*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000001048, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8037d83ea02, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: 0000000000001048 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiIdentifyPfn+322
fffff803`7d83ea02 f0410fba6f481f lock bts dword ptr [r15+48h],1Fh
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: svchost.exe
ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre
TRAP_FRAME: ffffd0003a976fe0 -- (.trap 0xffffd0003a976fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0200000000000020 rbx=0000000000000000 rcx=0200000000000000
rdx=fffff8037d83eaea rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037d83ea02 rsp=ffffd0003a977170 rbp=0000000000000000
r8=0000000000369075 r9=02200000003abfa0 r10=7800205101420000
r11=0000000000000042 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiIdentifyPfn+0x322:
fffff803`7d83ea02 f0410fba6f481f lock bts dword ptr [r15+48h],1Fh ds:00000000`00000048=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8037d9657e9 to fffff8037d959ca0
STACK_TEXT:
ffffd000`3a976e98 fffff803`7d9657e9 : 00000000`0000000a 00000000`00001048 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`3a976ea0 fffff803`7d96403a : 00000000`00000001 ffffe000`0a4b0818 fffffa80`0a2cfc00 ffffd000`3a976fe0 : nt!KiBugCheckDispatch+0x69
ffffd000`3a976fe0 fffff803`7d83ea02 : 00000000`000018c0 fffff803`7da9d99e ffffe000`0a4af000 ffffd000`3a977268 : nt!KiPageFault+0x23a
ffffd000`3a977170 fffff803`7d83e68c : 00000000`00000004 ffffe000`0a4b0818 00000000`00000001 ffffd000`3a977320 : nt!MiIdentifyPfn+0x322
ffffd000`3a977220 fffff803`7dba39cb : ffffe000`0a4b0818 ffffd000`3a977b80 ffffe000`0a4af000 fffff803`42506650 : nt!MiIdentifyPfnWrapper+0x3c
ffffd000`3a977250 fffff803`7dbbd512 : ffffc000`04366060 00000000`00000001 ffffd000`3a977434 ffffe000`0a4af000 : nt!PfpPfnPrioRequest+0xbb
ffffd000`3a9772d0 fffff803`7dbbb67b : 00000025`fd1fa708 00000000`00000000 00000000`0000004f 00000000`00000000 : nt!PfQuerySuperfetchInformation+0x336
ffffd000`3a977400 fffff803`7dbbb429 : 00000025`fd1fa708 00000026`ff5ea6a0 00000000`00000000 00000000`00000000 : nt!ExpQuerySystemInformation+0x1ff
ffffd000`3a977ac0 fffff803`7d9654b3 : 00000000`00000000 00000026`fdd037d0 00000000`00000001 ffffd000`3a977b00 : nt!NtQuerySystemInformation+0x49
ffffd000`3a977b00 00007ffc`86b768da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000025`fd1fa5c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`86b768da
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiIdentifyPfn+322
fffff803`7d83ea02 f0410fba6f481f lock bts dword ptr [r15+48h],1Fh
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiIdentifyPfn+322
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 52718d9c
IMAGE_VERSION: 6.3.9600.16452
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 322
FAILURE_BUCKET_ID: AV_nt!MiIdentifyPfn
BUCKET_ID: AV_nt!MiIdentifyPfn
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!miidentifypfn
FAILURE_ID_HASH: {4f0b8d4b-7219-bc8c-33a3-7bfc14bc92e1}
Followup: MachineOwner
---------