IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000a417162, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8032deaecd0, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: AB350M-Gaming 3
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F23d
BIOS_DATE: 04/17/2018
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: AB350M-Gaming 3-CF
BASEBOARD_VERSION: x.x
DUMP_TYPE: 1
BUGCHECK_P1: a417162
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8032deaecd0
READ_ADDRESS: 000000000a417162
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiZeroPhysicalPage+40
fffff803`2deaecd0 450fb67d22 movzx r15d,byte ptr [r13+22h]
CPU_COUNT: 4
CPU_MHZ: da5
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: s2_mp64_ship.exe
ANALYSIS_SESSION_HOST: KG2143F
ANALYSIS_SESSION_TIME: 07-17-2018 22:05:54.0690
ANALYSIS_VERSION: 10.0.17134.1 amd64fre
TRAP_FRAME: ffff828e9f176f90 -- (.trap 0xffff828e9f176f90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff828e9f177140 rbx=0000000000000000 rcx=ffff828e9f177160
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8032e3d361f rsp=ffff828e9f177120 rbp=ffff828e9f177239
r8=0000000000000000 r9=0000000000000000 r10=fffff8032e369cd0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!PiDmGetObjectConstraintList+0x5b:
fffff803`2e3d361f 6644892e mov word ptr [rsi],r13w ds:00000000`00000000=????
Resetting default scope
LOCK_ADDRESS: fffff8032e1e1600 -- (!locks fffff8032e1e1600)
Resource @ nt!PnpRegistryDeviceResource (0xfffff8032e1e1600) Exclusively owned
Contention Count = 11316
Threads: ffffce0c2edb8680-01<*>
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff8032e1e1600
Thread Count : 1
Thread address: 0xffffce0c2edb8680
Thread wait : 0x2146dcb
LAST_CONTROL_TRANSFER: from fffff8032dfb5f69 to fffff8032dfa5430
STACK_TEXT:
ffff828e`9f176658 fffff803`2dfb5f69 : 00000000`0000000a 00000000`0a417162 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff828e`9f176660 fffff803`2dfb2be5 : fffff803`2de0d000 00000000`0000005f ffffa90d`e82b5f40 fffff803`2e302bb0 : nt!KiBugCheckDispatch+0x69
ffff828e`9f1767a0 fffff803`2deaecd0 : 00000000`00000200 fffff803`2ce22180 00000000`00000001 fffff803`2e770af2 : nt!KiPageFault+0x425
ffff828e`9f176930 fffff803`2dec0b5c : 00000000`00000001 ffffce0c`0000005c 00000000`00000001 fffffff6`00000000 : nt!MiZeroPhysicalPage+0x40
ffff828e`9f176990 fffff803`2debea80 : 00000000`00000000 ffff828e`9f176c40 ffff828e`9f1771d8 ffff828e`9f176f60 : nt!MiGetPageChain+0x34c
ffff828e`9f176ac0 fffff803`2debe34a : 00000000`00000000 00000000`00000000 ffffffff`ffffffff 00000000`00000000 : nt!MiResolvePrivateZeroFault+0x130
ffff828e`9f176be0 fffff803`2debc17e : fffff803`2e1e6a60 00000000`00000000 00000000`00000000 00000000`00000002 : nt!MiResolveDemandZeroFault+0x20a
ffff828e`9f176cd0 fffff803`2deba42e : 00000001`00000000 00000000`00000002 00000000`c0000016 fffff5fa`fd7ebf58 : nt!MiDispatchFault+0x69e
ffff828e`9f176e20 fffff803`2dfb2ada : 00000000`00000000 ffff828e`9f1771d0 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x21e
ffff828e`9f176f90 fffff803`2e3d361f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x31a
ffff828e`9f177120 fffff803`2e3d35a9 : ffff828e`9f177470 ffffa90d`d0112910 00000000`00000000 00000000`00000000 : nt!PiDmGetObjectConstraintList+0x5b
