Flapjacks
Hectopat
- Katılım
- 7 Temmuz 2020
- Mesajlar
- 113
Yeni klasör.rar minidump dosyaları burada GPU-Z programını güncellerken bir anda mavi ekran verdi.
Son düzenleyen: Moderatör:
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000007, A driver has unlocked a page more times than it locked it
Arg2: 00000000001002ff, page frame number
Arg3: 060002e0002efbfe, current share count
Arg4: 0000000000000000, 0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7124
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 32449
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 4e
BUGCHECK_P1: 7
BUGCHECK_P2: 1002ff
BUGCHECK_P3: 60002e0002efbfe
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: GPU-Z.2.35.0.exe
STACK_TEXT:
ffffbd01`c8d7eef8 fffff806`23e8bce1 : 00000000`0000004e 00000000`00000007 00000000`001002ff 060002e0`002efbfe : nt!KeBugCheckEx
ffffbd01`c8d7ef00 fffff806`23d349e0 : 00000000`00000000 ffffb480`03008fd0 00000000`00000000 00000000`00000000 : nt!MiPfnReferenceCountIsZero+0x14f7f1
ffffbd01`c8d7ef40 fffff806`23d7bff5 : ffffa90f`00000000 ffffbd01`c8d7f0a0 00000000`00000000 00000000`00000002 : nt!MiRemoveLockedPageChargeAndDecRef+0x230
ffffbd01`c8d7ef70 fffff806`23d4820b : 00000000`001002ff 00000000`00000003 00000000`00040246 fffff806`23d2224e : nt!MiDoubleUnlockMdlPage+0x1d
ffffbd01`c8d7efa0 fffff806`23d49cae : ffffbd01`c8d7f578 ffff8800`00028b80 00000000`00000000 ffff8800`00028b80 : nt!MiDeletePteRun+0x4cb
ffffbd01`c8d7f1b0 fffff806`23d4a88b : ffffbd01`c8d7f2e0 00000000`00000000 ffff8800`00028b80 00000000`00000000 : nt!MiDeleteVaTail+0x6e
ffffbd01`c8d7f1e0 fffff806`23d22ae0 : 00000000`00000002 ffffbd01`00000000 ffff9f87`890fa550 ffff9f87`99850080 : nt!MiDeletePagablePteRange+0x4ab
ffffbd01`c8d7f4f0 fffff806`241517ff : ffff9f87`90e04ed0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
ffffbd01`c8d7f600 fffff806`23d1d713 : ffff9f87`8531c610 00000000`00000001 00000000`00000000 fffff806`23c9ccce : nt!MiUnmapLockedPagesInUserSpace+0xc3
ffffbd01`c8d7f680 fffff806`7ea0210d : 00000000`000000c8 ffff9f87`8f2941a0 00000000`00000000 00000000`20206f49 : nt!MmUnmapLockedPages+0xf3
ffffbd01`c8d7f6b0 00000000`000000c8 : ffff9f87`8f2941a0 00000000`00000000 00000000`20206f49 ffff9f87`96605250 : GPU_Z_v2+0x210d
ffffbd01`c8d7f6b8 ffff9f87`8f2941a0 : 00000000`00000000 00000000`20206f49 ffff9f87`96605250 ffff9f87`8f294050 : 0xc8
ffffbd01`c8d7f6c0 00000000`00000000 : 00000000`20206f49 ffff9f87`96605250 ffff9f87`8f294050 ffff9f87`96605250 : 0xffff9f87`8f2941a0
SYMBOL_NAME: nt!MiPfnReferenceCountIsZero+14f7f1
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 14f7f1
FAILURE_BUCKET_ID: 0x4E_7_nt!MiPfnReferenceCountIsZero
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d4c4fdf2-bb42-a5bb-4f52-718a7a31638a}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800503fbdd7, The address that the exception occurred at
Arg3: ffff88829880e418, Parameter 0 of the exception
Arg4: ffff8f00dd8fd920, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7530
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 24213
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff800503fbdd7
BUGCHECK_P3: ffff88829880e418
BUGCHECK_P4: ffff8f00dd8fd920
WRITE_ADDRESS: fffff80050cfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80050c0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff80050c0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff8f00dd8fd920
EXCEPTION_PARAMETER1: ffff88829880e418
EXCEPTION_PARAMETER2: ffff8f00dd8fd920
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: nvcontainer.exe
TRAP_FRAME: 48fffffb38e90000 -- (.trap 0x48fffffb38e90000)
Unable to read trap frame at 48fffffb`38e90000
BAD_STACK_POINTER: ffff8f00dd8fd0a8
STACK_TEXT:
ffff8f00`dd8fd0a8 fffff800`5050ed9f : 00000000`0000001e ffffffff`c0000005 fffff800`503fbdd7 ffff8882`9880e418 : nt!KeBugCheckEx
ffff8f00`dd8fd0b0 fffff800`5040f4d6 : ffff8f00`dd8fd920 fffff800`50253a05 ffff8882`9880e650 fffff800`503fbdd7 : nt!KiFatalFilter+0x1f
ffff8f00`dd8fd0f0 fffff800`503cae5f : fffff800`00000002 fffff800`500d2f90 ffff8882`98809000 ffff8882`98810000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
ffff8f00`dd8fd130 fffff800`503fcd5f : fffff800`500d2f90 ffff8f00`dd8fd710 fffff800`503cadc0 00000000`00000000 : nt!_C_specific_handler+0x9f
ffff8f00`dd8fd1a0 fffff800`50285027 : ffff8f00`dd8fd710 00000000`00000000 ffff8882`9880f1a0 fffff800`502b8908 : nt!RtlpExecuteHandlerForException+0xf
ffff8f00`dd8fd1d0 fffff800`50283ce6 : ffff8882`9880e418 ffff8f00`dd8fde20 ffff8882`9880e418 ffffd902`4991fd70 : nt!RtlDispatchException+0x297
ffff8f00`dd8fd8f0 fffff800`503f4d32 : 840fffff`80520539 0014b941`00000480 48fffffb`38e90000 66c93345`d274d285 : nt!KiDispatchException+0x186
ffff8f00`dd8fdfb0 fffff800`503f4d00 : fffff800`50405fa5 00000000`00000000 fffff800`00000004 ffffd902`47df1301 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffff8882`9880e2d8 fffff800`50405fa5 : 00000000`00000000 fffff800`00000004 ffffd902`47df1301 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffff8882`9880e2e0 fffff800`50401ce0 : fffff800`55251000 ffffd902`47df1340 ffffd902`00000000 fffff800`54cd4f90 : nt!KiExceptionDispatch+0x125
