IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffb380001b7218, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff801794d6b44, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
DUMP_TYPE: 2
BUGCHECK_P1: ffffb380001b7218
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff801794d6b44
WRITE_ADDRESS: GetUlongFromAddress: unable to read from fffff801796de500
fffff80179759390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffb380001b7218
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiSwapNumaStandbyPage+254
fffff801`794d6b44 f0480fba6b183f lock bts qword ptr [rbx+18h],3Fh
CPU_COUNT: 8
CPU_MHZ: f3d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 1
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: Discord.exe
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-29-2020 18:05:52.0730
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffff8883fa5c6100 -- (.trap 0xffff8883fa5c6100)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffb8000000000 rbx=0000000000000000 rcx=ffffe48111ca5180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801794d6b44 rsp=ffff8883fa5c6290 rbp=ffff8883fa5c6310
r8=0000000000000002 r9=0000000000000012 r10=fffffb8000000000
r11=0000000fffffffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!MiSwapNumaStandbyPage+0x254:
fffff801`794d6b44 f0480fba6b183f lock bts qword ptr [rbx+18h],3Fh ds:00000000`00000018=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff801793e12e9 to fffff801793cfa50
STACK_TEXT:
ffff8883`fa5c5fb8 fffff801`793e12e9 : 00000000`0000000a ffffb380`001b7218 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffff8883`fa5c5fc0 fffff801`793dd6d4 : 00006574`696c7173 00000003`00000020 ffff9203`c2685010 ffff9203`c2685010 : nt!KiBugCheckDispatch+0x69
ffff8883`fa5c6100 fffff801`794d6b44 : fffffe80`00009260 00000000`0a502a3e 00000000`0a500fe0 0b73e73c`00000000 : nt!KiPageFault+0x454
ffff8883`fa5c6290 fffff801`79426fab : fffffe80`00000000 00000000`00000004 00000000`00000000 00000000`00000000 : nt!MiSwapNumaStandbyPage+0x254
ffff8883`fa5c6350 fffff801`792b4276 : fffff801`796549c0 00000000`000004fd 00000000`000004fd 00000000`00000000 : nt!MiGetPage+0x1727db
ffff8883`fa5c6420 fffff801`792b1ffc : 0f0f0f0f`0f0f0f0f ffffbf8f`5669a158 ffff8883`fa5c6780 00000000`00000006 : nt!MiGetPageChain+0x186
ffff8883`fa5c6600 fffff801`792b1bf7 : ffffbf8f`54ca0080 00000000`00000000 ffffffff`ffffffff 00000000`00000001 : nt!MiResolvePrivateZeroFault+0x14c
ffff8883`fa5c6720 fffff801`792b1250 : ffff8883`fa5c6880 ffffbd00`000f72b8 00000000`00000000 00000000`00000002 : nt!MiResolveDemandZeroFault+0x427
ffff8883`fa5c6810 fffff801`792aeb60 : ffffbf8f`00000004 00000000`0a076000 ffff8000`00000000 ffffbf8f`59bf3580 : nt!MiDispatchFault+0x800
ffff8883`fa5c6960 fffff801`793dd5c9 : ffffbf8f`54ca0080 ffffbf8f`5b7c5760 00000000`0000001b ffffbf8f`5b7d82e0 : nt!MmAccessFault+0x1e0
ffff8883`fa5c6b00 00000000`01e261cd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x349
00000000`0a33e90c 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x1e261cd
THREAD_SHA1_HASH_MOD_FUNC: 00d5cca6a77011e658099cf9f655106cde9f6e8b
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 25a2855d06c11d1a22fc7133a8f0751c8a52b6c2
THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c
FOLLOWUP_IP:
nt!MiSwapNumaStandbyPage+254
fffff801`794d6b44 f0480fba6b183f lock bts qword ptr [rbx+18h],3Fh
FAULT_INSTR_CODE: ba0f48f0
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiSwapNumaStandbyPage+254
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5fb6edc2
IMAGE_VERSION: 10.0.17763.1039
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 254
FAILURE_BUCKET_ID: AV_nt!MiSwapNumaStandbyPage
BUCKET_ID: AV_nt!MiSwapNumaStandbyPage
PRIMARY_PROBLEM_CLASS: AV_nt!MiSwapNumaStandbyPage
TARGET_TIME: 2020-02-29T14:29:14.000Z
OSBUILD: 17763
OSSERVICEPACK: 1039
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2020-11-20 01:12:18
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: 5eeb
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!miswapnumastandbypage
FAILURE_ID_HASH: {522a635a-0d98-8289-7b34-c2db782a6bc9}
Followup: MachineOwner
---------