DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb1100
GetUlongFromAddress: unable to read from fffff80002eb11c8
0000000000000000 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
+31d6ac749c9359
00000000`00000000 ?? ???
PROCESS_NAME: System
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xD1
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
TRAP_FRAME: fffff88002fff9b0 -- (.trap 0xfffff88002fff9b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800856d8a0 rbx=0000000000000000 rcx=fffffa800856d880
rdx=fffffa800856d880 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=fffff88002fffb48 rbp=fffffa8006350060
r8=fffffa800856d8a0 r9=0000000000000000 r10=fffffa8006350290
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
00000000`00000000 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c749a9 to fffff80002c75400
FAILED_INSTRUCTION_ADDRESS:
+31d6ac749c9359
00000000`00000000 ?? ???
STACK_TEXT:
fffff880`02fffb48 fffff880`0106f443 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0
fffff880`02fffb50 fffff800`02c8007c : fffff880`02fd7180 00000000`00000000 fffffa80`06350128 fffffa80`076f1410 : storport!RaidpAdapterDpcRoutine+0x53
fffff880`02fffb90 fffff800`02c6d10a : fffff880`02fd7180 fffff880`02fe1fc0 00000000`00000000 fffff880`0106f3f0 : nt!KiRetireDpcList+0x1bc
fffff880`02fffc40 00000000`00000000 : fffff880`03000000 fffff880`02ffa000 fffff880`02fffc00 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: .trap 0xfffff88002fff9b0 ; kb
FOLLOWUP_IP:
storport!RaidpAdapterDpcRoutine+53
fffff880`0106f443 ff442448 inc dword ptr [rsp+48h]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: storport!RaidpAdapterDpcRoutine+53
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: storport
IMAGE_NAME: storport.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 52f04432
IMAGE_VERSION: 6.1.7601.18386
FAILURE_BUCKET_ID: X64_0xD1_CODE_AV_NULL_IP_storport!RaidpAdapterDpcRoutine+53
BUCKET_ID: X64_0xD1_CODE_AV_NULL_IP_storport!RaidpAdapterDpcRoutine+53
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xd1_code_av_null_ip_storport!raidpadapterdpcroutine+53
FAILURE_ID_HASH: {a590f9c6-dcc2-12ec-1154-7d8586f4421c}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002c4783e, Address of the instruction which caused the bugcheck
Arg3: fffff8800b734ff0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba
FAULTING_IP:
nt!KiSignalSynchronizationObject+4e
fffff800`02c4783e 488908 mov qword ptr [rax],rcx
CONTEXT: fffff8800b734ff0 -- (.cxr 0xfffff8800b734ff0;r)
rax=f48a2455cc5dda95 rbx=fffffa8007e456c8 rcx=fbce390f00000000
rdx=0000000000000001 rsi=fffffa8007e456c0 rdi=fbce390f00000000
rip=fffff80002c4783e rsp=fffff8800b7359c0 rbp=fffffa80090f7200
r8=0000000000000000 r9=0000000000000002 r10=0000000000000148
r11=0000000000000000 r12=fffffa80090f7338 r13=fffff88002f00180
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!KiSignalSynchronizationObject+0x4e:
fffff800`02c4783e 488908 mov qword ptr [rax],rcx ds:002b:f48a2455`cc5dda95=????????????????
Last set context:
rax=f48a2455cc5dda95 rbx=fffffa8007e456c8 rcx=fbce390f00000000
rdx=0000000000000001 rsi=fffffa8007e456c0 rdi=fbce390f00000000
rip=fffff80002c4783e rsp=fffff8800b7359c0 rbp=fffffa80090f7200
r8=0000000000000000 r9=0000000000000002 r10=0000000000000148
r11=0000000000000000 r12=fffffa80090f7338 r13=fffff88002f00180
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!KiSignalSynchronizationObject+0x4e:
fffff800`02c4783e 488908 mov qword ptr [rax],rcx ds:002b:f48a2455`cc5dda95=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: audiodg.exe
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002c4783e
STACK_TEXT:
fffff880`0b7359c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSignalSynchronizationObject+0x4e
FOLLOWUP_IP:
nt!KiSignalSynchronizationObject+4e
fffff800`02c4783e 488908 mov qword ptr [rax],rcx
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KiSignalSynchronizationObject+4e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5e0ead5e
IMAGE_VERSION: 6.1.7601.24545
STACK_COMMAND: .cxr 0xfffff8800b734ff0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!KiSignalSynchronizationObject+4e
BUCKET_ID: X64_0x3B_nt!KiSignalSynchronizationObject+4e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x3b_nt!kisignalsynchronizationobject+4e
FAILURE_ID_HASH: {f522fa69-6690-af1c-4b0f-cd4c2b72fc66}
Followup: MachineOwner
---------
VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: fffffa80090e84e0, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff88003e6b8bc, The pointer into responsible device driver module (e.g. owner tag).
