*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff00219f57390, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff00219f57390, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 10983
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 102683
Key : Analysis.Init.CPU.mSec
Value: 952
Key : Analysis.Init.Elapsed.mSec
Value: 3610
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: d1
BUGCHECK_P1: fffff00219f57390
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: fffff00219f57390
READ_ADDRESS: fffff8021a8fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff00219f57390
ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8021f690470 -- (.trap 0xfffff8021f690470)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff00219f57390 rbx=0000000000000000 rcx=fffff7a700220710
rdx=fffff7a7002205b8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff00219f57390 rsp=fffff8021f690608 rbp=fffff8021f690689
r8=0000008000000000 r9=0000000000000414 r10=0000fffff00219f5
r11=ffff9d7d0e200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na pe nc
fffff002`19f57390 ?? ???
Resetting default scope
FAILED_INSTRUCTION_ADDRESS:
+0
fffff002`19f57390 ?? ???
STACK_TEXT:
fffff802`1f690328 fffff802`1a009169 : 00000000`0000000a fffff002`19f57390 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
fffff802`1f690330 fffff802`1a005469 : 00000000`00000000 ffffd08a`76bc0000 ffffd08a`7638b930 fffff802`19f30a5a : nt!KiBugCheckDispatch+0x69
fffff802`1f690470 fffff002`19f57390 : fffff802`19f58f37 fffff802`1f690680 ffffa156`195d2108 00000000`00000000 : nt!KiPageFault+0x469
fffff802`1f690608 fffff802`19f58f37 : fffff802`1f690680 ffffa156`195d2108 00000000`00000000 ffffd08a`725548b0 : 0xfffff002`19f57390
fffff802`1f690610 fffff802`19e19e67 : 00000000`00020c20 fffff802`16f211c8 00000000`000189ae fffff802`2de52d23 : nt!HalpTimerClockStop+0x37
fffff802`1f690640 fffff802`19e18b46 : 00000000`0000017b 00000000`00000001 0000000a`0d7ac596 fffff802`16f19180 : nt!KeResumeClockTimerFromIdle+0x377
fffff802`1f6906f0 fffff802`19e17274 : 00000000`00000000 00001f80`00000008 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0x1756
fffff802`1f690af0 fffff802`19ffacf4 : 00000000`00000000 fffff802`1a926a00 ffffd08a`7a74d080 00000000`00000e40 : nt!PoIdle+0x374
fffff802`1f690c60 00000000`00000000 : fffff802`1f691000 fffff802`1f68b000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME: nt!KiPageFault+469
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1165
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 469
FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_BAD_IP_nt!KiPageFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f2ab72c5-099d-9077-bfcf-ba12aa825b36}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
BugCheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffcd01e227fe70
Arg3: 00000000f9ea6690
Arg4: fffff80513cc2cce
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 12624
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 24064
Key : Analysis.Init.CPU.mSec
Value: 937
Key : Analysis.Init.Elapsed.mSec
Value: 3608
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 7f
BUGCHECK_P1: 8
BUGCHECK_P2: ffffcd01e227fe70
BUGCHECK_P3: f9ea6690
BUGCHECK_P4: fffff80513cc2cce
TRAP_FRAME: ffffcd01e227fe70 -- (.trap 0xffffcd01e227fe70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80513cc2cce rsp=00000000f9ea6690 rbp=0000000000000000
r8=0000000000000001 r9=0000000000000000 r10=fffff80513cc27f0
r11=ffff918755421ce0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!CcSetDirtyPinnedData+0x4de:
fffff805`13cc2cce ff ???
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
BAD_STACK_POINTER: 00000000f9ea6690
STACK_TEXT:
ffffcd01`e227fd28 fffff805`13e09169 : 00000000`0000007f 00000000`00000008 ffffcd01`e227fe70 00000000`f9ea6690 : nt!KeBugCheckEx
ffffcd01`e227fd30 fffff805`13e03f83 : 0003eb20`e8c933d2 4d158d48`28244c8b bb2c2444`8bfff0e4 2c244c89`0000000c : nt!KiBugCheckDispatch+0x69
ffffcd01`e227fe70 fffff805`13cc2cce : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3
00000000`f9ea6690 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CcSetDirtyPinnedData+0x4de
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff80513cc2cc5 - nt!CcSetDirtyPinnedData+4d5
[ 84:86 ]
1 error : !nt (fffff80513cc2cc5)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: memory_corruption
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the BugCheck.
Arg2: 00007ffb19d68990
Arg3: 000000000000001d
Arg4: ffffa108f5fe9b00
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5656
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 7834
Key : Analysis.Init.CPU.mSec
Value: 1014
Key : Analysis.Init.Elapsed.mSec
Value: 3514
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 61941
BUGCHECK_P2: 7ffb19d68990
BUGCHECK_P3: 1d
BUGCHECK_P4: ffffa108f5fe9b00
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicGamesLauncher.exe
STACK_TEXT:
ffffa108`f5fe9958 fffff805`13e4438e : 00000000`0000001a 00000000`00061941 00007ffb`19d68990 00000000`0000001d : nt!KeBugCheckEx
ffffa108`f5fe9960 fffff805`13e0535e : 000001bf`2f50d4a0 00000000`00000000 ffffffff`fffaf6f0 00000000`00000000 : nt!MmAccessFault+0x1a529e
ffffa108`f5fe9b00 00007ffb`19d68990 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000085`e7faf6b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`19d68990
MODULE_NAME: hardware
IMAGE_NAME: hardware_ram
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c6e5c6cf-692e-7852-5dc5-b74944540fc0}
Followup: MachineOwner
---------