IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000036, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8061edfcd26, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6561
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 132462
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 36
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8061edfcd26
READ_ADDRESS: fffff8061f6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061f60f330: Unable to get Flags value from nt!KdVersionBlock
fffff8061f60f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000036
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MsMpEng.exe
TRAP_FRAME: ffffd502fd61ea60 -- (.trap 0xffffd502fd61ea60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8061edfcd26 rsp=ffffd502fd61ebf0 rbp=000fa4efb59bbfff
r8=ffffb181f20ab180 r9=0000000000000000 r10=000000000000000e
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!SwapContext+0x246:
fffff806`1edfcd26 498b4e28 mov rcx,qword ptr [r14+28h] ds:00000000`00000028=????????????????
Resetting default scope
STACK_TEXT:
ffffd502`fd61e918 fffff806`1ee07a69 : 00000000`0000000a 00000000`00000036 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd502`fd61e920 fffff806`1ee03d69 : 00000000`00000000 00000000`00000005 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd502`fd61ea60 fffff806`1edfcd26 : 000fa4ef`b59bbfff fffff806`00000001 00000000`00000000 fffff806`233e1f71 : nt!KiPageFault+0x469
ffffd502`fd61ebf0 fffff806`1edfc806 : 7fffc30b`6fe8a9f0 00000000`ffffffff 00000000`00000000 00000000`00000000 : nt!SwapContext+0x246
ffffd502`fd61ec30 fffff806`1ec65850 : ffffd502`fffffffe ffffc30b`ffffffff ffffd502`00000000 00000000`f20ab180 : nt!KiSwapContext+0x76
ffffd502`fd61ed70 fffff806`1ec64d7f : ffffc30b`00000001 ffffc30b`00000000 ffffd502`fd61ef30 00000000`00000000 : nt!KiSwapThread+0x500
ffffd502`fd61ee20 fffff806`1ec64623 : ffffd68d`00000075 ffffd502`00000000 ffffc30b`666b8000 ffffc30b`6d3f51c0 : nt!KiCommitThreadWait+0x14f
ffffd502`fd61eec0 fffff806`233dfa1a : ffffd502`fd61f3d8 ffffd68d`00000000 ffffc30b`72bc8d00 00000000`00861000 : nt!KeWaitForSingleObject+0x233
ffffd502`fd61efb0 fffff806`233decff : 00000000`00000001 ffffd502`fd61f4a0 ffffc30b`666c9180 ffffc30b`666c9180 : Ntfs!NtfsNonCachedIo+0x4ea
ffffd502`fd61f270 fffff806`233dcc2c : ffffc30b`72bc8d78 ffffc30b`7109f010 ffffc30b`00000001 ffffc30b`00000001 : Ntfs!NtfsCommonRead+0x1e9f
ffffd502`fd61f470 fffff806`1ec52f55 : ffffc30b`727ec2c0 ffffc30b`7109f010 ffffc30b`7109f010 ffffc30b`66690da0 : Ntfs!NtfsFsdRead+0x1fc
ffffd502`fd61f540 fffff806`1d376ccf : ffffd502`fd61fa00 fffff806`00000006 c30b7347`b9c004d0 00000000`00000000 : nt!IofCallDriver+0x55
ffffd502`fd61f580 fffff806`1d3748d3 : ffffd502`fd61f610 ffffc30b`66690da0 00000000`00000001 ffffd68d`6d0e2b30 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffd502`fd61f5f0 fffff806`1ec52f55 : ffffc30b`7109f010 fffff806`1eced1b7 00000001`00000000 00000000`00000005 : FLTMGR!FltpDispatch+0xa3
ffffd502`fd61f650 fffff806`1ec80d77 : 00000000`00000005 ffffc30b`7109f010 ffffc30b`6fe8aa40 ffffc30b`6f79de60 : nt!IofCallDriver+0x55
ffffd502`fd61f690 fffff806`1ecb6f0a : 00000000`00000001 ffffd502`fd61f920 ffffc30b`6fe8aa50 ffffc30b`6fe8aa10 : nt!IoPageReadEx+0x1d7
ffffd502`fd61f700 fffff806`1ecb4a0d : 00000000`00000002 ffffd502`fd61f7e0 ffffd502`fd61f958 fffff806`1ecb4eb0 : nt!MiIssueHardFaultIo+0xb6
ffffd502`fd61f750 fffff806`1ec0c9c8 : 00000000`c0033333 00000000`00000001 00000199`b53864f8 ffffd68d`6d0e2b30 : nt!MiIssueHardFault+0x29d
ffffd502`fd61f860 fffff806`1ee03c5e : 00000008`00000000 00000008`00000001 00000008`9ce7b840 ffffd502`fd61fa80 : nt!MmAccessFault+0x468
