IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000009, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032f9d52, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000350d100
0000000000000009
CURRENT_IRQL: 2
FAULTING_IP:
nt!KeReleaseSemaphore+a2
fffff800`032f9d52 48894108 mov qword ptr [rcx+8],rax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: firefox.exe
TRAP_FRAME: fffff8800a70b860 -- (.trap 0xfffff8800a70b860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa80091b8738 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032f9d52 rsp=fffff8800a70b9f0 rbp=0000000000000001
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=00000000001f0003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KeReleaseSemaphore+0xa2:
fffff800`032f9d52 48894108 mov qword ptr [rcx+8],rax ds:35e0:00000000`00000009=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032dd2a9 to fffff800032ddd00
STACK_TEXT:
fffff880`0a70b718 fffff800`032dd2a9 : 00000000`0000000a 00000000`00000009 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0a70b720 fffff800`032dbf20 : 00000000`00000000 00000000`00000013 fffff8a0`01a1740c fffffa80`091b8730 : nt!KiBugCheckDispatch+0x69
fffff880`0a70b860 fffff800`032f9d52 : fffff880`0a70b990 00000000`00000000 00000000`00000000 fffff8a0`08f529e0 : nt!KiPageFault+0x260
fffff880`0a70b9f0 fffff800`0359336e : fffffa80`00000000 00000000`00000001 fffffa80`0677d630 00000000`0037d600 : nt!KeReleaseSemaphore+0xa2
fffff880`0a70ba70 fffff800`032dcf93 : fffffa80`06f38660 00000000`00000000 00000000`00000000 00000000`18ed3701 : nt!NtReleaseSemaphore+0x9e
fffff880`0a70bae0 00000000`75072e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0010e7d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75072e09
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KeReleaseSemaphore+a2
fffff800`032f9d52 48894108 mov qword ptr [rcx+8],rax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KeReleaseSemaphore+a2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fdd5b
FAILURE_BUCKET_ID: X64_0xA_nt!KeReleaseSemaphore+a2
BUCKET_ID: X64_0xA_nt!KeReleaseSemaphore+a2
Followup: MachineOwner
---------