New
#21
ummm, the only dump there lists the problem as a user made crash (myfault.sys is a program used to cause a crash), what exactly are you doing??
7: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffdc8f7a29f380, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff800b9ca12d0, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for myfault.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2218
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 6561
Key : Analysis.Init.CPU.mSec
Value: 264
Key : Analysis.Init.Elapsed.mSec
Value: 7439
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffdc8f7a29f380
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff800b9ca12d0
READ_ADDRESS: fffff80020cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffdc8f7a29f380
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: notmyfault64.exe
TRAP_FRAME: ffff9d02432064a0 -- (.trap 0xffff9d02432064a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000890 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800b9ca12d0 rsp=ffff9d0243206630 rbp=ffff820628449980
r8=ffffdc8f7a3d0a10 r9=0000000000000000 r10=ffffdc8f6c6002c0
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
myfault+0x12d0:
fffff800`b9ca12d0 8b03 mov eax,dword ptr [rbx] ds:00000000`00000000=????????
Resetting default scope
STACK_TEXT:
ffff9d02`43206358 fffff800`20410029 : 00000000`0000000a ffffdc8f`7a29f380 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff9d02`43206360 fffff800`2040bbe3 : 00000000`00000000 ffff8206`2a14bd10 00000000`00000f4d 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9d02`432064a0 fffff800`b9ca12d0 : ffffffff`ffffffff ffff8206`29b760c0 ffff9d02`43206730 00000000`00000aa0 : nt!KiPageFault+0x463
ffff9d02`43206630 ffffffff`ffffffff : ffff8206`29b760c0 ffff9d02`43206730 00000000`00000aa0 00000000`00000000 : myfault+0x12d0
ffff9d02`43206638 ffff8206`29b760c0 : ffff9d02`43206730 00000000`00000aa0 00000000`00000000 fffff800`b9ca168e : 0xffffffff`ffffffff
ffff9d02`43206640 ffff9d02`43206730 : 00000000`00000aa0 00000000`00000000 fffff800`b9ca168e ffffdc8f`00000000 : 0xffff8206`29b760c0
ffff9d02`43206648 00000000`00000aa0 : 00000000`00000000 fffff800`b9ca168e ffffdc8f`00000000 00000000`000f00ff : 0xffff9d02`43206730
ffff9d02`43206650 00000000`00000000 : fffff800`b9ca168e ffffdc8f`00000000 00000000`000f00ff 00000001`00000000 : 0xaa0
SYMBOL_NAME: myfault+12d0
MODULE_NAME: myfault
IMAGE_NAME: myfault.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 12d0
FAILURE_BUCKET_ID: AV_myfault!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9745090a-9bce-ccba-c096-ca6e9ca04c64}
Followup: MachineOwner
---------