ffff8882`9880e4c0 fffff800`503fbdd7 : ffffd902`43b17500 fffff800`6d8d6d7c 00000000`00020001 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
ffff8882`9880e650 fffff800`6d8d6d7c : 00000000`00020001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault
ffff8882`9880e660 fffff800`6d8d44fc : ffffd902`498598d0 ffffd902`4991fd70 ffff8882`9880e920 00000000`00000000 : Ndu!PplGenericAllocateFunction+0x1c
ffff8882`9880e6a0 fffff800`54e58c5f : 00000000`00000000 ffff8882`9880e7a9 00000000`00000004 ffff8882`9880ea70 : Ndu!NduOutboundTransportClassify+0x38c
ffff8882`9880e740 fffff800`54f3cdab : ffffd902`3c1c38a8 ffff8882`00000230 ffffd902`4437f340 ffffd902`4437f340 : NETIO!KfdClassify2+0x19f
ffff8882`9880e810 fffff800`54f3bfdb : ffffd902`3c1c3988 00000000`0000060c 00000000`0000ff00 ffffd902`3c1c38a8 : tcpip!IppInspectLocalDatagramsOut+0x6cb
ffff8882`9880eae0 fffff800`54f3bba0 : 00000000`00009e00 00000000`0000ffff fffff800`550da230 ffffd902`4437f340 : tcpip!IppSendDatagramsCommon+0x41b
ffff8882`9880ec60 fffff800`54f493ae : ffffd902`3c040490 00000000`00000000 00000000`00200000 00000000`00000000 : tcpip!IpNlpSendDatagrams+0x40
ffff8882`9880eca0 fffff800`54f4b904 : ffff8882`9880f280 ffff8882`9880f310 ffff8882`9880f120 00000000`00000000 : tcpip!TcpTcbSend+0xdde
ffff8882`9880f020 fffff800`54f4b56e : 00000000`00000000 00000000`00000000 ffff8882`9880f280 fffff800`54f4b540 : tcpip!TcpEnqueueTcbSend+0x374
ffff8882`9880f160 fffff800`502b8908 : ffffd902`47f62101 00000000`00000000 e0cb7f01`00000000 00000000`00000001 : tcpip!TcpTlConnectionSendCalloutRoutine+0x2e
ffff8882`9880f1a0 fffff800`502b887d : fffff800`54f4b540 ffff8882`9880f280 ffffd902`49c5f1b8 ffffd902`49bb91b8 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff8882`9880f210 fffff800`54ee49e0 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff3ec`8124ddd0 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffff8882`9880f250 fffff800`6a33c0d0 : ffffd902`49c5f1b8 ffffd902`47f62150 00000000`00000081 ffffd902`49c5f1b8 : tcpip!TcpTlConnectionSend+0x80
ffff8882`9880f2c0 fffff800`6a33befa : ffffd902`47f62150 ffff8882`9880fa80 ffffd902`447f8ce0 ffffd902`49c5f7e0 : afd!AfdTLStartBufferedVcSend+0xa0
ffff8882`9880f370 fffff800`6a321720 : ffffd902`49c5f1b8 ffffd902`4990cae0 00000000`00000081 ffff8882`9880f868 : afd!AfdFastConnectionSend+0x2a2
ffff8882`9880f440 fffff800`506a6622 : 00000000`00000000 00000000`0001201f ffff8882`9880fa80 ffffd902`497b20a0 : afd!AfdFastIoDeviceControl+0xf90
ffff8882`9880f7e0 fffff800`506a6286 : 00000000`00000001 00000000`00000c70 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382
ffff8882`9880f920 fffff800`504058b5 : 00000000`00000000 00000000`00000000 00000000`00000102 ffffd902`499374e0 : nt!NtDeviceIoControlFile+0x56
ffff8882`9880f990 00007ffc`e360bea4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000b8`afe6f2e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`e360bea4
SYMBOL_NAME: Ndu!PplGenericAllocateFunction+1c
MODULE_NAME: Ndu
IMAGE_NAME: Ndu.sys
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1c
FAILURE_BUCKET_ID: 0x1E_c0000005_STACKPTR_ERROR_Ndu!PplGenericAllocateFunction
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {040fbfea-4e33-dce2-4a10-b9c4b0dd9e1c}
Followup: MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff8000eafa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding this single DPC timeout
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 9265
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 37014
Key : Analysis.Memory.CommitPeak.Mb
Value: 95
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 0
BUGCHECK_P2: 501
BUGCHECK_P3: 500
BUGCHECK_P4: fffff8000eafa320
DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED
TRAP_FRAME: ffffb487e6276c70 -- (.trap 0xffffb487e6276c70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000c2ed002f rbx=0000000000000000 rcx=ffffb70400000000
rdx=ffffb70400000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000e1fbdd7 rsp=ffffb487e6276e00 rbp=0000000000000001
r8=ffffb70400000000 r9=ffffb7047b69ce40 r10=ffffb7047b69d580
r11=000000000000004f r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ExpInterlockedPopEntrySListFault:
fffff800`0e1fbdd7 498b08 mov rcx,qword ptr [r8] ds:ffffb704`00000000=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
DPC_STACK_BASE: FFFFB487E6277FB0
STACK_TEXT:
ffff9380`ca5b6e18 fffff800`0e27955a : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
ffff9380`ca5b6e20 fffff800`0e10518d : 0000010f`d74a45eb 00000000`00000000 ffffb487`e6276b00 ffff9380`ca59d180 : nt!KeAccumulateTicks+0x17110a
ffff9380`ca5b6e80 fffff800`0e10500a : ffffb704`798de600 ffffb487`e6276b60 00000000`00006382 00000000`00000003 : nt!KeClockInterruptNotify+0xbd
ffff9380`ca5b6f30 fffff800`0e080795 : ffffb704`798de600 00000000`00000000 00000000`00000000 ffff1e84`b8cc0d0e : nt!HalpTimerClockIpiRoutine+0x1a
ffff9380`ca5b6f60 fffff800`0e1f594a : ffffb487`e6276b60 ffffb704`798de600 00000000`00000001 f9a827e7`c5a896ab : nt!KiCallInterruptServiceRoutine+0xa5
ffff9380`ca5b6fb0 fffff800`0e1f5eb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffb487`e6276ae0 fffff800`0e202015 : ffffb704`8d01b8c0 00000000`00000000 00000000`5f636357 00000000`0000016a : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffb487`e6276c70 fffff800`0e1fbdd7 : ffffb704`7b69d580 fffff800`12e5b4cc 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x315
