*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000019c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80617ee4955, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 17
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on AHMET
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 19
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: d1
BUGCHECK_P1: 19c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80617ee4955
READ_ADDRESS: fffff806148fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock
fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000000000019c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: msedge.exe
DPC_STACK_BASE: FFFFF80618724FB0
TRAP_FRAME: fffff806187234b0 -- (.trap 0xfffff806187234b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000180 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000007 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80617ee4955 rsp=fffff80618723640 rbp=fffff80618723780
r8=0000000000000000 r9=0000000000000000 r10=fffff80613e3a390
r11=fffff80618723610 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
tcpip!IppInspectLocalDatagramsOut+0x505:
fffff806`17ee4955 807d9000 cmp byte ptr [rbp-70h],0 ss:fffff806`18723710=01
Resetting default scope
STACK_TEXT:
fffff806`18723368 fffff806`14008c69 : 00000000`0000000a 00000000`0000019c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`18723370 fffff806`14004f69 : fffff806`1e6d34d0 ffffcb87`00000000 ffffcb87`85bdfef0 fffff806`1e6d448a : nt!KiBugCheckDispatch+0x69
fffff806`187234b0 fffff806`17ee4955 : 00000000`00000003 00000000`00000001 ffffcb87`82893a00 ffffcb87`82893a00 : nt!KiPageFault+0x469
fffff806`18723640 fffff806`17ee3d4b : ffffcb87`757059c8 fffff806`19a703e9 ffffcb87`8654bb01 ffffcb87`75736008 : tcpip!IppInspectLocalDatagramsOut+0x505
fffff806`18723910 fffff806`17ee28b9 : 00000000`00000000 00000000`00000000 fffff806`180a9230 ffffcb87`82893a00 : tcpip!IppSendDatagramsCommon+0x41b
fffff806`18723a90 fffff806`17ec1b2d : ffffcb87`82e94e10 00000000`00000014 00000000`00000000 ffffcb87`84b6ea20 : tcpip!IpNlpFastSendDatagram+0x349
fffff806`18723b50 fffff806`17ec3cf6 : ffffcb87`84b6ea20 00000000`00000000 00000000`2cd154a4 ffffcb87`751ff3c0 : tcpip!TcpTcbHeaderSend+0x5cd
fffff806`18723e00 fffff806`17ec223e : ffffcb87`750fe700 fffff806`13e1bb01 ffffcb87`00000000 00000000`00000000 : tcpip!TcpReceive+0x4d6
fffff806`18723ef0 fffff806`17ed44b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e
fffff806`18723f30 fffff806`17f2f6be : ffffcb87`7812d800 ffffcb87`7ba8e410 00000000`00000006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
fffff806`187241c0 fffff806`13e98bc8 : ffffcb87`75783cc0 00000000`00000002 ffffcb87`7e87c080 fffff806`187244b8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
fffff806`18724310 fffff806`13e98b3d : fffff806`17f2f590 fffff806`187244b8 ffffcb87`754d2560 fffff806`16f423af : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff806`18724380 fffff806`17f226ad : ffffcb87`7c410350 fffff806`1dfcadb7 ffffcb87`861d14d0 fffff806`17dd142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff806`187243c0 fffff806`17f21d8d : 00000000`00000001 fffff806`18724520 ffffcb87`7ba8e410 fffff806`18724530 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff806`18724420 fffff806`16dd1eb0 : fffff806`1a9c8ab0 fffff806`18dac617 ffffcb87`75e408a0 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff806`187246d0 fffff806`16dd1ccb : ffffcb87`7ba8eaa0 00000000`00000001 ffffcb87`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff806`187247b0 fffff806`16dd7ef0 : ffffcb87`7b0b71a0 ffffcb87`754b1901 ffffcb87`7b0b71a0 0000ffff`f8062001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff806`18724830 fffff806`16e0dd73 : ffffcb87`7b90e030 fffff806`18724901 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
fffff806`18724880 fffff806`16dd4a94 : 00000000`0001d3d4 00000000`00000001 ffffcb87`7b0b71a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff806`18724950 fffff806`20fd8a96 : ffffcb87`00000001 ffffcb87`7b80f000 ffffcb87`7b80fa30 fffff806`18724b00 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff806`187249e0 fffff806`20fdb762 : 00000000`00000000 fffff806`18724b00 00000002`00000000 00000000`00000000 : L1C63x64!HandleRxIntr+0x25e
