pisuscosplay
Hectopat
- Katılım
- 27 Kasım 2020
- Mesajlar
- 695
- Makaleler
- 1
- Çözümler
- 3
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
extents for the thread.
Arg2: ffffde018a9f41a0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffde018a9f40f8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 9
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on AHMET
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 12
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 139
BUGCHECK_P1: 4
BUGCHECK_P2: ffffde018a9f41a0
BUGCHECK_P3: ffffde018a9f40f8
BUGCHECK_P4: 0
TRAP_FRAME: ffffde018a9f41a0 -- (.trap 0xffffde018a9f41a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd70582463000 rbx=0000000000000000 rcx=0000000000000004
rdx=ffffd70582469000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80220e3bc65 rsp=ffffde018a9f4330 rbp=ffffde018a9f43a0
r8=ffffd70582469000 r9=ffffde018a9f4300 r10=0000fffff80220d6
r11=ffffde018a9f4570 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!RtlpGetStackLimitsEx+0x1b4aa5:
fffff802`20e3bc65 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffde018a9f40f8 -- (.exr 0xffffde018a9f40f8)
ExceptionAddress: fffff80220e3bc65 (nt!RtlpGetStackLimitsEx+0x00000000001b4aa5)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: msedge.exe
WATSON_BKT_EVENT: BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000004
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffde01`8a9f3e78 fffff802`20e08c69 : 00000000`00000139 00000000`00000004 ffffde01`8a9f41a0 ffffde01`8a9f40f8 : nt!KeBugCheckEx
ffffde01`8a9f3e80 fffff802`20e09090 : 982e0d8b`482079c0 6899770d`8d4c002a 44c70000`001cbaff 75e80000`03622024 : nt!KiBugCheckDispatch+0x69
ffffde01`8a9f3fc0 fffff802`20e07423 : 45c033ff`fff6b8e9 33eeebc0`960fc83b ebc0970f`c83b45c0 920fc83b`45c033e4 : nt!KiFastFailDispatch+0xd0
ffffde01`8a9f41a0 fffff802`20e3bc65 : ffffde01`8a9f45b0 ffffde01`8a9f4d78 ffffde01`8a9f43a0 44894800`10cc13e8 : nt!KiRaiseSecurityCheckFailure+0x323
ffffde01`8a9f4330 fffff802`20c87391 : ffffde01`8a9f45b0 00000000`00000000 0c8d49d7`8b49c68b 8b4cffb6`00000003 : nt!RtlpGetStackLimitsEx+0x1b4aa5
ffffde01`8a9f4360 fffff802`20c86136 : ffffde01`8a9f4d78 ffffde01`8a9f4ab0 ffffde01`8a9f4d78 0000004c`3f7fcf68 : nt!RtlDispatchException+0xe1
ffffde01`8a9f4580 fffff802`20e08dac : 00000000`00000000 00000000`00000000 00000000`00000000 ffff054f`fd20144d : nt!KiDispatchException+0x186
ffffde01`8a9f4c40 fffff802`20e04ae0 : 00000000`00000000 00000000`00000000 00000000`000033f4 fffff802`20c9468f : nt!KiExceptionDispatch+0x12c
ffffde01`8a9f4e20 fffff802`20dfd96d : ffffd705`82468b80 ffff968c`8d2aed40 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
ffffde01`8a9f4fb0 fffff802`20dfd6f7 : 00000000`00000000 00000000`00000000 ffffd705`00000000 ffff968c`00000000 : nt!KiIpiInterruptSubDispatch+0x1d
ffffd705`82468b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIpiInterrupt+0x307
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.985
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_nt!KiFastFailDispatch
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1971a9b0-b7ec-89bf-0a51-10ac52818da5}
Followup: MachineOwner
---------
3: kd> lm
start end module name
fffff802`1d900000 fffff802`1d928000 mcupdate_AuthenticAMD (deferred)
fffff802`1d930000 fffff802`1d936000 hal (deferred)
fffff802`1d940000 fffff802`1d94b000 kd (deferred)
fffff802`1d950000 fffff802`1d977000 tm (deferred)
fffff802`1d980000 fffff802`1d9ea000 CLFS (deferred)
fffff802`1d9f0000 fffff802`1da0a000 PSHED (deferred)
fffff802`1da10000 fffff802`1da1b000 BOOTVID (deferred)
fffff802`1da20000 fffff802`1db33000 clipsp (deferred)
fffff802`1db40000 fffff802`1dbaf000 FLTMGR (deferred)
fffff802`1dbb0000 fffff802`1dbd9000 ksecdd (deferred)
fffff802`1dbe0000 fffff802`1dc43000 msrpc (deferred)
fffff802`1dc50000 fffff802`1dc5e000 cmimcext (deferred)
fffff802`1dc60000 fffff802`1dc71000 werkernel (deferred)
fffff802`1dc80000 fffff802`1dc8c000 ntosext (deferred)
fffff802`1dc90000 fffff802`1dca3000 WDFLDR (deferred)
fffff802`1dcb0000 fffff802`1dcbf000 SleepStudyHelper (deferred)
fffff802`1dcc0000 fffff802`1dcd1000 WppRecorder (deferred)
fffff802`1dce0000 fffff802`1dcfa000 SgrmAgent (deferred)
fffff802`20a00000 fffff802`21a46000 nt (pdb symbols) C:\ProgramData\dbg\sym\ntkrnlmp.pdb\992A9A48F30EC2C58B01A5934DCE2D9C1\ntkrnlmp.pdb
fffff802`23200000 fffff802`232e3000 CI (deferred)
fffff802`232f0000 fffff802`233a7000 cng (deferred)
fffff802`233b0000 fffff802`23482000 Wdf01000 (deferred)
fffff802`23490000 fffff802`234b6000 acpiex (deferred)
fffff802`234c0000 fffff802`2358c000 ACPI (deferred)
fffff802`23590000 fffff802`2359c000 WMILIB (deferred)
fffff802`235b0000 fffff802`2361b000 intelpep (deferred)
fffff802`23620000 fffff802`23637000 WindowsTrustedRT (deferred)
fffff802`23640000 fffff802`2364b000 IntelTA (deferred)
fffff802`23650000 fffff802`2365b000 WindowsTrustedRTProxy (deferred)
fffff802`23660000 fffff802`23674000 pcw (deferred)
fffff802`23680000 fffff802`236c0000 klupd_klif_arkmon (deferred)
fffff802`236d0000 fffff802`236db000 msisadrv (deferred)
fffff802`236e0000 fffff802`23757000 pci (deferred)
fffff802`23760000 fffff802`23775000 vdrvroot (deferred)
fffff802`23780000 fffff802`237bb000 cm_km (deferred)
fffff802`237c0000 fffff802`237ef000 pdc (deferred)
fffff802`237f0000 fffff802`23809000 CEA (deferred)
fffff802`23810000 fffff802`23841000 partmgr (deferred)
fffff802`23850000 fffff802`2385a000 pciide (deferred)
fffff802`23860000 fffff802`23873000 PCIIDEX (deferred)
fffff802`23880000 fffff802`2392a000 spaceport (deferred)
fffff802`23930000 fffff802`23949000 volmgr (deferred)
fffff802`23950000 fffff802`239b3000 volmgrx (deferred)
fffff802`239c0000 fffff802`239de000 mountmgr (deferred)
fffff802`239e0000 fffff802`239ed000 atapi (deferred)
fffff802`239f0000 fffff802`239fd000 Fs_Rec (deferred)
fffff802`23a00000 fffff802`23a3c000 ataport (deferred)
fffff802`23a40000 fffff802`23a72000 storahci (deferred)
fffff802`23a80000 fffff802`23b33000 storport (deferred)
fffff802`23b60000 fffff802`23b7a000 fileinfo (deferred)
fffff802`23b80000 fffff802`23bc0000 Wof (deferred)
fffff802`23bd0000 fffff802`23d3f000 ndis (deferred)
fffff802`23d40000 fffff802`23dd8000 NETIO (deferred)
fffff802`23de0000 fffff802`23deb000 volume (deferred)
fffff802`23e00000 fffff802`248a5000 FACEIT (deferred)
fffff802`248b0000 fffff802`24b89000 Ntfs (deferred)
fffff802`24b90000 fffff802`24bc2000 ksecpkg (deferred)
fffff802`24bd0000 fffff802`24ebb000 tcpip (deferred)
fffff802`24ec0000 fffff802`24f3f000 fwpkclnt (deferred)
fffff802`24f40000 fffff802`24f70000 wfplwfs (deferred)
fffff802`24f80000 fffff802`25048000 fvevol (deferred)
fffff802`25050000 fffff802`250a0000 rdyboost (deferred)
fffff802`250b0000 fffff802`2511d000 volsnap (deferred)
fffff802`25120000 fffff802`25146000 mup (deferred)
fffff802`25150000 fffff802`25169000 klupd_klif_klbg (deferred)
fffff802`25170000 fffff802`25182000 iorate (deferred)
fffff802`251b0000 fffff802`251cc000 disk (deferred)
fffff802`251d0000 fffff802`2523c000 CLASSPNP (deferred)
fffff802`25820000 fffff802`25fd8000 vgk (deferred)
fffff802`25fe0000 fffff802`25ff9000 klbackupdisk (deferred)
fffff802`26000000 fffff802`26030000 cdrom (deferred)
fffff802`26040000 fffff802`260ca000 klflt (deferred)
fffff802`260d0000 fffff802`26101000 klbackupflt (deferred)
fffff802`26110000 fffff802`26125000 filecrypt (deferred)
fffff802`26130000 fffff802`2613e000 tbs (deferred)
fffff802`26140000 fffff802`26240000 klif (deferred)
fffff802`26250000 fffff802`262c6000 ks (deferred)
fffff802`262d0000 fffff802`2645b000 klhk (deferred)
fffff802`26460000 fffff802`26501000 klgse (deferred)
fffff802`26510000 fffff802`26522000 klpd (deferred)
fffff802`26530000 fffff802`2654c000 kldisk (deferred)
fffff802`26550000 fffff802`2655a000 Null (deferred)
fffff802`26560000 fffff802`2656a000 Beep (deferred)
fffff802`26570000 fffff802`26585000 klpnpflt (deferred)
fffff802`26590000 fffff802`2660b000 rdbss (deferred)
fffff802`26610000 fffff802`26622000 nsiproxy (deferred)
fffff802`26630000 fffff802`2663e000 npsvctrig (deferred)
fffff802`26640000 fffff802`26650000 mssmbios (deferred)
fffff802`26660000 fffff802`266a9000 kneps (deferred)
fffff802`266f0000 fffff802`266fa000 gpuenergydrv (deferred)
fffff802`26720000 fffff802`2673e000 crashdmp (deferred)
fffff802`26800000 fffff802`26817000 bam (deferred)
fffff802`26820000 fffff802`2686e000 ahcache (deferred)
fffff802`26870000 fffff802`2687d000 kltap (deferred)
fffff802`26880000 fffff802`26892000 CompositeBus (deferred)
fffff802`268a0000 fffff802`268ad000 kdnic (deferred)
fffff802`268b0000 fffff802`268c5000 umbus (deferred)
fffff802`268d0000 fffff802`2690b000 amdppm (deferred)
fffff802`26910000 fffff802`26966000 msquic (deferred)
fffff802`269a0000 fffff802`269cc000 dfsc (deferred)
fffff802`26c00000 fffff802`26c5c000 netbt (deferred)
fffff802`26c60000 fffff802`26c73000 afunix (deferred)
fffff802`26c80000 fffff802`26d23000 afd (deferred)
fffff802`26d30000 fffff802`26d7b000 klwtp (deferred)
fffff802`26d80000 fffff802`26d95000 klim6 (deferred)
fffff802`26da0000 fffff802`26dba000 vwififlt (deferred)
fffff802`26dc0000 fffff802`26deb000 pacer (deferred)
fffff802`26df0000 fffff802`26e04000 ndiscap (deferred)
fffff802`26e10000 fffff802`26e24000 netbios (deferred)
fffff802`26e30000 fffff802`26ed1000 Vid (deferred)
fffff802`26ee0000 fffff802`27285000 dxgkrnl (deferred)
fffff802`27290000 fffff802`272a8000 watchdog (deferred)
fffff802`272b0000 fffff802`272c6000 BasicDisplay (deferred)
fffff802`272d0000 fffff802`272e1000 BasicRender (deferred)
fffff802`272f0000 fffff802`2730c000 Npfs (deferred)
fffff802`27310000 fffff802`27321000 Msfs (deferred)
fffff802`27330000 fffff802`2734b000 CimFS (deferred)
fffff802`27350000 fffff802`27374000 klwfp (deferred)
fffff802`27380000 fffff802`273a2000 tdx (deferred)
fffff802`273b0000 fffff802`273c0000 TDI (deferred)
fffff802`273d0000 fffff802`273f1000 winhvr (deferred)
fffff802`29a00000 fffff802`29a1c000 serial (deferred)
fffff802`29a20000 fffff802`29a2f000 serenum (deferred)
fffff802`29a30000 fffff802`29a4f000 parport (deferred)
fffff802`29a50000 fffff802`29a61000 nvvad64v (deferred)
fffff802`29a70000 fffff802`29a7f000 ksthunk (deferred)
fffff802`29a80000 fffff802`29a8d000 NvModuleTracker (deferred)
fffff802`29a90000 fffff802`29aa0000 nvvhci (deferred)
fffff802`29ab0000 fffff802`29abd000 NdisVirtualBus (deferred)
fffff802`29ac0000 fffff802`29acc000 swenum (deferred)
fffff802`29ad0000 fffff802`29ade000 CorsairVBusDriver (deferred)
fffff802`29ae0000 fffff802`29aee000 rdpbus (deferred)
fffff802`29af0000 fffff802`29b75000 usbhub (deferred)
fffff802`29b80000 fffff802`29b8e000 USBD (deferred)
fffff802`29ba0000 fffff802`29bdf000 HIDCLASS (deferred)
fffff802`29be0000 fffff802`29bf3000 HIDPARSE (deferred)
fffff802`29c00000 fffff802`29c23000 nvhda64v (deferred)
fffff802`29c30000 fffff802`29c9f000 HdAudio (deferred)
fffff802`29ca0000 fffff802`29cb1000 kbdhid (deferred)
fffff802`29cc0000 fffff802`29cd9000 klkbdflt (deferred)
fffff802`29ce0000 fffff802`29cf4000 kbdclass (deferred)
fffff802`29d00000 fffff802`29d33000 usbccgp (deferred)
fffff802`29d40000 fffff802`29d65000 USBSTOR (deferred)
fffff802`29d70000 fffff802`29d82000 hidusb (deferred)
fffff802`29d90000 fffff802`29dca000 usbaudio (deferred)
fffff802`29dd0000 fffff802`29de0000 mouhid (deferred)
fffff802`29df0000 fffff802`29e0a000 klmouflt (deferred)
fffff802`29e10000 fffff802`29e23000 mouclass (deferred)
fffff802`29e40000 fffff802`29e4e000 dump_diskdump (deferred)
fffff802`29e90000 fffff802`29ec2000 dump_storahci (deferred)
fffff802`29ef0000 fffff802`29f0d000 dump_dumpfve (deferred)
fffff802`29f10000 fffff802`29ff1000 dxgmms2 (deferred)
fffff802`2a000000 fffff802`2a01b000 monitor (deferred)
fffff802`2a020000 fffff802`2a049000 luafv (deferred)
fffff802`2a050000 fffff802`2a086000 wcifs (deferred)
fffff802`2a090000 fffff802`2a0e4000 WUDFRd (deferred)
fffff802`2a0f0000 fffff802`2a172000 cldflt (deferred)
fffff802`2a180000 fffff802`2a18e000 WpdUpFltr (deferred)
fffff802`2a190000 fffff802`2a1aa000 storqosflt (deferred)
fffff802`2a1b0000 fffff802`2a1d8000 bindflt (deferred)
fffff802`2a1e0000 fffff802`2a1f8000 lltdio (deferred)
fffff802`2a200000 fffff802`2a218000 mslldp (deferred)
fffff802`2a220000 fffff802`2a23b000 rspndr (deferred)
fffff802`2a240000 fffff802`2a25d000 wanarp (deferred)
fffff802`2a2a0000 fffff802`2c830000 nvlddmkm (deferred)
fffff802`2c840000 fffff802`2c865000 HDAudBus (deferred)
fffff802`2c870000 fffff802`2c8d6000 portcls (deferred)
fffff802`2c8e0000 fffff802`2c901000 drmk (deferred)
fffff802`2c910000 fffff802`2c932000 L1C63x64 (deferred)
fffff802`2c940000 fffff802`2c94f000 usbohci (deferred)
fffff802`2c950000 fffff802`2c9c9000 USBPORT (deferred)
fffff802`2c9d0000 fffff802`2c9ea000 usbehci (deferred)
fffff802`64a00000 fffff802`64a94000 mrxsmb (deferred)
fffff802`64aa0000 fffff802`64ae5000 mrxsmb20 (deferred)
fffff802`64af0000 fffff802`64af9000 CorsairLLAccess64 (deferred)
fffff802`64b00000 fffff802`64b53000 srvnet (deferred)
fffff802`64b60000 fffff802`64b74000 mmcss (deferred)
fffff802`64b80000 fffff802`64ba7000 Ndu (deferred)
fffff802`64bb0000 fffff802`64c86000 peauth (deferred)
fffff802`64c90000 fffff802`64ca5000 tcpipreg (deferred)
fffff802`64cb0000 fffff802`64ccc000 rassstp (deferred)
fffff802`64cd0000 fffff802`64d97000 srv2 (deferred)
fffff802`64da0000 fffff802`64dbd000 NDProxy (deferred)
fffff802`64dc0000 fffff802`64de7000 AgileVpn (deferred)
fffff802`64df0000 fffff802`64e11000 rasl2tp (deferred)
fffff802`64e20000 fffff802`64e41000 raspptp (deferred)
fffff802`64e50000 fffff802`64e6c000 raspppoe (deferred)
fffff802`64e70000 fffff802`64e7f000 ndistapi (deferred)
fffff802`64e80000 fffff802`64eba000 ndiswan (deferred)
fffff802`64ec0000 fffff802`64ed2000 condrv (deferred)
fffff802`64ee0000 fffff802`64eeb000 cpuz150_x64 (deferred)
fffff802`64ef0000 fffff802`64f27000 klupd_klif_mark (deferred)
fffff802`64f30000 fffff802`64f69000 klids (deferred)
fffff802`64f70000 fffff802`64fac000 klupd_klif_swmon (deferred)
fffff802`64fb0000 fffff802`64fb9000 CorsairVHidDriver (deferred)
fffff802`64fd0000 fffff802`65158000 HTTP (deferred)
fffff802`65160000 fffff802`65185000 bowser (deferred)
fffff802`65190000 fffff802`651aa000 mpsdrv (deferred)
fffffe38`2dc00000 fffffe38`2ded8000 win32kbase (deferred)
fffffe38`2e130000 fffffe38`2e1ca000 win32k # (pdb symbols) C:\ProgramData\dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
fffffe38`2e3e0000 fffffe38`2e796000 win32kfull (deferred)
fffffe38`2e7a0000 fffffe38`2e7ea000 cdd (deferred)
Unloaded modules:
fffff802`64fc0000 fffff802`64fc8000 magdrvamd64.