ffffb487`e6276e00 fffff800`12e5b4cc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault
ffffb487`e6276e10 fffff800`12e423d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!PplGenericAllocateFunction+0x1c
ffffb487`e6276e50 fffff800`131d135c : 00000000`00000000 ffffb704`8d01b8c0 ffffb704`82760bc0 00000000`00000000 : NETIO!WfpNblInfoAlloc+0x94
ffffb487`e6276e90 fffff800`131d12bb : 00000000`00000000 ffffb704`85659ae0 ffffb704`82760bc0 fffff800`2a496d7c : fwpkclnt!FwppNetBufferListAssociateContext+0x7c
ffffb487`e6276f30 fffff800`2a4943bd : 00000000`00000002 ffffb704`8ab293b0 ffffb487`e6277210 fffff800`131d1200 : fwpkclnt!FwpsNetBufferListAssociateContext1+0x7b
ffffb487`e6276f90 fffff800`12e58c5f : 00000000`00000000 ffffb487`e6277099 00000000`00000000 ffffb487`e6277360 : Ndu!NduOutboundTransportClassify+0x24d
ffffb487`e6277030 fffff800`12f3cdab : ffffb704`820c5b10 00000000`00000004 ffffb704`89680310 ffffb704`89680310 : NETIO!KfdClassify2+0x19f
ffffb487`e6277100 fffff800`12f3bfdb : ffffb704`7b7c4988 00000000`00000000 fffff800`0000001e 00000000`00000202 : tcpip!IppInspectLocalDatagramsOut+0x6cb
ffffb487`e62773d0 fffff800`12f38a09 : 00000000`00000000 00000000`00000000 fffff800`130da230 ffffb704`89680310 : tcpip!IppSendDatagramsCommon+0x41b
ffffb487`e6277550 fffff800`12f48ca5 : ffffb704`85399ee0 00000000`00000014 00000000`00000000 ffffb704`849d5040 : tcpip!IpNlpFastSendDatagram+0x349
ffffb487`e6277610 fffff800`12f2aa33 : 00000000`00000000 00000000`00000005 ffffb487`00000006 00000000`0005c53c : tcpip!TcpTcbSend+0x6d5
ffffb487`e6277990 fffff800`0e0e9a3e : ffff9380`ca5a0240 ffffb704`79a1f000 ffffb487`e6277e70 ffff9380`ca59d180 : tcpip!TcpPeriodicTimeoutHandler+0x1683
ffffb487`e6277bb0 fffff800`0e0e8d24 : ffff9380`ca59d180 00000000`00000000 00000000`00000008 00000000`00003704 : nt!KiExecuteAllDpcs+0x30e
ffffb487`e6277d20 fffff800`0e1faee5 : 00000000`00000000 ffff9380`ca59d180 00000000`00000000 ffffb487`e69af750 : nt!KiRetireDpcList+0x1f4
ffffb487`e6277fb0 fffff800`0e1facd0 : ffff9380`ca59d180 fffff800`0e0c92ea 00000000`00000000 ffffb704`00000000 : nt!KxRetireDpcList+0x5
ffffb487`e69af530 fffff800`0e1fa39e : 00000000`00000002 00000000`3fffffff ffffb704`859c2b30 ffffb704`8cff4cc0 : nt!KiDispatchInterruptContinue
ffffb487`e69af560 fffff800`0e120d50 : fffff800`28e3de1e ffffb487`e69af750 ffffb487`e69af920 00000000`00000018 : nt!KiDpcInterrupt+0x2ee
ffffb487`e69af6f8 fffff800`28e3de1e : ffffb487`e69af750 ffffb487`e69af920 00000000`00000018 fffff800`28e929ac : nt!KzLowerIrql+0x20
ffffb487`e69af700 ffffb487`e69af750 : ffffb487`e69af920 00000000`00000018 fffff800`28e929ac ffffb704`7bbe9040 : cfosspeed6+0xade1e
ffffb487`e69af708 ffffb487`e69af920 : 00000000`00000018 fffff800`28e929ac ffffb704`7bbe9040 fffff800`28e3e34d : 0xffffb487`e69af750
ffffb487`e69af710 00000000`00000018 : fffff800`28e929ac ffffb704`7bbe9040 fffff800`28e3e34d ffffb704`8686bc90 : 0xffffb487`e69af920
ffffb487`e69af718 fffff800`28e929ac : ffffb704`7bbe9040 fffff800`28e3e34d ffffb704`8686bc90 ffffb487`e69af930 : 0x18
ffffb487`e69af720 ffffb704`7bbe9040 : fffff800`28e3e34d ffffb704`8686bc90 ffffb487`e69af930 ffffb487`e69af7d0 : cfosspeed6+0x1029ac
ffffb487`e69af728 fffff800`28e3e34d : ffffb704`8686bc90 ffffb487`e69af930 ffffb487`e69af7d0 00000000`00000000 : 0xffffb704`7bbe9040
ffffb487`e69af730 ffffb704`8686bc90 : ffffb487`e69af930 ffffb487`e69af7d0 00000000`00000000 00000000`00000000 : cfosspeed6+0xae34d
ffffb487`e69af738 ffffb487`e69af930 : ffffb487`e69af7d0 00000000`00000000 00000000`00000000 ffffb704`8686be20 : 0xffffb704`8686bc90
ffffb487`e69af740 ffffb487`e69af7d0 : 00000000`00000000 00000000`00000000 ffffb704`8686be20 ffffb487`e69af800 : 0xffffb487`e69af930
ffffb487`e69af748 00000000`00000000 : 00000000`00000000 ffffb704`8686be20 ffffb487`e69af800 fffff800`28f1b900 : 0xffffb487`e69af7d0
SYMBOL_NAME: NETIO!PplGenericAllocateFunction+1c
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1c
FAILURE_BUCKET_ID: 0x133_DPC_NETIO!PplGenericAllocateFunction
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {34812c13-3484-8100-3f56-b8a48cf6380b}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff807077fbdd7, The address that the exception occurred at
Arg3: fffffe0f9cefe418, Parameter 0 of the exception
Arg4: ffffc9812ce7f920, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8109
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 28896
Key : Analysis.Memory.CommitPeak.Mb
Value: 87
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff807077fbdd7
BUGCHECK_P3: fffffe0f9cefe418
BUGCHECK_P4: ffffc9812ce7f920
WRITE_ADDRESS: fffff807080fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8070800f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8070800f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffc9812ce7f920
EXCEPTION_PARAMETER1: fffffe0f9cefe418
EXCEPTION_PARAMETER2: ffffc9812ce7f920
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: nvcontainer.exe
TRAP_FRAME: fffff8000e0f0117 -- (.trap 0xfffff8000e0f0117)
Unable to read trap frame at fffff800`0e0f0117
BAD_STACK_POINTER: ffffc9812ce7f0a8
STACK_TEXT:
ffffc981`2ce7f0a8 fffff807`0790ed9f : 00000000`0000001e ffffffff`c0000005 fffff807`077fbdd7 fffffe0f`9cefe418 : nt!KeBugCheckEx
ffffc981`2ce7f0b0 fffff807`0780f4d6 : ffffc981`2ce7f920 fffff807`07653a05 fffffe0f`9cefe650 fffff807`077fbdd7 : nt!KiFatalFilter+0x1f
ffffc981`2ce7f0f0 fffff807`077cae5f : fffff807`00000002 fffff807`074d2f90 fffffe0f`9cef9000 fffffe0f`9cf00000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
ffffc981`2ce7f130 fffff807`077fcd5f : fffff807`074d2f90 ffffc981`2ce7f710 fffff807`077cadc0 00000000`00000000 : nt!_C_specific_handler+0x9f
ffffc981`2ce7f1a0 fffff807`07685027 : ffffc981`2ce7f710 00000000`00000000 fffffe0f`9ceff1a0 fffff807`076b8908 : nt!RtlpExecuteHandlerForException+0xf
ffffc981`2ce7f1d0 fffff807`07683ce6 : fffffe0f`9cefe418 ffffc981`2ce7fe20 fffffe0f`9cefe418 ffffe58e`60db1d90 : nt!RtlDispatchException+0x297
ffffc981`2ce7f8f0 fffff807`077f4d32 : ffff9380`ca486210 ffffffff`c0000005 fffff800`0e0f0117 ffff9880`47686210 : nt!KiDispatchException+0x186
ffffc981`2ce7ffb0 fffff807`077f4d00 : fffff807`07805fa5 00001a71`00000004 fffff807`0b9a2ae5 ffffe58e`5f0ec601 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffffe0f`9cefe2d8 fffff807`07805fa5 : 00001a71`00000004 fffff807`0b9a2ae5 ffffe58e`5f0ec601 ffffe58e`5ede7860 : nt!KiExceptionDispatchOnExceptionStackContinue
fffffe0f`9cefe2e0 fffff807`07801ce0 : fffff807`0d651000 ffffe58e`5f0ec670 ffffe58e`00000000 fffff807`0d0d4f90 : nt!KiExceptionDispatch+0x125
fffffe0f`9cefe4c0 fffff807`077fbdd7 : ffffe58e`5bbc2e80 fffff807`20796d7c 00000000`00020001 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
fffffe0f`9cefe650 fffff807`20796d7c : 00000000`00020001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault
fffffe0f`9cefe660 fffff807`207944fc : ffffe58e`5b88d8c0 ffffe58e`60db1d90 fffffe0f`9cefe920 00000000`00000000 : Ndu!PplGenericAllocateFunction+0x1c
fffffe0f`9cefe6a0 fffff807`0d258c5f : 00000000`00000000 fffffe0f`9cefe7a9 50dd59d7`00000004 fffffe0f`9cefea70 : Ndu!NduOutboundTransportClassify+0x38c
fffffe0f`9cefe740 fffff807`0d33cdab : ffffe58e`540bd8a8 fffff807`077fbdc7 ffffe58e`5ea7fbb0 ffffe58e`5ea7fbb0 : NETIO!KfdClassify2+0x19f
fffffe0f`9cefe810 fffff807`0d33bfdb : ffffe58e`540bd988 00000000`0000060c 00000000`0000ff00 ffffe58e`540bd8a8 : tcpip!IppInspectLocalDatagramsOut+0x6cb
fffffe0f`9cefeae0 fffff807`0d33bba0 : 00000000`00010e00 00000000`0000ffff fffff807`0d4da230 ffffe58e`5ea7fbb0 : tcpip!IppSendDatagramsCommon+0x41b
fffffe0f`9cefec60 fffff807`0d3493ae : ffffe58e`542ea370 00000000`00000000 ffffe58e`62200000 00000000`00000000 : tcpip!IpNlpSendDatagrams+0x40
fffffe0f`9cefeca0 fffff807`0d34b904 : fffffe0f`9ceff280 fffffe0f`9ceff310 fffffe0f`9ceff120 00000000`00000000 : tcpip!TcpTcbSend+0xdde
fffffe0f`9ceff020 fffff807`0d34b56e : 00000000`00000000 00000000`00000000 fffffe0f`9ceff280 fffff807`0d34b540 : tcpip!TcpEnqueueTcbSend+0x374
fffffe0f`9ceff160 fffff807`076b8908 : ffffe58e`5e9d2d01 00000000`00000000 00000000`00000000 00000000`00000001 : tcpip!TcpTlConnectionSendCalloutRoutine+0x2e
fffffe0f`9ceff1a0 fffff807`076b887d : fffff807`0d34b540 fffffe0f`9ceff280 ffffe58e`61c421b8 ffffe58e`61e921b8 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffffe0f`9ceff210 fffff807`0d2e49e0 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff807`077fac9f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffffe0f`9ceff250 fffff807`22f8c0d0 : ffffe58e`61c421b8 ffffe58e`5e9d2dc0 00000000`00000081 ffffe58e`61c421b8 : tcpip!TcpTlConnectionSend+0x80
fffffe0f`9ceff2c0 fffff807`22f8befa : ffffe58e`5e9d2dc0 fffffe0f`9ceffa80 ffffe58e`606b4c30 ffffe58e`61c427e0 : afd!AfdTLStartBufferedVcSend+0xa0
fffffe0f`9ceff370 fffff807`22f71720 : ffffe58e`61c421b8 00000000`00000000 00000000`00000081 fffffe0f`9ceff868 : afd!AfdFastConnectionSend+0x2a2
fffffe0f`9ceff440 fffff807`07aa6622 : 00000000`00000000 00000000`0001201f fffffe0f`9ceffa80 ffffe58e`5eadcbc0 : afd!AfdFastIoDeviceControl+0xf90
fffffe0f`9ceff7e0 fffff807`07aa6286 : 00000000`00000001 00000000`00000d70 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382
fffffe0f`9ceff920 fffff807`078058b5 : 00000000`00000000 00000000`00000000 00000000`00000102 ffffe58e`61b30ee0 : nt!NtDeviceIoControlFile+0x56
fffffe0f`9ceff990 00007ff9`6ae0bea4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000f2`e3eff978 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`6ae0bea4
SYMBOL_NAME: Ndu!PplGenericAllocateFunction+1c
MODULE_NAME: Ndu
IMAGE_NAME: Ndu.sys
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1c
FAILURE_BUCKET_ID: 0x1E_c0000005_STACKPTR_ERROR_Ndu!PplGenericAllocateFunction
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {040fbfea-4e33-dce2-4a10-b9c4b0dd9e1c}
Followup: MachineOwner
---------
Xbox kontrolcüsünün bağlantısını kesin. Belleklere test yapın.
Memtest86 USB'den Çalışan RAM Test Programı
RAM'lerinizi test etmek için kullanabileceğiniz en kapsamlı yazılım Memtest86'dır. Aracı USB belleğe yazmak için: Bu video rehberde Memtest86 ile belleklerinizi nasıl test edeceğinizi öğrenebilirsiniz: Adım adım: Öncelikle yazılımı buradan indirin. UEFI desteği olmayan eski sistemler...www.technopat.net
Ağ sürücülerinizi güncelleyin, Wi-Fi adaptörü kullanıyorsanız modelini belirtin.
Ek MSI yazılımlarını kaldırın. Çipset sürücünüzü de güncelleyin.
