DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8015b2ef130, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8015b2d37d2, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 26
Key : Analysis.Elapsed.Sec
Value: 31
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: fffff8015b2ef130
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8015b2d37d2
READ_ADDRESS: fffff801447713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff8015b2ef130
CURRENT_IRQL: 2
FAULTING_IP:
pacer!PcFilterSendNetBufferLists+27c2
fffff801`5b2d37d2 4c8b1557b90100 mov r10,qword ptr [pacer!_guard_fids_table <PERF> (pacer+0x1f130) (fffff801`5b2ef130)]
CPU_COUNT: 4
CPU_MHZ: db0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: 9
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: AV
PROCESS_NAME: chrome.exe
ANALYSIS_SESSION_HOST: DESKTOP-I8FA0KP
ANALYSIS_SESSION_TIME: 08-25-2019 23:49:28.0765
ANALYSIS_VERSION: 10.0.18914.1001 amd64fre
TRAP_FRAME: ffffa4043d3e1360 -- (.trap 0xffffa4043d3e1360)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa4043d3e15b0 rbx=0000000000000000 rcx=ffffa4043d3e1602
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015b2d37d2 rsp=ffffa4043d3e14f0 rbp=ffffa4043d3e15f0
r8=0000000000000000 r9=0000000000000000 r10=0000000000000001
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
pacer!PcFilterSendNetBufferLists+0x27c2:
fffff801`5b2d37d2 4c8b1557b90100 mov r10,qword ptr [pacer!_guard_fids_table <PERF> (pacer+0x1f130) (fffff801`5b2ef130)] ds:fffff801`5b2ef130=0000029800000409
Resetting default scope
MISALIGNED_IP:
pacer!PcFilterSendNetBufferLists+27c2
fffff801`5b2d37d2 4c8b1557b90100 mov r10,qword ptr [pacer!_guard_fids_table <PERF> (pacer+0x1f130) (fffff801`5b2ef130)]
LAST_CONTROL_TRANSFER: from fffff801443d1ae9 to fffff801443bfcc0
STACK_TEXT:
ffffa404`3d3e1218 fffff801`443d1ae9 : 00000000`0000000a fffff801`5b2ef130 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffa404`3d3e1220 fffff801`443cde2b : ffffe589`de255902 ffffe589`e1d34030 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa404`3d3e1360 fffff801`5b2d37d2 : 00000000`00000000 ffffe589`de24f460 00000000`00000800 fffff801`4864f2e0 : nt!KiPageFault+0x46b
ffffa404`3d3e14f0 fffff801`482dea49 : 00000000`00000000 ffffa404`3d3e16c9 00000000`00000004 ffffa404`3d3e19d8 : pacer!PcFilterSendNetBufferLists+0x27c2
ffffa404`3d3e1660 fffff801`4831081d : 00000000`00000000 ffffa404`3d3e1729 ffffe589`ddbca010 00000000`ffffffff : ndis!ndisCallSendHandler+0x59
ffffa404`3d3e16b0 fffff801`482dc13f : 00000000`00000000 ffffe589`dda3c1a0 ffffe589`de2c1ba0 00000000`00000000 : ndis!ndisInvokeNextSendHandler+0x111
ffffa404`3d3e1780 fffff801`484c1e69 : ffffe589`de2559a0 ffffe589`e5a0db90 00000000`00000000 00000000`00000000 : ndis!NdisSendNetBufferLists+0x1af
ffffa404`3d3e1880 fffff801`484bbe41 : 00000000`00000007 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlFastSendPackets+0x99
ffffa404`3d3e1900 fffff801`4846bed8 : 00000000`00000000 00000000`00000014 ffffe589`de24f460 ffffa404`3d3e1e80 : tcpip!IpNlpFastContinueSendDatagrams+0x4d1