fffff802`29b90000 fffff802`29b9a000 CorsairVHidD
fffff802`266b0000 fffff802`266ea000 klids.sys
fffff802`23b40000 fffff802`23b5d000 EhStorClass.
fffff802`26750000 fffff802`2675f000 dump_storpor
fffff802`267a0000 fffff802`267d3000 dump_storahc
fffff802`25800000 fffff802`2581e000 dump_dumpfve
fffff802`269d0000 fffff802`269ec000 dam.sys
fffff802`235a0000 fffff802`235af000 klelam.sys
fffff802`25190000 fffff802`251a1000 hwpolicy.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000019c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80617ee4955, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 17
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on AHMET
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 19
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: d1
BUGCHECK_P1: 19c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80617ee4955
READ_ADDRESS: fffff806148fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock
fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000000000019c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: msedge.exe
DPC_STACK_BASE: FFFFF80618724FB0
TRAP_FRAME: fffff806187234b0 -- (.trap 0xfffff806187234b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000180 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000007 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80617ee4955 rsp=fffff80618723640 rbp=fffff80618723780
r8=0000000000000000 r9=0000000000000000 r10=fffff80613e3a390
r11=fffff80618723610 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
tcpip!IppInspectLocalDatagramsOut+0x505:
fffff806`17ee4955 807d9000 cmp byte ptr [rbp-70h],0 ss:fffff806`18723710=01
Resetting default scope
STACK_TEXT:
fffff806`18723368 fffff806`14008c69 : 00000000`0000000a 00000000`0000019c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`18723370 fffff806`14004f69 : fffff806`1e6d34d0 ffffcb87`00000000 ffffcb87`85bdfef0 fffff806`1e6d448a : nt!KiBugCheckDispatch+0x69
fffff806`187234b0 fffff806`17ee4955 : 00000000`00000003 00000000`00000001 ffffcb87`82893a00 ffffcb87`82893a00 : nt!KiPageFault+0x469
fffff806`18723640 fffff806`17ee3d4b : ffffcb87`757059c8 fffff806`19a703e9 ffffcb87`8654bb01 ffffcb87`75736008 : tcpip!IppInspectLocalDatagramsOut+0x505
fffff806`18723910 fffff806`17ee28b9 : 00000000`00000000 00000000`00000000 fffff806`180a9230 ffffcb87`82893a00 : tcpip!IppSendDatagramsCommon+0x41b
fffff806`18723a90 fffff806`17ec1b2d : ffffcb87`82e94e10 00000000`00000014 00000000`00000000 ffffcb87`84b6ea20 : tcpip!IpNlpFastSendDatagram+0x349
fffff806`18723b50 fffff806`17ec3cf6 : ffffcb87`84b6ea20 00000000`00000000 00000000`2cd154a4 ffffcb87`751ff3c0 : tcpip!TcpTcbHeaderSend+0x5cd
fffff806`18723e00 fffff806`17ec223e : ffffcb87`750fe700 fffff806`13e1bb01 ffffcb87`00000000 00000000`00000000 : tcpip!TcpReceive+0x4d6
fffff806`18723ef0 fffff806`17ed44b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e
fffff806`18723f30 fffff806`17f2f6be : ffffcb87`7812d800 ffffcb87`7ba8e410 00000000`00000006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
fffff806`187241c0 fffff806`13e98bc8 : ffffcb87`75783cc0 00000000`00000002 ffffcb87`7e87c080 fffff806`187244b8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
fffff806`18724310 fffff806`13e98b3d : fffff806`17f2f590 fffff806`187244b8 ffffcb87`754d2560 fffff806`16f423af : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff806`18724380 fffff806`17f226ad : ffffcb87`7c410350 fffff806`1dfcadb7 ffffcb87`861d14d0 fffff806`17dd142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff806`187243c0 fffff806`17f21d8d : 00000000`00000001 fffff806`18724520 ffffcb87`7ba8e410 fffff806`18724530 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff806`18724420 fffff806`16dd1eb0 : fffff806`1a9c8ab0 fffff806`18dac617 ffffcb87`75e408a0 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff806`187246d0 fffff806`16dd1ccb : ffffcb87`7ba8eaa0 00000000`00000001 ffffcb87`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff806`187247b0 fffff806`16dd7ef0 : ffffcb87`7b0b71a0 ffffcb87`754b1901 ffffcb87`7b0b71a0 0000ffff`f8062001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff806`18724830 fffff806`16e0dd73 : ffffcb87`7b90e030 fffff806`18724901 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
fffff806`18724880 fffff806`16dd4a94 : 00000000`0001d3d4 00000000`00000001 ffffcb87`7b0b71a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff806`18724950 fffff806`20fd8a96 : ffffcb87`00000001 ffffcb87`7b80f000 ffffcb87`7b80fa30 fffff806`18724b00 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff806`187249e0 fffff806`20fdb762 : 00000000`00000000 fffff806`18724b00 00000002`00000000 00000000`00000000 : L1C63x64!HandleRxIntr+0x25e
fffff806`18724a90 fffff806`16e13579 : 00000000`00000010 ffffcb87`7b8129a0 fffff806`18724b49 ffffcb87`7b0b71a0 : L1C63x64!HardwareHandleInterrupt+0x1ba
fffff806`18724ad0 fffff806`13f230ce : fffff806`0fae5240 ffffcb87`737ec000 00000000`00000000 ffffcb87`00000002 : ndis!ndisInterruptDpc+0x3be89
fffff806`18724bb0 fffff806`13f223b4 : fffff806`0fae2180 00000000`00000000 00000000`00000008 00000000`000116f1 : nt!KiExecuteAllDpcs+0x30e
fffff806`18724d20 fffff806`13ffdd35 : 00000000`00000000 fffff806`0fae2180 ffffa700`d9dcc8c0 00000000`000000bd : nt!KiRetireDpcList+0x1f4
fffff806`18724fb0 fffff806`13ffdb20 : fffff806`13ff2de0 fffff806`13ec656a 00000000`00000000 00002bd5`17244f48 : nt!KxRetireDpcList+0x5
fffff380`4fe29ac0 fffff806`13ffd3d5 : 00000000`000000bd fffff806`13ff8041 00000000`00000001 ffffcb87`7e3a9080 : nt!KiDispatchInterruptContinue
fffff380`4fe29af0 fffff806`13ff8041 : 00000000`00000001 ffffcb87`7e3a9080 fffff380`00000000 ffffcb87`00000000 : nt!KiDpcInterruptBypass+0x25
fffff380`4fe29b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0xb1
SYMBOL_NAME: L1C63x64!HandleRxIntr+25e
MODULE_NAME: L1C63x64
IMAGE_NAME: L1C63x64.sys
IMAGE_VERSION: 2.1.0.16
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 25e
FAILURE_BUCKET_ID: AV_L1C63x64!HandleRxIntr
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d6379392-3f48-c6ec-1a10-10fcebd963ee}
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000019c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80617ee4955, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 15
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on AHMET
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 16
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: d1
BUGCHECK_P1: 19c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80617ee4955
READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock
000000000000019c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: msedge.exe
DPC_STACK_BASE: FFFFF80618724FB0
TRAP_FRAME: fffff806187234b0 -- (.trap 0xfffff806187234b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000180 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000007 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80617ee4955 rsp=fffff80618723640 rbp=fffff80618723780
r8=0000000000000000 r9=0000000000000000 r10=fffff80613e3a390
r11=fffff80618723610 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
tcpip!IppInspectLocalDatagramsOut+0x505:
fffff806`17ee4955 807d9000 cmp byte ptr [rbp-70h],0 ss:fffff806`18723710=01
Resetting default scope
STACK_TEXT:
fffff806`18723368 fffff806`14008c69 : 00000000`0000000a 00000000`0000019c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`18723370 fffff806`14004f69 : fffff806`1e6d34d0 ffffcb87`00000000 ffffcb87`85bdfef0 fffff806`1e6d448a : nt!KiBugCheckDispatch+0x69
fffff806`187234b0 fffff806`17ee4955 : 00000000`00000003 00000000`00000001 ffffcb87`82893a00 ffffcb87`82893a00 : nt!KiPageFault+0x469
fffff806`18723640 fffff806`17ee3d4b : ffffcb87`757059c8 fffff806`19a703e9 ffffcb87`8654bb01 ffffcb87`75736008 : tcpip!IppInspectLocalDatagramsOut+0x505
fffff806`18723910 fffff806`17ee28b9 : 00000000`00000000 00000000`00000000 fffff806`180a9230 ffffcb87`82893a00 : tcpip!IppSendDatagramsCommon+0x41b
fffff806`18723a90 fffff806`17ec1b2d : ffffcb87`82e94e10 00000000`00000014 00000000`00000000 ffffcb87`84b6ea20 : tcpip!IpNlpFastSendDatagram+0x349
fffff806`18723b50 fffff806`17ec3cf6 : ffffcb87`84b6ea20 00000000`00000000 00000000`2cd154a4 ffffcb87`751ff3c0 : tcpip!TcpTcbHeaderSend+0x5cd
fffff806`18723e00 fffff806`17ec223e : ffffcb87`750fe700 fffff806`13e1bb01 ffffcb87`00000000 00000000`00000000 : tcpip!TcpReceive+0x4d6
fffff806`18723ef0 fffff806`17ed44b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e
fffff806`18723f30 fffff806`17f2f6be : ffffcb87`7812d800 ffffcb87`7ba8e410 00000000`00000006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
fffff806`187241c0 fffff806`13e98bc8 : ffffcb87`75783cc0 00000000`00000002 ffffcb87`7e87c080 fffff806`187244b8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
fffff806`18724310 fffff806`13e98b3d : fffff806`17f2f590 fffff806`187244b8 ffffcb87`754d2560 fffff806`16f423af : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff806`18724380 fffff806`17f226ad : ffffcb87`7c410350 fffff806`1dfcadb7 ffffcb87`861d14d0 fffff806`17dd142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff806`187243c0 fffff806`17f21d8d : 00000000`00000001 fffff806`18724520 ffffcb87`7ba8e410 fffff806`18724530 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff806`18724420 fffff806`16dd1eb0 : fffff806`1a9c8ab0 fffff806`18dac617 ffffcb87`75e408a0 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff806`187246d0 fffff806`16dd1ccb : ffffcb87`7ba8eaa0 00000000`00000001 ffffcb87`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff806`187247b0 fffff806`16dd7ef0 : ffffcb87`7b0b71a0 ffffcb87`754b1901 ffffcb87`7b0b71a0 0000ffff`f8062001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff806`18724830 fffff806`16e0dd73 : ffffcb87`7b90e030 fffff806`18724901 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
fffff806`18724880 fffff806`16dd4a94 : 00000000`0001d3d4 00000000`00000001 ffffcb87`7b0b71a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff806`18724950 fffff806`20fd8a96 : ffffcb87`00000001 ffffcb87`7b80f000 ffffcb87`7b80fa30 fffff806`18724b00 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff806`187249e0 fffff806`20fdb762 : 00000000`00000000 fffff806`18724b00 00000002`00000000 00000000`00000000 : L1C63x64!HandleRxIntr+0x25e
fffff806`18724a90 fffff806`16e13579 : 00000000`00000010 ffffcb87`7b8129a0 fffff806`18724b49 ffffcb87`7b0b71a0 : L1C63x64!HardwareHandleInterrupt+0x1ba
fffff806`18724ad0 fffff806`13f230ce : fffff806`0fae5240 ffffcb87`737ec000 00000000`00000000 ffffcb87`00000002 : ndis!ndisInterruptDpc+0x3be89