Kod:PFN_LIST_CORRUPT (4e) Typically caused by drivers passing bad memory descriptor lists (ie: calling. MmUnlockPages twice with the same list, etc). If a kernel debugger is. available get the stack trace. Arguments: Arg1: 0000000000000007, A driver has unlocked a page more times than it locked it. Arg2: 00000000001002ff, page frame number. Arg3: 060002e0002efbfe, current share count. Arg4: 0000000000000000, 0. Debugging Details: ------------------ KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 7124. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on BORA. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 32449. Key : Analysis.Memory.CommitPeak.Mb. Value: 77. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 4e. BUGCHECK_P1: 7. BUGCHECK_P2: 1002ff. BUGCHECK_P3: 60002e0002efbfe. BUGCHECK_P4: 0. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: GPU-Z.2.35.0.exe. STACK_TEXT: ffffbd01`c8d7eef8 fffff806`23e8bce1 : 00000000`0000004e 00000000`00000007 00000000`001002ff 060002e0`002efbfe : nt!KeBugCheckEx. ffffbd01`c8d7ef00 fffff806`23d349e0 : 00000000`00000000 ffffb480`03008fd0 00000000`00000000 00000000`00000000 : nt!MiPfnReferenceCountIsZero+0x14f7f1. ffffbd01`c8d7ef40 fffff806`23d7bff5 : ffffa90f`00000000 ffffbd01`c8d7f0a0 00000000`00000000 00000000`00000002 : nt!MiRemoveLockedPageChargeAndDecRef+0x230. ffffbd01`c8d7ef70 fffff806`23d4820b : 00000000`001002ff 00000000`00000003 00000000`00040246 fffff806`23d2224e : nt!MiDoubleUnlockMdlPage+0x1d. ffffbd01`c8d7efa0 fffff806`23d49cae : ffffbd01`c8d7f578 ffff8800`00028b80 00000000`00000000 ffff8800`00028b80 : nt!MiDeletePteRun+0x4cb. ffffbd01`c8d7f1b0 fffff806`23d4a88b : ffffbd01`c8d7f2e0 00000000`00000000 ffff8800`00028b80 00000000`00000000 : nt!MiDeleteVaTail+0x6e. ffffbd01`c8d7f1e0 fffff806`23d22ae0 : 00000000`00000002 ffffbd01`00000000 ffff9f87`890fa550 ffff9f87`99850080 : nt!MiDeletePagablePteRange+0x4ab. ffffbd01`c8d7f4f0 fffff806`241517ff : ffff9f87`90e04ed0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360. ffffbd01`c8d7f600 fffff806`23d1d713 : ffff9f87`8531c610 00000000`00000001 00000000`00000000 fffff806`23c9ccce : nt!MiUnmapLockedPagesInUserSpace+0xc3. ffffbd01`c8d7f680 fffff806`7ea0210d : 00000000`000000c8 ffff9f87`8f2941a0 00000000`00000000 00000000`20206f49 : nt!MmUnmapLockedPages+0xf3. ffffbd01`c8d7f6b0 00000000`000000c8 : ffff9f87`8f2941a0 00000000`00000000 00000000`20206f49 ffff9f87`96605250 : GPU_Z_v2+0x210d. ffffbd01`c8d7f6b8 ffff9f87`8f2941a0 : 00000000`00000000 00000000`20206f49 ffff9f87`96605250 ffff9f87`8f294050 : 0xc8. ffffbd01`c8d7f6c0 00000000`00000000 : 00000000`20206f49 ffff9f87`96605250 ffff9f87`8f294050 ffff9f87`96605250 : 0xffff9f87`8f2941a0. SYMBOL_NAME: nt!MiPfnReferenceCountIsZero+14f7f1. MODULE_NAME: nt. IMAGE_VERSION: 10.0.19041.572. STACK_COMMAND: .thread ; .cxr ; kb. IMAGE_NAME: ntkrnlmp.exe. BUCKET_ID_FUNC_OFFSET: 14f7f1. FAILURE_BUCKET_ID: 0x4E_7_nt!MiPfnReferenceCountIsZero. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {d4c4fdf2-bb42-a5bb-4f52-718a7a31638a} Followup: MachineOwner. --------- KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints. the driver/function that caused the problem. Always note this address. as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled. Arg2: fffff800503fbdd7, The address that the exception occurred at. Arg3: ffff88829880e418, Parameter 0 of the exception. Arg4: ffff8f00dd8fd920, Parameter 1 of the exception. Debugging Details: ------------------ KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 7530. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on BORA. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 24213. Key : Analysis.Memory.CommitPeak.Mb. Value: 86. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 1e. BUGCHECK_P1: ffffffffc0000005. BUGCHECK_P2: fffff800503fbdd7. BUGCHECK_P3: ffff88829880e418. BUGCHECK_P4: ffff8f00dd8fd920. WRITE_ADDRESS: fffff80050cfa390: Unable to get MiVisibleState. Unable to get NonPagedPoolStart. Unable to get NonPagedPoolEnd. Unable to get PagedPoolStart. Unable to get PagedPoolEnd. fffff80050c0f2e0: Unable to get Flags value from nt!KdVersionBlock. fffff80050c0f2e0: Unable to get Flags value from nt!KdVersionBlock. unable to get nt!MmSpecialPagesInUse. ffff8f00dd8fd920. EXCEPTION_PARAMETER1: ffff88829880e418. EXCEPTION_PARAMETER2: ffff8f00dd8fd920. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: nvcontainer.exe. TRAP_FRAME: 48fffffb38e90000 -- (.trap 0x48fffffb38e90000) Unable to read trap frame at 48fffffb`38e90000. BAD_STACK_POINTER: ffff8f00dd8fd0a8. STACK_TEXT: ffff8f00`dd8fd0a8 fffff800`5050ed9f : 00000000`0000001e ffffffff`c0000005 fffff800`503fbdd7 ffff8882`9880e418 : nt!KeBugCheckEx. ffff8f00`dd8fd0b0 fffff800`5040f4d6 : ffff8f00`dd8fd920 fffff800`50253a05 ffff8882`9880e650 fffff800`503fbdd7 : nt!KiFatalFilter+0x1f. ffff8f00`dd8fd0f0 fffff800`503cae5f : fffff800`00000002 fffff800`500d2f90 ffff8882`98809000 ffff8882`98810000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16. ffff8f00`dd8fd130 fffff800`503fcd5f : fffff800`500d2f90 ffff8f00`dd8fd710 fffff800`503cadc0 00000000`00000000 : nt!