*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffffa84144401e8, 2, 1, fffff880051529ed}
Unable to load image \SystemRoot\system32\DRIVERS\Rt64win7.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Rt64win7.sys
*** ERROR: Module load completed but symbols could not be loaded for Rt64win7.sys
Probably caused by : Rt64win7.sys ( Rt64win7+159ed )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffffa84144401e8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff880051529ed, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000190a0e0
fffffa84144401e8
CURRENT_IRQL: 2
FAULTING_IP:
Rt64win7+159ed
fffff880`051529ed 89848ffc340000 mov dword ptr [rdi+rcx*4+34FCh],eax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT_SERVER_MINIDUMP
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff8000155a320 -- (.trap 0xfffff8000155a320)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000038e12d rbx=0000000000000000 rcx=00000000ffffff3b
rdx=fffff8000155a4ec rsi=0000000000000000 rdi=0000000000000000
rip=fffff880051529ed rsp=fffff8000155a4b0 rbp=0000000000000001
r8=0000000000000000 r9=000000000038e12d r10=fffff8000184ce80
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
Rt64win7+0x159ed:
fffff880`051529ed 89848ffc340000 mov dword ptr [rdi+rcx*4+34FCh],eax ds:000c:00000004`000031e8=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800016d3469 to fffff800016d3f00
STACK_TEXT:
fffff800`0155a1d8 fffff800`016d3469 : 00000000`0000000a fffffa84`144401e8 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`0155a1e0 fffff800`016d20e0 : fffff800`0184ce80 00000000`00000000 ffffffff`00040001 00000000`00000004 : nt!KiBugCheckDispatch+0x69
fffff800`0155a320 fffff880`051529ed : 00000000`000000f5 00000000`00000001 00000000`00000000 fffffa80`1443d000 : nt!KiPageFault+0x260
fffff800`0155a4b0 00000000`000000f5 : 00000000`00000001 00000000`00000000 fffffa80`1443d000 00000000`00000000 : Rt64win7+0x159ed
fffff800`0155a4b8 00000000`00000001 : 00000000`00000000 fffffa80`1443d000 00000000`00000000 fffffa80`1337b000 : 0xf5
fffff800`0155a4c0 00000000`00000000 : fffffa80`1443d000 00000000`00000000 fffffa80`1337b000 00000001`00000000 : 0x1
STACK_COMMAND: kb
FOLLOWUP_IP:
Rt64win7+159ed
fffff880`051529ed 89848ffc340000 mov dword ptr [rdi+rcx*4+34FCh],eax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: Rt64win7+159ed
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Rt64win7
IMAGE_NAME: Rt64win7.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 49a65b0d
FAILURE_BUCKET_ID: X64_0xD1_Rt64win7+159ed
BUCKET_ID: X64_0xD1_Rt64win7+159ed
Followup: MachineOwner