*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8010b0266f7, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3061
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 14774
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: th1
Key : WER.OS.Timestamp
Value: 2017-06-02T23:40:00Z
Key : WER.OS.Version
Value: 10.0.10240.17443
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 20
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8010b0266f7
WRITE_ADDRESS: fffff8010b3d5500: Unable to get MiVisibleState
fffff8010b31ae80: Unable to get Flags value from nt!KdVersionBlock
0000000000000020
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
DPC_STACK_BASE: FFFFD000A96EAFB0
TRAP_FRAME: ffffd000a96eaa80 -- (.trap 0xffffd000a96eaa80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000578610a3e38 rbx=0000000000000000 rcx=0000000000000000
rdx=0000057800000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8010b0266f7 rsp=ffffd000a96eac10 rbp=ffffd000a96ead10
r8=0000000000000000 r9=0000000000000000 r10=ffffe001dedb0ec8
r11=ffffd000a96eae60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiExecuteAllDpcs+0x267:
fffff801`0b0266f7 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope
STACK_TEXT:
ffffd000`a96ea938 fffff801`0b16bfa9 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`a96ea940 fffff801`0b16a7c8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd000`a96eaa80 fffff801`0b0266f7 : ffffd000`a96ead10 00000000`00000001 fffff801`0b32b4e0 fffff801`e6550f44 : nt!KiPageFault+0x248
ffffd000`a96eac10 fffff801`0b025de0 : ffffd000`a96c0180 6e676973`00000000 00000065`72757461 00000000`00000002 : nt!KiExecuteAllDpcs+0x267
ffffd000`a96ead60 fffff801`0b1662c5 : 0064006f`0043005c ffffd000`a96c0180 00000000`00000000 00000000`00000000 : nt!KiRetireDpcList+0xe0
ffffd000`a96eafb0 fffff801`0b1660d0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
ffffd000`205d0a00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
SYMBOL_NAME: nt!KiExecuteAllDpcs+267
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.10240.17443
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 267
FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs
OS_VERSION: 10.0.10240.17443
BUILDLAB_STR: th1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}
Followup: MachineOwner
---------