Çözüldü PFN list corrupt hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Çözüm
Evet, dahil. Testte sorun bulunamamış, bu iyi haber. Şimdi dediğim her şeyi yaptığınızdan emin olun ve sistemi bir süre gözlemleyin. Yine mavi ekran alırsanız yeni dosyaları paylaşırsınız. Sorun çözülmüşse de belirtirseniz sevinirim.
XBOX kontrolcüsünün bağlantısını kesin. Belleklere test yapın.

Ağ sürücülerinizi güncelleyin, Wi-Fİ adaptörü kullanıyorsanız modelini belirtin.

Ek MSI yazılımlarını kaldırın. Çipset sürücünüzü de güncelleyin.

Kod:
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000007, A driver has unlocked a page more times than it locked it
Arg2: 00000000001002ff, page frame number
Arg3: 060002e0002efbfe, current share count
Arg4: 0000000000000000, 0

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7124

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 32449

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  4e

BUGCHECK_P1: 7

BUGCHECK_P2: 1002ff

BUGCHECK_P3: 60002e0002efbfe

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  GPU-Z.2.35.0.exe

STACK_TEXT: 
ffffbd01`c8d7eef8 fffff806`23e8bce1     : 00000000`0000004e 00000000`00000007 00000000`001002ff 060002e0`002efbfe : nt!KeBugCheckEx
ffffbd01`c8d7ef00 fffff806`23d349e0     : 00000000`00000000 ffffb480`03008fd0 00000000`00000000 00000000`00000000 : nt!MiPfnReferenceCountIsZero+0x14f7f1
ffffbd01`c8d7ef40 fffff806`23d7bff5     : ffffa90f`00000000 ffffbd01`c8d7f0a0 00000000`00000000 00000000`00000002 : nt!MiRemoveLockedPageChargeAndDecRef+0x230
ffffbd01`c8d7ef70 fffff806`23d4820b     : 00000000`001002ff 00000000`00000003 00000000`00040246 fffff806`23d2224e : nt!MiDoubleUnlockMdlPage+0x1d
ffffbd01`c8d7efa0 fffff806`23d49cae     : ffffbd01`c8d7f578 ffff8800`00028b80 00000000`00000000 ffff8800`00028b80 : nt!MiDeletePteRun+0x4cb
ffffbd01`c8d7f1b0 fffff806`23d4a88b     : ffffbd01`c8d7f2e0 00000000`00000000 ffff8800`00028b80 00000000`00000000 : nt!MiDeleteVaTail+0x6e
ffffbd01`c8d7f1e0 fffff806`23d22ae0     : 00000000`00000002 ffffbd01`00000000 ffff9f87`890fa550 ffff9f87`99850080 : nt!MiDeletePagablePteRange+0x4ab
ffffbd01`c8d7f4f0 fffff806`241517ff     : ffff9f87`90e04ed0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
ffffbd01`c8d7f600 fffff806`23d1d713     : ffff9f87`8531c610 00000000`00000001 00000000`00000000 fffff806`23c9ccce : nt!MiUnmapLockedPagesInUserSpace+0xc3
ffffbd01`c8d7f680 fffff806`7ea0210d     : 00000000`000000c8 ffff9f87`8f2941a0 00000000`00000000 00000000`20206f49 : nt!MmUnmapLockedPages+0xf3
ffffbd01`c8d7f6b0 00000000`000000c8     : ffff9f87`8f2941a0 00000000`00000000 00000000`20206f49 ffff9f87`96605250 : GPU_Z_v2+0x210d
ffffbd01`c8d7f6b8 ffff9f87`8f2941a0     : 00000000`00000000 00000000`20206f49 ffff9f87`96605250 ffff9f87`8f294050 : 0xc8
ffffbd01`c8d7f6c0 00000000`00000000     : 00000000`20206f49 ffff9f87`96605250 ffff9f87`8f294050 ffff9f87`96605250 : 0xffff9f87`8f2941a0


SYMBOL_NAME:  nt!MiPfnReferenceCountIsZero+14f7f1

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  14f7f1

FAILURE_BUCKET_ID:  0x4E_7_nt!MiPfnReferenceCountIsZero

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d4c4fdf2-bb42-a5bb-4f52-718a7a31638a}

Followup:     MachineOwner
---------



KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800503fbdd7, The address that the exception occurred at
Arg3: ffff88829880e418, Parameter 0 of the exception
Arg4: ffff8f00dd8fd920, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7530