Arg3: 0000000000000000, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000002, Optional internal context dependent data.
Debugging Details:
------------------
FAULTING_IP:
atikmpag+e8bc
fffff880`03e6b8bc 4883ec28 sub rsp,28h
DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x116
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
STACK_TEXT:
fffff880`025a0888 fffff880`03f383f0 : 00000000`00000116 fffffa80`090e84e0 fffff880`03e6b8bc 00000000`00000000 : nt!KeBugCheckEx
fffff880`025a0890 fffff880`03f380fa : fffff880`03e6b8bc fffffa80`090e84e0 00000000`00000000 fffffa80`070ca010 : dxgkrnl!TdrBugcheckOnTimeout+0xec
fffff880`025a08d0 fffff880`12555fef : fffffa80`090e84e0 00000000`00000000 00000000`00000000 fffffa80`070ca010 : dxgkrnl!TdrIsRecoveryRequired+0x1a2
fffff880`025a0900 fffff880`1257fdc9 : 00000000`ffffffff 00000000`00037b69 00000000`00000000 00000000`00000002 : dxgmms1!VidSchiReportHwHang+0x40b
fffff880`025a09e0 fffff880`1257e50f : 00000000`00000102 00000000`00000000 00000000`00037b69 00000000`00000000 : dxgmms1!VidSchiCheckHwProgress+0x71
fffff880`025a0a10 fffff880`12551306 : ffffffff`ff676980 fffffa80`070ca010 00000000`00000000 00000000`00000000 : dxgmms1!VidSchiWaitForSchedulerEvents+0x1fb
fffff880`025a0ab0 fffff880`1257e0ce : 00000000`00000000 fffffa80`070fdc70 00000000`00000080 fffffa80`070ca010 : dxgmms1!VidSchiScheduleCommandToRun+0x1da
fffff880`025a0bc0 fffff800`02f4e2e8 : 00000000`fffffc32 fffff880`02f00180 00000000`00000001 fffffa80`070cb060 : dxgmms1!VidSchiWorkerThread+0xba
fffff880`025a0c00 fffff800`02ca8ec6 : fffff880`02f00180 fffffa80`070cb060 fffff880`02f0f140 00000000`00000000 : nt!PspSystemThreadStartup+0x194
fffff880`025a0c40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
atikmpag+e8bc
fffff880`03e6b8bc 4883ec28 sub rsp,28h
SYMBOL_NAME: atikmpag+e8bc
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: atikmpag
IMAGE_NAME: atikmpag.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 56254b0c
FAILURE_BUCKET_ID: X64_0x116_IMAGE_atikmpag.sys
BUCKET_ID: X64_0x116_IMAGE_atikmpag.sys
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x116_image_atikmpag.sys
FAILURE_ID_HASH: {83e844bc-fe68-2042-4230-7f5d3e90b48a}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800030bc26f, Address of the instruction which caused the bugcheck
Arg3: fffff880027e4ee0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba
FAULTING_IP:
nt!AlpcpReceiveMessagePort+7df
fffff800`030bc26f f0480fba6ff800 lock bts qword ptr [rdi-8],0
CONTEXT: fffff880027e4ee0 -- (.cxr 0xfffff880027e4ee0;r)
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80070f9a20
rdx=00000000000007ff rsi=0000000000000000 rdi=0000000060000000
rip=fffff800030bc26f rsp=fffff880027e58b0 rbp=fffffa8005e7d738
r8=fffffa80070f8518 r9=0000000000000000 r10=fffffffffffffffd
r11=fffff88002f00180 r12=0000000000000001 r13=fffffa8005e7d690
r14=0000000000010000 r15=fffffa80070f9a20
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!AlpcpReceiveMessagePort+0x7df:
fffff800`030bc26f f0480fba6ff800 lock bts qword ptr [rdi-8],0 ds:002b:00000000`5ffffff8=????????????????
