New
#1
BSOD at random times. IRQL_NOT_LESS_OR_EQUAL (a)
Hi, recently I have been getting the BSOD on and off for a while now. I assume it might be a hardware related I just don't know how to read the mini dump to figure out what it is.
Any help on how to fix this is greatly appreciated.
Here is my minidump (also as an attachment):
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa801aa6a0d0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000338a0b6, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: fffffa801aa6a0d0
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiReleaseConfirmedPageFileSpace+86
fffff800`0338a0b6 480fb328 btr qword ptr [rax],rbp
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: FlashPlayerPlu
TRAP_FRAME: fffff8800e2942b0 -- (.trap 0xfffff8800e2942b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800abda010 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000338a0b6 rsp=fffff8800e294440 rbp=000000007f480606
r8=fffff8800e294470 r9=fffffa800af07220 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiReleaseConfirmedPageFileSpace+0x86:
fffff800`0338a0b6 480fb328 btr qword ptr [rax],rbp ds:fffffa80`0abda010=ffdfffffffffffe7
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032c9e69 to fffff800032ca8c0
STACK_TEXT:
fffff880`0e294168 fffff800`032c9e69 : 00000000`0000000a fffffa80`1aa6a0d0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0e294170 fffff800`032c8ae0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0e2942b0 fffff800`0338a0b6 : 00000000`00000000 00000000`00000000 fffffa80`097afca0 fffffa80`097afca0 : nt!KiPageFault+0x260
fffff880`0e294440 fffff800`0333a6aa : 00000000`000000e8 fffff880`009ec180 00000000`03a12000 00000000`00000000 : nt!MiReleaseConfirmedPageFileSpace+0x86
fffff880`0e2944c0 fffff800`032b7daf : fffffa80`00000000 00000000`03a9ffff 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x33736
fffff880`0e294680 fffff800`032c9b53 : ffffffff`ffffffff fffff880`0e294950 fffff880`0e294958 00000000`00008000 : nt!NtFreeVirtualMemory+0x61f
fffff880`0e294780 fffff800`032c6110 : fffff800`035460ff 00000000`00000010 00000000`00000082 fffff880`0e294948 : nt!KiSystemServiceCopyEnd+0x13
fffff880`0e294918 fffff800`035460ff : 00000000`00000010 00000000`00000082 fffff880`0e294948 00000000`00000000 : nt!KiServiceLinkage
fffff880`0e294920 fffff800`0359e1d9 : 00000000`039a0000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlFreeUserStack+0x27
fffff880`0e294950 fffff800`0359e53d : 00000000`00000000 fffffa80`0dd00000 00000000`fff9b000 00000000`00000000 : nt!PspExitThread+0x5dd
fffff880`0e294a50 fffff800`0359e645 : fffffa80`0ada8060 00000000`00000000 fffffa80`0ada8060 00000000`fff9b000 : nt!PspTerminateThreadByPointer+0x4d
fffff880`0e294aa0 fffff800`032c9b53 : 00000000`00000000 fffff880`0e294b60 00000000`fff9b000 00000000`00567ba8 : nt!NtTerminateThread+0x45
fffff880`0e294ae0 00000000`7794e0ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00eae7b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7794e0ea
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiReleaseConfirmedPageFileSpace+86
fffff800`0338a0b6 480fb328 btr qword ptr [rax],rbp
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiReleaseConfirmedPageFileSpace+86
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 556356e8
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiReleaseConfirmedPageFileSpace+86
BUCKET_ID: X64_0xA_nt!MiReleaseConfirmedPageFileSpace+86
Followup: MachineOwner
---------
1: kd> .trap 0xfffff8800e2942b0
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800abda010 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000338a0b6 rsp=fffff8800e294440 rbp=000000007f480606
r8=fffff8800e294470 r9=fffffa800af07220 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiReleaseConfirmedPageFileSpace+0x86:
fffff800`0338a0b6 480fb328 btr qword ptr [rax],rbp ds:fffffa80`0abda010=ffdfffffffffffe7
1: kd> knl
Couldn't resolve error at 'l'
1: kd> knL
*** Stack trace for last set context - .thread/.cxr resets it
# Child-SP RetAddr Call Site
00 fffff880`0e294440 fffff800`0333a6aa nt!MiReleaseConfirmedPageFileSpace+0x86
01 fffff880`0e2944c0 fffff800`032b7daf nt! ?? ::FNODOBFM::`string'+0x33736
02 fffff880`0e294680 fffff800`032c9b53 nt!NtFreeVirtualMemory+0x61f
03 fffff880`0e294780 fffff800`032c6110 nt!KiSystemServiceCopyEnd+0x13
04 fffff880`0e294918 fffff800`035460ff nt!KiServiceLinkage
05 fffff880`0e294920 fffff800`0359e1d9 nt!RtlFreeUserStack+0x27
06 fffff880`0e294950 fffff800`0359e53d nt!PspExitThread+0x5dd
07 fffff880`0e294a50 fffff800`0359e645 nt!PspTerminateThreadByPointer+0x4d
08 fffff880`0e294aa0 fffff800`032c9b53 nt!NtTerminateThread+0x45
09 fffff880`0e294ae0 00000000`7794e0ea nt!KiSystemServiceCopyEnd+0x13
0a 00000000`00eae7b8 00000000`00000000 0x7794e0ea
Cheers
K