Multiple DSOD ntoskrnl.exe + Stop error code 0x0000000A (IRQL_NOT_LES


  1. Posts : 3
    Windows 7 64 bits
       #1

    Multiple DSOD ntoskrnl.exe + Stop error code 0x0000000A (IRQL_NOT_LES


    Hello,
    I'm new to my office, since I started working here I'm getting this constants BSODs, but checking the windows logs it seems like it started happening long ago.
    A week ago I unnistalled several drivers and software (including avastt and daemon tools) and it stopped crashing, but it was almost imposible to boot, it kept getting bsod after the windows logo screen, but I had no problem when booting in safe mode. Sometimes it'll just boot normally and wont crash anytime and next day it won't boot .
    I'd tried cleaning the registry using CCLEANER, SmartPCFixer, updated drivers with Driver Booster 2 and manually, run Spyware Terminator ETC. Nothing worked, i keep getting the "Stop error code 0x0000000A (IRQL_NOT_LESS_OR_EQUAL)" BS.

    And It's impossible to run a memcheck or reinstall the SO since it's the only PC available, but I'll try to clean the RAM slots when I can..

    - Dump files and screen shots -

    Attachment 356452

    Attachment 356453

    Attachment 356454

    Attachment 356456

    (Sorry about my english)
      My Computer


  2. Posts : 3
    Windows 7 64 bits
    Thread Starter
       #2

    Microsoft (R) Windows Debugger Version 6.3.9600.17298 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [Z:\3D Print\Grafica\makers parts\041615-32136-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available


    ************* Symbol Path validation summary **************
    Response Time (ms) Location
    Deferred symsrv*symsrv.dll*f:\localsymbols*http://msdl.microsoft.com/download/symbols
    Symbol search path is: symsrv*symsrv.dll*f:\localsymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.18798.amd64fre.win7sp1_gdr.150316-1654
    Machine Name:
    Kernel base = 0xfffff800`0381a000 PsLoadedModuleList = 0xfffff800`03a5f890
    Debug session time: Thu Apr 16 09:23:33.323 2015 (UTC - 3:00)
    System Uptime: 0 days 1:32:06.462
    Loading Kernel Symbols
    .

    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.

    ..............................................................
    ................................................................
    .......................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck A, {800005998a, 2, 0, fffff800038c2c4b}

    Probably caused by : memory_corruption ( nt!MiMapPageInHyperSpaceWorker+1b )

    Followup: MachineOwner
    ---------

    0: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high. This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 000000800005998a, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff800038c2c4b, address which referenced memory

    Debugging Details:
    ------------------


    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ac9100
    GetUlongFromAddress: unable to read from fffff80003ac91c0
    000000800005998a Nonpaged pool

    CURRENT_IRQL: 2

    FAULTING_IP:
    nt!MiMapPageInHyperSpaceWorker+1b
    fffff800`038c2c4b 458a481a mov r9b,byte ptr [r8+1Ah]

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

    BUGCHECK_STR: 0xA

    PROCESS_NAME: chrome.exe

    ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre

    TRAP_FRAME: fffff88008d007d0 -- (.trap 0xfffff88008d007d0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000058000000000 rbx=0000000000000000 rcx=0000002000001ddd
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff800038c2c4b rsp=fffff88008d00968 rbp=0000000000000001
    r8=0000008000059970 r9=0000000000000055 r10=0000000000000002
    r11=fffff88008d00a50 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0 nv up ei pl nz na pe nc
    nt!MiMapPageInHyperSpaceWorker+0x1b:
    fffff800`038c2c4b 458a481a mov r9b,byte ptr [r8+1Ah] ds:00000080`0005998a=??
    Resetting default scope