fffff806`18724bb0 fffff806`13f223b4 : fffff806`0fae2180 00000000`00000000 00000000`00000008 00000000`000116f1 : nt!KiExecuteAllDpcs+0x30e
fffff806`18724d20 fffff806`13ffdd35 : 00000000`00000000 fffff806`0fae2180 ffffa700`d9dcc8c0 00000000`000000bd : nt!KiRetireDpcList+0x1f4
fffff806`18724fb0 fffff806`13ffdb20 : fffff806`13ff2de0 fffff806`13ec656a 00000000`00000000 00002bd5`17244f48 : nt!KxRetireDpcList+0x5
fffff380`4fe29ac0 fffff806`13ffd3d5 : 00000000`000000bd fffff806`13ff8041 00000000`00000001 ffffcb87`7e3a9080 : nt!KiDispatchInterruptContinue
fffff380`4fe29af0 fffff806`13ff8041 : 00000000`00000001 ffffcb87`7e3a9080 fffff380`00000000 ffffcb87`00000000 : nt!KiDpcInterruptBypass+0x25
fffff380`4fe29b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0xb1
SYMBOL_NAME: L1C63x64!HandleRxIntr+25e
MODULE_NAME: L1C63x64
IMAGE_NAME: L1C63x64.sys
IMAGE_VERSION: 2.1.0.16
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 25e
FAILURE_BUCKET_ID: AV_L1C63x64!HandleRxIntr
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d6379392-3f48-c6ec-1a10-10fcebd963ee}
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000019c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80617ee4955, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 15
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on AHMET
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 16
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: d1
BUGCHECK_P1: 19c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80617ee4955
READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock
000000000000019c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: msedge.exe
DPC_STACK_BASE: FFFFF80618724FB0
TRAP_FRAME: fffff806187234b0 -- (.trap 0xfffff806187234b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000180 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000007 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80617ee4955 rsp=fffff80618723640 rbp=fffff80618723780
r8=0000000000000000 r9=0000000000000000 r10=fffff80613e3a390
r11=fffff80618723610 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
tcpip!IppInspectLocalDatagramsOut+0x505:
fffff806`17ee4955 807d9000 cmp byte ptr [rbp-70h],0 ss:fffff806`18723710=01
Resetting default scope
STACK_TEXT:
fffff806`18723368 fffff806`14008c69 : 00000000`0000000a 00000000`0000019c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`18723370 fffff806`14004f69 : fffff806`1e6d34d0 ffffcb87`00000000 ffffcb87`85bdfef0 fffff806`1e6d448a : nt!KiBugCheckDispatch+0x69
fffff806`187234b0 fffff806`17ee4955 : 00000000`00000003 00000000`00000001 ffffcb87`82893a00 ffffcb87`82893a00 : nt!KiPageFault+0x469
fffff806`18723640 fffff806`17ee3d4b : ffffcb87`757059c8 fffff806`19a703e9 ffffcb87`8654bb01 ffffcb87`75736008 : tcpip!IppInspectLocalDatagramsOut+0x505
fffff806`18723910 fffff806`17ee28b9 : 00000000`00000000 00000000`00000000 fffff806`180a9230 ffffcb87`82893a00 : tcpip!IppSendDatagramsCommon+0x41b
fffff806`18723a90 fffff806`17ec1b2d : ffffcb87`82e94e10 00000000`00000014 00000000`00000000 ffffcb87`84b6ea20 : tcpip!IpNlpFastSendDatagram+0x349
fffff806`18723b50 fffff806`17ec3cf6 : ffffcb87`84b6ea20 00000000`00000000 00000000`2cd154a4 ffffcb87`751ff3c0 : tcpip!TcpTcbHeaderSend+0x5cd
fffff806`18723e00 fffff806`17ec223e : ffffcb87`750fe700 fffff806`13e1bb01 ffffcb87`00000000 00000000`00000000 : tcpip!TcpReceive+0x4d6
fffff806`18723ef0 fffff806`17ed44b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e
fffff806`18723f30 fffff806`17f2f6be : ffffcb87`7812d800 ffffcb87`7ba8e410 00000000`00000006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
fffff806`187241c0 fffff806`13e98bc8 : ffffcb87`75783cc0 00000000`00000002 ffffcb87`7e87c080 fffff806`187244b8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
fffff806`18724310 fffff806`13e98b3d : fffff806`17f2f590 fffff806`187244b8 ffffcb87`754d2560 fffff806`16f423af : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff806`18724380 fffff806`17f226ad : ffffcb87`7c410350 fffff806`1dfcadb7 ffffcb87`861d14d0 fffff806`17dd142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff806`187243c0 fffff806`17f21d8d : 00000000`00000001 fffff806`18724520 ffffcb87`7ba8e410 fffff806`18724530 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff806`18724420 fffff806`16dd1eb0 : fffff806`1a9c8ab0 fffff806`18dac617 ffffcb87`75e408a0 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff806`187246d0 fffff806`16dd1ccb : ffffcb87`7ba8eaa0 00000000`00000001 ffffcb87`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff806`187247b0 fffff806`16dd7ef0 : ffffcb87`7b0b71a0 ffffcb87`754b1901 ffffcb87`7b0b71a0 0000ffff`f8062001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff806`18724830 fffff806`16e0dd73 : ffffcb87`7b90e030 fffff806`18724901 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
fffff806`18724880 fffff806`16dd4a94 : 00000000`0001d3d4 00000000`00000001 ffffcb87`7b0b71a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff806`18724950 fffff806`20fd8a96 : ffffcb87`00000001 ffffcb87`7b80f000 ffffcb87`7b80fa30 fffff806`18724b00 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff806`187249e0 fffff806`20fdb762 : 00000000`00000000 fffff806`18724b00 00000002`00000000 00000000`00000000 : L1C63x64!HandleRxIntr+0x25e
fffff806`18724a90 fffff806`16e13579 : 00000000`00000010 ffffcb87`7b8129a0 fffff806`18724b49 ffffcb87`7b0b71a0 : L1C63x64!HardwareHandleInterrupt+0x1ba
fffff806`18724ad0 fffff806`13f230ce : fffff806`0fae5240 ffffcb87`737ec000 00000000`00000000 ffffcb87`00000002 : ndis!ndisInterruptDpc+0x3be89
fffff806`18724bb0 fffff806`13f223b4 : fffff806`0fae2180 00000000`00000000 00000000`00000008 00000000`000116f1 : nt!KiExecuteAllDpcs+0x30e
fffff806`18724d20 fffff806`13ffdd35 : 00000000`00000000 fffff806`0fae2180 ffffa700`d9dcc8c0 00000000`000000bd : nt!KiRetireDpcList+0x1f4
fffff806`18724fb0 fffff806`13ffdb20 : fffff806`13ff2de0 fffff806`13ec656a 00000000`00000000 00002bd5`17244f48 : nt!KxRetireDpcList+0x5
fffff380`4fe29ac0 fffff806`13ffd3d5 : 00000000`000000bd fffff806`13ff8041 00000000`00000001 ffffcb87`7e3a9080 : nt!KiDispatchInterruptContinue
fffff380`4fe29af0 fffff806`13ff8041 : 00000000`00000001 ffffcb87`7e3a9080 fffff380`00000000 ffffcb87`00000000 : nt!KiDpcInterruptBypass+0x25
fffff380`4fe29b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0xb1
SYMBOL_NAME: L1C63x64!HandleRxIntr+25e
MODULE_NAME: L1C63x64
IMAGE_NAME: L1C63x64.sys
IMAGE_VERSION: 2.1.0.16
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 25e
FAILURE_BUCKET_ID: AV_L1C63x64!HandleRxIntr
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d6379392-3f48-c6ec-1a10-10fcebd963ee}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
extents for the thread.
Arg2: ffffde018a9f41a0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffde018a9f40f8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 9
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on AHMET
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 12
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 139
BUGCHECK_P1: 4
BUGCHECK_P2: ffffde018a9f41a0
BUGCHECK_P3: ffffde018a9f40f8
BUGCHECK_P4: 0
TRAP_FRAME: ffffde018a9f41a0 -- (.trap 0xffffde018a9f41a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd70582463000 rbx=0000000000000000 rcx=0000000000000004
rdx=ffffd70582469000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80220e3bc65 rsp=ffffde018a9f4330 rbp=ffffde018a9f43a0
r8=ffffd70582469000 r9=ffffde018a9f4300 r10=0000fffff80220d6
r11=ffffde018a9f4570 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!RtlpGetStackLimitsEx+0x1b4aa5:
fffff802`20e3bc65 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffde018a9f40f8 -- (.exr 0xffffde018a9f40f8)
ExceptionAddress: fffff80220e3bc65 (nt!RtlpGetStackLimitsEx+0x00000000001b4aa5)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: msedge.exe
WATSON_BKT_EVENT: BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000004
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffde01`8a9f3e78 fffff802`20e08c69 : 00000000`00000139 00000000`00000004 ffffde01`8a9f41a0 ffffde01`8a9f40f8 : nt!KeBugCheckEx
ffffde01`8a9f3e80 fffff802`20e09090 : 982e0d8b`482079c0 6899770d`8d4c002a 44c70000`001cbaff 75e80000`03622024 : nt!KiBugCheckDispatch+0x69
ffffde01`8a9f3fc0 fffff802`20e07423 : 45c033ff`fff6b8e9 33eeebc0`960fc83b ebc0970f`c83b45c0 920fc83b`45c033e4 : nt!KiFastFailDispatch+0xd0
ffffde01`8a9f41a0 fffff802`20e3bc65 : ffffde01`8a9f45b0 ffffde01`8a9f4d78 ffffde01`8a9f43a0 44894800`10cc13e8 : nt!KiRaiseSecurityCheckFailure+0x323
ffffde01`8a9f4330 fffff802`20c87391 : ffffde01`8a9f45b0 00000000`00000000 0c8d49d7`8b49c68b 8b4cffb6`00000003 : nt!RtlpGetStackLimitsEx+0x1b4aa5
ffffde01`8a9f4360 fffff802`20c86136 : ffffde01`8a9f4d78 ffffde01`8a9f4ab0 ffffde01`8a9f4d78 0000004c`3f7fcf68 : nt!RtlDispatchException+0xe1
ffffde01`8a9f4580 fffff802`20e08dac : 00000000`00000000 00000000`00000000 00000000`00000000 ffff054f`fd20144d : nt!KiDispatchException+0x186
ffffde01`8a9f4c40 fffff802`20e04ae0 : 00000000`00000000 00000000`00000000 00000000`000033f4 fffff802`20c9468f : nt!KiExceptionDispatch+0x12c
ffffde01`8a9f4e20 fffff802`20dfd96d : ffffd705`82468b80 ffff968c`8d2aed40 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
ffffde01`8a9f4fb0 fffff802`20dfd6f7 : 00000000`00000000 00000000`00000000 ffffd705`00000000 ffff968c`00000000 : nt!KiIpiInterruptSubDispatch+0x1d
ffffd705`82468b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIpiInterrupt+0x307
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.985
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_nt!KiFastFailDispatch
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1971a9b0-b7ec-89bf-0a51-10ac52818da5}
Followup: MachineOwner
---------
3: kd> lm
start end module name
fffff802`1d900000 fffff802`1d928000 mcupdate_AuthenticAMD (deferred)
fffff802`1d930000 fffff802`1d936000 hal (deferred)
fffff802`1d940000 fffff802`1d94b000 kd (deferred)
fffff802`1d950000 fffff802`1d977000 tm (deferred)
fffff802`1d980000 fffff802`1d9ea000 CLFS (deferred)
fffff802`1d9f0000 fffff802`1da0a000 PSHED (deferred)
fffff802`1da10000 fffff802`1da1b000 BOOTVID (deferred)
fffff802`1da20000 fffff802`1db33000 clipsp (deferred)
fffff802`1db40000 fffff802`1dbaf000 FLTMGR (deferred)
fffff802`1dbb0000 fffff802`1dbd9000 ksecdd (deferred)
fffff802`1dbe0000 fffff802`1dc43000 msrpc (deferred)
fffff802`1dc50000 fffff802`1dc5e000 cmimcext (deferred)
fffff802`1dc60000 fffff802`1dc71000 werkernel (deferred)
fffff802`1dc80000 fffff802`1dc8c000 ntosext (deferred)
fffff802`1dc90000 fffff802`1dca3000 WDFLDR (deferred)
fffff802`1dcb0000 fffff802`1dcbf000 SleepStudyHelper (deferred)
fffff802`1dcc0000 fffff802`1dcd1000 WppRecorder (deferred)