fffff806`18724a90 fffff806`16e13579 : 00000000`00000010 ffffcb87`7b8129a0 fffff806`18724b49 ffffcb87`7b0b71a0 : L1C63x64!HardwareHandleInterrupt+0x1ba
fffff806`18724ad0 fffff806`13f230ce : fffff806`0fae5240 ffffcb87`737ec000 00000000`00000000 ffffcb87`00000002 : ndis!ndisInterruptDpc+0x3be89
fffff806`18724bb0 fffff806`13f223b4 : fffff806`0fae2180 00000000`00000000 00000000`00000008 00000000`000116f1 : nt!KiExecuteAllDpcs+0x30e
fffff806`18724d20 fffff806`13ffdd35 : 00000000`00000000 fffff806`0fae2180 ffffa700`d9dcc8c0 00000000`000000bd : nt!KiRetireDpcList+0x1f4
fffff806`18724fb0 fffff806`13ffdb20 : fffff806`13ff2de0 fffff806`13ec656a 00000000`00000000 00002bd5`17244f48 : nt!KxRetireDpcList+0x5
fffff380`4fe29ac0 fffff806`13ffd3d5 : 00000000`000000bd fffff806`13ff8041 00000000`00000001 ffffcb87`7e3a9080 : nt!KiDispatchInterruptContinue
fffff380`4fe29af0 fffff806`13ff8041 : 00000000`00000001 ffffcb87`7e3a9080 fffff380`00000000 ffffcb87`00000000 : nt!KiDpcInterruptBypass+0x25
fffff380`4fe29b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0xb1
SYMBOL_NAME: L1C63x64!HandleRxIntr+25e
MODULE_NAME: L1C63x64
IMAGE_NAME: L1C63x64.sys
IMAGE_VERSION: 2.1.0.16
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 25e
FAILURE_BUCKET_ID: AV_L1C63x64!HandleRxIntr
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d6379392-3f48-c6ec-1a10-10fcebd963ee}
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000019c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80617ee4955, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 15
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on AHMET
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 16
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: d1
BUGCHECK_P1: 19c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80617ee4955
READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock
000000000000019c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: msedge.exe
DPC_STACK_BASE: FFFFF80618724FB0
TRAP_FRAME: fffff806187234b0 -- (.trap 0xfffff806187234b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000180 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000007 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80617ee4955 rsp=fffff80618723640 rbp=fffff80618723780
r8=0000000000000000 r9=0000000000000000 r10=fffff80613e3a390
r11=fffff80618723610 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
tcpip!IppInspectLocalDatagramsOut+0x505:
fffff806`17ee4955 807d9000 cmp byte ptr [rbp-70h],0 ss:fffff806`18723710=01
Resetting default scope
STACK_TEXT:
fffff806`18723368 fffff806`14008c69 : 00000000`0000000a 00000000`0000019c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`18723370 fffff806`14004f69 : fffff806`1e6d34d0 ffffcb87`00000000 ffffcb87`85bdfef0 fffff806`1e6d448a : nt!KiBugCheckDispatch+0x69
fffff806`187234b0 fffff806`17ee4955 : 00000000`00000003 00000000`00000001 ffffcb87`82893a00 ffffcb87`82893a00 : nt!KiPageFault+0x469
fffff806`18723640 fffff806`17ee3d4b : ffffcb87`757059c8 fffff806`19a703e9 ffffcb87`8654bb01 ffffcb87`75736008 : tcpip!IppInspectLocalDatagramsOut+0x505
fffff806`18723910 fffff806`17ee28b9 : 00000000`00000000 00000000`00000000 fffff806`180a9230 ffffcb87`82893a00 : tcpip!IppSendDatagramsCommon+0x41b
fffff806`18723a90 fffff806`17ec1b2d : ffffcb87`82e94e10 00000000`00000014 00000000`00000000 ffffcb87`84b6ea20 : tcpip!IpNlpFastSendDatagram+0x349
fffff806`18723b50 fffff806`17ec3cf6 : ffffcb87`84b6ea20 00000000`00000000 00000000`2cd154a4 ffffcb87`751ff3c0 : tcpip!TcpTcbHeaderSend+0x5cd
fffff806`18723e00 fffff806`17ec223e : ffffcb87`750fe700 fffff806`13e1bb01 ffffcb87`00000000 00000000`00000000 : tcpip!TcpReceive+0x4d6
fffff806`18723ef0 fffff806`17ed44b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e
fffff806`18723f30 fffff806`17f2f6be : ffffcb87`7812d800 ffffcb87`7ba8e410 00000000`00000006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
fffff806`187241c0 fffff806`13e98bc8 : ffffcb87`75783cc0 00000000`00000002 ffffcb87`7e87c080 fffff806`187244b8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
