Hello i have been getting alot of BSOD and the recent error being something along the lines of irql_not_less_or_equal
i have had many other BSOD error messages before this such as watchdog time out, dpc violation, memory management...
i have a fresh install of windows 10 on my machine and constantly getting the irql_not_less_or_equal bsod error message. completely new install of windows 10 as i thought i maybe having driver issues etc... but its not the case as i fix one bsod error i get another one.
i uploaded the dump file and got the following results which i dont know how to solve:
Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 8 Kernel Version 10586 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 10586.162.amd64fre.th2_release_sec.160223-1728
Machine Name:
Kernel base = 0xfffff801`bca73000 PsLoadedModuleList = 0xfffff801`bcd51cd0
Debug session time: Sun Jul 24 10:48:45.127 2016 (UTC - 4:00)
System Uptime: 0 days 0:01:45.762
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff67e6080c278, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff801bcabe447, address which referenced memory
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
fffff67e6080c278
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiDeleteVirtualAddresses+347
fffff801`bcabe447 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: backgroundTask
TRAP_FRAME: ffffd001477351b0 -- (.trap 0xffffd001477351b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000fe5 rbx=0000000000000000 rcx=fffff67e6080c278
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801bcabe447 rsp=ffffd00147735340 rbp=ffffd00147735440
r8=0000000000000fe5 r9=00007ff81f6c0001 r10=0000ffffffffffff
r11=fffff58010804000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiDeleteVirtualAddresses+0x347:
fffff801`bcabe447 488b09 mov rcx,qword ptr [rcx] ds:fffff67e`6080c278=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff801bcbc02e9 to fffff801bcbb5760
STACK_TEXT:
ffffd001`47735068 fffff801`bcbc02e9 : 00000000`0000000a fffff67e`6080c278 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd001`47735070 fffff801`bcbbeac7 : 00000000`00000000 0000000f`ffffffff 00000000`00000000 fffff801`bca9ead6 : nt!KiBugCheckDispatch+0x69
ffffd001`477351b0 fffff801`bcabe447 : fffff6bf`fc0fb8d0 ffffe000`b16cf080 ffffe000`b16cf080 fffff6bf`fc0ec928 : nt!KiPageFault+0x247
ffffd001`47735340 fffff801`bcaa5654 : 00000000`00000000 ffffd001`47735609 00000000`00000000 00007ff8`20646156 : nt!MiDeleteVirtualAddresses+0x347
ffffd001`47735540 fffff801`bcea5c02 : fffff801`00000000 ffffe000`ad4a9270 ffffe000`b0a14080 ffffe000`b16cf080 : nt!MiDeleteVad+0x4b4
ffffd001`47735670 fffff801`bcea5a62 : 00000000`00040000 ffffe000`b0a14080 00000000`00000001 ffffe000`b16cf080 : nt!MmCleanProcessAddressSpace+0xea
ffffd001`477356d0 fffff801`bce3d19b : ffffe000`b16cf080 ffffc000`4a778060 ffffd001`477357c0 ffffe000`b0a14080 : nt!PspRundownSingleProcess+0x1be
ffffd001`47735750 fffff801`bceecc16 : ffffd001`00000001 ffffe000`b0a14080 ffffd001`47735b00 ffffe000`b0a14128 : nt!PspExitThread+0x4f7
ffffd001`47735890 fffff801`bcaece22 : 00000000`00000000 fffff801`bcd87b48 00000000`45d1f100 ffffe000`00000000 : nt!KiSchedulerApcTerminate+0x2e
ffffd001`477358c0 fffff801`bcbb8af0 : 00000000`00000002 00000000`00000002 00000000`000001ec 00000000`00000000 : nt!KiDeliverApc+0x2f2
ffffd001`47735950 fffff801`bcbc004a : 00000057`df8bf300 00000000`00000000 ffffe000`b0a14080 00000057`df8bf128 : nt!KiInitiateUserApc+0x70
ffffd001`47735a90 00007ff8`1fce5c24 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000057`df8bf108 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7ff8`1fce5c24
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiDeleteVirtualAddresses+347
fffff801`bcabe447 488b09 mov rcx,qword ptr [rcx]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiDeleteVirtualAddresses+347
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 56cd4410
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_AV_nt!MiDeleteVirtualAddresses+347
BUCKET_ID: X64_AV_nt!MiDeleteVirtualAddresses+347
i have had many other BSOD error messages before this such as watchdog time out, dpc violation, memory management...
