IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000018, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8067b9fb6f8, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5374
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8083
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 18
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8067b9fb6f8
WRITE_ADDRESS: fffff8067c2fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8067c20f340: Unable to get Flags value from nt!KdVersionBlock
fffff8067c20f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000018
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff80681e6ba90 -- (.trap 0xfffff80681e6ba90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8067b9fb6f8 rsp=fffff80681e6bc20 rbp=000f8067b4bbbdff
r8=0000000000000028 r9=0000086fa0e0f801 r10=0000000000000048
r11=fffff80681e6bc30 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!SwapContext+0xf8:
fffff806`7b9fb6f8 0fae5918 stmxcsr dword ptr [rcx+18h] ds:00000000`00000018=????????
Resetting default scope
BAD_STACK_POINTER: fffff80681e6b948
STACK_TEXT:
fffff806`81e6b948 fffff806`7ba06569 : 00000000`0000000a 00000000`00000018 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff806`81e6b950 fffff806`7ba02869 : fffff806`7b9f0690 fffff806`7b87460a 00000000`00000001 fffff806`7b600000 : nt!KiBugCheckDispatch+0x69
fffff806`81e6ba90 fffff806`7b9fb6f8 : fffff806`79f43180 00000000`001a6550 fffff806`81e60000 ffff9384`11e87040 : nt!KiPageFault+0x469
fffff806`81e6bc20 fffff806`7b9f81e6 : 00000000`00000000 fffff806`79f43180 fffff806`7c327600 ffff9384`1d28b080 : nt!SwapContext+0xf8
fffff806`81e6bc60 00000000`00000000 : fffff806`81e6c000 fffff806`81e66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x176
SYMBOL_NAME: nt!SwapContext+f8
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: f8
FAILURE_BUCKET_ID: AV_STACKPTR_ERROR_nt!SwapContext
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a673eb48-d3c6-1b05-1d3c-a271b7506fbf}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000005, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80045ee2c29, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5983
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6041
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 5
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80045ee2c29
READ_ADDRESS: fffff800468fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8004680f340: Unable to get Flags value from nt!KdVersionBlock
fffff8004680f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000005
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: explorer.exe
TRAP_FRAME: fffff3027674f380 -- (.trap 0xfffff3027674f380)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe28edca07218 rbx=0000000000000000 rcx=ffffe28edca07218
rdx=ffffe28edc8a5388 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80045ee2c29 rsp=fffff3027674f510 rbp=0000000000000000
r8=ffffe28edca07218 r9=fffff3027674f750 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KeRemoveQueueEx+0x89:
fffff800`45ee2c29 41396a04 cmp dword ptr [r10+4],ebp ds:00000000`00000005=????????
Resetting default scope
STACK_TEXT:
fffff302`7674f238 fffff800`46006569 : 00000000`0000000a 00000000`00000005 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff302`7674f240 fffff800`46002869 : 00000001`ffffffff fffffff6`0000000d 00000000`00000006 00000008`00000002 : nt!KiBugCheckDispatch+0x69
fffff302`7674f380 fffff800`45ee2c29 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
fffff302`7674f510 fffff800`45ee2838 : ffffe28e`dca07200 00000000`00000000 ffffe28e`dc86a080 ffffcf81`00000001 : nt!KeRemoveQueueEx+0x89
fffff302`7674f5b0 fffff800`462f17ae : 0000000a`7674f704 00000000`00000000 ffffcf81`493d2180 00000000`00000000 : nt!IoRemoveIoCompletion+0x98
fffff302`7674f6e0 fffff800`46005fb8 : fffff302`7674fa48 ffffe28e`d7984080 fffff302`7674f910 fffff302`7674f838 : nt!NtRemoveIoCompletionEx+0xfe
