0XA IRQL_NOT_LESS_OR_EQUAL BSOD please help

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • BlueTBM
    PCHF Member
    • Aug 2018
    • 13

    #1

    0XA IRQL_NOT_LESS_OR_EQUAL BSOD please help

    this didnt happen too long ago i was watching some good old fashioned Youtube as you do then it my pc stopped suddently and then bsod happened and showed the irql issue. heres the dmp below

    analyze it if you can it would mean the world to me if you could help me with this



    i also h

    also my rams the same brand 4gig of corsair vengeance lpx 2400 speed same timing same model

    just had another recent crash got more dmps
  • veeg
    PCHF Director
    • Jul 2016
    • 8978

    #2
    Hello

    Hopefully some of our members will be with you soon,

    jmarket @phillpower2

    Comment

    • Malnutrition
      PCHF Moderator
      • Jul 2016
      • 7041

      #3
      Sysnative Tool.
      1. Download the Sysnative BSOD Dump + System File Collection App - save to Documents folder -
      2. Run the app - Double-click on the downloaded EXE file
        Output = new folder created in Documents + a zipped version – SysnativeFileCollectionApp + SysnativeFileCollectionApp.zip
      3. Upload the SysnativeFileCollectionApp.zip file for review.

      Speccy Scan.

      [ul]
      [li]Please go here and download Speccy.[/li][li]Install and run the program.[/li][li]Upon Completion:[/li][li]Hit File[/li][li]Publish Snap Shot[/li][li]A link will appear, post that link.[/li][/ul]
      Code:
      *******************************************************************************
      *                                                                             *
      *                        Bugcheck Analysis                                    *
      *                                                                             *
      *******************************************************************************
      
      IRQL_NOT_LESS_OR_EQUAL (a)
      An attempt was made to access a pageable (or completely invalid) address at an
      interrupt request level (IRQL) that is too high.  This is usually
      caused by drivers using improper addresses.
      If a kernel debugger is available get the stack backtrace.
      Arguments:
      Arg1: ffff9f886ec5d9f8, memory referenced
      Arg2: 0000000000000002, IRQL
      Arg3: 0000000000000000, bitfield :
          bit 0 : value 0 = read operation, 1 = write operation
          bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
      Arg4: fffff8029e4da9e9, address which referenced memory
      
      Debugging Details:
      ------------------
      
      TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
      
      READ_ADDRESS: unable to get nt!MmSpecialPoolStart
      unable to get nt!MmSpecialPoolEnd
      unable to get nt!MmPagedPoolEnd
      unable to get nt!MmNonPagedPoolStart
      unable to get nt!MmSizeOfNonPagedPoolInBytes
      ffff9f886ec5d9f8
      
      CURRENT_IRQL:  2
      
      FAULTING_IP:
      nt!MiIdentifyPfn+349
      fffff802`9e4da9e9 4c8b38          mov     r15,qword ptr [rax]
      
      DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
      
      BUGCHECK_STR:  AV
      
      PROCESS_NAME:  svchost.exe
      
      TRAP_FRAME:  fffff68473428e00 -- (.trap 0xfffff68473428e00)
      NOTE: The trap frame does not contain all registers.
      Some register values may be zeroed or incorrect.
      rax=ffff9f886ec5d9f8 rbx=0000000000000000 rcx=9f886ec5d9f80460
      rdx=0a00000000000160 rsi=0000000000000000 rdi=0000000000000000
      rip=fffff8029e4da9e9 rsp=fffff68473428f90 rbp=fffff68473429019
      r8=9f886ec5d9f80460  r9=000000000021c99d r10=022000000020778c
      r11=0000000071f40c46 r12=0000000000000000 r13=0000000000000000
      r14=0000000000000000 r15=0000000000000000
      iopl=0         nv up ei pl zr na po nc
      nt!MiIdentifyPfn+0x349:
      fffff802`9e4da9e9 4c8b38          mov     r15,qword ptr [rax] ds:ffff9f88`6ec5d9f8=????????????????
      Resetting default scope
      