ffffd502`fd61fa00 00007ffc`2388a2cf : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000008`9ce7b730 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`2388a2cf
SYMBOL_NAME: nt!SwapContext+246
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.804
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 246
FAILURE_BUCKET_ID: AV_nt!SwapContext
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {47b746a3-60bf-1f5a-5fa5-88903b6a3204}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000004c00, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000004c00, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4015
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 125811
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: 4c00
BUGCHECK_P2: 2
BUGCHECK_P3: 8
BUGCHECK_P4: 4c00
READ_ADDRESS: fffff8004a6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8004a60f330: Unable to get Flags value from nt!KdVersionBlock
fffff8004a60f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000004c00
PROCESS_NAME: hng.exe
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DPC_STACK_BASE: FFFFF48BC6057FB0
TRAP_FRAME: fffff48bc60579a0 -- (.trap 0xfffff48bc60579a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe4848d3f6160
rdx=ffffe484918813c0 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000004c00 rsp=fffff48bc6057b30 rbp=fffff48bc6057bf9
r8=000000001cb772a0 r9=0000000000000001 r10=fffff8004a631c48
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
00000000`00004c00 ?? ???
Resetting default scope
FAILED_INSTRUCTION_ADDRESS:
+0
00000000`00004c00 ?? ???
STACK_TEXT:
fffff48b`c6057858 fffff800`49e07a69 : 00000000`0000000a 00000000`00004c00 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff48b`c6057860 fffff800`49e03d69 : 00000000`0000000f ffffd000`64165180 ffffe484`93325080 fffff800`49d36bbc : nt!KiBugCheckDispatch+0x69
fffff48b`c60579a0 00000000`00004c00 : fffff48b`c6057bf9 ffffe484`8d3f6130 ffffe484`8d3f6100 fffff800`49c434b0 : nt!KiPageFault+0x469
fffff48b`c6057b30 fffff48b`c6057bf9 : ffffe484`8d3f6130 ffffe484`8d3f6100 fffff800`49c434b0 ffffe484`8d3f6130 : 0x4c00
fffff48b`c6057b38 ffffe484`8d3f6130 : ffffe484`8d3f6100 fffff800`49c434b0 ffffe484`8d3f6130 fffff48b`c6057e60 : 0xfffff48b`c6057bf9
fffff48b`c6057b40 ffffe484`8d3f6100 : fffff800`49c434b0 ffffe484`8d3f6130 fffff48b`c6057e60 fffff48b`c6057bf9 : 0xffffe484`8d3f6130
fffff48b`c6057b48 fffff800`49c434b0 : ffffe484`8d3f6130 fffff48b`c6057e60 fffff48b`c6057bf9 fffff48b`c6057e00 : 0xffffe484`8d3f6100
fffff48b`c6057b50 fffff800`49c42fc5 : fffff48b`c6057c98 00000000`00000001 00000000`00000003 ffffe484`8d3f6148 : nt!KiExpireTimer2+0x150
fffff48b`c6057c60 fffff800`49c07184 : ffffd000`641df180 6a5cef58`00000000 00000000`00000008 00000000`00004ce3 : nt!KiTimer2Expiration+0x165
fffff48b`c6057d20 fffff800`49dfcac5 : 00000000`00000000 ffffd000`641df180 ffffe484`87103e60 00000000`8a9e2ee0 : nt!KiRetireDpcList+0x874
fffff48b`c6057fb0 fffff800`49dfc8b0 : 00000000`00000000 fffff800`49cec5ca 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff48b`ca4979c0 fffff800`49dfc165 : 00000000`8a9e2ee0 fffff800`49df7b11 00000000`07e8e2f0 00000000`00000001 : nt!KiDispatchInterruptContinue
fffff48b`ca4979f0 fffff800`49df7b11 : 00000000`07e8e2f0 00000000`00000001 00000000`00000001 ffffe484`00000000 : nt!KiDpcInterruptBypass+0x25
fffff48b`ca497a00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1
SYMBOL_NAME: nt!KiPageFault+469
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.804
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 469
FAILURE_BUCKET_ID: AV_CODE_AV_BAD_IP_nt!KiPageFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {73cd60cc-83fa-6b76-df08-1961c31d7403}
Followup: MachineOwner
---------