Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
........................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {44, 2, 0, fffff880052618c1}
Unable to load image \SystemRoot\system32\DRIVERS\athrx.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for athrx.sys
*** ERROR: Module load completed but symbols could not be loaded for athrx.sys
Probably caused by : athrx.sys ( athrx+5c8c1 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000044, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880052618c1, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f010e0
0000000000000044
CURRENT_IRQL: 2
FAULTING_IP:
athrx+5c8c1
fffff880`052618c1 8b4044 mov eax,dword ptr [rax+44h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880070a7380 -- (.trap 0xfffff880070a7380)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8002f34498
rdx=fffffa8002f34498 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880052618c1 rsp=fffff880070a7510 rbp=0000000000000000
r8=0000000000000000 r9=fffffa8003c35510 r10=fffffa8003ba8340
r11=fffffa8002f34498 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
athrx+0x5c8c1:
fffff880`052618c1 8b4044 mov eax,dword ptr [rax+44h] ds:b640:00000000`00000044=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cc8ca9 to fffff80002cc9740
STACK_TEXT:
fffff880`070a7238 fffff800`02cc8ca9 : 00000000`0000000a 00000000`00000044 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`070a7240 fffff800`02cc7920 : fffffa80`0231a010 00000000`00000000 fffffa80`0231a173 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`070a7380 fffff880`052618c1 : fffffa80`02f34498 00000000`00000000 00000000`00000000 fffffa80`039ff030 : nt!KiPageFault+0x260
fffff880`070a7510 fffffa80`02f34498 : 00000000`00000000 00000000`00000000 fffffa80`039ff030 fffffa80`0000001a : athrx+0x5c8c1
fffff880`070a7518 00000000`00000000 : 00000000`00000000 fffffa80`039ff030 fffffa80`0000001a fffffa80`04d53340 : 0xfffffa80`02f34498
STACK_COMMAND: kb
FOLLOWUP_IP:
athrx+5c8c1
fffff880`052618c1 8b4044 mov eax,dword ptr [rax+44h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: athrx+5c8c1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: athrx
IMAGE_NAME: athrx.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4acea2b7
FAILURE_BUCKET_ID: X64_0xD1_athrx+5c8c1
BUCKET_ID: X64_0xD1_athrx+5c8c1
Followup: MachineOwner
---------