Hallo,
ich bekomme in letzter Zeit sehr viele Bluescreens dabei varriert der Bccode ständig. Ich habe mich etwas informiert und anscheinend habe ich probleme mit Treibern (mein Verdacht Grafiktreiber). Die Grafiktreiber habe ich aktualisiert aber die Bluescreens traten während der Installation noch öfters auf. Heute hatte ich folgende Bccodes: c4 / 3b / d1.
Hier die Dumpfiles, hab sie über osronline.com kopiert:
Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.17795.amd64fre.win7_gdr.150318-1623
Machine Name:
Kernel base = 0xfffff800`02c09000 PsLoadedModuleList = 0xfffff800`02e45ed0
Debug session time: Fri May 5 04:56:29.625 2017 (UTC - 4:00)
System Uptime: 0 days 0:09:18.342
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: 0000000000000002, Address of the instruction which caused the bugcheck
Arg3: fffff88005cb6040, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
FAULTING_IP:
+0
00000000`00000002 ?? ???
CONTEXT: fffff88005cb6040 -- (.cxr 0xfffff88005cb6040)
rax=fffff900c0580a70 rbx=00000000000884f7 rcx=0000000000000001
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000002 rsp=fffff88005cb6a10 rbp=fffffa800934a510
r8=00000000000884f7 r9=0000000000000000 r10=ffffffff00000001
r11=fffffa800934f760 r12=fffff880009e6100 r13=0000000000000000
r14=0000000000000002 r15=fffffa800934a510
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
00000000`00000002 ?? ???
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 000000000000ffff to 0000000000000002
STACK_TEXT:
fffff880`05cb5778 fffff800`02c77da9 : 00000000`0000003b 00000000`c0000005 00000000`00000002 fffff880`05cb6040 : nt!KeBugCheckEx
fffff880`05cb5780 fffff800`02c776fc : 00000000`00000000 fffff880`05cb5ce0 fffff880`05cb5ce0 fffff880`05cb5ce0 : nt!KiBugCheckDispatch+0x69
fffff880`05cb58c0 fffff800`02c9de8d : fffff960`00327314 fffff960`002f1af0 fffff960`00030000 fffff880`05cb67d8 : nt!KiSystemServiceHandler+0x7c
fffff880`05cb5900 fffff800`02ca5500 : fffff800`02dc8828 fffff880`05cb5978 fffff880`05cb67d8 fffff800`02c09000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`05cb5930 fffff800`02cb258f : fffff880`05cb67d8 fffff880`05cb6040 fffff880`00000000 00000000`00000000 : nt!RtlDispatchException+0x410
fffff880`05cb6010 fffff800`02c77e82 : fffff880`05cb67d8 00000000`000884f7 fffff880`05cb6880 00000000`00000000 : nt!KiDispatchException+0x16f
fffff880`05cb66a0 fffff800`02c769fa : 00000000`00000008 00000000`000884f7 00000000`00000000 fffffa80`0717bc68 : nt!KiExceptionDispatch+0xc2
fffff880`05cb6880 00000000`00000002 : 00000000`0000ffff 00000000`00000000 00000000`000884f7 fffff960`0012e81a : nt!KiPageFault+0x23a
fffff880`05cb6a10 00000000`0000ffff : 00000000`00000000 00000000`000884f7 fffff960`0012e81a 00000000`000000f8 : 0x2
fffff880`05cb6a18 00000000`00000000 : 00000000`000884f7 fffff960`0012e81a 00000000`000000f8 00000000`00000000 : 0xffff
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiSystemServiceHandler+7c
fffff800`02c776fc b801000000 mov eax,1
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiSystemServiceHandler+7c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 550a2e34
FAILURE_BUCKET_ID: X64_0x3B_nt!KiSystemServiceHandler+7c
BUCKET_ID: X64_0x3B_nt!KiSystemServiceHandler+7c
Followup: MachineOwner
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.17795.amd64fre.win7_gdr.150318-1623
Machine Name:
Kernel base = 0xfffff800`02c58000 PsLoadedModuleList = 0xfffff800`02e94ed0
Debug session time: Fri May 5 05:18:27.542 2017 (UTC - 4:00)
System Uptime: 0 days 0:21:21.665
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88000fdb181, Address of the instruction which caused the bugcheck
Arg3: fffff880091b8c20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
FAULTING_IP:
partmgr!PmFilterDeviceControl+21
fffff880`00fdb181 f633 div al,byte ptr [rbx]
CONTEXT: fffff880091b8c20 -- (.cxr 0xfffff880091b8c20)
rax=fffff88000fdd5b0 rbx=0000000000000001 rcx=fffffa8007a9fab0
rdx=fffffa800a084c10 rsi=fffffa800a084c10 rdi=fffffa800a084c10