fffff806`18724310 fffff806`13e98b3d : fffff806`17f2f590 fffff806`187244b8 ffffcb87`754d2560 fffff806`16f423af : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff806`18724380 fffff806`17f226ad : ffffcb87`7c410350 fffff806`1dfcadb7 ffffcb87`861d14d0 fffff806`17dd142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff806`187243c0 fffff806`17f21d8d : 00000000`00000001 fffff806`18724520 ffffcb87`7ba8e410 fffff806`18724530 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff806`18724420 fffff806`16dd1eb0 : fffff806`1a9c8ab0 fffff806`18dac617 ffffcb87`75e408a0 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff806`187246d0 fffff806`16dd1ccb : ffffcb87`7ba8eaa0 00000000`00000001 ffffcb87`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff806`187247b0 fffff806`16dd7ef0 : ffffcb87`7b0b71a0 ffffcb87`754b1901 ffffcb87`7b0b71a0 0000ffff`f8062001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff806`18724830 fffff806`16e0dd73 : ffffcb87`7b90e030 fffff806`18724901 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
fffff806`18724880 fffff806`16dd4a94 : 00000000`0001d3d4 00000000`00000001 ffffcb87`7b0b71a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff806`18724950 fffff806`20fd8a96 : ffffcb87`00000001 ffffcb87`7b80f000 ffffcb87`7b80fa30 fffff806`18724b00 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff806`187249e0 fffff806`20fdb762 : 00000000`00000000 fffff806`18724b00 00000002`00000000 00000000`00000000 : L1C63x64!HandleRxIntr+0x25e
fffff806`18724a90 fffff806`16e13579 : 00000000`00000010 ffffcb87`7b8129a0 fffff806`18724b49 ffffcb87`7b0b71a0 : L1C63x64!HardwareHandleInterrupt+0x1ba
fffff806`18724ad0 fffff806`13f230ce : fffff806`0fae5240 ffffcb87`737ec000 00000000`00000000 ffffcb87`00000002 : ndis!ndisInterruptDpc+0x3be89
fffff806`18724bb0 fffff806`13f223b4 : fffff806`0fae2180 00000000`00000000 00000000`00000008 00000000`000116f1 : nt!KiExecuteAllDpcs+0x30e
fffff806`18724d20 fffff806`13ffdd35 : 00000000`00000000 fffff806`0fae2180 ffffa700`d9dcc8c0 00000000`000000bd : nt!KiRetireDpcList+0x1f4
fffff806`18724fb0 fffff806`13ffdb20 : fffff806`13ff2de0 fffff806`13ec656a 00000000`00000000 00002bd5`17244f48 : nt!KxRetireDpcList+0x5
fffff380`4fe29ac0 fffff806`13ffd3d5 : 00000000`000000bd fffff806`13ff8041 00000000`00000001 ffffcb87`7e3a9080 : nt!KiDispatchInterruptContinue
fffff380`4fe29af0 fffff806`13ff8041 : 00000000`00000001 ffffcb87`7e3a9080 fffff380`00000000 ffffcb87`00000000 : nt!KiDpcInterruptBypass+0x25
fffff380`4fe29b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0xb1
SYMBOL_NAME: L1C63x64!HandleRxIntr+25e
MODULE_NAME: L1C63x64
IMAGE_NAME: L1C63x64.sys
IMAGE_VERSION: 2.1.0.16
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 25e
FAILURE_BUCKET_ID: AV_L1C63x64!HandleRxIntr
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d6379392-3f48-c6ec-1a10-10fcebd963ee}
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000019c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80617ee4955, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 15
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on AHMET
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 16
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: d1
BUGCHECK_P1: 19c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80617ee4955
READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061480f378: Unable to get Flags value from nt!KdVersionBlock
000000000000019c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: msedge.exe
DPC_STACK_BASE: FFFFF80618724FB0
TRAP_FRAME: fffff806187234b0 -- (.trap 0xfffff806187234b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000180 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000007 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80617ee4955 rsp=fffff80618723640 rbp=fffff80618723780
r8=0000000000000000 r9=0000000000000000 r10=fffff80613e3a390
r11=fffff80618723610 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
tcpip!IppInspectLocalDatagramsOut+0x505:
fffff806`17ee4955 807d9000 cmp byte ptr [rbp-70h],0 ss:fffff806`18723710=01
Resetting default scope
STACK_TEXT:
fffff806`18723368 fffff806`14008c69 : 00000000`0000000a 00000000`0000019c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`18723370 fffff806`14004f69 : fffff806`1e6d34d0 ffffcb87`00000000 ffffcb87`85bdfef0 fffff806`1e6d448a : nt!KiBugCheckDispatch+0x69
