*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000132ad534934, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800b9656be3, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800b9954138
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
00000132ad534934
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiSwapThread+13
fffff800`b9656be3 004833 add byte ptr [rax+33h],cl
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: EliteDangerous
ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) amd64fre
TRAP_FRAME: ffffd00033b87820 -- (.trap 0xffffd00033b87820)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000132ad534901 rbx=0000000000000000 rcx=ffffe000e08e2480
rdx=fffff800b98e6180 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800b9656be3 rsp=ffffd00033b879b0 rbp=ffffd00033b879b8
r8=0000000000000055 r9=0000000000000055 r10=fffff800b9600000
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiSwapThread+0x13:
fffff800`b9656be3 004833 add byte ptr [rax+33h],cl ds:00000132`ad534934=??
Resetting default scope
MISALIGNED_IP:
nt!KiSwapThread+13
fffff800`b9656be3 004833 add byte ptr [rax+33h],cl
LAST_CONTROL_TRANSFER: from fffff800b975fae9 to fffff800b9753fa0
STACK_TEXT:
ffffd000`33b876d8 fffff800`b975fae9 : 00000000`0000000a 00000132`ad534934 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`33b876e0 fffff800`b975e33a : 00000000`00000001 ffffe000`e08eb080 ffffe000`e1a40000 ffffd000`33b87820 : nt!KiBugCheckDispatch+0x69
ffffd000`33b87820 fffff800`b9656be3 : 00000000`54058b48 00000000`00000000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x23a
ffffd000`33b879b0 0000004c`d7b8f5ab : 00000000`00000000 ffffd000`33b87b00 ffffe000`e08eb080 fffff800`b96f9713 : nt!KiSwapThread+0x13
ffffd000`33b87a50 00000000`00000000 : ffffd000`33b87b00 ffffe000`e08eb080 fffff800`b96f9713 00000000`00000001 : 0x0000004c`d7b8f5ab
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiSwapThread+13
fffff800`b9656be3 004833 add byte ptr [rax+33h],cl
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiSwapThread+13
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 6.3.9600.17085
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED
BUCKET_ID: IP_MISALIGNED
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:ip_misaligned
FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}
Followup: MachineOwner
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000132ad534934, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800b9656be3, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800b9954138
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
00000132ad534934
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiSwapThread+13
fffff800`b9656be3 004833 add byte ptr [rax+33h],cl
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: EliteDangerous
ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) amd64fre
TRAP_FRAME: ffffd00033b87820 -- (.trap 0xffffd00033b87820)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000132ad534901 rbx=0000000000000000 rcx=ffffe000e08e2480
rdx=fffff800b98e6180 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800b9656be3 rsp=ffffd00033b879b0 rbp=ffffd00033b879b8
r8=0000000000000055 r9=0000000000000055 r10=fffff800b9600000
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiSwapThread+0x13:
fffff800`b9656be3 004833 add byte ptr [rax+33h],cl ds:00000132`ad534934=??
Resetting default scope
MISALIGNED_IP:
nt!KiSwapThread+13
fffff800`b9656be3 004833 add byte ptr [rax+33h],cl
LAST_CONTROL_TRANSFER: from fffff800b975fae9 to fffff800b9753fa0
STACK_TEXT:
ffffd000`33b876d8 fffff800`b975fae9 : 00000000`0000000a 00000132`ad534934 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`33b876e0 fffff800`b975e33a : 00000000`00000001 ffffe000`e08eb080 ffffe000`e1a40000 ffffd000`33b87820 : nt!KiBugCheckDispatch+0x69
ffffd000`33b87820 fffff800`b9656be3 : 00000000`54058b48 00000000`00000000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x23a
ffffd000`33b879b0 0000004c`d7b8f5ab : 00000000`00000000 ffffd000`33b87b00 ffffe000`e08eb080 fffff800`b96f9713 : nt!KiSwapThread+0x13
ffffd000`33b87a50 00000000`00000000 : ffffd000`33b87b00 ffffe000`e08eb080 fffff800`b96f9713 00000000`00000001 : 0x0000004c`d7b8f5ab
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiSwapThread+13
fffff800`b9656be3 004833 add byte ptr [rax+33h],cl
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiSwapThread+13
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 6.3.9600.17085
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED
BUCKET_ID: IP_MISALIGNED
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:ip_misaligned
FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}
Followup: MachineOwner