    LAST_CONTROL_TRANSFER: from fffff8000388bfe9 to fffff8000388ca40

    STACK_TEXT:
    fffff880`08d00688 fffff800`0388bfe9 : 00000000`0000000a 00000080`0005998a 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`08d00690 fffff800`0388ac60 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`0008b770 : nt!KiBugCheckDispatch+0x69
    fffff880`08d007d0 fffff800`038c2c4b : fffff800`038753cb fffffa80`0008b6b0 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x260
    fffff880`08d00968 fffff800`038753cb : fffffa80`0008b6b0 00000000`00000001 00000000`00000000 00000000`00000080 : nt!MiMapPageInHyperSpaceWorker+0x1b
    fffff880`08d00970 fffff800`0394f95e : 00000000`00000be6 fffff880`00000001 fffffa80`0008b770 fffff800`03acccf0 : nt!MiRestoreTransitionPte+0x7b
    fffff880`08d00a00 fffff800`0389b364 : 00000000`00000000 fffff880`08d00b00 00000000`00000000 ffffffff`ffffffff : nt!MiRemoveLowestPriorityStandbyPage+0x21e
    fffff880`08d00a80 fffff800`0388ab6e : 00000000`00000001 00000000`13adb000 00000000`05b8e101 00000000`13adaca8 : nt!MmAccessFault+0x19e4
    fffff880`08d00be0 00000000`60f3cf8d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
    00000000`063cdca8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x60f3cf8d


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    nt!MiMapPageInHyperSpaceWorker+1b
    fffff800`038c2c4b 458a481a mov r9b,byte ptr [r8+1Ah]

    SYMBOL_STACK_INDEX: 3

    SYMBOL_NAME: nt!MiMapPageInHyperSpaceWorker+1b

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: nt

    DEBUG_FLR_IMAGE_TIMESTAMP: 5507a73c

    IMAGE_VERSION: 6.1.7601.18798

    IMAGE_NAME: memory_corruption

    FAILURE_BUCKET_ID: X64_0xA_nt!MiMapPageInHyperSpaceWorker+1b

    BUCKET_ID: X64_0xA_nt!MiMapPageInHyperSpaceWorker+1b

    ANALYSIS_SOURCE: KM

    FAILURE_ID_HASH_STRING: km:x64_0xa_nt!mimappageinhyperspaceworker+1b

    FAILURE_ID_HASH: {37e40d47-2d58-63bf-0149-9743e09c5a54}

    Followup: MachineOwner
    ---------
      My Computer


  3. Posts : 3
    Windows 7 64 bits
    Thread Starter
       #3

    Loading Dump File [Z:\3D Print\Grafica\makers parts\este.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    Symbol Path validation summary
    Response Time (ms) Location
    Deferred SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Deferred symsrv*symsrv.dll*f:\localsymbols*http://msdl.microsoft.com/download/symbols
    Symbol search path is: SRV*c:\symbols*404 - File or directory not found.
    Executable search path is:
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.18798.amd64fre.win7sp1_gdr.150316-1654
    Machine Name:
    Kernel base = 0xfffff800`03804000 PsLoadedModuleList = 0xfffff800`03a49890
    Debug session time: Thu Apr 16 10:16:15.496 2015 (UTC - 3:00)
    System Uptime: 0 days 0:21:01.636
    Loading Kernel Symbols
    .

    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.

    ..............................................................
    ................................................................
    ........................
    Loading User Symbols
    Loading unloaded module list
    .......

    * Bugcheck Analysis *
    * *
    **

    Use !analyze -v to get detailed debugging information.

    BugCheck A, {ffffffffffffffd0, 2, 1, fffff80003885f62}

    *** WARNING: Unable to verify timestamp for dtsoftbus01.sys
    *** ERROR: Module load completed but symbols could not be loaded for dtsoftbus01.sys
    Probably caused by : dtsoftbus01.sys ( dtsoftbus01+5390 )

    Followup: MachineOwner
    ---------

    0: kd> !analyze -v
    ***
    * *
    * Bugcheck Analysis *
    * *
    ***

    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high. This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: ffffffffffffffd0, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80003885f62, address which referenced memory

    Debugging Details:
    ------------------


    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ab3100
    GetUlongFromAddress: unable to read from fffff80003ab31c0
    ffffffffffffffd0

    CURRENT_IRQL: 2

    FAULTING_IP:
    nt!IoQueueWorkItem+3a
    fffff800`03885f62 f0488343d001 lock add qword ptr [rbx-30h],1

    DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

    BUGCHECK_STR: 0xA

    PROCESS_NAME: System

    ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre

    TRAP_FRAME: fffff88002ffd3d0 -- (.trap 0xfffff88002ffd3d0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff88002ffd588 rbx=0000000000000000 rcx=fffffa80084d0380
    rdx=fffff880019993a8 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80003885f62 rsp=fffff88002ffd560 rbp=0000000000000001
    r8=0000000000000001 r9=fffffa80084d0380 r10=fffff800039f7880
    r11=fffff800039f6e80 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0 nv up ei pl zr na po nc
    nt!IoQueueWorkItem+0x3a:
    fffff800`03885f62 f0488343d001 lock add qword ptr [rbx-30h],1 ds:ffffffff`ffffffd0=????????????????
    Resetting default scope

    LAST_CONTROL_TRANSFER: from fffff80003875fe9 to fffff80003876a40

    STACK_TEXT:
    fffff880`02ffd288 fffff800`03875fe9 : 00000000`0000000a ffffffff`ffffffd0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`02ffd290 fffff800`03874c60 : fffff8a0`03c0eeb0 fffff800`03b6d196 fffff8a0`1119cb00 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`02ffd3d0 fffff800`03885f62 : 20080936`100b1b09 00000000`00000000 1c052c19`0a00011e 00000000`000007ff : nt!KiPageFault+0x260
    fffff880`02ffd560 fffff880`01999390 : fffffa80`07c65110 fffff880`01998dc4 fffff880`02ffd650 00000000`00000001 : nt!IoQueueWorkItem+0x3a
    fffff880`02ffd590 fffffa80`07c65110 : fffff880`01998dc4 fffff880`02ffd650 00000000`00000001 fffffa80`07cba000 : dtsoftbus01+0x5390
    fffff880`02ffd598 fffff880`01998dc4 : fffff880`02ffd650 00000000`00000001 fffffa80`07cba000 fffff880`019afd43 : 0xfffffa80`07c65110
    fffff880`02ffd5a0 fffff880`02ffd650 : 00000000`00000001 fffffa80`07cba000 fffff880`019afd43 fffff880`02ffd650 : dtsoftbus01+0x4dc4
    fffff880`02ffd5a8 00000000`00000001 : fffffa80`07cba000 fffff880`019afd43 fffff880`02ffd650 3d312533`311e0e14 : 0xfffff880`02ffd650
    fffff880`02ffd5b0 fffffa80`07cba000 : fffff880`019afd43 fffff880`02ffd650 3d312533`311e0e14 00000000`00000001 : 0x1
    fffff880`02ffd5b8 fffff880`019afd43 : fffff880`02ffd650 3d312533`311e0e14 00000000`00000001 fffffa80`07cba000 : 0xfffffa80`07cba000
    fffff880`02ffd5c0 fffff880`02ffd650 : 3d312533`311e0e14 00000000`00000001 fffffa80`07cba000 00000000`00000001 : dtsoftbus01+0x1bd43
    fffff880`02ffd5c8 3d312533`311e0e14 : 00000000`00000001 fffffa80`07cba000 00000000`00000001 fffff880`019aa44c : 0xfffff880`02ffd650
    fffff880`02ffd5d0 00000000`00000001 : fffffa80`07cba000 00000000`00000001 fffff880`019aa44c fffffa80`07cba000 : 0x3d312533`311e0e14
    fffff880`02ffd5d8 fffffa80`07cba000 : 00000000`00000001 fffff880`019aa44c fffffa80`07cba000 2e1c0525`3f351f12 : 0x1
    fffff880`02ffd5e0 00000000`00000001 : fffff880`019aa44c fffffa80`07cba000 2e1c0525`3f351f12 2e0f262f`00000000 : 0xfffffa80`07cba000
    fffff880`02ffd5e8 fffff880`019aa44c : fffffa80`07cba000 2e1c0525`3f351f12 2e0f262f`00000000 393f2f19`1a342926 : 0x1
    fffff880`02ffd5f0 fffffa80`07cba000 : 2e1c0525`3f351f12 2e0f262f`00000000 393f2f19`1a342926 00000000`00000001 : dtsoftbus01+0x1644c
    fffff880`02ffd5f8 2e1c0525`3f351f12 : 2e0f262f`00000000 393f2f19`1a342926 00000000`00000001 fffff880`019d2b4e : 0xfffffa80`07cba000
    fffff880`02ffd600 2e0f262f`00000000 : 393f2f19`1a342926 00000000`00000001 fffff880`019d2b4e fffffa80`07c65110 : 0x2e1c0525`3f351f12
    fffff880`02ffd608 393f2f19`1a342926 : 00000000`00000001 fffff880`019d2b4e fffffa80`07c65110 00000000`00000015 : 0x2e0f262f`00000000
    fffff880`02ffd610 00000000`00000001 : fffff880`019d2b4e fffffa80`07c65110 00000000`00000015 00000000`00000000 : 0x393f2f19`1a342926
    fffff880`02ffd618 fffff880`019d2b4e : fffffa80`07c65110 00000000`00000015 00000000`00000000 fffff880`019c8230 : 0x1
    fffff880`02ffd620 fffffa80`07c65110 : 00000000`00000015 00000000`00000000 fffff880`019c8230 fffff8a0`1119cb01 : dtsoftbus01+0x3eb4e
    fffff880`02ffd628 00000000`00000015 : 00000000`00000000 fffff880`019c8230 fffff8a0`1119cb01 00000000`00050000 : 0xfffffa80`07c65110
    fffff880`02ffd630 00000000`00000000 : fffff880`019c8230 fffff8a0`1119cb01 00000000`00050000 00000000`00060000 : 0x15


