Can any one be of help please?
"The computer has rebooted from a bugcheck. The bugcheck was: 0x0000000a", could you please help in analyzing the root cause for this issue? Just for your reference I am posting the dump output:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {97, 2, 1, 80539f04}
Probably caused by : memory_corruption ( nt!MiSessionOutSwapProcess+166 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000097, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 80539f04, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: unable to read from 80487e18
unable to read from 80487748
unable to read from 804875fc
unable to read from 80479268
unable to read from 80487610
unable to read from 80487744
unable to read from 8047926c
unable to read from 80487804
unable to read from 80487db8
00000097
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiSessionOutSwapProcess+166
80539f04 ff8698000000 inc dword ptr [esi+98h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: f7487cbc -- (.trap 0xfffffffff7487cbc)
ErrCode = 00000002
eax=00000000 ebx=800654f0 ecx=80488044 edx=00000000 esi=ffffffff edi=80488044
eip=80539f04 esp=f7487d30 ebp=f7487d44 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!MiSessionOutSwapProcess+0x166:
80539f04 ff8698000000 inc dword ptr [esi+98h] ds:0023:00000097=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 80539f04 to 8046ccbc
STACK_TEXT:
f7487cbc 80539f04 00000206 80430237 00000001 nt!KiTrap0E+0x210
f7487d44 804426fb 8c214900 8c2149e0 8c2149a0 nt!MiSessionOutSwapProcess+0x166
f7487d78 80468591 8c2149a0 00000000 00000000 nt!MmOutSwapProcess+0x2f
f7487d90 8046833c 00000000 00000000 00000000 nt!KiOutSwapProcesses+0x6b
f7487da8 804593cc 00000000 00000000 00000000 nt!KeSwapProcessOrStack+0x5a
f7487ddc 8046e476 804682e2 00000000 00000000 nt!PspSystemThreadStartup+0x54
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiSessionOutSwapProcess+166
80539f04 ff8698000000 inc dword ptr [esi+98h]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiSessionOutSwapProcess+166
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 40d1d1be
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0xA_nt!MiSessionOutSwapProcess+166
BUCKET_ID: 0xA_nt!MiSessionOutSwapProcess+166
Followup: MachineOwner
---------
"The computer has rebooted from a bugcheck. The bugcheck was: 0x0000000a", could you please help in analyzing the root cause for this issue? Just for your reference I am posting the dump output:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {97, 2, 1, 80539f04}
Probably caused by : memory_corruption ( nt!MiSessionOutSwapProcess+166 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000097, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 80539f04, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: unable to read from 80487e18
unable to read from 80487748
unable to read from 804875fc
unable to read from 80479268
unable to read from 80487610
unable to read from 80487744
unable to read from 8047926c
unable to read from 80487804
unable to read from 80487db8
00000097
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiSessionOutSwapProcess+166
80539f04 ff8698000000 inc dword ptr [esi+98h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: f7487cbc -- (.trap 0xfffffffff7487cbc)
ErrCode = 00000002
eax=00000000 ebx=800654f0 ecx=80488044 edx=00000000 esi=ffffffff edi=80488044
eip=80539f04 esp=f7487d30 ebp=f7487d44 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!MiSessionOutSwapProcess+0x166:
80539f04 ff8698000000 inc dword ptr [esi+98h] ds:0023:00000097=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 80539f04 to 8046ccbc
STACK_TEXT:
f7487cbc 80539f04 00000206 80430237 00000001 nt!KiTrap0E+0x210
f7487d44 804426fb 8c214900 8c2149e0 8c2149a0 nt!MiSessionOutSwapProcess+0x166
f7487d78 80468591 8c2149a0 00000000 00000000 nt!MmOutSwapProcess+0x2f
f7487d90 8046833c 00000000 00000000 00000000 nt!KiOutSwapProcesses+0x6b
f7487da8 804593cc 00000000 00000000 00000000 nt!KeSwapProcessOrStack+0x5a
f7487ddc 8046e476 804682e2 00000000 00000000 nt!PspSystemThreadStartup+0x54
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiSessionOutSwapProcess+166
80539f04 ff8698000000 inc dword ptr [esi+98h]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiSessionOutSwapProcess+166
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 40d1d1be
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0xA_nt!MiSessionOutSwapProcess+166
BUCKET_ID: 0xA_nt!MiSessionOutSwapProcess+166
Followup: MachineOwner
---------