Mi ordenador da pantallazos azules de vez en cuando
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 805226e8, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: 00000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiRemovePageByColor+66
805226e8 ff08 dec dword ptr [eax]
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: ctfmon.exe
TRAP_FRAME: b5a59c24 -- (.trap 0xffffffffb5a59c24)
ErrCode = 00000002
eax=00000000 ebx=c0000588 ecx=0005932b edx=00000003 esi=821c18b4 edi=00000000
eip=805226e8 esp=b5a59c98 ebp=b5a59cb4 iopl=0 nv up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
nt!MiRemovePageByColor+0x66:
805226e8 ff08 dec dword ptr [eax] ds:0023:00000000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 805226e8 to 805446e0
STACK_TEXT:
B5a59c24 805226e8 badb0d00 00000003 dfa87b58 nt! KiTrap0E+0x238
b5a59cb4 80522a80 00000001 00000003 c0000588 nt! MiRemovePageByColor+0x66
b5a59cd0 80514aff c0600000 c0000588 00000000 nt! MiRemoveZeroPage+0x8a
b5a59ce8 805205ad 000b1195 c0000588 8a0b0bf0 nt! MiResolveDemandZeroFault+0xc5
b5a59d4c 80544578 00000001 000b1195 00000001 nt! MmAccessFault+0xbeb
b5a59d4c 7c920f86 00000001 000b1195 00000001 nt!KiTrap0E+0xd0
WARNING: Frame IP not in any known module. Following frames may be wrong.
0007e6bc 00000000 00000000 00000000 00000000 0x7c920f86
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiRemovePageByColor+66
805226e8 ff08 dec dword ptr [eax]
SYMBOL_STACK_INDEX: 1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4802516a
SYMBOL_NAME: nt!MiRemovePageByColor+66
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0xA_W_nt!MiRemovePageByColor+66
BUCKET_ID: 0xA_W_nt!MiRemovePageByColor+66
Followup: MachineOwner
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 805226e8, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: 00000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiRemovePageByColor+66
805226e8 ff08 dec dword ptr [eax]
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: ctfmon.exe
TRAP_FRAME: b5a59c24 -- (.trap 0xffffffffb5a59c24)
ErrCode = 00000002
eax=00000000 ebx=c0000588 ecx=0005932b edx=00000003 esi=821c18b4 edi=00000000
eip=805226e8 esp=b5a59c98 ebp=b5a59cb4 iopl=0 nv up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
nt!MiRemovePageByColor+0x66:
805226e8 ff08 dec dword ptr [eax] ds:0023:00000000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 805226e8 to 805446e0
STACK_TEXT:
B5a59c24 805226e8 badb0d00 00000003 dfa87b58 nt! KiTrap0E+0x238
b5a59cb4 80522a80 00000001 00000003 c0000588 nt! MiRemovePageByColor+0x66
b5a59cd0 80514aff c0600000 c0000588 00000000 nt! MiRemoveZeroPage+0x8a
b5a59ce8 805205ad 000b1195 c0000588 8a0b0bf0 nt! MiResolveDemandZeroFault+0xc5
b5a59d4c 80544578 00000001 000b1195 00000001 nt! MmAccessFault+0xbeb
b5a59d4c 7c920f86 00000001 000b1195 00000001 nt!KiTrap0E+0xd0
WARNING: Frame IP not in any known module. Following frames may be wrong.
0007e6bc 00000000 00000000 00000000 00000000 0x7c920f86
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiRemovePageByColor+66
805226e8 ff08 dec dword ptr [eax]
SYMBOL_STACK_INDEX: 1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4802516a
SYMBOL_NAME: nt!MiRemovePageByColor+66
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0xA_W_nt!MiRemovePageByColor+66
BUCKET_ID: 0xA_W_nt!MiRemovePageByColor+66
Followup: MachineOwner
2 respuestas
Respuesta de sepher
1
Respuesta de vakk
1