ffff828e`9f177190 fffff803`2e3d34c5 : 00000000`00000000 00000000`00000000 ffffce0c`2edb8680 fffff803`2deaf544 : nt!PiDmGetCmObjectConstraintListFromCache+0x6d
ffff828e`9f177200 fffff803`2e369e9d : ffffa90d`d0112910 ffff828e`9f177470 00000000`c0000016 fffff803`2e36c296 : nt!PiPnpRtlGetFilteredDeviceInterfaceList+0x95
ffff828e`9f1772a0 fffff803`2e361f31 : 00000000`00002000 fffff803`2de0d000 ffffbe01`10519000 ffff828e`9f177608 : nt!PiPnpRtlCmActionCallback+0x1cd
ffff828e`9f177410 fffff803`2e362637 : 00000000`00000000 ffff828e`00000000 ffff828e`20207050 ffff828e`9f177630 : nt!_CmGetMatchingFilteredDeviceInterfaceList+0xdd
ffff828e`9f177530 fffff803`2e361d83 : fffff80a`3f9a9501 ffff828e`9f177970 00000000`00000000 ffff828e`9f177778 : nt!IopGetDeviceInterfaces+0x26f
ffff828e`9f177700 fffff803`2e36f5a8 : ffffa90d`d880f5b0 fffff803`2e30f502 ffff828e`9f177918 00000000`00000000 : nt!PiCMGetDeviceInterfaceList+0xf7
ffff828e`9f177800 fffff803`2e36f3d3 : ce0c3762`36e0aa95 00000000`00120089 ffff8f3a`955bc7e5 00000000`00000000 : nt!PiCMHandleIoctl+0x1b8
ffff828e`9f177840 fffff803`2e36f36a : 00000000`00008014 00000000`00000000 ffffce0c`337d0080 00000000`00000000 : nt!PiCMFastIoDeviceDispatch+0x53
ffff828e`9f177890 fffff803`2e30ff5b : 00000000`0000005c 00000000`0000004f ffffa90d`d880f5b0 00000000`00000000 : nt!PiDaFastIoDispatch+0x6a
ffff828e`9f1778f0 fffff803`2e3109d6 : ffffce0c`2edb8680 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x39b
ffff828e`9f177a20 fffff803`2dfb5a43 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000084 : nt!NtDeviceIoControlFile+0x56
ffff828e`9f177a90 00007ffb`fc209f94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000060`9037ee08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`fc209f94
THREAD_SHA1_HASH_MOD_FUNC: d7608e5ea3b4e6c741e1477b6b0e60cf6ca8d0f8
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0019eb57dfd2f61226f473c92db6fad58e137c5e
THREAD_SHA1_HASH_MOD: cbd6d858ece2492ed52a5625660f550734be73dc
FOLLOWUP_IP:
nt!MiZeroPhysicalPage+40
fffff803`2deaecd0 450fb67d22 movzx r15d,byte ptr [r13+22h]
FAULT_INSTR_CODE: 7db60f45
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiZeroPhysicalPage+40
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5b3f12f4
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 40
FAILURE_BUCKET_ID: AV_nt!MiZeroPhysicalPage
BUCKET_ID: AV_nt!MiZeroPhysicalPage
PRIMARY_PROBLEM_CLASS: AV_nt!MiZeroPhysicalPage
TARGET_TIME: 2018-07-17T19:45:11.000Z
OSBUILD: 17134
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2018-07-06 07:57:56
BUILDDATESTAMP_STR: 180410-1804
BUILDLAB_STR: rs4_release
BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804
ANALYSIS_SESSION_ELAPSED_TIME: 1a4f
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!mizerophysicalpage
FAILURE_ID_HASH: {830d9ba1-5b55-aca7-94fa-65b6da5d536b}
Followup: MachineOwner
---------
0: kd> lmvm nt
Browse full module list
start end module name
fffff803`2de0d000 fffff803`2e76e000 nt (pdb symbols) c:\temp\ntkrnlmp.pdb\311A83B581114CD0BEB21F065438BFAA1\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Timestamp: Thu Jul 5 23:57:56 2018 (5B3F12F4)
CheckSum: 008C6682
ImageSize: 00961000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
______________________________________________________________________
I don't really know what I'm doing, any help would be really appreciated my dudes
thanks
