*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {8000003f, 2, 1, fffff80002e9ee38}
Probably caused by : ntkrnlmp.exe ( nt!KiTryUnwaitThread+28 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000008000003f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002e9ee38, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c2100
000000008000003f
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiTryUnwaitThread+28
fffff800`02e9ee38 f0480fba6b4000 lock bts qword ptr [rbx+40h],0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: prototypef.exe
TRAP_FRAME: fffff8800aa61910 -- (.trap 0xfffff8800aa61910)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8008b3a708 rbx=0000000000000000 rcx=fffffa80096ac100
rdx=fffffa8008179558 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002e9ee38 rsp=fffff8800aa61aa8 rbp=0000000000000000
r8=0000000000000100 r9=0000000000000000 r10=fffffa80061e89c0
r11=0000000000100003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiTryUnwaitThread+0x28:
fffff800`02e9ee38 f0480fba6b4000 lock bts qword ptr [rbx+40h],0 ds:09d0:00000000`00000040=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e8f1e9 to fffff80002e8fc40
STACK_TEXT:
fffff880`0aa617c8 fffff800`02e8f1e9 : 00000000`0000000a 00000000`8000003f 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0aa617d0 fffff800`02e8de60 : 00000000`13a0f170 00000000`13a0fd20 fffff800`02e9a845 00000000`7fffffff : nt!KiBugCheckDispatch+0x69
fffff880`0aa61910 fffff800`02e9ee38 : fffff800`02e95fda fffff880`009ee180 fffffa80`08b3a600 00000000`00000202 : nt!KiPageFault+0x260
fffff880`0aa61aa8 fffff800`02e96dc3 : fffffa80`096ac170 00000000`00000000 fffffa80`096ac168 fffffa80`092dda08 : nt!KiTryUnwaitThread+0x28
fffff880`0aa61b08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`7ef6e001 : nt!KiSignalSynchronizationObject+0x203
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiTryUnwaitThread+28
fffff800`02e9ee38 f0480fba6b4000 lock bts qword ptr [rbx+40h],0
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiTryUnwaitThread+28
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
FAILURE_BUCKET_ID: X64_0xA_nt!KiTryUnwaitThread+28
BUCKET_ID: X64_0xA_nt!KiTryUnwaitThread+28
Followup: MachineOwner