IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000004c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80739e227cf, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 4c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80739e227cf
READ_ADDRESS: fffff8073a3733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
000000000000004c
CURRENT_IRQL: 2
FAULTING_IP:
nt!PpmIdlePrepare+3df
fffff807`39e227cf 418b5c244c mov ebx,dword ptr [r12+4Ch]
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: SteelSeriesEngine3.exe
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-19-2019 23:13:11.0318
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffc685ad2cf780 -- (.trap 0xffffc685ad2cf780)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000003ab000 rbx=0000000000000000 rcx=ffffc685ad2cf8d0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80739e227cf rsp=ffffc685ad2cf910 rbp=0000000000000000
r8=000000010000002b r9=000000010000002e r10=ffffb200ef521180
r11=ffff8707154b20c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!PpmIdlePrepare+0x3df:
fffff807`39e227cf 418b5c244c mov ebx,dword ptr [r12+4Ch] ds:00000000`0000004c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80739fd32e9 to fffff80739fc14e0
STACK_TEXT:
ffffc685`ad2cf638 fffff807`39fd32e9 : 00000000`0000000a 00000000`0000004c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffc685`ad2cf640 fffff807`39fcf62b : ffffb200`ef521180 fffff807`39fc86ef 00000067`b4bbbdff 00000000`00000001 : nt!KiBugCheckDispatch+0x69
ffffc685`ad2cf780 fffff807`39e227cf : fffff807`00000000 00000000`00000000 fffff807`ffffffff 00000000`00000001 : nt!KiPageFault+0x46b
ffffc685`ad2cf910 fffff807`39fd2d18 : ffff8707`130b3080 ffff8707`1432a080 ffffffff`ffffd8f0 ffff8707`106c4360 : nt!PpmIdlePrepare+0x3df
ffffc685`ad2cfb00 244c8948`084a8b48 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
3b490814`8d48c0b7 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x244c8948`084a8b48
THREAD_SHA1_HASH_MOD_FUNC: d08901c35a843805fec90a89a75f8fd30f8a6732
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1f79b73238d2b1934bc9b069d6da99e249105d38
THREAD_SHA1_HASH_MOD: f08ac56120cad14894587db086f77ce277bfae84
FOLLOWUP_IP:
nt!PpmIdlePrepare+3df
fffff807`39e227cf 418b5c244c mov ebx,dword ptr [r12+4Ch]
FAULT_INSTR_CODE: 245c8b41
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!PpmIdlePrepare+3df
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 3df
FAILURE_BUCKET_ID: AV_nt!PpmIdlePrepare
BUCKET_ID: AV_nt!PpmIdlePrepare
PRIMARY_PROBLEM_CLASS: AV_nt!PpmIdlePrepare
TARGET_TIME: 2019-12-19T19:36:50.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 2ed9
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!ppmidleprepare
FAILURE_ID_HASH: {dd7d0096-4602-c4e5-a984-978d6ab3aa71}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000004c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80739e227cf, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 4c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80739e227cf
READ_ADDRESS: fffff8073a3733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
000000000000004c
CURRENT_IRQL: 2
FAULTING_IP:
nt!PpmIdlePrepare+3df
fffff807`39e227cf 418b5c244c mov ebx,dword ptr [r12+4Ch]
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: SteelSeriesEngine3.exe
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-19-2019 23:13:11.0318
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffc685ad2cf780 -- (.trap 0xffffc685ad2cf780)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000003ab000 rbx=0000000000000000 rcx=ffffc685ad2cf8d0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80739e227cf rsp=ffffc685ad2cf910 rbp=0000000000000000
r8=000000010000002b r9=000000010000002e r10=ffffb200ef521180
r11=ffff8707154b20c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!PpmIdlePrepare+0x3df:
fffff807`39e227cf 418b5c244c mov ebx,dword ptr [r12+4Ch] ds:00000000`0000004c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80739fd32e9 to fffff80739fc14e0
STACK_TEXT:
ffffc685`ad2cf638 fffff807`39fd32e9 : 00000000`0000000a 00000000`0000004c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffc685`ad2cf640 fffff807`39fcf62b : ffffb200`ef521180 fffff807`39fc86ef 00000067`b4bbbdff 00000000`00000001 : nt!KiBugCheckDispatch+0x69
ffffc685`ad2cf780 fffff807`39e227cf : fffff807`00000000 00000000`00000000 fffff807`ffffffff 00000000`00000001 : nt!KiPageFault+0x46b
ffffc685`ad2cf910 fffff807`39fd2d18 : ffff8707`130b3080 ffff8707`1432a080 ffffffff`ffffd8f0 ffff8707`106c4360 : nt!PpmIdlePrepare+0x3df
ffffc685`ad2cfb00 244c8948`084a8b48 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
3b490814`8d48c0b7 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x244c8948`084a8b48
THREAD_SHA1_HASH_MOD_FUNC: d08901c35a843805fec90a89a75f8fd30f8a6732
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1f79b73238d2b1934bc9b069d6da99e249105d38
THREAD_SHA1_HASH_MOD: f08ac56120cad14894587db086f77ce277bfae84
FOLLOWUP_IP:
nt!PpmIdlePrepare+3df
fffff807`39e227cf 418b5c244c mov ebx,dword ptr [r12+4Ch]
FAULT_INSTR_CODE: 245c8b41
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!PpmIdlePrepare+3df
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 3df
FAILURE_BUCKET_ID: AV_nt!PpmIdlePrepare
BUCKET_ID: AV_nt!PpmIdlePrepare
PRIMARY_PROBLEM_CLASS: AV_nt!PpmIdlePrepare
TARGET_TIME: 2019-12-19T19:36:50.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 2ed9
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!ppmidleprepare
FAILURE_ID_HASH: {dd7d0096-4602-c4e5-a984-978d6ab3aa71}
Followup: MachineOwner
---------