IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000075f0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8030cead966, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 3
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 75f0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8030cead966
READ_ADDRESS: fffff8030d3733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8030d22a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8030d22a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
00000000000075f0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: CompatTelRunner.exe
TRAP_FRAME: ffffd2034d3b6030 -- (.trap 0xffffd2034d3b6030)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffd2034d3b6630
rdx=00000000000075f0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8030cead966 rsp=ffffd2034d3b61c0 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=ffffd2034d3b6630
r11=fffff53ffff975e8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiComputePxeWalkAction+0x6:
fffff803`0cead966 4c8b0a mov r9,qword ptr [rdx] ds:00000000`000075f0=????????????????
Resetting default scope
STACK_TEXT:
ffffd203`4d3b5ee8 fffff803`0cfd33e9 : 00000000`0000000a 00000000`000075f0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd203`4d3b5ef0 fffff803`0cfcf72b : 87000000`7f470307 87000000`9de70307 87000001`13770307 87000000`75ec0307 : nt!KiBugCheckDispatch+0x69
ffffd203`4d3b6030 fffff803`0cead966 : ffffd203`4d3b66e0 fffff803`0ce64278 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x46b
ffffd203`4d3b61c0 fffff803`0ceac880 : 00000000`00000000 fffff53f`fff975e8 00000000`00000002 00000000`00000000 : nt!MiComputePxeWalkAction+0x6
ffffd203`4d3b6200 fffff803`0ceace11 : ffffd203`4d3b6630 fffff57a`9ffffcb8 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x110
ffffd203`4d3b62c0 fffff803`0ceace11 : ffffd203`4d3b6630 fffff57a`bd4ffff8 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
ffffd203`4d3b6380 fffff803`0ceace11 : ffffd203`4d3b6630 fffff57a`bd5ea7f8 fffff57a`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
ffffd203`4d3b6440 fffff803`0ceac59c : ffffd203`4d3b6630 fffff803`0ce7754a 00000000`00000000 00000000`00000005 : nt!MiWalkPageTablesRecursively+0x6a1
ffffd203`4d3b6500 fffff803`0cf213a3 : ffffd203`4d3b6630 00000000`00000002 00000000`00000002 8a000001`00000000 : nt!MiWalkPageTables+0x36c
ffffd203`4d3b6600 fffff803`0cf211bb : 00000000`00001000 ffffd203`4d3b6c40 fffff57a`bd5ea000 ffff8000`00000000 : nt!MiTrimWorkingSet+0x1db
ffffd203`4d3b69e0 fffff803`0cf2108b : ffffc20d`ba698580 ffffd203`4d3b6a60 00000000`00000000 00000000`00000000 : nt!MiReduceWs+0x8f
ffffd203`4d3b6a20 fffff803`0ce74f70 : 00000000`00000110 00000000`00000000 ffffc20d`ba698580 ffff8000`00000000 : nt!MiPreUnlockWorkingSetShared+0xd3
ffffd203`4d3b6a70 fffff803`0ce72dec : 00000000`00000110 00000000`00000001 00000000`c0000016 ffffd203`4d3b6b30 : nt!MiUnlockWorkingSetShared+0xe0
ffffd203`4d3b6aa0 fffff803`0cfcf620 : 00000183`b60200c0 ffffd203`4d3b6cc0 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x24c
ffffd203`4d3b6c40 00007fff`fe22c59e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
00000006`b3a7f258 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`fe22c59e
SYMBOL_NAME: nt!MiComputePxeWalkAction+6
MODULE_NAME: nt
IMAGE_VERSION: 10.0.18362.657
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 6
FAILURE_BUCKET_ID: AV_nt!MiComputePxeWalkAction
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {bcb2e4c3-70dd-0501-5d55-17aaeaeacdd6}
Followup: MachineOwner
---------