*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000309ad75, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032c9100
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!KeSetEvent+1e3
fffff800`0309ad75 488b00 mov rax,qword ptr [rax]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff880037704a0 -- (.trap 0xfffff880037704a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800c263a98
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000309ad75 rsp=fffff88003770630 rbp=0000000000000000
r8=0000000000000000 r9=00000000000000a0 r10=0000000000000000
r11=fffffa8007329b60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe cy
nt!KeSetEvent+0x1e3:
fffff800`0309ad75 488b00 mov rax,qword ptr [rax] ds:05e8:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030961e9 to fffff80003096c40
STACK_TEXT:
fffff880`03770358 fffff800`030961e9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`03770360 fffff800`03094e60 : 00000000`00000000 fffff800`03095ed3 fffffa80`07329b60 fffffa80`0c263a90 : nt!KiBugCheckDispatch+0x69
fffff880`037704a0 fffff800`0309ad75 : fffff880`03770648 fffff880`0845fae0 00000000`00000030 fffff880`0845248a : nt!KiPageFault+0x260
fffff880`03770630 fffff880`0844c56b : fffff880`00000000 fffff880`00000000 fffffa80`00000000 fffffa80`09f27060 : nt!KeSetEvent+0x1e3
fffff880`037706a0 fffff880`00000000 : fffff880`00000000 fffffa80`00000000 fffffa80`09f27060 00000000`00000000 : CtClsFlt+0x156b
fffff880`037706a8 fffff880`00000000 : fffffa80`00000000 fffffa80`09f27060 00000000`00000000 00000000`00000000 : 0xfffff880`00000000
fffff880`037706b0 fffffa80`00000000 : fffffa80`09f27060 00000000`00000000 00000000`00000000 fffffa80`12861010 : 0xfffff880`00000000
fffff880`037706b8 fffffa80`09f27060 : 00000000`00000000 00000000`00000000 fffffa80`12861010 fffff880`0844c894 : 0xfffffa80`00000000
fffff880`037706c0 00000000`00000000 : 00000000`00000000 fffffa80`12861010 fffff880`0844c894 fffffa80`12861010 : 0xfffffa80`09f27060
STACK_COMMAND: kb
FOLLOWUP_IP:
CtClsFlt+156b
fffff880`0844c56b ?? ???
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: CtClsFlt+156b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: CtClsFlt
IMAGE_NAME: CtClsFlt.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d37aa0e
FAILURE_BUCKET_ID: X64_0xA_CtClsFlt+156b
BUCKET_ID: X64_0xA_CtClsFlt+156b
Followup: MachineOwner
---------