BSOD IRQL_NOT_LESS_OR_EQUAL randomly while doing work


  1. Posts : 10
    windows 10
       #1

    BSOD IRQL_NOT_LESS_OR_EQUAL randomly while doing work


    Hello, looks like my BSOD's have evolved. I have had a small grace period from the BSOD's after reinstalling my graphics drivers but i've now randomly been receiving them, once while working, and another time while downloading a game on steam. They've been IRQL_NOT_LESS_OR_EQUAL, bug check 0x0000000a.
    Why is this happening?

    Attachment 228667
      My Computer


  2. Posts : 5,169
    64bit Win 10 Pro ver 21H2
       #2

    I can't see any obvious drivers causing this problem. It is possible that it is memory related since I can see one of the threads is walking the page table recursively and this is often associated with a bit error in the memory.

    You have set your RAM speed to 3000MHz, this is a little on the fast side for your processor which recommends 2667MHz. Normally systems cope fairly well but for troubleshooting please reduce the speed back to 2667MHz and see if it helps.
      My Computers


  3. Posts : 1,538
    Windows 8.1 Enterprise x64
       #3

    The IRQL_NOT_LESS_OR_EQUAL bug check has a value of 0x0000000A. This indicates that Microsoft Windows or a kernel-mode driver accessed paged memory at DISPATCH_LEVEL or above.
    Code:
    Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\032619-23937-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
    Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 10 Kernel Version 17134 MP (12 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 17134.1.amd64fre.rs4_release.180410-1804
    Machine Name:
    Kernel base = 0xfffff800`be81a000 PsLoadedModuleList = 0xfffff800`bebc8150
    Debug session time: Mon Mar 25 15:02:14.117 2019 (UTC + 1:00)
    System Uptime: 0 days 1:13:04.858
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .................................................
    Loading User Symbols
    Loading unloaded module list
    .........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {fffff30000eb2cc0, 2, 0, fffff800be885a00}
    
    Probably caused by : memory_corruption ( nt!MiCoalesceFreePages+600 )
    
    Followup:     MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: fffff30000eb2cc0, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff800be885a00, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    KEY_VALUES_STRING: 1
    
    
    STACKHASH_ANALYSIS: 1
    
    TIMELINE_ANALYSIS: 1
    
    
    DUMP_CLASS: 1
    
    DUMP_QUALIFIER: 400
    
    BUILD_VERSION_STRING:  17134.1.amd64fre.rs4_release.180410-1804
    
    SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.
    
    SYSTEM_PRODUCT_NAME:  AB350-Gaming 3
    
    SYSTEM_SKU:  Default string
    
    SYSTEM_VERSION:  Default string
    
    BIOS_VENDOR:  American Megatrends Inc.
    
    BIOS_VERSION:  F25
    
    BIOS_DATE:  01/16/2019
    
    BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.
    
    BASEBOARD_PRODUCT:  AB350-Gaming 3-CF
    
    BASEBOARD_VERSION:  x.x
    
    DUMP_TYPE:  2
    
    BUGCHECK_P1: fffff30000eb2cc0
    
    BUGCHECK_P2: 2
    
    BUGCHECK_P3: 0
    
    BUGCHECK_P4: fffff800be885a00
    
    READ_ADDRESS: fffff800bec67388: Unable to get MiVisibleState
    Unable to get NonPagedPoolStart
    Unable to get NonPagedPoolEnd
    Unable to get PagedPoolStart
    Unable to get PagedPoolEnd
     fffff30000eb2cc0 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!MiCoalesceFreePages+600
    fffff800`be885a00 498b29          mov     rbp,qword ptr [r9]
    
    CPU_COUNT: c
    
    CPU_MHZ: e6d
    
    CPU_VENDOR:  AuthenticAMD
    
    CPU_FAMILY: 17
    
    CPU_MODEL: 1
    
    CPU_STEPPING: 1
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    
    BLACKBOXPNP: 1 (!blackboxpnp)
    
