff 00000000`00000022 : nt!KeBugCheckEx
fffff301`082297d0 fffff806`75002169 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffffff`ffffffff : nt!KiBugCheckDispatch+0x69
fffff301`08229910 00000127`74e3f03a : 00000000`00000001 fffff806`74c00000 ffffce00`cb2a1180 ffffe106`d0d73010 : nt!KiPageFault+0x469
fffff301`08229aa0 00000000`00000001 : fffff806`74c00000 ffffce00`cb2a1180 ffffe106`d0d73010 ffffce00`cb2a1180 : 0x00000127`74e3f03a
fffff301`08229aa8 fffff806`74c00000 : ffffce00`cb2a1180 ffffe106`d0d73010 ffffce00`cb2a1180 fffff806`74ffa37b : 0x1
fffff301`08229ab0 ffffce00`cb2a1180 : ffffe106`d0d73010 ffffce00`cb2a1180 fffff806`74ffa37b fffff301`08229bf0 : nt!`_CmDeleteDeviceContainerRegKeyWorker'::`2'::DeviceContainersKeyPrefix <PERF> (nt+0x0)
fffff301`08229ab8 ffffe106`d0d73010 : ffffce00`cb2a1180 fffff806`74ffa37b fffff301`08229bf0 00000000`00000001 : 0xffffce00`cb2a1180
fffff301`08229ac0 ffffce00`cb2a1180 : fffff806`74ffa37b fffff301`08229bf0 00000000`00000001 00000000`00040046 : 0xffffe106`d0d73010
fffff301`08229ac8 fffff806`74ffa37b : fffff301`08229bf0 00000000`00000001 00000000`00040046 fffff806`74f07018 : 0xffffce00`cb2a1180
fffff301`08229ad0 fffff806`74ff79ca : ffffffff`00000000 ffffce00`cb2ac340 ffffe106`dcdeb080 00000000`00000dc0 : nt!KiDpcInterrupt+0x2cb
fffff301`08229c60 00000000`00000000 : fffff301`0822a000 fffff301`08224000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+469
fffff806`75002169 33c0 xor eax,eax
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+469
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.19041.508
BUCKET_ID_FUNC_OFFSET: 469
FAILURE_BUCKET_ID: AV_CODE_AV_BAD_IP_nt!KiPageFault
BUCKET_ID: AV_CODE_AV_BAD_IP_nt!KiPageFault
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_code_av_bad_ip_nt!kipagefault
FAILURE_ID_HASH: {73cd60cc-83fa-6b76-df08-1961c31d7403}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000004179453b, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 000000004179453b, address which referenced memory
Debugging Details:
------------------
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
000000004179453b
CURRENT_IRQL: 2
FAULTING_IP:
+2e5571c74679359
00000000`4179453b ?? ???
PROCESS_NAME: System
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
DPC_STACK_BASE: FFFF81838A430FB0
TRAP_FRAME: ffff81838a429630 -- (.trap 0xffff81838a429630)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000018521b0256c rbx=0000000000000000 rcx=fffff79740002000
rdx=0000004f875fd72d rsi=0000000000000000 rdi=0000000000000000
rip=000000004179453b rsp=ffff81838a4297c0 rbp=ffffbb8755e8ace8
r8=000001359a504e3f r9=0000000000000000 r10=0000fffff8004176
r11=ffff73ff47e00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
00000000`4179453b ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80041805e69 to fffff800417f3ea0
FAILED_INSTRUCTION_ADDRESS:
+2e5571c74679359
00000000`4179453b ?? ???
STACK_TEXT:
ffff8183`8a4294e8 fffff800`41805e69 : 00000000`0000000a 00000000`4179453b 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
ffff8183`8a4294f0 fffff800`41802169 : ffff8183`8a429680 fffff800`4395a08e ffffbb87`556f9ae0 fffff800`51e419c7 : nt!KiBugCheckDispatch+0x69
ffff8183`8a429630 00000000`4179453b : ffff8400`1c8a1180 00000000`00989680 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffff8183`8a4297c0 ffff8400`1c8a1180 : 00000000`00989680 00000000`00000000 00000000`00000000 00000000`00000001 : 0x4179453b
ffff8183`8a4297c8 00000000`00989680 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00989680 : 0xffff8400`1c8a1180
ffff8183`8a4297d0 00000000`00000000 : 00000000`00000000 00000000`00000001 00000000`00989680 00000000`00000001 : 0x989680
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+469
fffff800`41802169 33c0 xor eax,eax
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+469
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.19041.508
BUCKET_ID_FUNC_OFFSET: 469
FAILURE_BUCKET_ID: AV_CODE_AV_BAD_IP_nt!KiPageFault
BUCKET_ID: AV_CODE_AV_BAD_IP_nt!KiPageFault
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_code_av_bad_ip_nt!kipagefault
FAILURE_ID_HASH: {73cd60cc-83fa-6b76-df08-1961c31d7403}
Followup: MachineOwner
---------