IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8076f476028, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8076a6c333a, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2501
BIOS_DATE: 07/12/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: ROG STRIX B450-F GAMING
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 1
BUGCHECK_P1: fffff8076f476028
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8076a6c333a
READ_ADDRESS: fffff8076f476028
CURRENT_IRQL: e
FAULTING_IP:
nt!RtlDispatchException+28a
fffff807`6a6c333a 488b02 mov rax,qword ptr [rdx]
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-15-2020 22:50:59.0241
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: fffff8076f474ca0 -- (.trap 0xfffff8076f474ca0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000014 rbx=0000000000000000 rcx=0000000000000010
rdx=fffff8076f476028 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8076a6c333a rsp=fffff8076f474e30 rbp=fffff8076f475370
r8=0000000000000003 r9=0000000000000000 r10=00007ffffffeffff
r11=000000006a600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz ac pe nc
nt!RtlDispatchException+0x28a:
fffff807`6a6c333a 488b02 mov rax,qword ptr [rdx] ds:fffff807`6f476028=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8076a7d2ee9 to fffff8076a7c1080
STACK_TEXT:
fffff807`6f474b58 fffff807`6a7d2ee9 : 00000000`0000000a fffff807`6f476028 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
fffff807`6f474b60 fffff807`6a7cf22b : 00000000`00000000 00000000`00000000 00000000`00000000 fffff807`6f474db0 : nt!KiBugCheckDispatch+0x69
fffff807`6f474ca0 fffff807`6a6c333a : fffff807`6f475d68 00000000`00000000 fffff807`6f475370 00007fff`ffff0000 : nt!KiPageFault+0x46b
fffff807`6f474e30 fffff807`6a6c7aee : fffff807`6f475d68 fffff807`6f475ab0 fffff807`6f475d68 ffffcd8f`355db080 : nt!RtlDispatchException+0x28a
fffff807`6f475580 fffff807`6a7d301d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
fffff807`6f475c30 fffff807`6a7cd5ab : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x11d
fffff807`6f475e10 fffff807`6a63dc00 : fffff807`6a7c7d66 fffff807`6f467b50 fffff807`6a5cc0e0 00000000`00000c18 : nt!KiInvalidOpcodeFault+0x32b
fffff807`6f475fa8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInsertTimerTable+0x1b0
THREAD_SHA1_HASH_MOD_FUNC: 04b8e167362e071c8e44de0e658436f319586919
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3f07dd50d56c1059f3379a6d23264c8beff698ac
THREAD_SHA1_HASH_MOD: cb5f414824c2521bcc505eaa03e92fa10922dad8
FOLLOWUP_IP:
nt!RtlDispatchException+28a
fffff807`6a6c333a 488b02 mov rax,qword ptr [rdx]
FAULT_INSTR_CODE: 4b028b48
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!RtlDispatchException+28a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 72ed27e3
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 28a
FAILURE_BUCKET_ID: AV_nt!RtlDispatchException
BUCKET_ID: AV_nt!RtlDispatchException
PRIMARY_PROBLEM_CLASS: AV_nt!RtlDispatchException
TARGET_TIME: 2020-03-15T16:19:47.000Z
OSBUILD: 18362
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2031-02-06 14:47:47
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: f700
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!rtldispatchexception
FAILURE_ID_HASH: {7879d3b2-1b35-bfe6-c98c-04a765231d48}
Followup: MachineOwner
---------