The IRQL_NOT_LESS_OR_EQUAL bug check has a value of 0x0000000A. This indicates that Microsoft Windows or a kernel-mode driver accessed paged memory at DISPATCH_LEVEL or above.
Code:
Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\032619-23937-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 17134 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 17134.1.amd64fre.rs4_release.180410-1804
Machine Name:
Kernel base = 0xfffff800`be81a000 PsLoadedModuleList = 0xfffff800`bebc8150
Debug session time: Mon Mar 25 15:02:14.117 2019 (UTC + 1:00)
System Uptime: 0 days 1:13:04.858
Loading Kernel Symbols
...............................................................
................................................................
.................................................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffff30000eb2cc0, 2, 0, fffff800be885a00}
Probably caused by : memory_corruption ( nt!MiCoalesceFreePages+600 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff30000eb2cc0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800be885a00, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: AB350-Gaming 3
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F25
BIOS_DATE: 01/16/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: AB350-Gaming 3-CF
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: fffff30000eb2cc0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff800be885a00
READ_ADDRESS: fffff800bec67388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff30000eb2cc0
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiCoalesceFreePages+600
fffff800`be885a00 498b29 mov rbp,qword ptr [r9]
CPU_COUNT: c
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: SoundMixer.exe
ANALYSIS_SESSION_HOST: MICHAL
ANALYSIS_SESSION_TIME: 03-27-2019 15:08:31.0092
ANALYSIS_VERSION: 10.0.17763.132 amd64fre
TRAP_FRAME: ffff8f0172ebba70 -- (.trap 0xffff8f0172ebba70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff38002658cc0 rbx=0000000000000000 rcx=fffff38000315cc0
rdx=fffff38002658cc0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800be885a00 rsp=ffff8f0172ebbc00 rbp=fffff30000eb2cc0
r8=fffff38002658cc0 r9=fffff30000eb2cc0 r10=fffff68000006440
r11=fffff38000315cc0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiCoalesceFreePages+0x600:
fffff800`be885a00 498b29 mov rbp,qword ptr [r9] ds:fffff300`00eb2cc0=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800be9d4c69 to fffff800be9c40a0
STACK_TEXT:
ffff8f01`72ebb928 fffff800`be9d4c69 : 00000000`0000000a fffff300`00eb2cc0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8f01`72ebb930 fffff800`be9d18e5 : ffff8f01`72ebbb60 00000000`00000000 00000002`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8f01`72ebba70 fffff800`be885a00 : 00000000`00010744 fffff380`00fabcc0 ffff4a3a`00000001 00000000`00000044 : nt!KiPageFault+0x425
ffff8f01`72ebbc00 fffff800`be884d4a : 00000000`00053940 00000000`00000001 00000000`00000000 00000000`00000001 : nt!MiCoalesceFreePages+0x600
ffff8f01`72ebbcc0 fffff800`be884971 : 00000000`0005394f 00000000`00fabed0 00000000`00000001 00000000`0000004f : nt!MiInsertPageInFreeOrZeroedList+0x32a
ffff8f01`72ebbdc0 fffff800`be884081 : ffff8c50`a437fdaf fffff800`bebeac60 00000000`00000080 fffff800`be8375bc : nt!MiPfnShareCountIsZero+0x4b1
ffff8f01`72ebbe20 fffff800`be866d2a : 00000000`00000000 ffff8f01`72ebc6e0 00000000`00000000 00000000`00000000 : nt!MiDeletePteRun+0xa11
ffff8f01`72ebc010 fffff800`be868b41 : ffff8f01`72ebc1e9 00000000`00000000 ffff8f01`72ebc1e9 ffff8f01`72ebc740 : nt!MiDeleteVaTail+0xba
ffff8f01`72ebc170 fffff800`be868ae2 : ffff8f01`72ebc740 ffff8900`00004e30 ffff8f01`00000000 ffff8f01`00000000 : nt!MiWalkPageTablesRecursively+0x701
