Çözüldü Arka arkaya mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Çözüm
Ethernet kartınızın sürücüsünü güncelleyin.
Corsair yazılımını kaldırın.
Samsung Magician veya başka bir Samsung yazılımı varsa kaldırın.
Komut istemini yönetici olarak çalıştırıp sfc /scannow yazın ve çıkan sonucun ekran görüntüsünü bizlerle paylaşın.
Kaspersky kaldırın.
Memtest 86 ile belleklerinizi test edin, belleklerde de sorun var gözüküyor.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
    extents for the thread.
Arg2: ffffde018a9f41a0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffde018a9f40f8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 9

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on AHMET

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 12

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  139

BUGCHECK_P1: 4

BUGCHECK_P2: ffffde018a9f41a0

BUGCHECK_P3: ffffde018a9f40f8

BUGCHECK_P4: 0

TRAP_FRAME:  ffffde018a9f41a0 -- (.trap 0xffffde018a9f41a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd70582463000 rbx=0000000000000000 rcx=0000000000000004
rdx=ffffd70582469000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80220e3bc65 rsp=ffffde018a9f4330 rbp=ffffde018a9f43a0
 r8=ffffd70582469000  r9=ffffde018a9f4300 r10=0000fffff80220d6
r11=ffffde018a9f4570 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl zr na po nc
nt!RtlpGetStackLimitsEx+0x1b4aa5:
fffff802`20e3bc65 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffde018a9f40f8 -- (.exr 0xffffde018a9f40f8)
ExceptionAddress: fffff80220e3bc65 (nt!RtlpGetStackLimitsEx+0x00000000001b4aa5)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  msedge.exe

WATSON_BKT_EVENT:  BEX

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000004

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffffde01`8a9f3e78 fffff802`20e08c69 : 00000000`00000139 00000000`00000004 ffffde01`8a9f41a0 ffffde01`8a9f40f8 : nt!KeBugCheckEx
ffffde01`8a9f3e80 fffff802`20e09090 : 982e0d8b`482079c0 6899770d`8d4c002a 44c70000`001cbaff 75e80000`03622024 : nt!KiBugCheckDispatch+0x69
ffffde01`8a9f3fc0 fffff802`20e07423 : 45c033ff`fff6b8e9 33eeebc0`960fc83b ebc0970f`c83b45c0 920fc83b`45c033e4 : nt!KiFastFailDispatch+0xd0
ffffde01`8a9f41a0 fffff802`20e3bc65 : ffffde01`8a9f45b0 ffffde01`8a9f4d78 ffffde01`8a9f43a0 44894800`10cc13e8 : nt!KiRaiseSecurityCheckFailure+0x323
ffffde01`8a9f4330 fffff802`20c87391 : ffffde01`8a9f45b0 00000000`00000000 0c8d49d7`8b49c68b 8b4cffb6`00000003 : nt!RtlpGetStackLimitsEx+0x1b4aa5
ffffde01`8a9f4360 fffff802`20c86136 : ffffde01`8a9f4d78 ffffde01`8a9f4ab0 ffffde01`8a9f4d78 0000004c`3f7fcf68 : nt!RtlDispatchException+0xe1
ffffde01`8a9f4580 fffff802`20e08dac : 00000000`00000000 00000000`00000000 00000000`00000000 ffff054f`fd20144d : nt!KiDispatchException+0x186
ffffde01`8a9f4c40 fffff802`20e04ae0 : 00000000`00000000 00000000`00000000 00000000`000033f4 fffff802`20c9468f : nt!KiExceptionDispatch+0x12c
ffffde01`8a9f4e20 fffff802`20dfd96d : ffffd705`82468b80 ffff968c`8d2aed40 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
ffffde01`8a9f4fb0 fffff802`20dfd6f7 : 00000000`00000000 00000000`00000000 ffffd705`00000000 ffff968c`00000000 : nt!KiIpiInterruptSubDispatch+0x1d
ffffd705`82468b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIpiInterrupt+0x307


SYMBOL_NAME:  nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.985

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_MISSING_GSFRAME_nt!KiFastFailDispatch

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1971a9b0-b7ec-89bf-0a51-10ac52818da5}

Followup:     MachineOwner
---------

3: kd> lm
start             end                 module name
fffff802`1d900000 fffff802`1d928000   mcupdate_AuthenticAMD   (deferred)           
fffff802`1d930000 fffff802`1d936000   hal        (deferred)           
fffff802`1d940000 fffff802`1d94b000   kd         (deferred)           
fffff802`1d950000 fffff802`1d977000   tm         (deferred)           
fffff802`1d980000 fffff802`1d9ea000   CLFS       (deferred)           
fffff802`1d9f0000 fffff802`1da0a000   PSHED      (deferred)           
fffff802`1da10000 fffff802`1da1b000   BOOTVID    (deferred)           
fffff802`1da20000 fffff802`1db33000   clipsp     (deferred)           
fffff802`1db40000 fffff802`1dbaf000   FLTMGR     (deferred)           
fffff802`1dbb0000 fffff802`1dbd9000   ksecdd     (deferred)           
fffff802`1dbe0000 fffff802`1dc43000   msrpc      (deferred)           
fffff802`1dc50000 fffff802`1dc5e000   cmimcext   (deferred)           
fffff802`1dc60000 fffff802`1dc71000   werkernel   (deferred)           
fffff802`1dc80000 fffff802`1dc8c000   ntosext    (deferred)           
fffff802`1dc90000 fffff802`1dca3000   WDFLDR     (deferred)           
fffff802`1dcb0000 fffff802`1dcbf000   SleepStudyHelper   (deferred)           
fffff802`1dcc0000 fffff802`1dcd1000   WppRecorder   (deferred)           
fffff802`1dce0000 fffff802`1dcfa000   SgrmAgent   (deferred)           
fffff802`20a00000 fffff802`21a46000   nt         (pdb symbols)          C:\ProgramData\dbg\sym\ntkrnlmp.pdb\992A9A48F30EC2C58B01A5934DCE2D9C1\ntkrnlmp.pdb
fffff802`23200000 fffff802`232e3000   CI         (deferred)           
fffff802`232f0000 fffff802`233a7000   cng        (deferred)           
fffff802`233b0000 fffff802`23482000   Wdf01000   (deferred)           
fffff802`23490000 fffff802`234b6000   acpiex     (deferred)           
fffff802`234c0000 fffff802`2358c000   ACPI       (deferred)           
fffff802`23590000 fffff802`2359c000   WMILIB     (deferred)           
fffff802`235b0000 fffff802`2361b000   intelpep   (deferred)           
fffff802`23620000 fffff802`23637000   WindowsTrustedRT   (deferred)           
fffff802`23640000 fffff802`2364b000   IntelTA    (deferred)           
fffff802`23650000 fffff802`2365b000   WindowsTrustedRTProxy   (deferred)           
fffff802`23660000 fffff802`23674000   pcw        (deferred)           
fffff802`23680000 fffff802`236c0000   klupd_klif_arkmon   (deferred)           
fffff802`236d0000 fffff802`236db000   msisadrv   (deferred)           
fffff802`236e0000 fffff802`23757000   pci        (deferred)           
fffff802`23760000 fffff802`23775000   vdrvroot   (deferred)           
fffff802`23780000 fffff802`237bb000   cm_km      (deferred)           
fffff802`237c0000 fffff802`237ef000   pdc        (deferred)           
fffff802`237f0000 fffff802`23809000   CEA        (deferred)           
fffff802`23810000 fffff802`23841000   partmgr    (deferred)           
fffff802`23850000 fffff802`2385a000   pciide     (deferred)           
fffff802`23860000 fffff802`23873000   PCIIDEX    (deferred)           
fffff802`23880000 fffff802`2392a000   spaceport   (deferred)           
fffff802`23930000 fffff802`23949000   volmgr     (deferred)           
fffff802`23950000 fffff802`239b3000   volmgrx    (deferred)           
fffff802`239c0000 fffff802`239de000   mountmgr   (deferred)           
fffff802`239e0000 fffff802`239ed000   atapi      (deferred)           
fffff802`239f0000 fffff802`239fd000   Fs_Rec     (deferred)           
fffff802`23a00000 fffff802`23a3c000   ataport    (deferred)           
fffff802`23a40000 fffff802`23a72000   storahci   (deferred)           
fffff802`23a80000 fffff802`23b33000   storport   (deferred)           
fffff802`23b60000 fffff802`23b7a000   fileinfo   (deferred)           
fffff802`23b80000 fffff802`23bc0000   Wof        (deferred)           
fffff802`23bd0000 fffff802`23d3f000   ndis       (deferred)           
fffff802`23d40000 fffff802`23dd8000   NETIO      (deferred)           
fffff802`23de0000 fffff802`23deb000   volume     (deferred)           
fffff802`23e00000 fffff802`248a5000   FACEIT     (deferred)           
fffff802`248b0000 fffff802`24b89000   Ntfs       (deferred)           
fffff802`24b90000 fffff802`24bc2000   ksecpkg    (deferred)           
fffff802`24bd0000 fffff802`24ebb000   tcpip      (deferred)           
fffff802`24ec0000 fffff802`24f3f000   fwpkclnt   (deferred)           
fffff802`24f40000 fffff802`24f70000   wfplwfs    (deferred)           
fffff802`24f80000 fffff802`25048000   fvevol     (deferred)           
fffff802`25050000 fffff802`250a0000   rdyboost   (deferred)           
fffff802`250b0000 fffff802`2511d000   volsnap    (deferred)           
fffff802`25120000 fffff802`25146000   mup        (deferred)           
fffff802`25150000 fffff802`25169000   klupd_klif_klbg   (deferred)           
fffff802`25170000 fffff802`25182000   iorate     (deferred)           
fffff802`251b0000 fffff802`251cc000   disk       (deferred)           
fffff802`251d0000 fffff802`2523c000   CLASSPNP   (deferred)           
fffff802`25820000 fffff802`25fd8000   vgk        (deferred)           
fffff802`25fe0000 fffff802`25ff9000   klbackupdisk   (deferred)           
fffff802`26000000 fffff802`26030000   cdrom      (deferred)           
fffff802`26040000 fffff802`260ca000   klflt      (deferred)           
fffff802`260d0000 fffff802`26101000   klbackupflt   (deferred)           
fffff802`26110000 fffff802`26125000   filecrypt   (deferred)           
fffff802`26130000 fffff802`2613e000   tbs        (deferred)           
fffff802`26140000 fffff802`26240000   klif       (deferred)           
fffff802`26250000 fffff802`262c6000   ks         (deferred)           
fffff802`262d0000 fffff802`2645b000   klhk       (deferred)           
fffff802`26460000 fffff802`26501000   klgse      (deferred)           
fffff802`26510000 fffff802`26522000   klpd       (deferred)           
fffff802`26530000 fffff802`2654c000   kldisk     (deferred)           
fffff802`26550000 fffff802`2655a000   Null       (deferred)           
fffff802`26560000 fffff802`2656a000   Beep       (deferred)           
fffff802`26570000 fffff802`26585000   klpnpflt   (deferred)           
fffff802`26590000 fffff802`2660b000   rdbss      (deferred)           
fffff802`26610000 fffff802`26622000   nsiproxy   (deferred)           
fffff802`26630000 fffff802`2663e000   npsvctrig   (deferred)           
fffff802`26640000 fffff802`26650000   mssmbios   (deferred)           
fffff802`26660000 fffff802`266a9000   kneps      (deferred)           
fffff802`266f0000 fffff802`266fa000   gpuenergydrv   (deferred)           
fffff802`26720000 fffff802`2673e000   crashdmp   (deferred)           
fffff802`26800000 fffff802`26817000   bam        (deferred)           
fffff802`26820000 fffff802`2686e000   ahcache    (deferred)           
fffff802`26870000 fffff802`2687d000   kltap      (deferred)           
fffff802`26880000 fffff802`26892000   CompositeBus   (deferred)           
fffff802`268a0000 fffff802`268ad000   kdnic      (deferred)           
fffff802`268b0000 fffff802`268c5000   umbus      (deferred)           
fffff802`268d0000 fffff802`2690b000   amdppm     (deferred)           
fffff802`26910000 fffff802`26966000   msquic     (deferred)           
fffff802`269a0000 fffff802`269cc000   dfsc       (deferred)           
fffff802`26c00000 fffff802`26c5c000   netbt      (deferred)           
fffff802`26c60000 fffff802`26c73000   afunix     (deferred)           
fffff802`26c80000 fffff802`26d23000   afd        (deferred)           
fffff802`26d30000 fffff802`26d7b000   klwtp      (deferred)           
fffff802`26d80000 fffff802`26d95000   klim6      (deferred)           
fffff802`26da0000 fffff802`26dba000   vwififlt   (deferred)           
fffff802`26dc0000 fffff802`26deb000   pacer      (deferred)           
fffff802`26df0000 fffff802`26e04000   ndiscap    (deferred)           
fffff802`26e10000 fffff802`26e24000   netbios    (deferred)           
fffff802`26e30000 fffff802`26ed1000   Vid        (deferred)           
fffff802`26ee0000 fffff802`27285000   dxgkrnl    (deferred)           
fffff802`27290000 fffff802`272a8000   watchdog   (deferred)           
fffff802`272b0000 fffff802`272c6000   BasicDisplay   (deferred)           
fffff802`272d0000 fffff802`272e1000   BasicRender   (deferred)           
fffff802`272f0000 fffff802`2730c000   Npfs       (deferred)           
fffff802`27310000 fffff802`27321000   Msfs       (deferred)           
fffff802`27330000 fffff802`2734b000   CimFS      (deferred)           
fffff802`27350000 fffff802`27374000   klwfp      (deferred)           
fffff802`27380000 fffff802`273a2000   tdx        (deferred)           
fffff802`273b0000 fffff802`273c0000   TDI        (deferred)           
fffff802`273d0000 fffff802`273f1000   winhvr     (deferred)           
fffff802`29a00000 fffff802`29a1c000   serial     (deferred)           
fffff802`29a20000 fffff802`29a2f000   serenum    (deferred)           
fffff802`29a30000 fffff802`29a4f000   parport    (deferred)           
fffff802`29a50000 fffff802`29a61000   nvvad64v   (deferred)           
fffff802`29a70000 fffff802`29a7f000   ksthunk    (deferred)           
fffff802`29a80000 fffff802`29a8d000   NvModuleTracker   (deferred)           
fffff802`29a90000 fffff802`29aa0000   nvvhci     (deferred)           
fffff802`29ab0000 fffff802`29abd000   NdisVirtualBus   (deferred)           
fffff802`29ac0000 fffff802`29acc000   swenum     (deferred)           
fffff802`29ad0000 fffff802`29ade000   CorsairVBusDriver   (deferred)           
fffff802`29ae0000 fffff802`29aee000   rdpbus     (deferred)           
fffff802`29af0000 fffff802`29b75000   usbhub     (deferred)           
fffff802`29b80000 fffff802`29b8e000   USBD       (deferred)           
fffff802`29ba0000 fffff802`29bdf000   HIDCLASS   (deferred)           
fffff802`29be0000 fffff802`29bf3000   HIDPARSE   (deferred)           
fffff802`29c00000 fffff802`29c23000   nvhda64v   (deferred)           
fffff802`29c30000 fffff802`29c9f000   HdAudio    (deferred)           
fffff802`29ca0000 fffff802`29cb1000   kbdhid     (deferred)           
fffff802`29cc0000 fffff802`29cd9000   klkbdflt   (deferred)           
fffff802`29ce0000 fffff802`29cf4000   kbdclass   (deferred)           
fffff802`29d00000 fffff802`29d33000   usbccgp    (deferred)           
fffff802`29d40000 fffff802`29d65000   USBSTOR    (deferred)           
fffff802`29d70000 fffff802`29d82000   hidusb     (deferred)           
fffff802`29d90000 fffff802`29dca000   usbaudio   (deferred)           
fffff802`29dd0000 fffff802`29de0000   mouhid     (deferred)           
fffff802`29df0000 fffff802`29e0a000   klmouflt   (deferred)           
fffff802`29e10000 fffff802`29e23000   mouclass   (deferred)           
fffff802`29e40000 fffff802`29e4e000   dump_diskdump   (deferred)           
fffff802`29e90000 fffff802`29ec2000   dump_storahci   (deferred)           
fffff802`29ef0000 fffff802`29f0d000   dump_dumpfve   (deferred)           
fffff802`29f10000 fffff802`29ff1000   dxgmms2    (deferred)           
fffff802`2a000000 fffff802`2a01b000   monitor    (deferred)           
fffff802`2a020000 fffff802`2a049000   luafv      (deferred)           
fffff802`2a050000 fffff802`2a086000   wcifs      (deferred)           
fffff802`2a090000 fffff802`2a0e4000   WUDFRd     (deferred)           
fffff802`2a0f0000 fffff802`2a172000   cldflt     (deferred)           
fffff802`2a180000 fffff802`2a18e000   WpdUpFltr   (deferred)           
fffff802`2a190000 fffff802`2a1aa000   storqosflt   (deferred)           
fffff802`2a1b0000 fffff802`2a1d8000   bindflt    (deferred)           
fffff802`2a1e0000 fffff802`2a1f8000   lltdio     (deferred)           
fffff802`2a200000 fffff802`2a218000   mslldp     (deferred)           
fffff802`2a220000 fffff802`2a23b000   rspndr     (deferred)           
fffff802`2a240000 fffff802`2a25d000   wanarp     (deferred)           
fffff802`2a2a0000 fffff802`2c830000   nvlddmkm   (deferred)           
fffff802`2c840000 fffff802`2c865000   HDAudBus   (deferred)           
fffff802`2c870000 fffff802`2c8d6000   portcls    (deferred)           
fffff802`2c8e0000 fffff802`2c901000   drmk       (deferred)           
fffff802`2c910000 fffff802`2c932000   L1C63x64   (deferred)           
fffff802`2c940000 fffff802`2c94f000   usbohci    (deferred)           
fffff802`2c950000 fffff802`2c9c9000   USBPORT    (deferred)           
fffff802`2c9d0000 fffff802`2c9ea000   usbehci    (deferred)           
fffff802`64a00000 fffff802`64a94000   mrxsmb     (deferred)           
fffff802`64aa0000 fffff802`64ae5000   mrxsmb20   (deferred)           
fffff802`64af0000 fffff802`64af9000   CorsairLLAccess64   (deferred)           
fffff802`64b00000 fffff802`64b53000   srvnet     (deferred)           
fffff802`64b60000 fffff802`64b74000   mmcss      (deferred)           
fffff802`64b80000 fffff802`64ba7000   Ndu        (deferred)           
fffff802`64bb0000 fffff802`64c86000   peauth     (deferred)           
fffff802`64c90000 fffff802`64ca5000   tcpipreg   (deferred)           
fffff802`64cb0000 fffff802`64ccc000   rassstp    (deferred)           
fffff802`64cd0000 fffff802`64d97000   srv2       (deferred)           
fffff802`64da0000 fffff802`64dbd000   NDProxy    (deferred)           
fffff802`64dc0000 fffff802`64de7000   AgileVpn   (deferred)           
fffff802`64df0000 fffff802`64e11000   rasl2tp    (deferred)           
fffff802`64e20000 fffff802`64e41000   raspptp    (deferred)           
fffff802`64e50000 fffff802`64e6c000   raspppoe   (deferred)           
fffff802`64e70000 fffff802`64e7f000   ndistapi   (deferred)           
fffff802`64e80000 fffff802`64eba000   ndiswan    (deferred)           
fffff802`64ec0000 fffff802`64ed2000   condrv     (deferred)           
fffff802`64ee0000 fffff802`64eeb000   cpuz150_x64   (deferred)           
fffff802`64ef0000 fffff802`64f27000   klupd_klif_mark   (deferred)           
fffff802`64f30000 fffff802`64f69000   klids      (deferred)           
fffff802`64f70000 fffff802`64fac000   klupd_klif_swmon   (deferred)           
fffff802`64fb0000 fffff802`64fb9000   CorsairVHidDriver   (deferred)           
fffff802`64fd0000 fffff802`65158000   HTTP       (deferred)           
fffff802`65160000 fffff802`65185000   bowser     (deferred)           
fffff802`65190000 fffff802`651aa000   mpsdrv     (deferred)           
fffffe38`2dc00000 fffffe38`2ded8000   win32kbase   (deferred)           
fffffe38`2e130000 fffffe38`2e1ca000   win32k   # (pdb symbols)          C:\ProgramData\dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
fffffe38`2e3e0000 fffffe38`2e796000   win32kfull   (deferred)           
fffffe38`2e7a0000 fffffe38`2e7ea000   cdd        (deferred)           