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 24213

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff800503fbdd7

BUGCHECK_P3: ffff88829880e418

BUGCHECK_P4: ffff8f00dd8fd920

WRITE_ADDRESS: fffff80050cfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80050c0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff80050c0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffff8f00dd8fd920

EXCEPTION_PARAMETER1:  ffff88829880e418

EXCEPTION_PARAMETER2:  ffff8f00dd8fd920

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  nvcontainer.exe

TRAP_FRAME:  48fffffb38e90000 -- (.trap 0x48fffffb38e90000)
Unable to read trap frame at 48fffffb`38e90000

BAD_STACK_POINTER:  ffff8f00dd8fd0a8

STACK_TEXT: 
ffff8f00`dd8fd0a8 fffff800`5050ed9f     : 00000000`0000001e ffffffff`c0000005 fffff800`503fbdd7 ffff8882`9880e418 : nt!KeBugCheckEx
ffff8f00`dd8fd0b0 fffff800`5040f4d6     : ffff8f00`dd8fd920 fffff800`50253a05 ffff8882`9880e650 fffff800`503fbdd7 : nt!KiFatalFilter+0x1f
ffff8f00`dd8fd0f0 fffff800`503cae5f     : fffff800`00000002 fffff800`500d2f90 ffff8882`98809000 ffff8882`98810000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
ffff8f00`dd8fd130 fffff800`503fcd5f     : fffff800`500d2f90 ffff8f00`dd8fd710 fffff800`503cadc0 00000000`00000000 : nt!_C_specific_handler+0x9f
ffff8f00`dd8fd1a0 fffff800`50285027     : ffff8f00`dd8fd710 00000000`00000000 ffff8882`9880f1a0 fffff800`502b8908 : nt!RtlpExecuteHandlerForException+0xf
ffff8f00`dd8fd1d0 fffff800`50283ce6     : ffff8882`9880e418 ffff8f00`dd8fde20 ffff8882`9880e418 ffffd902`4991fd70 : nt!RtlDispatchException+0x297
ffff8f00`dd8fd8f0 fffff800`503f4d32     : 840fffff`80520539 0014b941`00000480 48fffffb`38e90000 66c93345`d274d285 : nt!KiDispatchException+0x186
ffff8f00`dd8fdfb0 fffff800`503f4d00     : fffff800`50405fa5 00000000`00000000 fffff800`00000004 ffffd902`47df1301 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffff8882`9880e2d8 fffff800`50405fa5     : 00000000`00000000 fffff800`00000004 ffffd902`47df1301 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffff8882`9880e2e0 fffff800`50401ce0     : fffff800`55251000 ffffd902`47df1340 ffffd902`00000000 fffff800`54cd4f90 : nt!KiExceptionDispatch+0x125
ffff8882`9880e4c0 fffff800`503fbdd7     : ffffd902`43b17500 fffff800`6d8d6d7c 00000000`00020001 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
ffff8882`9880e650 fffff800`6d8d6d7c     : 00000000`00020001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault
ffff8882`9880e660 fffff800`6d8d44fc     : ffffd902`498598d0 ffffd902`4991fd70 ffff8882`9880e920 00000000`00000000 : Ndu!PplGenericAllocateFunction+0x1c
ffff8882`9880e6a0 fffff800`54e58c5f     : 00000000`00000000 ffff8882`9880e7a9 00000000`00000004 ffff8882`9880ea70 : Ndu!NduOutboundTransportClassify+0x38c
ffff8882`9880e740 fffff800`54f3cdab     : ffffd902`3c1c38a8 ffff8882`00000230 ffffd902`4437f340 ffffd902`4437f340 : NETIO!KfdClassify2+0x19f
ffff8882`9880e810 fffff800`54f3bfdb     : ffffd902`3c1c3988 00000000`0000060c 00000000`0000ff00 ffffd902`3c1c38a8 : tcpip!IppInspectLocalDatagramsOut+0x6cb
ffff8882`9880eae0 fffff800`54f3bba0     : 00000000`00009e00 00000000`0000ffff fffff800`550da230 ffffd902`4437f340 : tcpip!IppSendDatagramsCommon+0x41b
ffff8882`9880ec60 fffff800`54f493ae     : ffffd902`3c040490 00000000`00000000 00000000`00200000 00000000`00000000 : tcpip!IpNlpSendDatagrams+0x40
ffff8882`9880eca0 fffff800`54f4b904     : ffff8882`9880f280 ffff8882`9880f310 ffff8882`9880f120 00000000`00000000 : tcpip!TcpTcbSend+0xdde
ffff8882`9880f020 fffff800`54f4b56e     : 00000000`00000000 00000000`00000000 ffff8882`9880f280 fffff800`54f4b540 : tcpip!TcpEnqueueTcbSend+0x374
ffff8882`9880f160 fffff800`502b8908     : ffffd902`47f62101 00000000`00000000 e0cb7f01`00000000 00000000`00000001 : tcpip!TcpTlConnectionSendCalloutRoutine+0x2e
ffff8882`9880f1a0 fffff800`502b887d     : fffff800`54f4b540 ffff8882`9880f280 ffffd902`49c5f1b8 ffffd902`49bb91b8 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff8882`9880f210 fffff800`54ee49e0     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff3ec`8124ddd0 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffff8882`9880f250 fffff800`6a33c0d0     : ffffd902`49c5f1b8 ffffd902`47f62150 00000000`00000081 ffffd902`49c5f1b8 : tcpip!TcpTlConnectionSend+0x80
ffff8882`9880f2c0 fffff800`6a33befa     : ffffd902`47f62150 ffff8882`9880fa80 ffffd902`447f8ce0 ffffd902`49c5f7e0 : afd!AfdTLStartBufferedVcSend+0xa0
ffff8882`9880f370 fffff800`6a321720     : ffffd902`49c5f1b8 ffffd902`4990cae0 00000000`00000081 ffff8882`9880f868 : afd!AfdFastConnectionSend+0x2a2
ffff8882`9880f440 fffff800`506a6622     : 00000000`00000000 00000000`0001201f ffff8882`9880fa80 ffffd902`497b20a0 : afd!AfdFastIoDeviceControl+0xf90
ffff8882`9880f7e0 fffff800`506a6286     : 00000000`00000001 00000000`00000c70 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382
ffff8882`9880f920 fffff800`504058b5     : 00000000`00000000 00000000`00000000 00000000`00000102 ffffd902`499374e0 : nt!NtDeviceIoControlFile+0x56
ffff8882`9880f990 00007ffc`e360bea4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000b8`afe6f2e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`e360bea4


