0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffffc, memory referenced
Arg2: 0000001b, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 834bae34, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 83546868
Unable to read MiSystemVaType memory at 83526420
fffffffc
CURRENT_IRQL: 1b
FAULTING_IP:
nt!KiInsertTimerTable+7e
834bae34 3b51fc cmp edx,dword ptr [ecx-4]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: csrss.exe
TRAP_FRAME: 942e5be4 -- (.trap 0xffffffff942e5be4)
ErrCode = 00000000
eax=8cd5fa30 ebx=00000000 ecx=00000000 edx=0000022c esi=896c7a10 edi=841186f0
eip=834bae34 esp=942e5c58 ebp=942e5c78 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
nt!KiInsertTimerTable+0x7e:
834bae34 3b51fc cmp edx,dword ptr [ecx-4] ds:0023:fffffffc=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 834bae34 to 8345cfd9
STACK_TEXT:
942e5be4 834bae34 badb0d00 0000022c 837d6493 nt!KiTrap0E+0x2e1
942e5c78 834bad87 88f8da08 00000034 a08b3310 nt!KiInsertTimerTable+0x7e
942e5ca4 834babdc 88f8da08 ffff8ad0 ffffffff nt!KeSetTimerEx+0x1a0
942e5cc4 a07993fa 88f8da08 ffff8ad0 ffffffff nt!KeSetTimer+0x1b
942e5cf8 a06dad5b 00000004 0254fe04 a0796cab win32k!TimersProc+0x17f
942e5d34 a06db25b 00000004 00000002 8e923450 win32k!RawInputThread+0x615
942e5d48 a0796cc6 00000004 0254fe04 942e5d64 win32k!xxxCreateSystemThreads+0x4a
942e5d58 83459c7a 00000004 0254fe44 76ff5e74 win32k!NtUserCallNoParam+0x1b
942e5d58 76ff5e74 00000004 0254fe44 76ff5e74 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0254fe44 00000000 00000000 00000000 00000000 0x76ff5e74
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!TimersProc+17f
a07993fa 5f pop edi
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: win32k!TimersProc+17f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a856629
FAILURE_BUCKET_ID: 0xA_win32k!TimersProc+17f
BUCKET_ID: 0xA_win32k!TimersProc+17f
Followup: MachineOwner