      LAST_CONTROL_TRANSFER:  from fffff8029e647869 to fffff8029e636ca0
      
      STACK_TEXT: 
      fffff684`73428cb8 fffff802`9e647869 : 00000000`0000000a ffff9f88`6ec5d9f8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
      fffff684`73428cc0 fffff802`9e6444e5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000200 : nt!KiBugCheckDispatch+0x69
      fffff684`73428e00 fffff802`9e4da9e9 : ffff9f8c`6e774000 00000000`00000000 ffff9f8c`6e774000 00000000`00000001 : nt!KiPageFault+0x425
      fffff684`73428f90 fffff802`9e4da64e : ffff9f8c`6e7740c0 00000000`00000000 00000000`00000000 fffff684`73429178 : nt!MiIdentifyPfn+0x349
      fffff684`73429080 fffff802`9e9699da : 00000000`00000000 ffff9f8c`6e775320 fffff684`73429178 fffff684`42506650 : nt!MiIdentifyPfnWrapper+0x3e
      fffff684`734290b0 fffff802`9e9676b4 : 00000000`00000001 ffff8b88`6ac9f740 fffff684`73429294 ffff9f8c`6e774000 : nt!PfpPfnPrioRequest+0xda
      fffff684`73429130 fffff802`9e9657c8 : 00000000`00000000 ffff9f8c`7186da80 00000000`00000000 fffffff6`00000005 : nt!PfQuerySuperfetchInformation+0x2d4
      fffff684`73429260 fffff802`9e9654db : 00000000`00000018 000001c5`db9b7800 00000000`00000000 000001c5`db9d2000 : nt!ExpQuerySystemInformation+0x1d8
      fffff684`73429ac0 fffff802`9e647343 : 00000000`00020028 000001c4`da928150 000001c4`da9282e0 00000000`00000000 : nt!NtQuerySystemInformation+0x2b
      fffff684`73429b00 00007fff`c8dca574 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
      00000075`08a79db8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fff`c8dca574
      
      
      STACK_COMMAND:  kb
      
      FOLLOWUP_IP:
      nt!MiIdentifyPfn+349
      fffff802`9e4da9e9 4c8b38          mov     r15,qword ptr [rax]
      
      SYMBOL_STACK_INDEX:  3
      
      SYMBOL_NAME:  nt!MiIdentifyPfn+349
      
      FOLLOWUP_NAME:  MachineOwner
      
      MODULE_NAME: nt
      
      DEBUG_FLR_IMAGE_TIMESTAMP:  5b63c7b5
      
      IMAGE_NAME:  memory_corruption
      
      FAILURE_BUCKET_ID:  X64_AV_nt!MiIdentifyPfn+349
      
      BUCKET_ID:  X64_AV_nt!MiIdentifyPfn+349
      
      Followup: MachineOwner

      Comment

      • BlueTBM
        PCHF Member
        • Aug 2018
        • 13

        #4
        Originally posted by Malnutrition
        Sysnative Tool.
        1. Download the Sysnative BSOD Dump + System File Collection App - save to Documents folder -
        2. Run the app - Double-click on the downloaded EXE file
          Output = new folder created in Documents + a zipped version – SysnativeFileCollectionApp + SysnativeFileCollectionApp.zip
        3. Upload the SysnativeFileCollectionApp.zip file for review.

        Code:
        *******************************************************************************
        *                                                                             *
        *                        Bugcheck Analysis                                    *
        *                                                                             *
        *******************************************************************************
        
        IRQL_NOT_LESS_OR_EQUAL (a)
        An attempt was made to access a pageable (or completely invalid) address at an
        interrupt request level (IRQL) that is too high.  This is usually
        caused by drivers using improper addresses.
        If a kernel debugger is available get the stack backtrace.
        Arguments:
        Arg1: ffff9f886ec5d9f8, memory referenced
        Arg2: 0000000000000002, IRQL
        Arg3: 0000000000000000, bitfield :
            bit 0 : value 0 = read operation, 1 = write operation
            bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
        Arg4: fffff8029e4da9e9, address which referenced memory
        
        Debugging Details:
        ------------------
        
        TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
        
        READ_ADDRESS: unable to get nt!MmSpecialPoolStart
        unable to get nt!MmSpecialPoolEnd
        unable to get nt!MmPagedPoolEnd
        unable to get nt!MmNonPagedPoolStart
        unable to get nt!MmSizeOfNonPagedPoolInBytes
        ffff9f886ec5d9f8
        
        CURRENT_IRQL:  2
        
        FAULTING_IP:
        nt!MiIdentifyPfn+349
        fffff802`9e4da9e9 4c8b38          mov     r15,qword ptr [rax]
        
        DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
        
        BUGCHECK_STR:  AV
        
        PROCESS_NAME:  svchost.exe
        
        TRAP_FRAME:  fffff68473428e00 -- (.trap 0xfffff68473428e00)
        NOTE: The trap frame does not contain all registers.
        Some register values may be zeroed or incorrect.
        rax=ffff9f886ec5d9f8 rbx=0000000000000000 rcx=9f886ec5d9f80460
        rdx=0a00000000000160 rsi=0000000000000000 rdi=0000000000000000
        rip=fffff8029e4da9e9 rsp=fffff68473428f90 rbp=fffff68473429019
        r8=9f886ec5d9f80460  r9=000000000021c99d r10=022000000020778c
        r11=0000000071f40c46 r12=0000000000000000 r13=0000000000000000
        r14=0000000000000000 r15=0000000000000000
        iopl=0         nv up ei pl zr na po nc
        nt!MiIdentifyPfn+0x349:
        fffff802`9e4da9e9 4c8b38          mov     r15,qword ptr [rax] ds:ffff9f88`6ec5d9f8=????????????????
        Resetting default scope
        
