*******************************************************************************
*
Bugcheck Analysis *
*
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80082bbbbdb, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.22621.590 (WinBuild.160101.0800)
SYSTEM_MANUFACTURER: ASUS
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2601
BIOS_DATE: 05/17/2022
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: ROG MAXIMUS XII HERO (WI-FI)
BASEBOARD_VERSION: Rev 1.xx
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: 8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80082bbbbdb
READ_ADDRESS: fffff8005231c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
nvlddmkm+4dbbdb
fffff800`82bbbbdb 418b4108 mov eax,dword ptr [r9+8]
CPU_COUNT: 14
CPU_MHZ: e70
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: a5
CPU_STEPPING: 5
CPU_MICROCODE: 6,a5,5,0 (F,M,S,R) SIG: E2'00000000 (cache) E2'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-HOSQNHC
ANALYSIS_SESSION_TIME: 02-02-2023 00:01:14.0204
ANALYSIS_VERSION: 10.0.17763.132 x86fre
TRAP_FRAME: fffff28c5c876c30 -- (.trap 0xfffff28c5c876c30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb3067c6a9190 rbx=0000000000000000 rcx=ffffb3067c49c000
rdx=ffffb3067c6a9000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80082bbbbdb rsp=fffff28c5c876dc0 rbp=0000000000000000
r8=ffffb3067c6ab680 r9=0000000000000000 r10=ffffb3067c49f958
r11=fffff28c5c876c90 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nvlddmkm+0x4dbbdb:
fffff800`82bbbbdb 418b4108 mov eax,dword ptr [r9+8] ds:00000000`00000008=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80051a33fa9 to fffff80051a21020
STACK_TEXT:
fffff28c`5c876ae8 fffff800`51a33fa9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff28c`5c876af0 fffff800`51a2fee8 : 00000000`0010a400 00000000`00000000 00000000`00000020 fffff800`827bcc61 : nt!KiBugCheckDispatch+0x69
fffff28c`5c876c30 fffff800`82bbbbdb : 00000000`ffffffff ffffb306`7c49c000 ffffb306`7c6bd000 00000000`00000000 : nt!KiPageFault+0x468
fffff28c`5c876dc0 00000000`ffffffff : ffffb306`7c49c000 ffffb306`7c6bd000 00000000`00000000 00000000`ffffffff : nvlddmkm+0x4dbbdb
fffff28c`5c876dc8 ffffb306`7c49c000 : ffffb306`7c6bd000 00000000`00000000 00000000`ffffffff ffffb306`7c49c000 : 0xffffffff
fffff28c`5c876dd0 ffffb306`7c6bd000 : 00000000`00000000 00000000`ffffffff ffffb306`7c49c000 ffffb306`7c6a9000 : 0xffffb306`7c49c000
fffff28c`5c876dd8 00000000`00000000 : 00000000`ffffffff ffffb306`7c49c000 ffffb306`7c6a9000 fffff800`82bbb953 : 0xffffb306`7c6bd000
THREAD_SHA1_HASH_MOD_FUNC: 57bd2645b6b0775b5c75d343f2a6e2cc4fdca6ac
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3d6e8e7ad10601f555b7bfc12e1847f1895df0a7
THREAD_SHA1_HASH_MOD: 99270aa9efddf51499339f5ea82e28c2a8c9f7b4
FOLLOWUP_IP:
nvlddmkm+4dbbdb
fffff800`82bbbbdb 418b4108 mov eax,dword ptr [r9+8]
FAULT_INSTR_CODE: 8418b41
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nvlddmkm+4dbbdb
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 63c44706
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4dbbdb
FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function
BUCKET_ID: AV_nvlddmkm!unknown_function
PRIMARY_PROBLEM_CLASS: AV_nvlddmkm!unknown_function
TARGET_TIME: 2023-02-01T16:29:40.000Z
OSBUILD: 22621
OSSERVICEPACK: 590
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.22621.590
ANALYSIS_SESSION_ELAPSED_TIME: 7c4
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nvlddmkm!unknown_function
FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3}