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    BUGCHECK_STR:  AV
    
    PROCESS_NAME:  SoundMixer.exe
    
    ANALYSIS_SESSION_HOST:  MICHAL
    
    ANALYSIS_SESSION_TIME:  03-27-2019 15:08:31.0092
    
    ANALYSIS_VERSION: 10.0.17763.132 amd64fre
    
    TRAP_FRAME:  ffff8f0172ebba70 -- (.trap 0xffff8f0172ebba70)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff38002658cc0 rbx=0000000000000000 rcx=fffff38000315cc0
    rdx=fffff38002658cc0 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff800be885a00 rsp=ffff8f0172ebbc00 rbp=fffff30000eb2cc0
     r8=fffff38002658cc0  r9=fffff30000eb2cc0 r10=fffff68000006440
    r11=fffff38000315cc0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    nt!MiCoalesceFreePages+0x600:
    fffff800`be885a00 498b29          mov     rbp,qword ptr [r9] ds:fffff300`00eb2cc0=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800be9d4c69 to fffff800be9c40a0
    
    STACK_TEXT:  
    ffff8f01`72ebb928 fffff800`be9d4c69 : 00000000`0000000a fffff300`00eb2cc0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    ffff8f01`72ebb930 fffff800`be9d18e5 : ffff8f01`72ebbb60 00000000`00000000 00000002`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    ffff8f01`72ebba70 fffff800`be885a00 : 00000000`00010744 fffff380`00fabcc0 ffff4a3a`00000001 00000000`00000044 : nt!KiPageFault+0x425
    ffff8f01`72ebbc00 fffff800`be884d4a : 00000000`00053940 00000000`00000001 00000000`00000000 00000000`00000001 : nt!MiCoalesceFreePages+0x600
    ffff8f01`72ebbcc0 fffff800`be884971 : 00000000`0005394f 00000000`00fabed0 00000000`00000001 00000000`0000004f : nt!MiInsertPageInFreeOrZeroedList+0x32a
    ffff8f01`72ebbdc0 fffff800`be884081 : ffff8c50`a437fdaf fffff800`bebeac60 00000000`00000080 fffff800`be8375bc : nt!MiPfnShareCountIsZero+0x4b1
    ffff8f01`72ebbe20 fffff800`be866d2a : 00000000`00000000 ffff8f01`72ebc6e0 00000000`00000000 00000000`00000000 : nt!MiDeletePteRun+0xa11
    ffff8f01`72ebc010 fffff800`be868b41 : ffff8f01`72ebc1e9 00000000`00000000 ffff8f01`72ebc1e9 ffff8f01`72ebc740 : nt!MiDeleteVaTail+0xba
    ffff8f01`72ebc170 fffff800`be868ae2 : ffff8f01`72ebc740 ffff8900`00004e30 ffff8f01`00000000 ffff8f01`00000000 : nt!MiWalkPageTablesRecursively+0x701
    ffff8f01`72ebc250 fffff800`be868ae2 : ffff8f01`72ebc740 ffff8944`80000020 ffff8f01`00000001 ffff8f01`00000000 : nt!MiWalkPageTablesRecursively+0x6a2
    ffff8f01`72ebc330 fffff800`be868ae2 : ffff8f01`72ebc740 ffff8944`a2400000 ffff8f01`00000002 ffff8f01`00000000 : nt!MiWalkPageTablesRecursively+0x6a2
    ffff8f01`72ebc410 fffff800`be8667e7 : ffff8f01`72ebc740 ffff8944`a2512000 ffffcc06`00000003 ffffcc06`00000000 : nt!MiWalkPageTablesRecursively+0x6a2
    ffff8f01`72ebc4f0 fffff800`be850ef3 : ffff8f01`72ebc740 ffffcc06`00000001 00000000`00000000 ffffcc06`00000000 : nt!MiWalkPageTables+0x1e7
    ffff8f01`72ebc5e0 fffff800`be913e86 : 00000000`000009c5 ffff8944`a2400000 00000000`00000000 fffff800`be873efb : nt!MiDeleteVad+0x8d3
    ffff8f01`72ebc910 fffff800`bece1f8b : 00000000`00000000 00000000`00000000 ffffcc06`9c4b5d00 00000000`00000000 : nt!MiFreeVadRange+0x92
    ffff8f01`72ebc970 fffff800`bece1bdb : 00000000`77566d4d ffff8f01`72ebca00 00000000`00000000 00000000`00000000 : nt!MmFreeVirtualMemory+0x37b
    ffff8f01`72ebcaa0 fffff800`be9d4743 : ffffcc06`9c426080 00000000`00031a08 00000000`00990000 00000000`0000007b : nt!NtFreeVirtualMemory+0x8b
    ffff8f01`72ebcb00 00007ff8`c134ad64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0081f848 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`c134ad64
    
