*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000000c0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80764ccab11, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
00000000000000c0
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiChooseTargetProcessor+d1
fffff807`64ccab11 4c8b9ec0000000 mov r11,qword ptr [rsi+0C0h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
DPC_STACK_BASE: FFFFF807692B5FB0
TRAP_FRAME: fffff807692ae3f0 -- (.trap 0xfffff807692ae3f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80764ccab11 rsp=fffff807692ae580 rbp=fffff807692ae661
r8=0000000000000000 r9=0000000000000000 r10=fffff80761148180
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiChooseTargetProcessor+0xd1:
fffff807`64ccab11 4c8b9ec0000000 mov r11,qword ptr [rsi+0C0h] ds:00000000`000000c0=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80764e05e69 to fffff80764df3ea0
STACK_TEXT:
fffff807`692ae2a8 fffff807`64e05e69 : 00000000`0000000a 00000000`000000c0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff807`692ae2b0 fffff807`64e02169 : fffff807`692ae4dc ffffa68f`4d6626c0 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff807`692ae3f0 fffff807`64ccab11 : 00000000`00000000 ffffa68f`51b57080 fffff807`692ae661 00000000`00000000 : nt!KiPageFault+0x469
fffff807`692ae580 fffff807`64cc9dab : ffffbc81`2f308180 ffffa68f`00000000 00000000`00000000 fffff807`64f612d3 : nt!KiChooseTargetProcessor+0xd1
fffff807`692ae6c0 fffff807`64cc3c1d : 00000000`00006126 fffff807`692aeb10 00000000`00000080 fffff807`61148180 : nt!KiDeferredReadySingleThread+0x28b
fffff807`692ae8b0 fffff807`64cc4000 : fffff807`61148180 00000000`00000000 ffffa68f`51b571f0 00000000`00000000 : nt!KiReadyThread+0x4d
fffff807`692ae8e0 fffff807`64ce9509 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00006126 : nt!KiProcessExpiredTimerList+0x290
fffff807`692ae9d0 fffff807`64df7a0e : 00000000`00000000 fffff807`61148180 fffff807`65726600 ffffa68f`523860c0 : nt!KiRetireDpcList+0x9d9
fffff807`692aec60 00000000`00000000 : fffff807`692af000 fffff807`692a9000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff80764d963ae-fffff80764d963b1 4 bytes - nt!MiFreeUltraMapping+32
[ a0 7d fb f6:00 3b 76 ec ]
fffff80764df5a18-fffff80764df5a19 2 bytes - nt!KiInterruptDispatch+b8 (+0x5f66a)
[ 48 ff:4c 8b ]
fffff80764df5a1f-fffff80764df5a22 4 bytes - nt!KiInterruptDispatch+bf (+0x07)
[ 0f 1f 44 00:e8 fc f9 61 ]
10 errors : !nt (fffff80764d963ae-fffff80764df5a22)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------