Unloaded modules:
fffff802`64fc0000 fffff802`64fc8000   magdrvamd64.
fffff802`29b90000 fffff802`29b9a000   CorsairVHidD
fffff802`266b0000 fffff802`266ea000   klids.sys
fffff802`23b40000 fffff802`23b5d000   EhStorClass.
fffff802`26750000 fffff802`2675f000   dump_storpor
fffff802`267a0000 fffff802`267d3000   dump_storahc
fffff802`25800000 fffff802`2581e000   dump_dumpfve
fffff802`269d0000 fffff802`269ec000   dam.sys
fffff802`235a0000 fffff802`235af000   klelam.sys
fffff802`25190000 fffff802`251a1000   hwpolicy.sys
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000019c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80617ee4955, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 17

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on AHMET

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 19

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  d1

BUGCHECK_P1: 19c

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80617ee4955

READ_ADDRESS: fffff806148fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock
fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 000000000000019c

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  msedge.exe

DPC_STACK_BASE:  FFFFF80618724FB0

TRAP_FRAME:  fffff806187234b0 -- (.trap 0xfffff806187234b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000180 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000007 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80617ee4955 rsp=fffff80618723640 rbp=fffff80618723780
 r8=0000000000000000  r9=0000000000000000 r10=fffff80613e3a390
r11=fffff80618723610 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
tcpip!IppInspectLocalDatagramsOut+0x505:
fffff806`17ee4955 807d9000        cmp     byte ptr [rbp-70h],0 ss:fffff806`18723710=01
Resetting default scope

STACK_TEXT:
fffff806`18723368 fffff806`14008c69 : 00000000`0000000a 00000000`0000019c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`18723370 fffff806`14004f69 : fffff806`1e6d34d0 ffffcb87`00000000 ffffcb87`85bdfef0 fffff806`1e6d448a : nt!KiBugCheckDispatch+0x69
fffff806`187234b0 fffff806`17ee4955 : 00000000`00000003 00000000`00000001 ffffcb87`82893a00 ffffcb87`82893a00 : nt!KiPageFault+0x469
fffff806`18723640 fffff806`17ee3d4b : ffffcb87`757059c8 fffff806`19a703e9 ffffcb87`8654bb01 ffffcb87`75736008 : tcpip!IppInspectLocalDatagramsOut+0x505
fffff806`18723910 fffff806`17ee28b9 : 00000000`00000000 00000000`00000000 fffff806`180a9230 ffffcb87`82893a00 : tcpip!IppSendDatagramsCommon+0x41b
fffff806`18723a90 fffff806`17ec1b2d : ffffcb87`82e94e10 00000000`00000014 00000000`00000000 ffffcb87`84b6ea20 : tcpip!IpNlpFastSendDatagram+0x349
fffff806`18723b50 fffff806`17ec3cf6 : ffffcb87`84b6ea20 00000000`00000000 00000000`2cd154a4 ffffcb87`751ff3c0 : tcpip!TcpTcbHeaderSend+0x5cd
fffff806`18723e00 fffff806`17ec223e : ffffcb87`750fe700 fffff806`13e1bb01 ffffcb87`00000000 00000000`00000000 : tcpip!TcpReceive+0x4d6
fffff806`18723ef0 fffff806`17ed44b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e
fffff806`18723f30 fffff806`17f2f6be : ffffcb87`7812d800 ffffcb87`7ba8e410 00000000`00000006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
fffff806`187241c0 fffff806`13e98bc8 : ffffcb87`75783cc0 00000000`00000002 ffffcb87`7e87c080 fffff806`187244b8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
fffff806`18724310 fffff806`13e98b3d : fffff806`17f2f590 fffff806`187244b8 ffffcb87`754d2560 fffff806`16f423af : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff806`18724380 fffff806`17f226ad : ffffcb87`7c410350 fffff806`1dfcadb7 ffffcb87`861d14d0 fffff806`17dd142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff806`187243c0 fffff806`17f21d8d : 00000000`00000001 fffff806`18724520 ffffcb87`7ba8e410 fffff806`18724530 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff806`18724420 fffff806`16dd1eb0 : fffff806`1a9c8ab0 fffff806`18dac617 ffffcb87`75e408a0 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff806`187246d0 fffff806`16dd1ccb : ffffcb87`7ba8eaa0 00000000`00000001 ffffcb87`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff806`187247b0 fffff806`16dd7ef0 : ffffcb87`7b0b71a0 ffffcb87`754b1901 ffffcb87`7b0b71a0 0000ffff`f8062001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff806`18724830 fffff806`16e0dd73 : ffffcb87`7b90e030 fffff806`18724901 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
fffff806`18724880 fffff806`16dd4a94 : 00000000`0001d3d4 00000000`00000001 ffffcb87`7b0b71a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff806`18724950 fffff806`20fd8a96 : ffffcb87`00000001 ffffcb87`7b80f000 ffffcb87`7b80fa30 fffff806`18724b00 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff806`187249e0 fffff806`20fdb762 : 00000000`00000000 fffff806`18724b00 00000002`00000000 00000000`00000000 : L1C63x64!HandleRxIntr+0x25e
fffff806`18724a90 fffff806`16e13579 : 00000000`00000010 ffffcb87`7b8129a0 fffff806`18724b49 ffffcb87`7b0b71a0 : L1C63x64!HardwareHandleInterrupt+0x1ba
fffff806`18724ad0 fffff806`13f230ce : fffff806`0fae5240 ffffcb87`737ec000 00000000`00000000 ffffcb87`00000002 : ndis!ndisInterruptDpc+0x3be89
fffff806`18724bb0 fffff806`13f223b4 : fffff806`0fae2180 00000000`00000000 00000000`00000008 00000000`000116f1 : nt!KiExecuteAllDpcs+0x30e
fffff806`18724d20 fffff806`13ffdd35 : 00000000`00000000 fffff806`0fae2180 ffffa700`d9dcc8c0 00000000`000000bd : nt!KiRetireDpcList+0x1f4
fffff806`18724fb0 fffff806`13ffdb20 : fffff806`13ff2de0 fffff806`13ec656a 00000000`00000000 00002bd5`17244f48 : nt!KxRetireDpcList+0x5
fffff380`4fe29ac0 fffff806`13ffd3d5 : 00000000`000000bd fffff806`13ff8041 00000000`00000001 ffffcb87`7e3a9080 : nt!KiDispatchInterruptContinue
fffff380`4fe29af0 fffff806`13ff8041 : 00000000`00000001 ffffcb87`7e3a9080 fffff380`00000000 ffffcb87`00000000 : nt!KiDpcInterruptBypass+0x25
fffff380`4fe29b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0xb1


SYMBOL_NAME:  L1C63x64!HandleRxIntr+25e

MODULE_NAME: L1C63x64

IMAGE_NAME:  L1C63x64.sys

IMAGE_VERSION:  2.1.0.16

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  25e

FAILURE_BUCKET_ID:  AV_L1C63x64!HandleRxIntr

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d6379392-3f48-c6ec-1a10-10fcebd963ee}

Followup:     MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000019c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80617ee4955, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 15

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on AHMET

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 16

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  d1

BUGCHECK_P1: 19c

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80617ee4955

READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock
 000000000000019c

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  msedge.exe

DPC_STACK_BASE:  FFFFF80618724FB0

TRAP_FRAME:  fffff806187234b0 -- (.trap 0xfffff806187234b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000180 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000007 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80617ee4955 rsp=fffff80618723640 rbp=fffff80618723780
 r8=0000000000000000  r9=0000000000000000 r10=fffff80613e3a390
r11=fffff80618723610 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
tcpip!IppInspectLocalDatagramsOut+0x505:
fffff806`17ee4955 807d9000        cmp     byte ptr [rbp-70h],0 ss:fffff806`18723710=01
Resetting default scope