    
    THREAD_SHA1_HASH_MOD_FUNC:  a01a56ca2f491d2d83a9b9c9bb3ad52895a293b8
    
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  81082025269615d16fdc4e4413579497cda939a7
    
    THREAD_SHA1_HASH_MOD:  82d14546c43bd06881f781d6d197c4c7f7ceb9cb
    
    FOLLOWUP_IP: 
    nt!MiCoalesceFreePages+600
    fffff800`be885a00 498b29          mov     rbp,qword ptr [r9]
    
    FAULT_INSTR_CODE:  49298b49
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!MiCoalesceFreePages+600
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  5c7f858f
    
    IMAGE_VERSION:  10.0.17134.648
    
    STACK_COMMAND:  .thread ; .cxr ; kb
    
    IMAGE_NAME:  memory_corruption
    
    BUCKET_ID_FUNC_OFFSET:  600
    
    FAILURE_BUCKET_ID:  AV_nt!MiCoalesceFreePages
    
    BUCKET_ID:  AV_nt!MiCoalesceFreePages
    
    PRIMARY_PROBLEM_CLASS:  AV_nt!MiCoalesceFreePages
    
    TARGET_TIME:  2019-03-25T14:02:14.000Z
    
    OSBUILD:  17134
    
    OSSERVICEPACK:  648
    
    SERVICEPACK_NUMBER: 0
    
    OS_REVISION: 0
    
    SUITE_MASK:  272
    
    PRODUCT_TYPE:  1
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS
    
    OS_LOCALE:  
    
    USER_LCID:  0
    
    OSBUILD_TIMESTAMP:  2019-03-06 09:32:15
    
    BUILDDATESTAMP_STR:  180410-1804
    
    BUILDLAB_STR:  rs4_release
    
    BUILDOSVER_STR:  10.0.17134.1.amd64fre.rs4_release.180410-1804
    
    ANALYSIS_SESSION_ELAPSED_TIME:  2d61
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:av_nt!micoalescefreepages
    
    FAILURE_ID_HASH:  {b58df22f-8dda-e84f-a655-ca12d4e3a252}
    
    Followup:     MachineOwner
    It seems that the RAM memory is damaged. But something puzzles me. The address from 1 parameter is incorrect:
    Code:
    2: kd> !pte fffff30000eb2cc0
                                               VA fffff30000eb2cc0
    PXE at FFFF8944A2512F30    PPE at FFFF8944A25E6000    PDE at FFFF8944BCC00038    PTE at FFFF897980007590
    contains 0000000000000000
    not valid
    But the address from the 3rd parameter is valid:
    Code:
    2: kd> !pte fffff800be885a00
                                               VA fffff800be885a00
    PXE at FFFF8944A2512F80    PPE at FFFF8944A25F0010    PDE at FFFF8944BE002FA0    PTE at FFFF897C005F4428
    contains 0000000003A08063  contains 0000000003A09063  contains 00000000024009E3  contains 0000000000000000
    pfn 3a08      ---DA--KWEV  pfn 3a09      ---DA--KWEV  pfn 2400      -GLDA--KWEV  LARGE PAGE pfn 2405
    The frame of the trap indicates the function connecting the free pages (surely):
    Code:
    2: kd> .trap 0xffff8f0172ebba70
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff38002658cc0 rbx=0000000000000000 rcx=fffff38000315cc0
    rdx=fffff38002658cc0 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff800be885a00 rsp=ffff8f0172ebbc00 rbp=fffff30000eb2cc0
     r8=fffff38002658cc0  r9=fffff30000eb2cc0 r10=fffff68000006440
    r11=fffff38000315cc0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    nt!MiCoalesceFreePages+0x600:
    fffff800`be885a00 498b29          mov     rbp,qword ptr [r9] ds:fffff300`00eb2cc0=????????????????
    The raw stack does not give anything here:
    Code:
    2: kd> !dpx
    Start memory scan  : 0xffff8f0172ebb928 ($csp)
    End memory scan    : 0xffff8f0172ebd000 (Kernel Stack Base)
    
