BSOD 0x1C_NdisImPlatform!implatTryToIndicateReceiveNBLs

Anonymous
2024-02-16T14:34:16+00:00

We have a Windows Server 2019 on which we've got a BSOD.
Can someone help to understand the Bugcheck Analysis for the dump ?

Not sure if a network driver is causing the BSOD.

thanks

******************************************************************************* * * * Bugcheck Analysis * * * *******************************************************************************

PFN_REFERENCE_COUNT (1c) Arguments: Arg1: 0000000000000000 Arg2: 0000000000000000 Arg3: 0000000000000000 Arg4: 0000000000000000

Debugging Details:

*** WARNING: Check Image - Checksum mismatch - Dump: 0x2d1c03, File: 0x2ccee8 - C:\ProgramData\Dbg\sym\tcpip.sys\CFA067CC2dc000\tcpip.sys

KEY_VALUES_STRING: 1

Key  : Analysis.CPU.mSec
Value: 1811

Key  : Analysis.Elapsed.mSec
Value: 1938

Key  : Analysis.IO.Other.Mb
Value: 0

Key  : Analysis.IO.Read.Mb
Value: 0

Key  : Analysis.IO.Write.Mb
Value: 0

Key  : Analysis.Init.CPU.mSec
Value: 1187

Key  : Analysis.Init.Elapsed.mSec
Value: 64098

Key  : Analysis.Memory.CommitPeak.Mb
Value: 107

Key  : Bugcheck.Code.KiBugCheckData
Value: 0x1c

Key  : Bugcheck.Code.LegacyAPI
Value: 0x1c

Key  : Failure.Bucket
Value: 0x1C\_NdisImPlatform!implatTryToIndicateReceiveNBLs

Key  : Failure.Hash
Value: {c6233d20-6e0b-a327-3d0d-60437308bfb5}

Key  : Hypervisor.Enlightenments.Value
Value: 0

Key  : Hypervisor.Enlightenments.ValueHex
Value: 0

Key  : Hypervisor.Flags.AnyHypervisorPresent
Value: 0

Key  : Hypervisor.Flags.ApicEnlightened
Value: 0

Key  : Hypervisor.Flags.AsyncMemoryHint
Value: 0

Key  : Hypervisor.Flags.CpuManager
Value: 0

Key  : Hypervisor.Flags.DeprecateAutoEoi
Value: 0

Key  : Hypervisor.Flags.DynamicCpuDisabled
Value: 0

Key  : Hypervisor.Flags.Epf
Value: 0

Key  : Hypervisor.Flags.ExtendedProcessorMasks
Value: 0

Key  : Hypervisor.Flags.HardwareMbecAvailable
Value: 0

Key  : Hypervisor.Flags.MaxBankNumber
Value: 0

Key  : Hypervisor.Flags.MemoryZeroingControl
Value: 0

Key  : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0

Key  : Hypervisor.Flags.NoNonArchCoreSharing
Value: 0

Key  : Hypervisor.Flags.Phase0InitDone
Value: 0

Key  : Hypervisor.Flags.PowerSchedulerQos
Value: 0

Key  : Hypervisor.Flags.RootScheduler
Value: 0

Key  : Hypervisor.Flags.SynicAvailable
Value: 0

Key  : Hypervisor.Flags.UseQpcBias
Value: 0

Key  : Hypervisor.Flags.Value
Value: 0

Key  : Hypervisor.Flags.ValueHex
Value: 0

Key  : Hypervisor.Flags.VpAssistPage
Value: 0

Key  : Hypervisor.Flags.VsmAvailable
Value: 0

Key  : Hypervisor.RootFlags.Value
Value: 0

Key  : Hypervisor.RootFlags.ValueHex
Value: 0

Key  : WER.OS.Branch
Value: rs5\_release

Key  : WER.OS.Version
Value: 10.0.17763.1

BUGCHECK_CODE: 1c

BUGCHECK_P1: 0

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

FILE_IN_CAB: MEMORY.DMP

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXPNP: 1 (!blackboxpnp)