STACK_TEXT:
fffff806`18723368 fffff806`14008c69 : 00000000`0000000a 00000000`0000019c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`18723370 fffff806`14004f69 : fffff806`1e6d34d0 ffffcb87`00000000 ffffcb87`85bdfef0 fffff806`1e6d448a : nt!KiBugCheckDispatch+0x69
fffff806`187234b0 fffff806`17ee4955 : 00000000`00000003 00000000`00000001 ffffcb87`82893a00 ffffcb87`82893a00 : nt!KiPageFault+0x469
fffff806`18723640 fffff806`17ee3d4b : ffffcb87`757059c8 fffff806`19a703e9 ffffcb87`8654bb01 ffffcb87`75736008 : tcpip!IppInspectLocalDatagramsOut+0x505
fffff806`18723910 fffff806`17ee28b9 : 00000000`00000000 00000000`00000000 fffff806`180a9230 ffffcb87`82893a00 : tcpip!IppSendDatagramsCommon+0x41b
fffff806`18723a90 fffff806`17ec1b2d : ffffcb87`82e94e10 00000000`00000014 00000000`00000000 ffffcb87`84b6ea20 : tcpip!IpNlpFastSendDatagram+0x349
fffff806`18723b50 fffff806`17ec3cf6 : ffffcb87`84b6ea20 00000000`00000000 00000000`2cd154a4 ffffcb87`751ff3c0 : tcpip!TcpTcbHeaderSend+0x5cd
fffff806`18723e00 fffff806`17ec223e : ffffcb87`750fe700 fffff806`13e1bb01 ffffcb87`00000000 00000000`00000000 : tcpip!TcpReceive+0x4d6
fffff806`18723ef0 fffff806`17ed44b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e
fffff806`18723f30 fffff806`17f2f6be : ffffcb87`7812d800 ffffcb87`7ba8e410 00000000`00000006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
fffff806`187241c0 fffff806`13e98bc8 : ffffcb87`75783cc0 00000000`00000002 ffffcb87`7e87c080 fffff806`187244b8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
fffff806`18724310 fffff806`13e98b3d : fffff806`17f2f590 fffff806`187244b8 ffffcb87`754d2560 fffff806`16f423af : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff806`18724380 fffff806`17f226ad : ffffcb87`7c410350 fffff806`1dfcadb7 ffffcb87`861d14d0 fffff806`17dd142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff806`187243c0 fffff806`17f21d8d : 00000000`00000001 fffff806`18724520 ffffcb87`7ba8e410 fffff806`18724530 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff806`18724420 fffff806`16dd1eb0 : fffff806`1a9c8ab0 fffff806`18dac617 ffffcb87`75e408a0 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff806`187246d0 fffff806`16dd1ccb : ffffcb87`7ba8eaa0 00000000`00000001 ffffcb87`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff806`187247b0 fffff806`16dd7ef0 : ffffcb87`7b0b71a0 ffffcb87`754b1901 ffffcb87`7b0b71a0 0000ffff`f8062001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff806`18724830 fffff806`16e0dd73 : ffffcb87`7b90e030 fffff806`18724901 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
fffff806`18724880 fffff806`16dd4a94 : 00000000`0001d3d4 00000000`00000001 ffffcb87`7b0b71a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff806`18724950 fffff806`20fd8a96 : ffffcb87`00000001 ffffcb87`7b80f000 ffffcb87`7b80fa30 fffff806`18724b00 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff806`187249e0 fffff806`20fdb762 : 00000000`00000000 fffff806`18724b00 00000002`00000000 00000000`00000000 : L1C63x64!HandleRxIntr+0x25e
fffff806`18724a90 fffff806`16e13579 : 00000000`00000010 ffffcb87`7b8129a0 fffff806`18724b49 ffffcb87`7b0b71a0 : L1C63x64!HardwareHandleInterrupt+0x1ba
fffff806`18724ad0 fffff806`13f230ce : fffff806`0fae5240 ffffcb87`737ec000 00000000`00000000 ffffcb87`00000002 : ndis!ndisInterruptDpc+0x3be89
fffff806`18724bb0 fffff806`13f223b4 : fffff806`0fae2180 00000000`00000000 00000000`00000008 00000000`000116f1 : nt!KiExecuteAllDpcs+0x30e
fffff806`18724d20 fffff806`13ffdd35 : 00000000`00000000 fffff806`0fae2180 ffffa700`d9dcc8c0 00000000`000000bd : nt!KiRetireDpcList+0x1f4
fffff806`18724fb0 fffff806`13ffdb20 : fffff806`13ff2de0 fffff806`13ec656a 00000000`00000000 00002bd5`17244f48 : nt!KxRetireDpcList+0x5
fffff380`4fe29ac0 fffff806`13ffd3d5 : 00000000`000000bd fffff806`13ff8041 00000000`00000001 ffffcb87`7e3a9080 : nt!KiDispatchInterruptContinue
fffff380`4fe29af0 fffff806`13ff8041 : 00000000`00000001 ffffcb87`7e3a9080 fffff380`00000000 ffffcb87`00000000 : nt!KiDpcInterruptBypass+0x25
fffff380`4fe29b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0xb1


SYMBOL_NAME:  L1C63x64!HandleRxIntr+25e

MODULE_NAME: L1C63x64

IMAGE_NAME:  L1C63x64.sys

IMAGE_VERSION:  2.1.0.16

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  25e

FAILURE_BUCKET_ID:  AV_L1C63x64!HandleRxIntr

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d6379392-3f48-c6ec-1a10-10fcebd963ee}

Followup:     MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000019c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80617ee4955, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 15

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on AHMET

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 16

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  d1

BUGCHECK_P1: 19c

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80617ee4955

READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock
 000000000000019c

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  msedge.exe

DPC_STACK_BASE:  FFFFF80618724FB0

TRAP_FRAME:  fffff806187234b0 -- (.trap 0xfffff806187234b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000180 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000007 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80617ee4955 rsp=fffff80618723640 rbp=fffff80618723780
 r8=0000000000000000  r9=0000000000000000 r10=fffff80613e3a390
r11=fffff80618723610 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
tcpip!IppInspectLocalDatagramsOut+0x505:
fffff806`17ee4955 807d9000        cmp     byte ptr [rbp-70h],0 ss:fffff806`18723710=01
Resetting default scope

STACK_TEXT:
fffff806`18723368 fffff806`14008c69 : 00000000`0000000a 00000000`0000019c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`18723370 fffff806`14004f69 : fffff806`1e6d34d0 ffffcb87`00000000 ffffcb87`85bdfef0 fffff806`1e6d448a : nt!KiBugCheckDispatch+0x69
fffff806`187234b0 fffff806`17ee4955 : 00000000`00000003 00000000`00000001 ffffcb87`82893a00 ffffcb87`82893a00 : nt!KiPageFault+0x469
fffff806`18723640 fffff806`17ee3d4b : ffffcb87`757059c8 fffff806`19a703e9 ffffcb87`8654bb01 ffffcb87`75736008 : tcpip!IppInspectLocalDatagramsOut+0x505
fffff806`18723910 fffff806`17ee28b9 : 00000000`00000000 00000000`00000000 fffff806`180a9230 ffffcb87`82893a00 : tcpip!IppSendDatagramsCommon+0x41b
fffff806`18723a90 fffff806`17ec1b2d : ffffcb87`82e94e10 00000000`00000014 00000000`00000000 ffffcb87`84b6ea20 : tcpip!IpNlpFastSendDatagram+0x349
fffff806`18723b50 fffff806`17ec3cf6 : ffffcb87`84b6ea20 00000000`00000000 00000000`2cd154a4 ffffcb87`751ff3c0 : tcpip!TcpTcbHeaderSend+0x5cd
fffff806`18723e00 fffff806`17ec223e : ffffcb87`750fe700 fffff806`13e1bb01 ffffcb87`00000000 00000000`00000000 : tcpip!TcpReceive+0x4d6
fffff806`18723ef0 fffff806`17ed44b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e
fffff806`18723f30 fffff806`17f2f6be : ffffcb87`7812d800 ffffcb87`7ba8e410 00000000`00000006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
fffff806`187241c0 fffff806`13e98bc8 : ffffcb87`75783cc0 00000000`00000002 ffffcb87`7e87c080 fffff806`187244b8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
fffff806`18724310 fffff806`13e98b3d : fffff806`17f2f590 fffff806`187244b8 ffffcb87`754d2560 fffff806`16f423af : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff806`18724380 fffff806`17f226ad : ffffcb87`7c410350 fffff806`1dfcadb7 ffffcb87`861d14d0 fffff806`17dd142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff806`187243c0 fffff806`17f21d8d : 00000000`00000001 fffff806`18724520 ffffcb87`7ba8e410 fffff806`18724530 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff806`18724420 fffff806`16dd1eb0 : fffff806`1a9c8ab0 fffff806`18dac617 ffffcb87`75e408a0 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff806`187246d0 fffff806`16dd1ccb : ffffcb87`7ba8eaa0 00000000`00000001 ffffcb87`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff806`187247b0 fffff806`16dd7ef0 : ffffcb87`7b0b71a0 ffffcb87`754b1901 ffffcb87`7b0b71a0 0000ffff`f8062001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff806`18724830 fffff806`16e0dd73 : ffffcb87`7b90e030 fffff806`18724901 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
fffff806`18724880 fffff806`16dd4a94 : 00000000`0001d3d4 00000000`00000001 ffffcb87`7b0b71a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff806`18724950 fffff806`20fd8a96 : ffffcb87`00000001 ffffcb87`7b80f000 ffffcb87`7b80fa30 fffff806`18724b00 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff806`187249e0 fffff806`20fdb762 : 00000000`00000000 fffff806`18724b00 00000002`00000000 00000000`00000000 : L1C63x64!HandleRxIntr+0x25e
fffff806`18724a90 fffff806`16e13579 : 00000000`00000010 ffffcb87`7b8129a0 fffff806`18724b49 ffffcb87`7b0b71a0 : L1C63x64!HardwareHandleInterrupt+0x1ba
fffff806`18724ad0 fffff806`13f230ce : fffff806`0fae5240 ffffcb87`737ec000 00000000`00000000 ffffcb87`00000002 : ndis!ndisInterruptDpc+0x3be89
fffff806`18724bb0 fffff806`13f223b4 : fffff806`0fae2180 00000000`00000000 00000000`00000008 00000000`000116f1 : nt!KiExecuteAllDpcs+0x30e
fffff806`18724d20 fffff806`13ffdd35 : 00000000`00000000 fffff806`0fae2180 ffffa700`d9dcc8c0 00000000`000000bd : nt!KiRetireDpcList+0x1f4
fffff806`18724fb0 fffff806`13ffdb20 : fffff806`13ff2de0 fffff806`13ec656a 00000000`00000000 00002bd5`17244f48 : nt!KxRetireDpcList+0x5
fffff380`4fe29ac0 fffff806`13ffd3d5 : 00000000`000000bd fffff806`13ff8041 00000000`00000001 ffffcb87`7e3a9080 : nt!KiDispatchInterruptContinue
fffff380`4fe29af0 fffff806`13ff8041 : 00000000`00000001 ffffcb87`7e3a9080 fffff380`00000000 ffffcb87`00000000 : nt!KiDpcInterruptBypass+0x25
fffff380`4fe29b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0xb1


SYMBOL_NAME:  L1C63x64!HandleRxIntr+25e

MODULE_NAME: L1C63x64

IMAGE_NAME:  L1C63x64.sys

IMAGE_VERSION:  2.1.0.16

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  25e

FAILURE_BUCKET_ID:  AV_L1C63x64!HandleRxIntr

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d6379392-3f48-c6ec-1a10-10fcebd963ee}

Followup:     MachineOwner
---------
@YFK
Evet, artık ben de minidump dosyalarını okuyabiliyorum. :)
@ismimberkay @Er73748
Ethernet kartınızın sürücüsünü güncelleyin.
Corsair yazılımını kaldırın.
Samsung Magician veya başka bir Samsung yazılımı varsa kaldırın.
Komut istemini yönetici olarak çalıştırıp sfc /scannow yazın ve çıkan sonucun ekran görüntüsünü bizlerle paylaşın.
Kaspersky kaldırın.
Memtest 86 ile belleklerinizi test edin, belleklerde de sorun var gözüküyor.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
    extents for the thread.
Arg2: ffffde018a9f41a0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffde018a9f40f8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 9

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on AHMET

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 12

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  139

BUGCHECK_P1: 4

BUGCHECK_P2: ffffde018a9f41a0

BUGCHECK_P3: ffffde018a9f40f8

BUGCHECK_P4: 0

TRAP_FRAME:  ffffde018a9f41a0 -- (.trap 0xffffde018a9f41a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd70582463000 rbx=0000000000000000 rcx=0000000000000004
rdx=ffffd70582469000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80220e3bc65 rsp=ffffde018a9f4330 rbp=ffffde018a9f43a0
 r8=ffffd70582469000  r9=ffffde018a9f4300 r10=0000fffff80220d6
r11=ffffde018a9f4570 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl zr na po nc
nt!RtlpGetStackLimitsEx+0x1b4aa5:
fffff802`20e3bc65 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffde018a9f40f8 -- (.exr 0xffffde018a9f40f8)
ExceptionAddress: fffff80220e3bc65 (nt!RtlpGetStackLimitsEx+0x00000000001b4aa5)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  msedge.exe

WATSON_BKT_EVENT:  BEX

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000004

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffffde01`8a9f3e78 fffff802`20e08c69 : 00000000`00000139 00000000`00000004 ffffde01`8a9f41a0 ffffde01`8a9f40f8 : nt!KeBugCheckEx
ffffde01`8a9f3e80 fffff802`20e09090 : 982e0d8b`482079c0 6899770d`8d4c002a 44c70000`001cbaff 75e80000`03622024 : nt!KiBugCheckDispatch+0x69
ffffde01`8a9f3fc0 fffff802`20e07423 : 45c033ff`fff6b8e9 33eeebc0`960fc83b ebc0970f`c83b45c0 920fc83b`45c033e4 : nt!KiFastFailDispatch+0xd0
ffffde01`8a9f41a0 fffff802`20e3bc65 : ffffde01`8a9f45b0 ffffde01`8a9f4d78 ffffde01`8a9f43a0 44894800`10cc13e8 : nt!KiRaiseSecurityCheckFailure+0x323
ffffde01`8a9f4330 fffff802`20c87391 : ffffde01`8a9f45b0 00000000`00000000 0c8d49d7`8b49c68b 8b4cffb6`00000003 : nt!RtlpGetStackLimitsEx+0x1b4aa5
ffffde01`8a9f4360 fffff802`20c86136 : ffffde01`8a9f4d78 ffffde01`8a9f4ab0 ffffde01`8a9f4d78 0000004c`3f7fcf68 : nt!RtlDispatchException+0xe1
ffffde01`8a9f4580 fffff802`20e08dac : 00000000`00000000 00000000`00000000 00000000`00000000 ffff054f`fd20144d : nt!KiDispatchException+0x186
ffffde01`8a9f4c40 fffff802`20e04ae0 : 00000000`00000000 00000000`00000000 00000000`000033f4 fffff802`20c9468f : nt!KiExceptionDispatch+0x12c
ffffde01`8a9f4e20 fffff802`20dfd96d : ffffd705`82468b80 ffff968c`8d2aed40 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
ffffde01`8a9f4fb0 fffff802`20dfd6f7 : 00000000`00000000 00000000`00000000 ffffd705`00000000 ffff968c`00000000 : nt!KiIpiInterruptSubDispatch+0x1d
ffffd705`82468b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIpiInterrupt+0x307


SYMBOL_NAME:  nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.985

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_MISSING_GSFRAME_nt!KiFastFailDispatch

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1971a9b0-b7ec-89bf-0a51-10ac52818da5}

