IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffbd89e1a2f818, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80051c7a1f5, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-HH6FM2D
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 4
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: a
BUGCHECK_P1: ffffbd89e1a2f818
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80051c7a1f5
READ_ADDRESS: fffff800521733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8005202a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8005202a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffbd89e1a2f818
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: StartMenuExperienceHost.exe
TRAP_FRAME: ffffb782ec980580 -- (.trap 0xffffb782ec980580)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0200000000000000
rdx=000000000172c248 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80051c7a1f5 rsp=ffffb782ec980710 rbp=ffffb782ec980910
r8=00000000ffffffff r9=0000000000000001 r10=ffffb8dc6e371000
r11=ffffbd89e1a2f818 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po nc
nt!MiResolveProtoPteFault+0x845:
fffff800`51c7a1f5 498b0b mov rcx,qword ptr [r11] ds:ffffbd89`e1a2f818=????????????????
Resetting default scope
STACK_TEXT:
ffffb782`ec980438 fffff800`51dd32e9 : 00000000`0000000a ffffbd89`e1a2f818 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffb782`ec980440 fffff800`51dcf62b : 00000000`00000000 00000000`00000000 00000000`00000001 0a000004`0ae1c025 : nt!KiBugCheckDispatch+0x69
ffffb782`ec980580 fffff800`51c7a1f5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x46b
ffffb782`ec980710 fffff800`51c74bcc : ffffb782`ec980880 00000000`00000000 ffffb782`ec980858 ffffd10d`a763fe18 : nt!MiResolveProtoPteFault+0x845
ffffb782`ec980810 fffff800`51c72d09 : 00000000`00000100 00000000`00000100 00000000`c0000016 000000dd`b1bff020 : nt!MiDispatchFault+0x80c
ffffb782`ec980960 fffff800`51dcf520 : ffffbd8d`d99e1080 00000000`00000010 00007ff9`8c929420 00000000`00000000 : nt!MmAccessFault+0x169
ffffb782`ec980b00 00007ff9`99595c59 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
000000dd`b1bff080 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`99595c59
SYMBOL_NAME: nt!MiResolveProtoPteFault+845
MODULE_NAME: nt
IMAGE_VERSION: 10.0.18362.476
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 845
FAILURE_BUCKET_ID: AV_nt!MiResolveProtoPteFault
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2f2238e9-4751-e3c3-543c-b0cdf930b219}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffd40c99f72860, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff80743818a4d, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-HH6FM2D
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 3
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffd40c99f72860
BUGCHECK_P2: 2
BUGCHECK_P3: fffff80743818a4d
BUGCHECK_P4: 2
READ_ADDRESS: fffff807437733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8074362a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8074362a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffd40c99f72860
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: WerFault.exe
TRAP_FRAME: ffff8d0982b64560 -- (.trap 0xffff8d0982b64560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=ffff8d0982b647d0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80743818a4d rsp=ffff8d0982b646f0 rbp=ffff8e8e0aa6db40
r8=0000000000000000 r9=0000000000000001 r10=0000000000000804
r11=ffff8e8e12322ac0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ObpReferenceProcessObjectByHandle+0xfd:
fffff807`43818a4d f0480fc107 lock xadd qword ptr [rdi],rax ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffff8d09`82b642b8 fffff807`433e35d6 : 00000000`00000050 ffffd40c`99f72860 00000000`00000002 ffff8d09`82b64560 : nt!KeBugCheckEx
ffff8d09`82b642c0 fffff807`43272eef : ffff8e8e`01a01280 00000000`00000002 00000000`00000000 ffffd40c`99f72860 : nt!MiSystemFault+0x1d6866
ffff8d09`82b643c0 fffff807`433cf520 : 00000000`00000001 ffffd48c`9a1b1300 ffff8d09`82b64a50 ffff03e5`fe64a921 : nt!MmAccessFault+0x34f
ffff8d09`82b64560 fffff807`43818a4d : ffff8e8e`0aed7110 00000000`00000000 ffff8e8e`12322ac0 fffff807`43818917 : nt!KiPageFault+0x360
ffff8d09`82b646f0 fffff807`43818444 : 00000000`00000000 ffff8d09`82b64840 ffffd48c`9a993080 ffff8e8e`0288c540 : nt!ObpReferenceProcessObjectByHandle+0xfd
ffff8d09`82b64740 fffff807`4381824c : ffffd48c`9a993080 00000000`00000040 ffffd48c`912a07a0 00000000`00000001 : nt!ObDuplicateObject+0x144
ffff8d09`82b64a00 fffff807`433d2d18 : ffffd48c`9ac20080 000000d8`ce4befc8 ffff8d09`82b64aa8 00000000`00000000 : nt!NtDuplicateObject+0x10c
ffff8d09`82b64a90 00007ff8`b147c844 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d8`ce4befa8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`b147c844
SYMBOL_NAME: nt!ObpReferenceProcessObjectByHandle+fd
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.476
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: fd
FAILURE_BUCKET_ID: AV_INVALID_nt!ObpReferenceProcessObjectByHandle
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7f68f574-a2d2-e05c-2a27-de9b145bede2}
Followup: MachineOwner
---------