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000a417162, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8032deaecd0, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: AB350M-Gaming 3
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F23d
BIOS_DATE: 04/17/2018
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: AB350M-Gaming 3-CF
BASEBOARD_VERSION: x.x
DUMP_TYPE: 1
BUGCHECK_P1: a417162
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8032deaecd0
READ_ADDRESS: 000000000a417162
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiZeroPhysicalPage+40
fffff803`2deaecd0 450fb67d22 movzx r15d,byte ptr [r13+22h]
CPU_COUNT: 4
CPU_MHZ: da5
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: s2_mp64_ship.exe
ANALYSIS_SESSION_HOST: KG2143F
ANALYSIS_SESSION_TIME: 07-17-2018 22:05:54.0690
ANALYSIS_VERSION: 10.0.17134.1 amd64fre
TRAP_FRAME: ffff828e9f176f90 -- (.trap 0xffff828e9f176f90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff828e9f177140 rbx=0000000000000000 rcx=ffff828e9f177160
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8032e3d361f rsp=ffff828e9f177120 rbp=ffff828e9f177239
r8=0000000000000000 r9=0000000000000000 r10=fffff8032e369cd0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!PiDmGetObjectConstraintList+0x5b:
fffff803`2e3d361f 6644892e mov word ptr [rsi],r13w ds:00000000`00000000=????
Resetting default scope
LOCK_ADDRESS: fffff8032e1e1600 -- (!locks fffff8032e1e1600)
Resource @ nt!PnpRegistryDeviceResource (0xfffff8032e1e1600) Exclusively owned
Contention Count = 11316
Threads: ffffce0c2edb8680-01<*>
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff8032e1e1600
Thread Count : 1
Thread address: 0xffffce0c2edb8680
Thread wait : 0x2146dcb
LAST_CONTROL_TRANSFER: from fffff8032dfb5f69 to fffff8032dfa5430
STACK_TEXT:
ffff828e`9f176658 fffff803`2dfb5f69 : 00000000`0000000a 00000000`0a417162 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff828e`9f176660 fffff803`2dfb2be5 : fffff803`2de0d000 00000000`0000005f ffffa90d`e82b5f40 fffff803`2e302bb0 : nt!KiBugCheckDispatch+0x69
ffff828e`9f1767a0 fffff803`2deaecd0 : 00000000`00000200 fffff803`2ce22180 00000000`00000001 fffff803`2e770af2 : nt!KiPageFault+0x425
ffff828e`9f176930 fffff803`2dec0b5c : 00000000`00000001 ffffce0c`0000005c 00000000`00000001 fffffff6`00000000 : nt!MiZeroPhysicalPage+0x40
ffff828e`9f176990 fffff803`2debea80 : 00000000`00000000 ffff828e`9f176c40 ffff828e`9f1771d8 ffff828e`9f176f60 : nt!MiGetPageChain+0x34c
ffff828e`9f176ac0 fffff803`2debe34a : 00000000`00000000 00000000`00000000 ffffffff`ffffffff 00000000`00000000 : nt!MiResolvePrivateZeroFault+0x130
ffff828e`9f176be0 fffff803`2debc17e : fffff803`2e1e6a60 00000000`00000000 00000000`00000000 00000000`00000002 : nt!MiResolveDemandZeroFault+0x20a
ffff828e`9f176cd0 fffff803`2deba42e : 00000001`00000000 00000000`00000002 00000000`c0000016 fffff5fa`fd7ebf58 : nt!MiDispatchFault+0x69e
ffff828e`9f176e20 fffff803`2dfb2ada : 00000000`00000000 ffff828e`9f1771d0 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x21e
ffff828e`9f176f90 fffff803`2e3d361f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x31a
ffff828e`9f177120 fffff803`2e3d35a9 : ffff828e`9f177470 ffffa90d`d0112910 00000000`00000000 00000000`00000000 : nt!PiDmGetObjectConstraintList+0x5b