PROCESS_NAME: System

STACK_TEXT:
fffff8011b48aad8 fffff80237cf3ba9 : ffff888a4d1669c0 ffff888a4f275530 ffff888a4f275530 ffff888a6ffffca0 : nt!KeBugCheck fffff8011b48aae0 fffff80237be5ac0 : 0000000000000000 0000000000000000 fffff8011b48ac10 0000000000000000 : tcpip!IpNlpLeavePath+0x84459 fffff8011b48ab10 fffff80237be4c7a : ffff888a4d166a31 fffff8011b48b040 ffff908fea7ad360 ffffc1fb0e800000 : tcpip!UdpDeliverDatagrams+0xc50 fffff8011b48af40 fffff80237be3820 : 0000000000000000 fffff8010000000a ffff888a4f2842a0 ffff888a54a89510 : tcpip!UdpReceiveDatagrams+0x144a fffff8011b48b430 fffff80237c015f2 : 0000000000000000 fffff802372639ba 0000000000000000 ffff888a4ddab010 : tcpip!UdpNlClientReceiveDatagrams+0x10 fffff8011b48b460 fffff80237c011a3 : fffff8011b48b580 0000000000000000 0000000000000000 0000000000000003 : tcpip!IppDeliverListToProtocol+0x62 fffff8011b48b530 fffff80237c005eb : ffff888a4f29c140 ffff888a4f29c140 ffff888a4f111a40 0000000000000000 : tcpip!IppProcessDeliverList+0x63 fffff8011b48b5a0 fffff80237bff843 : fffff80237dd9ad0 ffff888a4df678a0 0000000000000000 ffff888a4c0be800 : tcpip!IppReceiveHeaderBatch+0x39b fffff8011b48b6a0 fffff80237c68423 : ffff888a5a550d70 ffff888a4f1cdb30 ffff888a549ad901 0000000000000000 : tcpip!IppFlcReceivePacketsCore+0x323 fffff8011b48b7c0 fffff80237c79a66 : ffff888a5a550d70 ffff888a4ddab010 fffff80237c6a911 fffff8011b48bc01 : tcpip!IpFlcReceivePreValidatedPackets+0x963 fffff8011b48b9e0 fffff80119026a68 : fffff8011b48bcd0 0000000000000002 fffff8011957a880 fffff8011b48bc50 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x126 fffff8011b48bb20 fffff801190269dd : fffff80237c79940 fffff8011b48bc50 ffff888a4dd21010 0000000000000282 : nt!KeExpandKernelStackAndCalloutInternal+0x78 fffff8011b48bb90 fffff80237c67113 : 0000000000000000 fffff802372639ba fffff80100000000 00001f80000b0256 : nt!KeExpandKernelStackAndCalloutEx+0x1d fffff8011b48bbd0 fffff80237262780 : 0000000000000000 ffff888a5a4eb030 ffffffffffffffa1 ffff888a5a558060 : tcpip!FlReceiveNetBufferListChain+0x2c3 fffff8011b48bdd0 fffff8023726239d : ffff888a5a541801 ffff888a4f1c0008 ffff888a00000000 fffff80200000002 : NDIS!ndisMIndicateNetBufferListsToOpen+0x220 fffff8011b48bea0 fffff80237268037 : ffff888a5a541801 fffff80200000000 ffff888a00000000 0000000000000002 : NDIS!ndisMTopReceiveNetBufferLists+0x23d fffff8011b48bf30 fffff80237265215 : 000000000753ae72 fffff8011b48c080 0000000000000000 0000000000000001 : NDIS!ndisCallReceiveHandler+0xc7 fffff8011b48bf80 fffff801180afcff : ffff888a5a4973c0 ffff888a5a4973c0 ffff888a4f1cdb30 ffff888a67ada620 : NDIS!NdisMIndicateReceiveNetBufferLists+0x5a5 fffff8011b48c100 fffff801180af6ee : ffff888a5a50a000 ffff888a4f111802 0000000000000801 ffff888a00000002 : NdisImPlatform!implatTryToIndicateReceiveNBLs+0x1c7 fffff8011b48c160 fffff80237262780 : fffff80119afff02 0000000000000000 fffff8011b48c251 fffff80200000002 : NdisImPlatform!implatReceiveNetBufferLists+0x1ae fffff8011b48c1e0 fffff80237262427 : ffff888a4f186bb0 ffff888a4f1cdb30 ffff888a00000000 fffff80200000002 : NDIS!ndisMIndicateNetBufferListsToOpen+0x220 fffff8011b48c2b0 fffff80237268037 : ffff888a4f186b01 fffff80200000000 ffff888a00000000 ffff888a00000002 : NDIS!ndisMTopReceiveNetBufferLists+0x2c7 fffff8011b48c340 fffff80237265215 : 000000000753ae72 fffff8011b48c490 0000000000000000 fffff80237266462 : NDIS!ndisCallReceiveHandler+0xc7 fffff8011b48c390 fffff80238c0c68b : 0000000000000000 000000000000e110 ffff888a4f1cdb30 fffff80238c17df1 : NDIS!NdisMIndicateReceiveNetBufferLists+0x5a5 fffff8011b48c510 fffff80238be440b : ffff888a4fbd1080 ffff888a4fd26768 0000000000000030 0000000000000000 : bnxtnd+0x3c68b fffff8011b48c640 fffff80238be5018 : ffff888a4fbd1080 0000000000000000 ffffb6180279ff00 ffff888a00000400 : bnxtnd+0x1440b fffff8011b48c740 fffff80237266ba7 : 0000000000000009 00146f1a1e0d85a2 0000000000000000 fffff8011b48c8a9 : bnxtnd+0x15018 fffff8011b48c7e0 fffff801190aec2c : 0000000000000000 fffff8011b48ca10 00000000000003ba fffff78000000008 : NDIS!ndisInterruptDpc+0x187 fffff8011b48c910 fffff801190ae26e : ffffd2017c7f9500 fffff80119a8db07 ffff6b55ea239116 000000000000001a : nt!KiExecuteAllDpcs+0x2ec fffff8011b48ca50 fffff801191db04a : 0000000000000000 fffff80117907180 00000000002a3550 fffff8011957a880 : nt!KiRetireDpcList+0x1ae fffff8011b48cc60 0000000000000000 : fffff8011b48d000 fffff8011b487000 0000000000000000 0000000000000000 : nt!KiIdleLoop+0x5a

