IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000003b48ffff, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff806460c354e, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3281
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 4640
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 3b48ffff
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff806460c354e
WRITE_ADDRESS: fffff80646afa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80646a0f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff80646a0f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000003b48ffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: ACOrigins.exe
TRAP_FRAME: fffff30d13e04770 -- (.trap 0xfffff30d13e04770)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000e9f4f000 rbx=0000000000000000 rcx=ffffa7d3c0000000
rdx=ffffa7d3c0001db8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806460c354e rsp=fffff30d13e04900 rbp=0000000076eb0000
r8=0000000000000010 r9=0000000000000000 r10=ffffa7ffffffffff
r11=fffff30d13e04a38 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!MiRemoveWsle+0x12e:
fffff806`460c354e d3a7ffff483b shl dword ptr [rdi+3B48FFFFh],cl ds:00000000`3b48ffff=????????
Resetting default scope
MISALIGNED_IP:
nt!MiRemoveWsle+12e
fffff806`460c354e d3a7ffff483b shl dword ptr [rdi+3B48FFFFh],cl
STACK_TEXT:
fffff30d`13e04628 fffff806`461ef929 : 00000000`0000000a 00000000`3b48ffff 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff30d`13e04630 fffff806`461ebc29 : 00000000`00000000 ffffd700`23ac0180 00000000`00000002 ffffd700`23ac3088 : nt!KiBugCheckDispatch+0x69
fffff30d`13e04770 fffff806`460c354e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
fffff30d`13e04900 fffff806`460c19a3 : ffffa80f`1fbfb9c0 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MiRemoveWsle+0x12e
fffff30d`13e04990 fffff806`460baead : fffff30d`13e04c40 fffff30d`13e05730 00000000`00000200 ffffa80f`1fbfb9c0 : nt!MiTerminateWsleCluster+0x2c3
fffff30d`13e04b40 fffff806`46466a7b : fffff30d`13e057dc ffffa780`003d4188 fffff30d`13e05700 00000000`00000000 : nt!MiDecommitPages+0x72d
fffff30d`13e056f0 fffff806`46465f26 : fffff30d`13e05a60 00000000`00000000 ffffffff`ffffffff 00000000`00004000 : nt!MiDecommitRegion+0xbb
fffff30d`13e05960 fffff806`46465c05 : ffffa80f`00000000 ffffa80f`1ff726e0 00000000`00000730 fffff806`463fb3ba : nt!MmFreeVirtualMemory+0x2e6
fffff30d`13e05aa0 fffff806`461ef378 : ffffa80f`1cb48080 ffffa80f`12ba1080 00000000`00000000 00000000`00000000 : nt!NtFreeVirtualMemory+0x95
fffff30d`13e05b00 00007ffc`dc68b154 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0748fc98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`dc68b154
SYMBOL_NAME: nt!MiRemoveWsle+12e
IMAGE_VERSION: 10.0.19041.329
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: hardware
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}
Followup: MachineOwner
---------
1: kd> !sysinfo machineid
Machine ID Information [From Smbios 2.8, DMIVersion 0, Size=2753]
BiosMajorRelease = 5
BiosMinorRelease = 13
BiosVendor = American Megatrends Inc.
BiosVersion = 5406
BiosReleaseDate = 11/13/2019
SystemManufacturer = System manufacturer
SystemProductName = System Product Name
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version
SystemSKU = SKU
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = PRIME X470-PRO
BaseBoardVersion = Rev X.0x
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff802702c7290, The address that the exception occurred at
Arg3: ffffb08821186c28, Exception Record Address
Arg4: ffffb08821186460, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5249
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 40434
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc000001d
BUGCHECK_P2: fffff802702c7290
BUGCHECK_P3: ffffb08821186c28
BUGCHECK_P4: ffffb08821186460
EXCEPTION_RECORD: ffffb08821186c28 -- (.exr 0xffffb08821186c28)
ExceptionAddress: fffff802702c7290 (dxgmms2!McTemplateK0pptpqxqqppqqxxpqx_EtwWriteTransfer+0x000000000000018c)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0
CONTEXT: ffffb08821186460 -- (.cxr 0xffffb08821186460)
rax=ffffb08821186ea0 rbx=0000000000000008 rcx=fffff802702f1000
rdx=fffff802702e48e0 rsi=0000000000000000 rdi=ffff9e8f0a28b000
rip=fffff802702c7290 rsp=ffffb08821186e60 rbp=0000000000000848
r8=0000000000000000 r9=0000000000000012 r10=0000000000000002
r11=0000000000000002 r12=00000001000304b9 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
dxgmms2!McTemplateK0pptpqxqqppqqxxpqx_EtwWriteTransfer+0x18c:
fffff802`702c7290 ff ???
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc000001d - { ZEL DURUM} Ge ersiz Y nerge Ge ersiz bir y nerge y r t lmeye al ld .
EXCEPTION_CODE_STR: c000001d
MISALIGNED_IP:
dxgmms2!McTemplateK0pptpqxqqppqqxxpqx_EtwWriteTransfer+18c
fffff802`702c7290 ff ???
EXCEPTION_STR: 0xc000001d
FAILED_INSTRUCTION_ADDRESS:
dxgmms2!McTemplateK0pptpqxqqppqqxxpqx_EtwWriteTransfer+18c
fffff802`702c7290 ff ???
