IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8025520c842, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2249
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11139
Key : Analysis.Init.CPU.mSec
Value: 546
Key : Analysis.Init.Elapsed.mSec
Value: 2424
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 120721-8515-01.dmp
BUGCHECK_CODE: a
BUGCHECK_P1: 1
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8025520c842
WORKER_ROUTINE:
+0
00000000`00000001 ?? ???
WORK_ITEM: fffff8025520c842
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: ffffd28e9dfaa530 -- (.trap 0xffffd28e9dfaa530)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=00000000000000e4 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8025520c842 rsp=ffffd28e9dfaa6c0 rbp=0000000000000000
r8=00000001000004d8 r9=ffffa800acdd5180 r10=ffff980b8aa380c0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiSwapThread+0x542:
fffff802`5520c842 488901 mov qword ptr [rcx],rax ds:00000000`00000001=????????????????
Resetting default scope
STACK_TEXT:
ffffd28e`9dfaa3e8 fffff802`55409269 : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd28e`9dfaa3f0 fffff802`55405569 : ffffa800`acdd5180 fffff802`553fe4b2 000f8067`b4bbbdff 00000000`00000001 : nt!KiBugCheckDispatch+0x69
ffffd28e`9dfaa530 fffff802`5520c842 : ffffa800`00000000 00000000`00000000 ffffb988`a4f6e798 fffff802`559b1149 : nt!KiPageFault+0x469
ffffd28e`9dfaa6c0 fffff802`5520bd2f : ffffb988`00000003 fffff802`00000001 00000000`00000001 ffff980b`00000000 : nt!KiSwapThread+0x542
ffffd28e`9dfaa770 fffff802`5520f663 : ffff980b`00000000 ffff980b`00000000 00000000`00000000 00000000`00000001 : nt!KiCommitThreadWait+0x14f
ffffd28e`9dfaa810 fffff802`5520f098 : ffff980b`8d48dbc0 00000000`00000001 ffff980b`92a56bf0 fffff802`00000000 : nt!KeRemoveQueueEx+0x263
ffffd28e`9dfaa8b0 fffff802`556d709d : 00000000`00000000 00000000`00000000 ffffa800`acdd5180 fffff802`55286ada : nt!IoRemoveIoCompletion+0x98
ffffd28e`9dfaa9e0 fffff802`55408cb8 : ffff980b`8d45d080 000000e4`fa3fef28 ffffd28e`9dfaaaa8 000023d4`00090e68 : nt!NtRemoveIoCompletion+0x13d
ffffd28e`9dfaaa90 00007ffb`c490ce94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000e4`fa3fef08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`c490ce94
SYMBOL_NAME: nt!KiPageFault+469
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1348
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 469
FAILURE_BUCKET_ID: AV_nt!KiPageFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ec3e2762-48ae-ffe9-5b16-fbcb853e8320}
Followup: MachineOwner