SYMBOL_NAME: NdisImPlatform!implatTryToIndicateReceiveNBLs+1c7

MODULE_NAME: NdisImPlatform

IMAGE_NAME: NdisImPlatform.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 1c7

FAILURE_BUCKET_ID: 0x1C_NdisImPlatform!implatTryToIndicateReceiveNBLs

OS_VERSION: 10.0.17763.1

BUILDLAB_STR: rs5_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {c6233d20-6e0b-a327-3d0d-60437308bfb5}

Windows Server Performance and maintenance Application technologies and compatibility

Locked Question. This question was migrated from the Microsoft Support Community. You can vote on whether it's helpful, but you can't add comments or replies or follow the question. To protect privacy, user profiles for migrated questions are anonymized.

0 comments No comments
{count} votes

3 answers

Sort by: Most helpful
  1. Anonymous
    2024-02-19T02:53:48+00:00

    Hello

    Thank you for posting in Microsoft Community forum.

    We can see this is a 0X1C BSOD issue. Her is an official document for your reference: Bug Check 0x1C PFN_REFERENCE_COUNT - Windows drivers | Microsoft Learn

    From the dump file, we can see there is a driver bnxtnd caused NDIS try to receive and send message, which lead tpcip caused BSOD issue. After we checked the driver, we found it's an ethernet adapter driver which belongs to ThinkSystem Broadcom. We suggest that you can update the driver or contact with the manufactory for further help.

    Best Regards,

    Zack Lu

    0 comments No comments
  2. Anonymous
    2024-02-19T17:52:18+00:00

    Hi

    thanks a lot for your time.

    upgrade is already done but seems not help.

    We are contacting the manufactory and will let know if a fixed is found.

    best regards

    0 comments No comments
  3. Anonymous
    2024-03-05T18:41:27+00:00

    Hello,

    We 've updated our server and the network card driver also but still getting random bsod.

    This time we had a BSOD DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)

    Below a new dump Analysis.

    Do you think that the network card driver still caused this BSOD ?

    Thanks

    *******************************************************************************

    * *

    * Bugcheck Analysis *

    * *

    *******************************************************************************

    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)

    An attempt was made to access a pageable (or completely invalid) address at an

    interrupt request level (IRQL) that is too high. This is usually

    caused by drivers using improper addresses.

    If kernel debugger is available get stack backtrace.

