*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000e6007fe9a0, memory referenced
Arg2: 000000000000000f, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8063a8ceba7, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for cpuz149_x64.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5593
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 41462
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: e6007fe9a0
BUGCHECK_P2: f
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8063a8ceba7
WRITE_ADDRESS: fffff8063a3713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8063a2283b8: Unable to get Flags value from nt!KdVersionBlock
fffff8063a2283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000e6007fe9a0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Corsair.Service.CpuIdRemote64.exe
TRAP_FRAME: ffffd80139fc6050 -- (.trap 0xffffd80139fc6050)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000700d04 rbx=0000000000000000 rcx=fffff7bec0223000
rdx=000000e6007fe9a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8063a8ceba7 rsp=ffffd80139fc61e8 rbp=fffff7bec0223000
r8=0000000000000064 r9=0000000000000064 r10=0000fffff8063a8c
r11=ffff73fce1a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe cy
hal!HalpPciReadMmConfigUlong+0x7:
fffff806`3a8ceba7 8902 mov dword ptr [rdx],eax ds:000000e6`007fe9a0=????????
Resetting default scope
STACK_TEXT:
ffffd801`39fc5f08 fffff806`39fd5929 : 00000000`0000000a 000000e6`007fe9a0 00000000`0000000f 00000000`00000001 : nt!KeBugCheckEx
ffffd801`39fc5f10 fffff806`39fd1c69 : ffffe106`00f00070 ffffe106`00000000 fffff806`3a8ceb20 fffff806`3a8b837a : nt!KiBugCheckDispatch+0x69
ffffd801`39fc6050 fffff806`3a8ceba7 : fffff806`3a8b893e 00000000`00000000 00000000`00000004 ffff70d0`e8a18fab : nt!KiPageFault+0x469
ffffd801`39fc61e8 fffff806`3a8b893e : 00000000`00000000 00000000`00000004 ffff70d0`e8a18fab fffff806`39e1598e : hal!HalpPciReadMmConfigUlong+0x7
ffffd801`39fc61f0 fffff806`3a8b879a : 00000000`00000027 00000000`00000004 00000000`00000064 00000000`00000000 : hal!HalpPCIPerformConfigAccess+0x5a
ffffd801`39fc6220 fffff806`3a8b8672 : 00000000`00000000 00000000`00000004 00000000`00000000 000000e6`007fe9a0 : hal!HalpPciAccessMmConfigSpace+0x82
ffffd801`39fc6260 fffff806`3a8bc3d6 : 00000000`00000000 00000000`00000027 000000e6`007fe9a0 00000000`00000004 : hal!HalpPCIConfig+0xa2
ffffd801`39fc62e0 fffff806`3a8bc351 : 00000000`00000000 00000000`00000064 00000000`00000000 00000000`00000004 : hal!HalpReadPCIConfig+0x5a
ffffd801`39fc6330 fffff806`3a8bc251 : 00000000`00000002 fffff806`39e668d7 00000000`00000000 ffffe106`00000000 : hal!HalpGetPCIData+0xf1
ffffd801`39fc6400 fffff806`37a14395 : 00000000`00000000 00000000`00000000 00000000`00000002 00001f80`00260080 : hal!HalGetBusDataByOffset+0x41
ffffd801`39fc6440 00000000`00000000 : 00000000`00000000 00000000`00000002 00001f80`00260080 00000000`00000064 : cpuz149_x64+0x4395
SYMBOL_NAME: cpuz149_x64+4395
MODULE_NAME: cpuz149_x64
IMAGE_NAME: cpuz149_x64.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4395
FAILURE_BUCKET_ID: AV_cpuz149_x64!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6630e516-5929-09aa-311a-f35c4b67545e}
Followup: MachineOwner
---------