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    dtsoftbus01+5390
    fffff880`01999390 ?? ???

    SYMBOL_STACK_INDEX: 4

    SYMBOL_NAME: dtsoftbus01+5390

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: dtsoftbus01

    IMAGE_NAME: dtsoftbus01.sys

    DEBUG_FLR_IMAGE_TIMESTAMP: 53072130

    FAILURE_BUCKET_ID: X64_0xA_dtsoftbus01+5390

    BUCKET_ID: X64_0xA_dtsoftbus01+5390

    ANALYSIS_SOURCE: KM

    FAILURE_ID_HASH_STRING: km:x64_0xa_dtsoftbus01+5390

    FAILURE_ID_HASH: {cae10d5c-bfc5-ef63-a270-f19f70cbcaee}

    Followup: MachineOwner
    ---------

    0: kd> !analyze -v

    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high. This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: ffffffffffffffd0, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80003885f62, address which referenced memory

    Debugging Details:
    ------------------


    WRITE_ADDRESS: ffffffffffffffd0

    CURRENT_IRQL: 2

    FAULTING_IP:
    nt!IoQueueWorkItem+3a
    fffff800`03885f62 f0488343d001 lock add qword ptr [rbx-30h],1

    DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

    BUGCHECK_STR: 0xA

    PROCESS_NAME: System

    ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre

    TRAP_FRAME: fffff88002ffd3d0 -- (.trap 0xfffff88002ffd3d0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff88002ffd588 rbx=0000000000000000 rcx=fffffa80084d0380
    rdx=fffff880019993a8 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80003885f62 rsp=fffff88002ffd560 rbp=0000000000000001
    r8=0000000000000001 r9=fffffa80084d0380 r10=fffff800039f7880
    r11=fffff800039f6e80 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0 nv up ei pl zr na po nc
    nt!IoQueueWorkItem+0x3a:
    fffff800`03885f62 f0488343d001 lock add qword ptr [rbx-30h],1 ds:ffffffff`ffffffd0=????????????????
    Resetting default scope

