- May 11, 2021
- 1
- 0
- 0
I am getting a blue screen of death with stop code IRQL_NOT_LESS_OR_EQUAL. At first I got 3 BSoD's with stop code MEMORY_MANAGEMENT, but after taking out the RAM and putting them back in to reset them it is now a different stop code(IRQL_NOT_LESS_OR_EQUAL).It happens when I'm playing a game but that's pretty much what I'm always doing on my pc. I've had my pc for about 3 years, I recently completely reset my pc because of games crashing but did not make any hardware changes for a while. I don't remember if it blue screened at all before the complete reset but different games were crashing so I assumed the pc could use a reset. Not sure what information I need to provide but I have pc parts, and pasted the minidump analyzation. Any help is much appreciated and if you need any more info just let me know.
GPU: EVGA RTX 2070
CPU: i7-8700k
RAM: Corsair Vengeance LPX 16GB(8x2)
SSD: Samsung 860 EVO 500GB
SSD: Sabrent Rocket Q 1TB NVMe M.2
MOBO: MSI Z370 Krait Gaming ATX
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000034, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80080b0ae41, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3031
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 4513
Key : Analysis.Init.CPU.mSec
Value: 280
Key : Analysis.Init.Elapsed.mSec
Value: 2119
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: 34
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80080b0ae41
READ_ADDRESS: fffff800814fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000034
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: ffffb48db9baf280 -- (.trap 0xffffb48db9baf280)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb48db9baf438 rbx=0000000000000000 rcx=ffff900c96767160
rdx=ffffc98949376ae8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80080b0ae41 rsp=ffffb48db9baf410 rbp=ffffc9094933cdb8
r8=ffffb48db9baf518 r9=ffffb48db9baf514 r10=fffff2793c9e47f8
r11=fffff2793c9e4000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiGetImageProtoProtection+0x51:
fffff800`80b0ae41 8b4b34 mov ecx,dword ptr [rbx+34h] ds:00000000`00000034=????????
Resetting default scope
STACK_TEXT:
ffffb48d`b9baf138 fffff800`80c07d69 : 00000000`0000000a 00000000`00000034 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffb48d`b9baf140 fffff800`80c04069 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffb48d`b9baf280 fffff800`80b0ae41 : 00000000`00000000 ffff900c`863e4700 fffff279`1fff1728 ffffb48d`b9baf5c0 : nt!KiPageFault+0x469
ffffb48d`b9baf410 fffff800`80a1ffc8 : 00000000`00000380 ffffc909`4933cdb8 fffff23f`fe2e5038 c9096933`cdb80400 : nt!MiGetImageProtoProtection+0x51
ffffb48d`b9baf440 fffff800`80a1e9c5 : 00000000`00000000 00000000`00000000 ffffb48d`b9baf518 ffffb48d`b9baf514 : nt!MiGetPageProtection+0x6a8
ffffb48d`b9baf4c0 fffff800`80aa4895 : 00000000`00000022 ffffb48d`b9baf748 00007ffc`5ca00000 fffff800`80a5e7ab : nt!MiQueryAddressState+0x4b5
ffffb48d`b9baf6d0 fffff800`80e3524c : ffffb48d`b9ba0000 00000000`00000000 ffff900c`00000003 ffff900c`00000000 : nt!MiQueryAddressSpan+0x175
ffffb48d`b9baf790 fffff800`80e349f5 : ffff2db0`c3640d9a 00000000`00000000 00007ffc`59850000 00000000`00000000 : nt!MmQueryVirtualMemory+0x83c
ffffb48d`b9baf940 fffff800`80c077b5 : 000001de`00000000 00000000`00000001 00000000`00000105 ffffb48d`b9bafa80 : nt!NtQueryVirtualMemory+0x25
ffffb48d`b9baf990 00007ffd`1c0cd184 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000007d`4a5fde98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`1c0cd184
SYMBOL_NAME: nt!MiGetImageProtoProtection+51
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 51
FAILURE_BUCKET_ID: AV_nt!MiGetImageProtoProtection
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7b3c290c-72a7-7f7b-53ac-dca820030305}
Followup: MachineOwner
GPU: EVGA RTX 2070
CPU: i7-8700k
RAM: Corsair Vengeance LPX 16GB(8x2)
SSD: Samsung 860 EVO 500GB
SSD: Sabrent Rocket Q 1TB NVMe M.2
MOBO: MSI Z370 Krait Gaming ATX
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000034, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80080b0ae41, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3031
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 4513
Key : Analysis.Init.CPU.mSec
Value: 280
Key : Analysis.Init.Elapsed.mSec
Value: 2119
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: 34
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80080b0ae41
READ_ADDRESS: fffff800814fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000034
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: ffffb48db9baf280 -- (.trap 0xffffb48db9baf280)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb48db9baf438 rbx=0000000000000000 rcx=ffff900c96767160
rdx=ffffc98949376ae8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80080b0ae41 rsp=ffffb48db9baf410 rbp=ffffc9094933cdb8
r8=ffffb48db9baf518 r9=ffffb48db9baf514 r10=fffff2793c9e47f8
r11=fffff2793c9e4000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiGetImageProtoProtection+0x51:
fffff800`80b0ae41 8b4b34 mov ecx,dword ptr [rbx+34h] ds:00000000`00000034=????????
Resetting default scope
STACK_TEXT:
ffffb48d`b9baf138 fffff800`80c07d69 : 00000000`0000000a 00000000`00000034 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffb48d`b9baf140 fffff800`80c04069 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffb48d`b9baf280 fffff800`80b0ae41 : 00000000`00000000 ffff900c`863e4700 fffff279`1fff1728 ffffb48d`b9baf5c0 : nt!KiPageFault+0x469
ffffb48d`b9baf410 fffff800`80a1ffc8 : 00000000`00000380 ffffc909`4933cdb8 fffff23f`fe2e5038 c9096933`cdb80400 : nt!MiGetImageProtoProtection+0x51
ffffb48d`b9baf440 fffff800`80a1e9c5 : 00000000`00000000 00000000`00000000 ffffb48d`b9baf518 ffffb48d`b9baf514 : nt!MiGetPageProtection+0x6a8
ffffb48d`b9baf4c0 fffff800`80aa4895 : 00000000`00000022 ffffb48d`b9baf748 00007ffc`5ca00000 fffff800`80a5e7ab : nt!MiQueryAddressState+0x4b5
ffffb48d`b9baf6d0 fffff800`80e3524c : ffffb48d`b9ba0000 00000000`00000000 ffff900c`00000003 ffff900c`00000000 : nt!MiQueryAddressSpan+0x175
ffffb48d`b9baf790 fffff800`80e349f5 : ffff2db0`c3640d9a 00000000`00000000 00007ffc`59850000 00000000`00000000 : nt!MmQueryVirtualMemory+0x83c
ffffb48d`b9baf940 fffff800`80c077b5 : 000001de`00000000 00000000`00000001 00000000`00000105 ffffb48d`b9bafa80 : nt!NtQueryVirtualMemory+0x25
ffffb48d`b9baf990 00007ffd`1c0cd184 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000007d`4a5fde98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`1c0cd184
SYMBOL_NAME: nt!MiGetImageProtoProtection+51
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 51
FAILURE_BUCKET_ID: AV_nt!MiGetImageProtoProtection
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7b3c290c-72a7-7f7b-53ac-dca820030305}
Followup: MachineOwner