*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002f00f00, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000310d100
0000000000000010
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiReplenishPageSlist+c0
fffff800`02f00f00 f00fba6b1000 lock bts dword ptr [rbx+10h],0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
DEVICE_OBJECT: fffffa801343fff8
TRAP_FRAME: fffff8800d297050 -- (.trap 0xfffff8800d297050)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffffffffffffff rbx=0000000000000000 rcx=0000058000000000
rdx=0008000000000078 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002f00f00 rsp=fffff8800d2971e0 rbp=fffffa8003ef87a0
r8=fffff800031104c0 r9=0000000000000000 r10=fffffa800ca83bd0
r11=fffff88003164180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!MiReplenishPageSlist+0xc0:
fffff800`02f00f00 f00fba6b1000 lock bts dword ptr [rbx+10h],0 ds:f098:00000000`00000010=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002eda1e9 to fffff80002edac40
STACK_TEXT:
fffff880`0d296f08 fffff800`02eda1e9 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0d296f10 fffff800`02ed8e60 : fffff880`0d297290 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0d297050 fffff800`02f00f00 : 00000000`00000003 fffffa80`0dc50180 fffffa80`0db71940 fffff880`0d2972e0 : nt!KiPageFault+0x260
fffff880`0d2971e0 fffff800`02eff6bf : fffffa80`0ca83bb0 00000000`0000007e fffffa80`068357a0 00000000`0000007e : nt!MiReplenishPageSlist+0xc0
fffff880`0d297250 fffff800`02f0757b : 00000000`00000000 00000000`00000000 ffffffff`ffffffff 00000000`00000082 : nt!MiRemoveAnyPage+0x24f
fffff880`0d297370 fffff800`02f03e3e : fffff980`737af000 00000000`08deef8e fffff880`00000000 00000000`00001000 : nt!MmCopyToCachedPage+0xa0b
fffff880`0d297560 fffff800`02f043f4 : fffffa80`114fd2f0 00000000`08deef8e fffff880`0d2976a0 00000000`00000000 : nt!CcMapAndCopyInToCache+0x20e
fffff880`0d297650 fffff880`01455bf6 : 00000000`00000000 fffff880`0d2978c0 fffffa80`122f1d70 fffffa80`122f1d70 : nt!CcCopyWrite+0x194
fffff880`0d2976e0 fffff880`014561a3 : fffffa80`122f1d70 fffffa80`1343fc10 fffff880`0d297801 fffff880`0d297800 : Ntfs!NtfsCommonWrite+0x3390
fffff880`0d297890 fffff880`01125bcf : fffffa80`1343ffb0 fffffa80`1343fc10 fffffa80`12f85010 00000000`00000001 : Ntfs!NtfsFsdWrite+0x1c3
fffff880`0d297950 fffff880`011246df : fffffa80`0db6fb60 00000000`00000001 fffffa80`0db6fb00 fffffa80`1343fc10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`0d2979e0 fffff800`031e321b : 00000000`00000001 fffffa80`11282690 00000000`00000001 fffffa80`1343fc10 : fltmgr!FltpDispatch+0xcf
fffff880`0d297a40 fffff800`031edc83 : fffffa80`1343fff8 00000000`00000000 fffffa80`11282690 fffff880`03164180 : nt!IopSynchronousServiceTail+0xfb
fffff880`0d297ab0 fffff800`02ed9ed3 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x7e2
fffff880`0d297bb0 00000000`7753139a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0356e428 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7753139a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiReplenishPageSlist+c0
fffff800`02f00f00 f00fba6b1000 lock bts dword ptr [rbx+10h],0
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiReplenishPageSlist+c0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiReplenishPageSlist+c0
BUCKET_ID: X64_0xA_nt!MiReplenishPageSlist+c0
Followup: MachineOwner
---------