Followup:     MachineOwner
---------

3: kd> lm
start             end                 module name
fffff802`1d900000 fffff802`1d928000   mcupdate_AuthenticAMD   (deferred)           
fffff802`1d930000 fffff802`1d936000   hal        (deferred)           
fffff802`1d940000 fffff802`1d94b000   kd         (deferred)           
fffff802`1d950000 fffff802`1d977000   tm         (deferred)           
fffff802`1d980000 fffff802`1d9ea000   CLFS       (deferred)           
fffff802`1d9f0000 fffff802`1da0a000   PSHED      (deferred)           
fffff802`1da10000 fffff802`1da1b000   BOOTVID    (deferred)           
fffff802`1da20000 fffff802`1db33000   clipsp     (deferred)           
fffff802`1db40000 fffff802`1dbaf000   FLTMGR     (deferred)           
fffff802`1dbb0000 fffff802`1dbd9000   ksecdd     (deferred)           
fffff802`1dbe0000 fffff802`1dc43000   msrpc      (deferred)           
fffff802`1dc50000 fffff802`1dc5e000   cmimcext   (deferred)           
fffff802`1dc60000 fffff802`1dc71000   werkernel   (deferred)           
fffff802`1dc80000 fffff802`1dc8c000   ntosext    (deferred)           
fffff802`1dc90000 fffff802`1dca3000   WDFLDR     (deferred)           
fffff802`1dcb0000 fffff802`1dcbf000   SleepStudyHelper   (deferred)           
fffff802`1dcc0000 fffff802`1dcd1000   WppRecorder   (deferred)           
fffff802`1dce0000 fffff802`1dcfa000   SgrmAgent   (deferred)           
fffff802`20a00000 fffff802`21a46000   nt         (pdb symbols)          C:\ProgramData\dbg\sym\ntkrnlmp.pdb\992A9A48F30EC2C58B01A5934DCE2D9C1\ntkrnlmp.pdb
fffff802`23200000 fffff802`232e3000   CI         (deferred)           
fffff802`232f0000 fffff802`233a7000   cng        (deferred)           
fffff802`233b0000 fffff802`23482000   Wdf01000   (deferred)           
fffff802`23490000 fffff802`234b6000   acpiex     (deferred)           
fffff802`234c0000 fffff802`2358c000   ACPI       (deferred)           
fffff802`23590000 fffff802`2359c000   WMILIB     (deferred)           
fffff802`235b0000 fffff802`2361b000   intelpep   (deferred)           
fffff802`23620000 fffff802`23637000   WindowsTrustedRT   (deferred)           
fffff802`23640000 fffff802`2364b000   IntelTA    (deferred)           
fffff802`23650000 fffff802`2365b000   WindowsTrustedRTProxy   (deferred)           
fffff802`23660000 fffff802`23674000   pcw        (deferred)           
fffff802`23680000 fffff802`236c0000   klupd_klif_arkmon   (deferred)           
fffff802`236d0000 fffff802`236db000   msisadrv   (deferred)           
fffff802`236e0000 fffff802`23757000   pci        (deferred)           
fffff802`23760000 fffff802`23775000   vdrvroot   (deferred)           
fffff802`23780000 fffff802`237bb000   cm_km      (deferred)           
fffff802`237c0000 fffff802`237ef000   pdc        (deferred)           
fffff802`237f0000 fffff802`23809000   CEA        (deferred)           
fffff802`23810000 fffff802`23841000   partmgr    (deferred)           
fffff802`23850000 fffff802`2385a000   pciide     (deferred)           
fffff802`23860000 fffff802`23873000   PCIIDEX    (deferred)           
fffff802`23880000 fffff802`2392a000   spaceport   (deferred)           
fffff802`23930000 fffff802`23949000   volmgr     (deferred)           
fffff802`23950000 fffff802`239b3000   volmgrx    (deferred)           
fffff802`239c0000 fffff802`239de000   mountmgr   (deferred)           
fffff802`239e0000 fffff802`239ed000   atapi      (deferred)           
fffff802`239f0000 fffff802`239fd000   Fs_Rec     (deferred)           
fffff802`23a00000 fffff802`23a3c000   ataport    (deferred)           
fffff802`23a40000 fffff802`23a72000   storahci   (deferred)           
fffff802`23a80000 fffff802`23b33000   storport   (deferred)           
fffff802`23b60000 fffff802`23b7a000   fileinfo   (deferred)           
fffff802`23b80000 fffff802`23bc0000   Wof        (deferred)           
fffff802`23bd0000 fffff802`23d3f000   ndis       (deferred)           
fffff802`23d40000 fffff802`23dd8000   NETIO      (deferred)           
fffff802`23de0000 fffff802`23deb000   volume     (deferred)           
fffff802`23e00000 fffff802`248a5000   FACEIT     (deferred)           
fffff802`248b0000 fffff802`24b89000   Ntfs       (deferred)           
fffff802`24b90000 fffff802`24bc2000   ksecpkg    (deferred)           
fffff802`24bd0000 fffff802`24ebb000   tcpip      (deferred)           
fffff802`24ec0000 fffff802`24f3f000   fwpkclnt   (deferred)           
fffff802`24f40000 fffff802`24f70000   wfplwfs    (deferred)           
fffff802`24f80000 fffff802`25048000   fvevol     (deferred)           
fffff802`25050000 fffff802`250a0000   rdyboost   (deferred)           
fffff802`250b0000 fffff802`2511d000   volsnap    (deferred)           
fffff802`25120000 fffff802`25146000   mup        (deferred)           
fffff802`25150000 fffff802`25169000   klupd_klif_klbg   (deferred)           
fffff802`25170000 fffff802`25182000   iorate     (deferred)           
fffff802`251b0000 fffff802`251cc000   disk       (deferred)           
fffff802`251d0000 fffff802`2523c000   CLASSPNP   (deferred)           
fffff802`25820000 fffff802`25fd8000   vgk        (deferred)           
fffff802`25fe0000 fffff802`25ff9000   klbackupdisk   (deferred)           
fffff802`26000000 fffff802`26030000   cdrom      (deferred)           
fffff802`26040000 fffff802`260ca000   klflt      (deferred)           
fffff802`260d0000 fffff802`26101000   klbackupflt   (deferred)           
fffff802`26110000 fffff802`26125000   filecrypt   (deferred)           
fffff802`26130000 fffff802`2613e000   tbs        (deferred)           
fffff802`26140000 fffff802`26240000   klif       (deferred)           
fffff802`26250000 fffff802`262c6000   ks         (deferred)           
fffff802`262d0000 fffff802`2645b000   klhk       (deferred)           
fffff802`26460000 fffff802`26501000   klgse      (deferred)           
fffff802`26510000 fffff802`26522000   klpd       (deferred)           
fffff802`26530000 fffff802`2654c000   kldisk     (deferred)           
fffff802`26550000 fffff802`2655a000   Null       (deferred)           
fffff802`26560000 fffff802`2656a000   Beep       (deferred)           
fffff802`26570000 fffff802`26585000   klpnpflt   (deferred)           
fffff802`26590000 fffff802`2660b000   rdbss      (deferred)           
fffff802`26610000 fffff802`26622000   nsiproxy   (deferred)           
fffff802`26630000 fffff802`2663e000   npsvctrig   (deferred)           
fffff802`26640000 fffff802`26650000   mssmbios   (deferred)           
fffff802`26660000 fffff802`266a9000   kneps      (deferred)           
fffff802`266f0000 fffff802`266fa000   gpuenergydrv   (deferred)           
fffff802`26720000 fffff802`2673e000   crashdmp   (deferred)           
fffff802`26800000 fffff802`26817000   bam        (deferred)           
fffff802`26820000 fffff802`2686e000   ahcache    (deferred)           
fffff802`26870000 fffff802`2687d000   kltap      (deferred)           
fffff802`26880000 fffff802`26892000   CompositeBus   (deferred)           
fffff802`268a0000 fffff802`268ad000   kdnic      (deferred)           
fffff802`268b0000 fffff802`268c5000   umbus      (deferred)           
fffff802`268d0000 fffff802`2690b000   amdppm     (deferred)           
fffff802`26910000 fffff802`26966000   msquic     (deferred)           
fffff802`269a0000 fffff802`269cc000   dfsc       (deferred)           
fffff802`26c00000 fffff802`26c5c000   netbt      (deferred)           
fffff802`26c60000 fffff802`26c73000   afunix     (deferred)           
fffff802`26c80000 fffff802`26d23000   afd        (deferred)           
fffff802`26d30000 fffff802`26d7b000   klwtp      (deferred)           
fffff802`26d80000 fffff802`26d95000   klim6      (deferred)           
fffff802`26da0000 fffff802`26dba000   vwififlt   (deferred)           
fffff802`26dc0000 fffff802`26deb000   pacer      (deferred)           
fffff802`26df0000 fffff802`26e04000   ndiscap    (deferred)           
fffff802`26e10000 fffff802`26e24000   netbios    (deferred)           
fffff802`26e30000 fffff802`26ed1000   Vid        (deferred)           
fffff802`26ee0000 fffff802`27285000   dxgkrnl    (deferred)           
fffff802`27290000 fffff802`272a8000   watchdog   (deferred)           
fffff802`272b0000 fffff802`272c6000   BasicDisplay   (deferred)           
fffff802`272d0000 fffff802`272e1000   BasicRender   (deferred)           
fffff802`272f0000 fffff802`2730c000   Npfs       (deferred)           
fffff802`27310000 fffff802`27321000   Msfs       (deferred)           
fffff802`27330000 fffff802`2734b000   CimFS      (deferred)           
fffff802`27350000 fffff802`27374000   klwfp      (deferred)           
fffff802`27380000 fffff802`273a2000   tdx        (deferred)           
fffff802`273b0000 fffff802`273c0000   TDI        (deferred)           
fffff802`273d0000 fffff802`273f1000   winhvr     (deferred)           
fffff802`29a00000 fffff802`29a1c000   serial     (deferred)           
fffff802`29a20000 fffff802`29a2f000   serenum    (deferred)           
fffff802`29a30000 fffff802`29a4f000   parport    (deferred)           
fffff802`29a50000 fffff802`29a61000   nvvad64v   (deferred)           
fffff802`29a70000 fffff802`29a7f000   ksthunk    (deferred)           
fffff802`29a80000 fffff802`29a8d000   NvModuleTracker   (deferred)           
fffff802`29a90000 fffff802`29aa0000   nvvhci     (deferred)           
fffff802`29ab0000 fffff802`29abd000   NdisVirtualBus   (deferred)           
fffff802`29ac0000 fffff802`29acc000   swenum     (deferred)           
fffff802`29ad0000 fffff802`29ade000   CorsairVBusDriver   (deferred)           
fffff802`29ae0000 fffff802`29aee000   rdpbus     (deferred)           
fffff802`29af0000 fffff802`29b75000   usbhub     (deferred)           
fffff802`29b80000 fffff802`29b8e000   USBD       (deferred)           
fffff802`29ba0000 fffff802`29bdf000   HIDCLASS   (deferred)           
fffff802`29be0000 fffff802`29bf3000   HIDPARSE   (deferred)           
fffff802`29c00000 fffff802`29c23000   nvhda64v   (deferred)           
fffff802`29c30000 fffff802`29c9f000   HdAudio    (deferred)           
fffff802`29ca0000 fffff802`29cb1000   kbdhid     (deferred)           
fffff802`29cc0000 fffff802`29cd9000   klkbdflt   (deferred)           
fffff802`29ce0000 fffff802`29cf4000   kbdclass   (deferred)           
fffff802`29d00000 fffff802`29d33000   usbccgp    (deferred)           
fffff802`29d40000 fffff802`29d65000   USBSTOR    (deferred)           
fffff802`29d70000 fffff802`29d82000   hidusb     (deferred)           
fffff802`29d90000 fffff802`29dca000   usbaudio   (deferred)           
fffff802`29dd0000 fffff802`29de0000   mouhid     (deferred)           
fffff802`29df0000 fffff802`29e0a000   klmouflt   (deferred)           
fffff802`29e10000 fffff802`29e23000   mouclass   (deferred)           
fffff802`29e40000 fffff802`29e4e000   dump_diskdump   (deferred)           
fffff802`29e90000 fffff802`29ec2000   dump_storahci   (deferred)           
fffff802`29ef0000 fffff802`29f0d000   dump_dumpfve   (deferred)           
fffff802`29f10000 fffff802`29ff1000   dxgmms2    (deferred)           
fffff802`2a000000 fffff802`2a01b000   monitor    (deferred)           
fffff802`2a020000 fffff802`2a049000   luafv      (deferred)           
fffff802`2a050000 fffff802`2a086000   wcifs      (deferred)           
fffff802`2a090000 fffff802`2a0e4000   WUDFRd     (deferred)           
fffff802`2a0f0000 fffff802`2a172000   cldflt     (deferred)           
fffff802`2a180000 fffff802`2a18e000   WpdUpFltr   (deferred)           
fffff802`2a190000 fffff802`2a1aa000   storqosflt   (deferred)           
fffff802`2a1b0000 fffff802`2a1d8000   bindflt    (deferred)           
fffff802`2a1e0000 fffff802`2a1f8000   lltdio     (deferred)           
fffff802`2a200000 fffff802`2a218000   mslldp     (deferred)           
fffff802`2a220000 fffff802`2a23b000   rspndr     (deferred)           
fffff802`2a240000 fffff802`2a25d000   wanarp     (deferred)           
fffff802`2a2a0000 fffff802`2c830000   nvlddmkm   (deferred)           
fffff802`2c840000 fffff802`2c865000   HDAudBus   (deferred)           
fffff802`2c870000 fffff802`2c8d6000   portcls    (deferred)           
fffff802`2c8e0000 fffff802`2c901000   drmk       (deferred)           
fffff802`2c910000 fffff802`2c932000   L1C63x64   (deferred)           
fffff802`2c940000 fffff802`2c94f000   usbohci    (deferred)           
fffff802`2c950000 fffff802`2c9c9000   USBPORT    (deferred)           
fffff802`2c9d0000 fffff802`2c9ea000   usbehci    (deferred)           
fffff802`64a00000 fffff802`64a94000   mrxsmb     (deferred)           
fffff802`64aa0000 fffff802`64ae5000   mrxsmb20   (deferred)           
fffff802`64af0000 fffff802`64af9000   CorsairLLAccess64   (deferred)           
fffff802`64b00000 fffff802`64b53000   srvnet     (deferred)           
fffff802`64b60000 fffff802`64b74000   mmcss      (deferred)           
fffff802`64b80000 fffff802`64ba7000   Ndu        (deferred)           
fffff802`64bb0000 fffff802`64c86000   peauth     (deferred)           
fffff802`64c90000 fffff802`64ca5000   tcpipreg   (deferred)           
fffff802`64cb0000 fffff802`64ccc000   rassstp    (deferred)           
fffff802`64cd0000 fffff802`64d97000   srv2       (deferred)           
fffff802`64da0000 fffff802`64dbd000   NDProxy    (deferred)           
fffff802`64dc0000 fffff802`64de7000   AgileVpn   (deferred)           
fffff802`64df0000 fffff802`64e11000   rasl2tp    (deferred)           
fffff802`64e20000 fffff802`64e41000   raspptp    (deferred)           
fffff802`64e50000 fffff802`64e6c000   raspppoe   (deferred)           
fffff802`64e70000 fffff802`64e7f000   ndistapi   (deferred)           
fffff802`64e80000 fffff802`64eba000   ndiswan    (deferred)           
fffff802`64ec0000 fffff802`64ed2000   condrv     (deferred)           
fffff802`64ee0000 fffff802`64eeb000   cpuz150_x64   (deferred)           
fffff802`64ef0000 fffff802`64f27000   klupd_klif_mark   (deferred)           
fffff802`64f30000 fffff802`64f69000   klids      (deferred)           
fffff802`64f70000 fffff802`64fac000   klupd_klif_swmon   (deferred)           
fffff802`64fb0000 fffff802`64fb9000   CorsairVHidDriver   (deferred)           
fffff802`64fd0000 fffff802`65158000   HTTP       (deferred)           
fffff802`65160000 fffff802`65185000   bowser     (deferred)           
fffff802`65190000 fffff802`651aa000   mpsdrv     (deferred)           
fffffe38`2dc00000 fffffe38`2ded8000   win32kbase   (deferred)           
fffffe38`2e130000 fffffe38`2e1ca000   win32k   # (pdb symbols)          C:\ProgramData\dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
fffffe38`2e3e0000 fffffe38`2e796000   win32kfull   (deferred)           
fffffe38`2e7a0000 fffffe38`2e7ea000   cdd        (deferred)           

