IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8075886ae75, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.535 (WinBuild.160101.0800)
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 4207
BIOS_DATE: 12/07/2018
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME B350M-A
BASEBOARD_VERSION: Rev X.0x
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: 20
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8075886ae75
WRITE_ADDRESS: fffff80758d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000020
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiExecuteAllDpcs+2e5
fffff807`5886ae75 49894720 mov qword ptr [r15+20h],rax
CPU_COUNT: 8
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 11
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: League of Lege
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-13-2020 22:26:15.0816
ANALYSIS_VERSION: 10.0.18362.1 x86fre
DPC_STACK_BASE: FFFFF8075CA72FB0
TRAP_FRAME: fffff8075ca72ab0 -- (.trap 0xfffff8075ca72ab0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00001315dc64db30 rbx=0000000000000000 rcx=ffffdf060ff13000
rdx=0000131500000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8075886ae75 rsp=fffff8075ca72c40 rbp=fffff8075ca72d40
r8=0000000000000000 r9=0000000000000000 r10=ffffdf06175edf88
r11=fffff8075ca72e60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiExecuteAllDpcs+0x2e5:
fffff807`5886ae75 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff807589d32e9 to fffff807589c14e0
STACK_TEXT:
fffff807`5ca72968 fffff807`589d32e9 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff807`5ca72970 fffff807`589cf62b : ffffb780`429495b0 fffff807`5ca72e70 ffffdf06`17502000 fffff807`693cb5a7 : nt!KiBugCheckDispatch+0x69
fffff807`5ca72ab0 fffff807`5886ae75 : fffff807`54240f80 ffffdf06`100d1000 fffff807`5ca72d40 fffff807`00000002 : nt!KiPageFault+0x46b
fffff807`5ca72c40 fffff807`5886a4ef : fffff807`5423e180 00000000`00000000 00000000`00000002 00000000`00000014 : nt!KiExecuteAllDpcs+0x2e5
fffff807`5ca72d80 fffff807`589c8525 : 00000000`00000000 fffff807`5423e180 ffffb780`42949500 00000000`00000000 : nt!KiRetireDpcList+0x1ef
fffff807`5ca72fb0 fffff807`589c8310 : fffff807`592cf6c0 fffff807`592b92ca ffffdf06`1a0a6080 00000000`000004c0 : nt!KxRetireDpcList+0x5
fffffe8b`0086fac0 fffff807`589c7bc5 : 00000000`00000000 fffff807`589c3041 00000000`36470330 fffffe8b`0086fb80 : nt!KiDispatchInterruptContinue
fffffe8b`0086faf0 fffff807`589c3041 : 00000000`36470330 fffffe8b`0086fb80 ffffb780`42949500 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
fffffe8b`0086fb00 00000000`00b5ae37 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
00000000`0393f678 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xb5ae37
THREAD_SHA1_HASH_MOD_FUNC: e9ddd7334ce9ee4e578346f634110a08ba176517
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e7e4093bff11b1d035962c30535041da2503998b
THREAD_SHA1_HASH_MOD: 9f457f347057f10e1df248e166a3e95e6570ecfe
FOLLOWUP_IP:
nt!KiExecuteAllDpcs+2e5
fffff807`5886ae75 49894720 mov qword ptr [r15+20h],rax
FAULT_INSTR_CODE: 20478949
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiExecuteAllDpcs+2e5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2e5
FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs
BUCKET_ID: AV_nt!KiExecuteAllDpcs
PRIMARY_PROBLEM_CLASS: AV_nt!KiExecuteAllDpcs
TARGET_TIME: 2020-01-13T18:13:26.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.535
ANALYSIS_SESSION_ELAPSED_TIME: 161d
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!kiexecutealldpcs
FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}
Followup: MachineOwner
---------