cancel
Showing results for 
Search instead for 
Did you mean: 

General Discussions

Jax-Ur
Journeyman III

Windows 11 24H2 26100.712 AMD RAID 2.20.19.037 bluescreen when enabling bitlocker - rcraid.sys

Hello,

 

I am currently testing Windows 11 24H2 (26100.712) and ran into issues when enabling bitlocker on a configuration running RAID 1.

Setup is

* ROG Strix X570-E Gaming

* Ryzen 5950X

* RAID 1

Driver version is 2.20.19.037

 

I ran the dump file through WinDbg and the issue seems to be with rcraid.sys which is part of the AMD-RAID driver package.

Has anyone ran into similar issues with earlier versions of Windows or is this an incompatibility with the Windows 11 24H2 and current AMD-RAID drivers?

 

 

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000000000c8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8024e80231f, address which referenced memory

Debugging Details:
------------------

Unable to load image \SystemRoot\System32\drivers\rcraid.sys, Win32 error 0n2

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5561

Key : Analysis.Elapsed.mSec
Value: 6545

Key : Analysis.IO.Other.Mb
Value: 0

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 0

Key : Analysis.Init.CPU.mSec
Value: 390

Key : Analysis.Init.Elapsed.mSec
Value: 5595

Key : Analysis.Memory.CommitPeak.Mb
Value: 94

Key : Bugcheck.Code.KiBugCheckData
Value: 0xd1

Key : Bugcheck.Code.LegacyAPI
Value: 0xd1

Key : Bugcheck.Code.TargetModel
Value: 0xd1

Key : Dump.Attributes.AsUlong
Value: 21000

Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1

Key : Dump.Attributes.ErrorCode
Value: 0

Key : Dump.Attributes.LastLine
Value: Dump completed successfully.

Key : Dump.Attributes.ProgressPercentage
Value: 100

Key : Failure.Bucket
Value: AV_rcraid!unknown_function

Key : Failure.Hash
Value: {c0bf3dd4-a99c-5874-533a-685bc0914bd6}

Key : Hypervisor.Enlightenments.Value
Value: 0

Key : Hypervisor.Enlightenments.ValueHex
Value: 0

Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 0

Key : Hypervisor.Flags.ApicEnlightened
Value: 0

Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1

Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0

Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0

Key : Hypervisor.Flags.CpuManager
Value: 0

Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 0

Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 0

Key : Hypervisor.Flags.Epf
Value: 0

Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 0

Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1

Key : Hypervisor.Flags.MaxBankNumber
Value: 0

Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0

Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0

Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 0

Key : Hypervisor.Flags.Phase0InitDone
Value: 0

Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0

Key : Hypervisor.Flags.RootScheduler
Value: 0

Key : Hypervisor.Flags.SynicAvailable
Value: 0

Key : Hypervisor.Flags.UseQpcBias
Value: 0

Key : Hypervisor.Flags.Value
Value: 16908288

Key : Hypervisor.Flags.ValueHex
Value: 1020000

Key : Hypervisor.Flags.VpAssistPage
Value: 0

Key : Hypervisor.Flags.VsmAvailable
Value: 0

Key : Hypervisor.RootFlags.AccessStats
Value: 0

Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 0

Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 0

Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0

Key : Hypervisor.RootFlags.HostTimelineSync
Value: 0

Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0

Key : Hypervisor.RootFlags.IsHyperV
Value: 0

Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 0

Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 0

Key : Hypervisor.RootFlags.MceEnlightened
Value: 0

Key : Hypervisor.RootFlags.Nested
Value: 0

Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 0

Key : Hypervisor.RootFlags.Value
Value: 0

Key : Hypervisor.RootFlags.ValueHex
Value: 0

Key : SecureKernel.HalpHvciEnabled
Value: 0

Key : WER.OS.Branch
Value: ge_release

Key : WER.OS.Version
Value: 10.0.26100.1


BUGCHECK_CODE: d1

BUGCHECK_P1: c8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8024e80231f

FILE_IN_CAB: MEMORY.DMP

DUMP_FILE_ATTRIBUTES: 0x21000

READ_ADDRESS: Unable to get size of nt!_MMPTE - probably bad symbols
unable to get nt!MmSpecialPagesInUse
00000000000000c8