Last set context:
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80070f9a20
rdx=00000000000007ff rsi=0000000000000000 rdi=0000000060000000
rip=fffff800030bc26f rsp=fffff880027e58b0 rbp=fffffa8005e7d738
r8=fffffa80070f8518 r9=0000000000000000 r10=fffffffffffffffd
r11=fffff88002f00180 r12=0000000000000001 r13=fffffa8005e7d690
r14=0000000000010000 r15=fffffa80070f9a20
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!AlpcpReceiveMessagePort+0x7df:
fffff800`030bc26f f0480fba6ff800 lock bts qword ptr [rdi-8],0 ds:002b:00000000`5ffffff8=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff800030bc26f
STACK_TEXT:
fffff880`027e58b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!AlpcpReceiveMessagePort+0x7df
FOLLOWUP_IP:
nt!AlpcpReceiveMessagePort+7df
fffff800`030bc26f f0480fba6ff800 lock bts qword ptr [rdi-8],0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!AlpcpReceiveMessagePort+7df
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5e0ead5e
IMAGE_VERSION: 6.1.7601.24545
STACK_COMMAND: .cxr 0xfffff880027e4ee0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!AlpcpReceiveMessagePort+7df
BUCKET_ID: X64_0x3B_nt!AlpcpReceiveMessagePort+7df
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x3b_nt!alpcpreceivemessageport+7df
FAILURE_ID_HASH: {388f6e13-cc41-b567-5337-115bed90215a}
Followup: MachineOwner
---------
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000022,
Arg2: 0000000001180000
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
GetUlongFromAddress: unable to read from fffff80002e61f58
BUGCHECK_STR: 0x19_22
POOL_ADDRESS: 0000000001180000 Nonpaged pool
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER: from fffff80002cfe286 to fffff80002ce4ea0
STACK_TEXT:
fffff880`0834f7d8 fffff800`02cfe286 : 00000000`00000019 00000000`00000022 00000000`01180000 00000000`00000000 : nt!KeBugCheckEx
fffff880`0834f7e0 fffff800`02e2b12a : 00000000`00000000 fffff880`0834f930 fffff880`0834f8b0 fffff800`00000001 : nt! ?? ::FNODOBFM::`string'+0x6986
fffff880`0834f870 fffff800`02c8086e : fffffa80`054f29e0 fffff800`0308673e fffffa80`089a1060 fffff880`00000000 : nt!ExFreePoolWithTag+0x46a
fffff880`0834f920 fffff800`02f4d431 : 00000000`000000d0 00000000`04cce9a0 fffff880`0834fb60 fffff880`009aa180 : nt!IopAllocateIrpPrivate+0x2ce
fffff880`0834f980 fffff800`02cf2f53 : 000007fe`f0ab3022 00000000`00000000 00000000`00000000 00000000`08c76db0 : nt!NtWriteFile+0x561
fffff880`0834fa70 00000000`77d2982a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`04cce928 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77d2982a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+6986
fffff800`02cfe286 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+6986
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5e0ead5e
IMAGE_VERSION: 6.1.7601.24545
FAILURE_BUCKET_ID: X64_0x19_22_nt!_??_::FNODOBFM::_string_+6986
BUCKET_ID: X64_0x19_22_nt!_??_::FNODOBFM::_string_+6986
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x19_22_nt!_??_::fnodobfm::_string_+6986
FAILURE_ID_HASH: {f0a01a77-6364-2e29-0739-90c8f7e80e46}
Followup: MachineOwner
---------
3: kd> lmvm nt
start end module name
fffff800`02c51000 fffff800`0322e000 nt (pdb symbols) C:\Program Files\Windows Kits\8.1\Debuggers\x86\sym\ntkrnlmp.pdb\57489119968749168D61EA066CAE95891\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: C:\Program Files\Windows Kits\8.1\Debuggers\x86\sym\ntoskrnl.exe\5E0EAD5E5dd000\ntoskrnl.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Timestamp: Fri Jan 03 02:56:30 2020 (5E0EAD5E)
CheckSum: 00551102
ImageSize: 005DD000
File version: 6.1.7601.24545
Product version: 6.1.7601.24545
