IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffab84c2de91ec, memory referenced
Arg2: 000000000000000d, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff806651ee443, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-HH6FM2D
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 8
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: a
BUGCHECK_P1: ffffab84c2de91ec
BUGCHECK_P2: d
BUGCHECK_P3: 0
BUGCHECK_P4: fffff806651ee443
READ_ADDRESS: fffff806655733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8066542a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8066542a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffab84c2de91ec
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffffa8468c3f550 -- (.trap 0xfffffa8468c3f550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffab835c4ca390
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806651ee443 rsp=fffffa8468c3f6e0 rbp=ffffab835a29d2d0
r8=ffffab835a29d5f0 r9=000000005a2d2f00 r10=fffff806818915a0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po nc
nt!PpmIdleExecuteTransition+0x1cccd3:
fffff806`651ee443 418b0c98 mov ecx,dword ptr [r8+rbx*4] ds:ffffab83`5a29d5f0=00000000
Resetting default scope
STACK_TEXT:
fffffa84`68c3f408 fffff806`651d32e9 : 00000000`0000000a ffffab84`c2de91ec 00000000`0000000d 00000000`00000000 : nt!KeBugCheckEx
fffffa84`68c3f410 fffff806`651cf62b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffffa84`68c3f550 fffff806`651ee443 : 00025576`1304eb8f ffffab83`5a29d2d0 ffffab83`5a2d2f00 00000000`00000004 : nt!KiPageFault+0x46b
fffffa84`68c3f6e0 fffff806`650215ce : 00000000`00000000 00000000`00000002 00000000`00000000 00000000`00000000 : nt!PpmIdleExecuteTransition+0x1cccd3
fffffa84`68c3fa00 fffff806`651c4fe8 : ffffffff`00000000 ffffe501`fb095180 ffffab83`5a3be040 00000000`0000081a : nt!PoIdle+0x36e
fffffa84`68c3fb60 00000000`00000000 : fffffa84`68c40000 fffffa84`68c39000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48
SYMBOL_NAME: nt!PpmIdleExecuteTransition+1cccd3
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.476
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1cccd3
FAILURE_BUCKET_ID: AV_nt!PpmIdleExecuteTransition
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0ced0187-972d-f83e-de87-663d75806c32}
Followup: MachineOwner
---------