******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000038, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, value 0 = read operation, 1 = write operation Arg4: fffff80002a6fb60, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: fffff8027193d340: Unable to get special pool info fffff8027193d340: Unable to get special pool info GetUlongFromAddress: unable to read from fffff802719d8208 0000000000000038 CURRENT_IRQL: 0 FAULTING_IP: igdkmd64+63b60 fffff800`02a6fb60 4a89440138 mov qword ptr [rcx+r8+38h],rax CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: AV PROCESS_NAME: ð TRAP_FRAME: ffffd00025539ef0 -- (.trap 0xffffd00025539ef0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffe0000543aa70 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002a6fb60 rsp=ffffd0002553a088 rbp=ffffe00007882dc0 r8=0000000000000000 r9=0000000000000000 r10=ffffe00007882dc0 r11=0000000000000030 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc igdkmd64+0x63b60: fffff800`02a6fb60 4a89440138 mov qword ptr [rcx+r8+38h],rax ds:00000000`00000038=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff802717e47e9 to fffff802717d8ca0 STACK_TEXT: ffffd000`25539da8 fffff802`717e47e9 : 00000000`0000000a 00000000`00000038 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx ffffd000`25539db0 fffff802`717e303a : 00000000`00000001 ffffe000`05440320 00000000`00000000 ffffd000`25539ef0 : nt!KiBugCheckDispatch+0x69 ffffd000`25539ef0 fffff800`02a6fb60 : fffff800`02a6e8d8 00000000`00000000 00000000`00000000 ffffe000`0047b000 : nt!KiPageFault+0x23a ffffd000`2553a088 fffff800`02a6e8d8 : 00000000`00000000 00000000`00000000 ffffe000`0047b000 00000000`00000002 : igdkmd64+0x63b60 ffffd000`2553a090 00000000`00000000 : 00000000`00000000 ffffe000`0047b000 00000000`00000002 ffffe000`07882d01 : igdkmd64+0x628d8 STACK_COMMAND: kb FOLLOWUP_IP: igdkmd64+63b60 fffff800`02a6fb60 4a89440138 mov qword ptr [rcx+r8+38h],rax SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: igdkmd64+63b60 FOLLOWUP_NAME: MachineOwner MODULE_NAME: igdkmd64 IMAGE_NAME: igdkmd64.sys DEBUG_FLR_IMAGE_TIMESTAMP: 52379d96 FAILURE_BUCKET_ID: AV_igdkmd64+63b60 BUCKET_ID: AV_igdkmd64+63b60 Followup: MachineOwner ---------