    0xffff8f0172ebb928 : 0xfffff800be9d4c69 : nt!KiBugCheckDispatch+0x69
    0xffff8f0172ebb950 : 0xfffff800be885a00 : nt!MiCoalesceFreePages+0x600
    0xffff8f0172ebba08 : 0xfffff800be92b69d : nt!KeAndGroupAffinityEx+0x5d
    0xffff8f0172ebba68 : 0xfffff800be9d18e5 : nt!KiPageFault+0x425
    0xffff8f0172ebba70 : 0xffff8f0172ebbb60 :  Trap @ ffff8f0172ebba70
    0xffff8f0172ebbad8 : 0xfffff800be9bfc74 : nt!MiMakeDemandZeroPte+0x10
    0xffff8f0172ebbb48 : 0xfffff800beb04706 : nt!ExAllocatePoolWithTag+0x2f6
    0xffff8f0172ebbb88 : 0xfffff800bebe9800 : nt!MiSystemPartition+0x8c0
    0xffff8f0172ebbb98 : 0xfffff800be9bfeb6 : nt!MiSetPteTimeStamp+0x1e
    0xffff8f0172ebbbd8 : 0xfffff800be885a00 : nt!MiCoalesceFreePages+0x600
    0xffff8f0172ebbc20 : 0xfffff800bebe8ff8 : nt!MiSystemPartition+0xb8
    0xffff8f0172ebbc50 : 0xfffff800bebe8f40 : nt!MiSystemPartition
    0xffff8f0172ebbc88 : 0xfffff800bebe8f40 : nt!MiSystemPartition
    0xffff8f0172ebbcb8 : 0xfffff800be884d4a : nt!MiInsertPageInFreeOrZeroedList+0x32a
    0xffff8f0172ebbd48 : 0xfffff800bebe9800 : nt!MiSystemPartition+0x8c0
    0xffff8f0172ebbdb8 : 0xfffff800be884971 : nt!MiPfnShareCountIsZero+0x4b1
    0xffff8f0172ebbde8 : 0xfffff800be9bfb19 : nt!MI_GET_PAGE_FRAME_FROM_PTE+0x9
    0xffff8f0172ebbe18 : 0xfffff800be884081 : nt!MiDeletePteRun+0xa11
    0xffff8f0172ebbe38 : 0xfffff800be8375bc : nt!KiFlushProcessTbWorker+0x3c
    0xffff8f0172ebbe70 : 0xfffff800bebe8f40 : nt!MiSystemPartition
    0xffff8f0172ebbe90 : 0xfffff800bebe8f40 : nt!MiSystemPartition
    0xffff8f0172ebbfb8 : 0xfffff800be899762 : nt!KeFlushTb+0xc2
    0xffff8f0172ebc008 : 0xfffff800be866d2a : nt!MiDeleteVaTail+0xba
    0xffff8f0172ebc068 : 0xfffff800be866d00 : nt!MiDeleteVaTail+0x90
    0xffff8f0172ebc168 : 0xfffff800be868b41 : nt!MiWalkPageTablesRecursively+0x701
    0xffff8f0172ebc1f0 : 0xfffff800be86a2a0 : nt!MiDeleteVa
    0xffff8f0172ebc248 : 0xfffff800be868ae2 : nt!MiWalkPageTablesRecursively+0x6a2
    0xffff8f0172ebc2d0 : 0xfffff800be86a2a0 : nt!MiDeleteVa
    0xffff8f0172ebc328 : 0xfffff800be868ae2 : nt!MiWalkPageTablesRecursively+0x6a2
    0xffff8f0172ebc3b0 : 0xfffff800be86a2a0 : nt!MiDeleteVa
    0xffff8f0172ebc408 : 0xfffff800be868ae2 : nt!MiWalkPageTablesRecursively+0x6a2
    0xffff8f0172ebc490 : 0xfffff800be86a2a0 : nt!MiDeleteVa
    0xffff8f0172ebc498 : 0xfffff800be8b32ca : nt!MiGetVadWakeList+0x12a
    0xffff8f0172ebc4c0 : 0xfffff800bebe8f40 : nt!MiSystemPartition
    0xffff8f0172ebc4e8 : 0xfffff800be8667e7 : nt!MiWalkPageTables+0x1e7
    0xffff8f0172ebc5d8 : 0xfffff800be850ef3 : nt!MiDeleteVad+0x8d3
    0xffff8f0172ebc678 : 0xfffff800be8728ae : nt!MiResolveDemandZeroFault+0x49e
    0xffff8f0172ebc788 : 0xfffff800bebe8f40 : nt!MiSystemPartition
    0xffff8f0172ebc7d8 : 0xfffff800be86a2a0 : nt!MiDeleteVa
    0xffff8f0172ebc7e0 : 0xfffff800be866c70 : nt!MiDeleteVaTail
    0xffff8f0172ebc838 : 0xfffff800be86a2a0 : nt!MiDeleteVa
    0xffff8f0172ebc840 : 0xfffff800be866c70 : nt!MiDeleteVaTail
    0xffff8f0172ebc908 : 0xfffff800be913e86 : nt!MiFreeVadRange+0x92
    0xffff8f0172ebc928 : 0xfffff800be873efb : nt!MiObtainReferencedVadEx+0xeb
    0xffff8f0172ebc968 : 0xfffff800bece1f8b : nt!MmFreeVirtualMemory+0x37b
    0xffff8f0172ebca98 : 0xfffff800bece1bdb : nt!NtFreeVirtualMemory+0x8b
    0xffff8f0172ebcaf8 : 0xfffff800be9d4743 : nt!KiSystemServiceCopyEnd+0x13
    0xffff8f0172ebcb00 : 0xffffcc069c426080 :  Trap @ ffff8f0172ebcb00
    I also see the driver verifier on:
    Code:
    2: kd> !verifier
    