ffff828e`9f177190 fffff803`2e3d34c5 : 00000000`00000000 00000000`00000000 ffffce0c`2edb8680 fffff803`2deaf544 : nt!PiDmGetCmObjectConstraintListFromCache+0x6d
ffff828e`9f177200 fffff803`2e369e9d : ffffa90d`d0112910 ffff828e`9f177470 00000000`c0000016 fffff803`2e36c296 : nt!PiPnpRtlGetFilteredDeviceInterfaceList+0x95
ffff828e`9f1772a0 fffff803`2e361f31 : 00000000`00002000 fffff803`2de0d000 ffffbe01`10519000 ffff828e`9f177608 : nt!PiPnpRtlCmActionCallback+0x1cd
ffff828e`9f177410 fffff803`2e362637 : 00000000`00000000 ffff828e`00000000 ffff828e`20207050 ffff828e`9f177630 : nt!_CmGetMatchingFilteredDeviceInterfaceList+0xdd
ffff828e`9f177530 fffff803`2e361d83 : fffff80a`3f9a9501 ffff828e`9f177970 00000000`00000000 ffff828e`9f177778 : nt!IopGetDeviceInterfaces+0x26f
ffff828e`9f177700 fffff803`2e36f5a8 : ffffa90d`d880f5b0 fffff803`2e30f502 ffff828e`9f177918 00000000`00000000 : nt!PiCMGetDeviceInterfaceList+0xf7
ffff828e`9f177800 fffff803`2e36f3d3 : ce0c3762`36e0aa95 00000000`00120089 ffff8f3a`955bc7e5 00000000`00000000 : nt!PiCMHandleIoctl+0x1b8
ffff828e`9f177840 fffff803`2e36f36a : 00000000`00008014 00000000`00000000 ffffce0c`337d0080 00000000`00000000 : nt!PiCMFastIoDeviceDispatch+0x53
ffff828e`9f177890 fffff803`2e30ff5b : 00000000`0000005c 00000000`0000004f ffffa90d`d880f5b0 00000000`00000000 : nt!PiDaFastIoDispatch+0x6a
ffff828e`9f1778f0 fffff803`2e3109d6 : ffffce0c`2edb8680 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x39b
ffff828e`9f177a20 fffff803`2dfb5a43 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000084 : nt!NtDeviceIoControlFile+0x56
ffff828e`9f177a90 00007ffb`fc209f94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000060`9037ee08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`fc209f94
THREAD_SHA1_HASH_MOD_FUNC: d7608e5ea3b4e6c741e1477b6b0e60cf6ca8d0f8
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0019eb57dfd2f61226f473c92db6fad58e137c5e
THREAD_SHA1_HASH_MOD: cbd6d858ece2492ed52a5625660f550734be73dc
FOLLOWUP_IP:
nt!MiZeroPhysicalPage+40
fffff803`2deaecd0 450fb67d22 movzx r15d,byte ptr [r13+22h]
FAULT_INSTR_CODE: 7db60f45
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiZeroPhysicalPage+40
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5b3f12f4
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 40
FAILURE_BUCKET_ID: AV_nt!MiZeroPhysicalPage
BUCKET_ID: AV_nt!MiZeroPhysicalPage
PRIMARY_PROBLEM_CLASS: AV_nt!MiZeroPhysicalPage
TARGET_TIME: 2018-07-17T19:45:11.000Z
OSBUILD: 17134
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2018-07-06 07:57:56
BUILDDATESTAMP_STR: 180410-1804
BUILDLAB_STR: rs4_release
BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804
ANALYSIS_SESSION_ELAPSED_TIME: 1a4f
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!mizerophysicalpage
FAILURE_ID_HASH: {830d9ba1-5b55-aca7-94fa-65b6da5d536b}
Followup: MachineOwner
---------
0: kd> lmvm nt
Browse full module list
start end module name
fffff803`2de0d000 fffff803`2e76e000 nt (pdb symbols) c:\temp\ntkrnlmp.pdb\311A83B581114CD0BEB21F065438BFAA1\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Timestamp: Thu Jul 5 23:57:56 2018 (5B3F12F4)
CheckSum: 008C6682
ImageSize: 00961000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
______________________________________________________________________
I don't really know what I'm doing, any help would be really appreciated my dudes
thanks