Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\fredd\Desktop\Error\062221-8718-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Machine Name: Kernel base = 0xfffff805`48e00000 PsLoadedModuleList = 0xfffff805`49a2a230 Debug session time: Tue Jun 22 10:38:07.082 2021 (UTC + 2:00) System Uptime: 0 days 11:09:53.893 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ .............. Loading User Symbols Loading unloaded module list ........................................... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff805`491f6c20 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8c04`588b53b0=000000000000012e 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* INVALID_MDL_RANGE (12e) A driver has called the IoBuildPartialMdl() function and passed it an MDL to map part of a source MDL, but the virtual address range specified is outside the range in the source MDL. This is a driver bug. The source and target MDLs, as well as the address range length to be mapped are the arguments to the IoBuildPartialMdl() function, i.e.; IoBuildPartialMdl( IN PMDL SourceMdl, IN OUT PMDL TargetMdl, IN PVOID VirtualAddress, IN ULONG Length ) Arguments: Arg1: ffffad0f6d5267c0 Arg2: ffffad0f6c89a3c0 Arg3: ffff9b00905df94e Arg4: 000000000000002e Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 11686 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 36785 Key : Analysis.Init.CPU.mSec Value: 780 Key : Analysis.Init.Elapsed.mSec Value: 3894 Key : Analysis.Memory.CommitPeak.Mb Value: 84 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 12e BUGCHECK_P1: ffffad0f6d5267c0 BUGCHECK_P2: ffffad0f6c89a3c0 BUGCHECK_P3: ffff9b00905df94e BUGCHECK_P4: 2e BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: devolonetsvc.exe STACK_TEXT: ffff8c04`588b53a8 fffff805`492524a1 : 00000000`0000012e ffffad0f`6d5267c0 ffffad0f`6c89a3c0 ffff9b00`905df94e : nt!KeBugCheckEx ffff8c04`588b53b0 fffff805`5a772186 : ffffad0f`6d5267c0 ffffad0f`6d34c010 00000000`00000001 00000000`00000000 : nt!IoBuildPartialMdl+0x18d041 ffff8c04`588b53f0 fffff805`5a77152b : ffffad0f`6eef3230 00000000`c000023e 00000000`00000000 ffffad0f`720e8888 : bthpan!BnepDataPacketConvertEthToBnep+0x326 ffff8c04`588b5450 fffff805`5a76843a : ffffad0f`720e8720 ffff8c04`00000001 00000000`00000000 01000000`00000000 : bthpan!BnepDataSend+0x2a3 ffff8c04`588b54d0 fffff805`5a763716 : ffffad0f`720e8720 ffffad0f`72338640 ffffad0f`6edf57b0 fffff805`5a7635e0 : bthpan!BthpanPacketSend+0x306 ffff8c04`588b55b0 fffff805`4e0050ae : 00000000`00000000 ffffad0f`6b8d01a0 ffffad0f`72338640 fffff805`4e01d10c : bthpan!MpSendNetBufferLists+0x136 ffff8c04`588b55f0 fffff805`4e004f9e : ffffad0f`6b8d0100 ffffad0f`72338640 ffffad0f`00000000 ffffad0f`72338640 : ndis!ndisMSendNBLToMiniportInternal+0xfe ffff8c04`588b56c0 fffff805`4e0c2f09 : 00000000`00400200 ffffad0f`763663c1 ffffad0f`6b8d01a0 00000000`00000001 : ndis!ndisMSendNBLToMiniport+0xe ffff8c04`588b5700 fffff805`4e0c4453 : ffffad0f`62ef9dd0 ffffad0f`6d5267c0 ffffad0f`6b8d01a0 0000000f`ffffffff : ndis!ndisMSendPacketsToNetBufferLists+0xe9 ffff8c04`588b5790 fffff805`4e0c4509 : 00000000`00000000 00000000`00000000 ffffad0f`66bcecc0 ffffad0f`00000000 : ndis!ndisSendPacketsWithPause+0x243 ffff8c04`588b5820 fffff805`46ba474b : ffff8c04`588b58b8 ffffad0f`62ef9e30 00000000`00000001 ffffad0f`00000000 : ndis!ndisSendWithPause+0x19 ffff8c04`588b5850 ffff8c04`588b58b8 : ffffad0f`62ef9e30 00000000`00000001 ffffad0f`00000000 ffffad0f`6bdf4cc0 : npf_devolo+0x474b ffff8c04`588b5858 ffffad0f`62ef9e30 : 00000000`00000001 ffffad0f`00000000 ffffad0f`6bdf4cc0 ffffad0f`75c23200 : 0xffff8c04`588b58b8 ffff8c04`588b5860 00000000`00000001 : ffffad0f`00000000 ffffad0f`6bdf4cc0 ffffad0f`75c23200 00000000`00000000 : 0xffffad0f`62ef9e30 ffff8c04`588b5868 ffffad0f`00000000 : ffffad0f`6bdf4cc0 ffffad0f`75c23200 00000000`00000000 00000000`00000001 : 0x1 ffff8c04`588b5870 ffffad0f`6bdf4cc0 : ffffad0f`75c23200 00000000`00000000 00000000`00000001 ffffad0f`75c23200 : 0xffffad0f`00000000 ffff8c04`588b5878 ffffad0f`75c23200 : 00000000`00000000 00000000`00000001 ffffad0f`75c23200 00000000`00000001 : 0xffffad0f`6bdf4cc0 ffff8c04`588b5880 00000000`00000000 : 00000000`00000001 ffffad0f`75c23200 00000000`00000001 00000000`00000001 : 0xffffad0f`75c23200 SYMBOL_NAME: bthpan!BnepDataPacketConvertEthToBnep+326 MODULE_NAME: bthpan IMAGE_NAME: bthpan.sys IMAGE_VERSION: 10.0.19041.1030 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 326 FAILURE_BUCKET_ID: 0x12E_bthpan!BnepDataPacketConvertEthToBnep OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {115af701-0b0f-65c7-c9c4-5528af23d90b} Followup: MachineOwner ---------