ffffa404`3d3e1a50 fffff801`4846b5db : 00000000`00000000 ffffa404`3d3e1e80 fffff801`4864f2e0 ffffe589`e48959a0 : tcpip!IppSendDatagramsCommon+0x6c8
ffffa404`3d3e1bd0 fffff801`484773a8 : 00000000`00000014 ffffe589`e7111a01 ffffe589`e18fedc0 00000000`00000000 : tcpip!IpNlpFastSendDatagram+0x23b
ffffa404`3d3e1ca0 fffff801`484c2876 : 00000000`00000500 00000000`00000200 ffffa404`3d3e2120 00000000`00000000 : tcpip!TcpTcbSend+0x558
ffffa404`3d3e2020 fffff801`484c23e0 : 00000000`00010000 00000000`00000101 fffff801`484c23a0 ffffa404`3d3e22e0 : tcpip!TcpDisconnectTcb+0x322
ffffa404`3d3e21d0 fffff801`44269918 : 00000000`00000000 00000000`00000000 ffffa404`3d3e2601 00000000`00000000 : tcpip!TcpTlConnectionDisconnectCalloutRoutine+0x40
ffffa404`3d3e2200 fffff801`4426988d : fffff801`484c23a0 ffffa404`3d3e22e0 ffffe589`dd01af60 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffa404`3d3e2270 fffff801`484c389a : ffffe589`e4a59c28 00000000`00000000 000001bc`bef7b520 fffff801`5b23519a : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffa404`3d3e22b0 fffff801`5b24e2bb : 00000000`00000000 ffffa404`3d3e2379 00000000`00000000 00000000`00000000 : tcpip!TcpTlConnectionDisconnect+0x6a
ffffa404`3d3e2320 fffff801`5b24e630 : 00000000`00000000 ffffe589`e1d16500 ffffe589`e29d2b40 00000000`00000000 : afd!AfdBeginDisconnect+0x13f
ffffa404`3d3e23e0 fffff801`5b233c44 : ffffa404`3d3e2978 ffffa404`3d3e2978 ffffe589`e3b87890 fffff801`443c6ecf : afd!AfdPartialDisconnect+0x250
ffffa404`3d3e2520 fffff801`447e6b2b : 00000000`00000000 00000000`00000000 ffffa404`3d3e2b80 00000000`0001202b : afd!AfdFastIoDeviceControl+0x5b4
ffffa404`3d3e2900 fffff801`447e63f6 : 00000000`00000000 00000000`000003b4 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x71b
ffffa404`3d3e2a20 fffff801`443d1515 : ffffe589`e2861080 00000010`c79ff808 ffffa404`3d3e2aa8 ffffa404`3d3e2b80 : nt!NtDeviceIoControlFile+0x56
ffffa404`3d3e2a90 00007ffb`f4e9c144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000010`c79ff148 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`f4e9c144
CHKIMG_EXTENSION: !chkimg -lo 50 -db !pacer
6 errors : !pacer (fffff8015b2d37c6-fffff8015b2d37fe)
fffff8015b2d37c0 28 01 00 00 74 0a *53 32 ed 44 88 6c 24 51 *69 16 (...t.S2.D.l$Qi.
fffff8015b2d37d0 b1 02 4c 8b 15 57 b9 01 00 e8 02 e6 01 e9 *d0 0f ..L..W..........
fffff8015b2d37e0 b6 e8 88 44 24 51 *3a c9 4c 8b 15 89 2b 01 29 e8 ...D$Q:.L...+.).
fffff8015b2d37f0 ec e3 f8 e8 41 b0 *41 44 8b f8 41 0f b6 d0 *04 89 ....A.AD..A.....
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE
BUCKET_ID: MEMORY_CORRUPTION_STRIDE
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_STRIDE
TARGET_TIME: 2019-08-16T08:17:23.000Z
OSBUILD: 18362
OSSERVICEPACK: 295
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1998-05-31 00:12:57
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 7b1e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_stride
FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}
Followup: memory_corruption