*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffffe8001a6dc10, 2, 1, fffff80002ec360e}
Probably caused by : memory_corruption ( nt!MiRemoveAnyPage+13e )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffe8001a6dc10, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ec360e, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800030ce100
fffffe8001a6dc10
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiRemoveAnyPage+13e
fffff800`02ec360e f0410fba6c241000 lock bts dword ptr [r12+10h],0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff88006520940 -- (.trap 0xfffff88006520940)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000042a30000 rbx=0000000000000000 rcx=fffff8a00a734000
rdx=fffffffff8327000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002e958bb rsp=fffff88006520ad8 rbp=0000000000000001
r8=0000000000000010 r9=0000000000000001 r10=00000000000042a3
r11=fffff8a00a733ff8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!memcpy+0x20b:
fffff800`02e958bb 488901 mov qword ptr [rcx],rax ds:0002:fffff8a0`0a734000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e9e2a9 to fffff80002e9ed00
STACK_TEXT:
fffff880`065201e8 fffff800`02e9e2a9 : 00000000`0000000a fffffe80`01a6dc10 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`065201f0 fffff800`02e9cf20 : fffffa80`03d9e480 fffff880`0408fd1e 00000000`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`06520330 fffff800`02ec360e : fffff880`06520500 00000000`0001060e fffffa80`003122a0 00000000`00000000 : nt!KiPageFault+0x260
fffff880`065204c0 fffff800`02eaf89f : 00000000`00000000 fffff880`00000000 fffff800`030d15c0 00000000`00000000 : nt!MiRemoveAnyPage+0x13e
fffff880`065205e0 fffff800`02ebc7be : 00000000`00000001 fffff8a0`0a734000 fffff880`06520940 fffff6fc`500539a0 : nt!MiResolveDemandZeroFault+0x54f
fffff880`065206d0 fffff800`02eaca2b : 00000000`00000000 fffff880`06520880 00000000`00000000 00000000`00000000 : nt!MiDispatchFault+0x8ce
fffff880`065207e0 fffff800`02e9ce2e : 00000000`00000001 fffff8a0`0a734000 ffffffff`f8381500 fffff8a0`02a5aff8 : nt!MmAccessFault+0xe1b
fffff880`06520940 fffff800`02e958bb : fffff800`032b9163 fffff8a0`02a5afe8 00000000`00000001 fffff8a0`0a733fe8 : nt!KiPageFault+0x16e
fffff880`06520ad8 fffff800`032b9163 : fffff8a0`02a5afe8 00000000`00000001 fffff8a0`0a733fe8 fffff800`00000000 : nt!memcpy+0x20b
fffff880`06520ae0 fffff800`033082b0 : fffff880`06520c10 fffff8a0`02a55018 fffff8a0`0a726000 fffff8a0`0aba8000 : nt!PfTCreateTraceDump+0x2e3
fffff880`06520be0 fffff800`0330dea3 : fffffa80`05058101 00000000`00000080 fffffa80`02458890 fffff800`03023da8 : nt!PfTGenerateTrace+0x10
fffff880`06520c10 fffff800`0313b32e : ffffffff`ff676980 fffffa80`05058160 fffffa80`050c0b60 fffff800`02e96817 : nt!PfTLoggingWorker+0x113
fffff880`06520d40 fffff800`02e90666 : fffff880`031d3180 fffffa80`05058160 fffff880`031ddfc0 fffff880`01233384 : nt!PspSystemThreadStartup+0x5a
fffff880`06520d80 00000000`00000000 : fffff880`06521000 fffff880`0651b000 fffff880`06520740 00000000`00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiRemoveAnyPage+13e
fffff800`02ec360e f0410fba6c241000 lock bts dword ptr [r12+10h],0
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiRemoveAnyPage+13e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fdd5b
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiRemoveAnyPage+13e
BUCKET_ID: X64_0xA_nt!MiRemoveAnyPage+13e
Followup: MachineOwner
---------