New
#1
Random BSOD IRQL_NOT_LESS_OR_EQUAL (a)
I get random BSOD. I did try to analyze the dump and got the following output. I am also attaching the minidump as zip file. Thanks
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffff880f941d778, 2, 0, fffff80002a974f9}
Probably caused by : ntkrnlmp.exe ( nt!KiTimerExpiration+d9 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff880f941d778, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002a974f9, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc4100
fffff880f941d778
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiTimerExpiration+d9
fffff800`02a974f9 483958f8 cmp qword ptr [rax-8],rbx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9ca60 -- (.trap 0xfffff80000b9ca60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880f941d780 rbx=0000000000000000 rcx=0000000000034496
rdx=0000000000000096 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a974f9 rsp=fffff80000b9cbf0 rbp=0000000000034496
r8=fffffa80047ff120 r9=00000000000000fa r10=0000000000000096
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!KiTimerExpiration+0xd9:
fffff800`02a974f9 483958f8 cmp qword ptr [rax-8],rbx ds:2d28:fffff880`f941d778=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a8c169 to fffff80002a8cbc0
STACK_TEXT:
fffff800`00b9c918 fffff800`02a8c169 : 00000000`0000000a fffff880`f941d778 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9c920 fffff800`02a8ade0 : fffff800`00b9ca58 00000000`00000410 fffffa80`073321a0 00000007`cb6a144b : nt!KiBugCheckDispatch+0x69
fffff800`00b9ca60 fffff800`02a974f9 : 00000007`cb6a144b fffff800`00b9cc18 00000000`000343cc fffff800`02c0bc08 : nt!KiPageFault+0x260
fffff800`00b9cbf0 fffff800`02a973c7 : fffff800`02c07efa fffffa80`00034496 fffffa80`07332d40 00000000`00000096 : nt!KiTimerExpiration+0xd9
fffff800`00b9cc90 fffff800`02a848ca : fffff800`02c07e80 fffff800`02c15cc0 00000000`00000000 fffff880`04ba4db0 : nt!KiRetireDpcList+0x277
fffff800`00b9cd40 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd00 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiTimerExpiration+d9
fffff800`02a974f9 483958f8 cmp qword ptr [rax-8],rbx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiTimerExpiration+d9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 531590fb
FAILURE_BUCKET_ID: X64_0xA_nt!KiTimerExpiration+d9
BUCKET_ID: X64_0xA_nt!KiTimerExpiration+d9
Followup: MachineOwner
---------