    Arguments:

    Arg1: 0000000000000008, memory referenced

    Arg2: 0000000000000002, IRQL

    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation

    Arg4: fffff801950a9091, address which referenced memory

    Debugging Details:

    ------------------

    KEY_VALUES_STRING: 1

    *Key  : Analysis.CPU.mSec* 
    
    *Value: 2687* 
    
    *Key  : Analysis.Elapsed.mSec* 
    
    *Value: 2704* 
    
    *Key  : Analysis.IO.Other.Mb* 
    
    *Value: 0* 
    
    *Key  : Analysis.IO.Read.Mb* 
    
    *Value: 0* 
    
    *Key  : Analysis.IO.Write.Mb* 
    
    *Value: 0* 
    
    *Key  : Analysis.Init.CPU.mSec* 
    
    *Value: 1280* 
    
    *Key  : Analysis.Init.Elapsed.mSec* 
    
    *Value: 9938* 
    
    *Key  : Analysis.Memory.CommitPeak.Mb* 
    
    *Value: 101* 
    
    *Key  : Bugcheck.Code.KiBugCheckData* 
    
    *Value: 0xd1* 
    
    *Key  : Bugcheck.Code.LegacyAPI* 
    
    *Value: 0xd1* 
    
    *Key  : Failure.Bucket* 
    
    *Value: AV\_tcpip!UdpSendMessages* 
    
    *Key  : Failure.Hash* 
    
    *Value: {e1c12319-f038-0371-bd54-083fccc44512}* 
    
    *Key  : Hypervisor.Enlightenments.Value* 
    
    *Value: 0* 
    
    *Key  : Hypervisor.Enlightenments.ValueHex* 
    
    *Value: 0* 
    
    *Key  : Hypervisor.Flags.AnyHypervisorPresent* 
    
    *Value: 0* 
    
    *Key  : Hypervisor.Flags.ApicEnlightened* 
    
    *Value: 0* 
    
    *Key  : Hypervisor.Flags.AsyncMemoryHint* 
    
    *Value: 0* 
    
    *Key  : Hypervisor.Flags.CpuManager* 
    
    *Value: 0* 
    
    *Key  : Hypervisor.Flags.DeprecateAutoEoi* 
    
    *Value: 0* 
    
    *Key  : Hypervisor.Flags.DynamicCpuDisabled* 
    
    *Value: 0* 
    
    *Key  : Hypervisor.Flags.Epf* 
    
    *Value: 0* 
    
    *Key  : Hypervisor.Flags.ExtendedProcessorMasks* 
    
    *Value: 0* 
    
    *Key  : Hypervisor.Flags.HardwareMbecAvailable* 
    
    *Value: 0* 
    
    *Key  : Hypervisor.Flags.MaxBankNumber* 
    
    *Value: 0* 
    
    *Key  : Hypervisor.Flags.MemoryZeroingControl* 
    
    *Value: 0* 
    
    *Key  : Hypervisor.Flags.NoExtendedRangeFlush* 
    
    *Value: 0* 
    
    *Key  : Hypervisor.Flags.NoNonArchCoreSharing* 
    
    *Value: 0* 
    
    *Key  : Hypervisor.Flags.Phase0InitDone* 
    
    *Value: 0* 
    
    *Key  : Hypervisor.Flags.PowerSchedulerQos* 
    
    *Value: 0* 
    
    *Key  : Hypervisor.Flags.RootScheduler* 
    
    *Value: 0* 
    
    *Key  : Hypervisor.Flags.SynicAvailable* 
    
    *Value: 0* 
    
    *Key  : Hypervisor.Flags.UseQpcBias* 
    
    *Value: 0* 
    
    *Key  : Hypervisor.Flags.Value* 
    
    *Value: 0* 
    
    *Key  : Hypervisor.Flags.ValueHex* 
    
    *Value: 0* 
    
    *Key  : Hypervisor.Flags.VpAssistPage* 
    
    *Value: 0* 
    
    *Key  : Hypervisor.Flags.VsmAvailable* 
    
    *Value: 0* 
    
    *Key  : Hypervisor.RootFlags.Value* 
    
    *Value: 0* 
    
    *Key  : Hypervisor.RootFlags.ValueHex* 
    
    *Value: 0* 
    
    *Key  : WER.OS.Branch* 
    
    *Value: rs5\_release* 
    
    *Key  : WER.OS.Version* 
    
    *Value: 10.0.17763.1* 
    

    BUGCHECK_CODE: d1

    BUGCHECK_P1: 8

    BUGCHECK_P2: 2

    BUGCHECK_P3: 0

    BUGCHECK_P4: fffff801950a9091

    FILE_IN_CAB: MEMORY.DMP

    READ_ADDRESS: 0000000000000008

    BLACKBOXBSD: 1 (!blackboxbsd)

    BLACKBOXPNP: 1 (!blackboxpnp)

    PROCESS_NAME: PBSWDolphinStream.exe

    TRAP_FRAME: fffff380f8194cd0 -- (.trap 0xfffff380f8194cd0)

    NOTE: The trap frame does not contain all registers.

