*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {3914bdb3, d, 0, fffff80002edd5fc}
Unable to load image \SystemRoot\system32\DRIVERS\intelppm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for intelppm.sys
*** ERROR: Module load completed but symbols could not be loaded for intelppm.sys
Probably caused by : intelppm.sys ( intelppm+39c2 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000003914bdb3, memory referenced
Arg2: 000000000000000d, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002edd5fc, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800031080e0
000000003914bdb3
CURRENT_IRQL: d
FAULTING_IP:
nt!KeUpdateRunTime+9c
fffff800`02edd5fc 450fb6842470010000 movzx r8d,byte ptr [r12+170h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff88002f1b900 -- (.trap 0xfffff88002f1b900)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000006a7bc4eb02
rdx=0000000000001a60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002edd5fc rsp=fffff88002f1ba90 rbp=0000000000000000
r8=00000000002cbbd3 r9=00000000002cbbd3 r10=0000000000000c97
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KeUpdateRunTime+0x9c:
fffff800`02edd5fc 450fb6842470010000 movzx r8d,byte ptr [r12+170h] ds:3000:00000000`00000170=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ecfc69 to fffff80002ed0700
STACK_TEXT:
fffff880`02f1b7b8 fffff800`02ecfc69 : 00000000`0000000a 00000000`3914bdb3 00000000`0000000d 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f1b7c0 fffff800`02ece8e0 : 00000000`00000000 fffff880`009e9180 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02f1b900 fffff800`02edd5fc : fffff800`03187000 00000000`00000000 00000000`00002711 fffffa80`0dbe9400 : nt!KiPageFault+0x260
fffff880`02f1ba90 fffff800`02edd3a1 : 00000000`00000000 fffff880`02f1bb40 fffff880`009e9180 00000000`00000001 : nt!KeUpdateRunTime+0x9c
fffff880`02f1bac0 fffff880`049529c2 : fffff800`02ede24a 00000000`00312cce fffffa80`0dbe94b8 fffff880`009f40c0 : nt!KiSecondaryClockInterrupt+0x131
fffff880`02f1bc58 fffff800`02ede24a : 00000000`00312cce fffffa80`0dbe94b8 fffff880`009f40c0 00000000`00000001 : intelppm+0x39c2
fffff880`02f1bc60 fffff800`02ed8ebc : fffff880`009e9180 fffff880`00000000 00000000`00000000 fffff800`02f89130 : nt!PoIdle+0x53a
fffff880`02f1bd40 00000000`00000000 : fffff880`02f1c000 fffff880`02f16000 fffff880`02f1bd00 00000000`00000000 : nt!KiIdleLoop+0x2c
STACK_COMMAND: kb
FOLLOWUP_IP:
intelppm+39c2
fffff880`049529c2 ?? ???
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: intelppm+39c2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: intelppm
IMAGE_NAME: intelppm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc0fd
FAILURE_BUCKET_ID: X64_0xA_VRF_intelppm+39c2
BUCKET_ID: X64_0xA_VRF_intelppm+39c2
Followup: MachineOwner
---------