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 6.1.7601.24545
FileVersion: 6.1.7601.24545 (win7sp1_ldr_escrow.200102-1707)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffffff67488a7, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002c3b278, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002e9d100
GetUlongFromAddress: unable to read from fffff80002e9d1c8
fffffffff67488a7
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiTryUnwaitThread+28
fffff800`02c3b278 f0480fba6b4000 lock bts qword ptr [rbx+40h],0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
DPC_STACK_BASE: FFFFF880009FDFB0
TRAP_FRAME: fffff880009f6210 -- (.trap 0xfffff880009f6210)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=fffff880009aa180
rdx=fffff88002f03308 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002c3b278 rsp=fffff880009f63a0 rbp=0000000100f03388
r8=0000000000000100 r9=0000000000000000 r10=000000000000002d
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiTryUnwaitThread+0x28:
fffff800`02c3b278 f0480fba6b4000 lock bts qword ptr [rbx+40h],0 ds:00000000`00000040=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ca22e9 to fffff80002c93ea0
STACK_TEXT:
fffff880`009f60c8 fffff800`02ca22e9 : 00000000`0000000a ffffffff`f67488a7 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`009f60d0 fffff800`02ca00ce : 00000000`00000001 ffffffff`f67488a7 00000000`00000000 ffffffff`f6748867 : nt!KiBugCheckDispatch+0x69
fffff880`009f6210 fffff800`02c3b278 : 00000000`00000000 fffffa80`06080040 fffff880`009f6450 fffff880`11007fa6 : nt!KiPageFault+0x44e
fffff880`009f63a0 fffff800`02cafcc0 : fffff880`02f03310 00000001`00f03388 f2c89abf`e9fa573f fffff880`02f03308 : nt!KiTryUnwaitThread+0x28
fffff880`009f6400 fffff800`02c3d73d : fffff880`02f03308 00000000`00000000 00000000`00000000 00000000`00000102 : nt! ?? ::FNODOBFM::`string'+0x93c0
fffff880`009f6480 fffff800`02cd1d8f : 00000019`f6772088 fffff880`009f6b18 00000000`000ae82d fffff880`009ad328 : nt!KiProcessExpiredTimerList+0x6d
fffff880`009f6af0 fffff800`02c40d77 : 0000000a`1fc3fcff fffffa80`000ae82d fffffa80`06ce6b10 00000000`0000002d : nt! ?? ::FNODOBFM::`string'+0x2b48f
fffff880`009f6b90 fffff800`02c9742a : fffff880`009aa180 fffff880`009b9140 00000000`00000000 fffff880`00000000 : nt!KiRetireDpcList+0x277
fffff880`009f6c40 00000000`00000000 : fffff880`009f7000 fffff880`009f1000 fffff880`009f6c00 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiTryUnwaitThread+28
fffff800`02c3b278 f0480fba6b4000 lock bts qword ptr [rbx+40h],0
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiTryUnwaitThread+28
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5e0ead5e
IMAGE_VERSION: 6.1.7601.24545
FAILURE_BUCKET_ID: X64_0xA_nt!KiTryUnwaitThread+28
BUCKET_ID: X64_0xA_nt!KiTryUnwaitThread+28
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xa_nt!kitryunwaitthread+28
FAILURE_ID_HASH: {cecbbd09-2ba5-2c63-ed01-7de0d0228c2e}
Followup: MachineOwner
---------
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 000000000000109b, (reserved)
Arg3: 0000000000166f30, Memory contents of the pool block
Arg4: fffffa8005fba350, Address of the block of pool being deallocated
Debugging Details:
------------------
GetUlongFromAddress: unable to read from fffff80002e5df58
POOL_ADDRESS: fffffa8005fba350 Nonpaged pool
BUGCHECK_STR: 0xc2_7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
DPC_STACK_BASE: FFFFF80004036FB0
LAST_CONTROL_TRANSFER: from fffff80002e28a01 to fffff80002ce0ea0
STACK_TEXT:
fffff800`04030758 fffff800`02e28a01 : 00000000`000000c2 00000000`00000007 00000000`0000109b 00000000`00166f30 : nt!KeBugCheckEx
