IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803430e9a1e, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4968
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 71941
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 20
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff803430e9a1e
WRITE_ADDRESS: fffff80343afa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80343a0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff80343a0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000020
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: League of Legends.exe
DPC_STACK_BASE: FFFFF80348A72FB0
TRAP_FRAME: fffff80348a72a20 -- (.trap 0xfffff80348a72a20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000001ddba1b108c rbx=0000000000000000 rcx=ffff9e8730146000
rdx=000001dd00000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803430e9a1e rsp=fffff80348a72bb0 rbp=fffff80348a72cb0
r8=0000000000000000 r9=0000000000000000 r10=ffff9e87395a1f88
r11=fffff80348a72e60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff803`430e9a1e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope
STACK_TEXT:
fffff803`48a728d8 fffff803`43205e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff803`48a728e0 fffff803`43202169 : 000001dd`ba1872ae 00000000`00000000 ffff9e87`38d02000 fffff803`543a9f37 : nt!KiBugCheckDispatch+0x69
fffff803`48a72a20 fffff803`430e9a1e : fffff803`40870240 ffff9e87`302e5000 fffff803`48a72e70 fffff803`00000002 : nt!KiPageFault+0x469
fffff803`48a72bb0 fffff803`430e8d24 : fffff803`4086d180 00000000`00000000 00000000`0000002a 00000000`000040bf : nt!KiExecuteAllDpcs+0x2ee
fffff803`48a72d20 fffff803`431faee5 : 00000000`00000000 fffff803`4086d180 ffffd581`8dd20640 00000000`4d4fd8a0 : nt!KiRetireDpcList+0x1f4
fffff803`48a72fb0 fffff803`431facd0 : fffff803`431eff90 fffff803`4303f03a 00000000`00000000 ffff9e87`409be0e0 : nt!KxRetireDpcList+0x5
fffff307`3f9d4ac0 fffff803`431fa585 : 00000000`4d4fd8a0 fffff803`431f5a11 00000000`1033cfa0 00000000`4a1abe38 : nt!KiDispatchInterruptContinue
fffff307`3f9d4af0 fffff803`431f5a11 : 00000000`1033cfa0 00000000`4a1abe38 00000000`00000000 ffffffff`ffffd801 : nt!KiDpcInterruptBypass+0x25
fffff307`3f9d4b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
SYMBOL_NAME: nt!KiExecuteAllDpcs+2ee
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2ee
FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8066dce9a1e, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4718
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 44430
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 20
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8066dce9a1e
WRITE_ADDRESS: fffff8066e6fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8066e60f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8066e60f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000020
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff80673e6b6d0 -- (.trap 0xfffff80673e6b6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000017c3c10a14c rbx=0000000000000000 rcx=ffffd80fdb946000
rdx=0000017c00000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8066dce9a1e rsp=fffff80673e6b860 rbp=fffff80673e6b960
r8=0000000000000000 r9=0000000000000000 r10=ffffd80fe5cd5f88
r11=fffff80673e6bb10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff806`6dce9a1e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope
STACK_TEXT:
fffff806`73e6b588 fffff806`6de05e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff806`73e6b590 fffff806`6de02169 : 00000000`00000000 00000000`00000001 00000000`00000000 fffff806`80a6a198 : nt!KiBugCheckDispatch+0x69
fffff806`73e6b6d0 fffff806`6dce9a1e : fffff806`6bcd5240 ffffd80f`dbae6000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469
fffff806`73e6b860 fffff806`6dce8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee
fffff806`73e6b9d0 fffff806`6ddf7a0e : 00000000`00000000 fffff806`6bcd2180 fffff806`6e726600 ffffd80f`e7a020c0 : nt!KiRetireDpcList+0x1f4
fffff806`73e6bc60 00000000`00000000 : fffff806`73e6c000 fffff806`73e66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiExecuteAllDpcs+2ee
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2ee
FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}
Followup: MachineOwner
---------
0: kd> .trap 0xfffff80673e6b6d0
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000017c3c10a14c rbx=0000000000000000 rcx=ffffd80fdb946000
rdx=0000017c00000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8066dce9a1e rsp=fffff80673e6b860 rbp=fffff80673e6b960
r8=0000000000000000 r9=0000000000000000 r10=ffffd80fe5cd5f88
r11=fffff80673e6bb10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!KiExecuteAllDpcs+0x2ee:
fffff806`6dce9a1e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????