IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8040dc26aae, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for acdrv.sys
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-JO5OOR3
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 12
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 10
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8040dc26aae
WRITE_ADDRESS: fffff8040e6fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8040e60f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8040e60f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000010
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffffe8c680af5d0 -- (.trap 0xfffffe8c680af5d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000090f6 rbx=0000000000000000 rcx=ffff98818f188180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8040dc26aae rsp=fffffe8c680af760 rbp=fffffe8c680af7f1
r8=0000000000000000 r9=0000000000000001 r10=0000000000000000
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KeWaitForSingleObject+0x18e:
fffff804`0dc26aae f00fba2f07 lock bts dword ptr [rdi],7 ds:00000000`00000000=????????
Resetting default scope
STACK_TEXT:
fffffe8c`680af488 fffff804`0ddef929 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffffe8c`680af490 fffff804`0ddebc29 : 000c4434`0000001b 00000000`00000000 00000000`ffffffff ffff8384`00000000 : nt!KiBugCheckDispatch+0x69
fffffe8c`680af5d0 fffff804`0dc26aae : 00000000`00000f4d 00000000`656e6f4e fffff804`0f0f5479 fffffe8c`680af890 : nt!KiPageFault+0x469
fffffe8c`680af760 fffff804`0f0f50a9 : 00000000`00000010 ffffb18f`00000000 00000000`00000000 00000000`00000000 : nt!KeWaitForSingleObject+0x18e
fffffe8c`680af850 00000000`00000010 : ffffb18f`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : acdrv+0x1750a9
fffffe8c`680af858 ffffb18f`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000200 : 0x10
fffffe8c`680af860 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000200 ffffb18f`2e973d10 : 0xffffb18f`00000000
SYMBOL_NAME: acdrv+1750a9
MODULE_NAME: acdrv
IMAGE_NAME: acdrv.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1750a9
FAILURE_BUCKET_ID: AV_acdrv!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1eff795d-3701-0949-c017-514dede9e1ac}
Followup: MachineOwner
---------