fffff800`04030760 fffff800`02c80e3b : 00000000`00004000 00000000`00000000 fffffa80`05d79040 fffffa80`06c918b0 : nt!ExFreePool+0xca9
fffff800`04030810 fffff880`019a8bce : 00000000`00000000 00000000`00000001 fffffa80`05b784a0 00000000`00000000 : nt!IopfCompleteRequest+0xafb
fffff800`04030900 fffff800`02c80681 : 00000000`00000000 fffff880`01049133 00000000`00000000 fffff800`00000000 : CLASSPNP!TransferPktComplete+0x1ce
fffff800`04030980 fffff880`0103d6c8 : fffff880`03763010 fffffa80`05b69a01 fffffa80`05f97d80 00000000`00000000 : nt!IopfCompleteRequest+0x341
fffff800`04030a70 fffff880`0103d443 : 00000000`00000000 fffff800`000000eb fffffa80`054bd9b0 fffffa80`05b6c060 : storport!RaidUnitCompleteRequest+0x208
fffff800`04030b50 fffff800`02c8dcbc : fffff800`02e31180 fffff800`00000000 fffffa80`05b6c128 400000c2`400000c1 : storport!RaidpAdapterDpcRoutine+0x53
fffff800`04030b90 fffff800`02ce442a : fffff800`02e31180 fffff800`02e411c0 00000000`00000000 fffff880`0103d3f0 : nt!KiRetireDpcList+0x1bc
fffff800`04030c40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
CLASSPNP!TransferPktComplete+1ce
fffff880`019a8bce 837c243002 cmp dword ptr [rsp+30h],2
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: CLASSPNP!TransferPktComplete+1ce
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: CLASSPNP
IMAGE_NAME: CLASSPNP.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7929b
IMAGE_VERSION: 6.1.7601.17514
FAILURE_BUCKET_ID: X64_0xc2_7_CLASSPNP!TransferPktComplete+1ce
BUCKET_ID: X64_0xc2_7_CLASSPNP!TransferPktComplete+1ce
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xc2_7_classpnp!transferpktcomplete+1ce
FAILURE_ID_HASH: {154ce2a8-e17c-3821-f47a-a148fecc605f}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041287, An illegal page fault occurred while holding working set synchronization.
Parameter 2 contains the referenced virtual address.
Arg2: 0000000000000001
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'IDSvia64' and 'IDSvia64.sys' overlap
BUGCHECK_STR: 0x1a_41287
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: PUBGLite-Win64
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
TRAP_FRAME: fffff8800b0b7670 -- (.trap 0xfffff8800b0b7670)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8008ff1b00 rbx=0000000000000000 rcx=fffffa8008ff1b00
rdx=03700000b8178867 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002dd1f71 rsp=fffff8800b0b7800 rbp=fffff8800b0b7880
r8=0000000000000001 r9=0000000000000003 r10=ffff080000000000
r11=fffff6fb7da00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na pe nc
nt!MmAccessFault+0x28e1:
fffff800`02dd1f71 498b10 mov rdx,qword ptr [r8] ds:00000000`00000001=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002dd1d8e to fffff80002cf7ea0
STACK_TEXT:
fffff880`0b0b7518 fffff800`02dd1d8e : 00000000`0000001a 00000000`00041287 00000000`00000001 00000000`00000000 : nt!KeBugCheckEx
fffff880`0b0b7520 fffff800`02d03fdc : 00000000`00000000 00000000`00000001 00000000`00000000 ffffffff`ffffffff : nt!MmAccessFault+0x26fe
fffff880`0b0b7670 fffff800`02dd1f71 : 00000000`00000000 00000000`00000000 00000000`00000f82 fffff880`1119ab63 : nt!KiPageFault+0x35c
fffff880`0b0b7800 00000000`00000000 : 00000000`00000000 00000000`00000003 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x28e1
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+35c
fffff800`02d03fdc 85c0 test eax,eax
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+35c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5e0ead5e
IMAGE_VERSION: 6.1.7601.24545
FAILURE_BUCKET_ID: X64_0x1a_41287_nt!KiPageFault+35c
BUCKET_ID: X64_0x1a_41287_nt!KiPageFault+35c
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x1a_41287_nt!kipagefault+35c
