******************************************************************************** *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802716bc5fe, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 0000000000000000 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!KeWaitForSingleObject+19e
fffff802`716bc5fe 483901 cmp qword ptr [rcx],rax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
TRAP_FRAME: fffff88005241ad0 -- (.trap 0xfffff88005241ad0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800aac5758 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802716bc5fe rsp=fffff88005241c60 rbp=0000000000000000
r8=0000000000000000 r9=fffff780000003b0 r10=fffff78000000008
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KeWaitForSingleObject+0x19e:
fffff802`716bc5fe 483901 cmp qword ptr [rcx],rax ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80271695a69 to fffff80271696740
STACK_TEXT:
fffff880`05241988 fffff802`71695a69 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`05241990 fffff802`716942e0 : 00000000`00000000 fffffa80`0a9df5c0 fffff8a0`001ce600 fffff880`05241ad0 : nt!KiBugCheckDispatch+0x69
fffff880`05241ad0 fffff802`716bc5fe : 00000000`00000010 fffff802`71912180 00000000`00000ad2 00000000`00000000 : nt!KiPageFault+0x260
fffff880`05241c60 fffff880`07071def : fffffa80`0aac5750 fffffa80`00000000 fffff880`05241d00 fffffa80`0aac0000 : nt!KeWaitForSingleObject+0x19e
fffff880`05241cf0 fffffa80`0aac5750 : fffffa80`00000000 fffff880`05241d00 fffffa80`0aac0000 00000000`00000000 : athrx+0x1e2def
fffff880`05241cf8 fffffa80`00000000 : fffff880`05241d00 fffffa80`0aac0000 00000000`00000000 fffffa80`0a8be660 : 0xfffffa80`0aac5750
fffff880`05241d00 fffff880`05241d00 : fffffa80`0aac0000 00000000`00000000 fffffa80`0a8be660 fffffa80`0aac0030 : 0xfffffa80`00000000
fffff880`05241d08 fffffa80`0aac0000 : 00000000`00000000 fffffa80`0a8be660 fffffa80`0aac0030 00000000`00000000 : 0xfffff880`05241d00
fffff880`05241d10 00000000`00000000 : fffffa80`0a8be660 fffffa80`0aac0030 00000000`00000000 fffff802`7196c880 : 0xfffffa80`0aac0000
STACK_COMMAND: kb
FOLLOWUP_IP:
athrx+1e2def
fffff880`07071def ?? ???
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: athrx+1e2def
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: athrx
IMAGE_NAME: athrx.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4f6a9bde
FAILURE_BUCKET_ID: AV_athrx+1e2def
BUCKET_ID: AV_athrx+1e2def
Followup: MachineOwner
---------