ffff8f01`72ebc250 fffff800`be868ae2 : ffff8f01`72ebc740 ffff8944`80000020 ffff8f01`00000001 ffff8f01`00000000 : nt!MiWalkPageTablesRecursively+0x6a2
ffff8f01`72ebc330 fffff800`be868ae2 : ffff8f01`72ebc740 ffff8944`a2400000 ffff8f01`00000002 ffff8f01`00000000 : nt!MiWalkPageTablesRecursively+0x6a2
ffff8f01`72ebc410 fffff800`be8667e7 : ffff8f01`72ebc740 ffff8944`a2512000 ffffcc06`00000003 ffffcc06`00000000 : nt!MiWalkPageTablesRecursively+0x6a2
ffff8f01`72ebc4f0 fffff800`be850ef3 : ffff8f01`72ebc740 ffffcc06`00000001 00000000`00000000 ffffcc06`00000000 : nt!MiWalkPageTables+0x1e7
ffff8f01`72ebc5e0 fffff800`be913e86 : 00000000`000009c5 ffff8944`a2400000 00000000`00000000 fffff800`be873efb : nt!MiDeleteVad+0x8d3
ffff8f01`72ebc910 fffff800`bece1f8b : 00000000`00000000 00000000`00000000 ffffcc06`9c4b5d00 00000000`00000000 : nt!MiFreeVadRange+0x92
ffff8f01`72ebc970 fffff800`bece1bdb : 00000000`77566d4d ffff8f01`72ebca00 00000000`00000000 00000000`00000000 : nt!MmFreeVirtualMemory+0x37b
ffff8f01`72ebcaa0 fffff800`be9d4743 : ffffcc06`9c426080 00000000`00031a08 00000000`00990000 00000000`0000007b : nt!NtFreeVirtualMemory+0x8b
ffff8f01`72ebcb00 00007ff8`c134ad64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0081f848 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`c134ad64
THREAD_SHA1_HASH_MOD_FUNC: a01a56ca2f491d2d83a9b9c9bb3ad52895a293b8
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 81082025269615d16fdc4e4413579497cda939a7
THREAD_SHA1_HASH_MOD: 82d14546c43bd06881f781d6d197c4c7f7ceb9cb
FOLLOWUP_IP:
nt!MiCoalesceFreePages+600
fffff800`be885a00 498b29 mov rbp,qword ptr [r9]
FAULT_INSTR_CODE: 49298b49
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiCoalesceFreePages+600
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5c7f858f
IMAGE_VERSION: 10.0.17134.648
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 600
FAILURE_BUCKET_ID: AV_nt!MiCoalesceFreePages
BUCKET_ID: AV_nt!MiCoalesceFreePages
PRIMARY_PROBLEM_CLASS: AV_nt!MiCoalesceFreePages
TARGET_TIME: 2019-03-25T14:02:14.000Z
OSBUILD: 17134
OSSERVICEPACK: 648
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-03-06 09:32:15
BUILDDATESTAMP_STR: 180410-1804
BUILDLAB_STR: rs4_release
BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804
ANALYSIS_SESSION_ELAPSED_TIME: 2d61
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!micoalescefreepages
FAILURE_ID_HASH: {b58df22f-8dda-e84f-a655-ca12d4e3a252}
Followup: MachineOwner
It seems that the RAM memory is damaged. But something puzzles me. The address from 1 parameter is incorrect:
Code:
2: kd> !pte fffff30000eb2cc0
VA fffff30000eb2cc0
PXE at FFFF8944A2512F30 PPE at FFFF8944A25E6000 PDE at FFFF8944BCC00038 PTE at FFFF897980007590
contains 0000000000000000
not valid
But the address from the 3rd parameter is valid:
Code:
2: kd> !pte fffff800be885a00
VA fffff800be885a00
PXE at FFFF8944A2512F80 PPE at FFFF8944A25F0010 PDE at FFFF8944BE002FA0 PTE at FFFF897C005F4428
contains 0000000003A08063 contains 0000000003A09063 contains 00000000024009E3 contains 0000000000000000
pfn 3a08 ---DA--KWEV pfn 3a09 ---DA--KWEV pfn 2400 -GLDA--KWEV LARGE PAGE pfn 2405
The frame of the trap indicates the function connecting the free pages (surely):
Code:
2: kd> .trap 0xffff8f0172ebba70
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff38002658cc0 rbx=0000000000000000 rcx=fffff38000315cc0
rdx=fffff38002658cc0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800be885a00 rsp=ffff8f0172ebbc00 rbp=fffff30000eb2cc0
r8=fffff38002658cc0 r9=fffff30000eb2cc0 r10=fffff68000006440
r11=fffff38000315cc0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiCoalesceFreePages+0x600:
fffff800`be885a00 498b29 mov rbp,qword ptr [r9] ds:fffff300`00eb2cc0=????????????????