Unloaded modules:
fffff802`64fc0000 fffff802`64fc8000   magdrvamd64.
fffff802`29b90000 fffff802`29b9a000   CorsairVHidD
fffff802`266b0000 fffff802`266ea000   klids.sys
fffff802`23b40000 fffff802`23b5d000   EhStorClass.
fffff802`26750000 fffff802`2675f000   dump_storpor
fffff802`267a0000 fffff802`267d3000   dump_storahc
fffff802`25800000 fffff802`2581e000   dump_dumpfve
fffff802`269d0000 fffff802`269ec000   dam.sys
fffff802`235a0000 fffff802`235af000   klelam.sys
fffff802`25190000 fffff802`251a1000   hwpolicy.sys
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000019c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80617ee4955, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 17

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on AHMET

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 19

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  d1

BUGCHECK_P1: 19c

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80617ee4955

READ_ADDRESS: fffff806148fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock
fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 000000000000019c

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  msedge.exe

DPC_STACK_BASE:  FFFFF80618724FB0

TRAP_FRAME:  fffff806187234b0 -- (.trap 0xfffff806187234b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000180 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000007 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80617ee4955 rsp=fffff80618723640 rbp=fffff80618723780
 r8=0000000000000000  r9=0000000000000000 r10=fffff80613e3a390
r11=fffff80618723610 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
tcpip!IppInspectLocalDatagramsOut+0x505:
fffff806`17ee4955 807d9000        cmp     byte ptr [rbp-70h],0 ss:fffff806`18723710=01
Resetting default scope

STACK_TEXT:
fffff806`18723368 fffff806`14008c69 : 00000000`0000000a 00000000`0000019c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`18723370 fffff806`14004f69 : fffff806`1e6d34d0 ffffcb87`00000000 ffffcb87`85bdfef0 fffff806`1e6d448a : nt!KiBugCheckDispatch+0x69
fffff806`187234b0 fffff806`17ee4955 : 00000000`00000003 00000000`00000001 ffffcb87`82893a00 ffffcb87`82893a00 : nt!KiPageFault+0x469
fffff806`18723640 fffff806`17ee3d4b : ffffcb87`757059c8 fffff806`19a703e9 ffffcb87`8654bb01 ffffcb87`75736008 : tcpip!IppInspectLocalDatagramsOut+0x505
fffff806`18723910 fffff806`17ee28b9 : 00000000`00000000 00000000`00000000 fffff806`180a9230 ffffcb87`82893a00 : tcpip!IppSendDatagramsCommon+0x41b
fffff806`18723a90 fffff806`17ec1b2d : ffffcb87`82e94e10 00000000`00000014 00000000`00000000 ffffcb87`84b6ea20 : tcpip!IpNlpFastSendDatagram+0x349
fffff806`18723b50 fffff806`17ec3cf6 : ffffcb87`84b6ea20 00000000`00000000 00000000`2cd154a4 ffffcb87`751ff3c0 : tcpip!TcpTcbHeaderSend+0x5cd
fffff806`18723e00 fffff806`17ec223e : ffffcb87`750fe700 fffff806`13e1bb01 ffffcb87`00000000 00000000`00000000 : tcpip!TcpReceive+0x4d6
fffff806`18723ef0 fffff806`17ed44b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e
fffff806`18723f30 fffff806`17f2f6be : ffffcb87`7812d800 ffffcb87`7ba8e410 00000000`00000006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
fffff806`187241c0 fffff806`13e98bc8 : ffffcb87`75783cc0 00000000`00000002 ffffcb87`7e87c080 fffff806`187244b8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
fffff806`18724310 fffff806`13e98b3d : fffff806`17f2f590 fffff806`187244b8 ffffcb87`754d2560 fffff806`16f423af : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff806`18724380 fffff806`17f226ad : ffffcb87`7c410350 fffff806`1dfcadb7 ffffcb87`861d14d0 fffff806`17dd142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff806`187243c0 fffff806`17f21d8d : 00000000`00000001 fffff806`18724520 ffffcb87`7ba8e410 fffff806`18724530 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff806`18724420 fffff806`16dd1eb0 : fffff806`1a9c8ab0 fffff806`18dac617 ffffcb87`75e408a0 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff806`187246d0 fffff806`16dd1ccb : ffffcb87`7ba8eaa0 00000000`00000001 ffffcb87`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff806`187247b0 fffff806`16dd7ef0 : ffffcb87`7b0b71a0 ffffcb87`754b1901 ffffcb87`7b0b71a0 0000ffff`f8062001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff806`18724830 fffff806`16e0dd73 : ffffcb87`7b90e030 fffff806`18724901 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
fffff806`18724880 fffff806`16dd4a94 : 00000000`0001d3d4 00000000`00000001 ffffcb87`7b0b71a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff806`18724950 fffff806`20fd8a96 : ffffcb87`00000001 ffffcb87`7b80f000 ffffcb87`7b80fa30 fffff806`18724b00 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff806`187249e0 fffff806`20fdb762 : 00000000`00000000 fffff806`18724b00 00000002`00000000 00000000`00000000 : L1C63x64!HandleRxIntr+0x25e
fffff806`18724a90 fffff806`16e13579 : 00000000`00000010 ffffcb87`7b8129a0 fffff806`18724b49 ffffcb87`7b0b71a0 : L1C63x64!HardwareHandleInterrupt+0x1ba
fffff806`18724ad0 fffff806`13f230ce : fffff806`0fae5240 ffffcb87`737ec000 00000000`00000000 ffffcb87`00000002 : ndis!ndisInterruptDpc+0x3be89
fffff806`18724bb0 fffff806`13f223b4 : fffff806`0fae2180 00000000`00000000 00000000`00000008 00000000`000116f1 : nt!KiExecuteAllDpcs+0x30e
fffff806`18724d20 fffff806`13ffdd35 : 00000000`00000000 fffff806`0fae2180 ffffa700`d9dcc8c0 00000000`000000bd : nt!KiRetireDpcList+0x1f4
fffff806`18724fb0 fffff806`13ffdb20 : fffff806`13ff2de0 fffff806`13ec656a 00000000`00000000 00002bd5`17244f48 : nt!KxRetireDpcList+0x5
fffff380`4fe29ac0 fffff806`13ffd3d5 : 00000000`000000bd fffff806`13ff8041 00000000`00000001 ffffcb87`7e3a9080 : nt!KiDispatchInterruptContinue
fffff380`4fe29af0 fffff806`13ff8041 : 00000000`00000001 ffffcb87`7e3a9080 fffff380`00000000 ffffcb87`00000000 : nt!KiDpcInterruptBypass+0x25
fffff380`4fe29b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0xb1


SYMBOL_NAME:  L1C63x64!HandleRxIntr+25e

MODULE_NAME: L1C63x64

IMAGE_NAME:  L1C63x64.sys

IMAGE_VERSION:  2.1.0.16

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  25e

FAILURE_BUCKET_ID:  AV_L1C63x64!HandleRxIntr

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d6379392-3f48-c6ec-1a10-10fcebd963ee}

Followup:     MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000019c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80617ee4955, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 15

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on AHMET

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 16

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  d1

BUGCHECK_P1: 19c

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80617ee4955

READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock
 000000000000019c

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  msedge.exe

DPC_STACK_BASE:  FFFFF80618724FB0

TRAP_FRAME:  fffff806187234b0 -- (.trap 0xfffff806187234b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000180 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000007 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80617ee4955 rsp=fffff80618723640 rbp=fffff80618723780
 r8=0000000000000000  r9=0000000000000000 r10=fffff80613e3a390
r11=fffff80618723610 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
tcpip!IppInspectLocalDatagramsOut+0x505:
fffff806`17ee4955 807d9000        cmp     byte ptr [rbp-70h],0 ss:fffff806`18723710=01
Resetting default scope

STACK_TEXT:
fffff806`18723368 fffff806`14008c69 : 00000000`0000000a 00000000`0000019c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`18723370 fffff806`14004f69 : fffff806`1e6d34d0 ffffcb87`00000000 ffffcb87`85bdfef0 fffff806`1e6d448a : nt!KiBugCheckDispatch+0x69
fffff806`187234b0 fffff806`17ee4955 : 00000000`00000003 00000000`00000001 ffffcb87`82893a00 ffffcb87`82893a00 : nt!KiPageFault+0x469
fffff806`18723640 fffff806`17ee3d4b : ffffcb87`757059c8 fffff806`19a703e9 ffffcb87`8654bb01 ffffcb87`75736008 : tcpip!IppInspectLocalDatagramsOut+0x505
fffff806`18723910 fffff806`17ee28b9 : 00000000`00000000 00000000`00000000 fffff806`180a9230 ffffcb87`82893a00 : tcpip!IppSendDatagramsCommon+0x41b
fffff806`18723a90 fffff806`17ec1b2d : ffffcb87`82e94e10 00000000`00000014 00000000`00000000 ffffcb87`84b6ea20 : tcpip!IpNlpFastSendDatagram+0x349
fffff806`18723b50 fffff806`17ec3cf6 : ffffcb87`84b6ea20 00000000`00000000 00000000`2cd154a4 ffffcb87`751ff3c0 : tcpip!TcpTcbHeaderSend+0x5cd
fffff806`18723e00 fffff806`17ec223e : ffffcb87`750fe700 fffff806`13e1bb01 ffffcb87`00000000 00000000`00000000 : tcpip!TcpReceive+0x4d6
fffff806`18723ef0 fffff806`17ed44b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e
fffff806`18723f30 fffff806`17f2f6be : ffffcb87`7812d800 ffffcb87`7ba8e410 00000000`00000006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
fffff806`187241c0 fffff806`13e98bc8 : ffffcb87`75783cc0 00000000`00000002 ffffcb87`7e87c080 fffff806`187244b8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
fffff806`18724310 fffff806`13e98b3d : fffff806`17f2f590 fffff806`187244b8 ffffcb87`754d2560 fffff806`16f423af : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff806`18724380 fffff806`17f226ad : ffffcb87`7c410350 fffff806`1dfcadb7 ffffcb87`861d14d0 fffff806`17dd142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff806`187243c0 fffff806`17f21d8d : 00000000`00000001 fffff806`18724520 ffffcb87`7ba8e410 fffff806`18724530 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff806`18724420 fffff806`16dd1eb0 : fffff806`1a9c8ab0 fffff806`18dac617 ffffcb87`75e408a0 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff806`187246d0 fffff806`16dd1ccb : ffffcb87`7ba8eaa0 00000000`00000001 ffffcb87`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff806`187247b0 fffff806`16dd7ef0 : ffffcb87`7b0b71a0 ffffcb87`754b1901 ffffcb87`7b0b71a0 0000ffff`f8062001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff806`18724830 fffff806`16e0dd73 : ffffcb87`7b90e030 fffff806`18724901 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
fffff806`18724880 fffff806`16dd4a94 : 00000000`0001d3d4 00000000`00000001 ffffcb87`7b0b71a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff806`18724950 fffff806`20fd8a96 : ffffcb87`00000001 ffffcb87`7b80f000 ffffcb87`7b80fa30 fffff806`18724b00 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff806`187249e0 fffff806`20fdb762 : 00000000`00000000 fffff806`18724b00 00000002`00000000 00000000`00000000 : L1C63x64!HandleRxIntr+0x25e
fffff806`18724a90 fffff806`16e13579 : 00000000`00000010 ffffcb87`7b8129a0 fffff806`18724b49 ffffcb87`7b0b71a0 : L1C63x64!HardwareHandleInterrupt+0x1ba
fffff806`18724ad0 fffff806`13f230ce : fffff806`0fae5240 ffffcb87`737ec000 00000000`00000000 ffffcb87`00000002 : ndis!ndisInterruptDpc+0x3be89
fffff806`18724bb0 fffff806`13f223b4 : fffff806`0fae2180 00000000`00000000 00000000`00000008 00000000`000116f1 : nt!KiExecuteAllDpcs+0x30e
fffff806`18724d20 fffff806`13ffdd35 : 00000000`00000000 fffff806`0fae2180 ffffa700`d9dcc8c0 00000000`000000bd : nt!KiRetireDpcList+0x1f4
fffff806`18724fb0 fffff806`13ffdb20 : fffff806`13ff2de0 fffff806`13ec656a 00000000`00000000 00002bd5`17244f48 : nt!KxRetireDpcList+0x5
fffff380`4fe29ac0 fffff806`13ffd3d5 : 00000000`000000bd fffff806`13ff8041 00000000`00000001 ffffcb87`7e3a9080 : nt!KiDispatchInterruptContinue
fffff380`4fe29af0 fffff806`13ff8041 : 00000000`00000001 ffffcb87`7e3a9080 fffff380`00000000 ffffcb87`00000000 : nt!KiDpcInterruptBypass+0x25
fffff380`4fe29b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0xb1


SYMBOL_NAME:  L1C63x64!HandleRxIntr+25e

MODULE_NAME: L1C63x64

IMAGE_NAME:  L1C63x64.sys

IMAGE_VERSION:  2.1.0.16

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  25e

FAILURE_BUCKET_ID:  AV_L1C63x64!HandleRxIntr

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d6379392-3f48-c6ec-1a10-10fcebd963ee}

Followup:     MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000019c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80617ee4955, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 15

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on AHMET

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 16

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  d1

BUGCHECK_P1: 19c

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80617ee4955

READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock
 000000000000019c

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  msedge.exe

DPC_STACK_BASE:  FFFFF80618724FB0

TRAP_FRAME:  fffff806187234b0 -- (.trap 0xfffff806187234b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000180 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000007 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80617ee4955 rsp=fffff80618723640 rbp=fffff80618723780
 r8=0000000000000000  r9=0000000000000000 r10=fffff80613e3a390
r11=fffff80618723610 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
tcpip!IppInspectLocalDatagramsOut+0x505:
fffff806`17ee4955 807d9000        cmp     byte ptr [rbp-70h],0 ss:fffff806`18723710=01
Resetting default scope

