IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000009076a70c4e, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8014d05446e, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450M GAMING
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/27/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450M GAMING
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: 9076a70c4e
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8014d05446e
READ_ADDRESS: fffff8014d8fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000009076a70c4e
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiRemoveWsle+19104e
fffff801`4d05446e 8b4218 mov eax,dword ptr [rdx+18h]
CPU_COUNT: c
CPU_MHZ: d42
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: chrome.exe
ANALYSIS_SESSION_HOST: DESKTOP-JC78BRD
ANALYSIS_SESSION_TIME: 06-15-2020 15:20:00.0519
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: ffffd28cefcd7870 -- (.trap 0xffffd28cefcd7870)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd28cefcd7a20 rbx=0000000000000000 rcx=ffff950020043870
rdx=0000009076a70c36 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8014d05446e rsp=ffffd28cefcd7a00 rbp=0000024a01732000
r8=0000000000000000 r9=0000000000000000 r10=ffff8ac562b157f8
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!MiRemoveWsle+0x19104e:
fffff801`4d05446e 8b4218 mov eax,dword ptr [rdx+18h] ds:00000090`76a70c4e=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8014cfef929 to fffff8014cfdda20
STACK_TEXT:
ffffd28c`efcd7728 fffff801`4cfef929 : 00000000`0000000a 00000090`76a70c4e 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd28c`efcd7730 fffff801`4cfebc29 : ffffd385`9f0b7490 fffff801`4cf160ef 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd28c`efcd7870 fffff801`4d05446e : ffffd385`abdc49c0 0000024a`01732000 ffffffff`ffffffff ffff8ac5`48e37828 : nt!KiPageFault+0x469
ffffd28c`efcd7a00 fffff801`4ceb428c : ffffd385`abdc49c0 1a000000`bed19867 00000000`00000007 ffffd28c`efcd7c40 : nt!MiRemoveWsle+0x19104e
ffffd28c`efcd7a90 fffff801`4cebadcf : 87000000`9fc02867 87000000`9fc02867 87000000`9fc02867 ffff8ac5`40928058 : nt!MiTerminateWsle+0x13c
ffffd28c`efcd7b40 fffff801`4d266a7b : 00000000`00000001 00000000`057e6460 0a000001`d7123121 7fffffff`ffffffff : nt!MiDecommitPages+0x64f
ffffd28c`efcd86f0 fffff801`4d265f26 : ffffd28c`efcd8a60 00000000`00000000 ffffffff`ffffffff 00000000`00004000 : nt!MiDecommitRegion+0xbb
ffffd28c`efcd8960 fffff801`4d265c05 : 00000000`00000000 000000a4`54bfa538 ffff7d24`93932b89 00000000`00000004 : nt!MmFreeVirtualMemory+0x2e6
ffffd28c`efcd8aa0 fffff801`4cfef378 : ffffd385`aa357080 000000a4`54bfca38 ffffd28c`efcd8b80 ffffd28c`efcd8ad0 : nt!NtFreeVirtualMemory+0x95
ffffd28c`efcd8b00 00007ffc`4560b154 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a4`54bfb448 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`4560b154
THREAD_SHA1_HASH_MOD_FUNC: e685de6f5f6f31adc2168553e86df1abcbeded24
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: db07fbc4dea7778d2ba6a4e594f7c468a4580592
THREAD_SHA1_HASH_MOD: bc100a5647b828107ac4e18055e00abcbe1ec406
FOLLOWUP_IP:
nt!MiRemoveWsle+19104e
fffff801`4d05446e 8b4218 mov eax,dword ptr [rdx+18h]
FAULT_INSTR_CODE: 8318428b
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiRemoveWsle+19104e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.19041.329
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 19104e
FAILURE_BUCKET_ID: AV_nt!MiRemoveWsle
BUCKET_ID: AV_nt!MiRemoveWsle
PRIMARY_PROBLEM_CLASS: AV_nt!MiRemoveWsle
TARGET_TIME: 2020-06-14T13:45:08.000Z
OSBUILD: 19041
OSSERVICEPACK: 329
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 191206-1406
BUILDLAB_STR: vb_release
BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406
ANALYSIS_SESSION_ELAPSED_TIME: 193a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!miremovewsle
FAILURE_ID_HASH: {0d092821-1589-e461-e895-d4070ef18c77}
Followup: MachineOwner
---------