Hi, my computer has blue screened a couple of times and it seems to be at ramdon, i am having trouble trying to figure out what it is,
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffffac043a3ec50, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8800417d8e2, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: fffffac043a3ec50 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
afd!AfdTimeoutPoll+22
fffff880`0417d8e2 c7413002010000 mov dword ptr [rcx+30h],102h
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TAG_NOT_DEFINED_c000000f: FFFFF80000BA2FB0
TRAP_FRAME: fffff80000b9c270 -- (.trap 0xfffff80000b9c270)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffac043a3ec20
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800417d8e2 rsp=fffff80000b9c400 rbp=0000000000000000
r8=000000006308c20b r9=0000000001cd9743 r10=fffff80003265000
r11=fffff80000b9c470 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
afd!AfdTimeoutPoll+0x22:
fffff880`0417d8e2 c7413002010000 mov dword ptr [rcx+30h],102h ds:fffffac0`43a3ec50=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032e3769 to fffff800032e41c0
STACK_TEXT:
fffff800`00b9c128 fffff800`032e3769 : 00000000`0000000a fffffac0`43a3ec50 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9c130 fffff800`032e23e0 : 00000000`00000000 fffff800`03456e80 fffff800`032ee085 fffff800`00b9c4c0 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c270 fffff880`0417d8e2 : fffff800`03456e80 00000000`00000007 fffff880`0336d180 fffff800`032e981a : nt!KiPageFault+0x260
fffff800`00b9c400 fffff800`032eee3c : 00000000`00000000 00000000`000000ff 00000005`27d65000 00000000`00000043 : afd!AfdTimeoutPoll+0x22
fffff800`00b9c430 fffff800`032eecd6 : fffffa80`3a3a0168 fffffa80`3a3a0168 00000000`00000000 00000000`00000000 : nt!KiProcessTimerDpcTable+0x6c
fffff800`00b9c4a0 fffff800`032eebbe : 000000a3`2d0e8dd6 fffff800`00b9cb18 00000000`00448cdb fffff800`0345ade8 : nt!KiProcessExpiredTimerList+0xc6
fffff800`00b9caf0 fffff800`032ee9a7 : 00000039`8fd218c2 00000039`00448cdb 00000039`8fd218ef 00000000`000000db : nt!KiTimerExpiration+0x1be
fffff800`00b9cb90 fffff800`032dbeca : fffff800`03456e80 fffff800`03464cc0 00000000`00000000 fffff880`1138a038 : nt!KiRetireDpcList+0x277
fffff800`00b9cc40 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cc00 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
afd!AfdTimeoutPoll+22
fffff880`0417d8e2 c7413002010000 mov dword ptr [rcx+30h],102h
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: afd!AfdTimeoutPoll+22
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: afd
IMAGE_NAME: afd.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4efa9418
FAILURE_BUCKET_ID: X64_0xD1_afd!AfdTimeoutPoll+22
BUCKET_ID: X64_0xD1_afd!AfdTimeoutPoll+22
Followup: MachineOwner
---------
Original Dump File Attached.
Can anyone help please.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffffac043a3ec50, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8800417d8e2, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: fffffac043a3ec50 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
afd!AfdTimeoutPoll+22
fffff880`0417d8e2 c7413002010000 mov dword ptr [rcx+30h],102h
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TAG_NOT_DEFINED_c000000f: FFFFF80000BA2FB0
TRAP_FRAME: fffff80000b9c270 -- (.trap 0xfffff80000b9c270)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffac043a3ec20
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800417d8e2 rsp=fffff80000b9c400 rbp=0000000000000000
r8=000000006308c20b r9=0000000001cd9743 r10=fffff80003265000
r11=fffff80000b9c470 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
afd!AfdTimeoutPoll+0x22:
fffff880`0417d8e2 c7413002010000 mov dword ptr [rcx+30h],102h ds:fffffac0`43a3ec50=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032e3769 to fffff800032e41c0
STACK_TEXT:
fffff800`00b9c128 fffff800`032e3769 : 00000000`0000000a fffffac0`43a3ec50 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9c130 fffff800`032e23e0 : 00000000`00000000 fffff800`03456e80 fffff800`032ee085 fffff800`00b9c4c0 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c270 fffff880`0417d8e2 : fffff800`03456e80 00000000`00000007 fffff880`0336d180 fffff800`032e981a : nt!KiPageFault+0x260
fffff800`00b9c400 fffff800`032eee3c : 00000000`00000000 00000000`000000ff 00000005`27d65000 00000000`00000043 : afd!AfdTimeoutPoll+0x22
fffff800`00b9c430 fffff800`032eecd6 : fffffa80`3a3a0168 fffffa80`3a3a0168 00000000`00000000 00000000`00000000 : nt!KiProcessTimerDpcTable+0x6c
fffff800`00b9c4a0 fffff800`032eebbe : 000000a3`2d0e8dd6 fffff800`00b9cb18 00000000`00448cdb fffff800`0345ade8 : nt!KiProcessExpiredTimerList+0xc6
fffff800`00b9caf0 fffff800`032ee9a7 : 00000039`8fd218c2 00000039`00448cdb 00000039`8fd218ef 00000000`000000db : nt!KiTimerExpiration+0x1be
fffff800`00b9cb90 fffff800`032dbeca : fffff800`03456e80 fffff800`03464cc0 00000000`00000000 fffff880`1138a038 : nt!KiRetireDpcList+0x277
fffff800`00b9cc40 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cc00 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
afd!AfdTimeoutPoll+22
fffff880`0417d8e2 c7413002010000 mov dword ptr [rcx+30h],102h
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: afd!AfdTimeoutPoll+22
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: afd
IMAGE_NAME: afd.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4efa9418
FAILURE_BUCKET_ID: X64_0xD1_afd!AfdTimeoutPoll+22
BUCKET_ID: X64_0xD1_afd!AfdTimeoutPoll+22
Followup: MachineOwner
---------
Original Dump File Attached.
Can anyone help please.
Attachments
-
31.2 KB Views: 314