*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000004, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ed42c9, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800031020e8
0000000000000004
CURRENT_IRQL: 2
FAULTING_IP:
nt!SwapContext_PatchXSave+c8
fffff800`02ed42c9 850c01 test dword ptr [rcx+rax],ecx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: rads_user_kern
TRAP_FRAME: fffff8800b2e6900 -- (.trap 0xfffff8800b2e6900)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000004
rdx=0000000000000004 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ed42c9 rsp=fffff8800b2e6a90 rbp=fffff8800b0aedb0
r8=fffffa800420d278 r9=0000000000000000 r10=fffffffffffffffb
r11=00000000002f5600 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!SwapContext_PatchXSave+0xc8:
fffff800`02ed42c9 850c01 test dword ptr [rcx+rax],ecx ds:6b10:00000000`00000004=????????
Resetting default scope
MISALIGNED_IP:
nt!SwapContext_PatchXSave+c8
fffff800`02ed42c9 850c01 test dword ptr [rcx+rax],ecx
LAST_CONTROL_TRANSFER: from fffff80002ed0be9 to fffff80002ed1640
STACK_TEXT:
fffff880`0b2e67b8 fffff800`02ed0be9 : 00000000`0000000a 00000000`00000004 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0b2e67c0 fffff800`02ecf860 : fffffa80`042af470 fffff880`011922ec fffff880`0b2e6a50 fffff880`03164180 : nt!KiBugCheckDispatch+0x69
fffff880`0b2e6900 fffff800`02ed42c9 : fffff880`00000002 00000000`00000000 00000000`00000000 fffffa80`03bdad84 : nt!KiPageFault+0x260
fffff880`0b2e6a90 fffff800`02ed40ef : fffff880`03164180 fffffa80`03cca060 fffff880`00000000 00000000`032773bc : nt!SwapContext_PatchXSave+0xc8
fffff880`0b2e6ad0 fffff800`02f1d453 : fffff800`02edd74c fffff800`02edd7b8 00000000`00007e95 fffff880`0b2e6ca0 : nt!KxDispatchInterrupt+0x12f
fffff880`0b2e6c10 fffff800`02edd7b8 : 00000000`00007e95 fffff880`0b2e6ca0 00000000`03b9c073 00000000`03a830f8 : nt!KiDpcInterruptBypass+0x13
fffff880`0b2e6c20 00000000`00471e3c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSecondaryClockInterrupt+0x1a8
00000000`03277310 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x471e3c
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!SwapContext_PatchXSave+c8
fffff800`02ed42c9 850c01 test dword ptr [rcx+rax],ecx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!SwapContext_PatchXSave+c8
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED
BUCKET_ID: X64_IP_MISALIGNED
Followup: MachineOwner
---------
2: kd> .trap 0xfffff8800b2e6900
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000004
rdx=0000000000000004 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ed42c9 rsp=fffff8800b2e6a90 rbp=fffff8800b0aedb0
r8=fffffa800420d278 r9=0000000000000000 r10=fffffffffffffffb
r11=00000000002f5600 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!SwapContext_PatchXSave+0xc8:
fffff800`02ed42c9 850c01 test dword ptr [rcx+rax],ecx ds:6b10:00000000`00000004=????????