DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000020000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000020000, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3375
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 7042
Key : Analysis.Init.CPU.mSec
Value: 687
Key : Analysis.Init.Elapsed.mSec
Value: 141412
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
FILE_IN_CAB: 121621-14375-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: d1
BUGCHECK_P1: 20000
BUGCHECK_P2: 2
BUGCHECK_P3: 8
BUGCHECK_P4: 20000
READ_ADDRESS: fffff80655efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000020000
PROCESS_NAME: System
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
TRAP_FRAME: fffff98da465efa0 -- (.trap 0xfffff98da465efa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000020000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000020000 rsp=fffff98da465f138 rbp=fffff98da465f240
r8=0000000000000000 r9=ffff8308dcb8b920 r10=fffff8065552ed30
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
00000000`00020000 ?? ???
Resetting default scope
FAILED_INSTRUCTION_ADDRESS:
+0
00000000`00020000 ?? ???
STACK_TEXT:
fffff98d`a465ee58 fffff806`55609269 : 00000000`0000000a 00000000`00020000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff98d`a465ee60 fffff806`55605569 : ffff8308`d9d71010 fffff806`55bb1149 ffff8308`000004d0 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff98d`a465efa0 00000000`00020000 : fffff806`5b185e92 00000000`00000000 fffff98d`a465f1b0 ffff8308`d7eefaf0 : nt!KiPageFault+0x469
fffff98d`a465f138 fffff806`5b185e92 : 00000000`00000000 fffff98d`a465f1b0 ffff8308`d7eefaf0 ffff8308`d7eefaf0 : 0x20000
fffff98d`a465f140 fffff806`55484f1e : ffffbc81`d09b9000 ffff8308`c7002100 fffff98d`a465f640 fffff806`55489424 : CLASSPNP!TransferPktComplete+0xc32
fffff98d`a465f350 fffff806`55484de7 : 00000000`00000000 fffff806`55bb1101 ffff8308`000003e0 fffff98d`a465f640 : nt!IopfCompleteRequest+0x11e
fffff98d`a465f440 fffff806`5a489fd1 : fffff98d`a465f640 fffff806`5569eb76 00000000`00000000 ffff8308`c9787260 : nt!IofCompleteRequest+0x17
fffff98d`a465f470 fffff806`5a489944 : ffffbc81`d09b9020 00000000`00989680 fffff98d`a465f640 ffff8308`c96d71a0 : storport!RaidCompleteRequestEx+0x91
fffff98d`a465f540 fffff806`5a49ad8c : 00000000`00000000 00000000`00000000 fffff780`00000320 ffffbc81`d09b9020 : storport!RaidUnitCompleteRequest+0xf64
fffff98d`a465f6c0 fffff806`5549a24e : fffff98d`a465fa20 00000000`00000000 00000000`00000004 ffffbc81`d019f180 : storport!RaidpAdapterRedirectDpcRoutine+0x8c
fffff98d`a465f760 fffff806`55499534 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff98d`a465f8d0 fffff806`555fae0e : ffffffff`00000000 ffffbc81`d019f180 00000000`00000000 ffffbc81`d01aa240 : nt!KiRetireDpcList+0x1f4
fffff98d`a465fb60 00000000`00000000 : fffff98d`a4660000 fffff98d`a4659000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: CLASSPNP!TransferPktComplete+c32
MODULE_NAME: CLASSPNP
IMAGE_NAME: CLASSPNP.SYS
IMAGE_VERSION: 10.0.19041.1415
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: c32
FAILURE_BUCKET_ID: AV_CODE_AV_BAD_IP_CLASSPNP!TransferPktComplete
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {45977acb-dcc4-0c69-0eda-52cc0550a946}
Followup: MachineOwner