STACK_TEXT:
ffffb088`21186e60 fffff802`7033d9a2 : ffff9e8f`02231000 00000000`00000000 ffffb088`21187490 ffff9e8f`0a161000 : dxgmms2!McTemplateK0pptpqxqqppqqxxpqx_EtwWriteTransfer+0x18c
ffffb088`21186fd0 fffff802`7030fe61 : 00000000`00000000 00000000`00000000 ffffb188`54d9e700 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::UpdatePageTable+0x2d622
ffffb088`21187260 fffff802`7030f5bf : 00000000`00000000 00000000`00000000 ffffb088`21187690 ffffb088`00000002 : dxgmms2!VIDMM_PAGE_TABLE::UncommitVirtualAddressRange+0x1f1
ffffb088`21187340 fffff802`7033c5fa : 00000000`00000000 ffffb188`55c21e50 00000000`00000001 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x66f
ffffb088`211874b0 fffff802`7030eedc : ffff9e8f`0a1656e8 ffffb188`55c21e50 ffffb088`21187700 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x2d6aa
ffffb088`21187620 fffff802`703113c1 : 00000000`00000002 ffffb088`21187780 00000000`00000000 ffffb188`53d510c0 : dxgmms2!CVirtualAddressAllocator::UncommitVirtualAddressRange+0xf4
ffffb088`21187730 fffff802`703053d9 : 00000000`00000003 00000000`00000071 ffffb088`211878c0 ffff9e8f`0a28b000 : dxgmms2!VIDMM_GLOBAL::CommitVirtualAddressRangeSystemCommand+0xb1
ffffb088`211877c0 fffff802`70329fce : 00000000`00000001 00000000`00989680 ffffb188`4260c240 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0x709
ffffb088`21187a00 fffff802`70333e99 : ffffb188`4260c170 ffff9e8f`09c28001 00000000`00000000 00000000`07270800 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xe5e
ffffb088`21187be0 fffff802`690a2ae5 : ffff9e8f`09c28080 fffff802`70333e90 ffffb188`4260c170 000f8067`b4bbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffffb088`21187c10 fffff802`691fbbf8 : ffffc400`e2f40180 ffff9e8f`09c28080 fffff802`690a2a90 23e90006`b4da058d : nt!PspSystemThreadStartup+0x55
ffffb088`21187c60 00000000`00000000 : ffffb088`21188000 ffffb088`21182000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: dxgmms2!McTemplateK0pptpqxqqppqqxxpqx_EtwWriteTransfer+18c
IMAGE_NAME: hardware
IMAGE_VERSION: 10.0.19041.1124
STACK_COMMAND: .cxr 0xffffb08821186460 ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED_dxgmms2.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a65b547c-5865-921a-16f5-26d09f946d5e}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffff8b, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80411535ca0, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4843
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8593
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffffffffffff8b
BUGCHECK_P2: 0
BUGCHECK_P3: fffff80411535ca0
BUGCHECK_P4: 2
READ_ADDRESS: fffff8040d0fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8040d00f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8040d00f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffff8b
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: iCUE.exe
TRAP_FRAME: ffffc8089640b910 -- (.trap 0xffffc8089640b910)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff8486e0cf9020
rdx=ffff8486e5b9c020 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80411535ca0 rsp=ffffc8089640baa8 rbp=0000000000000000
r8=ffff8486ebb89010 r9=000000000000000f r10=ffff8486ebb89440
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cng!BCryptSignHash+0x17b60:
fffff804`11535ca0 1b488b sbb ecx,dword ptr [rax-75h] ds:ffffffff`ffffff8b=????????
Resetting default scope
MISALIGNED_IP:
cng!BCryptSignHash+17b60
fffff804`11535ca0 1b488b sbb ecx,dword ptr [rax-75h]
STACK_TEXT:
ffffc808`9640b668 fffff804`0c835c1d : 00000000`00000050 ffffffff`ffffff8b 00000000`00000000 ffffc808`9640b910 : nt!KeBugCheckEx
ffffc808`9640b670 fffff804`0c612ce0 : 00000000`00000000 00000000`00000000 ffffc808`9640b990 00000000`00000000 : nt!MiSystemFault+0x1ad4ed
ffffc808`9640b770 fffff804`0c7ebb1e : 00000000`00000000 ffff8486`00000000 ffffc808`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffc808`9640b910 fffff804`11535ca0 : fffff804`115c3386 fffff804`0d04f180 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffc808`9640baa8 ffff8486`e5b9c020 : 00000000`73556f49 00000000`00000000 00000000`00000000 00000000`00000200 : cng!BCryptSignHash+0x17b60
ffffc808`9640bae8 00000000`73556f49 : 00000000`00000000 00000000`00000000 00000000`00000200 00000000`00000009 : 0xffff8486`e5b9c020
ffffc808`9640baf0 00000000`00000000 : 00000000`00000000 00000000`00000200 00000000`00000009 ffff8486`dce291c0 : 0x73556f49
SYMBOL_NAME: cng!BCryptSignHash+17b60
IMAGE_VERSION: 10.0.19041.264
STACK_COMMAND: .thread ; .cxr ; kb
MODULE_NAME: hardware
IMAGE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED_cng.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a340c30b-9a66-1b3a-411d-f51bca813daa}
Followup: MachineOwner
---------