STACK_TEXT:
fffff806`18723368 fffff806`14008c69 : 00000000`0000000a 00000000`0000019c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`18723370 fffff806`14004f69 : fffff806`1e6d34d0 ffffcb87`00000000 ffffcb87`85bdfef0 fffff806`1e6d448a : nt!KiBugCheckDispatch+0x69
fffff806`187234b0 fffff806`17ee4955 : 00000000`00000003 00000000`00000001 ffffcb87`82893a00 ffffcb87`82893a00 : nt!KiPageFault+0x469
fffff806`18723640 fffff806`17ee3d4b : ffffcb87`757059c8 fffff806`19a703e9 ffffcb87`8654bb01 ffffcb87`75736008 : tcpip!IppInspectLocalDatagramsOut+0x505
fffff806`18723910 fffff806`17ee28b9 : 00000000`00000000 00000000`00000000 fffff806`180a9230 ffffcb87`82893a00 : tcpip!IppSendDatagramsCommon+0x41b
fffff806`18723a90 fffff806`17ec1b2d : ffffcb87`82e94e10 00000000`00000014 00000000`00000000 ffffcb87`84b6ea20 : tcpip!IpNlpFastSendDatagram+0x349
fffff806`18723b50 fffff806`17ec3cf6 : ffffcb87`84b6ea20 00000000`00000000 00000000`2cd154a4 ffffcb87`751ff3c0 : tcpip!TcpTcbHeaderSend+0x5cd
fffff806`18723e00 fffff806`17ec223e : ffffcb87`750fe700 fffff806`13e1bb01 ffffcb87`00000000 00000000`00000000 : tcpip!TcpReceive+0x4d6
fffff806`18723ef0 fffff806`17ed44b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e
fffff806`18723f30 fffff806`17f2f6be : ffffcb87`7812d800 ffffcb87`7ba8e410 00000000`00000006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
fffff806`187241c0 fffff806`13e98bc8 : ffffcb87`75783cc0 00000000`00000002 ffffcb87`7e87c080 fffff806`187244b8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
fffff806`18724310 fffff806`13e98b3d : fffff806`17f2f590 fffff806`187244b8 ffffcb87`754d2560 fffff806`16f423af : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff806`18724380 fffff806`17f226ad : ffffcb87`7c410350 fffff806`1dfcadb7 ffffcb87`861d14d0 fffff806`17dd142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff806`187243c0 fffff806`17f21d8d : 00000000`00000001 fffff806`18724520 ffffcb87`7ba8e410 fffff806`18724530 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff806`18724420 fffff806`16dd1eb0 : fffff806`1a9c8ab0 fffff806`18dac617 ffffcb87`75e408a0 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff806`187246d0 fffff806`16dd1ccb : ffffcb87`7ba8eaa0 00000000`00000001 ffffcb87`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff806`187247b0 fffff806`16dd7ef0 : ffffcb87`7b0b71a0 ffffcb87`754b1901 ffffcb87`7b0b71a0 0000ffff`f8062001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff806`18724830 fffff806`16e0dd73 : ffffcb87`7b90e030 fffff806`18724901 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
fffff806`18724880 fffff806`16dd4a94 : 00000000`0001d3d4 00000000`00000001 ffffcb87`7b0b71a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff806`18724950 fffff806`20fd8a96 : ffffcb87`00000001 ffffcb87`7b80f000 ffffcb87`7b80fa30 fffff806`18724b00 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff806`187249e0 fffff806`20fdb762 : 00000000`00000000 fffff806`18724b00 00000002`00000000 00000000`00000000 : L1C63x64!HandleRxIntr+0x25e
fffff806`18724a90 fffff806`16e13579 : 00000000`00000010 ffffcb87`7b8129a0 fffff806`18724b49 ffffcb87`7b0b71a0 : L1C63x64!HardwareHandleInterrupt+0x1ba
fffff806`18724ad0 fffff806`13f230ce : fffff806`0fae5240 ffffcb87`737ec000 00000000`00000000 ffffcb87`00000002 : ndis!ndisInterruptDpc+0x3be89
fffff806`18724bb0 fffff806`13f223b4 : fffff806`0fae2180 00000000`00000000 00000000`00000008 00000000`000116f1 : nt!KiExecuteAllDpcs+0x30e
fffff806`18724d20 fffff806`13ffdd35 : 00000000`00000000 fffff806`0fae2180 ffffa700`d9dcc8c0 00000000`000000bd : nt!KiRetireDpcList+0x1f4
fffff806`18724fb0 fffff806`13ffdb20 : fffff806`13ff2de0 fffff806`13ec656a 00000000`00000000 00002bd5`17244f48 : nt!KxRetireDpcList+0x5
fffff380`4fe29ac0 fffff806`13ffd3d5 : 00000000`000000bd fffff806`13ff8041 00000000`00000001 ffffcb87`7e3a9080 : nt!KiDispatchInterruptContinue
fffff380`4fe29af0 fffff806`13ff8041 : 00000000`00000001 ffffcb87`7e3a9080 fffff380`00000000 ffffcb87`00000000 : nt!KiDpcInterruptBypass+0x25
fffff380`4fe29b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0xb1


SYMBOL_NAME:  L1C63x64!HandleRxIntr+25e

MODULE_NAME: L1C63x64

IMAGE_NAME:  L1C63x64.sys

IMAGE_VERSION:  2.1.0.16

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  25e

FAILURE_BUCKET_ID:  AV_L1C63x64!HandleRxIntr

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d6379392-3f48-c6ec-1a10-10fcebd963ee}

Followup:     MachineOwner
---------
@YFK
Evet, artık ben de minidump dosyalarını okuyabiliyorum. :)
@ismimberkay @Er73748
 
Son düzenleme:
Çözüm
Ethernet kartınızın sürücüsünü güncelleyin.
Corsair yazılımını kaldırın.
Samsung Magician veya başka bir Samsung yazılımı varsa kaldırın.
Komut istemini yönetici olarak çalıştırıp SFC /scannow yazın ve çıkan sonucun ekran görüntüsünü bizlerle paylaşın.
Kaspersky kaldırın.
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack.
 extents for the thread.
Arg2: ffffde018a9f41a0, Address of the trap frame for the exception that caused the bugcheck.
Arg3: ffffde018a9f40f8, Address of the exception record for the exception that caused the bugcheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.Sec
 Value: 9

 Key : Analysis.DebugAnalysisProvider.CPP
 Value: Create: 8007007e on AHMET.

 Key : Analysis.DebugData
 Value: CreateObject.

 Key : Analysis.DebugModel
 Value: CreateObject.

 Key : Analysis.Elapsed.Sec
 Value: 12.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 70.

 Key : Analysis.System
 Value: CreateObject.

BUGCHECK_CODE: 139.

BUGCHECK_P1: 4

BUGCHECK_P2: ffffde018a9f41a0.

BUGCHECK_P3: ffffde018a9f40f8.

BUGCHECK_P4: 0

TRAP_FRAME: ffffde018a9f41a0 -- (.trap 0xffffde018a9f41a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd70582463000 rbx=0000000000000000 rcx=0000000000000004
rdx=ffffd70582469000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80220e3bc65 rsp=ffffde018a9f4330 rbp=ffffde018a9f43a0
 r8=ffffd70582469000 r9=ffffde018a9f4300 r10=0000fffff80220d6
r11=ffffde018a9f4570 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc.
nt!RtlpGetStackLimitsEx+0x1b4aa5:
fffff802`20e3bc65 cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: ffffde018a9f40f8 -- (.exr 0xffffde018a9f40f8)
ExceptionAddress: fffff80220e3bc65 (nt!RtlpGetStackLimitsEx+0x00000000001b4aa5)
 ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
 ExceptionFlags: 00000001.
NumberParameters: 1
 Parameter[0]: 0000000000000004.
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: msedge.exe

WATSON_BKT_EVENT: BEX.

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000004.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
ffffde01`8a9f3e78 fffff802`20e08c69 : 00000000`00000139 00000000`00000004 ffffde01`8a9f41a0 ffffde01`8a9f40f8 : nt!KeBugCheckEx
ffffde01`8a9f3e80 fffff802`20e09090 : 982e0d8b`482079c0 6899770d`8d4c002a 44c70000`001cbaff 75e80000`03622024 : nt!KiBugCheckDispatch+0x69
ffffde01`8a9f3fc0 fffff802`20e07423 : 45c033ff`fff6b8e9 33eeebc0`960fc83b ebc0970f`c83b45c0 920fc83b`45c033e4 : nt!KiFastFailDispatch+0xd0
ffffde01`8a9f41a0 fffff802`20e3bc65 : ffffde01`8a9f45b0 ffffde01`8a9f4d78 ffffde01`8a9f43a0 44894800`10cc13e8 : nt!KiRaiseSecurityCheckFailure+0x323
ffffde01`8a9f4330 fffff802`20c87391 : ffffde01`8a9f45b0 00000000`00000000 0c8d49d7`8b49c68b 8b4cffb6`00000003 : nt!RtlpGetStackLimitsEx+0x1b4aa5
ffffde01`8a9f4360 fffff802`20c86136 : ffffde01`8a9f4d78 ffffde01`8a9f4ab0 ffffde01`8a9f4d78 0000004c`3f7fcf68 : nt!RtlDispatchException+0xe1
ffffde01`8a9f4580 fffff802`20e08dac : 00000000`00000000 00000000`00000000 00000000`00000000 ffff054f`fd20144d : nt!KiDispatchException+0x186
ffffde01`8a9f4c40 fffff802`20e04ae0 : 00000000`00000000 00000000`00000000 00000000`000033f4 fffff802`20c9468f : nt!KiExceptionDispatch+0x12c
ffffde01`8a9f4e20 fffff802`20dfd96d : ffffd705`82468b80 ffff968c`8d2aed40 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
ffffde01`8a9f4fb0 fffff802`20dfd6f7 : 00000000`00000000 00000000`00000000 ffffd705`00000000 ffff968c`00000000 : nt!KiIpiInterruptSubDispatch+0x1d
ffffd705`82468b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIpiInterrupt+0x307

SYMBOL_NAME: nt!KiFastFailDispatch+d0

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.985

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: d0.

FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_nt!KiFastFailDispatch

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {1971a9b0-b7ec-89bf-0a51-10ac52818da5}

