******************************************************************************** *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {1c, 2, 1, fffff8800457c6e8}
Unable to load image \SystemRoot\system32\DRIVERS\athrx.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for athrx.sys
*** ERROR: Module load completed but symbols could not be loaded for athrx.sys
[COLOR=#ff0000]Probably caused by : athrx.sys ( athrx+10a6e8 )[/COLOR]
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000001c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8800457c6e8, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800040b90e0
000000000000001c
CURRENT_IRQL: 2
FAULTING_IP:
[COLOR=#ff0000]athrx+10a6e8[/COLOR]
fffff880`0457c6e8 c7401c00000000 mov dword ptr [rax+1Ch],0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88002fcb810 -- (.trap 0xfffff88002fcb810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000009920 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800457c6e8 rsp=fffff88002fcb9a0 rbp=fffff800040265a0
r8=000000000491a000 r9=0000000000000000 r10=000000000000004d
r11=fffffa80059f0128 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
athrx+0x10a6e8:
fffff880`0457c6e8 c7401c00000000 mov dword ptr [rax+1Ch],0 ds:0002:00000000`0000001c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003e81aa9 to fffff80003e82540
STACK_TEXT:
fffff880`02fcb6c8 fffff800`03e81aa9 : 00000000`0000000a 00000000`0000001c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`02fcb6d0 fffff800`03e80720 : 00000000`00000010 fffffa80`054ce050 fffff880`02fcb830 fffff800`043fd1bc : nt!KiBugCheckDispatch+0x69
fffff880`02fcb810 fffff880`0457c6e8 : fffffa80`059e3030 fffffa80`059f0128 fffffa80`00000008 fffff880`0000981c : nt!KiPageFault+0x260
[COLOR=#ff0000]fffff880`02fcb9a0 fffffa80`059e3030 : fffffa80`059f0128 fffffa80`00000008 fffff880`0000981c 00000000`00000001 : athrx+0x10a6e8[/COLOR]
fffff880`02fcb9a8 fffffa80`059f0128 : fffffa80`00000008 fffff880`0000981c 00000000`00000001 fffffa80`059e28a0 : 0xfffffa80`059e3030
fffff880`02fcb9b0 fffffa80`00000008 : fffff880`0000981c 00000000`00000001 fffffa80`059e28a0 00000000`00000000 : 0xfffffa80`059f0128
fffff880`02fcb9b8 fffff880`0000981c : 00000000`00000001 fffffa80`059e28a0 00000000`00000000 fffffa80`059e3030 : 0xfffffa80`00000008
fffff880`02fcb9c0 00000000`00000001 : fffffa80`059e28a0 00000000`00000000 fffffa80`059e3030 fffff880`02fcbc54 : 0xfffff880`0000981c
fffff880`02fcb9c8 fffffa80`059e28a0 : 00000000`00000000 fffffa80`059e3030 fffff880`02fcbc54 fffff880`0457501c : 0x1
fffff880`02fcb9d0 00000000`00000000 : fffffa80`059e3030 fffff880`02fcbc54 fffff880`0457501c fffffa80`059e3030 : 0xfffffa80`059e28a0
STACK_COMMAND: kb
FOLLOWUP_IP:
athrx+10a6e8
fffff880`0457c6e8 c7401c00000000 mov dword ptr [rax+1Ch],0
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: athrx+10a6e8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: athrx
[COLOR=#ff0000]IMAGE_NAME: athrx.sys[/COLOR]
DEBUG_FLR_IMAGE_TIMESTAMP: 4b8db121
FAILURE_BUCKET_ID: X64_0xD1_athrx+10a6e8
BUCKET_ID: X64_0xD1_athrx+10a6e8
Followup: MachineOwner
---------