*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffff87ffc88526c, 2, 0, fffff80002a12b43}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff87ffc88526c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002a12b43, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d03100
fffff87ffc88526c
CURRENT_IRQL: 2
FAULTING_IP:
hal!HalSendSoftwareInterrupt+b
fffff800`02a12b43 4883ec20 sub rsp,20h
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: audiodg.exe
TRAP_FRAME: fffff880039cd530 -- (.trap 0xfffff880039cd530)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffffffffffff02 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a12b43 rsp=fffff880039cd6c0 rbp=0000000000000003
r8=000000000000000b r9=0000000000000000 r10=fffff80002a54000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
hal!HalSendSoftwareInterrupt+0xb:
fffff800`02a12b43 4883ec20 sub rsp,20h
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ad01e9 to fffff80002ad0c40
STACK_TEXT:
fffff880`039cd3e8 fffff800`02ad01e9 : 00000000`0000000a fffff87f`fc88526c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`039cd3f0 fffff800`02acee60 : 00000000`004c5c10 00000000`00dbecc0 00000000`004b9468 fffff880`02fd3180 : nt!KiBugCheckDispatch+0x69
fffff880`039cd530 fffff800`02a12b43 : 00000000`00000202 fffff800`02ad6fbd fffff880`02fd3180 fffffa80`05c6a060 : nt!KiPageFault+0x260
fffff880`039cd6c0 fffff800`02ad6fbd : fffff880`02fd3180 fffffa80`05c6a060 fffff8a0`00760b80 fffff880`039cd900 : hal!HalSendSoftwareInterrupt+0xb
fffff880`039cd6d0 fffff800`02aaf62e : fffffa80`05c95040 00000000`00000000 00000000`00000000 fffff880`02f63180 : nt!KiDeferredReadyThread+0x2fd
fffff880`039cd750 fffff800`02ddc406 : fffffa80`05c6a168 00000000`00020000 00000000`00000000 fffffa80`05e67168 : nt!AlpcpQueueIoCompletionPort+0x30e
fffff880`039cd7d0 fffff800`02dde04e : 00000000`00020000 00000000`05e689a8 00000000`00000000 fffff880`00000000 : nt!AlpcpCompleteDispatchMessage+0x5b6
fffff880`039cd860 fffff800`02ddb94f : fffffa80`00020000 fffff8a0`02025f18 00000000`004c5c10 fffff8a0`01b54d00 : nt!AlpcpDispatchNewMessage+0x24e
fffff880`039cd8c0 fffff800`02de0526 : 00000000`000f0000 fffffa80`059c1800 00000000`004b9468 00000000`00000001 : nt!AlpcpSendMessage+0x4ad
fffff880`039cd9c0 fffff800`02dde36b : fffffa80`06167e60 00000000`00020000 00000000`004c5c10 00000000`004b9468 : nt!AlpcpProcessSynchronousRequest+0x2f3
fffff880`039cdb00 fffff800`02acfed3 : fffffa80`0612b660 fffff880`039cdca0 fffff880`039cdbc8 fffffa80`00000000 : nt!NtAlpcSendWaitReceivePort+0x1ab
fffff880`039cdbb0 00000000`7fff019f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00dbeb88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fff019f
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`02acee60 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
FAILURE_BUCKET_ID: X64_0xA_nt!KiPageFault+260
BUCKET_ID: X64_0xA_nt!KiPageFault+260
Followup: MachineOwner
---------