IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000fed303f918, memory referenced
Arg2: 000000000000000f, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff801854d0bb7, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for cpuz149_x64.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 5
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 22
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: a
BUGCHECK_P1: fed303f918
BUGCHECK_P2: f
BUGCHECK_P3: 1
BUGCHECK_P4: fffff801854d0bb7
WRITE_ADDRESS: fffff80184f733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80184e2a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff80184e2a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000fed303f918
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Corsair.Service.CpuIdRemote64.exe
TRAP_FRAME: ffff900f2095d050 -- (.trap 0xffff900f2095d050)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000059800 rbx=0000000000000000 rcx=fffff7a8c0223000
rdx=000000fed303f918 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801854d0bb7 rsp=ffff900f2095d1e8 rbp=fffff7a8c0223000
r8=0000000000000060 r9=0000000000000060 r10=0000fffff801854d
r11=ffffb179e8e00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
hal!HalpPciReadMmConfigUlong+0x7:
fffff801`854d0bb7 8902 mov dword ptr [rdx],eax ds:000000fe`d303f918=????????
Resetting default scope
STACK_TEXT:
ffff900f`2095cf08 fffff801`84bd41e9 : 00000000`0000000a 000000fe`d303f918 00000000`0000000f 00000000`00000001 : nt!KeBugCheckEx
ffff900f`2095cf10 fffff801`84bd0529 : ffff900f`00f00070 00000000`00000040 ffff900f`2095d360 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff900f`2095d050 fffff801`854d0bb7 : fffff801`854ba93e 00000000`00000000 00000000`00000004 ffffa20a`bb1b2863 : nt!KiPageFault+0x469
ffff900f`2095d1e8 fffff801`854ba93e : 00000000`00000000 00000000`00000004 ffffa20a`bb1b2863 fffff801`84a187fe : hal!HalpPciReadMmConfigUlong+0x7
ffff900f`2095d1f0 fffff801`854ba79a : 00000000`00000000 00000000`00000004 00000000`00000060 00000000`00000000 : hal!HalpPCIPerformConfigAccess+0x5a
ffff900f`2095d220 fffff801`854ba672 : 00000000`00000000 00000000`00000004 00000000`00000000 000000fe`d303f918 : hal!HalpPciAccessMmConfigSpace+0x82
ffff900f`2095d260 fffff801`854be3e6 : 00000000`00000000 00000000`00000000 000000fe`d303f918 00000000`00000004 : hal!HalpPCIConfig+0xa2
ffff900f`2095d2e0 fffff801`854be361 : 00000000`00000000 00000000`00000060 00000000`00000000 00000000`00000004 : hal!HalpReadPCIConfig+0x5a
ffff900f`2095d330 fffff801`854be261 : 00000000`00000002 fffff801`84aaf597 00000000`00000000 ffffe783`00000000 : hal!HalpGetPCIData+0xf1
ffff900f`2095d400 fffff801`81574395 : 00000000`00000000 ffffa180`07d62830 00000000`00000000 fffff801`84e6a440 : hal!HalGetBusDataByOffset+0x41
ffff900f`2095d440 00000000`00000000 : ffffa180`07d62830 00000000`00000000 fffff801`84e6a440 00000000`00000060 : cpuz149_x64+0x4395
SYMBOL_NAME: cpuz149_x64+4395
MODULE_NAME: cpuz149_x64
IMAGE_NAME: cpuz149_x64.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4395
FAILURE_BUCKET_ID: AV_cpuz149_x64!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6630e516-5929-09aa-311a-f35c4b67545e}
Followup: MachineOwner
---------