FAILURE_ID_HASH: {c5591826-9ede-a651-60da-f7938eb78e5c}
Followup: MachineOwner
---------
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 000000000000009a,
Arg2: 000000000016a6ff
Arg3: 0000000000000005
Arg4: 0000000000000000
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'tunnel' and 'cdrom.sys' overlap
BUGCHECK_STR: 0x4E_9a
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
TRAP_FRAME: fffff880031c4660 -- (.trap 0xfffff880031c4660)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000003122a0bd rbx=0000000000000000 rcx=0000000080663004
rdx=000000009e3e071a rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000d81f06 rsp=fffff880031c47f0 rbp=0000000079308fc3
r8=000000001ed83f16 r9=00000000867fb477 r10=00000000496d23a3
r11=00000000bf1802ba r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
CI!SHATransform+0x236:
fffff880`00d81f06 8b7334 mov esi,dword ptr [rbx+34h] ds:00000000`00000034=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ce60ff to fffff80002ca0ea0
STACK_TEXT:
fffff880`031c47f0 fffff880`00d82f3c : fffff880`031c49d8 fffffa80`5e60ca05 00000000`448502d5 fffff800`738f3d11 : CI!SHATransform+0x236
fffff880`031c4880 fffff880`00d3fc04 : 00000000`00000021 00000000`00000036 00000000`00000000 00000000`00000000 : CI!A_SHAUpdate+0xcc
fffff880`031c48c0 fffff880`00d36d37 : 00000000`00000c00 00000000`00000000 00000000`00000000 fffff880`031c493c : CI!HashpHashBytes+0x40
fffff880`031c48f0 fffff880`00d364a2 : 00000000`00000000 00000000`014ff000 00000000`014ff000 00000000`00000000 : CI!CipImageGetImageHash+0x33f
fffff880`031c4ac0 fffff880`00d35181 : 00000000`00000001 00000000`00000000 00000000`014ff000 fffff880`031c4db8 : CI!CipValidateFileHash+0x1ce
fffff880`031c4c20 fffff800`02f5328c : fffffa80`05f6a370 00000000`000fffff fffffa80`05f63160 00000000`00000000 : CI!CiValidateImageHeader+0x215
fffff880`031c4d10 fffff800`03087e33 : 00000000`00000000 00000000`01000000 fffffa80`05f6a370 00000000`00000000 : nt!SeValidateImageHeader+0x58
fffff880`031c4d50 fffff800`030c861d : fffffa80`05f63160 fffffa80`05f6a370 00000000`00000001 fffffa80`000014ff : nt!MiValidateImageHeader+0x233
fffff880`031c4e20 fffff800`02eee0c1 : fffff880`031c5080 00000000`00000010 fffff880`031c5338 fffff880`00000001 : nt!MmCreateSection+0x92d
fffff880`031c5030 fffff800`02caef53 : fffffa80`054ce040 fffff880`031c52d8 fffff880`031c50c8 00000000`00000000 : nt!NtCreateSection+0x171
fffff880`031c50b0 fffff800`02ca46c0 : fffff800`030404b6 00000000`00000000 00000000`00810000 00000000`00000002 : nt!KiSystemServiceCopyEnd+0x13
fffff880`031c52b8 fffff800`030404b6 : 00000000`00000000 00000000`00810000 00000000`00000002 00000000`00000010 : nt!KiServiceLinkage
fffff880`031c52c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmCheckSystemImage+0x96
STACK_COMMAND: .trap 0xfffff880031c4660 ; kb
FOLLOWUP_IP:
CI!SHATransform+236
fffff880`00d81f06 8b7334 mov esi,dword ptr [rbx+34h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: CI!SHATransform+236
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: CI
IMAGE_NAME: CI.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 5d79bf4f
IMAGE_VERSION: 6.1.7601.24523
FAILURE_BUCKET_ID: X64_0x4E_9a_CI!SHATransform+236
BUCKET_ID: X64_0x4E_9a_CI!SHATransform+236
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x4e_9a_ci!shatransform+236
FAILURE_ID_HASH: {bda0fe0e-cafe-9302-6677-d23a2ba0e5b4}
Followup: MachineOwner
---------
VIDEO_SCHEDULER_INTERNAL_ERROR (119)
The video scheduler has detected that fatal violation has occurred. This resulted
in a condition that video scheduler can no longer progress. Any other values after
parameter 1 must be individually examined according to the subtype.
