IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffffffa8009c4, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003301e14, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003500100
fffffffffa8009c4
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiResolveTransitionFault+124
fffff800`03301e14 488b00 mov rax,qword ptr [rax]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: MsMpEng.exe
TRAP_FRAME: fffff88005a5f5c0 -- (.trap 0xfffff88005a5f5c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffffffa8009c4 rbx=0000000000000000 rcx=0000000000000004
rdx=0000000fffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003301e14 rsp=fffff88005a5f750 rbp=fffff8a00a3f2010
r8=ffffffffffffffff r9=00000001ab86b880 r10=0000000000000000
r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!MiResolveTransitionFault+0x124:
fffff800`03301e14 488b00 mov rax,qword ptr [rax] ds:0fff:ffffffff`fa8009c4=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032d02a9 to fffff800032d0d00
STACK_TEXT:
fffff880`05a5f478 fffff800`032d02a9 : 00000000`0000000a ffffffff`fa8009c4 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`05a5f480 fffff800`032cef20 : 00000000`00000000 fffff800`00000002 fffff880`08000000 00000001`ab86b880 : nt!KiBugCheckDispatch+0x69
fffff880`05a5f5c0 fffff800`03301e14 : 00000000`00000000 fffffa80`0a6410b0 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`05a5f750 fffff800`032ef6f5 : 00000000`00000000 00000001`ab86b880 fffffa80`0a874440 fffffa80`0996dec8 : nt!MiResolveTransitionFault+0x124
fffff880`05a5f7e0 fffff800`032ee0b3 : 00000000`0011f3a1 00000000`00830150 fffff680`00004180 fffffa80`0996dec8 : nt!MiResolveProtoPteFault+0x325
fffff880`05a5f870 fffff800`032ddf69 : 00000000`00000000 00000000`00830150 00000000`02f5e368 fffff800`00000000 : nt!MiDispatchFault+0x1c3
fffff880`05a5f980 fffff800`032cee2e : 00000000`00000000 00000000`00830150 00000000`00000001 00000000`744d2828 : nt!MmAccessFault+0x359
fffff880`05a5fae0 000007fe`fd67117a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`02f5e2d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fd67117a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiResolveTransitionFault+124
fffff800`03301e14 488b00 mov rax,qword ptr [rax]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiResolveTransitionFault+124
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fdd5b
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiResolveTransitionFault+124
BUCKET_ID: X64_0xA_nt!MiResolveTransitionFault+124