The raw stack does not give anything here:
Code:
2: kd> !dpx
Start memory scan : 0xffff8f0172ebb928 ($csp)
End memory scan : 0xffff8f0172ebd000 (Kernel Stack Base)
0xffff8f0172ebb928 : 0xfffff800be9d4c69 : nt!KiBugCheckDispatch+0x69
0xffff8f0172ebb950 : 0xfffff800be885a00 : nt!MiCoalesceFreePages+0x600
0xffff8f0172ebba08 : 0xfffff800be92b69d : nt!KeAndGroupAffinityEx+0x5d
0xffff8f0172ebba68 : 0xfffff800be9d18e5 : nt!KiPageFault+0x425
0xffff8f0172ebba70 : 0xffff8f0172ebbb60 : Trap @ ffff8f0172ebba70
0xffff8f0172ebbad8 : 0xfffff800be9bfc74 : nt!MiMakeDemandZeroPte+0x10
0xffff8f0172ebbb48 : 0xfffff800beb04706 : nt!ExAllocatePoolWithTag+0x2f6
0xffff8f0172ebbb88 : 0xfffff800bebe9800 : nt!MiSystemPartition+0x8c0
0xffff8f0172ebbb98 : 0xfffff800be9bfeb6 : nt!MiSetPteTimeStamp+0x1e
0xffff8f0172ebbbd8 : 0xfffff800be885a00 : nt!MiCoalesceFreePages+0x600
0xffff8f0172ebbc20 : 0xfffff800bebe8ff8 : nt!MiSystemPartition+0xb8
0xffff8f0172ebbc50 : 0xfffff800bebe8f40 : nt!MiSystemPartition
0xffff8f0172ebbc88 : 0xfffff800bebe8f40 : nt!MiSystemPartition
0xffff8f0172ebbcb8 : 0xfffff800be884d4a : nt!MiInsertPageInFreeOrZeroedList+0x32a
0xffff8f0172ebbd48 : 0xfffff800bebe9800 : nt!MiSystemPartition+0x8c0
0xffff8f0172ebbdb8 : 0xfffff800be884971 : nt!MiPfnShareCountIsZero+0x4b1
0xffff8f0172ebbde8 : 0xfffff800be9bfb19 : nt!MI_GET_PAGE_FRAME_FROM_PTE+0x9
0xffff8f0172ebbe18 : 0xfffff800be884081 : nt!MiDeletePteRun+0xa11
0xffff8f0172ebbe38 : 0xfffff800be8375bc : nt!KiFlushProcessTbWorker+0x3c
0xffff8f0172ebbe70 : 0xfffff800bebe8f40 : nt!MiSystemPartition
0xffff8f0172ebbe90 : 0xfffff800bebe8f40 : nt!MiSystemPartition
0xffff8f0172ebbfb8 : 0xfffff800be899762 : nt!KeFlushTb+0xc2
0xffff8f0172ebc008 : 0xfffff800be866d2a : nt!MiDeleteVaTail+0xba
0xffff8f0172ebc068 : 0xfffff800be866d00 : nt!MiDeleteVaTail+0x90
0xffff8f0172ebc168 : 0xfffff800be868b41 : nt!MiWalkPageTablesRecursively+0x701
0xffff8f0172ebc1f0 : 0xfffff800be86a2a0 : nt!MiDeleteVa
0xffff8f0172ebc248 : 0xfffff800be868ae2 : nt!MiWalkPageTablesRecursively+0x6a2
0xffff8f0172ebc2d0 : 0xfffff800be86a2a0 : nt!MiDeleteVa
0xffff8f0172ebc328 : 0xfffff800be868ae2 : nt!MiWalkPageTablesRecursively+0x6a2
0xffff8f0172ebc3b0 : 0xfffff800be86a2a0 : nt!MiDeleteVa
0xffff8f0172ebc408 : 0xfffff800be868ae2 : nt!MiWalkPageTablesRecursively+0x6a2
0xffff8f0172ebc490 : 0xfffff800be86a2a0 : nt!MiDeleteVa
0xffff8f0172ebc498 : 0xfffff800be8b32ca : nt!MiGetVadWakeList+0x12a
0xffff8f0172ebc4c0 : 0xfffff800bebe8f40 : nt!MiSystemPartition
0xffff8f0172ebc4e8 : 0xfffff800be8667e7 : nt!MiWalkPageTables+0x1e7