    LAST_CONTROL_TRANSFER: from fffff80003875fe9 to fffff80003876a40

    STACK_TEXT:
    fffff880`02ffd288 fffff800`03875fe9 : 00000000`0000000a ffffffff`ffffffd0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`02ffd290 fffff800`03874c60 : fffff8a0`03c0eeb0 fffff800`03b6d196 fffff8a0`1119cb00 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`02ffd3d0 fffff800`03885f62 : 20080936`100b1b09 00000000`00000000 1c052c19`0a00011e 00000000`000007ff : nt!KiPageFault+0x260
    fffff880`02ffd560 fffff880`01999390 : fffffa80`07c65110 fffff880`01998dc4 fffff880`02ffd650 00000000`00000001 : nt!IoQueueWorkItem+0x3a
    fffff880`02ffd590 fffffa80`07c65110 : fffff880`01998dc4 fffff880`02ffd650 00000000`00000001 fffffa80`07cba000 : dtsoftbus01+0x5390
    fffff880`02ffd598 fffff880`01998dc4 : fffff880`02ffd650 00000000`00000001 fffffa80`07cba000 fffff880`019afd43 : 0xfffffa80`07c65110
    fffff880`02ffd5a0 fffff880`02ffd650 : 00000000`00000001 fffffa80`07cba000 fffff880`019afd43 fffff880`02ffd650 : dtsoftbus01+0x4dc4
    fffff880`02ffd5a8 00000000`00000001 : fffffa80`07cba000 fffff880`019afd43 fffff880`02ffd650 3d312533`311e0e14 : 0xfffff880`02ffd650
    fffff880`02ffd5b0 fffffa80`07cba000 : fffff880`019afd43 fffff880`02ffd650 3d312533`311e0e14 00000000`00000001 : 0x1
    fffff880`02ffd5b8 fffff880`019afd43 : fffff880`02ffd650 3d312533`311e0e14 00000000`00000001 fffffa80`07cba000 : 0xfffffa80`07cba000
    fffff880`02ffd5c0 fffff880`02ffd650 : 3d312533`311e0e14 00000000`00000001 fffffa80`07cba000 00000000`00000001 : dtsoftbus01+0x1bd43
    fffff880`02ffd5c8 3d312533`311e0e14 : 00000000`00000001 fffffa80`07cba000 00000000`00000001 fffff880`019aa44c : 0xfffff880`02ffd650
    fffff880`02ffd5d0 00000000`00000001 : fffffa80`07cba000 00000000`00000001 fffff880`019aa44c fffffa80`07cba000 : 0x3d312533`311e0e14
    fffff880`02ffd5d8 fffffa80`07cba000 : 00000000`00000001 fffff880`019aa44c fffffa80`07cba000 2e1c0525`3f351f12 : 0x1
    fffff880`02ffd5e0 00000000`00000001 : fffff880`019aa44c fffffa80`07cba000 2e1c0525`3f351f12 2e0f262f`00000000 : 0xfffffa80`07cba000
    fffff880`02ffd5e8 fffff880`019aa44c : fffffa80`07cba000 2e1c0525`3f351f12 2e0f262f`00000000 393f2f19`1a342926 : 0x1
    fffff880`02ffd5f0 fffffa80`07cba000 : 2e1c0525`3f351f12 2e0f262f`00000000 393f2f19`1a342926 00000000`00000001 : dtsoftbus01+0x1644c
    fffff880`02ffd5f8 2e1c0525`3f351f12 : 2e0f262f`00000000 393f2f19`1a342926 00000000`00000001 fffff880`019d2b4e : 0xfffffa80`07cba000
    fffff880`02ffd600 2e0f262f`00000000 : 393f2f19`1a342926 00000000`00000001 fffff880`019d2b4e fffffa80`07c65110 : 0x2e1c0525`3f351f12
    fffff880`02ffd608 393f2f19`1a342926 : 00000000`00000001 fffff880`019d2b4e fffffa80`07c65110 00000000`00000015 : 0x2e0f262f`00000000
    fffff880`02ffd610 00000000`00000001 : fffff880`019d2b4e fffffa80`07c65110 00000000`00000015 00000000`00000000 : 0x393f2f19`1a342926
    fffff880`02ffd618 fffff880`019d2b4e : fffffa80`07c65110 00000000`00000015 00000000`00000000 fffff880`019c8230 : 0x1
    fffff880`02ffd620 fffffa80`07c65110 : 00000000`00000015 00000000`00000000 fffff880`019c8230 fffff8a0`1119cb01 : dtsoftbus01+0x3eb4e
    fffff880`02ffd628 00000000`00000015 : 00000000`00000000 fffff880`019c8230 fffff8a0`1119cb01 00000000`00050000 : 0xfffffa80`07c65110
    fffff880`02ffd630 00000000`00000000 : fffff880`019c8230 fffff8a0`1119cb01 00000000`00050000 00000000`00060000 : 0x15


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    dtsoftbus01+5390
    fffff880`01999390 ?? ???