i have a fresh install of windows 10 on my machine and constantly getting the irql_not_less_or_equal bsod error message. completely new install of windows 10 as i thought i maybe having driver issues etc... but its not the case as i fix one bsod error i get another one.
i uploaded the dump file and got the following results which i dont know how to solve:
Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 8 Kernel Version 10586 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 10586.162.amd64fre.th2_release_sec.160223-1728
Machine Name:
Kernel base = 0xfffff801`bca73000 PsLoadedModuleList = 0xfffff801`bcd51cd0
Debug session time: Sun Jul 24 10:48:45.127 2016 (UTC - 4:00)
System Uptime: 0 days 0:01:45.762
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff67e6080c278, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff801bcabe447, address which referenced memory
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
fffff67e6080c278
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiDeleteVirtualAddresses+347
fffff801`bcabe447 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: backgroundTask
TRAP_FRAME: ffffd001477351b0 -- (.trap 0xffffd001477351b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000fe5 rbx=0000000000000000 rcx=fffff67e6080c278
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801bcabe447 rsp=ffffd00147735340 rbp=ffffd00147735440
r8=0000000000000fe5 r9=00007ff81f6c0001 r10=0000ffffffffffff
r11=fffff58010804000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiDeleteVirtualAddresses+0x347:
fffff801`bcabe447 488b09 mov rcx,qword ptr [rcx] ds:fffff67e`6080c278=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff801bcbc02e9 to fffff801bcbb5760
STACK_TEXT:
ffffd001`47735068 fffff801`bcbc02e9 : 00000000`0000000a fffff67e`6080c278 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd001`47735070 fffff801`bcbbeac7 : 00000000`00000000 0000000f`ffffffff 00000000`00000000 fffff801`bca9ead6 : nt!KiBugCheckDispatch+0x69
ffffd001`477351b0 fffff801`bcabe447 : fffff6bf`fc0fb8d0 ffffe000`b16cf080 ffffe000`b16cf080 fffff6bf`fc0ec928 : nt!KiPageFault+0x247
ffffd001`47735340 fffff801`bcaa5654 : 00000000`00000000 ffffd001`47735609 00000000`00000000 00007ff8`20646156 : nt!MiDeleteVirtualAddresses+0x347
ffffd001`47735540 fffff801`bcea5c02 : fffff801`00000000 ffffe000`ad4a9270 ffffe000`b0a14080 ffffe000`b16cf080 : nt!MiDeleteVad+0x4b4
ffffd001`47735670 fffff801`bcea5a62 : 00000000`00040000 ffffe000`b0a14080 00000000`00000001 ffffe000`b16cf080 : nt!MmCleanProcessAddressSpace+0xea
ffffd001`477356d0 fffff801`bce3d19b : ffffe000`b16cf080 ffffc000`4a778060 ffffd001`477357c0 ffffe000`b0a14080 : nt!PspRundownSingleProcess+0x1be
ffffd001`47735750 fffff801`bceecc16 : ffffd001`00000001 ffffe000`b0a14080 ffffd001`47735b00 ffffe000`b0a14128 : nt!PspExitThread+0x4f7
ffffd001`47735890 fffff801`bcaece22 : 00000000`00000000 fffff801`bcd87b48 00000000`45d1f100 ffffe000`00000000 : nt!KiSchedulerApcTerminate+0x2e
ffffd001`477358c0 fffff801`bcbb8af0 : 00000000`00000002 00000000`00000002 00000000`000001ec 00000000`00000000 : nt!KiDeliverApc+0x2f2
ffffd001`47735950 fffff801`bcbc004a : 00000057`df8bf300 00000000`00000000 ffffe000`b0a14080 00000057`df8bf128 : nt!KiInitiateUserApc+0x70
ffffd001`47735a90 00007ff8`1fce5c24 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000057`df8bf108 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7ff8`1fce5c24
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiDeleteVirtualAddresses+347
fffff801`bcabe447 488b09 mov rcx,qword ptr [rcx]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiDeleteVirtualAddresses+347
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 56cd4410
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_AV_nt!MiDeleteVirtualAddresses+347
BUCKET_ID: X64_AV_nt!MiDeleteVirtualAddresses+347