rip=fffff88000fdb181 rsp=fffff880091b95f0 rbp=fffffa800a084ed8
r8=000000000000000e r9=fffff88000fdb160 r10=fffff88002f64ca0
r11=0000000000000000 r12=fffffa8007a9fc00 r13=0000000000000000
r14=fffffa800744e1b0 r15=0000000000000103
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
partmgr!PmFilterDeviceControl+0x21:
fffff880`00fdb181 f633 div al,byte ptr [rbx] ds:002b:00000000`00000001=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x3B
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff88000fdb181
STACK_TEXT:
fffff880`091b95f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : partmgr!PmFilterDeviceControl+0x21
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
STACK_COMMAND: .cxr 0xfffff880091b8c20 ; kb
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
Followup: memory_corruption
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.17795.amd64fre.win7_gdr.150318-1623
Machine Name:
Kernel base = 0xfffff800`02c68000 PsLoadedModuleList = 0xfffff800`02ea4ed0
Debug session time: Fri May 5 05:24:01.685 2017 (UTC - 4:00)
System Uptime: 0 days 0:04:56.808
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffffa8055bb6f48, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88002d3818c, address which referenced memory
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f0f0e0
GetUlongFromAddress: unable to read from fffff80002f0f198
fffffa8055bb6f48 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
afd!AfdPoll64+649
fffff880`02d3818c 498900 mov qword ptr [r8],rax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: nvcontainer.ex
TRAP_FRAME: fffff88009f75750 -- (.trap 0xfffff88009f75750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800931dd20
rdx=fffffa800931ddd8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88002d3818c rsp=fffff88009f758e0 rbp=fffffa8007117010
r8=fffffa8009b8e400 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
afd!AfdPoll64+0x649:
fffff880`02d3818c 498900 mov qword ptr [r8],rax ds:fffffa80`09b8e400=fffffa800931ddd8
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cd6da9 to fffff80002cd7840
STACK_TEXT:
fffff880`09f75608 fffff800`02cd6da9 : 00000000`0000000a fffffa80`55bb6f48 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`09f75610 fffff800`02cd5a20 : 00000000`00000018 fffffa80`070c44f8 fffffa80`06f4cc60 fffffa80`06eec4a0 : nt!KiBugCheckDispatch+0x69
fffff880`09f75750 fffff880`02d3818c : fffffa80`07117010 fffffa80`070c44f8 fffffa80`070c4440 fffffa80`06c89b60 : nt!KiPageFault+0x260
fffff880`09f758e0 fffff880`02d38219 : fffffa80`08383e00 00000000`00000000 00000000`00000000 00000000`00000020 : afd!AfdPoll64+0x649
fffff880`09f759e0 fffff800`02fefc67 : fffffa80`06eec4a0 fffff880`09f75ca0 fffffa80`07117200 fffffa80`07117010 : afd!AfdPoll+0x29
fffff880`09f75a10 fffff800`02ff04c6 : fffff880`09f75bf8 00000000`00000610 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x607
fffff880`09f75b40 fffff800`02cd6a93 : fffff880`09f75ca0 fffffa80`06efbc60 fffff880`09f75bf8 fffff800`02cd3401 : nt!NtDeviceIoControlFile+0x56
fffff880`09f75bb0 00000000`7733fdca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0408f3a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7733fdca
STACK_COMMAND: kb
FOLLOWUP_IP:
afd!AfdPoll64+649
fffff880`02d3818c 498900 mov qword ptr [r8],rax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: afd!AfdPoll64+649
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: afd
IMAGE_NAME: afd.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc184
FAILURE_BUCKET_ID: X64_0xD1_afd!AfdPoll64+649
BUCKET_ID: X64_0xD1_afd!AfdPoll64+649
Followup: MachineOwner
ich bekomme in letzter Zeit sehr viele Bluescreens dabei varriert der Bccode ständig. Ich habe mich etwas informiert und anscheinend habe ich probleme mit Treibern (mein Verdacht Grafiktreiber). Die Grafiktreiber habe ich aktualisiert aber die Bluescreens traten während der Installation noch öfters auf. Heute hatte ich folgende Bccodes: c4 / 3b / d1.