_C_specific_handler+0x9f. ffff8f00`dd8fd1a0 fffff800`50285027 : ffff8f00`dd8fd710 00000000`00000000 ffff8882`9880f1a0 fffff800`502b8908 : nt!RtlpExecuteHandlerForException+0xf. ffff8f00`dd8fd1d0 fffff800`50283ce6 : ffff8882`9880e418 ffff8f00`dd8fde20 ffff8882`9880e418 ffffd902`4991fd70 : nt!RtlDispatchException+0x297. ffff8f00`dd8fd8f0 fffff800`503f4d32 : 840fffff`80520539 0014b941`00000480 48fffffb`38e90000 66c93345`d274d285 : nt!KiDispatchException+0x186. ffff8f00`dd8fdfb0 fffff800`503f4d00 : fffff800`50405fa5 00000000`00000000 fffff800`00000004 ffffd902`47df1301 : nt!KxExceptionDispatchOnExceptionStack+0x12. ffff8882`9880e2d8 fffff800`50405fa5 : 00000000`00000000 fffff800`00000004 ffffd902`47df1301 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue. ffff8882`9880e2e0 fffff800`50401ce0 : fffff800`55251000 ffffd902`47df1340 ffffd902`00000000 fffff800`54cd4f90 : nt!KiExceptionDispatch+0x125. ffff8882`9880e4c0 fffff800`503fbdd7 : ffffd902`43b17500 fffff800`6d8d6d7c 00000000`00020001 00000000`00000000 : nt!KiGeneralProtectionFault+0x320. ffff8882`9880e650 fffff800`6d8d6d7c : 00000000`00020001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault. ffff8882`9880e660 fffff800`6d8d44fc : ffffd902`498598d0 ffffd902`4991fd70 ffff8882`9880e920 00000000`00000000 : Ndu!PplGenericAllocateFunction+0x1c. ffff8882`9880e6a0 fffff800`54e58c5f : 00000000`00000000 ffff8882`9880e7a9 00000000`00000004 ffff8882`9880ea70 : Ndu!NduOutboundTransportClassify+0x38c. ffff8882`9880e740 fffff800`54f3cdab : ffffd902`3c1c38a8 ffff8882`00000230 ffffd902`4437f340 ffffd902`4437f340 : NETIO!KfdClassify2+0x19f. ffff8882`9880e810 fffff800`54f3bfdb : ffffd902`3c1c3988 00000000`0000060c 00000000`0000ff00 ffffd902`3c1c38a8 : tcpip!IppInspectLocalDatagramsOut+0x6cb. ffff8882`9880eae0 fffff800`54f3bba0 : 00000000`00009e00 00000000`0000ffff fffff800`550da230 ffffd902`4437f340 : tcpip!IppSendDatagramsCommon+0x41b. ffff8882`9880ec60 fffff800`54f493ae : ffffd902`3c040490 00000000`00000000 00000000`00200000 00000000`00000000 : tcpip!IpNlpSendDatagrams+0x40. ffff8882`9880eca0 fffff800`54f4b904 : ffff8882`9880f280 ffff8882`9880f310 ffff8882`9880f120 00000000`00000000 : tcpip!TcpTcbSend+0xdde. ffff8882`9880f020 fffff800`54f4b56e : 00000000`00000000 00000000`00000000 ffff8882`9880f280 fffff800`54f4b540 : tcpip!TcpEnqueueTcbSend+0x374. ffff8882`9880f160 fffff800`502b8908 : ffffd902`47f62101 00000000`00000000 e0cb7f01`00000000 00000000`00000001 : tcpip!TcpTlConnectionSendCalloutRoutine+0x2e. ffff8882`9880f1a0 fffff800`502b887d : fffff800`54f4b540 ffff8882`9880f280 ffffd902`49c5f1b8 ffffd902`49bb91b8 : nt!KeExpandKernelStackAndCalloutInternal+0x78. ffff8882`9880f210 fffff800`54ee49e0 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff3ec`8124ddd0 : nt!KeExpandKernelStackAndCalloutEx+0x1d. ffff8882`9880f250 fffff800`6a33c0d0 : ffffd902`49c5f1b8 ffffd902`47f62150 00000000`00000081 ffffd902`49c5f1b8 : tcpip!TcpTlConnectionSend+0x80. ffff8882`9880f2c0 fffff800`6a33befa : ffffd902`47f62150 ffff8882`9880fa80 ffffd902`447f8ce0 ffffd902`49c5f7e0 : afd!AfdTLStartBufferedVcSend+0xa0. ffff8882`9880f370 fffff800`6a321720 : ffffd902`49c5f1b8 ffffd902`4990cae0 00000000`00000081 ffff8882`9880f868 : afd!AfdFastConnectionSend+0x2a2. ffff8882`9880f440 fffff800`506a6622 : 00000000`00000000 00000000`0001201f ffff8882`9880fa80 ffffd902`497b20a0 : afd!AfdFastIoDeviceControl+0xf90. ffff8882`9880f7e0 fffff800`506a6286 : 00000000`00000001 00000000`00000c70 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382. ffff8882`9880f920 fffff800`504058b5 : 00000000`00000000 00000000`00000000 00000000`00000102 ffffd902`499374e0 : nt!NtDeviceIoControlFile+0x56. ffff8882`9880f990 00007ffc`e360bea4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25. 000000b8`afe6f2e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`e360bea4. SYMBOL_NAME: Ndu!PplGenericAllocateFunction+1c. MODULE_NAME: Ndu. IMAGE_NAME: Ndu.sys. IMAGE_VERSION: 10.0.19041.1030. STACK_COMMAND: .thread ; .cxr ; kb. BUCKET_ID_FUNC_OFFSET: 1c. FAILURE_BUCKET_ID: 0x1E_c0000005_STACKPTR_ERROR_Ndu!PplGenericAllocateFunction. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {040fbfea-4e33-dce2-4a10-b9c4b0dd9e1c} Followup: MachineOwner. --------- DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL. or above. Arguments: Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending. component can usually be identified with a stack trace. Arg2: 0000000000000501, The DPC time count (in ticks). Arg3: 0000000000000500, The DPC time allotment (in ticks). Arg4: fffff8000eafa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains. additional information regarding this single DPC timeout. Debugging Details: ------------------ ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: TickPeriods *** *** *** ************************************************************************* *** WARNING: Unable to verify timestamp for win32k.sys. KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 9265. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on BORA. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 37014. Key : Analysis.Memory.CommitPeak.Mb. Value: 95. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 133. BUGCHECK_P1: 0. BUGCHECK_P2: 501. BUGCHECK_P3: 500. BUGCHECK_P4: fffff8000eafa320. DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED. TRAP_FRAME: ffffb487e6276c70 -- (.trap 0xffffb487e6276c70) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000c2ed002f rbx=0000000000000000 rcx=ffffb70400000000. rdx=ffffb70400000000 rsi=0000000000000000 rdi=0000000000000000. rip=fffff8000e1fbdd7 rsp=ffffb487e6276e00 rbp=0000000000000001. r8=ffffb70400000000 r9=ffffb7047b69ce40 r10=ffffb7047b69d580. r11=000000000000004f r12=0000000000000000 r13=0000000000000000. r14=0000000000000000 r15=0000000000000000. iopl=0 nv up ei ng nz na po nc. nt!ExpInterlockedPopEntrySListFault: fffff800`0e1fbdd7 498b08 mov rcx,qword ptr [r8] ds:ffffb704`00000000=???????????????? Resetting default scope. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: System. DPC_STACK_BASE: FFFFB487E6277FB0. STACK_TEXT: ffff9380`ca5b6e18 fffff800`0e27955a : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx. ffff9380`ca5b6e20 fffff800`0e10518d : 0000010f`d74a45eb 00000000`00000000 ffffb487`e6276b00 ffff9380`ca59d180 : nt!KeAccumulateTicks+0x17110a. ffff9380`ca5b6e80 fffff800`0e10500a : ffffb704`798de600 ffffb487`e6276b60 00000000`00006382 00000000`00000003 : nt!KeClockInterruptNotify+0xbd. ffff9380`ca5b6f30 fffff800`0e080795 : ffffb704`798de600 00000000`00000000 00000000`00000000 ffff1e84`b8cc0d0e : nt!HalpTimerClockIpiRoutine+0x1a. ffff9380`ca5b6f60 fffff800`0e1f594a : ffffb487`e6276b60 ffffb704`798de600 00000000`00000001 f9a827e7`c5a896ab : nt!KiCallInterruptServiceRoutine+0xa5. ffff9380`ca5b6fb0 fffff800`0e1f5eb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa. ffffb487`e6276ae0 fffff800`0e202015 : ffffb704`8d01b8c0 00000000`00000000 00000000`5f636357 00000000`0000016a : nt!KiInterruptDispatchNoLockNoEtw+0x37. ffffb487`e6276c70 fffff800`0e1fbdd7 : ffffb704`7b69d580 fffff800`12e5b4cc 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x315. ffffb487`e6276e00 fffff800`12e5b4cc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault. ffffb487`e6276e10 fffff800`12e423d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!PplGenericAllocateFunction+0x1c. ffffb487`e6276e50 fffff800`131d135c : 00000000`00000000 ffffb704`8d01b8c0 ffffb704`82760bc0 00000000`00000000 : NETIO!WfpNblInfoAlloc+0x94. ffffb487`e6276e90 fffff800`131d12bb : 00000000`00000000 ffffb704`85659ae0 ffffb704`82760bc0 fffff800`2a496d7c : fwpkclnt!FwppNetBufferListAssociateContext+0x7c. ffffb487`e6276f30 fffff800`2a4943bd : 00000000`00000002 ffffb704`8ab293b0 ffffb487`e6277210 fffff800`131d1200 : fwpkclnt!FwpsNetBufferListAssociateContext1+0x7b. ffffb487`e6276f90 fffff800`12e58c5f : 00000000`00000000 ffffb487`e6277099 00000000`00000000 ffffb487`e6277360 : Ndu!NduOutboundTransportClassify+0x24d. ffffb487`e6277030 fffff800`12f3cdab : ffffb704`820c5b10 00000000`00000004 ffffb704`89680310 ffffb704`89680310 : NETIO!KfdClassify2+0x19f. ffffb487`e6277100 fffff800`12f3bfdb : ffffb704`7b7c4988 00000000`00000000 fffff800`0000001e 00000000`00000202 : tcpip!IppInspectLocalDatagramsOut+0x6cb. ffffb487`e62773d0 fffff800`12f38a09 : 00000000`00000000 00000000`00000000 fffff800`130da230 ffffb704`89680310 : tcpip!IppSendDatagramsCommon+0x41b. ffffb487`e6277550 fffff800`12f48ca5 : ffffb704`85399ee0 00000000`00000014 00000000`00000000 ffffb704`849d5040 : tcpip!IpNlpFastSendDatagram+0x349. ffffb487`e6277610 fffff800`12f2aa33 : 00000000`00000000 00000000`00000005 ffffb487`00000006 00000000`0005c53c : tcpip!TcpTcbSend+0x6d5. ffffb487`e6277990 fffff800`0e0e9a3e : ffff9380`ca5a0240 ffffb704`79a1f000 ffffb487`e6277e70 ffff9380`ca59d180 : tcpip!TcpPeriodicTimeoutHandler+0x1683. ffffb487`e6277bb0 fffff800`0e0e8d24 : ffff9380`ca59d180 00000000`00000000 00000000`00000008 00000000`00003704 : nt!KiExecuteAllDpcs+0x30e. ffffb487`e6277d20 fffff800`0e1faee5 : 00000000`00000000 ffff9380`ca59d180 00000000`00000000 ffffb487`e69af750 : nt!KiRetireDpcList+0x1f4. ffffb487`e6277fb0 fffff800`0e1facd0 : ffff9380`ca59d180 fffff800`0e0c92ea 00000000`00000000 ffffb704`00000000 : nt!KxRetireDpcList+0x5. ffffb487`e69af530 fffff800`0e1fa39e : 00000000`00000002 00000000`3fffffff ffffb704`859c2b30 ffffb704`8cff4cc0 : nt!KiDispatchInterruptContinue. ffffb487`e69af560 fffff800`0e120d50 : fffff800`28e3de1e ffffb487`e69af750 ffffb487`e69af920 00000000`00000018 : nt!KiDpcInterrupt+0x2ee. ffffb487`e69af6f8 fffff800`28e3de1e : ffffb487`e69af750 ffffb487`e69af920 00000000`00000018 fffff800`28e929ac : nt!KzLowerIrql+0x20. ffffb487`e69af700 ffffb487`e69af750 : ffffb487`e69af920 00000000`00000018 fffff800`28e929ac ffffb704`7bbe9040 : cfosspeed6+0xade1e. ffffb487`e69af708 ffffb487`e69af920 : 00000000`00000018 fffff800`28e929ac ffffb704`7bbe9040 fffff800`28e3e34d : 0xffffb487`e69af750. ffffb487`e69af710 00000000`00000018 : fffff800`28e929ac ffffb704`7bbe9040 fffff800`28e3e34d ffffb704`8686bc90 : 0xffffb487`e69af920. ffffb487`e69af718 fffff800`28e929ac : ffffb704`7bbe9040 fffff800`28e3e34d ffffb704`8686bc90 ffffb487`e69af930 : 0x18. ffffb487`e69af720 ffffb704`7bbe9040 : fffff800`28e3e34d ffffb704`8686bc90 ffffb487`e69af930 ffffb487`e69af7d0 : cfosspeed6+0x1029ac. ffffb487`e69af728 fffff800`28e3e34d : ffffb704`8686bc90 ffffb487`e69af930 ffffb487`e69af7d0 00000000`00000000 : 0xffffb704`7bbe9040. ffffb487`e69af730 ffffb704`8686bc90 : ffffb487`e69af930 ffffb487`e69af7d0 00000000`00000000 00000000`00000000 : cfosspeed6+0xae34d. ffffb487`e69af738 ffffb487`e69af930 : ffffb487`e69af7d0 00000000`00000000 00000000`00000000 ffffb704`8686be20 : 0xffffb704`8686bc90. ffffb487`e69af740 ffffb487`e69af7d0 : 00000000`00000000 00000000`00000000 ffffb704`8686be20 ffffb487`e69af800 : 0xffffb487`e69af930. ffffb487`e69af748 00000000`00000000 : 00000000`00000000 ffffb704`8686be20 ffffb487`e69af800 fffff800`28f1b900 : 0xffffb487`e69af7d0. SYMBOL_NAME: NETIO!PplGenericAllocateFunction+1c. MODULE_NAME: NETIO. IMAGE_NAME: NETIO.SYS. IMAGE_VERSION: 10.0.19041.508. STACK_COMMAND: .thread ; .cxr ; kb. BUCKET_ID_FUNC_OFFSET: 1c. FAILURE_BUCKET_ID: 0x133_DPC_NETIO!PplGenericAllocateFunction. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {34812c13-3484-8100-3f56-b8a48cf6380b} Followup: MachineOwner. --------- KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints. the driver/function that caused the problem. Always note this address. as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled. Arg2: fffff807077fbdd7, The address that the exception occurred at. Arg3: fffffe0f9cefe418, Parameter 0 of the exception. Arg4: ffffc9812ce7f920, Parameter 1 of the exception. Debugging Details: ------------------ KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 8109. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on BORA. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 28896. Key : Analysis.Memory.CommitPeak.Mb. Value: 87. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 1e. BUGCHECK_P1: ffffffffc0000005. BUGCHECK_P2: fffff807077fbdd7. BUGCHECK_P3: fffffe0f9cefe418. BUGCHECK_P4: ffffc9812ce7f920. WRITE_ADDRESS: fffff807080fa390: Unable to get MiVisibleState. Unable to get NonPagedPoolStart. Unable to get NonPagedPoolEnd. Unable to get PagedPoolStart. Unable to get PagedPoolEnd. fffff8070800f2e0: Unable to get Flags value from nt!KdVersionBlock. fffff8070800f2e0: Unable to get Flags value from nt!KdVersionBlock. unable to get nt!MmSpecialPagesInUse. ffffc9812ce7f920. EXCEPTION_PARAMETER1: fffffe0f9cefe418. EXCEPTION_PARAMETER2: ffffc9812ce7f920. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: nvcontainer.exe. TRAP_FRAME: fffff8000e0f0117 -- (.trap 0xfffff8000e0f0117) Unable to read trap frame at fffff800`0e0f0117. BAD_STACK_POINTER: ffffc9812ce7f0a8. STACK_TEXT: ffffc981`2ce7f0a8 fffff807`0790ed9f : 00000000`0000001e ffffffff`c0000005 fffff807`077fbdd7 fffffe0f`9cefe418 : nt!KeBugCheckEx. ffffc981`2ce7f0b0 fffff807`0780f4d6 : ffffc981`2ce7f920 fffff807`07653a05 fffffe0f`9cefe650 fffff807`077fbdd7 : nt!KiFatalFilter+0x1f. ffffc981`2ce7f0f0 fffff807`077cae5f : fffff807`00000002 fffff807`074d2f90 fffffe0f`9cef9000 fffffe0f`9cf00000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16. ffffc981`2ce7f130 fffff807`077fcd5f : fffff807`074d2f90 ffffc981`2ce7f710 fffff807`077cadc0 00000000`00000000 : nt!_C_specific_handler+0x9f. ffffc981`2ce7f1a0 fffff807`07685027 : ffffc981`2ce7f710 00000000`00000000 fffffe0f`9ceff1a0 fffff807`076b8908 : nt!RtlpExecuteHandlerForException+0xf. ffffc981`2ce7f1d0 fffff807`07683ce6 : fffffe0f`9cefe418 ffffc981`2ce7fe20 fffffe0f`9cefe418 ffffe58e`60db1d90 : nt!RtlDispatchException+0x297. ffffc981`2ce7f8f0 fffff807`077f4d32 : ffff9380`ca486210 ffffffff`c0000005 fffff800`0e0f0117 ffff9880`47686210 : nt!KiDispatchException+0x186. ffffc981`2ce7ffb0 fffff807`077f4d00 : fffff807`07805fa5 00001a71`00000004 fffff807`0b9a2ae5 ffffe58e`5f0ec601 : nt!KxExceptionDispatchOnExceptionStack+0x12. fffffe0f`9cefe2d8 fffff807`07805fa5 : 00001a71`00000004 fffff807`0b9a2ae5 ffffe58e`5f0ec601 ffffe58e`5ede7860 : nt!KiExceptionDispatchOnExceptionStackContinue. fffffe0f`9cefe2e0 fffff807`07801ce0 : fffff807`0d651000 ffffe58e`5f0ec670 ffffe58e`00000000 fffff807`0d0d4f90 : nt!KiExceptionDispatch+0x125. fffffe0f`9cefe4c0 fffff807`077fbdd7 : ffffe58e`5bbc2e80 fffff807`20796d7c 00000000`00020001 00000000`00000000 : nt!KiGeneralProtectionFault+0x320. fffffe0f`9cefe650 fffff807`20796d7c : 00000000`00020001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault. fffffe0f`9cefe660 fffff807`207944fc : ffffe58e`5b88d8c0 ffffe58e`60db1d90 fffffe0f`9cefe920 00000000`00000000 : Ndu!PplGenericAllocateFunction+0x1c. fffffe0f`9cefe6a0 fffff807`0d258c5f : 00000000`00000000 fffffe0f`9cefe7a9 50dd59d7`00000004 fffffe0f`9cefea70 : Ndu!NduOutboundTransportClassify+0x38c. fffffe0f`9cefe740 fffff807`0d33cdab : ffffe58e`540bd8a8 fffff807`077fbdc7 ffffe58e`5ea7fbb0 ffffe58e`5ea7fbb0 : NETIO!KfdClassify2+0x19f. fffffe0f`9cefe810 fffff807`0d33bfdb : ffffe58e`540bd988 00000000`0000060c 00000000`0000ff00 ffffe58e`540bd8a8 : tcpip!IppInspectLocalDatagramsOut+0x6cb. fffffe0f`9cefeae0 fffff807`0d33bba0 : 00000000`00010e00 00000000`0000ffff fffff807`0d4da230 ffffe58e`5ea7fbb0 : tcpip!IppSendDatagramsCommon+0x41b. fffffe0f`9cefec60 fffff807`0d3493ae : ffffe58e`542ea370 00000000`00000000 ffffe58e`62200000 00000000`00000000 : tcpip!IpNlpSendDatagrams+0x40. fffffe0f`9cefeca0 fffff807`0d34b904 : fffffe0f`9ceff280 fffffe0f`9ceff310 fffffe0f`9ceff120 00000000`00000000 : tcpip!TcpTcbSend+0xdde. fffffe0f`9ceff020 fffff807`0d34b56e : 00000000`00000000 00000000`00000000 fffffe0f`9ceff280 fffff807`0d34b540 : tcpip!TcpEnqueueTcbSend+0x374. fffffe0f`9ceff160 fffff807`076b8908 : ffffe58e`5e9d2d01 00000000`00000000 00000000`00000000 00000000`00000001 : tcpip!TcpTlConnectionSendCalloutRoutine+0x2e. fffffe0f`9ceff1a0 fffff807`076b887d : fffff807`0d34b540 fffffe0f`9ceff280 ffffe58e`61c421b8 ffffe58e`61e921b8 : nt!KeExpandKernelStackAndCalloutInternal+0x78. fffffe0f`9ceff210 fffff807`0d2e49e0 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff807`077fac9f : nt!KeExpandKernelStackAndCalloutEx+0x1d. fffffe0f`9ceff250 fffff807`22f8c0d0 : ffffe58e`61c421b8 ffffe58e`5e9d2dc0 00000000`00000081 ffffe58e`61c421b8 : tcpip!TcpTlConnectionSend+0x80. fffffe0f`9ceff2c0 fffff807`22f8befa : ffffe58e`5e9d2dc0 fffffe0f`9ceffa80 ffffe58e`606b4c30 ffffe58e`61c427e0 : afd!AfdTLStartBufferedVcSend+0xa0. fffffe0f`9ceff370 fffff807`22f71720 : ffffe58e`61c421b8 00000000`00000000 00000000`00000081 fffffe0f`9ceff868 : afd!AfdFastConnectionSend+0x2a2. fffffe0f`9ceff440 fffff807`07aa6622 : 00000000`00000000 00000000`0001201f fffffe0f`9ceffa80 ffffe58e`5eadcbc0 : afd!AfdFastIoDeviceControl+0xf90. fffffe0f`9ceff7e0 fffff807`07aa6286 : 00000000`00000001 00000000`00000d70 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382. fffffe0f`9ceff920 fffff807`078058b5 : 00000000`00000000 00000000`00000000 00000000`00000102 ffffe58e`61b30ee0 : nt!NtDeviceIoControlFile+0x56. fffffe0f`9ceff990 00007ff9`6ae0bea4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25. 000000f2`e3eff978 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`6ae0bea4. SYMBOL_NAME: Ndu!PplGenericAllocateFunction+1c. MODULE_NAME: Ndu. IMAGE_NAME: Ndu.sys. IMAGE_VERSION: 10.0.19041.1030. STACK_COMMAND: .thread ; .cxr ; kb. BUCKET_ID_FUNC_OFFSET: 1c. FAILURE_BUCKET_ID: 0x1E_c0000005_STACKPTR_ERROR_Ndu!PplGenericAllocateFunction. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {040fbfea-4e33-dce2-4a10-b9c4b0dd9e1c} Followup: MachineOwner. ---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.