        LAST_CONTROL_TRANSFER:  from fffff8029e647869 to fffff8029e636ca0
        
        STACK_TEXT: 
        fffff684`73428cb8 fffff802`9e647869 : 00000000`0000000a ffff9f88`6ec5d9f8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
        fffff684`73428cc0 fffff802`9e6444e5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000200 : nt!KiBugCheckDispatch+0x69
        fffff684`73428e00 fffff802`9e4da9e9 : ffff9f8c`6e774000 00000000`00000000 ffff9f8c`6e774000 00000000`00000001 : nt!KiPageFault+0x425
        fffff684`73428f90 fffff802`9e4da64e : ffff9f8c`6e7740c0 00000000`00000000 00000000`00000000 fffff684`73429178 : nt!MiIdentifyPfn+0x349
        fffff684`73429080 fffff802`9e9699da : 00000000`00000000 ffff9f8c`6e775320 fffff684`73429178 fffff684`42506650 : nt!MiIdentifyPfnWrapper+0x3e
        fffff684`734290b0 fffff802`9e9676b4 : 00000000`00000001 ffff8b88`6ac9f740 fffff684`73429294 ffff9f8c`6e774000 : nt!PfpPfnPrioRequest+0xda
        fffff684`73429130 fffff802`9e9657c8 : 00000000`00000000 ffff9f8c`7186da80 00000000`00000000 fffffff6`00000005 : nt!PfQuerySuperfetchInformation+0x2d4
        fffff684`73429260 fffff802`9e9654db : 00000000`00000018 000001c5`db9b7800 00000000`00000000 000001c5`db9d2000 : nt!ExpQuerySystemInformation+0x1d8
        fffff684`73429ac0 fffff802`9e647343 : 00000000`00020028 000001c4`da928150 000001c4`da9282e0 00000000`00000000 : nt!NtQuerySystemInformation+0x2b
        fffff684`73429b00 00007fff`c8dca574 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
        00000075`08a79db8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fff`c8dca574
        
        
        STACK_COMMAND:  kb
        
        FOLLOWUP_IP:
        nt!MiIdentifyPfn+349
        fffff802`9e4da9e9 4c8b38          mov     r15,qword ptr [rax]
        
        SYMBOL_STACK_INDEX:  3
        
        SYMBOL_NAME:  nt!MiIdentifyPfn+349
        
        FOLLOWUP_NAME:  MachineOwner
        
        MODULE_NAME: nt
        
        DEBUG_FLR_IMAGE_TIMESTAMP:  5b63c7b5
        
        IMAGE_NAME:  memory_corruption
        
        FAILURE_BUCKET_ID:  X64_AV_nt!MiIdentifyPfn+349
        
        BUCKET_ID:  X64_AV_nt!MiIdentifyPfn+349
        
        Followup: MachineOwner
        as a reply to do i have found an online way to read.dmp so i dont have to install a bsod reader now that thats out of the way i dont know how to solve an issue from a .dmp i dont know anything about code rly so what does any of this mean for my pc a bit confused rn on what the .dmp tells me thanks for showing me how to read dumps

        Comment

        • Malnutrition
          PCHF Moderator
          • Jul 2016
          • 7041

          #5
          Please run the program I linked you to, this will give me the information I need to help you.

          Comment

          • BlueTBM
            PCHF Member
            • Aug 2018
            • 13

            #6
            Originally posted by Malnutrition
            Please run the program I linked you to, this will give me the information I need to help you.
            ive just finished running the program now what

            Comment

            • Malnutrition
              PCHF Moderator
              • Jul 2016
              • 7041

              #7
              1. Run the app - Double-click on the downloaded EXE file
                Output = new folder created in Documents + a zipped version – SysnativeFileCollectionApp + SysnativeFileCollectionApp.zip
              2. Upload the SysnativeFileCollectionApp.zip file for review.