fffff802`1dce0000 fffff802`1dcfa000 SgrmAgent (deferred)
fffff802`20a00000 fffff802`21a46000 nt (pdb symbols) C:\ProgramData\dbg\sym\ntkrnlmp.pdb\992A9A48F30EC2C58B01A5934DCE2D9C1\ntkrnlmp.pdb
fffff802`23200000 fffff802`232e3000 CI (deferred)
fffff802`232f0000 fffff802`233a7000 cng (deferred)
fffff802`233b0000 fffff802`23482000 Wdf01000 (deferred)
fffff802`23490000 fffff802`234b6000 acpiex (deferred)
fffff802`234c0000 fffff802`2358c000 ACPI (deferred)
fffff802`23590000 fffff802`2359c000 WMILIB (deferred)
fffff802`235b0000 fffff802`2361b000 intelpep (deferred)
fffff802`23620000 fffff802`23637000 WindowsTrustedRT (deferred)
fffff802`23640000 fffff802`2364b000 IntelTA (deferred)
fffff802`23650000 fffff802`2365b000 WindowsTrustedRTProxy (deferred)
fffff802`23660000 fffff802`23674000 pcw (deferred)
fffff802`23680000 fffff802`236c0000 klupd_klif_arkmon (deferred)
fffff802`236d0000 fffff802`236db000 msisadrv (deferred)
fffff802`236e0000 fffff802`23757000 pci (deferred)
fffff802`23760000 fffff802`23775000 vdrvroot (deferred)
fffff802`23780000 fffff802`237bb000 cm_km (deferred)
fffff802`237c0000 fffff802`237ef000 pdc (deferred)
fffff802`237f0000 fffff802`23809000 CEA (deferred)
fffff802`23810000 fffff802`23841000 partmgr (deferred)
fffff802`23850000 fffff802`2385a000 pciide (deferred)
fffff802`23860000 fffff802`23873000 PCIIDEX (deferred)
fffff802`23880000 fffff802`2392a000 spaceport (deferred)
fffff802`23930000 fffff802`23949000 volmgr (deferred)
fffff802`23950000 fffff802`239b3000 volmgrx (deferred)
fffff802`239c0000 fffff802`239de000 mountmgr (deferred)
fffff802`239e0000 fffff802`239ed000 atapi (deferred)
fffff802`239f0000 fffff802`239fd000 Fs_Rec (deferred)
fffff802`23a00000 fffff802`23a3c000 ataport (deferred)
fffff802`23a40000 fffff802`23a72000 storahci (deferred)
fffff802`23a80000 fffff802`23b33000 storport (deferred)
fffff802`23b60000 fffff802`23b7a000 fileinfo (deferred)
fffff802`23b80000 fffff802`23bc0000 Wof (deferred)
fffff802`23bd0000 fffff802`23d3f000 ndis (deferred)
fffff802`23d40000 fffff802`23dd8000 NETIO (deferred)
fffff802`23de0000 fffff802`23deb000 volume (deferred)
fffff802`23e00000 fffff802`248a5000 FACEIT (deferred)
fffff802`248b0000 fffff802`24b89000 Ntfs (deferred)
fffff802`24b90000 fffff802`24bc2000 ksecpkg (deferred)
fffff802`24bd0000 fffff802`24ebb000 tcpip (deferred)
fffff802`24ec0000 fffff802`24f3f000 fwpkclnt (deferred)
fffff802`24f40000 fffff802`24f70000 wfplwfs (deferred)
fffff802`24f80000 fffff802`25048000 fvevol (deferred)
fffff802`25050000 fffff802`250a0000 rdyboost (deferred)
fffff802`250b0000 fffff802`2511d000 volsnap (deferred)
fffff802`25120000 fffff802`25146000 mup (deferred)
fffff802`25150000 fffff802`25169000 klupd_klif_klbg (deferred)
fffff802`25170000 fffff802`25182000 iorate (deferred)
fffff802`251b0000 fffff802`251cc000 disk (deferred)
fffff802`251d0000 fffff802`2523c000 CLASSPNP (deferred)
fffff802`25820000 fffff802`25fd8000 vgk (deferred)
fffff802`25fe0000 fffff802`25ff9000 klbackupdisk (deferred)
fffff802`26000000 fffff802`26030000 cdrom (deferred)
fffff802`26040000 fffff802`260ca000 klflt (deferred)
fffff802`260d0000 fffff802`26101000 klbackupflt (deferred)
fffff802`26110000 fffff802`26125000 filecrypt (deferred)
fffff802`26130000 fffff802`2613e000 tbs (deferred)
fffff802`26140000 fffff802`26240000 klif (deferred)
fffff802`26250000 fffff802`262c6000 ks (deferred)
fffff802`262d0000 fffff802`2645b000 klhk (deferred)
fffff802`26460000 fffff802`26501000 klgse (deferred)
fffff802`26510000 fffff802`26522000 klpd (deferred)
fffff802`26530000 fffff802`2654c000 kldisk (deferred)
fffff802`26550000 fffff802`2655a000 Null (deferred)
fffff802`26560000 fffff802`2656a000 Beep (deferred)
fffff802`26570000 fffff802`26585000 klpnpflt (deferred)
fffff802`26590000 fffff802`2660b000 rdbss (deferred)
fffff802`26610000 fffff802`26622000 nsiproxy (deferred)
fffff802`26630000 fffff802`2663e000 npsvctrig (deferred)
fffff802`26640000 fffff802`26650000 mssmbios (deferred)
fffff802`26660000 fffff802`266a9000 kneps (deferred)
fffff802`266f0000 fffff802`266fa000 gpuenergydrv (deferred)
fffff802`26720000 fffff802`2673e000 crashdmp (deferred)
fffff802`26800000 fffff802`26817000 bam (deferred)
fffff802`26820000 fffff802`2686e000 ahcache (deferred)
fffff802`26870000 fffff802`2687d000 kltap (deferred)
fffff802`26880000 fffff802`26892000 CompositeBus (deferred)
fffff802`268a0000 fffff802`268ad000 kdnic (deferred)
fffff802`268b0000 fffff802`268c5000 umbus (deferred)
fffff802`268d0000 fffff802`2690b000 amdppm (deferred)
fffff802`26910000 fffff802`26966000 msquic (deferred)
fffff802`269a0000 fffff802`269cc000 dfsc (deferred)
fffff802`26c00000 fffff802`26c5c000 netbt (deferred)
fffff802`26c60000 fffff802`26c73000 afunix (deferred)
fffff802`26c80000 fffff802`26d23000 afd (deferred)
fffff802`26d30000 fffff802`26d7b000 klwtp (deferred)
fffff802`26d80000 fffff802`26d95000 klim6 (deferred)
fffff802`26da0000 fffff802`26dba000 vwififlt (deferred)
fffff802`26dc0000 fffff802`26deb000 pacer (deferred)
fffff802`26df0000 fffff802`26e04000 ndiscap (deferred)
fffff802`26e10000 fffff802`26e24000 netbios (deferred)
fffff802`26e30000 fffff802`26ed1000 Vid (deferred)
fffff802`26ee0000 fffff802`27285000 dxgkrnl (deferred)
fffff802`27290000 fffff802`272a8000 watchdog (deferred)
fffff802`272b0000 fffff802`272c6000 BasicDisplay (deferred)
fffff802`272d0000 fffff802`272e1000 BasicRender (deferred)
fffff802`272f0000 fffff802`2730c000 Npfs (deferred)
fffff802`27310000 fffff802`27321000 Msfs (deferred)
fffff802`27330000 fffff802`2734b000 CimFS (deferred)
fffff802`27350000 fffff802`27374000 klwfp (deferred)
fffff802`27380000 fffff802`273a2000 tdx (deferred)
fffff802`273b0000 fffff802`273c0000 TDI (deferred)
fffff802`273d0000 fffff802`273f1000 winhvr (deferred)
fffff802`29a00000 fffff802`29a1c000 serial (deferred)
fffff802`29a20000 fffff802`29a2f000 serenum (deferred)
fffff802`29a30000 fffff802`29a4f000 parport (deferred)
fffff802`29a50000 fffff802`29a61000 nvvad64v (deferred)
fffff802`29a70000 fffff802`29a7f000 ksthunk (deferred)
fffff802`29a80000 fffff802`29a8d000 NvModuleTracker (deferred)
fffff802`29a90000 fffff802`29aa0000 nvvhci (deferred)
fffff802`29ab0000 fffff802`29abd000 NdisVirtualBus (deferred)
fffff802`29ac0000 fffff802`29acc000 swenum (deferred)
fffff802`29ad0000 fffff802`29ade000 CorsairVBusDriver (deferred)
fffff802`29ae0000 fffff802`29aee000 rdpbus (deferred)
fffff802`29af0000 fffff802`29b75000 usbhub (deferred)
fffff802`29b80000 fffff802`29b8e000 USBD (deferred)
fffff802`29ba0000 fffff802`29bdf000 HIDCLASS (deferred)
fffff802`29be0000 fffff802`29bf3000 HIDPARSE (deferred)
fffff802`29c00000 fffff802`29c23000 nvhda64v (deferred)
fffff802`29c30000 fffff802`29c9f000 HdAudio (deferred)
fffff802`29ca0000 fffff802`29cb1000 kbdhid (deferred)
fffff802`29cc0000 fffff802`29cd9000 klkbdflt (deferred)
fffff802`29ce0000 fffff802`29cf4000 kbdclass (deferred)
fffff802`29d00000 fffff802`29d33000 usbccgp (deferred)
fffff802`29d40000 fffff802`29d65000 USBSTOR (deferred)
fffff802`29d70000 fffff802`29d82000 hidusb (deferred)
fffff802`29d90000 fffff802`29dca000 usbaudio (deferred)
fffff802`29dd0000 fffff802`29de0000 mouhid (deferred)
fffff802`29df0000 fffff802`29e0a000 klmouflt (deferred)
fffff802`29e10000 fffff802`29e23000 mouclass (deferred)
fffff802`29e40000 fffff802`29e4e000 dump_diskdump (deferred)
fffff802`29e90000 fffff802`29ec2000 dump_storahci (deferred)
fffff802`29ef0000 fffff802`29f0d000 dump_dumpfve (deferred)
fffff802`29f10000 fffff802`29ff1000 dxgmms2 (deferred)
fffff802`2a000000 fffff802`2a01b000 monitor (deferred)
fffff802`2a020000 fffff802`2a049000 luafv (deferred)
fffff802`2a050000 fffff802`2a086000 wcifs (deferred)
fffff802`2a090000 fffff802`2a0e4000 WUDFRd (deferred)
fffff802`2a0f0000 fffff802`2a172000 cldflt (deferred)
fffff802`2a180000 fffff802`2a18e000 WpdUpFltr (deferred)
fffff802`2a190000 fffff802`2a1aa000 storqosflt (deferred)
fffff802`2a1b0000 fffff802`2a1d8000 bindflt (deferred)
fffff802`2a1e0000 fffff802`2a1f8000 lltdio (deferred)
fffff802`2a200000 fffff802`2a218000 mslldp (deferred)
fffff802`2a220000 fffff802`2a23b000 rspndr (deferred)
fffff802`2a240000 fffff802`2a25d000 wanarp (deferred)
fffff802`2a2a0000 fffff802`2c830000 nvlddmkm (deferred)
fffff802`2c840000 fffff802`2c865000 HDAudBus (deferred)
fffff802`2c870000 fffff802`2c8d6000 portcls (deferred)
fffff802`2c8e0000 fffff802`2c901000 drmk (deferred)
fffff802`2c910000 fffff802`2c932000 L1C63x64 (deferred)
fffff802`2c940000 fffff802`2c94f000 usbohci (deferred)
fffff802`2c950000 fffff802`2c9c9000 USBPORT (deferred)
fffff802`2c9d0000 fffff802`2c9ea000 usbehci (deferred)
fffff802`64a00000 fffff802`64a94000 mrxsmb (deferred)
fffff802`64aa0000 fffff802`64ae5000 mrxsmb20 (deferred)
fffff802`64af0000 fffff802`64af9000 CorsairLLAccess64 (deferred)
fffff802`64b00000 fffff802`64b53000 srvnet (deferred)
fffff802`64b60000 fffff802`64b74000 mmcss (deferred)
fffff802`64b80000 fffff802`64ba7000 Ndu (deferred)
fffff802`64bb0000 fffff802`64c86000 peauth (deferred)
fffff802`64c90000 fffff802`64ca5000 tcpipreg (deferred)
fffff802`64cb0000 fffff802`64ccc000 rassstp (deferred)
fffff802`64cd0000 fffff802`64d97000 srv2 (deferred)
fffff802`64da0000 fffff802`64dbd000 NDProxy (deferred)
fffff802`64dc0000 fffff802`64de7000 AgileVpn (deferred)
fffff802`64df0000 fffff802`64e11000 rasl2tp (deferred)
fffff802`64e20000 fffff802`64e41000 raspptp (deferred)
fffff802`64e50000 fffff802`64e6c000 raspppoe (deferred)
fffff802`64e70000 fffff802`64e7f000 ndistapi (deferred)
fffff802`64e80000 fffff802`64eba000 ndiswan (deferred)
fffff802`64ec0000 fffff802`64ed2000 condrv (deferred)
fffff802`64ee0000 fffff802`64eeb000 cpuz150_x64 (deferred)
fffff802`64ef0000 fffff802`64f27000 klupd_klif_mark (deferred)
fffff802`64f30000 fffff802`64f69000 klids (deferred)
fffff802`64f70000 fffff802`64fac000 klupd_klif_swmon (deferred)
fffff802`64fb0000 fffff802`64fb9000 CorsairVHidDriver (deferred)
fffff802`64fd0000 fffff802`65158000 HTTP (deferred)
fffff802`65160000 fffff802`65185000 bowser (deferred)
fffff802`65190000 fffff802`651aa000 mpsdrv (deferred)
fffffe38`2dc00000 fffffe38`2ded8000 win32kbase (deferred)
fffffe38`2e130000 fffffe38`2e1ca000 win32k # (pdb symbols) C:\ProgramData\dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
fffffe38`2e3e0000 fffffe38`2e796000 win32kfull (deferred)
fffffe38`2e7a0000 fffffe38`2e7ea000 cdd (deferred)
Unloaded modules:
fffff802`64fc0000 fffff802`64fc8000 magdrvamd64.
fffff802`29b90000 fffff802`29b9a000 CorsairVHidD
fffff802`266b0000 fffff802`266ea000 klids.sys
fffff802`23b40000 fffff802`23b5d000 EhStorClass.
