DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000000003b0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8006558a6e5, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6155
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 106230
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: 3b0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8006558a6e5
READ_ADDRESS: fffff800548fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8005480f330: Unable to get Flags value from nt!KdVersionBlock
fffff8005480f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
00000000000003b0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: BeamNG.drive.x64.exe
DPC_STACK_BASE: FFFFF80056E73FB0
TRAP_FRAME: fffff80056e73200 -- (.trap 0xfffff80056e73200)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff8908de2a8000
rdx=ffff8908dcbf1010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8006558a6e5 rsp=fffff80056e73390 rbp=fffff80056e73451
r8=0000000000000000 r9=0000000000000001 r10=ffff8908de2aab30
r11=fffff80056e733b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x42a6e5:
fffff800`6558a6e5 498b80b0030000 mov rax,qword ptr [r8+3B0h] ds:00000000`000003b0=????????????????
Resetting default scope
STACK_TEXT:
fffff800`56e730b8 fffff800`54007769 : 00000000`0000000a 00000000`000003b0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`56e730c0 fffff800`54003a69 : ffff8908`da992000 00000000`00000001 fffff800`56e732f0 fffff800`00000002 : nt!KiBugCheckDispatch+0x69
fffff800`56e73200 fffff800`6558a6e5 : 00000000`00200000 00000000`00000020 fffff800`56e733e0 00000000`00000000 : nt!KiPageFault+0x469
fffff800`56e73390 00000000`00200000 : 00000000`00000020 fffff800`56e733e0 00000000`00000000 ffff8908`de2a8000 : nvlddmkm+0x42a6e5
fffff800`56e73398 00000000`00000020 : fffff800`56e733e0 00000000`00000000 ffff8908`de2a8000 fffff800`6523624f : 0x200000
fffff800`56e733a0 fffff800`56e733e0 : 00000000`00000000 ffff8908`de2a8000 fffff800`6523624f 00000000`00400100 : 0x20
fffff800`56e733a8 00000000`00000000 : ffff8908`de2a8000 fffff800`6523624f 00000000`00400100 00000000`00200000 : 0xfffff800`56e733e0
SYMBOL_NAME: nvlddmkm+42a6e5
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 42a6e5
FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000000003b0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8021aaba6e5, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5186
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 116871
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: 3b0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8021aaba6e5
READ_ADDRESS: fffff802090fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8020900f330: Unable to get Flags value from nt!KdVersionBlock
fffff8020900f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
00000000000003b0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: BeamNG.drive.x64.exe
DPC_STACK_BASE: FFFFF8020BA73FB0
TRAP_FRAME: fffff8020ba73200 -- (.trap 0xfffff8020ba73200)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe58e18d66000
rdx=ffffe58e18ca7010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8021aaba6e5 rsp=fffff8020ba73390 rbp=fffff8020ba73451
r8=0000000000000000 r9=0000000000000001 r10=ffffe58e18d68b30
r11=fffff8020ba733b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x42a6e5:
fffff802`1aaba6e5 498b80b0030000 mov rax,qword ptr [r8+3B0h] ds:00000000`000003b0=????????????????
Resetting default scope
STACK_TEXT:
fffff802`0ba730b8 fffff802`08807769 : 00000000`0000000a 00000000`000003b0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff802`0ba730c0 fffff802`08803a69 : ffffe58e`19c3c000 00000000`00000001 fffff802`0ba732f0 fffff802`00000002 : nt!KiBugCheckDispatch+0x69
fffff802`0ba73200 fffff802`1aaba6e5 : 00000000`00200000 00000000`00000020 fffff802`0ba733e0 00000000`00000000 : nt!KiPageFault+0x469
fffff802`0ba73390 00000000`00200000 : 00000000`00000020 fffff802`0ba733e0 00000000`00000000 ffffe58e`18d66000 : nvlddmkm+0x42a6e5
fffff802`0ba73398 00000000`00000020 : fffff802`0ba733e0 00000000`00000000 ffffe58e`18d66000 fffff802`1a76624f : 0x200000
fffff802`0ba733a0 fffff802`0ba733e0 : 00000000`00000000 ffffe58e`18d66000 fffff802`1a76624f 00000000`00400100 : 0x20
fffff802`0ba733a8 00000000`00000000 : ffffe58e`18d66000 fffff802`1a76624f 00000000`00400100 00000000`00200000 : 0xfffff802`0ba733e0
SYMBOL_NAME: nvlddmkm+42a6e5
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 42a6e5
FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000000003b0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8034bbfa6e5, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4218
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 114654
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: 3b0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8034bbfa6e5
READ_ADDRESS: fffff803394fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8033940f330: Unable to get Flags value from nt!KdVersionBlock
fffff8033940f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
00000000000003b0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8033c86beb0 -- (.trap 0xfffff8033c86beb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff8d8eedf26000
rdx=ffff8d8eed620010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8034bbfa6e5 rsp=fffff8033c86c040 rbp=fffff8033c86c101
r8=0000000000000000 r9=0000000000000001 r10=ffff8d8eedf28b30
r11=fffff8033c86c060 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x42a6e5:
fffff803`4bbfa6e5 498b80b0030000 mov rax,qword ptr [r8+3B0h] ds:00000000`000003b0=????????????????
Resetting default scope
STACK_TEXT:
fffff803`3c86bd68 fffff803`38c07769 : 00000000`0000000a 00000000`000003b0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff803`3c86bd70 fffff803`38c03a69 : ffff8d8e`ef616000 00000000`00000001 fffff803`3c86bfa0 fffff803`00000002 : nt!KiBugCheckDispatch+0x69
fffff803`3c86beb0 fffff803`4bbfa6e5 : 00000000`00200000 00000000`00000020 fffff803`3c86c090 00000000`00000000 : nt!KiPageFault+0x469
fffff803`3c86c040 00000000`00200000 : 00000000`00000020 fffff803`3c86c090 00000000`00000000 ffff8d8e`edf26000 : nvlddmkm+0x42a6e5
fffff803`3c86c048 00000000`00000020 : fffff803`3c86c090 00000000`00000000 ffff8d8e`edf26000 fffff803`4b8a624f : 0x200000
fffff803`3c86c050 fffff803`3c86c090 : 00000000`00000000 ffff8d8e`edf26000 fffff803`4b8a624f 00000000`00400100 : 0x20
fffff803`3c86c058 00000000`00000000 : ffff8d8e`edf26000 fffff803`4b8a624f 00000000`00400100 00000000`00200000 : 0xfffff803`3c86c090
SYMBOL_NAME: nvlddmkm+42a6e5
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 42a6e5
FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3}
Followup: MachineOwner
---------