*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8071061143f, address which referenced memory
Debugging Details:
------------------
SYMSRV: BYINDEX: 0x6
C:\ProgramData\Dbg\sym
qwavedrv.sys
EA28F0BC14000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\qwavedrv.sys\EA28F0BC14000\qwavedrv.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\qwavedrv.sys\EA28F0BC14000\qwavedrv.sys - OK
DBGENG: C:\ProgramData\Dbg\sym\qwavedrv.sys\EA28F0BC14000\qwavedrv.sys - Mapped image memory
SYMSRV: BYINDEX: 0x7
C:\ProgramData\Dbg\sym
win32k.sys
E87370BB9a000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\win32k.sys\E87370BB9a000\win32k.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\win32k.sys\E87370BB9a000\win32k.sys - OK
DBGENG: C:\ProgramData\Dbg\sym\win32k.sys\E87370BB9a000\win32k.sys - Mapped image memory
SYMSRV: BYINDEX: 0x8
C:\ProgramData\Dbg\sym
win32k.pdb
ED706A38659240A066E6FB19B994BAAA1
SYMSRV: PATH: C:\ProgramData\Dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
SYMSRV: RESULT: 0x00000000
DBGHELP: win32k - public symbols
C:\ProgramData\Dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6750
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9357
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8071061143f
READ_ADDRESS: fffff807110fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8071100f330: Unable to get Flags value from nt!KdVersionBlock
fffff8071100f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: fffff684b4830320 -- (.trap 0xfffff684b4830320)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000005 rbx=0000000000000000 rcx=0000000000000000
rdx=7fffffffffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff8071061143f rsp=fffff684b48304b0 rbp=fffff684b4830530
r8=0000000000000000 r9=0000000000000001 r10=fffff88000336030
r11=0000000000000010 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiAllocateWsle+0x2af:
fffff807`1061143f 488b01 mov rax,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
fffff684`b48301d8 fffff807`10807769 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff684`b48301e0 fffff807`10803a69 : 00000000`00000002 00000000`0000003f fffffb80`00010188 fffff807`10624232 : nt!KiBugCheckDispatch+0x69
fffff684`b4830320 fffff807`1061143f : 00000000`00000000 00000000`00000001 00000000`00000000 fffff807`11050b40 : nt!KiPageFault+0x469
fffff684`b48304b0 fffff807`10610cae : ffffaa81`5f3e29c0 ffffce80`f2017358 00000000`00000000 ffffaa81`5f3e2340 : nt!MiAllocateWsle+0x2af
fffff684`b4830570 fffff807`1060fcf7 : fffff684`b4830830 00000000`00000000 00000000`00000001 00000000`00000001 : nt!MiCompletePrivateZeroFault+0xf8e
fffff684`b48306b0 fffff807`1060a7c0 : fffff684`b4830830 00000000`00000001 00000000`00000000 00000000`00000000 : nt!MiResolvePrivateZeroFault+0x707
fffff684`b48307e0 fffff807`1060d44d : fffff684`b4830a20 fffff684`b4830960 fffff684`b4830968 fffff684`b4830978 : nt!MiZeroFault+0x380
fffff684`b48308d0 fffff807`1060c6ca : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiUserFault+0x80d
fffff684`b4830960 fffff807`1080395e : ffffaa81`5dba6080 ffffaa81`5a959080 00000000`00000000 ffffaa81`00000000 : nt!MmAccessFault+0x16a
fffff684`b4830b00 00007ffd`66df432e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000014`6f5ff0a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`66df432e
SYMBOL_NAME: nt!MiAllocateWsle+2af
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 2af
FAILURE_BUCKET_ID: AV_nt!MiAllocateWsle
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7b714ea2-5649-7449-e159-c52cb54d5cc2}
Followup: MachineOwner
---------