    SYMBOL_STACK_INDEX: 4

    SYMBOL_NAME: dtsoftbus01+5390

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: dtsoftbus01

    IMAGE_NAME: dtsoftbus01.sys

    DEBUG_FLR_IMAGE_TIMESTAMP: 53072130

    FAILURE_BUCKET_ID: X64_0xA_dtsoftbus01+5390

    BUCKET_ID: X64_0xA_dtsoftbus01+5390

    ANALYSIS_SOURCE: KM

    FAILURE_ID_HASH_STRING: km:x64_0xa_dtsoftbus01+5390

    FAILURE_ID_HASH: {cae10d5c-bfc5-ef63-a270-f19f70cbcaee}

    Followup: MachineOwner
    ---------

    0: kd> !analyze -v
    *****
    * *
    * Bugcheck Analysis *
    * *
    *****

    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high. This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: ffffffffffffffd0, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80003885f62, address which referenced memory

    Debugging Details:
    ------------------


    WRITE_ADDRESS: ffffffffffffffd0

    CURRENT_IRQL: 2

    FAULTING_IP:
    nt!IoQueueWorkItem+3a
    fffff800`03885f62 f0488343d001 lock add qword ptr [rbx-30h],1

    DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

    BUGCHECK_STR: 0xA

    PROCESS_NAME: System

    ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre

    TRAP_FRAME: fffff88002ffd3d0 -- (.trap 0xfffff88002ffd3d0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff88002ffd588 rbx=0000000000000000 rcx=fffffa80084d0380
    rdx=fffff880019993a8 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80003885f62 rsp=fffff88002ffd560 rbp=0000000000000001
    r8=0000000000000001 r9=fffffa80084d0380 r10=fffff800039f7880
    r11=fffff800039f6e80 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0 nv up ei pl zr na po nc
    nt!IoQueueWorkItem+0x3a:
    fffff800`03885f62 f0488343d001 lock add qword ptr [rbx-30h],1 ds:ffffffff`ffffffd0=????????????????
    Resetting default scope

