*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {100f660f0, 2, 1, fffff80002c7d3e3}
Probably caused by : ntkrnlmp.exe ( nt!KiTimerWaitTest+2b3 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000100f660f0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002c7d3e3, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eab0e0
0000000100f660f0
CURRENT_IRQL: 0
FAULTING_IP:
nt!KiTimerWaitTest+2b3
fffff800`02c7d3e3 48894108 mov qword ptr [rcx+8],rax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
LAST_CONTROL_TRANSFER: from fffff80002c8124a to fffff88003fa27f2
STACK_TEXT:
fffff800`0413dc98 fffff800`02c8124a : 00000000`0032e358 fffffa80`05b7a5e8 fffff800`02dfbc40 00000000`00000001 : 0xfffff880`03fa27f2
fffff800`0413dca0 fffff800`02c7bebc : fffff800`02dede80 fffff800`00000000 00000000`00000000 fffff800`02d93d00 : nt!PoIdle+0x53a
fffff800`0413dd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x2c
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
nt!KiTimerWaitTest+2b3
fffff800`02c7d3e3 48894108 mov qword ptr [rcx+8],rax
SYMBOL_NAME: nt!KiTimerWaitTest+2b3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fdd34
FAILURE_BUCKET_ID: X64_0xA_nt!KiTimerWaitTest+2b3
BUCKET_ID: X64_0xA_nt!KiTimerWaitTest+2b3
Followup: MachineOwner
---------