Hier die Dumpfiles, hab sie über osronline.com kopiert:
Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.17795.amd64fre.win7_gdr.150318-1623
Machine Name:
Kernel base = 0xfffff800`02c09000 PsLoadedModuleList = 0xfffff800`02e45ed0
Debug session time: Fri May 5 04:56:29.625 2017 (UTC - 4:00)
System Uptime: 0 days 0:09:18.342
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: 0000000000000002, Address of the instruction which caused the bugcheck
Arg3: fffff88005cb6040, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
FAULTING_IP:
+0
00000000`00000002 ?? ???
CONTEXT: fffff88005cb6040 -- (.cxr 0xfffff88005cb6040)
rax=fffff900c0580a70 rbx=00000000000884f7 rcx=0000000000000001
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000002 rsp=fffff88005cb6a10 rbp=fffffa800934a510
r8=00000000000884f7 r9=0000000000000000 r10=ffffffff00000001
r11=fffffa800934f760 r12=fffff880009e6100 r13=0000000000000000
r14=0000000000000002 r15=fffffa800934a510
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
00000000`00000002 ?? ???
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 000000000000ffff to 0000000000000002
STACK_TEXT:
fffff880`05cb5778 fffff800`02c77da9 : 00000000`0000003b 00000000`c0000005 00000000`00000002 fffff880`05cb6040 : nt!KeBugCheckEx
fffff880`05cb5780 fffff800`02c776fc : 00000000`00000000 fffff880`05cb5ce0 fffff880`05cb5ce0 fffff880`05cb5ce0 : nt!KiBugCheckDispatch+0x69
fffff880`05cb58c0 fffff800`02c9de8d : fffff960`00327314 fffff960`002f1af0 fffff960`00030000 fffff880`05cb67d8 : nt!KiSystemServiceHandler+0x7c
fffff880`05cb5900 fffff800`02ca5500 : fffff800`02dc8828 fffff880`05cb5978 fffff880`05cb67d8 fffff800`02c09000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`05cb5930 fffff800`02cb258f : fffff880`05cb67d8 fffff880`05cb6040 fffff880`00000000 00000000`00000000 : nt!RtlDispatchException+0x410
fffff880`05cb6010 fffff800`02c77e82 : fffff880`05cb67d8 00000000`000884f7 fffff880`05cb6880 00000000`00000000 : nt!KiDispatchException+0x16f
fffff880`05cb66a0 fffff800`02c769fa : 00000000`00000008 00000000`000884f7 00000000`00000000 fffffa80`0717bc68 : nt!KiExceptionDispatch+0xc2
fffff880`05cb6880 00000000`00000002 : 00000000`0000ffff 00000000`00000000 00000000`000884f7 fffff960`0012e81a : nt!KiPageFault+0x23a
fffff880`05cb6a10 00000000`0000ffff : 00000000`00000000 00000000`000884f7 fffff960`0012e81a 00000000`000000f8 : 0x2
fffff880`05cb6a18 00000000`00000000 : 00000000`000884f7 fffff960`0012e81a 00000000`000000f8 00000000`00000000 : 0xffff
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiSystemServiceHandler+7c
fffff800`02c776fc b801000000 mov eax,1
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiSystemServiceHandler+7c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 550a2e34
FAILURE_BUCKET_ID: X64_0x3B_nt!KiSystemServiceHandler+7c
BUCKET_ID: X64_0x3B_nt!KiSystemServiceHandler+7c
Followup: MachineOwner
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.17795.amd64fre.win7_gdr.150318-1623
Machine Name:
Kernel base = 0xfffff800`02c58000 PsLoadedModuleList = 0xfffff800`02e94ed0
Debug session time: Fri May 5 05:18:27.542 2017 (UTC - 4:00)
System Uptime: 0 days 0:21:21.665
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88000fdb181, Address of the instruction which caused the bugcheck
Arg3: fffff880091b8c20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
FAULTING_IP:
partmgr!PmFilterDeviceControl+21
fffff880`00fdb181 f633 div al,byte ptr [rbx]
CONTEXT: fffff880091b8c20 -- (.cxr 0xfffff880091b8c20)
rax=fffff88000fdd5b0 rbx=0000000000000001 rcx=fffffa8007a9fab0
rdx=fffffa800a084c10 rsi=fffffa800a084c10 rdi=fffffa800a084c10