fffff302`7674f820 fffff800`45ff8400 : ffff9839`3efc5d2c 00000000`032c50e0 ffff984f`850ec190 ffff984f`850ec010 : nt!KiSystemServiceCopyEnd+0x28
fffff302`7674fa28 ffff9839`3efc5d2c : 00000000`032c50e0 ffff984f`850ec190 ffff984f`850ec010 00000000`00000a44 : nt!KiServiceLinkage
fffff302`7674fa30 ffff9839`3f6f63ed : ffffe28e`00000000 00000000`00000000 00000000`00000020 00000000`00000000 : win32kfull!NtUserGetQueueStatusReadonly+0x17c
fffff302`7674fad0 fffff800`46005fb8 : ffffe28e`d7984080 ffffe28e`dc9b2e60 00000000`00000000 fffff302`7674fb80 : win32k!NtUserGetQueueStatusReadonly+0x15
fffff302`7674fb00 00007ff9`251c96a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0544f6b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`251c96a4
SYMBOL_NAME: win32kfull!NtUserGetQueueStatusReadonly+17c
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 17c
FAILURE_BUCKET_ID: AV_win32kfull!NtUserGetQueueStatusReadonly
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {28c827f6-0270-ec3e-9988-fba419b7deef}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80139b2a0de, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4921
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8019
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80139b2a0de
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff8013a4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8013a40f340: Unable to get Flags value from nt!KdVersionBlock
fffff8013a40f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
EXCEPTION_PARAMETER2: ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: 384c100f18384410 -- (.trap 0x384c100f18384410)
Unable to read trap frame at 384c100f`18384410
BAD_STACK_POINTER: ffffce016acbe158
STACK_TEXT:
ffffce01`6acbe158 fffff801`39cf465e : 00000000`0000001e ffffffff`c0000005 fffff801`39b2a0de 00000000`00000000 : nt!KeBugCheckEx
ffffce01`6acbe160 fffff801`39bfd462 : fffff801`39cf463c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffffce01`6acbe1a0 fffff801`39a52d97 : ffffce01`6acbe710 00000000`00000000 fffff405`b8c37c60 fffff801`39bf80c4 : nt!RtlpExecuteHandlerForException+0x12
ffffce01`6acbe1d0 fffff801`39a519a6 : fffff405`b8c373f8 ffffce01`6acbee20 fffff405`b8c373f8 fffff780`00000008 : nt!RtlDispatchException+0x297
ffffce01`6acbe8f0 fffff801`39bf5432 : 58c16b49`000d6402 0f000000`01e745c7 384c100f`18384410 110f0838`54100f28 : nt!KiDispatchException+0x186
ffffce01`6acbefb0 fffff801`39bf5400 : fffff801`39c066a5 00000000`00000000 00000000`00000001 ffffde08`436fc710 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff405`b8c372b8 fffff801`39c066a5 : 00000000`00000000 00000000`00000001 ffffde08`436fc710 00000000`1ef33dea : nt!KiExceptionDispatchOnExceptionStackContinue
fffff405`b8c372c0 fffff801`39c023e0 : 00000000`00000000 fffff405`b8c37500 00000000`00000103 00000000`00000000 : nt!KiExceptionDispatch+0x125
fffff405`b8c374a0 fffff801`39b2a0de : 00000000`00000000 fffff801`3ec096af ffffde08`3d3f6240 fffff801`4d2519c7 : nt!KiGeneralProtectionFault+0x320
fffff405`b8c37630 fffff801`39b29d20 : 00000000`00000000 00000000`00000000 00000000`00000cfd 00000000`00000000 : nt!KiCheckForTimerExpiration+0xe
fffff405`b8c376c0 fffff801`39b29397 : 00000000`00000045 0000003c`a99b418f 00000000`00000000 ffffde08`3f0d9010 : nt!KeAccumulateTicks+0x30
fffff405`b8c37720 fffff801`39b28884 : 00000000`00000000 00001f80`00a5003b 00000000`001b8012 00000000`00000002 : nt!PpmIdleExecuteTransition+0x997
fffff405`b8c37af0 fffff801`39bf80c4 : ffffffff`00000000 ffffce01`6aca9340 ffffde08`3d8083c0 00000000`0000070e : nt!PoIdle+0x374
fffff405`b8c37c60 00000000`00000000 : fffff405`b8c38000 fffff405`b8c32000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME: nt!KiCheckForTimerExpiration+e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: e
FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_nt!KiCheckForTimerExpiration
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {63d4c396-b01c-cff5-417a-ee278b71911a}
Followup: MachineOwner
---------