fffff802`26750000 fffff802`2675f000 dump_storpor
fffff802`267a0000 fffff802`267d3000 dump_storahc
fffff802`25800000 fffff802`2581e000 dump_dumpfve
fffff802`269d0000 fffff802`269ec000 dam.sys
fffff802`235a0000 fffff802`235af000 klelam.sys
fffff802`25190000 fffff802`251a1000 hwpolicy.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000019c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80617ee4955, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 17
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on AHMET
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 19
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: d1
BUGCHECK_P1: 19c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80617ee4955
READ_ADDRESS: fffff806148fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock
fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000000000019c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: msedge.exe
DPC_STACK_BASE: FFFFF80618724FB0
TRAP_FRAME: fffff806187234b0 -- (.trap 0xfffff806187234b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000180 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000007 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80617ee4955 rsp=fffff80618723640 rbp=fffff80618723780
r8=0000000000000000 r9=0000000000000000 r10=fffff80613e3a390
r11=fffff80618723610 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
tcpip!IppInspectLocalDatagramsOut+0x505:
fffff806`17ee4955 807d9000 cmp byte ptr [rbp-70h],0 ss:fffff806`18723710=01
Resetting default scope
STACK_TEXT:
fffff806`18723368 fffff806`14008c69 : 00000000`0000000a 00000000`0000019c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`18723370 fffff806`14004f69 : fffff806`1e6d34d0 ffffcb87`00000000 ffffcb87`85bdfef0 fffff806`1e6d448a : nt!KiBugCheckDispatch+0x69
fffff806`187234b0 fffff806`17ee4955 : 00000000`00000003 00000000`00000001 ffffcb87`82893a00 ffffcb87`82893a00 : nt!KiPageFault+0x469
fffff806`18723640 fffff806`17ee3d4b : ffffcb87`757059c8 fffff806`19a703e9 ffffcb87`8654bb01 ffffcb87`75736008 : tcpip!IppInspectLocalDatagramsOut+0x505
fffff806`18723910 fffff806`17ee28b9 : 00000000`00000000 00000000`00000000 fffff806`180a9230 ffffcb87`82893a00 : tcpip!IppSendDatagramsCommon+0x41b
fffff806`18723a90 fffff806`17ec1b2d : ffffcb87`82e94e10 00000000`00000014 00000000`00000000 ffffcb87`84b6ea20 : tcpip!IpNlpFastSendDatagram+0x349
fffff806`18723b50 fffff806`17ec3cf6 : ffffcb87`84b6ea20 00000000`00000000 00000000`2cd154a4 ffffcb87`751ff3c0 : tcpip!TcpTcbHeaderSend+0x5cd
fffff806`18723e00 fffff806`17ec223e : ffffcb87`750fe700 fffff806`13e1bb01 ffffcb87`00000000 00000000`00000000 : tcpip!TcpReceive+0x4d6
fffff806`18723ef0 fffff806`17ed44b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e
fffff806`18723f30 fffff806`17f2f6be : ffffcb87`7812d800 ffffcb87`7ba8e410 00000000`00000006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
fffff806`187241c0 fffff806`13e98bc8 : ffffcb87`75783cc0 00000000`00000002 ffffcb87`7e87c080 fffff806`187244b8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
fffff806`18724310 fffff806`13e98b3d : fffff806`17f2f590 fffff806`187244b8 ffffcb87`754d2560 fffff806`16f423af : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff806`18724380 fffff806`17f226ad : ffffcb87`7c410350 fffff806`1dfcadb7 ffffcb87`861d14d0 fffff806`17dd142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff806`187243c0 fffff806`17f21d8d : 00000000`00000001 fffff806`18724520 ffffcb87`7ba8e410 fffff806`18724530 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff806`18724420 fffff806`16dd1eb0 : fffff806`1a9c8ab0 fffff806`18dac617 ffffcb87`75e408a0 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff806`187246d0 fffff806`16dd1ccb : ffffcb87`7ba8eaa0 00000000`00000001 ffffcb87`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff806`187247b0 fffff806`16dd7ef0 : ffffcb87`7b0b71a0 ffffcb87`754b1901 ffffcb87`7b0b71a0 0000ffff`f8062001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff806`18724830 fffff806`16e0dd73 : ffffcb87`7b90e030 fffff806`18724901 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
fffff806`18724880 fffff806`16dd4a94 : 00000000`0001d3d4 00000000`00000001 ffffcb87`7b0b71a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff806`18724950 fffff806`20fd8a96 : ffffcb87`00000001 ffffcb87`7b80f000 ffffcb87`7b80fa30 fffff806`18724b00 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff806`187249e0 fffff806`20fdb762 : 00000000`00000000 fffff806`18724b00 00000002`00000000 00000000`00000000 : L1C63x64!HandleRxIntr+0x25e
fffff806`18724a90 fffff806`16e13579 : 00000000`00000010 ffffcb87`7b8129a0 fffff806`18724b49 ffffcb87`7b0b71a0 : L1C63x64!HardwareHandleInterrupt+0x1ba
fffff806`18724ad0 fffff806`13f230ce : fffff806`0fae5240 ffffcb87`737ec000 00000000`00000000 ffffcb87`00000002 : ndis!ndisInterruptDpc+0x3be89
fffff806`18724bb0 fffff806`13f223b4 : fffff806`0fae2180 00000000`00000000 00000000`00000008 00000000`000116f1 : nt!KiExecuteAllDpcs+0x30e
fffff806`18724d20 fffff806`13ffdd35 : 00000000`00000000 fffff806`0fae2180 ffffa700`d9dcc8c0 00000000`000000bd : nt!KiRetireDpcList+0x1f4
fffff806`18724fb0 fffff806`13ffdb20 : fffff806`13ff2de0 fffff806`13ec656a 00000000`00000000 00002bd5`17244f48 : nt!KxRetireDpcList+0x5
fffff380`4fe29ac0 fffff806`13ffd3d5 : 00000000`000000bd fffff806`13ff8041 00000000`00000001 ffffcb87`7e3a9080 : nt!KiDispatchInterruptContinue
fffff380`4fe29af0 fffff806`13ff8041 : 00000000`00000001 ffffcb87`7e3a9080 fffff380`00000000 ffffcb87`00000000 : nt!KiDpcInterruptBypass+0x25
fffff380`4fe29b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0xb1
SYMBOL_NAME: L1C63x64!HandleRxIntr+25e
MODULE_NAME: L1C63x64
IMAGE_NAME: L1C63x64.sys
IMAGE_VERSION: 2.1.0.16
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 25e
FAILURE_BUCKET_ID: AV_L1C63x64!HandleRxIntr
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d6379392-3f48-c6ec-1a10-10fcebd963ee}
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000019c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80617ee4955, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 15
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on AHMET
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 16
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: d1
BUGCHECK_P1: 19c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80617ee4955
READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock
000000000000019c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: msedge.exe
DPC_STACK_BASE: FFFFF80618724FB0
TRAP_FRAME: fffff806187234b0 -- (.trap 0xfffff806187234b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000180 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000007 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80617ee4955 rsp=fffff80618723640 rbp=fffff80618723780
r8=0000000000000000 r9=0000000000000000 r10=fffff80613e3a390
r11=fffff80618723610 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
tcpip!IppInspectLocalDatagramsOut+0x505:
fffff806`17ee4955 807d9000 cmp byte ptr [rbp-70h],0 ss:fffff806`18723710=01
Resetting default scope
STACK_TEXT:
fffff806`18723368 fffff806`14008c69 : 00000000`0000000a 00000000`0000019c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`18723370 fffff806`14004f69 : fffff806`1e6d34d0 ffffcb87`00000000 ffffcb87`85bdfef0 fffff806`1e6d448a : nt!KiBugCheckDispatch+0x69
fffff806`187234b0 fffff806`17ee4955 : 00000000`00000003 00000000`00000001 ffffcb87`82893a00 ffffcb87`82893a00 : nt!KiPageFault+0x469
fffff806`18723640 fffff806`17ee3d4b : ffffcb87`757059c8 fffff806`19a703e9 ffffcb87`8654bb01 ffffcb87`75736008 : tcpip!IppInspectLocalDatagramsOut+0x505
fffff806`18723910 fffff806`17ee28b9 : 00000000`00000000 00000000`00000000 fffff806`180a9230 ffffcb87`82893a00 : tcpip!IppSendDatagramsCommon+0x41b
fffff806`18723a90 fffff806`17ec1b2d : ffffcb87`82e94e10 00000000`00000014 00000000`00000000 ffffcb87`84b6ea20 : tcpip!IpNlpFastSendDatagram+0x349
fffff806`18723b50 fffff806`17ec3cf6 : ffffcb87`84b6ea20 00000000`00000000 00000000`2cd154a4 ffffcb87`751ff3c0 : tcpip!TcpTcbHeaderSend+0x5cd
fffff806`18723e00 fffff806`17ec223e : ffffcb87`750fe700 fffff806`13e1bb01 ffffcb87`00000000 00000000`00000000 : tcpip!TcpReceive+0x4d6
fffff806`18723ef0 fffff806`17ed44b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e
fffff806`18723f30 fffff806`17f2f6be : ffffcb87`7812d800 ffffcb87`7ba8e410 00000000`00000006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
fffff806`187241c0 fffff806`13e98bc8 : ffffcb87`75783cc0 00000000`00000002 ffffcb87`7e87c080 fffff806`187244b8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
fffff806`18724310 fffff806`13e98b3d : fffff806`17f2f590 fffff806`187244b8 ffffcb87`754d2560 fffff806`16f423af : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff806`18724380 fffff806`17f226ad : ffffcb87`7c410350 fffff806`1dfcadb7 ffffcb87`861d14d0 fffff806`17dd142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff806`187243c0 fffff806`17f21d8d : 00000000`00000001 fffff806`18724520 ffffcb87`7ba8e410 fffff806`18724530 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff806`18724420 fffff806`16dd1eb0 : fffff806`1a9c8ab0 fffff806`18dac617 ffffcb87`75e408a0 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff806`187246d0 fffff806`16dd1ccb : ffffcb87`7ba8eaa0 00000000`00000001 ffffcb87`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff806`187247b0 fffff806`16dd7ef0 : ffffcb87`7b0b71a0 ffffcb87`754b1901 ffffcb87`7b0b71a0 0000ffff`f8062001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff806`18724830 fffff806`16e0dd73 : ffffcb87`7b90e030 fffff806`18724901 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
fffff806`18724880 fffff806`16dd4a94 : 00000000`0001d3d4 00000000`00000001 ffffcb87`7b0b71a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff806`18724950 fffff806`20fd8a96 : ffffcb87`00000001 ffffcb87`7b80f000 ffffcb87`7b80fa30 fffff806`18724b00 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff806`187249e0 fffff806`20fdb762 : 00000000`00000000 fffff806`18724b00 00000002`00000000 00000000`00000000 : L1C63x64!HandleRxIntr+0x25e
fffff806`18724a90 fffff806`16e13579 : 00000000`00000010 ffffcb87`7b8129a0 fffff806`18724b49 ffffcb87`7b0b71a0 : L1C63x64!HardwareHandleInterrupt+0x1ba
fffff806`18724ad0 fffff806`13f230ce : fffff806`0fae5240 ffffcb87`737ec000 00000000`00000000 ffffcb87`00000002 : ndis!ndisInterruptDpc+0x3be89
fffff806`18724bb0 fffff806`13f223b4 : fffff806`0fae2180 00000000`00000000 00000000`00000008 00000000`000116f1 : nt!KiExecuteAllDpcs+0x30e
fffff806`18724d20 fffff806`13ffdd35 : 00000000`00000000 fffff806`0fae2180 ffffa700`d9dcc8c0 00000000`000000bd : nt!KiRetireDpcList+0x1f4
fffff806`18724fb0 fffff806`13ffdb20 : fffff806`13ff2de0 fffff806`13ec656a 00000000`00000000 00002bd5`17244f48 : nt!KxRetireDpcList+0x5
fffff380`4fe29ac0 fffff806`13ffd3d5 : 00000000`000000bd fffff806`13ff8041 00000000`00000001 ffffcb87`7e3a9080 : nt!KiDispatchInterruptContinue
fffff380`4fe29af0 fffff806`13ff8041 : 00000000`00000001 ffffcb87`7e3a9080 fffff380`00000000 ffffcb87`00000000 : nt!KiDpcInterruptBypass+0x25
fffff380`4fe29b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0xb1
SYMBOL_NAME: L1C63x64!HandleRxIntr+25e
MODULE_NAME: L1C63x64
IMAGE_NAME: L1C63x64.sys
IMAGE_VERSION: 2.1.0.16
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 25e
FAILURE_BUCKET_ID: AV_L1C63x64!HandleRxIntr
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d6379392-3f48-c6ec-1a10-10fcebd963ee}
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000019c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80617ee4955, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 15
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on AHMET
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 16
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: d1
BUGCHECK_P1: 19c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80617ee4955
READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock
000000000000019c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: msedge.exe
DPC_STACK_BASE: FFFFF80618724FB0
TRAP_FRAME: fffff806187234b0 -- (.trap 0xfffff806187234b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000180 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000007 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80617ee4955 rsp=fffff80618723640 rbp=fffff80618723780
r8=0000000000000000 r9=0000000000000000 r10=fffff80613e3a390
r11=fffff80618723610 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
tcpip!IppInspectLocalDatagramsOut+0x505:
fffff806`17ee4955 807d9000 cmp byte ptr [rbp-70h],0 ss:fffff806`18723710=01
Resetting default scope
STACK_TEXT:
fffff806`18723368 fffff806`14008c69 : 00000000`0000000a 00000000`0000019c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`18723370 fffff806`14004f69 : fffff806`1e6d34d0 ffffcb87`00000000 ffffcb87`85bdfef0 fffff806`1e6d448a : nt!KiBugCheckDispatch+0x69
fffff806`187234b0 fffff806`17ee4955 : 00000000`00000003 00000000`00000001 ffffcb87`82893a00 ffffcb87`82893a00 : nt!KiPageFault+0x469
fffff806`18723640 fffff806`17ee3d4b : ffffcb87`757059c8 fffff806`19a703e9 ffffcb87`8654bb01 ffffcb87`75736008 : tcpip!IppInspectLocalDatagramsOut+0x505
fffff806`18723910 fffff806`17ee28b9 : 00000000`00000000 00000000`00000000 fffff806`180a9230 ffffcb87`82893a00 : tcpip!IppSendDatagramsCommon+0x41b
fffff806`18723a90 fffff806`17ec1b2d : ffffcb87`82e94e10 00000000`00000014 00000000`00000000 ffffcb87`84b6ea20 : tcpip!IpNlpFastSendDatagram+0x349
fffff806`18723b50 fffff806`17ec3cf6 : ffffcb87`84b6ea20 00000000`00000000 00000000`2cd154a4 ffffcb87`751ff3c0 : tcpip!TcpTcbHeaderSend+0x5cd
fffff806`18723e00 fffff806`17ec223e : ffffcb87`750fe700 fffff806`13e1bb01 ffffcb87`00000000 00000000`00000000 : tcpip!TcpReceive+0x4d6
fffff806`18723ef0 fffff806`17ed44b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e
fffff806`18723f30 fffff806`17f2f6be : ffffcb87`7812d800 ffffcb87`7ba8e410 00000000`00000006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
fffff806`187241c0 fffff806`13e98bc8 : ffffcb87`75783cc0 00000000`00000002 ffffcb87`7e87c080 fffff806`187244b8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
fffff806`18724310 fffff806`13e98b3d : fffff806`17f2f590 fffff806`187244b8 ffffcb87`754d2560 fffff806`16f423af : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff806`18724380 fffff806`17f226ad : ffffcb87`7c410350 fffff806`1dfcadb7 ffffcb87`861d14d0 fffff806`17dd142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff806`187243c0 fffff806`17f21d8d : 00000000`00000001 fffff806`18724520 ffffcb87`7ba8e410 fffff806`18724530 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff806`18724420 fffff806`16dd1eb0 : fffff806`1a9c8ab0 fffff806`18dac617 ffffcb87`75e408a0 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff806`187246d0 fffff806`16dd1ccb : ffffcb87`7ba8eaa0 00000000`00000001 ffffcb87`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff806`187247b0 fffff806`16dd7ef0 : ffffcb87`7b0b71a0 ffffcb87`754b1901 ffffcb87`7b0b71a0 0000ffff`f8062001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff806`18724830 fffff806`16e0dd73 : ffffcb87`7b90e030 fffff806`18724901 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
fffff806`18724880 fffff806`16dd4a94 : 00000000`0001d3d4 00000000`00000001 ffffcb87`7b0b71a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff806`18724950 fffff806`20fd8a96 : ffffcb87`00000001 ffffcb87`7b80f000 ffffcb87`7b80fa30 fffff806`18724b00 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff806`187249e0 fffff806`20fdb762 : 00000000`00000000 fffff806`18724b00 00000002`00000000 00000000`00000000 : L1C63x64!HandleRxIntr+0x25e
fffff806`18724a90 fffff806`16e13579 : 00000000`00000010 ffffcb87`7b8129a0 fffff806`18724b49 ffffcb87`7b0b71a0 : L1C63x64!HardwareHandleInterrupt+0x1ba
fffff806`18724ad0 fffff806`13f230ce : fffff806`0fae5240 ffffcb87`737ec000 00000000`00000000 ffffcb87`00000002 : ndis!ndisInterruptDpc+0x3be89
fffff806`18724bb0 fffff806`13f223b4 : fffff806`0fae2180 00000000`00000000 00000000`00000008 00000000`000116f1 : nt!KiExecuteAllDpcs+0x30e
fffff806`18724d20 fffff806`13ffdd35 : 00000000`00000000 fffff806`0fae2180 ffffa700`d9dcc8c0 00000000`000000bd : nt!KiRetireDpcList+0x1f4
fffff806`18724fb0 fffff806`13ffdb20 : fffff806`13ff2de0 fffff806`13ec656a 00000000`00000000 00002bd5`17244f48 : nt!KxRetireDpcList+0x5
fffff380`4fe29ac0 fffff806`13ffd3d5 : 00000000`000000bd fffff806`13ff8041 00000000`00000001 ffffcb87`7e3a9080 : nt!KiDispatchInterruptContinue
fffff380`4fe29af0 fffff806`13ff8041 : 00000000`00000001 ffffcb87`7e3a9080 fffff380`00000000 ffffcb87`00000000 : nt!KiDpcInterruptBypass+0x25
fffff380`4fe29b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0xb1
SYMBOL_NAME: L1C63x64!HandleRxIntr+25e
MODULE_NAME: L1C63x64
IMAGE_NAME: L1C63x64.sys
IMAGE_VERSION: 2.1.0.16
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 25e
FAILURE_BUCKET_ID: AV_L1C63x64!HandleRxIntr
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d6379392-3f48-c6ec-1a10-10fcebd963ee}
Followup: MachineOwner
---------
Ethernet kartınızın sürücüsünü güncelleyin.
