DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffffffffffff8b, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88004a3a127, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb90e0
ffffffffffffff8b
CURRENT_IRQL: 2
FAULTING_IP:
Rt64win7+16127
fffff880`04a3a127 30498b xor byte ptr [rcx-75h],cl
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9c320 -- (.trap 0xfffff80000b9c320)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff80002dfef08 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004a3a127 rsp=fffff80000b9c4b0 rbp=0000000000000001
r8=fffffa8008caa3e0 r9=0000000000000064 r10=fffff80002c11000
r11=fffff80000b9c500 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
Rt64win7+0x16127:
fffff880`04a3a127 30498b xor byte ptr [rcx-75h],cl ds:ffffffff`ffffff8b=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c80c69 to fffff80002c81700
STACK_TEXT:
fffff800`00b9c1d8 fffff800`02c80c69 : 00000000`0000000a ffffffff`ffffff8b 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9c1e0 fffff800`02c7f8e0 : fffffa80`086c5560 fffff800`02dfbe80 00000000`00000000 fffffa80`089a14d0 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c320 fffff880`04a3a127 : fffffa80`086801a0 ffffffff`ffa47280 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x260
fffff800`00b9c4b0 fffffa80`086801a0 : ffffffff`ffa47280 00000000`00000001 00000000`00000000 00000000`00000008 : Rt64win7+0x16127
fffff800`00b9c4b8 ffffffff`ffa47280 : 00000000`00000001 00000000`00000000 00000000`00000008 fffffa80`0779e728 : 0xfffffa80`086801a0
fffff800`00b9c4c0 00000000`00000001 : 00000000`00000000 00000000`00000008 fffffa80`0779e728 00000002`00000000 : 0xffffffff`ffa47280
fffff800`00b9c4c8 00000000`00000000 : 00000000`00000008 fffffa80`0779e728 00000002`00000000 fffff800`02e09c00 : 0x1
STACK_COMMAND: kb
FOLLOWUP_IP:
Rt64win7+16127
fffff880`04a3a127 30498b xor byte ptr [rcx-75h],cl
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: Rt64win7+16127
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Rt64win7
IMAGE_NAME: Rt64win7.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 49a65b0d
FAILURE_BUCKET_ID: X64_0xD1_Rt64win7+16127
BUCKET_ID: X64_0xD1_Rt64win7+16127
Followup: MachineOwner
---------