    Verify Flags Level 0x00000000
    
      STANDARD FLAGS:
        [X] (0x00000000) Automatic Checks
        [ ] (0x00000001) Special pool
        [ ] (0x00000002) Force IRQL checking
        [ ] (0x00000008) Pool tracking
        [ ] (0x00000010) I/O verification
        [ ] (0x00000020) Deadlock detection
        [ ] (0x00000080) DMA checking
        [ ] (0x00000100) Security checks
        [ ] (0x00000800) Miscellaneous checks
        [ ] (0x00020000) DDI compliance checking
    
      ADDITIONAL FLAGS:
        [ ] (0x00000004) Randomized low resources simulation
        [ ] (0x00000200) Force pending I/O requests
        [ ] (0x00000400) IRP logging
        [ ] (0x00002000) Invariant MDL checking for stack
        [ ] (0x00004000) Invariant MDL checking for driver
        [ ] (0x00008000) Power framework delay fuzzing
        [ ] (0x00010000) Port/miniport interface checking
        [ ] (0x00040000) Systematic low resources simulation
        [ ] (0x00080000) DDI compliance checking (additional)
        [ ] (0x00200000) NDIS/WIFI verification
        [ ] (0x00800000) Kernel synchronization delay fuzzing
        [ ] (0x01000000) VM switch verification
        [ ] (0x02000000) Code integrity checks
    
        [X] Indicates flag is enabled
    
    
    Summary of All Verifier Statistics
    
      RaiseIrqls           0x0
      AcquireSpinLocks     0x0
      Synch Executions     0x0
      Trims                0x0
    
      Pool Allocations Attempted             0x0
      Pool Allocations Succeeded             0x0
      Pool Allocations Succeeded SpecialPool 0x0
      Pool Allocations With NO TAG           0x0
      Pool Allocations Failed                0x0
    
      Current paged pool allocations         0x0 for 00000000 bytes
      Peak paged pool allocations            0x0 for 00000000 bytes
      Current nonpaged pool allocations      0x0 for 00000000 bytes
      Peak nonpaged pool allocations         0x0 for 00000000 bytes
    If this driver verifier is unnecessary, disable it
      My Computer


  4. Posts : 10
    windows 10
    Thread Starter
       #4

    Ok, I will try reducing the processor speed to 2667 MHz and disable the driver verifier. I’ll see if I get any more BSODs.
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 19:07.
Find Us




Windows 10 Forums