*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8017866457e, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2374
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 4988
Key : Analysis.Init.CPU.mSec
Value: 312
Key : Analysis.Init.Elapsed.mSec
Value: 2766
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8017866457e
WRITE_ADDRESS: fffff801790fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: nvsphelper64.exe
TRAP_FRAME: ffff8e083fe217e0 -- (.trap 0xffff8e083fe217e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000e06684 rbx=0000000000000000 rcx=ffffc70151098180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8017866457e rsp=ffff8e083fe21970 rbp=ffff8e083fe21a01
r8=0000000000000001 r9=000000e188fc2ae2 r10=0000000000000000
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KeWaitForSingleObject+0x18e:
fffff801`7866457e f00fba2f07 lock bts dword ptr [rdi],7 ds:00000000`00000000=????????
Resetting default scope
STACK_TEXT:
ffff8e08`3fe21698 fffff801`78807b69 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffff8e08`3fe216a0 fffff801`78803e69 : 00000000`00000001 000000c9`093ffe10 ffff8e08`3fe21b80 fffff801`789f77a9 : nt!KiBugCheckDispatch+0x69
ffff8e08`3fe217e0 fffff801`7866457e : 00000000`00000000 fffff801`78a2b3e1 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffff8e08`3fe21970 fffff801`78a2cb01 : 00000000`00000000 000000c9`00000006 00000000`00000001 ffff8e08`3fe21a00 : nt!KeWaitForSingleObject+0x18e
ffff8e08`3fe21a60 fffff801`78a2cbaa : ffffb68f`4bc8c080 000000c9`093ff7a8 00000000`00000000 000000c9`093ff930 : nt!ObWaitForSingleObject+0x91
ffff8e08`3fe21ac0 fffff801`788075b8 : ffffb68f`4bc8c080 000001f0`00000000 ffff8e08`3fe21b18 ffffffff`ffffd8f0 : nt!NtWaitForSingleObject+0x6a
ffff8e08`3fe21b00 00007ffd`c03ccc94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000c9`093ff778 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`c03ccc94
SYMBOL_NAME: nt!KeWaitForSingleObject+18e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.867
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 18e
FAILURE_BUCKET_ID: AV_nt!KeWaitForSingleObject
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {505415ce-6277-25db-2465-e86127b1616c}
Followup: MachineOwner
---------