Arguments:
Arg1: 0000000007000000, The subtype of the bugcheck:
Arg2: fffffa80070f0010
Arg3: fffffa8008e0c330
Arg4: fffffa800969f8e0
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x119
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
DPC_STACK_BASE: FFFFF88002F38FB0
LAST_CONTROL_TRANSFER: from fffff880015d222f to fffff80002cf2ea0
STACK_TEXT:
fffff880`02f31588 fffff880`015d222f : 00000000`00000119 00000000`07000000 fffffa80`070f0010 fffffa80`08e0c330 : nt!KeBugCheckEx
fffff880`02f31590 fffff880`043123f0 : fffffa80`08c49bf0 00000000`00000000 00000000`00000000 fffffa80`08d2fb80 : watchdog!WdLogEvent5+0x11b
fffff880`02f315e0 fffff880`04312452 : fffffa80`000037bf fffffa80`08e0c390 00000000`00000000 fffffa80`070f0010 : dxgmms1!VidSchiCheckConditionDeviceCommand+0x8c
fffff880`02f31610 fffff880`0430e3a0 : fffffa80`090101b0 fffffa80`08e0c330 fffffa80`070c0000 fffffa80`070c0000 : dxgmms1!VidSchiCheckPendingDeviceCommand+0x3e
fffff880`02f31650 fffff880`0430d81a : fffffa80`00000001 fffffa80`00000000 00000000`00000002 00000000`00000000 : dxgmms1!VidSchiProcessCompletedQueuePacketInternal+0x438
fffff880`02f31710 fffff880`0430ce3c : 00000000`00000000 fffffa80`070f0010 00000000`00000000 00000000`0000000c : dxgmms1!VidSchiProcessDpcCompletedPacket+0x3b6
fffff880`02f317b0 fffff880`0430cc88 : 00000000`00000000 fffffa80`070f0010 fffff880`02f0f140 fffff880`02f31980 : dxgmms1!VidSchDdiNotifyDpcWorker+0x198
fffff880`02f31800 fffff880`042121cf : fffffa80`0607c040 fffff880`110f0c3b fffff880`02f12000 00000000`00000022 : dxgmms1!VidSchDdiNotifyDpc+0x94
fffff880`02f31850 fffff880`110c461f : fffffa80`06fb8000 fffffa80`06fb8000 fffff880`02f31980 00000000`00000000 : dxgkrnl!DxgNotifyDpcCB+0x77
fffff880`02f31880 fffffa80`06fb8000 : fffffa80`06fb8000 fffff880`02f31980 00000000`00000000 fffffa80`06fbd000 : atikmdag+0x5761f
fffff880`02f31888 fffffa80`06fb8000 : fffff880`02f31980 00000000`00000000 fffffa80`06fbd000 fffff880`110d1b90 : 0xfffffa80`06fb8000
fffff880`02f31890 fffff880`02f31980 : 00000000`00000000 fffffa80`06fbd000 fffff880`110d1b90 00000000`00000000 : 0xfffffa80`06fb8000
fffff880`02f31898 00000000`00000000 : fffffa80`06fbd000 fffff880`110d1b90 00000000`00000000 fffffa80`06fbe3d0 : 0xfffff880`02f31980
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!VidSchiCheckConditionDeviceCommand+8c
fffff880`043123f0 c744243040c8ffff mov dword ptr [rsp+30h],0FFFFC840h
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: dxgmms1!VidSchiCheckConditionDeviceCommand+8c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5d5222c1
IMAGE_VERSION: 6.1.7601.24513
FAILURE_BUCKET_ID: X64_0x119_7000000_UNKNOWN_dxgmms1!VidSchiCheckConditionDeviceCommand+8c
BUCKET_ID: X64_0x119_7000000_UNKNOWN_dxgmms1!VidSchiCheckConditionDeviceCommand+8c
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x119_7000000_unknown_dxgmms1!vidschicheckconditiondevicecommand+8c
FAILURE_ID_HASH: {a2d2bd75-84cf-a9ca-bf78-046a90c4b771}
Followup: MachineOwner
---------