rip=fffff88000fdb181 rsp=fffff880091b95f0 rbp=fffffa800a084ed8
r8=000000000000000e r9=fffff88000fdb160 r10=fffff88002f64ca0
r11=0000000000000000 r12=fffffa8007a9fc00 r13=0000000000000000
r14=fffffa800744e1b0 r15=0000000000000103
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
partmgr!PmFilterDeviceControl+0x21:
fffff880`00fdb181 f633 div al,byte ptr [rbx] ds:002b:00000000`00000001=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x3B
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff88000fdb181
STACK_TEXT:
fffff880`091b95f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : partmgr!PmFilterDeviceControl+0x21
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
STACK_COMMAND: .cxr 0xfffff880091b8c20 ; kb
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
Followup: memory_corruption
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.17795.amd64fre.win7_gdr.150318-1623
Machine Name:
Kernel base = 0xfffff800`02c68000 PsLoadedModuleList = 0xfffff800`02ea4ed0
Debug session time: Fri May 5 05:24:01.685 2017 (UTC - 4:00)
System Uptime: 0 days 0:04:56.808
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffffa8055bb6f48, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88002d3818c, address which referenced memory
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f0f0e0
GetUlongFromAddress: unable to read from fffff80002f0f198
fffffa8055bb6f48 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
afd!AfdPoll64+649
fffff880`02d3818c 498900 mov qword ptr [r8],rax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: nvcontainer.ex
TRAP_FRAME: fffff88009f75750 -- (.trap 0xfffff88009f75750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800931dd20
rdx=fffffa800931ddd8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88002d3818c rsp=fffff88009f758e0 rbp=fffffa8007117010
r8=fffffa8009b8e400 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
afd!AfdPoll64+0x649:
fffff880`02d3818c 498900 mov qword ptr [r8],rax ds:fffffa80`09b8e400=fffffa800931ddd8
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cd6da9 to fffff80002cd7840
STACK_TEXT:
fffff880`09f75608 fffff800`02cd6da9 : 00000000`0000000a fffffa80`55bb6f48 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`09f75610 fffff800`02cd5a20 : 00000000`00000018 fffffa80`070c44f8 fffffa80`06f4cc60 fffffa80`06eec4a0 : nt!KiBugCheckDispatch+0x69
fffff880`09f75750 fffff880`02d3818c : fffffa80`07117010 fffffa80`070c44f8 fffffa80`070c4440 fffffa80`06c89b60 : nt!KiPageFault+0x260
fffff880`09f758e0 fffff880`02d38219 : fffffa80`08383e00 00000000`00000000 00000000`00000000 00000000`00000020 : afd!AfdPoll64+0x649
fffff880`09f759e0 fffff800`02fefc67 : fffffa80`06eec4a0 fffff880`09f75ca0 fffffa80`07117200 fffffa80`07117010 : afd!AfdPoll+0x29
fffff880`09f75a10 fffff800`02ff04c6 : fffff880`09f75bf8 00000000`00000610 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x607
fffff880`09f75b40 fffff800`02cd6a93 : fffff880`09f75ca0 fffffa80`06efbc60 fffff880`09f75bf8 fffff800`02cd3401 : nt!NtDeviceIoControlFile+0x56
fffff880`09f75bb0 00000000`7733fdca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0408f3a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7733fdca
STACK_COMMAND: kb
FOLLOWUP_IP:
afd!AfdPoll64+649
fffff880`02d3818c 498900 mov qword ptr [r8],rax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: afd!AfdPoll64+649
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: afd
IMAGE_NAME: afd.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc184
FAILURE_BUCKET_ID: X64_0xD1_afd!AfdPoll64+649
BUCKET_ID: X64_0xD1_afd!AfdPoll64+649
Followup: MachineOwner