******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 00000000000000e8, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff806670357e7, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 1 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-CS068K2 Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 1 Key : Analysis.Memory.CommitPeak.Mb Value: 86 Key : Analysis.System Value: CreateObject TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b DUMP_FILE_ATTRIBUTES: 0x808 Kernel Generated Triage Dump BUGCHECK_CODE: a BUGCHECK_P1: e8 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff806670357e7 WRITE_ADDRESS: fffff80667b1c468: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff80667a099b8: Unable to get Flags value from nt!KdVersionBlock fffff80667a099b8: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse 00000000000000e8 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: OP.GG.exe TRAP_FRAME: ffff8d062371d9c0 -- (.trap 0xffff8d062371d9c0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000001 rbx=0000000000000000 rcx=00000000000000e8 rdx=007051f200009036 rsi=0000000000000000 rdi=0000000000000000 rip=fffff806670357e7 rsp=ffff8d062371db50 rbp=7fffffffffffff11 r8=0000000000000001 r9=0000000000000001 r10=0000000000000032 r11=0000003fffffffff r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!ExAcquireSpinLockExclusiveAtDpcLevel+0x27: fffff806`670357e7 f00fba291f lock bts dword ptr [rcx],1Fh ds:00000000`000000e8=???????? Resetting default scope STACK_TEXT: ffff8d06`2371d878 fffff806`6723eaa9 : 00000000`0000000a 00000000`000000e8 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx ffff8d06`2371d880 fffff806`6723a134 : 00000000`00000000 00000000`00000000 ffff8000`15f9f988 fffff806`67a6c218 : nt!KiBugCheckDispatch+0x69 ffff8d06`2371d9c0 fffff806`670357e7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x474 ffff8d06`2371db50 fffff806`67126c53 : 00000000`007051f2 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExAcquireSpinLockExclusiveAtDpcLevel+0x27 ffff8d06`2371db80 fffff806`670eab5e : fffff806`67a6afc0 00000000`00000001 ffff8000`00000001 ffffa18f`00000001 : nt!MiReleasePageFileInfo+0x14f ffff8d06`2371dbf0 fffff806`670e7207 : fffffe26`00000000 00000000`00000000 ffff8d06`2371dd11 ffffa18f`00000001 : nt!MiDeleteTransitionPte+0x2ae ffff8d06`2371dc80 fffff806`67066798 : 00000000`004d4ec3 fffff806`6706a3fe ffff8000`00000001 ffff8d06`00000001 : nt!MiTryDeleteTransitionPte+0x3b ffff8d06`2371dcb0 fffff806`67069275 : ffff8d06`2371e390 00000000`00000000 00000000`00000005 ffff8d06`2371e200 : nt!MiDeletePteRun+0xaa8 ffff8d06`2371deb0 fffff806`6705bed8 : 00000000`00000000 ffffa18f`15124740 ffff8d06`2371e2e0 00000000`00000000 : nt!MiDeleteVaTail+0x55 ffff8d06`2371dee0 fffff806`6705bacd : fffffe26`00000000 00000000`00000000 00000000`00000000 ffffa18f`15124740 : nt!MiWalkPageTablesRecursively+0xd38 ffff8d06`2371df70 fffff806`6705bacd : fffffe7f`00000000 00000000`00000000 00000000`00000001 ffffa18f`15124740 : nt!MiWalkPageTablesRecursively+0x92d ffff8d06`2371e000 fffff806`6705bacd : fffffe7f`00000000 00000000`00000000 00000000`00000002 ffffa18f`15124740 : nt!MiWalkPageTablesRecursively+0x92d ffff8d06`2371e090 fffff806`6707eb91 : 00000000`00000000 ffffa18f`00000000 00000000`00000003 ffffa18f`15124740 : nt!MiWalkPageTablesRecursively+0x92d ffff8d06`2371e120 fffff806`6706ab77 : ffff8d06`2371e2e0 00001f80`00000001 fffffe00`00000002 ffffa18f`00000000 : nt!MiWalkPageTables+0x371 ffff8d06`2371e220 fffff806`670a6582 : 00000000`00000000 fffff806`670a674d ffff8d06`2371e5e8 ffffa18f`234cc080 : nt!MiDeletePagablePteRange+0x747 ffff8d06`2371e550 fffff806`674cb6c8 : 00000000`00000000 00000000`00000001 00000000`00000000 ffff8d06`2371e620 : nt!MiDeleteVirtualAddresses+0x52 ffff8d06`2371e5a0 fffff806`674fbd96 : ffffa18f`151240c0 ffffa18f`1a4d0220 ffffa18f`00000000 00000000`00000000 : nt!MiDeleteVad+0x1a8 ffff8d06`2371e660 fffff806`674fb8fd : ffffa18f`3751e330 ffffa18f`3751e330 ffffa18f`3751e330 ffffa18f`151240c0 : nt!MiCleanVad+0x42 ffff8d06`2371e690 fffff806`67545691 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffa18f`151240c0 : nt!MmCleanProcessAddressSpace+0x10d ffff8d06`2371e710 fffff806`674a86e4 : ffffa18f`151240c0 ffffde05`cbe318b0 ffff8d06`2371e939 00000000`00000000 : nt!PspRundownSingleProcess+0xc1 ffff8d06`2371e7a0 fffff806`675e6218 : ffff8000`80000001 ffff8d06`2371ea01 ffffa18f`234cc0f4 00000032`fb8ef000 : nt!PspExitThread+0x63c ffff8d06`2371e8a0 fffff806`6701b557 : 0000445a`00274080 00000000`00000004 ffff8d06`2371eae0 fffffe22`2d0013a0 : nt!KiSchedulerApcTerminate+0x38 ffff8d06`2371e8e0 fffff806`6722f5a0 : 0000445a`00273001 ffff8d06`2371e9a0 00000000`00000000 fffff806`67057652 : nt!KiDeliverApc+0x4a7 ffff8d06`2371e9a0 fffff806`6723e28f : 0000445a`00274000 ffff8d06`2371eb60 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70 ffff8d06`2371eae0 00007fff`0c1aecd4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f 00000032`827ff238 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`0c1aecd4 SYMBOL_NAME: nt!ExAcquireSpinLockExclusiveAtDpcLevel+27 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.22621.1413 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 27 FAILURE_BUCKET_ID: AV_nt!ExAcquireSpinLockExclusiveAtDpcLevel OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {2d838a6f-0e2e-fbf8-f6b6-d687446804d5} Followup: MachineOwner ---------