DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000427561e0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80524724104, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3952
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3959
Key : Analysis.Memory.CommitPeak.Mb
Value: 89
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: 427561e0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80524724104
READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80520e0f330: Unable to get Flags value from nt!KdVersionBlock
00000000427561e0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffab831cc4bb40 -- (.trap 0xffffab831cc4bb40)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9b8a428d9a20 rbx=0000000000000000 rcx=00000000427561e0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80524724104 rsp=ffffab831cc4bcd0 rbp=ffffab831cc4c060
r8=ffff9b8a45e6be00 r9=0000000000000002 r10=fffff80520436d20
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
tcpip!IpFlcReceivePreValidatedPackets+0x714:
fffff805`24724104 8b01 mov eax,dword ptr [rcx] ds:00000000`427561e0=????????
Resetting default scope
STACK_TEXT:
ffffab83`1cc4b9f8 fffff805`20607a69 : 00000000`0000000a 00000000`427561e0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffab83`1cc4ba00 fffff805`20603d69 : 00000000`00000000 ffff9b8a`ffffffff 00000000`00000001 ffff9b8a`450111a0 : nt!KiBugCheckDispatch+0x69
ffffab83`1cc4bb40 fffff805`24724104 : ffff9b8a`45e6c010 00000000`00000001 ffff9b8a`45ddc780 00000000`00000000 : nt!KiPageFault+0x469
ffffab83`1cc4bcd0 fffff805`2477ed1e : ffff9b8a`45868ca0 ffff9b8a`45e6c010 00000000`00000011 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x714
ffffab83`1cc4bf60 fffff805`20554488 : ffff9b8a`42ae09c0 00000000`00000002 ffff9b8a`428e5040 ffffab83`1cc4c258 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
ffffab83`1cc4c0b0 fffff805`205543fd : fffff805`2477ebf0 ffffab83`1cc4c258 ffff9b8a`427c33b0 fffff805`245f23af : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffab83`1cc4c120 fffff805`24771cdd : fffff805`205f1b70 fffff805`204ec5ca ffff9b8a`53977d30 fffff805`249f142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffab83`1cc4c160 fffff805`247713bd : 00000000`00000001 ffffab83`1cc4c2c0 ffff9b8a`45e6c010 00000000`00000000 : tcpip!NetioExpandKernelStackAndCallout+0x8d
ffffab83`1cc4c1c0 fffff805`24481eb0 : ffff9b8a`42d55301 00000000`00000001 ffff9b8a`45e542b0 ffffab83`1cc4c5d0 : tcpip!FlReceiveNetBufferListChain+0x46d
ffffab83`1cc4c470 fffff805`24481ccb : ffff9b8a`45e6d6d0 fffff805`00000001 ffffab83`00000000 fffff805`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
ffffab83`1cc4c550 fffff805`24487ef0 : ffff9b8a`450111a0 ffff9b8a`45ddc701 ffff9b8a`450111a0 00000000`00000001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
ffffab83`1cc4c5d0 fffff805`244bdee3 : ffff9b8a`45ddc780 ffffab83`1cc4c6a1 00000000`00000000 00000001`00000000 : ndis!ndisCallReceiveHandler+0x60
ffffab83`1cc4c620 fffff805`24484a94 : 00000000`005927e2 00000000`00000001 ffff9b8a`450111a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
ffffab83`1cc4c6f0 fffff805`2b9f6a28 : ffff9b8a`49fb5000 ffff9b8a`49fb5000 00000000`00000003 00000000`00000000 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
ffffab83`1cc4c780 ffff9b8a`49fb5000 : ffff9b8a`49fb5000 00000000`00000003 00000000`00000000 ffff9b8a`00000001 : rt640x64+0x26a28
ffffab83`1cc4c788 ffff9b8a`49fb5000 : 00000000`00000003 00000000`00000000 ffff9b8a`00000001 00000000`00000001 : 0xffff9b8a`49fb5000
ffffab83`1cc4c790 00000000`00000003 : 00000000`00000000 ffff9b8a`00000001 00000000`00000001 00000003`00000001 : 0xffff9b8a`49fb5000
ffffab83`1cc4c798 00000000`00000000 : ffff9b8a`00000001 00000000`00000001 00000003`00000001 80000000`00000001 : 0x3
SYMBOL_NAME: rt640x64+26a28
MODULE_NAME: rt640x64
IMAGE_NAME: rt640x64.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 26a28
FAILURE_BUCKET_ID: AV_rt640x64!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2e96e72d-48ac-dceb-22bd-11e71513e43e}
Followup: MachineOwner
---------