*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 1, fffff80002ccf337}
Probably caused by : win32k.sys ( win32k!NtUserGetMessage+a1 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ccf337, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f0b100
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiDeliverApc+187
fffff800`02ccf337 488910 mov qword ptr [rax],rdx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: conhost.exe
TRAP_FRAME: fffff880063e1920 -- (.trap 0xfffff880063e1920)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ccf337 rsp=fffff880063e1ab0 rbp=0000000000000000
r8=fffffa8005bcffb0 r9=0000000000000000 r10=fffffa8005bcffa0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiDeliverApc+0x187:
fffff800`02ccf337 488910 mov qword ptr [rax],rdx ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cdb2a9 to fffff80002cdbd00
STACK_TEXT:
fffff880`063e17d8 fffff800`02cdb2a9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`063e17e0 fffff800`02cd9f20 : 00000000`00000000 fffff960`002c5e2a 00000000`00000000 fffffa80`05bcfb60 : nt!KiBugCheckDispatch+0x69
fffff880`063e1920 fffff800`02ccf337 : 00000001`00000000 00000000`00000001 00000000`00000000 00000000`05bcfb60 : nt!KiPageFault+0x260
fffff880`063e1ab0 fffff800`02c88f35 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x187
fffff880`063e1b30 fffff800`02c7c5e3 : 00000000`00b7f850 00000000`00000000 00000000`00000001 00000000`00000001 : nt!KiCheckForKernelApcDelivery+0x25
fffff880`063e1b60 fffff960`001abdc1 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`050eadb0 : nt! ?? ::FNODOBFM::`string'+0x49ae4
fffff880`063e1b90 fffff800`02cdaf93 : fffffa80`05bcfb60 00000000`00000000 00000000`00000020 00000000`00000000 : win32k!NtUserGetMessage+0xa1
fffff880`063e1c20 00000000`76c29e6a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00b7f7f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76c29e6a
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!NtUserGetMessage+a1
fffff960`001abdc1 8bc3 mov eax,ebx
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: win32k!NtUserGetMessage+a1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d6f104c
FAILURE_BUCKET_ID: X64_0xA_win32k!NtUserGetMessage+a1
BUCKET_ID: X64_0xA_win32k!NtUserGetMessage+a1
Followup: MachineOwner
---------