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

TRAP_FRAME: ffffc98a20f2f320 -- (.trap 0xffffc98a20f2f320)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000004 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8024e80231f rsp=ffffc98a20f2f4b8 rbp=0000000000000001
r8=ffffdf86ef89ccc0 r9=fffff8024e8db850 r10=ffffdf86ef7db194
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
rcraid+0x1231f:
fffff802`4e80231f 448b88c8000000 mov r9d,dword ptr [rax+0C8h] ds:00000000`000000c8=????????
Resetting default scope

STACK_TEXT:
ffffc98a`20f2f1d8 fffff802`bbe858e9 : 00000000`0000000a 00000000`000000c8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffc98a`20f2f1e0 fffff802`bbe80ba8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc98a`20f2f320 fffff802`4e80231f : fffff802`4e8240aa ffffdf86`ef89ccc0 ffffdf86`ef7db194 00000000`00000001 : nt!KiPageFault+0x468
ffffc98a`20f2f4b8 fffff802`4e8240aa : ffffdf86`ef89ccc0 ffffdf86`ef7db194 00000000`00000001 ffffdf86`ef89ccc0 : rcraid+0x1231f
ffffc98a`20f2f4c0 fffff802`4e826526 : ffffdf86`ef7db194 ffffdf86`ef7db194 ffffdf86`ef7db194 00000000`00000001 : rcraid+0x340aa
ffffc98a`20f2f500 fffff802`4e8222e7 : ffffdf86`ef7db194 ffffdf86`ef7db194 ffffdf86`ef7db194 00000000`00000001 : rcraid+0x36526
ffffc98a`20f2f580 fffff802`4e8223fc : ffffdf86`ef7db194 00000000`00000000 fffff802`4e88b910 fffff802`4e874834 : rcraid+0x322e7
ffffc98a`20f2f5b0 fffff802`4e7f76cf : ffffdf86`ef7db194 00000000`00000000 00000000`00000000 fffff802`00000000 : rcraid+0x323fc
ffffc98a`20f2f5e0 fffff802`4e7f5208 : ffffdf86`e91f1996 fffff802`4e88b910 fffff802`4e88b910 000025b2`9504a73c : rcraid+0x76cf
ffffc98a`20f2f660 fffff802`4e861627 : fffff802`4e88b910 00000000`00000000 00000000`00000000 ffffdf86`ead9e118 : rcraid+0x5208
ffffc98a`20f2f690 fffff802`4e860cd7 : ffffdf86`e91f1890 fffff802`00000001 00002079`16c1b768 00000000`00000f44 : rcraid+0x71627
ffffc98a`20f2f6c0 fffff802`bbb16fce : fffff802`4ed05210 ffffdf86`e91f1890 00000000`00000000 00000000`00000000 : rcraid+0x70cd7
ffffc98a`20f2f720 fffff802`bbb6851b : ffff8101`6e7b1180 00000000`00000028 ffffdf86`f1f4c010 fffff802`bba0e645 : nt!KiExecuteAllDpcs+0x67e
ffffc98a`20f2f970 fffff802`bbe7297e : ffff8101`6e7b1180 ffff8101`6e7b1180 00000000`00000000 fffff802`4821eb00 : nt!KiRetireDpcList+0x36b
ffffc98a`20f2fc00 00000000`00000000 : ffffc98a`20f30000 ffffc98a`20f29000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME: rcraid+1231f

MODULE_NAME: rcraid

IMAGE_NAME: rcraid.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 1231f

FAILURE_BUCKET_ID: AV_rcraid!unknown_function

OS_VERSION: 10.0.26100.1

BUILDLAB_STR: ge_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {c0bf3dd4-a99c-5874-533a-685bc0914bd6}

PROCESS_NAME: Unknown

Followup: MachineOwner
---------

0 Likes
0 Replies