Followup: MachineOwner.
---------

3: kd> lm.
start end module name.
fffff802`1d900000 fffff802`1d928000 mcupdate_AuthenticAMD (deferred)
fffff802`1d930000 fffff802`1d936000 hal (deferred)
fffff802`1d940000 fffff802`1d94b000 kd (deferred)
fffff802`1d950000 fffff802`1d977000 tm (deferred)
fffff802`1d980000 fffff802`1d9ea000 CLFS (deferred)
fffff802`1d9f0000 fffff802`1da0a000 PSHED (deferred)
fffff802`1da10000 fffff802`1da1b000 BOOTVID (deferred)
fffff802`1da20000 fffff802`1db33000 clipsp (deferred)
fffff802`1db40000 fffff802`1dbaf000 FLTMGR (deferred)
fffff802`1dbb0000 fffff802`1dbd9000 ksecdd (deferred)
fffff802`1dbe0000 fffff802`1dc43000 msrpc (deferred)
fffff802`1dc50000 fffff802`1dc5e000 cmimcext (deferred)
fffff802`1dc60000 fffff802`1dc71000 werkernel (deferred)
fffff802`1dc80000 fffff802`1dc8c000 ntosext (deferred)
fffff802`1dc90000 fffff802`1dca3000 WDFLDR (deferred)
fffff802`1dcb0000 fffff802`1dcbf000 SleepStudyHelper (deferred)
fffff802`1dcc0000 fffff802`1dcd1000 WppRecorder (deferred)
fffff802`1dce0000 fffff802`1dcfa000 SgrmAgent (deferred)
fffff802`20a00000 fffff802`21a46000 nt (pdb symbols) C:\ProgramData\dbg\sym\ntkrnlmp.pdb\992A9A48F30EC2C58B01A5934DCE2D9C1\ntkrnlmp.pdb
fffff802`23200000 fffff802`232e3000 CI (deferred)
fffff802`232f0000 fffff802`233a7000 cng (deferred)
fffff802`233b0000 fffff802`23482000 Wdf01000 (deferred)
fffff802`23490000 fffff802`234b6000 acpiex (deferred)
fffff802`234c0000 fffff802`2358c000 ACPI (deferred)
fffff802`23590000 fffff802`2359c000 WMILIB (deferred)
fffff802`235b0000 fffff802`2361b000 intelpep (deferred)
fffff802`23620000 fffff802`23637000 WindowsTrustedRT (deferred)
fffff802`23640000 fffff802`2364b000 IntelTA (deferred)
fffff802`23650000 fffff802`2365b000 WindowsTrustedRTProxy (deferred)
fffff802`23660000 fffff802`23674000 pcw (deferred)
fffff802`23680000 fffff802`236c0000 klupd_klif_arkmon (deferred)
fffff802`236d0000 fffff802`236db000 msisadrv (deferred)
fffff802`236e0000 fffff802`23757000 pci (deferred)
fffff802`23760000 fffff802`23775000 vdrvroot (deferred)
fffff802`23780000 fffff802`237bb000 cm_km (deferred)
fffff802`237c0000 fffff802`237ef000 pdc (deferred)
fffff802`237f0000 fffff802`23809000 CEA (deferred)
fffff802`23810000 fffff802`23841000 partmgr (deferred)
fffff802`23850000 fffff802`2385a000 pciide (deferred)
fffff802`23860000 fffff802`23873000 PCIIDEX (deferred)
fffff802`23880000 fffff802`2392a000 spaceport (deferred)
fffff802`23930000 fffff802`23949000 volmgr (deferred)
fffff802`23950000 fffff802`239b3000 volmgrx (deferred)
fffff802`239c0000 fffff802`239de000 mountmgr (deferred)
fffff802`239e0000 fffff802`239ed000 atapi (deferred)
fffff802`239f0000 fffff802`239fd000 Fs_Rec (deferred)
fffff802`23a00000 fffff802`23a3c000 ataport (deferred)
fffff802`23a40000 fffff802`23a72000 storahci (deferred)
fffff802`23a80000 fffff802`23b33000 storport (deferred)
fffff802`23b60000 fffff802`23b7a000 fileinfo (deferred)
fffff802`23b80000 fffff802`23bc0000 Wof (deferred)
fffff802`23bd0000 fffff802`23d3f000 ndis (deferred)
fffff802`23d40000 fffff802`23dd8000 NETIO (deferred)
fffff802`23de0000 fffff802`23deb000 volume (deferred)
fffff802`23e00000 fffff802`248a5000 FACEIT (deferred)
fffff802`248b0000 fffff802`24b89000 Ntfs (deferred)
fffff802`24b90000 fffff802`24bc2000 ksecpkg (deferred)
fffff802`24bd0000 fffff802`24ebb000 tcpip (deferred)
fffff802`24ec0000 fffff802`24f3f000 fwpkclnt (deferred)
fffff802`24f40000 fffff802`24f70000 wfplwfs (deferred)
fffff802`24f80000 fffff802`25048000 fvevol (deferred)
fffff802`25050000 fffff802`250a0000 rdyboost (deferred)
fffff802`250b0000 fffff802`2511d000 volsnap (deferred)
fffff802`25120000 fffff802`25146000 mup (deferred)
fffff802`25150000 fffff802`25169000 klupd_klif_klbg (deferred)
fffff802`25170000 fffff802`25182000 iorate (deferred)
fffff802`251b0000 fffff802`251cc000 disk (deferred)
fffff802`251d0000 fffff802`2523c000 CLASSPNP (deferred)
fffff802`25820000 fffff802`25fd8000 vgk (deferred)
fffff802`25fe0000 fffff802`25ff9000 klbackupdisk (deferred)
fffff802`26000000 fffff802`26030000 cdrom (deferred)
fffff802`26040000 fffff802`260ca000 klflt (deferred)
fffff802`260d0000 fffff802`26101000 klbackupflt (deferred)
fffff802`26110000 fffff802`26125000 filecrypt (deferred)
fffff802`26130000 fffff802`2613e000 tbs (deferred)
fffff802`26140000 fffff802`26240000 klif (deferred)
fffff802`26250000 fffff802`262c6000 ks (deferred)
fffff802`262d0000 fffff802`2645b000 klhk (deferred)
fffff802`26460000 fffff802`26501000 klgse (deferred)
fffff802`26510000 fffff802`26522000 klpd (deferred)
fffff802`26530000 fffff802`2654c000 kldisk (deferred)
fffff802`26550000 fffff802`2655a000 Null (deferred)
fffff802`26560000 fffff802`2656a000 Beep (deferred)
fffff802`26570000 fffff802`26585000 klpnpflt (deferred)
fffff802`26590000 fffff802`2660b000 rdbss (deferred)
fffff802`26610000 fffff802`26622000 nsiproxy (deferred)
fffff802`26630000 fffff802`2663e000 npsvctrig (deferred)
fffff802`26640000 fffff802`26650000 mssmbios (deferred)
fffff802`26660000 fffff802`266a9000 kneps (deferred)
fffff802`266f0000 fffff802`266fa000 gpuenergydrv (deferred)
fffff802`26720000 fffff802`2673e000 crashdmp (deferred)
fffff802`26800000 fffff802`26817000 bam (deferred)
fffff802`26820000 fffff802`2686e000 ahcache (deferred)
fffff802`26870000 fffff802`2687d000 kltap (deferred)
fffff802`26880000 fffff802`26892000 CompositeBus (deferred)
fffff802`268a0000 fffff802`268ad000 kdnic (deferred)
fffff802`268b0000 fffff802`268c5000 umbus (deferred)
fffff802`268d0000 fffff802`2690b000 amdppm (deferred)
fffff802`26910000 fffff802`26966000 msquic (deferred)
fffff802`269a0000 fffff802`269cc000 dfsc (deferred)
fffff802`26c00000 fffff802`26c5c000 netbt (deferred)
fffff802`26c60000 fffff802`26c73000 afunix (deferred)
fffff802`26c80000 fffff802`26d23000 afd (deferred)
fffff802`26d30000 fffff802`26d7b000 klwtp (deferred)
fffff802`26d80000 fffff802`26d95000 klim6 (deferred)
fffff802`26da0000 fffff802`26dba000 vwififlt (deferred)
fffff802`26dc0000 fffff802`26deb000 pacer (deferred)
fffff802`26df0000 fffff802`26e04000 ndiscap (deferred)
fffff802`26e10000 fffff802`26e24000 netbios (deferred)
fffff802`26e30000 fffff802`26ed1000 Vid (deferred)
fffff802`26ee0000 fffff802`27285000 dxgkrnl (deferred)
fffff802`27290000 fffff802`272a8000 watchdog (deferred)
fffff802`272b0000 fffff802`272c6000 BasicDisplay (deferred)
fffff802`272d0000 fffff802`272e1000 BasicRender (deferred)
fffff802`272f0000 fffff802`2730c000 Npfs (deferred)
fffff802`27310000 fffff802`27321000 Msfs (deferred)
fffff802`27330000 fffff802`2734b000 CimFS (deferred)
fffff802`27350000 fffff802`27374000 klwfp (deferred)
fffff802`27380000 fffff802`273a2000 tdx (deferred)
fffff802`273b0000 fffff802`273c0000 TDI (deferred)
fffff802`273d0000 fffff802`273f1000 winhvr (deferred)
fffff802`29a00000 fffff802`29a1c000 serial (deferred)
fffff802`29a20000 fffff802`29a2f000 serenum (deferred)
fffff802`29a30000 fffff802`29a4f000 parport (deferred)
fffff802`29a50000 fffff802`29a61000 nvvad64v (deferred)
fffff802`29a70000 fffff802`29a7f000 ksthunk (deferred)
fffff802`29a80000 fffff802`29a8d000 NvModuleTracker (deferred)
fffff802`29a90000 fffff802`29aa0000 nvvhci (deferred)
fffff802`29ab0000 fffff802`29abd000 NdisVirtualBus (deferred)
fffff802`29ac0000 fffff802`29acc000 swenum (deferred)
fffff802`29ad0000 fffff802`29ade000 CorsairVBusDriver (deferred)
fffff802`29ae0000 fffff802`29aee000 rdpbus (deferred)
fffff802`29af0000 fffff802`29b75000 usbhub (deferred)
fffff802`29b80000 fffff802`29b8e000 USBD (deferred)
fffff802`29ba0000 fffff802`29bdf000 HIDCLASS (deferred)
fffff802`29be0000 fffff802`29bf3000 HIDPARSE (deferred)
fffff802`29c00000 fffff802`29c23000 nvhda64v (deferred)
fffff802`29c30000 fffff802`29c9f000 HdAudio (deferred)
fffff802`29ca0000 fffff802`29cb1000 kbdhid (deferred)
fffff802`29cc0000 fffff802`29cd9000 klkbdflt (deferred)
fffff802`29ce0000 fffff802`29cf4000 kbdclass (deferred)
fffff802`29d00000 fffff802`29d33000 usbccgp (deferred)
fffff802`29d40000 fffff802`29d65000 USBSTOR (deferred)
fffff802`29d70000 fffff802`29d82000 hidusb (deferred)
fffff802`29d90000 fffff802`29dca000 usbaudio (deferred)
fffff802`29dd0000 fffff802`29de0000 mouhid (deferred)
fffff802`29df0000 fffff802`29e0a000 klmouflt (deferred)
fffff802`29e10000 fffff802`29e23000 mouclass (deferred)
fffff802`29e40000 fffff802`29e4e000 dump_diskdump (deferred)
fffff802`29e90000 fffff802`29ec2000 dump_storahci (deferred)
fffff802`29ef0000 fffff802`29f0d000 dump_dumpfve (deferred)
fffff802`29f10000 fffff802`29ff1000 dxgmms2 (deferred)
fffff802`2a000000 fffff802`2a01b000 monitor (deferred)
fffff802`2a020000 fffff802`2a049000 luafv (deferred)
fffff802`2a050000 fffff802`2a086000 wcifs (deferred)
fffff802`2a090000 fffff802`2a0e4000 WUDFRd (deferred)
fffff802`2a0f0000 fffff802`2a172000 cldflt (deferred)
fffff802`2a180000 fffff802`2a18e000 WpdUpFltr (deferred)
fffff802`2a190000 fffff802`2a1aa000 storqosflt (deferred)
fffff802`2a1b0000 fffff802`2a1d8000 bindflt (deferred)
fffff802`2a1e0000 fffff802`2a1f8000 lltdio (deferred)
fffff802`2a200000 fffff802`2a218000 mslldp (deferred)
fffff802`2a220000 fffff802`2a23b000 rspndr (deferred)
fffff802`2a240000 fffff802`2a25d000 wanarp (deferred)
fffff802`2a2a0000 fffff802`2c830000 nvlddmkm (deferred)
fffff802`2c840000 fffff802`2c865000 HDAudBus (deferred)
fffff802`2c870000 fffff802`2c8d6000 portcls (deferred)
fffff802`2c8e0000 fffff802`2c901000 drmk (deferred)
fffff802`2c910000 fffff802`2c932000 L1C63x64 (deferred)
fffff802`2c940000 fffff802`2c94f000 usbohci (deferred)
fffff802`2c950000 fffff802`2c9c9000 USBPORT (deferred)
fffff802`2c9d0000 fffff802`2c9ea000 usbehci (deferred)
fffff802`64a00000 fffff802`64a94000 mrxsmb (deferred)
fffff802`64aa0000 fffff802`64ae5000 mrxsmb20 (deferred)
fffff802`64af0000 fffff802`64af9000 CorsairLLAccess64 (deferred)
fffff802`64b00000 fffff802`64b53000 srvnet (deferred)
fffff802`64b60000 fffff802`64b74000 mmcss (deferred)
fffff802`64b80000 fffff802`64ba7000 Ndu (deferred)
fffff802`64bb0000 fffff802`64c86000 peauth (deferred)
fffff802`64c90000 fffff802`64ca5000 tcpipreg (deferred)
fffff802`64cb0000 fffff802`64ccc000 rassstp (deferred)
fffff802`64cd0000 fffff802`64d97000 srv2 (deferred)
fffff802`64da0000 fffff802`64dbd000 NDProxy (deferred)
fffff802`64dc0000 fffff802`64de7000 AgileVpn (deferred)
fffff802`64df0000 fffff802`64e11000 rasl2tp (deferred)
fffff802`64e20000 fffff802`64e41000 raspptp (deferred)
fffff802`64e50000 fffff802`64e6c000 raspppoe (deferred)
fffff802`64e70000 fffff802`64e7f000 ndistapi (deferred)
fffff802`64e80000 fffff802`64eba000 ndiswan (deferred)
fffff802`64ec0000 fffff802`64ed2000 condrv (deferred)
fffff802`64ee0000 fffff802`64eeb000 cpuz150_x64 (deferred)
fffff802`64ef0000 fffff802`64f27000 klupd_klif_mark (deferred)
fffff802`64f30000 fffff802`64f69000 klids (deferred)
fffff802`64f70000 fffff802`64fac000 klupd_klif_swmon (deferred)
fffff802`64fb0000 fffff802`64fb9000 CorsairVHidDriver (deferred)
fffff802`64fd0000 fffff802`65158000 HTTP (deferred)
fffff802`65160000 fffff802`65185000 bowser (deferred)
fffff802`65190000 fffff802`651aa000 mpsdrv (deferred)
fffffe38`2dc00000 fffffe38`2ded8000 win32kbase (deferred)
fffffe38`2e130000 fffffe38`2e1ca000 win32k # (pdb symbols) C:\ProgramData\dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
fffffe38`2e3e0000 fffffe38`2e796000 win32kfull (deferred)
fffffe38`2e7a0000 fffffe38`2e7ea000 cdd (deferred)

Unloaded modules:
fffff802`64fc0000 fffff802`64fc8000 magdrvamd64.
fffff802`29b90000 fffff802`29b9a000 CorsairVHidD.
fffff802`266b0000 fffff802`266ea000 klids.sys
fffff802`23b40000 fffff802`23b5d000 EhStorClass.
fffff802`26750000 fffff802`2675f000 dump_storpor.
fffff802`267a0000 fffff802`267d3000 dump_storahc.
fffff802`25800000 fffff802`2581e000 dump_dumpfve.
fffff802`269d0000 fffff802`269ec000 dam.sys
fffff802`235a0000 fffff802`235af000 klelam.sys
fffff802`25190000 fffff802`251a1000 hwpolicy.sys
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000019c, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg4: fffff80617ee4955, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.Sec
 Value: 17.

 Key : Analysis.DebugAnalysisProvider.CPP
 Value: Create: 8007007e on AHMET.

 Key : Analysis.DebugData
 Value: CreateObject.

 Key : Analysis.DebugModel
 Value: CreateObject.

 Key : Analysis.Elapsed.Sec
 Value: 19.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 78.

 Key : Analysis.System
 Value: CreateObject.

BUGCHECK_CODE: d1.

BUGCHECK_P1: 19c.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80617ee4955.

READ_ADDRESS: fffff806148fa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock
fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 000000000000019c.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: msedge.exe

DPC_STACK_BASE: FFFFF80618724FB0.

TRAP_FRAME: fffff806187234b0 -- (.trap 0xfffff806187234b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000180 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000007 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80617ee4955 rsp=fffff80618723640 rbp=fffff80618723780
 r8=0000000000000000 r9=0000000000000000 r10=fffff80613e3a390
r11=fffff80618723610 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc.
tcpip!IppInspectLocalDatagramsOut+0x505:
fffff806`17ee4955 807d9000 cmp byte ptr [rbp-70h],0 ss:fffff806`18723710=01
Resetting default scope.

STACK_TEXT:
fffff806`18723368 fffff806`14008c69 : 00000000`0000000a 00000000`0000019c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`18723370 fffff806`14004f69 : fffff806`1e6d34d0 ffffcb87`00000000 ffffcb87`85bdfef0 fffff806`1e6d448a : nt!KiBugCheckDispatch+0x69
fffff806`187234b0 fffff806`17ee4955 : 00000000`00000003 00000000`00000001 ffffcb87`82893a00 ffffcb87`82893a00 : nt!KiPageFault+0x469
fffff806`18723640 fffff806`17ee3d4b : ffffcb87`757059c8 fffff806`19a703e9 ffffcb87`8654bb01 ffffcb87`75736008 : tcpip!IppInspectLocalDatagramsOut+0x505
fffff806`18723910 fffff806`17ee28b9 : 00000000`00000000 00000000`00000000 fffff806`180a9230 ffffcb87`82893a00 : tcpip!IppSendDatagramsCommon+0x41b
fffff806`18723a90 fffff806`17ec1b2d : ffffcb87`82e94e10 00000000`00000014 00000000`00000000 ffffcb87`84b6ea20 : tcpip!IpNlpFastSendDatagram+0x349
fffff806`18723b50 fffff806`17ec3cf6 : ffffcb87`84b6ea20 00000000`00000000 00000000`2cd154a4 ffffcb87`751ff3c0 : tcpip!TcpTcbHeaderSend+0x5cd
fffff806`18723e00 fffff806`17ec223e : ffffcb87`750fe700 fffff806`13e1bb01 ffffcb87`00000000 00000000`00000000 : tcpip!TcpReceive+0x4d6
fffff806`18723ef0 fffff806`17ed44b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e
fffff806`18723f30 fffff806`17f2f6be : ffffcb87`7812d800 ffffcb87`7ba8e410 00000000`00000006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
fffff806`187241c0 fffff806`13e98bc8 : ffffcb87`75783cc0 00000000`00000002 ffffcb87`7e87c080 fffff806`187244b8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
fffff806`18724310 fffff806`13e98b3d : fffff806`17f2f590 fffff806`187244b8 ffffcb87`754d2560 fffff806`16f423af : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff806`18724380 fffff806`17f226ad : ffffcb87`7c410350 fffff806`1dfcadb7 ffffcb87`861d14d0 fffff806`17dd142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff806`187243c0 fffff806`17f21d8d : 00000000`00000001 fffff806`18724520 ffffcb87`7ba8e410 fffff806`18724530 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff806`18724420 fffff806`16dd1eb0 : fffff806`1a9c8ab0 fffff806`18dac617 ffffcb87`75e408a0 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff806`187246d0 fffff806`16dd1ccb : ffffcb87`7ba8eaa0 00000000`00000001 ffffcb87`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff806`187247b0 fffff806`16dd7ef0 : ffffcb87`7b0b71a0 ffffcb87`754b1901 ffffcb87`7b0b71a0 0000ffff`f8062001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff806`18724830 fffff806`16e0dd73 : ffffcb87`7b90e030 fffff806`18724901 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
fffff806`18724880 fffff806`16dd4a94 : 00000000`0001d3d4 00000000`00000001 ffffcb87`7b0b71a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff806`18724950 fffff806`20fd8a96 : ffffcb87`00000001 ffffcb87`7b80f000 ffffcb87`7b80fa30 fffff806`18724b00 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff806`187249e0 fffff806`20fdb762 : 00000000`00000000 fffff806`18724b00 00000002`00000000 00000000`00000000 : L1C63x64!HandleRxIntr+0x25e
fffff806`18724a90 fffff806`16e13579 : 00000000`00000010 ffffcb87`7b8129a0 fffff806`18724b49 ffffcb87`7b0b71a0 : L1C63x64!HardwareHandleInterrupt+0x1ba
fffff806`18724ad0 fffff806`13f230ce : fffff806`0fae5240 ffffcb87`737ec000 00000000`00000000 ffffcb87`00000002 : ndis!ndisInterruptDpc+0x3be89
fffff806`18724bb0 fffff806`13f223b4 : fffff806`0fae2180 00000000`00000000 00000000`00000008 00000000`000116f1 : nt!KiExecuteAllDpcs+0x30e
fffff806`18724d20 fffff806`13ffdd35 : 00000000`00000000 fffff806`0fae2180 ffffa700`d9dcc8c0 00000000`000000bd : nt!KiRetireDpcList+0x1f4
fffff806`18724fb0 fffff806`13ffdb20 : fffff806`13ff2de0 fffff806`13ec656a 00000000`00000000 00002bd5`17244f48 : nt!KxRetireDpcList+0x5
fffff380`4fe29ac0 fffff806`13ffd3d5 : 00000000`000000bd fffff806`13ff8041 00000000`00000001 ffffcb87`7e3a9080 : nt!KiDispatchInterruptContinue
fffff380`4fe29af0 fffff806`13ff8041 : 00000000`00000001 ffffcb87`7e3a9080 fffff380`00000000 ffffcb87`00000000 : nt!KiDpcInterruptBypass+0x25
fffff380`4fe29b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0xb1

SYMBOL_NAME: L1C63x64!HandleRxIntr+25e

MODULE_NAME: L1C63x64.

