IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc9862e151e70, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804554d8332, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450M S2H
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/27/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450M S2H
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: ffffc9862e151e70
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff804554d8332
WRITE_ADDRESS: fffff804559733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffc9862e151e70
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiReadyStandbyPageForActive+c2
fffff804`554d8332 488917 mov qword ptr [rdi],rdx
CPU_COUNT: c
CPU_MHZ: d42
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: ModernWarfare.exe
ANALYSIS_SESSION_HOST: DESKTOP-JC78BRD
ANALYSIS_SESSION_TIME: 06-11-2020 16:08:45.0140
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: ffff8b813df78fa0 -- (.trap 0xffff8b813df78fa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffc9862e151e70
rdx=0a000000c76db921 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804554d8332 rsp=ffff8b813df79130 rbp=0000000000011000
r8=0000000020000006 r9=ffff9f5101400270 r10=000000000016b8e3
r11=ffff8b813df79130 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiReadyStandbyPageForActive+0xc2:
fffff804`554d8332 488917 mov qword ptr [rdi],rdx ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff804555d41e9 to fffff804555c2390
STACK_TEXT:
ffff8b81`3df78e58 fffff804`555d41e9 : 00000000`0000000a ffffc986`2e151e70 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffff8b81`3df78e60 fffff804`555d0529 : fffff804`5586c440 ffff9f4f`a880a000 fffffa80`0b516790 fffff804`5586c440 : nt!KiBugCheckDispatch+0x69
ffff8b81`3df78fa0 fffff804`554d8332 : fffffa80`02564910 00000000`00011000 80000000`00000000 00000000`00000005 : nt!KiPageFault+0x469
ffff8b81`3df79130 fffff804`554d81f6 : fffffa80`02564910 00000000`00000009 00000000`00000009 ffffc986`2e951e70 : nt!MiReadyStandbyPageForActive+0xc2
ffff8b81`3df79160 fffff804`554d5fe5 : 00000000`00000001 fffffa80`0c2007d0 ffff9f51`01400238 00000000`00000000 : nt!MiUnlinkStandbyBatch+0x186
ffff8b81`3df791a0 fffff804`554d43cf : 00000000`000083c6 00000000`083c6000 00000000`00011000 00000000`00000000 : nt!MmCheckCachedPageStates+0x1145
ffff8b81`3df793a0 fffff804`55a8fa09 : 00000000`083c6858 00000000`00000000 00000000`00000001 ffff8b81`3df794b0 : nt!CcFetchDataForRead+0x8f
ffff8b81`3df79400 fffff804`554d4175 : ffffe086`d5321000 00000000`083c6858 00000000`000397a8 00000000`00000001 : nt!CcMapAndCopyFromCache+0xd9
ffff8b81`3df794a0 fffff804`5902a54d : ffffe086`cbec4cb0 ffffe086`00000000 ffffc986`00010000 00000000`083d6858 : nt!CcCopyReadEx+0x135
ffff8b81`3df79540 fffff804`584e5f77 : 00000000`00000000 00000000`000002b0 ffffe086`e4dc1d60 00000000`00000000 : Ntfs!NtfsCopyReadA+0x2ed
ffff8b81`3df79830 fffff804`584e2fa3 : ffff8b81`3df79920 00000000`00000000 00000000`00000000 ffffe086`d4c747f0 : FLTMGR!FltpPerformFastIoCall+0x197
ffff8b81`3df79890 fffff804`5851c7c5 : ffff8b81`3df799f8 ffff8b81`3df79b80 ffffe086`c958c080 ffffe086`e4dc1d60 : FLTMGR!FltpPassThroughFastIo+0xd3
ffff8b81`3df798f0 fffff804`55aaf10f : ffffe086`e4dc1d60 00000000`00000000 00000000`00000000 ffffe086`00000000 : FLTMGR!FltpFastIoRead+0x165
ffff8b81`3df799a0 fffff804`555d3c18 : 00000000`00000764 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x39f
ffff8b81`3df79a90 00007ffe`3a93c134 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000bf`d77fd318 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`3a93c134
THREAD_SHA1_HASH_MOD_FUNC: b60739bfb1b79e7c33434e811c532fe89ec0c8b0
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 34a1023c9fe057645a84341bdd5503ece6ca2641
THREAD_SHA1_HASH_MOD: 9dc2e6571e76d76797c7edd1f908d7f21707f5de
FOLLOWUP_IP:
nt!MiReadyStandbyPageForActive+c2
fffff804`554d8332 488917 mov qword ptr [rdi],rdx
FAULT_INSTR_CODE: 48178948
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiReadyStandbyPageForActive+c2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.836
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: c2
FAILURE_BUCKET_ID: AV_nt!MiReadyStandbyPageForActive
BUCKET_ID: AV_nt!MiReadyStandbyPageForActive
PRIMARY_PROBLEM_CLASS: AV_nt!MiReadyStandbyPageForActive
TARGET_TIME: 2020-06-11T11:59:42.000Z
OSBUILD: 18362
OSSERVICEPACK: 836
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: b20b
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!mireadystandbypageforactive
FAILURE_ID_HASH: {162abed9-8eea-1274-0bec-dc2682dbf597}
Followup: MachineOwner
---------