*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff801230e533e, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5749
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6706
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: 20
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff801230e533e
WRITE_ADDRESS: fffff80123afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80123a0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80123a0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000020
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: GTAIV.exe
DPC_STACK_BASE: FFFFF80128473FB0
TRAP_FRAME: fffff80128473a20 -- (.trap 0xfffff80128473a20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000004f8770001d8 rbx=0000000000000000 rcx=ffffd98dbbd46000
rdx=000004f800000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801230e533e rsp=fffff80128473bb0 rbp=fffff80128473cb0
r8=0000000000000000 r9=0000000000000000 r10=ffffd98dc755cf88
r11=fffff80128473e60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff801`230e533e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope
STACK_TEXT:
fffff801`284738d8 fffff801`23207169 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff801`284738e0 fffff801`23203469 : 000004f8`76fbf258 00000000`00000000 ffffd98d`c2c75000 fffff801`36549c37 : nt!KiBugCheckDispatch+0x69
fffff801`28473a20 fffff801`230e533e : fffff801`1fe38240 ffffd98d`bbef3000 fffff801`28473e70 fffff801`00000002 : nt!KiPageFault+0x469
fffff801`28473bb0 fffff801`230e4644 : fffff801`1fe35180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x2ee
fffff801`28473d20 fffff801`231fc255 : 00000000`00000000 fffff801`1fe35180 ffff9b01`237bf000 00000000`26c41140 : nt!KiRetireDpcList+0x1f4
fffff801`28473fb0 fffff801`231fc040 : fffff801`231f1300 fffff801`2307448a ffffd98d`00000000 ffffd98d`cae7a080 : nt!KxRetireDpcList+0x5
ffffb300`ef9e9ac0 fffff801`231fb8f5 : 00000000`26c41140 fffff801`231f6d81 00000000`2773a080 ffffd98d`cae7a080 : nt!KiDispatchInterruptContinue
ffffb300`ef9e9af0 fffff801`231f6d81 : 00000000`2773a080 ffffd98d`cae7a080 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
ffffb300`ef9e9b00 00000000`6c15eac0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
00000000`255bf8a4 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6c15eac0
SYMBOL_NAME: nt!KiExecuteAllDpcs+2ee
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2ee
FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}
Followup: MachineOwner
---------