0: kd> !analyze -v
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa98095efa8b, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800030e5137, address which referenced memory
Debugging Details:
------------------
Page 2b8280 not present in the dump file. Type ".hh dbgerr004" for details
READ_ADDRESS: fffffa98095efa8b
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiUnlinkPageFromLockedList+167
fffff800`030e5137 410fb6511b movzx edx,byte ptr [r9+1Bh]
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: DTLite.exe
TRAP_FRAME: fffff8800c239d90 -- (.trap 0xfffff8800c239d90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000008031fa8d rbx=0000000000000000 rcx=ffffffffffffffff
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030e5137 rsp=fffff8800c239f20 rbp=fffff80003309d28
r8=0000000000000000 r9=fffffa98095efa70 r10=fffffa800cc763f8
r11=fffff8800c239fa8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!MiUnlinkPageFromLockedList+0x167:
fffff800`030e5137 410fb6511b movzx edx,byte ptr [r9+1Bh] ds:fffffa98`095efa8b=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030d31e9 to fffff800030d3c40
STACK_TEXT:
fffff880`0c239c48 fffff800`030d31e9 : 00000000`0000000a fffffa98`095efa8b 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0c239c50 fffff800`030d1e60 : fffffa80`095edcd0 fffff880`0c239e10 2aaaaaaa`aaaaaaab fffffa80`095efa10 : nt!KiBugCheckDispatch+0x69
fffff880`0c239d90 fffff800`030e5137 : 00000000`00000000 fffffa80`09c015b0 fffff8a0`1ef43000 fffff880`0c23a0a8 : nt!KiPageFault+0x260
fffff880`0c239f20 fffff800`030a1bad : 00000000`002514bd 00000580`00000000 fffffa80`00000001 00000000`002514bd : nt!MiUnlinkPageFromLockedList+0x167
fffff880`0c239fb0 fffff800`030a2532 : 00000000`00000000 fffff8a0`17162e00 00000000`00000000 00000072`00000000 : nt!MmPurgeSection+0x4bd
fffff880`0c23a0a0 fffff880`0c1a4619 : fffffa80`1088f018 00000000`00000000 fffff880`00000000 fffff8a0`00000000 : nt!CcPurgeCacheSection+0x172
fffff880`0c23a110 fffff880`0c1a3dff : 00000000`00000000 fffff8a0`17b2b120 00000000`00000001 00000000`00000000 : cdfs!CdPurgeVolume+0x111
fffff880`0c23a170 fffff880`0c19ec03 : 00000000`00000000 00000000`00000000 fffffa80`0ede1a90 fffffa80`0f04d270 : cdfs!CdVerifyVolume+0x50f
fffff880`0c23a2c0 fffff880`0c195481 : fffffa80`0ede1a90 fffffa80`0f04d270 fffff880`0c23a3a0 fffffa80`0f29b2ee : cdfs!CdCommonFsControl+0x37
fffff880`0c23a2f0 fffff880`01364bcf : fffffa80`0f04d4a8 fffffa80`0f04d270 fffff880`0c23a401 fffffa80`0dafb4d0 : cdfs!CdFsdDispatch+0x381
fffff880`0c23a360 fffff880`0138495e : fffffa80`0fd065d0 fffffa80`0f04d270 fffffa80`0fd06500 fffffa80`0f04d270 : fltmgr!FltpLegacyProcessingAfterPreCallbacksComple ted+0x24f
fffff880`0c23a3f0 fffff800`034c30f6 : fffffa80`0c2a19c0 fffffa80`0dfad510 fffffa80`0f04d270 fffffa80`0fd065d0 : fltmgr!FltpFsControl+0xee
fffff880`0c23a450 fffff880`0c19616c : fffffa80`0efcd660 fffffa80`0c2a19c0 00000000`00000000 fffffa80`0dfad510 : nt!IoVerifyVolume+0x106
fffff880`0c23a4e0 fffff880`0c195f9d : fffffa80`0f200a00 fffffa80`0eb75c60 fffffa80`0c2a19c0 fffffa80`0eb75c60 : cdfs!CdPerformVerify+0x94
fffff880`0c23a540 fffff880`0c1954a1 : fffffa80`0f200a00 fffffa80`0eb75c60 fffffa80`80000016 fffffa80`0f200a00 : cdfs!CdProcessException+0x1ad
fffff880`0c23a580 fffff880`01364bcf : fffffa80`0eb75e98 fffffa80`0eb75c60 00000000`00000001 fffffa80`0f32b9f0 : cdfs!CdFsdDispatch+0x3a1
fffff880`0c23a5f0 fffff880`013842b9 : fffffa80`0eb75c60 fffffa80`0e739010 fffffa80`0eb75c00 fffffa80`0fd065d0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksComple ted+0x24f
fffff880`0c23a680 fffff800`033d1f95 : 00000000`00000025 fffffa80`09f4b3f8 fffffa80`0dfbab10 00000000`00000000 : fltmgr!FltpCreate+0x2a9
fffff880`0c23a730 fffff800`033ce838 : fffffa80`0c2a19c0 00000000`00000000 fffffa80`09f4b240 fffff800`00000001 : nt!IopParseDevice+0x5a5
fffff880`0c23a8c0 fffff800`033cfa56 : 00000000`00000000 fffffa80`09f4b240 00000000`00000000 fffffa80`09de22a0 : nt!ObpLookupObjectName+0x588
fffff880`0c23a9b0 fffff800`033d135c : fffff880`0c23aa80 00000000`00000000 00000000`66626301 00000000`00000001 : nt!ObOpenObjectByName+0x306
fffff880`0c23aa80 fffff800`033dbf78 : 00000000`0299e7d8 fffff8a0`80100080 00000000`0299f0a0 00000000`0299e7f0 : nt!IopCreateFile+0x2bc
fffff880`0c23ab20 fffff800`030d2ed3 : ffffffff`ffffffff 00000000`00000001 00000000`0299f0a0 fffff800`00000024 : nt!NtCreateFile+0x78
fffff880`0c23abb0 00000000`76e8186a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0299e768 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76e8186a
STACK_COMMAND: kb
FOLLOWUP_IP:
cdfs!CdPurgeVolume+111
fffff880`0c1a4619 84c0 test al,al
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: cdfs!CdPurgeVolume+111
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: cdfs
IMAGE_NAME: cdfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc112
FAILURE_BUCKET_ID: X64_0xA_cdfs!CdPurgeVolume+111
BUCKET_ID: X64_0xA_cdfs!CdPurgeVolume+111
Followup: MachineOwner