Corsair yazılımını kaldırın.
Samsung Magician veya başka bir Samsung yazılımı varsa kaldırın.
Komut istemini yönetici olarak çalıştırıp SFC /scannow yazın ve çıkan sonucun ekran görüntüsünü bizlerle paylaşın.
Kaspersky kaldırın.
Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption. could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack. extents for the thread. Arg2: ffffde018a9f41a0, Address of the trap frame for the exception that caused the bugcheck. Arg3: ffffde018a9f40f8, Address of the exception record for the exception that caused the bugcheck. Arg4: 0000000000000000, Reserved. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 9 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on AHMET. Key : Analysis.DebugData Value: CreateObject. Key : Analysis.DebugModel Value: CreateObject. Key : Analysis.Elapsed.Sec Value: 12. Key : Analysis.Memory.CommitPeak.Mb Value: 70. Key : Analysis.System Value: CreateObject. BUGCHECK_CODE: 139. BUGCHECK_P1: 4 BUGCHECK_P2: ffffde018a9f41a0. BUGCHECK_P3: ffffde018a9f40f8. BUGCHECK_P4: 0 TRAP_FRAME: ffffde018a9f41a0 -- (.trap 0xffffde018a9f41a0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffd70582463000 rbx=0000000000000000 rcx=0000000000000004 rdx=ffffd70582469000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80220e3bc65 rsp=ffffde018a9f4330 rbp=ffffde018a9f43a0 r8=ffffd70582469000 r9=ffffde018a9f4300 r10=0000fffff80220d6 r11=ffffde018a9f4570 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up di pl zr na po nc. nt!RtlpGetStackLimitsEx+0x1b4aa5: fffff802`20e3bc65 cd29 int 29h. Resetting default scope. EXCEPTION_RECORD: ffffde018a9f40f8 -- (.exr 0xffffde018a9f40f8) ExceptionAddress: fffff80220e3bc65 (nt!RtlpGetStackLimitsEx+0x00000000001b4aa5) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001. NumberParameters: 1 Parameter[0]: 0000000000000004. Subcode: 0x4 FAST_FAIL_INCORRECT_STACK BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: msedge.exe WATSON_BKT_EVENT: BEX. ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir. EXCEPTION_CODE_STR: c0000409. EXCEPTION_PARAMETER1: 0000000000000004. EXCEPTION_STR: 0xc0000409. STACK_TEXT: ffffde01`8a9f3e78 fffff802`20e08c69 : 00000000`00000139 00000000`00000004 ffffde01`8a9f41a0 ffffde01`8a9f40f8 : nt!KeBugCheckEx ffffde01`8a9f3e80 fffff802`20e09090 : 982e0d8b`482079c0 6899770d`8d4c002a 44c70000`001cbaff 75e80000`03622024 : nt!KiBugCheckDispatch+0x69 ffffde01`8a9f3fc0 fffff802`20e07423 : 45c033ff`fff6b8e9 33eeebc0`960fc83b ebc0970f`c83b45c0 920fc83b`45c033e4 : nt!KiFastFailDispatch+0xd0 ffffde01`8a9f41a0 fffff802`20e3bc65 : ffffde01`8a9f45b0 ffffde01`8a9f4d78 ffffde01`8a9f43a0 44894800`10cc13e8 : nt!KiRaiseSecurityCheckFailure+0x323 ffffde01`8a9f4330 fffff802`20c87391 : ffffde01`8a9f45b0 00000000`00000000 0c8d49d7`8b49c68b 8b4cffb6`00000003 : nt!RtlpGetStackLimitsEx+0x1b4aa5 ffffde01`8a9f4360 fffff802`20c86136 : ffffde01`8a9f4d78 ffffde01`8a9f4ab0 ffffde01`8a9f4d78 0000004c`3f7fcf68 : nt!RtlDispatchException+0xe1 ffffde01`8a9f4580 fffff802`20e08dac : 00000000`00000000 00000000`00000000 00000000`00000000 ffff054f`fd20144d : nt!KiDispatchException+0x186 ffffde01`8a9f4c40 fffff802`20e04ae0 : 00000000`00000000 00000000`00000000 00000000`000033f4 fffff802`20c9468f : nt!KiExceptionDispatch+0x12c ffffde01`8a9f4e20 fffff802`20dfd96d : ffffd705`82468b80 ffff968c`8d2aed40 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320 ffffde01`8a9f4fb0 fffff802`20dfd6f7 : 00000000`00000000 00000000`00000000 ffffd705`00000000 ffff968c`00000000 : nt!KiIpiInterruptSubDispatch+0x1d ffffd705`82468b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIpiInterrupt+0x307 SYMBOL_NAME: nt!KiFastFailDispatch+d0 MODULE_NAME: nt. IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.985 STACK_COMMAND: .thread ; .cxr ; kb. BUCKET_ID_FUNC_OFFSET: d0. FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_nt!KiFastFailDispatch OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {1971a9b0-b7ec-89bf-0a51-10ac52818da5} Followup: MachineOwner. --------- 3: kd> lm. start end module name. fffff802`1d900000 fffff802`1d928000 mcupdate_AuthenticAMD (deferred) fffff802`1d930000 fffff802`1d936000 hal (deferred) fffff802`1d940000 fffff802`1d94b000 kd (deferred) fffff802`1d950000 fffff802`1d977000 tm (deferred) fffff802`1d980000 fffff802`1d9ea000 CLFS (deferred) fffff802`1d9f0000 fffff802`1da0a000 PSHED (deferred) fffff802`1da10000 fffff802`1da1b000 BOOTVID (deferred) fffff802`1da20000 fffff802`1db33000 clipsp (deferred) fffff802`1db40000 fffff802`1dbaf000 FLTMGR (deferred) fffff802`1dbb0000 fffff802`1dbd9000 ksecdd (deferred) fffff802`1dbe0000 fffff802`1dc43000 msrpc (deferred) fffff802`1dc50000 fffff802`1dc5e000 cmimcext (deferred) fffff802`1dc60000 fffff802`1dc71000 werkernel (deferred) fffff802`1dc80000 fffff802`1dc8c000 ntosext (deferred) fffff802`1dc90000 fffff802`1dca3000 WDFLDR (deferred) fffff802`1dcb0000 fffff802`1dcbf000 SleepStudyHelper (deferred) fffff802`1dcc0000 fffff802`1dcd1000 WppRecorder (deferred) fffff802`1dce0000 fffff802`1dcfa000 SgrmAgent (deferred) fffff802`20a00000 fffff802`21a46000 nt (pdb symbols) C:\ProgramData\dbg\sym\ntkrnlmp.pdb\992A9A48F30EC2C58B01A5934DCE2D9C1\ntkrnlmp.pdb fffff802`23200000 fffff802`232e3000 CI (deferred) fffff802`232f0000 fffff802`233a7000 cng (deferred) fffff802`233b0000 fffff802`23482000 Wdf01000 (deferred) fffff802`23490000 fffff802`234b6000 acpiex (deferred) fffff802`234c0000 fffff802`2358c000 ACPI (deferred) fffff802`23590000 fffff802`2359c000 WMILIB (deferred) fffff802`235b0000 fffff802`2361b000 intelpep (deferred) fffff802`23620000 fffff802`23637000 WindowsTrustedRT (deferred) fffff802`23640000 fffff802`2364b000 IntelTA (deferred) fffff802`23650000 fffff802`2365b000 WindowsTrustedRTProxy (deferred) fffff802`23660000 fffff802`23674000 pcw (deferred) fffff802`23680000 fffff802`236c0000 klupd_klif_arkmon (deferred) fffff802`236d0000 fffff802`236db000 msisadrv (deferred) fffff802`236e0000 fffff802`23757000 pci (deferred) fffff802`23760000 fffff802`23775000 vdrvroot (deferred) fffff802`23780000 fffff802`237bb000 cm_km (deferred) fffff802`237c0000 fffff802`237ef000 pdc (deferred) fffff802`237f0000 fffff802`23809000 CEA (deferred) fffff802`23810000 fffff802`23841000 partmgr (deferred) fffff802`23850000 fffff802`2385a000 pciide (deferred) fffff802`23860000 fffff802`23873000 PCIIDEX (deferred) fffff802`23880000 fffff802`2392a000 spaceport (deferred) fffff802`23930000 fffff802`23949000 volmgr (deferred) fffff802`23950000 fffff802`239b3000 volmgrx (deferred) fffff802`239c0000 fffff802`239de000 mountmgr (deferred) fffff802`239e0000 fffff802`239ed000 atapi (deferred) fffff802`239f0000 fffff802`239fd000 Fs_Rec (deferred) fffff802`23a00000 fffff802`23a3c000 ataport (deferred) fffff802`23a40000 fffff802`23a72000 storahci (deferred) fffff802`23a80000 fffff802`23b33000 storport (deferred) fffff802`23b60000 fffff802`23b7a000 fileinfo (deferred) fffff802`23b80000 fffff802`23bc0000 Wof (deferred) fffff802`23bd0000 fffff802`23d3f000 ndis (deferred) fffff802`23d40000 fffff802`23dd8000 NETIO (deferred) fffff802`23de0000 fffff802`23deb000 volume (deferred) fffff802`23e00000 fffff802`248a5000 FACEIT (deferred) fffff802`248b0000 fffff802`24b89000 Ntfs (deferred) fffff802`24b90000 fffff802`24bc2000 ksecpkg (deferred) fffff802`24bd0000 fffff802`24ebb000 tcpip (deferred) fffff802`24ec0000 fffff802`24f3f000 fwpkclnt (deferred) fffff802`24f40000 fffff802`24f70000 wfplwfs (deferred) fffff802`24f80000 fffff802`25048000 fvevol (deferred) fffff802`25050000 fffff802`250a0000 rdyboost (deferred) fffff802`250b0000 fffff802`2511d000 volsnap (deferred) fffff802`25120000 fffff802`25146000 mup (deferred) fffff802`25150000 fffff802`25169000 klupd_klif_klbg (deferred) fffff802`25170000 fffff802`25182000 iorate (deferred) fffff802`251b0000 fffff802`251cc000 disk (deferred) fffff802`251d0000 fffff802`2523c000 CLASSPNP (deferred) fffff802`25820000 fffff802`25fd8000 vgk (deferred) fffff802`25fe0000 fffff802`25ff9000 klbackupdisk (deferred) fffff802`26000000 fffff802`26030000 cdrom (deferred) fffff802`26040000 fffff802`260ca000 klflt (deferred) fffff802`260d0000 fffff802`26101000 klbackupflt (deferred) fffff802`26110000 fffff802`26125000 filecrypt (deferred) fffff802`26130000 fffff802`2613e000 tbs (deferred) fffff802`26140000 fffff802`26240000 klif (deferred) fffff802`26250000 fffff802`262c6000 ks (deferred) fffff802`262d0000 fffff802`2645b000 klhk (deferred) fffff802`26460000 fffff802`26501000 klgse (deferred) fffff802`26510000 fffff802`26522000 klpd (deferred) fffff802`26530000 fffff802`2654c000 kldisk (deferred) fffff802`26550000 fffff802`2655a000 Null (deferred) fffff802`26560000 fffff802`2656a000 Beep (deferred) fffff802`26570000 fffff802`26585000 klpnpflt (deferred) fffff802`26590000 fffff802`2660b000 rdbss (deferred) fffff802`26610000 fffff802`26622000 nsiproxy (deferred) fffff802`26630000 fffff802`2663e000 npsvctrig (deferred) fffff802`26640000 fffff802`26650000 mssmbios (deferred) fffff802`26660000 fffff802`266a9000 kneps (deferred) fffff802`266f0000 fffff802`266fa000 gpuenergydrv (deferred) fffff802`26720000 fffff802`2673e000 crashdmp (deferred) fffff802`26800000 fffff802`26817000 bam (deferred) fffff802`26820000 fffff802`2686e000 ahcache (deferred) fffff802`26870000 fffff802`2687d000 kltap (deferred) fffff802`26880000 fffff802`26892000 CompositeBus (deferred) fffff802`268a0000 fffff802`268ad000 kdnic (deferred) fffff802`268b0000 fffff802`268c5000 umbus (deferred) fffff802`268d0000 fffff802`2690b000 amdppm (deferred) fffff802`26910000 fffff802`26966000 msquic (deferred) fffff802`269a0000 fffff802`269cc000 dfsc (deferred) fffff802`26c00000 fffff802`26c5c000 netbt (deferred) fffff802`26c60000 fffff802`26c73000 afunix (deferred) fffff802`26c80000 fffff802`26d23000 afd (deferred) fffff802`26d30000 fffff802`26d7b000 klwtp (deferred) fffff802`26d80000 fffff802`26d95000 klim6 (deferred) fffff802`26da0000 fffff802`26dba000 vwififlt (deferred) fffff802`26dc0000 fffff802`26deb000 pacer (deferred) fffff802`26df0000 fffff802`26e04000 ndiscap (deferred) fffff802`26e10000 fffff802`26e24000 netbios (deferred) fffff802`26e30000 fffff802`26ed1000 Vid (deferred) fffff802`26ee0000 fffff802`27285000 dxgkrnl (deferred) fffff802`27290000 fffff802`272a8000 watchdog (deferred) fffff802`272b0000 fffff802`272c6000 BasicDisplay (deferred) fffff802`272d0000 fffff802`272e1000 BasicRender (deferred) fffff802`272f0000 fffff802`2730c000 Npfs (deferred) fffff802`27310000 fffff802`27321000 Msfs (deferred) fffff802`27330000 fffff802`2734b000 CimFS (deferred) fffff802`27350000 fffff802`27374000 klwfp (deferred) fffff802`27380000 fffff802`273a2000 tdx (deferred) fffff802`273b0000 fffff802`273c0000 TDI (deferred) fffff802`273d0000 fffff802`273f1000 winhvr (deferred) fffff802`29a00000 fffff802`29a1c000 serial (deferred) fffff802`29a20000 fffff802`29a2f000 serenum (deferred) fffff802`29a30000 fffff802`29a4f000 parport (deferred) fffff802`29a50000 fffff802`29a61000 nvvad64v (deferred) fffff802`29a70000 fffff802`29a7f000 ksthunk (deferred) fffff802`29a80000 fffff802`29a8d000 NvModuleTracker (deferred) fffff802`29a90000 fffff802`29aa0000 nvvhci (deferred) fffff802`29ab0000 fffff802`29abd000 NdisVirtualBus (deferred) fffff802`29ac0000 fffff802`29acc000 swenum (deferred) fffff802`29ad0000 fffff802`29ade000 CorsairVBusDriver (deferred) fffff802`29ae0000 fffff802`29aee000 rdpbus (deferred) fffff802`29af0000 fffff802`29b75000 usbhub (deferred) fffff802`29b80000 