The computer has rebooted from a bugcheck. The bugcheck was: 0x000000d1

Copper Contributor
Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\111021-8375-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is: 
Windows 10 Kernel Version 22000 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Machine Name:
Kernel base = 0xfffff806`42c00000 PsLoadedModuleList = 0xfffff806`43829710
Debug session time: Wed Nov 10 17:14:28.681 2021 (UTC + 2:00)
System Uptime: 0 days 0:11:11.298
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
............
For analysis of this file, run !analyze -vnt!KeBugCheckEx:
fffff806`43012b70 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffb68a`f6422090=000000000000000a
6: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000002, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80647c4d738, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3233

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 37624

    Key  : Analysis.Init.CPU.mSec
    Value: 608

    Key  : Analysis.Init.Elapsed.mSec
    Value: 77173

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 96

    Key  : WER.OS.Branch
    Value: co_release

    Key  : WER.OS.Timestamp
    Value: 2021-06-04T16:28:00Z

    Key  : WER.OS.Version
    Value: 10.0.22000.1


FILE_IN_CAB:  111021-8375-01.dmp

BUGCHECK_CODE:  d1

BUGCHECK_P1: 2

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80647c4d738

READ_ADDRESS: fffff80643905450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000002 

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffb68af64221d0 -- (.trap 0xffffb68af64221d0)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=0000000000000001 rbx=0000000000000000 rcx=ffffa608145514b8
rdx=ffffa608145514b8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80647c4d738 rsp=ffffb68af6422360 rbp=ffffb68af6422400
 r8=0000000000000000  r9=ffffa608145514b8 r10=0000000000000000
r11=ffff818e0495a910 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
storport!RaidLogMiniportCompletion+0x28:
fffff806`47c4d738 410fb65202      movzx   edx,byte ptr [r10+2] ds:00000000`00000002=??
Resetting default scope

STACK_TEXT:  
ffffb68a`f6422088 fffff806`430256a9     : 00000000`0000000a 00000000`00000002 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffb68a`f6422090 fffff806`43021800     : 00000000`02aea545 000002d1`d75ab2a2 ffff818d`f9528260 00000000`00048f8d : nt!KiBugCheckDispatch+0x69
ffffb68a`f64221d0 fffff806`47c4d738     : ffff818e`09cfc030 00000000`00000000 00000000`00000000 fffff806`47c4bc3d : nt!KiPageFault+0x440
ffffb68a`f6422360 fffff806`47c4d6a7     : ffffb68a`f64224d9 ffff818d`fb2ed1a0 ffff818d`fb2ed1a0 00000000`00000000 : storport!RaidLogMiniportCompletion+0x28
ffffb68a`f6422390 fffff806`47c4d283     : 00000000`00040246 fffff806`47c4c62a 00000000`00000000 ffff0396`694e74b6 : storport!RaidAdapterRequestComplete+0x167
ffffb68a`f6422460 fffff806`47d4818e     : 00000000`0000000e ffff818d`fb2f2010 ffff818e`0495a910 ffff818e`0495a910 : storport!StorPortNotification+0x203
ffffb68a`f6422540 fffff806`47d46bec     : ffff818e`0495a910 00000000`00000100 ffff818d`fb2f2148 00000000`0000002e : stornvme!NVMeRequestComplete+0x96
ffffb68a`f6422570 fffff806`47d46eb7     : ffff818d`fb2f2010 00000000`00000000 ffff818d`fb2ed10e ffffb68a`f6422300 : stornvme!NVMeCompleteSubmissionQueueRequests+0xcc
ffffb68a`f64225c0 fffff806`47d47423     : ffff818d`fb2f2010 ffffb68a`f6422800 ffff818d`fb2ed100 00000000`00000051 : stornvme!NVMeControllerCompleteAllIORequests+0xe3
ffffb68a`f6422610 fffff806`47d45f75     : ffffb68a`f6422798 ffff818d`fb4e31a0 ffffb68a`f6422830 ffff818d`fb2ed1a0 : stornvme!NVMeControllerReset+0xb7
ffffb68a`f6422700 fffff806`47c75cab     : 00000000`00000000 fffff806`4366b819 01000000`00000000 ffffb68a`f64227d0 : stornvme!NVMeHwResetBus+0x15
ffffb68a`f6422730 fffff806`47c94377     : ffff818d`fb4e31a0 ffff818d`fb4e31a0 ffffffff`ffffffff 00000000`c0000185 : storport!RaidAdapterResetBus+0x18b
ffffb68a`f6422890 fffff806`47c9352a     : ffff818e`06748890 ffff818d`fb4e38a0 ffff818e`06748890 ffff818e`06748890 : storport!RaidUnitHierarchicalReset+0xf3
ffffb68a`f6422940 fffff806`42e0694b     : ffff818e`06748890 00000000`00000000 ffff818d`fb4e3050 fffff806`43933680 : storport!RaidHierarchicalResetWorkRoutine+0x8a
ffffb68a`f6422990 fffff806`42e48aaf     : ffff818d`f9490b20 ffff818d`fb196340 ffff818e`06748890 00000000`00000000 : nt!IopProcessWorkItem+0xfb
ffffb68a`f6422a00 fffff806`42f5b615     : ffff818d`fb196340 ffffbd01`96fec000 ffff818d`fb196340 000f8067`bcbbbdff : nt!ExpWorkerThread+0x14f
ffffb68a`f6422bf0 fffff806`43016c24     : ffffbd01`96fdc180 ffff818d`fb196340 fffff806`42f5b5c0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffb68a`f6422c40 00000000`00000000     : ffffb68a`f6423000 ffffb68a`f641d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34


SYMBOL_NAME:  stornvme!NVMeRequestComplete+96

MODULE_NAME: stornvme

IMAGE_NAME:  stornvme.sys

IMAGE_VERSION:  10.0.22000.258

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  96

FAILURE_BUCKET_ID:  AV_stornvme!NVMeRequestComplete

OS_VERSION:  10.0.22000.1

BUILDLAB_STR:  co_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {51f24713-ee29-e7c8-4df8-5a7f32da9755}

Followup:     MachineOwner
---------

1 Reply
Uninstall nvme customized controller driver from device manager, keep only microsoft standard nvme controller.
After uninstall, restart windows