    LAST_CONTROL_TRANSFER: from fffff80003875fe9 to fffff80003876a40

    STACK_TEXT:
    fffff880`02ffd288 fffff800`03875fe9 : 00000000`0000000a ffffffff`ffffffd0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`02ffd290 fffff800`03874c60 : fffff8a0`03c0eeb0 fffff800`03b6d196 fffff8a0`1119cb00 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`02ffd3d0 fffff800`03885f62 : 20080936`100b1b09 00000000`00000000 1c052c19`0a00011e 00000000`000007ff : nt!KiPageFault+0x260
    fffff880`02ffd560 fffff880`01999390 : fffffa80`07c65110 fffff880`01998dc4 fffff880`02ffd650 00000000`00000001 : nt!IoQueueWorkItem+0x3a
    fffff880`02ffd590 fffffa80`07c65110 : fffff880`01998dc4 fffff880`02ffd650 00000000`00000001 fffffa80`07cba000 : dtsoftbus01+0x5390
    fffff880`02ffd598 fffff880`01998dc4 : fffff880`02ffd650 00000000`00000001 fffffa80`07cba000 fffff880`019afd43 : 0xfffffa80`07c65110
    fffff880`02ffd5a0 fffff880`02ffd650 : 00000000`00000001 fffffa80`07cba000 fffff880`019afd43 fffff880`02ffd650 : dtsoftbus01+0x4dc4
    fffff880`02ffd5a8 00000000`00000001 : fffffa80`07cba000 fffff880`019afd43 fffff880`02ffd650 3d312533`311e0e14 : 0xfffff880`02ffd650
    fffff880`02ffd5b0 fffffa80`07cba000 : fffff880`019afd43 fffff880`02ffd650 3d312533`311e0e14 00000000`00000001 : 0x1
    fffff880`02ffd5b8 fffff880`019afd43 : fffff880`02ffd650 3d312533`311e0e14 00000000`00000001 fffffa80`07cba000 : 0xfffffa80`07cba000
    fffff880`02ffd5c0 fffff880`02ffd650 : 3d312533`311e0e14 00000000`00000001 fffffa80`07cba000 00000000`00000001 : dtsoftbus01+0x1bd43
    fffff880`02ffd5c8 3d312533`311e0e14 : 00000000`00000001 fffffa80`07cba000 00000000`00000001 fffff880`019aa44c : 0xfffff880`02ffd650
    fffff880`02ffd5d0 00000000`00000001 : fffffa80`07cba000 00000000`00000001 fffff880`019aa44c fffffa80`07cba000 : 0x3d312533`311e0e14
    fffff880`02ffd5d8 fffffa80`07cba000 : 00000000`00000001 fffff880`019aa44c fffffa80`07cba000 2e1c0525`3f351f12 : 0x1
    fffff880`02ffd5e0 00000000`00000001 : fffff880`019aa44c fffffa80`07cba000 2e1c0525`3f351f12 2e0f262f`00000000 : 0xfffffa80`07cba000
    fffff880`02ffd5e8 fffff880`019aa44c : fffffa80`07cba000 2e1c0525`3f351f12 2e0f262f`00000000 393f2f19`1a342926 : 0x1
    fffff880`02ffd5f0 fffffa80`07cba000 : 2e1c0525`3f351f12 2e0f262f`00000000 393f2f19`1a342926 00000000`00000001 : dtsoftbus01+0x1644c
    fffff880`02ffd5f8 2e1c0525`3f351f12 : 2e0f262f`00000000 393f2f19`1a342926 00000000`00000001 fffff880`019d2b4e : 0xfffffa80`07cba000
    fffff880`02ffd600 2e0f262f`00000000 : 393f2f19`1a342926 00000000`00000001 fffff880`019d2b4e fffffa80`07c65110 : 0x2e1c0525`3f351f12
    fffff880`02ffd608 393f2f19`1a342926 : 00000000`00000001 fffff880`019d2b4e fffffa80`07c65110 00000000`00000015 : 0x2e0f262f`00000000
    fffff880`02ffd610 00000000`00000001 : fffff880`019d2b4e fffffa80`07c65110 00000000`00000015 00000000`00000000 : 0x393f2f19`1a342926
    fffff880`02ffd618 fffff880`019d2b4e : fffffa80`07c65110 00000000`00000015 00000000`00000000 fffff880`019c8230 : 0x1
    fffff880`02ffd620 fffffa80`07c65110 : 00000000`00000015 00000000`00000000 fffff880`019c8230 fffff8a0`1119cb01 : dtsoftbus01+0x3eb4e
    fffff880`02ffd628 00000000`00000015 : 00000000`00000000 fffff880`019c8230 fffff8a0`1119cb01 00000000`00050000 : 0xfffffa80`07c65110
    fffff880`02ffd630 00000000`00000000 : fffff880`019c8230 fffff8a0`1119cb01 00000000`00050000 00000000`00060000 : 0x15


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    dtsoftbus01+5390
    fffff880`01999390 ?? ???

    SYMBOL_STACK_INDEX: 4

    SYMBOL_NAME: dtsoftbus01+5390

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: dtsoftbus01

    IMAGE_NAME: dtsoftbus01.sys

    DEBUG_FLR_IMAGE_TIMESTAMP: 53072130

    FAILURE_BUCKET_ID: X64_0xA_dtsoftbus01+5390

    BUCKET_ID: X64_0xA_dtsoftbus01+5390

    ANALYSIS_SOURCE: KM

    FAILURE_ID_HASH_STRING: km:x64_0xa_dtsoftbus01+5390

    FAILURE_ID_HASH: {cae10d5c-bfc5-ef63-a270-f19f70cbcaee}

    Followup: MachineOwner
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 06:28.
Find Us