fffff802`29b8e000 USBD (deferred) fffff802`29ba0000 fffff802`29bdf000 HIDCLASS (deferred) fffff802`29be0000 fffff802`29bf3000 HIDPARSE (deferred) fffff802`29c00000 fffff802`29c23000 nvhda64v (deferred) fffff802`29c30000 fffff802`29c9f000 HdAudio (deferred) fffff802`29ca0000 fffff802`29cb1000 kbdhid (deferred) fffff802`29cc0000 fffff802`29cd9000 klkbdflt (deferred) fffff802`29ce0000 fffff802`29cf4000 kbdclass (deferred) fffff802`29d00000 fffff802`29d33000 usbccgp (deferred) fffff802`29d40000 fffff802`29d65000 USBSTOR (deferred) fffff802`29d70000 fffff802`29d82000 hidusb (deferred) fffff802`29d90000 fffff802`29dca000 usbaudio (deferred) fffff802`29dd0000 fffff802`29de0000 mouhid (deferred) fffff802`29df0000 fffff802`29e0a000 klmouflt (deferred) fffff802`29e10000 fffff802`29e23000 mouclass (deferred) fffff802`29e40000 fffff802`29e4e000 dump_diskdump (deferred) fffff802`29e90000 fffff802`29ec2000 dump_storahci (deferred) fffff802`29ef0000 fffff802`29f0d000 dump_dumpfve (deferred) fffff802`29f10000 fffff802`29ff1000 dxgmms2 (deferred) fffff802`2a000000 fffff802`2a01b000 monitor (deferred) fffff802`2a020000 fffff802`2a049000 luafv (deferred) fffff802`2a050000 fffff802`2a086000 wcifs (deferred) fffff802`2a090000 fffff802`2a0e4000 WUDFRd (deferred) fffff802`2a0f0000 fffff802`2a172000 cldflt (deferred) fffff802`2a180000 fffff802`2a18e000 WpdUpFltr (deferred) fffff802`2a190000 fffff802`2a1aa000 storqosflt (deferred) fffff802`2a1b0000 fffff802`2a1d8000 bindflt (deferred) fffff802`2a1e0000 fffff802`2a1f8000 lltdio (deferred) fffff802`2a200000 fffff802`2a218000 mslldp (deferred) fffff802`2a220000 fffff802`2a23b000 rspndr (deferred) fffff802`2a240000 fffff802`2a25d000 wanarp (deferred) fffff802`2a2a0000 fffff802`2c830000 nvlddmkm (deferred) fffff802`2c840000 fffff802`2c865000 HDAudBus (deferred) fffff802`2c870000 fffff802`2c8d6000 portcls (deferred) fffff802`2c8e0000 fffff802`2c901000 drmk (deferred) fffff802`2c910000 fffff802`2c932000 L1C63x64 (deferred) fffff802`2c940000 fffff802`2c94f000 usbohci (deferred) fffff802`2c950000 fffff802`2c9c9000 USBPORT (deferred) fffff802`2c9d0000 fffff802`2c9ea000 usbehci (deferred) fffff802`64a00000 fffff802`64a94000 mrxsmb (deferred) fffff802`64aa0000 fffff802`64ae5000 mrxsmb20 (deferred) fffff802`64af0000 fffff802`64af9000 CorsairLLAccess64 (deferred) fffff802`64b00000 fffff802`64b53000 srvnet (deferred) fffff802`64b60000 fffff802`64b74000 mmcss (deferred) fffff802`64b80000 fffff802`64ba7000 Ndu (deferred) fffff802`64bb0000 fffff802`64c86000 peauth (deferred) fffff802`64c90000 fffff802`64ca5000 tcpipreg (deferred) fffff802`64cb0000 fffff802`64ccc000 rassstp (deferred) fffff802`64cd0000 fffff802`64d97000 srv2 (deferred) fffff802`64da0000 fffff802`64dbd000 NDProxy (deferred) fffff802`64dc0000 fffff802`64de7000 AgileVpn (deferred) fffff802`64df0000 fffff802`64e11000 rasl2tp (deferred) fffff802`64e20000 fffff802`64e41000 raspptp (deferred) fffff802`64e50000 fffff802`64e6c000 raspppoe (deferred) fffff802`64e70000 fffff802`64e7f000 ndistapi (deferred) fffff802`64e80000 fffff802`64eba000 ndiswan (deferred) fffff802`64ec0000 fffff802`64ed2000 condrv (deferred) fffff802`64ee0000 fffff802`64eeb000 cpuz150_x64 (deferred) fffff802`64ef0000 fffff802`64f27000 klupd_klif_mark (deferred) fffff802`64f30000 fffff802`64f69000 klids (deferred) fffff802`64f70000 fffff802`64fac000 klupd_klif_swmon (deferred) fffff802`64fb0000 fffff802`64fb9000 CorsairVHidDriver (deferred) fffff802`64fd0000 fffff802`65158000 HTTP (deferred) fffff802`65160000 fffff802`65185000 bowser (deferred) fffff802`65190000 fffff802`651aa000 mpsdrv (deferred) fffffe38`2dc00000 fffffe38`2ded8000 win32kbase (deferred) fffffe38`2e130000 fffffe38`2e1ca000 win32k # (pdb symbols) C:\ProgramData\dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb fffffe38`2e3e0000 fffffe38`2e796000 win32kfull (deferred) fffffe38`2e7a0000 fffffe38`2e7ea000 cdd (deferred) Unloaded modules: fffff802`64fc0000 fffff802`64fc8000 magdrvamd64. fffff802`29b90000 fffff802`29b9a000 CorsairVHidD. fffff802`266b0000 fffff802`266ea000 klids.sys fffff802`23b40000 fffff802`23b5d000 EhStorClass. fffff802`26750000 fffff802`2675f000 dump_storpor. fffff802`267a0000 fffff802`267d3000 dump_storahc. fffff802`25800000 fffff802`2581e000 dump_dumpfve. fffff802`269d0000 fffff802`269ec000 dam.sys fffff802`235a0000 fffff802`235af000 klelam.sys fffff802`25190000 fffff802`251a1000 hwpolicy.sys@YFKKod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an. interrupt request level (IRQL) that is too high. This is usually. caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 000000000000019c, memory referenced. Arg2: 0000000000000002, IRQL. Arg3: 0000000000000000, value 0 = read operation, 1 = write operation. Arg4: fffff80617ee4955, address which referenced memory. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 17. Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on AHMET. Key : Analysis.DebugData Value: CreateObject. Key : Analysis.DebugModel Value: CreateObject. Key : Analysis.Elapsed.Sec Value: 19. Key : Analysis.Memory.CommitPeak.Mb Value: 78. Key : Analysis.System Value: CreateObject. BUGCHECK_CODE: d1. BUGCHECK_P1: 19c. BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80617ee4955. READ_ADDRESS: fffff806148fa390: Unable to get MiVisibleState. Unable to get NonPagedPoolStart. Unable to get NonPagedPoolEnd. Unable to get PagedPoolStart. Unable to get PagedPoolEnd. fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse 000000000000019c. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: msedge.exe DPC_STACK_BASE: FFFFF80618724FB0. TRAP_FRAME: fffff806187234b0 -- (.trap 0xfffff806187234b0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000180 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000000007 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80617ee4955 rsp=fffff80618723640 rbp=fffff80618723780 r8=0000000000000000 r9=0000000000000000 r10=fffff80613e3a390 r11=fffff80618723610 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc. tcpip!IppInspectLocalDatagramsOut+0x505: fffff806`17ee4955 807d9000 cmp byte ptr [rbp-70h],0 ss:fffff806`18723710=01 Resetting default scope. STACK_TEXT: fffff806`18723368 fffff806`14008c69 : 00000000`0000000a 00000000`0000019c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff806`18723370 fffff806`14004f69 : fffff806`1e6d34d0 ffffcb87`00000000 ffffcb87`85bdfef0 fffff806`1e6d448a : nt!KiBugCheckDispatch+0x69 fffff806`187234b0 fffff806`17ee4955 : 00000000`00000003 00000000`00000001 ffffcb87`82893a00 ffffcb87`82893a00 : nt!KiPageFault+0x469 fffff806`18723640 fffff806`17ee3d4b : ffffcb87`757059c8 fffff806`19a703e9 ffffcb87`8654bb01 ffffcb87`75736008 : tcpip!IppInspectLocalDatagramsOut+0x505 fffff806`18723910 fffff806`17ee28b9 : 00000000`00000000 00000000`00000000 fffff806`180a9230 ffffcb87`82893a00 : tcpip!IppSendDatagramsCommon+0x41b fffff806`18723a90 fffff806`17ec1b2d : ffffcb87`82e94e10 00000000`00000014 00000000`00000000 ffffcb87`84b6ea20 : tcpip!IpNlpFastSendDatagram+0x349 fffff806`18723b50 fffff806`17ec3cf6 : ffffcb87`84b6ea20 00000000`00000000 00000000`2cd154a4 ffffcb87`751ff3c0 : tcpip!TcpTcbHeaderSend+0x5cd fffff806`18723e00 fffff806`17ec223e : ffffcb87`750fe700 fffff806`13e1bb01 ffffcb87`00000000 00000000`00000000 : tcpip!TcpReceive+0x4d6 fffff806`18723ef0 fffff806`17ed44b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e fffff806`18723f30 fffff806`17f2f6be : ffffcb87`7812d800 ffffcb87`7ba8e410 00000000`00000006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9 fffff806`187241c0 fffff806`13e98bc8 : ffffcb87`75783cc0 00000000`00000002 ffffcb87`7e87c080 fffff806`187244b8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e fffff806`18724310 fffff806`13e98b3d : fffff806`17f2f590 fffff806`187244b8 ffffcb87`754d2560 fffff806`16f423af : nt!KeExpandKernelStackAndCalloutInternal+0x78 fffff806`18724380 fffff806`17f226ad : ffffcb87`7c410350 fffff806`1dfcadb7 ffffcb87`861d14d0 fffff806`17dd142f : nt!KeExpandKernelStackAndCalloutEx+0x1d fffff806`187243c0 fffff806`17f21d8d : 00000000`00000001 fffff806`18724520 ffffcb87`7ba8e410 fffff806`18724530 : tcpip!NetioExpandKernelStackAndCallout+0x8d fffff806`18724420 fffff806`16dd1eb0 : fffff806`1a9c8ab0 fffff806`18dac617 ffffcb87`75e408a0 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x46d fffff806`187246d0 fffff806`16dd1ccb : ffffcb87`7ba8eaa0 00000000`00000001 ffffcb87`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140 fffff806`187247b0 fffff806`16dd7ef0 : ffffcb87`7b0b71a0 ffffcb87`754b1901 ffffcb87`7b0b71a0 0000ffff`f8062001 : ndis!ndisMTopReceiveNetBufferLists+0x22b fffff806`18724830 fffff806`16e0dd73 : ffffcb87`7b90e030 fffff806`18724901 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60 fffff806`18724880 fffff806`16dd4a94 : 00000000`0001d3d4 00000000`00000001 ffffcb87`7b0b71a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df fffff806`18724950 fffff806`20fd8a96 : ffffcb87`00000001 ffffcb87`7b80f000 ffffcb87`7b80fa30 fffff806`18724b00 : ndis!NdisMIndicateReceiveNetBufferLists+0x104 fffff806`187249e0 fffff806`20fdb762 : 00000000`00000000 fffff806`18724b00 00000002`00000000 00000000`00000000 : L1C63x64!HandleRxIntr+0x25e fffff806`18724a90 fffff806`16e13579 : 00000000`00000010 ffffcb87`7b8129a0 fffff806`18724b49 ffffcb87`7b0b71a0 : L1C63x64!HardwareHandleInterrupt+0x1ba fffff806`18724ad0 fffff806`13f230ce : fffff806`0fae5240 ffffcb87`737ec000 00000000`00000000 ffffcb87`00000002 : ndis!ndisInterruptDpc+0x3be89 fffff806`18724bb0 fffff806`13f223b4 : fffff806`0fae2180 00000000`00000000 00000000`00000008 00000000`000116f1 : nt!KiExecuteAllDpcs+0x30e fffff806`18724d20 fffff806`13ffdd35 : 00000000`00000000 fffff806`0fae2180 ffffa700`d9dcc8c0 00000000`000000bd : nt!KiRetireDpcList+0x1f4 fffff806`18724fb0 fffff806`13ffdb20 : fffff806`13ff2de0 fffff806`13ec656a 00000000`00000000 00002bd5`17244f48 : nt!KxRetireDpcList+0x5 fffff380`4fe29ac0 fffff806`13ffd3d5 : 00000000`000000bd fffff806`13ff8041 00000000`00000001 ffffcb87`7e3a9080 : nt!KiDispatchInterruptContinue fffff380`4fe29af0 fffff806`13ff8041 : 00000000`00000001 ffffcb87`7e3a9080 fffff380`00000000 ffffcb87`00000000 : nt!KiDpcInterruptBypass+0x25 fffff380`4fe29b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0xb1 SYMBOL_NAME: L1C63x64!HandleRxIntr+25e MODULE_NAME: L1C63x64. IMAGE_NAME: L1C63x64.sys IMAGE_VERSION: 2.1.0.16 STACK_COMMAND: .thread ; .cxr ; kb. BUCKET_ID_FUNC_OFFSET: 25e. FAILURE_BUCKET_ID: AV_L1C63x64!HandleRxIntr OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {d6379392-3f48-c6ec-1a10-10fcebd963ee} Followup: MachineOwner. --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an. interrupt request level (IRQL) that is too high. This is usually. caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 000000000000019c, memory referenced. Arg2: 0000000000000002, IRQL. Arg3: 0000000000000000, value 0 = read operation, 1 = write operation. Arg4: fffff80617ee4955, address which referenced memory. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 15. Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on AHMET. Key : Analysis.DebugData Value: CreateObject. Key : Analysis.DebugModel Value: CreateObject. Key : Analysis.Elapsed.Sec Value: 16. Key : Analysis.Memory.CommitPeak.Mb Value: 82. Key : Analysis.System Value: CreateObject. BUGCHECK_CODE: d1. BUGCHECK_P1: 19c. BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80617ee4955. READ_ADDRESS: Unable to get NonPagedPoolStart. Unable to get NonPagedPoolEnd. Unable to get PagedPoolStart. Unable to get PagedPoolEnd. fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock 000000000000019c. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: msedge.exe DPC_STACK_BASE: FFFFF80618724FB0. TRAP_FRAME: fffff806187234b0 -- (.trap 0xfffff806187234b0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000180 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000000007 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80617ee4955 rsp=fffff80618723640 rbp=fffff80618723780 r8=0000000000000000 r9=0000000000000000 r10=fffff80613e3a390 r11=fffff80618723610 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc. tcpip!IppInspectLocalDatagramsOut+0x505: fffff806`17ee4955 807d9000 cmp byte ptr [rbp-70h],0 ss:fffff806`18723710=01 Resetting default scope. STACK_TEXT: fffff806`18723368 fffff806`14008c69 : 00000000`0000000a 00000000`0000019c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff806`18723370 fffff806`14004f69 : fffff806`1e6d34d0 ffffcb87`00000000 ffffcb87`85bdfef0 fffff806`1e6d448a : nt!KiBugCheckDispatch+0x69 fffff806`187234b0 fffff806`17ee4955 : 00000000`00000003 00000000`00000001 ffffcb87`82893a00 ffffcb87`82893a00 : nt!KiPageFault+0x469 fffff806`18723640 fffff806`17ee3d4b : ffffcb87`757059c8 fffff806`19a703e9 ffffcb87`8654bb01 ffffcb87`75736008 : tcpip!IppInspectLocalDatagramsOut+0x505 fffff806`18723910 fffff806`17ee28b9 : 00000000`00000000 00000000`00000000 fffff806`180a9230 ffffcb87`82893a00 : tcpip!IppSendDatagramsCommon+0x41b fffff806`18723a90 fffff806`17ec1b2d : ffffcb87`82e94e10 00000000`00000014 00000000`00000000 ffffcb87`84b6ea20 : tcpip!IpNlpFastSendDatagram+0x349 fffff806`18723b50 fffff806`17ec3cf6 : ffffcb87`84b6ea20 00000000`00000000 00000000`2cd154a4 ffffcb87`751ff3c0 : tcpip!TcpTcbHeaderSend+0x5cd fffff806`18723e00 fffff806`17ec223e : ffffcb87`750fe700 fffff806`13e1bb01 ffffcb87`00000000 00000000`00000000 : tcpip!TcpReceive+0x4d6 fffff806`18723ef0 fffff806`17ed44b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e fffff806`18723f30 fffff806`17f2f6be : ffffcb87`7812d800 ffffcb87`7ba8e410 00000000`00000006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9 fffff806`187241c0 fffff806`13e98bc8 : ffffcb87`75783cc0 00000000`00000002 ffffcb87`7e87c080 fffff806`187244b8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e fffff806`18724310 fffff806`13e98b3d : fffff806`17f2f590 fffff806`187244b8 ffffcb87`754d2560 fffff806`16f423af : nt!KeExpandKernelStackAndCalloutInternal+0x78 fffff806`18724380 fffff806`17f226ad : ffffcb87`7c410350 fffff806`1dfcadb7 ffffcb87`861d14d0 fffff806`17dd142f : nt!KeExpandKernelStackAndCalloutEx+0x1d fffff806`187243c0 fffff806`17f21d8d : 00000000`00000001 fffff806`18724520 ffffcb87`7ba8e410 fffff806`18724530 : tcpip!NetioExpandKernelStackAndCallout+0x8d fffff806`18724420 fffff806`16dd1eb0 : fffff806`1a9c8ab0 fffff806`18dac617 ffffcb87`75e408a0 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x46d fffff806`187246d0 fffff806`16dd1ccb : ffffcb87`7ba8eaa0 00000000`00000001 ffffcb87`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140 fffff806`187247b0 fffff806`16dd7ef0 : ffffcb87`7b0b71a0 ffffcb87`754b1901 ffffcb87`7b0b71a0 0000ffff`f8062001 : ndis!ndisMTopReceiveNetBufferLists+0x22b fffff806`18724830 fffff806`16e0dd73 : ffffcb87`7b90e030 fffff806`18724901 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60 fffff806`18724880 fffff806`16dd4a94 : 00000000`0001d3d4 00000000`00000001 ffffcb87`7b0b71a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df fffff806`18724950 fffff806`20fd8a96 : ffffcb87`00000001 ffffcb87`7b80f000 ffffcb87`7b80fa30 fffff806`18724b00 : ndis!NdisMIndicateReceiveNetBufferLists+0x104 fffff806`187249e0 fffff806`20fdb762 : 00000000`00000000 fffff806`18724b00 00000002`00000000 00000000`00000000 : L1C63x64!HandleRxIntr+0x25e fffff806`18724a90 fffff806`16e13579 : 00000000`00000010 ffffcb87`7b8129a0 fffff806`18724b49 ffffcb87`7b0b71a0 : L1C63x64!HardwareHandleInterrupt+0x1ba fffff806`18724ad0 fffff806`13f230ce : fffff806`0fae5240 ffffcb87`737ec000 00000000`00000000 ffffcb87`00000002 : ndis!ndisInterruptDpc+0x3be89 fffff806`18724bb0 fffff806`13f223b4 : fffff806`0fae2180 00000000`00000000 00000000`00000008 00000000`000116f1 : nt!KiExecuteAllDpcs+0x30e fffff806`18724d20 fffff806`13ffdd35 : 00000000`00000000 fffff806`0fae2180 ffffa700`d9dcc8c0 00000000`000000bd : nt!KiRetireDpcList+0x1f4 fffff806`18724fb0 fffff806`13ffdb20 : fffff806`13ff2de0 fffff806`13ec656a 00000000`00000000 00002bd5`17244f48 : nt!KxRetireDpcList+0x5 fffff380`4fe29ac0 fffff806`13ffd3d5 : 00000000`000000bd fffff806`13ff8041 00000000`00000001 ffffcb87`7e3a9080 : nt!KiDispatchInterruptContinue fffff380`4fe29af0 fffff806`13ff8041 : 00000000`00000001 ffffcb87`7e3a9080 fffff380`00000000 ffffcb87`00000000 : nt!KiDpcInterruptBypass+0x25 fffff380`4fe29b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0xb1 SYMBOL_NAME: L1C63x64!HandleRxIntr+25e MODULE_NAME: L1C63x64. IMAGE_NAME: L1C63x64.sys IMAGE_VERSION: 2.1.0.16 STACK_COMMAND: .thread ; .cxr ; kb. BUCKET_ID_FUNC_OFFSET: 25e. FAILURE_BUCKET_ID: AV_L1C63x64!HandleRxIntr OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {d6379392-3f48-c6ec-1a10-10fcebd963ee} Followup: MachineOwner. --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an. interrupt request level (IRQL) that is too high. This is usually. caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 000000000000019c, memory referenced. Arg2: 0000000000000002, IRQL. Arg3: 0000000000000000, value 0 = read operation, 1 = write operation. Arg4: fffff80617ee4955, address which referenced memory. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 15. Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on AHMET. Key : Analysis.DebugData Value: CreateObject. Key : Analysis.DebugModel Value: CreateObject. Key : Analysis.Elapsed.Sec Value: 16. Key : Analysis.Memory.CommitPeak.Mb Value: 83. Key : Analysis.System Value: CreateObject. BUGCHECK_CODE: d1. BUGCHECK_P1: 19c. BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80617ee4955. READ_ADDRESS: Unable to get NonPagedPoolStart. Unable to get NonPagedPoolEnd. Unable to get PagedPoolStart. Unable to get PagedPoolEnd. fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock 000000000000019c. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: msedge.exe DPC_STACK_BASE: FFFFF80618724FB0. TRAP_FRAME: fffff806187234b0 -- (.trap 0xfffff806187234b0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000180 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000000007 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80617ee4955 rsp=fffff80618723640 rbp=fffff80618723780 r8=0000000000000000 r9=0000000000000000 r10=fffff80613e3a390 r11=fffff80618723610 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc. tcpip!IppInspectLocalDatagramsOut+0x505: fffff806`17ee4955 807d9000 cmp byte ptr [rbp-70h],0 ss:fffff806`18723710=01 Resetting default scope. STACK_TEXT: fffff806`18723368 fffff806`14008c69 : 00000000`0000000a 00000000`0000019c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff806`18723370 fffff806`14004f69 : fffff806`1e6d34d0 ffffcb87`00000000 ffffcb87`85bdfef0 fffff806`1e6d448a : nt!KiBugCheckDispatch+0x69 fffff806`187234b0 fffff806`17ee4955 : 00000000`00000003 00000000`00000001 ffffcb87`82893a00 ffffcb87`82893a00 : nt!KiPageFault+0x469 fffff806`18723640 fffff806`17ee3d4b : ffffcb87`757059c8 fffff806`19a703e9 ffffcb87`8654bb01 ffffcb87`75736008 : tcpip!IppInspectLocalDatagramsOut+0x505 fffff806`18723910 fffff806`17ee28b9 : 00000000`00000000 00000000`00000000 fffff806`180a9230 ffffcb87`82893a00 : tcpip!IppSendDatagramsCommon+0x41b fffff806`18723a90 fffff806`17ec1b2d : ffffcb87`82e94e10 00000000`00000014 00000000`00000000 ffffcb87`84b6ea20 : tcpip!IpNlpFastSendDatagram+0x349 fffff806`18723b50 fffff806`17ec3cf6 : ffffcb87`84b6ea20 00000000`00000000 00000000`2cd154a4 ffffcb87`751ff3c0 : tcpip!TcpTcbHeaderSend+0x5cd fffff806`18723e00 fffff806`17ec223e : ffffcb87`750fe700 fffff806`13e1bb01 ffffcb87`00000000 00000000`00000000 : tcpip!TcpReceive+0x4d6 fffff806`18723ef0 fffff806`17ed44b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e fffff806`18723f30 fffff806`17f2f6be : ffffcb87`7812d800 ffffcb87`7ba8e410 00000000`00000006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9 fffff806`187241c0 fffff806`13e98bc8 : ffffcb87`75783cc0 00000000`00000002 ffffcb87`7e87c080 fffff806`187244b8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e fffff806`18724310 fffff806`13e98b3d : fffff806`17f2f590 fffff806`187244b8 ffffcb87`754d2560 fffff806`16f423af : nt!KeExpandKernelStackAndCalloutInternal+0x78 fffff806`18724380 fffff806`17f226ad : ffffcb87`7c410350 fffff806`1dfcadb7 ffffcb87`861d14d0 fffff806`17dd142f : nt!KeExpandKernelStackAndCalloutEx+0x1d fffff806`187243c0 fffff806`17f21d8d : 00000000`00000001 fffff806`18724520 ffffcb87`7ba8e410 fffff806`18724530 : tcpip!NetioExpandKernelStackAndCallout+0x8d fffff806`18724420 fffff806`16dd1eb0 : fffff806`1a9c8ab0 fffff806`18dac617 ffffcb87`75e408a0 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x46d fffff806`187246d0 fffff806`16dd1ccb : ffffcb87`7ba8eaa0 00000000`00000001 ffffcb87`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140 fffff806`187247b0 fffff806`16dd7ef0 : ffffcb87`7b0b71a0 ffffcb87`754b1901 ffffcb87`7b0b71a0 0000ffff`f8062001 : ndis!ndisMTopReceiveNetBufferLists+0x22b fffff806`18724830 fffff806`16e0dd73 : ffffcb87`7b90e030 fffff806`18724901 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60 fffff806`18724880 fffff806`16dd4a94 : 00000000`0001d3d4 00000000`00000001 ffffcb87`7b0b71a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df fffff806`18724950 fffff806`20fd8a96 : ffffcb87`00000001 ffffcb87`7b80f000 ffffcb87`7b80fa30 fffff806`18724b00 : ndis!NdisMIndicateReceiveNetBufferLists+0x104 fffff806`187249e0 fffff806`20fdb762 : 00000000`00000000 fffff806`18724b00 00000002`00000000 00000000`00000000 : L1C63x64!HandleRxIntr+0x25e fffff806`18724a90 fffff806`16e13579 : 00000000`00000010 ffffcb87`7b8129a0 fffff806`18724b49 ffffcb87`7b0b71a0 : L1C63x64!HardwareHandleInterrupt+0x1ba fffff806`18724ad0 fffff806`13f230ce : fffff806`0fae5240 ffffcb87`737ec000 00000000`00000000 ffffcb87`00000002 : ndis!ndisInterruptDpc+0x3be89 fffff806`18724bb0 fffff806`13f223b4 : fffff806`0fae2180 00000000`00000000 00000000`00000008 00000000`000116f1 : nt!KiExecuteAllDpcs+0x30e fffff806`18724d20 fffff806`13ffdd35 : 00000000`00000000 fffff806`0fae2180 ffffa700`d9dcc8c0 00000000`000000bd : nt!KiRetireDpcList+0x1f4 fffff806`18724fb0 fffff806`13ffdb20 : fffff806`13ff2de0 fffff806`13ec656a 00000000`00000000 00002bd5`17244f48 : nt!KxRetireDpcList+0x5 fffff380`4fe29ac0 fffff806`13ffd3d5 : 00000000`000000bd fffff806`13ff8041 00000000`00000001 ffffcb87`7e3a9080 : nt!KiDispatchInterruptContinue fffff380`4fe29af0 fffff806`13ff8041 : 00000000`00000001 ffffcb87`7e3a9080 fffff380`00000000 ffffcb87`00000000 : nt!KiDpcInterruptBypass+0x25 fffff380`4fe29b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0xb1 SYMBOL_NAME: L1C63x64!HandleRxIntr+25e MODULE_NAME: L1C63x64. IMAGE_NAME: L1C63x64.sys IMAGE_VERSION: 2.1.0.16 STACK_COMMAND: .thread ; .cxr ; kb. BUCKET_ID_FUNC_OFFSET: 25e. FAILURE_BUCKET_ID: AV_L1C63x64!HandleRxIntr OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {d6379392-3f48-c6ec-1a10-10fcebd963ee} Followup: MachineOwner. ---------
Evet, artık ben de minidump dosyalarını okuyabiliyorum.
@ismimberkay @Er73748