IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffaa80000000c0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80027d321df, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3436
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3441
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffaa80000000c0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80027d321df
READ_ADDRESS: fffff800286fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8002860f330: Unable to get Flags value from nt!KdVersionBlock
fffff8002860f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffaa80000000c0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
TRAP_FRAME: ffffa805253a3560 -- (.trap 0xffffa805253a3560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000004 rbx=0000000000000000 rcx=0000000000000010
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80027d321df rsp=ffffa805253a36f0 rbp=ffffa805253a3730
r8=0000000000000000 r9=0000000000000000 r10=0000000000000037
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiCheckPreferredHeteroProcessor+0x4f:
fffff800`27d321df 4c8bbfc0000000 mov r15,qword ptr [rdi+0C0h] ds:00000000`000000c0=????????????????
Resetting default scope
STACK_TEXT:
ffffa805`253a3418 fffff800`27e07769 : 00000000`0000000a ffffaa80`000000c0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffa805`253a3420 fffff800`27e03a69 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa805`253a3560 fffff800`27d321df : ffffa805`253a3710 ffffa805`00000000 00000000`0000003f 00000000`0000003f : nt!KiPageFault+0x469
ffffa805`253a36f0 fffff800`27f1a166 : 00000000`00000000 ffffe683`05f05080 00000000`00000000 00000000`00000000 : nt!KiCheckPreferredHeteroProcessor+0x4f
ffffa805`253a3760 fffff800`27f19fc4 : 00000000`00000004 ffffa805`253a3828 ffffa805`253a3820 ffffaa80`2a667180 : nt!KiSendHeteroRescheduleIntRequestHelper+0x156
ffffa805`253a37f0 fffff800`27e351fe : ffffaa80`ffffffff 00000000`00000000 ffffa805`253a3a00 00000000`00000000 : nt!KiSendHeteroRescheduleIntRequest+0x74
ffffa805`253a3820 fffff800`27c64d7f : ffffe683`00000001 00000000`00000004 ffffa805`253a39e0 00000000`00000000 : nt!KiSwapThread+0x1cfeae
ffffa805`253a38d0 fffff800`27c64623 : ffffe683`000000cf fffff800`00000000 00000000`00040201 ffffe683`00c671c0 : nt!KiCommitThreadWait+0x14f
ffffa805`253a3970 fffff800`2802c6a1 : ffffe683`108c0ae0 00000000`00000006 00000000`00000001 ffffe683`00000000 : nt!KeWaitForSingleObject+0x233
ffffa805`253a3a60 fffff800`2802c74a : ffffe683`00c67080 00000000`00000000 00000000`00000000 00000000`1e10f894 : nt!ObWaitForSingleObject+0x91
ffffa805`253a3ac0 fffff800`27e071b8 : ffffe683`00c67080 ffffe682`fdd64080 ffffa805`253a3b18 ffffffff`ffff3cb0 : nt!NtWaitForSingleObject+0x6a
ffffa805`253a3b00 00000000`77141cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`1703ebc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77141cfc
SYMBOL_NAME: nt!KiCheckPreferredHeteroProcessor+4f
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.746
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4f
FAILURE_BUCKET_ID: AV_nt!KiCheckPreferredHeteroProcessor
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {068240a0-d6bc-90c5-8c43-0941c938c453}
Followup: MachineOwner
---------