kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0080000c, memory referenced Arg2: 00000002, IRQL Arg3: 00000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 804dc406, address which referenced memory Debugging Details: ------------------ PEB is paged out (Peb.Ldr = 7ffdf00c). Type ".hh dbgerr001" for details PEB is paged out (Peb.Ldr = 7ffdf00c). Type ".hh dbgerr001" for details READ_ADDRESS: 0080000c CURRENT_IRQL: 2 FAULTING_IP: nt!KiTimerListExpire+ab 804dc406 8b470c mov eax,dword ptr [edi+0Ch] DEFAULT_BUCKET_ID: DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: nvoy.exe TRAP_FRAME: f78a6e2c -- (.trap 0xfffffffff78a6e2c) ErrCode = 00000000 eax=00000000 ebx=f78a6eb0 ecx=f78a6e88 edx=89597120 esi=895971b0 edi=00800000 eip=804dc406 esp=f78a6ea0 ebp=f78a6fa4 iopl=0 nv up ei pl nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206 nt!KiTimerListExpire+0xab: 804dc406 8b470c mov eax,dword ptr [edi+0Ch] ds:0023:0080000c=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 804dc406 to 804e187f STACK_TEXT: f78a6e2c 804dc406 badb0d00 89597120 f78a6e50 nt!KiTrap0E+0x233 f78a6fa4 804dc378 fced5d49 00000013 ffdff000 nt!KiTimerListExpire+0xab f78a6fd0 804dbbd4 80559480 00000000 00086231 nt!KiTimerExpiration+0xaf f78a6ff4 804db89e b6dafd44 00000000 00000000 nt!KiRetireDpcList+0x46 f78a6ff8 b6dafd44 00000000 00000000 00000000 nt!KiDispatchInterrupt+0x2a WARNING: Frame IP not in any known module. Following frames may be wrong. 804db89e 00000000 00000009 bb835675 00000128 0xb6dafd44 STACK_COMMAND: kb FOLLOWUP_IP: nt!KiTimerListExpire+ab 804dc406 8b470c mov eax,dword ptr [edi+0Ch] SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!KiTimerListExpire+ab FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntoskrnl.exe DEBUG_FLR_IMAGE_TIMESTAMP: 45e54711 FAILURE_BUCKET_ID: 0xA_VRF_nt!KiTimerListExpire+ab BUCKET_ID: 0xA_VRF_nt!KiTimerListExpire+ab Followup: MachineOwner kd> !thread THREAD 8a261bb8 Cid 0574.05a8 Teb: 7ffdb000 Win32Thread: 00000000 RUNNING on processor 0 Not impersonating DeviceMap e1004490 Owning Process 8a1c4400 Image: nvoy.exe Wait Start TickCount 549425 Ticks: 0 Context Switch Count 287143 UserTime 00:00:10.656 KernelTime 00:00:00.390 Win32 Start Address 0x60684ac0 Start Address 0x7c810659 Stack Init b6db0000 Current b6dafca0 Base b6db0000 Limit b6dad000 Call 0 Priority 9 BasePriority 8 PriorityDecrement 0 DecrementCount 0 ChildEBP RetAddr Args to Child f78a6e2c 804dc406 badb0d00 89597120 f78a6e50 nt!KiTrap0E+0x233 (FPO: [0,0] TrapFrame @ f78a6e2c) f78a6fa4 804dc378 fced5d49 00000013 ffdff000 nt!KiTimerListExpire+0xab (FPO: [Non-Fpo]) f78a6fd0 804dbbd4 80559480 00000000 00086231 nt!KiTimerExpiration+0xaf (FPO: [Non-Fpo]) f78a6ff4 804db89e b6dafd44 00000000 00000000 nt!KiRetireDpcList+0x46 (FPO: [0,0,0]) f78a6ff8 b6dafd44 00000000 00000000 00000000 nt!KiDispatchInterrupt+0x2a (FPO: [Uses EBP] [0,0,1]) WARNING: Frame IP not in any known module. Following frames may be wrong. 804db89e 00000000 00000009 bb835675 00000128 0xb6dafd44