STOP 0x0000000A: IRQL_NOT_LESS_OR_EQUAL (go to top of page)
Usual causes: Kernel mode driver, System Service, BIOS, Windows, Virus scanner, Backup tool, compatibility
Run this
Driver Verifier - Enable and Disable
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff800032e3194}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032e3194, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800034fd100
GetUlongFromAddress: unable to read from fffff800034fd1c0
0000000000000000 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+c64
fffff800`032e3194 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: csrss.exe
IRP_ADDRESS: ffffffffffffff88
TRAP_FRAME: fffff880043b85a0 -- (.trap 0xfffff880043b85a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880043b7818 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032e3194 rsp=fffff880043b8730 rbp=0000000000000000
r8=0000000000004740 r9=0000000000000080 r10=0000000000000002
r11=00000000000001c8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!IopCompleteRequest+0xc64:
fffff800`032e3194 488b09 mov rcx,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032cd769 to fffff800032ce1c0
STACK_TEXT:
fffff880`043b8458 fffff800`032cd769 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`043b8460 fffff800`032cc3e0 : 00000000`00000100 fffff880`043b8858 fffffa80`091a0d58 fffffa80`07da5860 : nt!KiBugCheckDispatch+0x69
fffff880`043b85a0 fffff800`032e3194 : 00000000`00000001 00000000`00000000 fffff880`20206f49 fffff880`043b8a18 : nt!KiPageFault+0x260
fffff880`043b8730 fffff800`032c0c17 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff8a0`00000000 : nt!IopCompleteRequest+0xc64
fffff880`043b8800 fffff800`03277a95 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1c7
fffff880`043b8880 fffff800`0351996a : fffffa80`091bc480 fffffa80`0919e060 fffff880`043b8a10 fffff880`043b8a08 : nt!KiCheckForKernelApcDelivery+0x25
fffff880`043b88b0 fffff800`035e342e : fffffa80`00000004 fffffa80`0919e060 fffff880`043b8a10 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x2a53a
fffff880`043b89a0 fffff800`032cd453 : 00000000`00000030 fffffa80`08a50060 00000000`0025f498 00000000`0025f701 : nt!NtMapViewOfSection+0x2bd
fffff880`043b8a70 00000000`7786159a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0025f478 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7786159a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`032cc3e0 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4f76721c
FAILURE_BUCKET_ID: X64_0xA_nt!KiPageFault+260
BUCKET_ID: X64_0xA_nt!KiPageFault+260
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032e3194, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 0000000000000000 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+c64
fffff800`032e3194 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: csrss.exe
IRP_ADDRESS: ffffffffffffff88
TRAP_FRAME: fffff880043b85a0 -- (.trap 0xfffff880043b85a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880043b7818 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032e3194 rsp=fffff880043b8730 rbp=0000000000000000
r8=0000000000004740 r9=0000000000000080 r10=0000000000000002
r11=00000000000001c8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!IopCompleteRequest+0xc64:
fffff800`032e3194 488b09 mov rcx,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032cd769 to fffff800032ce1c0
STACK_TEXT:
fffff880`043b8458 fffff800`032cd769 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`043b8460 fffff800`032cc3e0 : 00000000`00000100 fffff880`043b8858 fffffa80`091a0d58 fffffa80`07da5860 : nt!KiBugCheckDispatch+0x69
fffff880`043b85a0 fffff800`032e3194 : 00000000`00000001 00000000`00000000 fffff880`20206f49 fffff880`043b8a18 : nt!KiPageFault+0x260
fffff880`043b8730 fffff800`032c0c17 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff8a0`00000000 : nt!IopCompleteRequest+0xc64
fffff880`043b8800 fffff800`03277a95 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1c7
fffff880`043b8880 fffff800`0351996a : fffffa80`091bc480 fffffa80`0919e060 fffff880`043b8a10 fffff880`043b8a08 : nt!KiCheckForKernelApcDelivery+0x25
fffff880`043b88b0 fffff800`035e342e : fffffa80`00000004 fffffa80`0919e060 fffff880`043b8a10 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x2a53a
fffff880`043b89a0 fffff800`032cd453 : 00000000`00000030 fffffa80`08a50060 00000000`0025f498 00000000`0025f701 : nt!NtMapViewOfSection+0x2bd
fffff880`043b8a70 00000000`7786159a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0025f478 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7786159a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`032cc3e0 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4f76721c
FAILURE_BUCKET_ID: X64_0xA_nt!KiPageFault+260
BUCKET_ID: X64_0xA_nt!KiPageFault+260
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032e3194, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 0000000000000000 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+c64
fffff800`032e3194 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: csrss.exe
IRP_ADDRESS: ffffffffffffff88
TRAP_FRAME: fffff880043b85a0 -- (.trap 0xfffff880043b85a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880043b7818 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032e3194 rsp=fffff880043b8730 rbp=0000000000000000
r8=0000000000004740 r9=0000000000000080 r10=0000000000000002
r11=00000000000001c8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!IopCompleteRequest+0xc64:
fffff800`032e3194 488b09 mov rcx,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032cd769 to fffff800032ce1c0
STACK_TEXT:
fffff880`043b8458 fffff800`032cd769 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`043b8460 fffff800`032cc3e0 : 00000000`00000100 fffff880`043b8858 fffffa80`091a0d58 fffffa80`07da5860 : nt!KiBugCheckDispatch+0x69
fffff880`043b85a0 fffff800`032e3194 : 00000000`00000001 00000000`00000000 fffff880`20206f49 fffff880`043b8a18 : nt!KiPageFault+0x260
fffff880`043b8730 fffff800`032c0c17 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff8a0`00000000 : nt!IopCompleteRequest+0xc64
fffff880`043b8800 fffff800`03277a95 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1c7
fffff880`043b8880 fffff800`0351996a : fffffa80`091bc480 fffffa80`0919e060 fffff880`043b8a10 fffff880`043b8a08 : nt!KiCheckForKernelApcDelivery+0x25
fffff880`043b88b0 fffff800`035e342e : fffffa80`00000004 fffffa80`0919e060 fffff880`043b8a10 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x2a53a
fffff880`043b89a0 fffff800`032cd453 : 00000000`00000030 fffffa80`08a50060 00000000`0025f498 00000000`0025f701 : nt!NtMapViewOfSection+0x2bd
fffff880`043b8a70 00000000`7786159a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0025f478 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7786159a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`032cc3e0 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4f76721c
FAILURE_BUCKET_ID: X64_0xA_nt!KiPageFault+260
BUCKET_ID: X64_0xA_nt!KiPageFault+260
Followup: MachineOwner
---------