******************************************************************************* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8801ba1c000, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff880018febaf, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
OVERLAPPED_MODULE: Address regions for 'HTTP' and 'dump_iaStor.' overlap
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80073bc3168
GetUlongFromAddress: unable to read from fffff80073bc31f8
fffff8801ba1c000 Nonpaged pool
FAULTING_IP:
ndis!memcpy+af
fffff880`018febaf 660f7f41e0 movdqa xmmword ptr [rcx-20h],xmm0
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: Ath_WlanAgent.
CURRENT_IRQL: 0
TRAP_FRAME: fffff88019364160 -- (.trap 0xfffff88019364160)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff8801ba1c020
rdx=000001ffe99efcd8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880018febaf rsp=fffff880193642f8 rbp=fffff88019364400
r8=0000000000000010 r9=00000000000000c7 r10=0000000000000000
r11=fffff8801ba1b2d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ndis!memcpy+0xaf:
fffff880`018febaf 660f7f41e0 movdqa xmmword ptr [rcx-20h],xmm0 ds:fffff880`1ba1c000=????????????????????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80073a55e4d to fffff800738e7740
STACK_TEXT:
fffff880`19363f78 fffff800`73a55e4d : 00000000`00000050 fffff880`1ba1c000 00000000`00000001 fffff880`19364160 : nt!KeBugCheckEx
fffff880`19363f80 fffff800`73922e1f : 00000000`00000001 fffff880`1ba1c000 fffffa80`0a550080 fffff880`018fb82f : nt! ?? ::FNODOBFM::`string'+0x3256b
fffff880`19364020 fffff800`738e51ee : 00000000`00000001 00000000`00000050 fffff880`018fc400 fffff880`19364160 : nt!MmAccessFault+0x54f
fffff880`19364160 fffff880`018febaf : fffff880`0197cbbe 00000000`00000050 fffffa80`0515d260 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`193642f8 fffff880`0197cbbe : 00000000`00000050 fffffa80`0515d260 00000000`00000000 00000000`000007ff : ndis!memcpy+0xaf
fffff880`19364300 fffff880`01112e8f : fffffa80`08c16450 fffff880`19364540 fffffa80`08c16450 00000000`00000000 : ndis!ndisDeviceControlIrpHandler+0x30e
fffff880`193644f0 fffff880`068289eb : fffffa80`082b27a0 fffffa80`08c16450 fffffa80`08289e90 fffff880`06825188 : Wdf01000!imp_WdfRequestSend+0x3fb
fffff880`19364580 fffff880`0110ff88 : fffffa80`08c16450 fffffa80`08c16450 fffff880`19364670 fffffa80`0a4a6940 : vwifibus!FilterEvtIoDeviceControl+0x1e7
fffff880`19364630 fffff880`0110f42f : fffffa80`08289a00 fffffa80`00000004 fffffa80`08289a60 fffffa80`082d3b78 : Wdf01000!FxIoQueue::DispatchRequestToDriver+0x488
fffff880`193646b0 fffff880`0111afbb : fffffa80`082b2620 fffffa80`08c16400 00000000`00000000 fffffa80`08c16450 : Wdf01000!FxIoQueue::DispatchEvents+0x66f
fffff880`19364730 fffff880`0111430a : fffffa80`082b2600 fffffa80`08c16450 fffffa80`0515d260 fffff880`19364810 : Wdf01000!FxIoQueue::QueueRequest+0x2ab
fffff880`193647a0 fffff880`011139da : fffffa80`08c16450 fffffa80`0515d260 fffff880`19364b80 fffffa80`0515d260 : Wdf01000!FxPkgIo::Dispatch+0x4da
fffff880`19364810 fffff880`01113aa6 : fffffa80`0515d260 fffff880`19364b80 fffffa80`07e104d0 00000000`0000000e : Wdf01000!FxDevice::Dispatch+0x19a
fffff880`19364850 fffff800`73ccc44f : fffffa80`0515d260 fffff880`19364b80 fffffa80`0515d450 fffffa80`0515d450 : Wdf01000!FxDevice::DispatchWithLock+0xa6
fffff880`19364890 fffff800`73cccdd6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x7dd
fffff880`19364a20 fffff800`738e6753 : 00000000`00000000 fffffa80`04c654d0 fffff6fb`7dbed000 fffff6fb`7da00008 : nt!NtDeviceIoControlFile+0x56
fffff880`19364a90 00000000`77232ad2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0008ee28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77232ad2
STACK_COMMAND: kb
FOLLOWUP_IP:
vwifibus!FilterEvtIoDeviceControl+1e7
fffff880`068289eb 84c0 test al,al
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: vwifibus!FilterEvtIoDeviceControl+1e7
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: vwifibus
IMAGE_NAME: vwifibus.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5010ab2a
BUCKET_ID_FUNC_OFFSET: 1e7
FAILURE_BUCKET_ID: AV_vwifibus!FilterEvtIoDeviceControl
BUCKET_ID: AV_vwifibus!FilterEvtIoDeviceControl
Followup: MachineOwner
---------