For the past few months i've been having this issue where my PC randomly has a BSOD with either code IRQL_NOT_LESS_OR_EQUAL or KMODE_EXCEPTION_NOT_HANDLED. Before updating to windows 11 i have also stumbled upon the MEMORY_MANAGEMENT error, with the same processes related to them: ntoskrnl.exe or ntkrnlmp.exe. I've tried updating the bios, updating drivers, updating windows, as well as a clean installation. sfc /scannow doesn't show any errors, neither does DISM. When testing using memtest86, no errors are found. I don't know what is causing these errors anymore, i really need help.
CPU: Ryzen 5 2400G
AMD Stock cooler wraith stealth
Motherboard: ASRock A320M-HD P5.40 (initially P4.90 but the issue persists, i don't think i can go beyond 5.40 as ASRock doesn't recommend)
RAM: HyperX Fury 2x8GB 2666MHZ (KHX2666C162/8)
Storage: ST1000DM010-2EP102
GPU: Radeon RX Vega 11
350W PSU
This happens daily, usually when i'm closing an app or when it's just idle. However, it also happens while i'm playing games and it earned me quite a few competitive bans.
I scanned the most recent one. The pc was idle with Valorant and Discord both open, it also happens with discord closed so i don't think discord is the issue as the windbg scan of the full dump file says.
CPU: Ryzen 5 2400G
AMD Stock cooler wraith stealth
Motherboard: ASRock A320M-HD P5.40 (initially P4.90 but the issue persists, i don't think i can go beyond 5.40 as ASRock doesn't recommend)
RAM: HyperX Fury 2x8GB 2666MHZ (KHX2666C162/8)
Storage: ST1000DM010-2EP102
GPU: Radeon RX Vega 11
350W PSU
This happens daily, usually when i'm closing an app or when it's just idle. However, it also happens while i'm playing games and it earned me quite a few competitive bans.
I scanned the most recent one. The pc was idle with Valorant and Discord both open, it also happens with discord closed so i don't think discord is the issue as the windbg scan of the full dump file says.
Code:
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8026d6ebf2a, address which referenced memory
Debugging Details:
------------------
*** WARNING: Check Image - Checksum mismatch - Dump: 0x7dd2, File: 0x159e7 - C:\ProgramData\Dbg\sym\hal.dll\1865382A6000\hal.dll
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4780
Key : Analysis.Elapsed.mSec
Value: 5018
Key : Analysis.IO.Other.Mb
Value: 27
Key : Analysis.IO.Read.Mb
Value: 16
Key : Analysis.IO.Write.Mb
Value: 58
Key : Analysis.Init.CPU.mSec
Value: 14561
Key : Analysis.Init.Elapsed.mSec
Value: 653900
Key : Analysis.Memory.CommitPeak.Mb
Value: 269
Key : Bugcheck.Code.KiBugCheckData
Value: 0xa
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Failure.Bucket
Value: AV_nt!IopQueueThreadIrp
Key : Failure.Hash
Value: {8a586314-907b-ce1a-3426-a00962ec3fac}
Key : Hypervisor.Enlightenments.Value
Value: 0
Key : Hypervisor.Enlightenments.ValueHex
Value: 0
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 0
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 0
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 0
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 0
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 0
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 0
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 0
Key : Hypervisor.Flags.Phase0InitDone
Value: 0
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 0
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 16777216
Key : Hypervisor.Flags.ValueHex
Value: 1000000
Key : Hypervisor.Flags.VpAssistPage
Value: 0
Key : Hypervisor.Flags.VsmAvailable
Value: 0
Key : Hypervisor.RootFlags.AccessStats
Value: 0
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 0
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 0
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 0
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 0
Key : Hypervisor.RootFlags.MceEnlightened
Value: 0
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 0
Key : Hypervisor.RootFlags.Value
Value: 0
Key : Hypervisor.RootFlags.ValueHex
Value: 0
Key : SecureKernel.HalpHvciEnabled
Value: 0
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: a
BUGCHECK_P1: 8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8026d6ebf2a
FILE_IN_CAB: MEMORY.DMP
READ_ADDRESS: 0000000000000008
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: Discord.exe
TRAP_FRAME: ffffd68c513b0c70 -- (.trap 0xffffd68c513b0c70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffc68b2a4c5080
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026d6ebf2a rsp=ffffd68c513b0e08 rbp=0000000000000000
r8=ffffc68b1af61340 r9=0000000000000005 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!IopQueueThreadIrp+0x6a:
fffff802`6d6ebf2a 48397808 cmp qword ptr [rax+8],rdi ds:00000000`00000008=????????????????
Resetting default scope
STACK_TEXT:
ffffd68c`513b0b28 fffff802`6d82c5e9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd68c`513b0b30 fffff802`6d827b34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000fff : nt!KiBugCheckDispatch+0x69
ffffd68c`513b0c70 fffff802`6d6ebf2a : 00000000`1e4ef280 00000000`0010001b ffffc68b`293d88fc 00000000`00000001 : nt!KiPageFault+0x474
ffffd68c`513b0e08 fffff802`6dafa3cf : 00000000`00000000 ffffd68c`513b1370 00000000`00000001 ffffc68b`293d88fc : nt!IopQueueThreadIrp+0x6a
ffffd68c`513b0e38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtQueryInformationFile+0x35f
SYMBOL_NAME: nt!IopQueueThreadIrp+6a
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 6a
FAILURE_BUCKET_ID: AV_nt!IopQueueThreadIrp
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8a586314-907b-ce1a-3426-a00962ec3fac}
Followup: MachineOwner
---------