IMAGE_NAME: L1C63x64.sys

IMAGE_VERSION: 2.1.0.16

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 25e.

FAILURE_BUCKET_ID: AV_L1C63x64!HandleRxIntr

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {d6379392-3f48-c6ec-1a10-10fcebd963ee}

Followup: MachineOwner.
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000019c, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg4: fffff80617ee4955, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.Sec
 Value: 15.

 Key : Analysis.DebugAnalysisProvider.CPP
 Value: Create: 8007007e on AHMET.

 Key : Analysis.DebugData
 Value: CreateObject.

 Key : Analysis.DebugModel
 Value: CreateObject.

 Key : Analysis.Elapsed.Sec
 Value: 16.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 82.

 Key : Analysis.System
 Value: CreateObject.

BUGCHECK_CODE: d1.

BUGCHECK_P1: 19c.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80617ee4955.

READ_ADDRESS: Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock
 000000000000019c.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: msedge.exe

DPC_STACK_BASE: FFFFF80618724FB0.

TRAP_FRAME: fffff806187234b0 -- (.trap 0xfffff806187234b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000180 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000007 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80617ee4955 rsp=fffff80618723640 rbp=fffff80618723780
 r8=0000000000000000 r9=0000000000000000 r10=fffff80613e3a390
r11=fffff80618723610 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc.
tcpip!IppInspectLocalDatagramsOut+0x505:
fffff806`17ee4955 807d9000 cmp byte ptr [rbp-70h],0 ss:fffff806`18723710=01
Resetting default scope.

STACK_TEXT:
fffff806`18723368 fffff806`14008c69 : 00000000`0000000a 00000000`0000019c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`18723370 fffff806`14004f69 : fffff806`1e6d34d0 ffffcb87`00000000 ffffcb87`85bdfef0 fffff806`1e6d448a : nt!KiBugCheckDispatch+0x69
fffff806`187234b0 fffff806`17ee4955 : 00000000`00000003 00000000`00000001 ffffcb87`82893a00 ffffcb87`82893a00 : nt!KiPageFault+0x469
fffff806`18723640 fffff806`17ee3d4b : ffffcb87`757059c8 fffff806`19a703e9 ffffcb87`8654bb01 ffffcb87`75736008 : tcpip!IppInspectLocalDatagramsOut+0x505
fffff806`18723910 fffff806`17ee28b9 : 00000000`00000000 00000000`00000000 fffff806`180a9230 ffffcb87`82893a00 : tcpip!IppSendDatagramsCommon+0x41b
fffff806`18723a90 fffff806`17ec1b2d : ffffcb87`82e94e10 00000000`00000014 00000000`00000000 ffffcb87`84b6ea20 : tcpip!IpNlpFastSendDatagram+0x349
fffff806`18723b50 fffff806`17ec3cf6 : ffffcb87`84b6ea20 00000000`00000000 00000000`2cd154a4 ffffcb87`751ff3c0 : tcpip!TcpTcbHeaderSend+0x5cd
fffff806`18723e00 fffff806`17ec223e : ffffcb87`750fe700 fffff806`13e1bb01 ffffcb87`00000000 00000000`00000000 : tcpip!TcpReceive+0x4d6
fffff806`18723ef0 fffff806`17ed44b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e
fffff806`18723f30 fffff806`17f2f6be : ffffcb87`7812d800 ffffcb87`7ba8e410 00000000`00000006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
fffff806`187241c0 fffff806`13e98bc8 : ffffcb87`75783cc0 00000000`00000002 ffffcb87`7e87c080 fffff806`187244b8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
fffff806`18724310 fffff806`13e98b3d : fffff806`17f2f590 fffff806`187244b8 ffffcb87`754d2560 fffff806`16f423af : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff806`18724380 fffff806`17f226ad : ffffcb87`7c410350 fffff806`1dfcadb7 ffffcb87`861d14d0 fffff806`17dd142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff806`187243c0 fffff806`17f21d8d : 00000000`00000001 fffff806`18724520 ffffcb87`7ba8e410 fffff806`18724530 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff806`18724420 fffff806`16dd1eb0 : fffff806`1a9c8ab0 fffff806`18dac617 ffffcb87`75e408a0 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff806`187246d0 fffff806`16dd1ccb : ffffcb87`7ba8eaa0 00000000`00000001 ffffcb87`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff806`187247b0 fffff806`16dd7ef0 : ffffcb87`7b0b71a0 ffffcb87`754b1901 ffffcb87`7b0b71a0 0000ffff`f8062001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff806`18724830 fffff806`16e0dd73 : ffffcb87`7b90e030 fffff806`18724901 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
fffff806`18724880 fffff806`16dd4a94 : 00000000`0001d3d4 00000000`00000001 ffffcb87`7b0b71a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff806`18724950 fffff806`20fd8a96 : ffffcb87`00000001 ffffcb87`7b80f000 ffffcb87`7b80fa30 fffff806`18724b00 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff806`187249e0 fffff806`20fdb762 : 00000000`00000000 fffff806`18724b00 00000002`00000000 00000000`00000000 : L1C63x64!HandleRxIntr+0x25e
fffff806`18724a90 fffff806`16e13579 : 00000000`00000010 ffffcb87`7b8129a0 fffff806`18724b49 ffffcb87`7b0b71a0 : L1C63x64!HardwareHandleInterrupt+0x1ba
fffff806`18724ad0 fffff806`13f230ce : fffff806`0fae5240 ffffcb87`737ec000 00000000`00000000 ffffcb87`00000002 : ndis!ndisInterruptDpc+0x3be89
fffff806`18724bb0 fffff806`13f223b4 : fffff806`0fae2180 00000000`00000000 00000000`00000008 00000000`000116f1 : nt!KiExecuteAllDpcs+0x30e
fffff806`18724d20 fffff806`13ffdd35 : 00000000`00000000 fffff806`0fae2180 ffffa700`d9dcc8c0 00000000`000000bd : nt!KiRetireDpcList+0x1f4
fffff806`18724fb0 fffff806`13ffdb20 : fffff806`13ff2de0 fffff806`13ec656a 00000000`00000000 00002bd5`17244f48 : nt!KxRetireDpcList+0x5
fffff380`4fe29ac0 fffff806`13ffd3d5 : 00000000`000000bd fffff806`13ff8041 00000000`00000001 ffffcb87`7e3a9080 : nt!KiDispatchInterruptContinue
fffff380`4fe29af0 fffff806`13ff8041 : 00000000`00000001 ffffcb87`7e3a9080 fffff380`00000000 ffffcb87`00000000 : nt!KiDpcInterruptBypass+0x25
fffff380`4fe29b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0xb1

SYMBOL_NAME: L1C63x64!HandleRxIntr+25e

MODULE_NAME: L1C63x64.

IMAGE_NAME: L1C63x64.sys

IMAGE_VERSION: 2.1.0.16

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 25e.

FAILURE_BUCKET_ID: AV_L1C63x64!HandleRxIntr

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {d6379392-3f48-c6ec-1a10-10fcebd963ee}

Followup: MachineOwner.
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000019c, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg4: fffff80617ee4955, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.Sec
 Value: 15.

 Key : Analysis.DebugAnalysisProvider.CPP
 Value: Create: 8007007e on AHMET.

 Key : Analysis.DebugData
 Value: CreateObject.

 Key : Analysis.DebugModel
 Value: CreateObject.

 Key : Analysis.Elapsed.Sec
 Value: 16.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 83.

 Key : Analysis.System
 Value: CreateObject.

BUGCHECK_CODE: d1.

BUGCHECK_P1: 19c.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80617ee4955.

READ_ADDRESS: Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock
 000000000000019c.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: msedge.exe

DPC_STACK_BASE: FFFFF80618724FB0.

TRAP_FRAME: fffff806187234b0 -- (.trap 0xfffff806187234b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000180 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000007 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80617ee4955 rsp=fffff80618723640 rbp=fffff80618723780
 r8=0000000000000000 r9=0000000000000000 r10=fffff80613e3a390
r11=fffff80618723610 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc.
tcpip!IppInspectLocalDatagramsOut+0x505:
fffff806`17ee4955 807d9000 cmp byte ptr [rbp-70h],0 ss:fffff806`18723710=01
Resetting default scope.

STACK_TEXT:
fffff806`18723368 fffff806`14008c69 : 00000000`0000000a 00000000`0000019c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`18723370 fffff806`14004f69 : fffff806`1e6d34d0 ffffcb87`00000000 ffffcb87`85bdfef0 fffff806`1e6d448a : nt!KiBugCheckDispatch+0x69
fffff806`187234b0 fffff806`17ee4955 : 00000000`00000003 00000000`00000001 ffffcb87`82893a00 ffffcb87`82893a00 : nt!KiPageFault+0x469
fffff806`18723640 fffff806`17ee3d4b : ffffcb87`757059c8 fffff806`19a703e9 ffffcb87`8654bb01 ffffcb87`75736008 : tcpip!IppInspectLocalDatagramsOut+0x505
fffff806`18723910 fffff806`17ee28b9 : 00000000`00000000 00000000`00000000 fffff806`180a9230 ffffcb87`82893a00 : tcpip!IppSendDatagramsCommon+0x41b
fffff806`18723a90 fffff806`17ec1b2d : ffffcb87`82e94e10 00000000`00000014 00000000`00000000 ffffcb87`84b6ea20 : tcpip!IpNlpFastSendDatagram+0x349
fffff806`18723b50 fffff806`17ec3cf6 : ffffcb87`84b6ea20 00000000`00000000 00000000`2cd154a4 ffffcb87`751ff3c0 : tcpip!TcpTcbHeaderSend+0x5cd
fffff806`18723e00 fffff806`17ec223e : ffffcb87`750fe700 fffff806`13e1bb01 ffffcb87`00000000 00000000`00000000 : tcpip!TcpReceive+0x4d6
fffff806`18723ef0 fffff806`17ed44b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e
fffff806`18723f30 fffff806`17f2f6be : ffffcb87`7812d800 ffffcb87`7ba8e410 00000000`00000006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
fffff806`187241c0 fffff806`13e98bc8 : ffffcb87`75783cc0 00000000`00000002 ffffcb87`7e87c080 fffff806`187244b8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
fffff806`18724310 fffff806`13e98b3d : fffff806`17f2f590 fffff806`187244b8 ffffcb87`754d2560 fffff806`16f423af : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff806`18724380 fffff806`17f226ad : ffffcb87`7c410350 fffff806`1dfcadb7 ffffcb87`861d14d0 fffff806`17dd142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff806`187243c0 fffff806`17f21d8d : 00000000`00000001 fffff806`18724520 ffffcb87`7ba8e410 fffff806`18724530 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff806`18724420 fffff806`16dd1eb0 : fffff806`1a9c8ab0 fffff806`18dac617 ffffcb87`75e408a0 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff806`187246d0 fffff806`16dd1ccb : ffffcb87`7ba8eaa0 00000000`00000001 ffffcb87`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff806`187247b0 fffff806`16dd7ef0 : ffffcb87`7b0b71a0 ffffcb87`754b1901 ffffcb87`7b0b71a0 0000ffff`f8062001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff806`18724830 fffff806`16e0dd73 : ffffcb87`7b90e030 fffff806`18724901 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
fffff806`18724880 fffff806`16dd4a94 : 00000000`0001d3d4 00000000`00000001 ffffcb87`7b0b71a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff806`18724950 fffff806`20fd8a96 : ffffcb87`00000001 ffffcb87`7b80f000 ffffcb87`7b80fa30 fffff806`18724b00 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff806`187249e0 fffff806`20fdb762 : 00000000`00000000 fffff806`18724b00 00000002`00000000 00000000`00000000 : L1C63x64!HandleRxIntr+0x25e
fffff806`18724a90 fffff806`16e13579 : 00000000`00000010 ffffcb87`7b8129a0 fffff806`18724b49 ffffcb87`7b0b71a0 : L1C63x64!HardwareHandleInterrupt+0x1ba
fffff806`18724ad0 fffff806`13f230ce : fffff806`0fae5240 ffffcb87`737ec000 00000000`00000000 ffffcb87`00000002 : ndis!ndisInterruptDpc+0x3be89
fffff806`18724bb0 fffff806`13f223b4 : fffff806`0fae2180 00000000`00000000 00000000`00000008 00000000`000116f1 : nt!KiExecuteAllDpcs+0x30e
fffff806`18724d20 fffff806`13ffdd35 : 00000000`00000000 fffff806`0fae2180 ffffa700`d9dcc8c0 00000000`000000bd : nt!KiRetireDpcList+0x1f4
fffff806`18724fb0 fffff806`13ffdb20 : fffff806`13ff2de0 fffff806`13ec656a 00000000`00000000 00002bd5`17244f48 : nt!KxRetireDpcList+0x5
fffff380`4fe29ac0 fffff806`13ffd3d5 : 00000000`000000bd fffff806`13ff8041 00000000`00000001 ffffcb87`7e3a9080 : nt!KiDispatchInterruptContinue
fffff380`4fe29af0 fffff806`13ff8041 : 00000000`00000001 ffffcb87`7e3a9080 fffff380`00000000 ffffcb87`00000000 : nt!KiDpcInterruptBypass+0x25
fffff380`4fe29b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0xb1

SYMBOL_NAME: L1C63x64!HandleRxIntr+25e

MODULE_NAME: L1C63x64.

IMAGE_NAME: L1C63x64.sys

IMAGE_VERSION: 2.1.0.16

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 25e.

FAILURE_BUCKET_ID: AV_L1C63x64!HandleRxIntr

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {d6379392-3f48-c6ec-1a10-10fcebd963ee}

Followup: MachineOwner.
---------
@YFK
Evet, artık ben de minidump dosyalarını okuyabiliyorum. :)
@ismimberkay @Er73748

Fark ettim hocam :) gayet güzel. Bende şimdi bakacağım minidumplara.
İlk önce Memtest86 ile RAM testi yapın.
Şimdilik Edge kullanmayın.
Qualcomm atheros AR81xx series PCI-e gigabit Ethernet Controller Driver'ını güncelleyin.
Onun dışında @Callisto1232 hocamın dediklerini yapın.
 

Geri
Yukarı