IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8015e4ed272, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 13
Key : Analysis.Elapsed.Sec
Value: 31
Key : Analysis.Memory.CommitPeak.Mb
Value: 68
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8015e4ed272
READ_ADDRESS: fffff8015e96e3b0: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!RtlpHpLfhOwnerCompact+16
fffff801`5e4ed272 8a02 mov al,byte ptr [rdx]
CPU_COUNT: c
CPU_MHZ: e10
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-I8FA0KP
ANALYSIS_SESSION_TIME: 07-28-2019 00:29:54.0500
ANALYSIS_VERSION: 10.0.18914.1001 amd64fre
TRAP_FRAME: ffff8983c9156880 -- (.trap 0xffff8983c9156880)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe4829e010340
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015e4ed272 rsp=ffff8983c9156a10 rbp=0000000000000000
r8=0000000000000001 r9=ffffe482a92fd03c r10=0000000000000001
r11=ffffe482a92fd038 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!RtlpHpLfhOwnerCompact+0x16:
fffff801`5e4ed272 8a02 mov al,byte ptr [rdx] ds:00000000`00000000=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8015e5ce6e9 to fffff8015e5bc900
STACK_TEXT:
ffff8983`c9156738 fffff801`5e5ce6e9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8983`c9156740 fffff801`5e5caa2b : 00000000`00000001 ffffe482`aa093288 00000000`00cc00cc 0000001b`935fe6c0 : nt!KiBugCheckDispatch+0x69
ffff8983`c9156880 fffff801`5e4ed272 : ffffe482`9e015240 ffffe482`9e010280 00000000`00000001 00000000`00000001 : nt!KiPageFault+0x46b
ffff8983`c9156a10 fffff801`5e4ed226 : ffffe482`9e0105f8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpLfhOwnerCompact+0x16
ffff8983`c9156a70 fffff801`5e4ebdd6 : ffffe482`9e010000 00000000`00000001 ffffe482`9e010280 ffffe482`9e010280 : nt!RtlpHpLfhContextCompact+0xae
ffff8983`c9156ab0 fffff801`5e4ecfa1 : 00000000`00000001 ffffe482`9e010000 ffffe482`9e010000 ffffe482`a9d686d0 : nt!RtlpHpHeapCompact+0x76
ffff8983`c9156ae0 fffff801`5e4c4855 : 00000000`00000001 fffff801`00000000 ffffe482`0000003f 00000000`00000000 : nt!ExpHpCompactionRoutine+0x211
ffff8983`c9156b70 fffff801`5e52f725 : ffffe482`a831d040 00000000`00000080 ffffe482`9f47b040 00020974`00000001 : nt!ExpWorkerThread+0x105
ffff8983`c9156c10 fffff801`5e5c3e6a : ffffb880`ec940180 ffffe482`a831d040 fffff801`5e52f6d0 0001eb2c`000182f8 : nt!PspSystemThreadStartup+0x55
ffff8983`c9156c60 00000000`00000000 : ffff8983`c9157000 ffff8983`c9151000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
THREAD_SHA1_HASH_MOD_FUNC: 01a9027825957fcd117c3251d0aa10a4a0ebc52d
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d2e835cb6aec876b3f1b6d78c72a6cea5cc83395
THREAD_SHA1_HASH_MOD: bc100a5647b828107ac4e18055e00abcbe1ec406
FOLLOWUP_IP:
nt!RtlpHpLfhOwnerCompact+16
fffff801`5e4ed272 8a02 mov al,byte ptr [rdx]
FAULT_INSTR_CODE: 3345028a
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!RtlpHpLfhOwnerCompact+16
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 3ed0f42
IMAGE_VERSION: 10.0.18362.239
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 16
FAILURE_BUCKET_ID: AV_nt!RtlpHpLfhOwnerCompact
BUCKET_ID: AV_nt!RtlpHpLfhOwnerCompact
PRIMARY_PROBLEM_CLASS: AV_nt!RtlpHpLfhOwnerCompact
TARGET_TIME: 2019-07-27T16:40:08.000Z
OSBUILD: 18362
OSSERVICEPACK: 239
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-02-02 11:33:06
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 794e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!rtlphplfhownercompact
FAILURE_ID_HASH: {89d95407-fc92-4aec-6e9e-bc12d8b0795b}
Followup: MachineOwner