IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000040000010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8075f818175, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 6
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-8JQ6G9V
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 19
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 40000010
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8075f818175
READ_ADDRESS: fffff8075fd733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8075fc2a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8075fc2a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000040000010
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffa409c0626790 -- (.trap 0xffffa409c0626790)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff8f8f2dc38a10
rdx=ffff8f8f2f974bb0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8075f818175 rsp=ffffa409c0626920 rbp=ffffe500a4ff1000
r8=ffff8f8f2f974a70 r9=ffff8f8f2dc38a10 r10=ffff8f8f35455630
r11=ffff8f8f2dc38a10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!RtlAvlRemoveNode+0x305:
fffff807`5f818175 4c394f10 cmp qword ptr [rdi+10h],r9 ds:00000000`00000010=????????????????
Resetting default scope
STACK_TEXT:
ffffa409`c0626648 fffff807`5f9d30e9 : 00000000`0000000a 00000000`40000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffa409`c0626650 fffff807`5f9cf42b : 00000000`00000000 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa409`c0626790 fffff807`5f818175 : 00000000`00000000 ffff8f8f`355bc950 fffff807`5fc6ab08 fffff807`5fc6a480 : nt!KiPageFault+0x46b
ffffa409`c0626920 fffff807`5f855b0a : 00000000`00000000 ffffe500`a4ff1000 00000000`00000002 ffff8f8f`2f974a70 : nt!RtlAvlRemoveNode+0x305
ffffa409`c0626970 fffff807`5f922135 : 00000000`00000200 00000000`00000000 ffffe500`a4ff1000 fffff807`5fc6a980 : nt!MiUpdateSystemProtoPtesTree+0xaa
ffffa409`c06269a0 fffff807`5f98f148 : 00000000`00000002 fffff807`5fc6ab50 fffff807`5fc6a9a0 fffff807`5fc6a480 : nt!MiDeleteEmptySubsections+0x75
ffffa409`c06269e0 fffff807`5f92a725 : ffff8f8f`272e9480 ffff8f8f`272e9480 00000000`00000080 fffff807`5f98f040 : nt!MiDereferenceSegmentThread+0x108
ffffa409`c0626c10 fffff807`5f9c886a : ffffd101`d3856180 ffff8f8f`272e9480 fffff807`5f92a6d0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffa409`c0626c60 00000000`00000000 : ffffa409`c0627000 ffffa409`c0621000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
SYMBOL_NAME: nt!RtlAvlRemoveNode+305
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.418
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 305
FAILURE_BUCKET_ID: AV_nt!RtlAvlRemoveNode
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7d1c253a-7129-a8db-b2a1-91fd0611af73}
Followup: MachineOwner
---------