fffff806`187234b0 fffff806`17ee4955 : 00000000`00000003 00000000`00000001 ffffcb87`82893a00 ffffcb87`82893a00 : nt!KiPageFault+0x469
fffff806`18723640 fffff806`17ee3d4b : ffffcb87`757059c8 fffff806`19a703e9 ffffcb87`8654bb01 ffffcb87`75736008 : tcpip!IppInspectLocalDatagramsOut+0x505
fffff806`18723910 fffff806`17ee28b9 : 00000000`00000000 00000000`00000000 fffff806`180a9230 ffffcb87`82893a00 : tcpip!IppSendDatagramsCommon+0x41b
fffff806`18723a90 fffff806`17ec1b2d : ffffcb87`82e94e10 00000000`00000014 00000000`00000000 ffffcb87`84b6ea20 : tcpip!IpNlpFastSendDatagram+0x349
fffff806`18723b50 fffff806`17ec3cf6 : ffffcb87`84b6ea20 00000000`00000000 00000000`2cd154a4 ffffcb87`751ff3c0 : tcpip!TcpTcbHeaderSend+0x5cd
fffff806`18723e00 fffff806`17ec223e : ffffcb87`750fe700 fffff806`13e1bb01 ffffcb87`00000000 00000000`00000000 : tcpip!TcpReceive+0x4d6
fffff806`18723ef0 fffff806`17ed44b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e
fffff806`18723f30 fffff806`17f2f6be : ffffcb87`7812d800 ffffcb87`7ba8e410 00000000`00000006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
fffff806`187241c0 fffff806`13e98bc8 : ffffcb87`75783cc0 00000000`00000002 ffffcb87`7e87c080 fffff806`187244b8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
fffff806`18724310 fffff806`13e98b3d : fffff806`17f2f590 fffff806`187244b8 ffffcb87`754d2560 fffff806`16f423af : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff806`18724380 fffff806`17f226ad : ffffcb87`7c410350 fffff806`1dfcadb7 ffffcb87`861d14d0 fffff806`17dd142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff806`187243c0 fffff806`17f21d8d : 00000000`00000001 fffff806`18724520 ffffcb87`7ba8e410 fffff806`18724530 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff806`18724420 fffff806`16dd1eb0 : fffff806`1a9c8ab0 fffff806`18dac617 ffffcb87`75e408a0 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff806`187246d0 fffff806`16dd1ccb : ffffcb87`7ba8eaa0 00000000`00000001 ffffcb87`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff806`187247b0 fffff806`16dd7ef0 : ffffcb87`7b0b71a0 ffffcb87`754b1901 ffffcb87`7b0b71a0 0000ffff`f8062001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff806`18724830 fffff806`16e0dd73 : ffffcb87`7b90e030 fffff806`18724901 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x60
fffff806`18724880 fffff806`16dd4a94 : 00000000`0001d3d4 00000000`00000001 ffffcb87`7b0b71a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff806`18724950 fffff806`20fd8a96 : ffffcb87`00000001 ffffcb87`7b80f000 ffffcb87`7b80fa30 fffff806`18724b00 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff806`187249e0 fffff806`20fdb762 : 00000000`00000000 fffff806`18724b00 00000002`00000000 00000000`00000000 : L1C63x64!HandleRxIntr+0x25e
fffff806`18724a90 fffff806`16e13579 : 00000000`00000010 ffffcb87`7b8129a0 fffff806`18724b49 ffffcb87`7b0b71a0 : L1C63x64!HardwareHandleInterrupt+0x1ba
fffff806`18724ad0 fffff806`13f230ce : fffff806`0fae5240 ffffcb87`737ec000 00000000`00000000 ffffcb87`00000002 : ndis!ndisInterruptDpc+0x3be89
fffff806`18724bb0 fffff806`13f223b4 : fffff806`0fae2180 00000000`00000000 00000000`00000008 00000000`000116f1 : nt!KiExecuteAllDpcs+0x30e
fffff806`18724d20 fffff806`13ffdd35 : 00000000`00000000 fffff806`0fae2180 ffffa700`d9dcc8c0 00000000`000000bd : nt!KiRetireDpcList+0x1f4
fffff806`18724fb0 fffff806`13ffdb20 : fffff806`13ff2de0 fffff806`13ec656a 00000000`00000000 00002bd5`17244f48 : nt!KxRetireDpcList+0x5
fffff380`4fe29ac0 fffff806`13ffd3d5 : 00000000`000000bd fffff806`13ff8041 00000000`00000001 ffffcb87`7e3a9080 : nt!KiDispatchInterruptContinue
fffff380`4fe29af0 fffff806`13ff8041 : 00000000`00000001 ffffcb87`7e3a9080 fffff380`00000000 ffffcb87`00000000 : nt!KiDpcInterruptBypass+0x25
fffff380`4fe29b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0xb1
SYMBOL_NAME: L1C63x64!HandleRxIntr+25e
MODULE_NAME: L1C63x64
IMAGE_NAME: L1C63x64.sys
IMAGE_VERSION: 2.1.0.16
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 25e
FAILURE_BUCKET_ID: AV_L1C63x64!HandleRxIntr
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d6379392-3f48-c6ec-1a10-10fcebd963ee}
Followup: MachineOwner
---------