SYMBOL_NAME:  Ndu!PplGenericAllocateFunction+1c

MODULE_NAME: Ndu

IMAGE_NAME:  Ndu.sys

IMAGE_VERSION:  10.0.19041.1030

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1c

FAILURE_BUCKET_ID:  0x1E_c0000005_STACKPTR_ERROR_Ndu!PplGenericAllocateFunction

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {040fbfea-4e33-dce2-4a10-b9c4b0dd9e1c}

Followup:     MachineOwner
---------



DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
    component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff8000eafa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding this single DPC timeout

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 9265

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 37014

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 95

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  133

BUGCHECK_P1: 0

BUGCHECK_P2: 501

BUGCHECK_P3: 500

BUGCHECK_P4: fffff8000eafa320

DPC_TIMEOUT_TYPE:  SINGLE_DPC_TIMEOUT_EXCEEDED

TRAP_FRAME:  ffffb487e6276c70 -- (.trap 0xffffb487e6276c70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000c2ed002f rbx=0000000000000000 rcx=ffffb70400000000
rdx=ffffb70400000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000e1fbdd7 rsp=ffffb487e6276e00 rbp=0000000000000001
 r8=ffffb70400000000  r9=ffffb7047b69ce40 r10=ffffb7047b69d580
r11=000000000000004f r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!ExpInterlockedPopEntrySListFault:
fffff800`0e1fbdd7 498b08          mov     rcx,qword ptr [r8] ds:ffffb704`00000000=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