    Some register values may be zeroed or incorrect.

    rax=0000000000000000 rbx=0000000000000000 rcx=000000000018198e

    rdx=ffffd00f8d31aa00 rsi=0000000000000000 rdi=0000000000000000

    rip=fffff801950a9091 rsp=fffff380f8194e60 rbp=fffff380f8194f60

    r8=ffffd00f8d31aa00 r9=0000000000000001 r10=0000fffff8019504

    r11=ffffa07c7ba00000 r12=0000000000000000 r13=0000000000000000

    r14=0000000000000000 r15=0000000000000000

    iopl=0 nv up ei pl zr na po nc

    tcpip!UdpSendMessages+0x121:

    fffff801950a9091 488b4808 mov rcx,qword ptr [rax+8] ds:0000000000000008=????????????????

    Resetting default scope

    STACK_TEXT:

    fffff380f8194b88 fffff8007567b3a9 : 000000000000000a 0000000000000008 0000000000000002 0000000000000000 : nt!KeBugCheckEx

    fffff380f8194b90 fffff8007567700e : fffff380f8194ce0 0000000000000018 fffff38000000000 00001f8000bf02c0 : nt!KiBugCheckDispatch+0x69

    fffff380f8194cd0 fffff801950a9091 : 0000000000000000 fffff80075669ec4 ffffb0807e291840 8000000000000000 : nt!KiPageFault+0x44e

    fffff380f8194e60 fffff801950a8f55 : 000000000000002d 0000000000000001 fffff380f8195310 fffff380f8195310 : tcpip!UdpSendMessages+0x121

    fffff380f8195200 fffff800754b7a68 : fffff380f8195460 ffffd00f98f0b000 0000000000000000 0000000000000000 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15

    fffff380f8195230 fffff800754b79dd : fffff801950a8f40 fffff380f8195310 0000000000000000 fffff801950aeb94 : nt!KeExpandKernelStackAndCalloutInternal+0x78

    fffff380f81952a0 fffff801950aeb92 : fffff380f81953c4 ffffd00f98f03020 fffff8007555a350 fffff801949638f0 : nt!KeExpandKernelStackAndCalloutEx+0x1d

    fffff380f81952e0 fffff8019497d020 : ffffc80e599ef250 fffff380f8195b80 fffff380f81956b0 fffff8007566fa1f : tcpip!UdpTlProviderSendMessages+0x72

    fffff380f8195360 fffff801949637cb : fffff380f8195580 ffffb0807e72b000 ffffd00f9af426c0 ffffd00f9806c180 : afd!AfdFastDatagramSend+0xa90

    fffff380f8195550 fffff80075a6a12b : ffffb0807d159180 ffff9dfeb524828b 0000000000000002 ffffb0807d159180 : afd!AfdFastIoDeviceControl+0x177b

    fffff380f81958d0 fffff80075b2ec16 : d3764fe76d6adb69 0000000000000000 0000000000000000 000001a1018ae310 : nt!IopXxxControlFile+0x81b

    fffff380f8195a20 fffff8007567ab38 : fffff380f8195ad8 0000000000000001 0000000000000000 fffff8007566fa00 : nt!NtDeviceIoControlFile+0x56

    fffff380f8195a90 00007ffbe157fcd4 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : nt!KiSystemServiceCopyEnd+0x28

    0000007089cff3e8 0000000000000000 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : 0x00007ffb`e157fcd4

    SYMBOL_NAME: tcpip!UdpSendMessages+121

    MODULE_NAME: tcpip

    IMAGE_NAME: tcpip.sys

    STACK_COMMAND: .cxr; .ecxr ; kb

    BUCKET_ID_FUNC_OFFSET: 121

    FAILURE_BUCKET_ID: AV_tcpip!UdpSendMessages

    OS_VERSION: 10.0.17763.1

    BUILDLAB_STR: rs5_release

    OSPLATFORM_TYPE: x64

    OSNAME: Windows 10

    FAILURE_ID_HASH: {e1c12319-f038-0371-bd54-083fccc44512}

    0 comments No comments