DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88005826fb5, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb1100
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
NETw5s64+13fb5
fffff880`05826fb5 48833b00 cmp qword ptr [rbx],0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: avgmfapx.exe
TRAP_FRAME: fffff880031923a0 -- (.trap 0xfffff880031923a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=fffffa8007483910
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88005826fb5 rsp=fffff88003192530 rbp=fffffa80043201c0
r8=fffffa80093a7400 r9=0000000000000000 r10=fffff88003163a60
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
NETw5s64+0x13fb5:
fffff880`05826fb5 48833b00 cmp qword ptr [rbx],0 ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c812a9 to fffff80002c81d00
STACK_TEXT:
fffff880`03192258 fffff800`02c812a9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`03192260 fffff800`02c7ff20 : fffff880`03163180 00000000`00000001 fffff800`02e09520 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`031923a0 fffff880`05826fb5 : 00000000`00000004 00000000`00000000 fffffa80`00000002 00000000`00000115 : nt!KiPageFault+0x260
fffff880`03192530 00000000`00000004 : 00000000`00000000 fffffa80`00000002 00000000`00000115 00000000`000000f9 : NETw5s64+0x13fb5
fffff880`03192538 00000000`00000000 : fffffa80`00000002 00000000`00000115 00000000`000000f9 fffffa80`04988fb0 : 0x4
STACK_COMMAND: kb
FOLLOWUP_IP:
NETw5s64+13fb5
fffff880`05826fb5 48833b00 cmp qword ptr [rbx],0
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: NETw5s64+13fb5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETw5s64
IMAGE_NAME: NETw5s64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ba1b871
FAILURE_BUCKET_ID: X64_0xD1_NETw5s64+13fb5
BUCKET_ID: X64_0xD1_NETw5s64+13fb5
Followup: MachineOwner
---------
2: kd> lmvm NETw5s64
start end module name
fffff880`05813000 fffff880`05f73000 NETw5s64 T (no symbols)
Loaded symbol image file: NETw5s64.sys
Image path: \SystemRoot\system32\DRIVERS\NETw5s64.sys
Image name: NETw5s64.sys
Timestamp: Thu Mar 18 10:51:53 2010 (4BA1B871)
CheckSum: 00763035
ImageSize: 00760000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4