*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000000A, {0, 2, 0, 8051b45a}
Probably caused by : memory_corruption ( nt!MmUnmapViewInSystemCache+2fc )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 8051b45a, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 00000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!MmUnmapViewInSystemCache+2fc
8051b45a 3908 cmp dword ptr [eax],ecx
CUSTOMER_CRASH_COUNT: 7
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
LAST_CONTROL_TRANSFER: from 8056a9cc to 8051b45a
STACK_TEXT:
ba4ebc64 8056a9cc d0328000 000a7c30 00000000 nt!MmUnmapViewInSystemCache+0x2fc
ba4ebc7c 804e8239 8aee1308 89eba008 00000000 nt!CcUnmapVacb+0x2a
ba4ebcb0 804e5246 00000000 00000000 89eba06c nt!CcUnmapVacbArray+0x117
ba4ebccc 804e5501 89eba008 806e6a4c 89eba008 nt!CcUnmapAndPurge+0x20
ba4ebcfc 804e4b03 00000001 80559690 8aa15638 nt!CcDeleteSharedCacheMap+0xc5
ba4ebd34 804e70db 8aef7288 80564820 8aef7910 nt!CcWriteBehind+0x357
ba4ebd7c 8053877d 8aef7288 00000000 8aef7910 nt!CcWorkerThread+0x12f
ba4ebdac 805cff70 8aef7288 00000000 00000000 nt!ExpWorkerThread+0xef
ba4ebddc 805460ee 8053868e 00000000 00000000 nt!PspSystemThreadStartup+0x34
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MmUnmapViewInSystemCache+2fc
8051b45a 3908 cmp dword ptr [eax],ecx
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MmUnmapViewInSystemCache+2fc
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 498c11d3
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0xA_nt!MmUnmapViewInSystemCache+2fc
BUCKET_ID: 0xA_nt!MmUnmapViewInSystemCache+2fc
Followup: MachineOwner
---------
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000000A, {0, 2, 0, 8051b45a}
Probably caused by : memory_corruption ( nt!MmUnmapViewInSystemCache+2fc )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 8051b45a, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 00000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!MmUnmapViewInSystemCache+2fc
8051b45a 3908 cmp dword ptr [eax],ecx
CUSTOMER_CRASH_COUNT: 7
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
LAST_CONTROL_TRANSFER: from 8056a9cc to 8051b45a
STACK_TEXT:
ba4ebc64 8056a9cc d0328000 000a7c30 00000000 nt!MmUnmapViewInSystemCache+0x2fc
ba4ebc7c 804e8239 8aee1308 89eba008 00000000 nt!CcUnmapVacb+0x2a
ba4ebcb0 804e5246 00000000 00000000 89eba06c nt!CcUnmapVacbArray+0x117
ba4ebccc 804e5501 89eba008 806e6a4c 89eba008 nt!CcUnmapAndPurge+0x20
ba4ebcfc 804e4b03 00000001 80559690 8aa15638 nt!CcDeleteSharedCacheMap+0xc5
ba4ebd34 804e70db 8aef7288 80564820 8aef7910 nt!CcWriteBehind+0x357
ba4ebd7c 8053877d 8aef7288 00000000 8aef7910 nt!CcWorkerThread+0x12f
ba4ebdac 805cff70 8aef7288 00000000 00000000 nt!ExpWorkerThread+0xef
ba4ebddc 805460ee 8053868e 00000000 00000000 nt!PspSystemThreadStartup+0x34
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MmUnmapViewInSystemCache+2fc
8051b45a 3908 cmp dword ptr [eax],ecx
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MmUnmapViewInSystemCache+2fc
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 498c11d3
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0xA_nt!MmUnmapViewInSystemCache+2fc
BUCKET_ID: 0xA_nt!MmUnmapViewInSystemCache+2fc
Followup: MachineOwner
---------