0xffff8f0172ebc5d8 : 0xfffff800be850ef3 : nt!MiDeleteVad+0x8d3
0xffff8f0172ebc678 : 0xfffff800be8728ae : nt!MiResolveDemandZeroFault+0x49e
0xffff8f0172ebc788 : 0xfffff800bebe8f40 : nt!MiSystemPartition
0xffff8f0172ebc7d8 : 0xfffff800be86a2a0 : nt!MiDeleteVa
0xffff8f0172ebc7e0 : 0xfffff800be866c70 : nt!MiDeleteVaTail
0xffff8f0172ebc838 : 0xfffff800be86a2a0 : nt!MiDeleteVa
0xffff8f0172ebc840 : 0xfffff800be866c70 : nt!MiDeleteVaTail
0xffff8f0172ebc908 : 0xfffff800be913e86 : nt!MiFreeVadRange+0x92
0xffff8f0172ebc928 : 0xfffff800be873efb : nt!MiObtainReferencedVadEx+0xeb
0xffff8f0172ebc968 : 0xfffff800bece1f8b : nt!MmFreeVirtualMemory+0x37b
0xffff8f0172ebca98 : 0xfffff800bece1bdb : nt!NtFreeVirtualMemory+0x8b
0xffff8f0172ebcaf8 : 0xfffff800be9d4743 : nt!KiSystemServiceCopyEnd+0x13
0xffff8f0172ebcb00 : 0xffffcc069c426080 : Trap @ ffff8f0172ebcb00
I also see the driver verifier on:
Code:
2: kd> !verifier
Verify Flags Level 0x00000000
STANDARD FLAGS:
[X] (0x00000000) Automatic Checks
[ ] (0x00000001) Special pool
[ ] (0x00000002) Force IRQL checking
[ ] (0x00000008) Pool tracking
[ ] (0x00000010) I/O verification
[ ] (0x00000020) Deadlock detection
[ ] (0x00000080) DMA checking
[ ] (0x00000100) Security checks
[ ] (0x00000800) Miscellaneous checks
[ ] (0x00020000) DDI compliance checking
ADDITIONAL FLAGS:
[ ] (0x00000004) Randomized low resources simulation
[ ] (0x00000200) Force pending I/O requests
[ ] (0x00000400) IRP logging
[ ] (0x00002000) Invariant MDL checking for stack
[ ] (0x00004000) Invariant MDL checking for driver
[ ] (0x00008000) Power framework delay fuzzing
[ ] (0x00010000) Port/miniport interface checking
[ ] (0x00040000) Systematic low resources simulation
[ ] (0x00080000) DDI compliance checking (additional)
[ ] (0x00200000) NDIS/WIFI verification
[ ] (0x00800000) Kernel synchronization delay fuzzing
[ ] (0x01000000) VM switch verification
[ ] (0x02000000) Code integrity checks
[X] Indicates flag is enabled
Summary of All Verifier Statistics
RaiseIrqls 0x0
AcquireSpinLocks 0x0
Synch Executions 0x0
Trims 0x0
Pool Allocations Attempted 0x0
Pool Allocations Succeeded 0x0
Pool Allocations Succeeded SpecialPool 0x0
Pool Allocations With NO TAG 0x0
Pool Allocations Failed 0x0
Current paged pool allocations 0x0 for 00000000 bytes
Peak paged pool allocations 0x0 for 00000000 bytes
Current nonpaged pool allocations 0x0 for 00000000 bytes
Peak nonpaged pool allocations 0x0 for 00000000 bytes
If this driver verifier is unnecessary, disable it