21.11.2014 tarihli mavi ekran (yeni formatlanmasına rağmen)
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000068, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80154b57457, address which referenced memory
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
READ_ADDRESS: fffff80389735ce0: Unable to get special pool info
fffff80389735ce0: Unable to get special pool info
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
0000000000000068
CURRENT_IRQL: 2
FAULTING_IP:
mouhid!MouHid_StartRead+18b
fffff801`54b57457 488b6c2468 mov rbp,qword ptr [rsp+68h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
TRAP_FRAME: ffffd000c01fbf10 -- (.trap 0xffffd000c01fbf10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff80154b5a080
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80154b57457 rsp=ffffd000c01fc0a0 rbp=fffff80154b59268
r8=0000000000000000 r9=0000000000000008 r10=0000000000000000
r11=ffffd000c01fc070 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
mouhid!MouHid_StartRead+0x18b:
fffff801`54b57457 488b6c2468 mov rbp,qword ptr [rsp+68h] ss:0018:ffffd000`c01fc108=ffffd000c01fc158
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff803895ddae9 to fffff803895d1fa0
STACK_TEXT:
ffffd000`c01fbdc8 fffff803`895ddae9 : 00000000`0000000a 00000000`00000068 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd000`c01fbdd0 fffff803`895dc33a : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd000`c01fbf10 : nt!KiBugCheckDispatch+0x69
ffffd000`c01fbf10 fffff801`54b57457 : ffffe000`00000001 ffffe000`00000000 ffffe000`258e9a00 ffffe000`00000000 : nt!KiPageFault+0x23a
ffffd000`c01fc0a0 fffff801`54b5728f : 00000000`00000000 ffffd000`c01fc158 ffffe000`24a35c80 ffffe000`25291630 : mouhid!MouHid_StartRead+0x18b
ffffd000`c01fc100 fffff803`8951d378 : 00000000`00000000 ffffb1d5`1846d101 fffff801`00000000 ffffe000`00000001 : mouhid!MouHid_ReadComplete+0x707
ffffd000`c01fc1a0 fffff801`54ad110f : ffffe000`232e7710 fffffb5d`00000006 ffffd000`c01fc310 00000000`00000008 : nt!IopfCompleteRequest+0x588
ffffd000`c01fc2b0 fffff801`54ad0ae2 : ffffe000`00000000 ffffe000`252b0850 00000000`00000007 ffffe000`252b0600 : HIDCLASS!HidpDistributeInterruptReport+0x12f
ffffd000`c01fc350 fffff803`8951d378 : ffffe000`258f1ab0 ffffe000`258f1ab0 ffffd000`c01fc401 ffffe000`258f1f2b : HIDCLASS!HidpInterruptReadComplete+0x2ae
ffffd000`c01fc3e0 fffff801`52a7a8fc : 00000000`ffffffff 00000000`00000000 00000000`00000004 ffffe000`24a5f010 : nt!IopfCompleteRequest+0x588
ffffd000`c01fc4f0 fffff801`52a87364 : ffffe000`2679fe00 00000000`00000000 ffffd000`00000001 ffffe000`2679fc02 : Wdf01000!FxRequest::CompleteInternal+0x23c
ffffd000`c01fc5b0 fffff801`542d0f16 : ffffe000`2679fe00 ffffd000`c01f0000 ffffe000`2679fc60 ffffe000`2679fc60 : Wdf01000!imp_WdfRequestComplete+0x8c
ffffd000`c01fc620 fffff801`542d1e8c : ffffe000`2679fe00 00000000`00000001 ffffe000`2679fe80 ffffd000`c01fc7a0 : USBXHCI!Bulk_Transfer_CompleteCancelable+0x15a
ffffd000`c01fc680 fffff801`542bf02b : 00000000`00000780 ffffe000`24a72210 00000000`00000000 fffff803`895ad192 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x3a8
ffffd000`c01fc730 fffff801`52b12c81 : ffffd000`c0044180 00000000`00000f44 00001fff`db58dfd8 00000000`00400a02 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0x427
ffffd000`c01fc830 fffff803`894d81e0 : ffffd000`c0046f00 ffffd000`c01fcb00 ffffe000`24a72020 fffff803`89535950 : Wdf01000!FxInterrupt:
pcHandler+0xc1
ffffd000`c01fc860 fffff803`894d73fb : ffffd000`c0044180 ffffe000`24c63430 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x1b0
ffffd000`c01fc9b0 fffff803`895d5aea : ffffd000`c0044180 ffffd000`c0044180 ffffd000`c00502c0 ffffe000`24c24880 : nt!KiRetireDpcList+0xdb
ffffd000`c01fcc60 00000000`00000000 : ffffd000`c01fd000 ffffd000`c01f7000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
mouhid!MouHid_StartRead+18b
fffff801`54b57457 488b6c2468 mov rbp,qword ptr [rsp+68h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: mouhid!MouHid_StartRead+18b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: mouhid
IMAGE_NAME: mouhid.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5215f861
FAILURE_BUCKET_ID: X64_AV_mouhid!MouHid_StartRead+18b
BUCKET_ID: X64_AV_mouhid!MouHid_StartRead+18b
Followup: MachineOwner