              Comment

              • BlueTBM
                PCHF Member
                • Aug 2018
                • 13

                #8
                Originally posted by Malnutrition
                Please run the program I linked you to, this will give me the information I need to help you.
                β€œβ€

                Comment

                • BlueTBM
                  PCHF Member
                  • Aug 2018
                  • 13

                  #9
                  Originally posted by Malnutrition
                  1. Run the app - Double-click on the downloaded EXE file
                    Output = new folder created in Documents + a zipped version – SysnativeFileCollectionApp + SysnativeFileCollectionApp.zip
                  2. Upload the SysnativeFileCollectionApp.zip file for review.
                  hows it going?

                  Comment

                  • Malnutrition
                    PCHF Moderator
                    • Jul 2016
                    • 7041

                    #10
                    Originally posted by BlueTBM
                    hows it going?
                    I don’t just sit here all day and reply to threads… I’ll have a look in a few minutes. You can expect a reply in bit.

                    Comment

                    • Malnutrition
                      PCHF Moderator
                      • Jul 2016
                      • 7041

                      #11
                      Can you please provide the other requested information so I can have a look at your temprature and couple other items the other scan does not cover.

                      Speccy Scan.

                      [ul]
                      [li]Please go here and download Speccy.[/li][li]Install and run the program.[/li][li]Upon Completion:[/li][li]Hit File[/li][li]Publish Snap Shot[/li][li]A link will appear, post that link.[/li][/ul]

                      Comment

                      • BlueTBM
                        PCHF Member
                        • Aug 2018
                        • 13

                        #12
                        Originally posted by Malnutrition
                        Can you please provide the other requested information so I can have a look at your temprature and couple other items the other scan does not cover.

                        Speccy Scan.

                        [ul]
                        [li]Please go here and download Speccy.[/li][li]Install and run the program.[/li][li]Upon Completion:[/li][li]Hit File[/li][li]Publish Snap Shot[/li][li]A link will appear, post that link.[/li][/ul]
                        http://speccy.piriform.com/results/Y...wKXaecuKREhSvL heres the stuff from speccy

                        Comment

                        • Malnutrition
                          PCHF Moderator
                          • Jul 2016
                          • 7041

                          #13
                          While I am looking over the information I’d advise you tidy up the machine a bit.

                          MiniToolBox Scan

                          Please download MINITOOLBOX and run it.

                          Checkmark following boxes:

                          Flush DNS
                          Reset FF proxy Settings
                          Reset Ie Proxy Settings
                          Report IE Proxy Settings
                          Report FF Proxy Settings
                          List content of Hosts
                          List IP configuration
                          List Winsock Entries
                          List last 10 Event Viewer log
                          List Installed Programs
                          List Users, Partitions and Memory size
                          List Devices (problems only)

                          Click Go post the result.

                          Clean up temp files and reduce startup load with CCleaner.

                          Note: This tool will clean your browsing history as well.

                          [ul]
                          [li]Download CCleaner from here.[/li][li]After install Click Options.[/li][li]Go to monitoring.[/li][li]Uncheck All Monitoring items.[/li][li]Go to advanced – Click close program after cleaning.[/li][li]Go to settings – click run ccleaner when the computer starts.[/li][li]Now that you have ccleaner installed and set-up:[/li][li]Open the program.[/li][li]Go to Tools[/li][li]Go to Startup[/li][li]Now double click each item. To Disable.[/li][li]Leave only your antivirus enabled.[/li][li]Then disable All items in your scheduled task as well.[/li][li]Unless they are related to windows defender.Or your antivirus.[/li][li]Reboot the machine.[/li][/ul]

                          Adware Cleaner Scan.

                          Please download AdwCleaner by Xplode onto your desktop.

                          [ul]
                          [li]Close all open programs and internet browsers.[/li][li]Double click on adwcleaner.exe to run the tool.[/li][li]Click on Scan button.[/li][li]When the scan has finished click on Clean button.[/li][li]Your computer will be rebooted automatically. A text file will open after the restart.[/li][li]Please post the contents of that logfile with your next reply.[/li][li]You can find the logfile at C:\AdwCleaner[S1].txt as well.[/li][/ul]

                          Comment

                          • Malnutrition
                            PCHF Moderator
                            • Jul 2016
                            • 7041

                            #14
                            Use display Driver Uninstaller and thenafter a reboot update your Graphics card drivers.

                            Open your device manager and make certain that the default Graphics is disabled.

                            HP P201 (1600x900@60Hz)

                            Comment

                            • BlueTBM
                              PCHF Member
                              • Aug 2018
                              • 13

                              #15
                              Originally posted by Malnutrition
                              Use display Driver Uninstaller and thenafter a reboot update your Graphics card drivers.

                              Open your device manager and make certain that the default Graphics is disabled.

                              HP P201 (1600x900@60Hz)
                              so doing so will resolve my bsod’s?

                              Comment

                              Working...