******************************************************************************** *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffffffffffff9, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802b66a7820, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff802b695a168
GetUlongFromAddress: unable to read from fffff802b695a1f8
fffffffffffffff9
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiCommitThreadWait+65e
fffff802`b66a7820 4c3b6df8 cmp r13,qword ptr [rbp-8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: dwm.exe
TRAP_FRAME: fffff88019d014b0 -- (.trap 0xfffff88019d014b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000009896 rbx=0000000000000000 rcx=0000000000021db3
rdx=fffffa800c1f55a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802b66a7820 rsp=fffff88019d01640 rbp=0000000000000001
r8=0000000000000002 r9=fffff802b68fcf80 r10=000000000000005a
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!KiCommitThreadWait+0x65e:
fffff802`b66a7820 4c3b6df8 cmp r13,qword ptr [rbp-8] ss:0018:ffffffff`fffffff9=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff802b667e669 to fffff802b667f340
STACK_TEXT:
fffff880`19d01368 fffff802`b667e669 : 00000000`0000000a ffffffff`fffffff9 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`19d01370 fffff802`b667cee0 : 00000000`00000000 00000000`00000000 fffffa80`00000000 fffff880`19d014b0 : nt!KiBugCheckDispatch+0x69
fffff880`19d014b0 fffff802`b66a7820 : 00000000`00000001 00000000`00000000 00000000`00000006 00000000`00000000 : nt!KiPageFault+0x260
fffff880`19d01640 fffff802`b66a520f : 00000000`00000000 00000000`00000001 00000000`00000000 fffffa80`06dba400 : nt!KiCommitThreadWait+0x65e
fffff880`19d01700 fffff880`04515dca : fffffa80`06d83028 fffff880`00000006 fffffa80`06d8cc00 fffff880`19d01800 : nt!KeWaitForSingleObject+0x1cf
fffff880`19d01790 fffff880`045143d0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000007`47e8dae0 : dxgkrnl!DxgkWaitForVerticalBlankEventInternal+0x4ea
fffff880`19d01ab0 fffff802`b667e353 : fffffa80`0e2c7440 00000007`47e8dae0 fffff880`00000000 fffffa80`0e193130 : dxgkrnl!DxgkWaitForVerticalBlankEvent+0x90
fffff880`19d01b00 000007f9`5186110a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000007`49f4f398 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007f9`5186110a
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgkrnl!DxgkWaitForVerticalBlankEventInternal+4ea
fffff880`04515dca 4584f6 test r14b,r14b
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: dxgkrnl!DxgkWaitForVerticalBlankEventInternal+4ea
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 505ab2c6
BUCKET_ID_FUNC_OFFSET: 4ea
FAILURE_BUCKET_ID: AV_dxgkrnl!DxgkWaitForVerticalBlankEventInternal
BUCKET_ID: AV_dxgkrnl!DxgkWaitForVerticalBlankEventInternal
Followup: MachineOwner
---------