DPC_STACK_BASE:  FFFFB487E6277FB0

STACK_TEXT: 
ffff9380`ca5b6e18 fffff800`0e27955a     : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
ffff9380`ca5b6e20 fffff800`0e10518d     : 0000010f`d74a45eb 00000000`00000000 ffffb487`e6276b00 ffff9380`ca59d180 : nt!KeAccumulateTicks+0x17110a
ffff9380`ca5b6e80 fffff800`0e10500a     : ffffb704`798de600 ffffb487`e6276b60 00000000`00006382 00000000`00000003 : nt!KeClockInterruptNotify+0xbd
ffff9380`ca5b6f30 fffff800`0e080795     : ffffb704`798de600 00000000`00000000 00000000`00000000 ffff1e84`b8cc0d0e : nt!HalpTimerClockIpiRoutine+0x1a
ffff9380`ca5b6f60 fffff800`0e1f594a     : ffffb487`e6276b60 ffffb704`798de600 00000000`00000001 f9a827e7`c5a896ab : nt!KiCallInterruptServiceRoutine+0xa5
ffff9380`ca5b6fb0 fffff800`0e1f5eb7     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffb487`e6276ae0 fffff800`0e202015     : ffffb704`8d01b8c0 00000000`00000000 00000000`5f636357 00000000`0000016a : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffb487`e6276c70 fffff800`0e1fbdd7     : ffffb704`7b69d580 fffff800`12e5b4cc 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x315
ffffb487`e6276e00 fffff800`12e5b4cc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault
ffffb487`e6276e10 fffff800`12e423d4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!PplGenericAllocateFunction+0x1c
ffffb487`e6276e50 fffff800`131d135c     : 00000000`00000000 ffffb704`8d01b8c0 ffffb704`82760bc0 00000000`00000000 : NETIO!WfpNblInfoAlloc+0x94
ffffb487`e6276e90 fffff800`131d12bb     : 00000000`00000000 ffffb704`85659ae0 ffffb704`82760bc0 fffff800`2a496d7c : fwpkclnt!FwppNetBufferListAssociateContext+0x7c
ffffb487`e6276f30 fffff800`2a4943bd     : 00000000`00000002 ffffb704`8ab293b0 ffffb487`e6277210 fffff800`131d1200 : fwpkclnt!FwpsNetBufferListAssociateContext1+0x7b
ffffb487`e6276f90 fffff800`12e58c5f     : 00000000`00000000 ffffb487`e6277099 00000000`00000000 ffffb487`e6277360 : Ndu!NduOutboundTransportClassify+0x24d
ffffb487`e6277030 fffff800`12f3cdab     : ffffb704`820c5b10 00000000`00000004 ffffb704`89680310 ffffb704`89680310 : NETIO!KfdClassify2+0x19f
ffffb487`e6277100 fffff800`12f3bfdb     : ffffb704`7b7c4988 00000000`00000000 fffff800`0000001e 00000000`00000202 : tcpip!IppInspectLocalDatagramsOut+0x6cb
ffffb487`e62773d0 fffff800`12f38a09     : 00000000`00000000 00000000`00000000 fffff800`130da230 ffffb704`89680310 : tcpip!IppSendDatagramsCommon+0x41b
ffffb487`e6277550 fffff800`12f48ca5     : ffffb704`85399ee0 00000000`00000014 00000000`00000000 ffffb704`849d5040 : tcpip!IpNlpFastSendDatagram+0x349
ffffb487`e6277610 fffff800`12f2aa33     : 00000000`00000000 00000000`00000005 ffffb487`00000006 00000000`0005c53c : tcpip!TcpTcbSend+0x6d5
ffffb487`e6277990 fffff800`0e0e9a3e     : ffff9380`ca5a0240 ffffb704`79a1f000 ffffb487`e6277e70 ffff9380`ca59d180 : tcpip!TcpPeriodicTimeoutHandler+0x1683
ffffb487`e6277bb0 fffff800`0e0e8d24     : ffff9380`ca59d180 00000000`00000000 00000000`00000008 00000000`00003704 : nt!KiExecuteAllDpcs+0x30e
ffffb487`e6277d20 fffff800`0e1faee5     : 00000000`00000000 ffff9380`ca59d180 00000000`00000000 ffffb487`e69af750 : nt!KiRetireDpcList+0x1f4
ffffb487`e6277fb0 fffff800`0e1facd0     : ffff9380`ca59d180 fffff800`0e0c92ea 00000000`00000000 ffffb704`00000000 : nt!KxRetireDpcList+0x5
ffffb487`e69af530 fffff800`0e1fa39e     : 00000000`00000002 00000000`3fffffff ffffb704`859c2b30 ffffb704`8cff4cc0 : nt!KiDispatchInterruptContinue
ffffb487`e69af560 fffff800`0e120d50     : fffff800`28e3de1e ffffb487`e69af750 ffffb487`e69af920 00000000`00000018 : nt!KiDpcInterrupt+0x2ee
ffffb487`e69af6f8 fffff800`28e3de1e     : ffffb487`e69af750 ffffb487`e69af920 00000000`00000018 fffff800`28e929ac : nt!KzLowerIrql+0x20
ffffb487`e69af700 ffffb487`e69af750     : ffffb487`e69af920 00000000`00000018 fffff800`28e929ac ffffb704`7bbe9040 : cfosspeed6+0xade1e
ffffb487`e69af708 ffffb487`e69af920     : 00000000`00000018 fffff800`28e929ac ffffb704`7bbe9040 fffff800`28e3e34d : 0xffffb487`e69af750
ffffb487`e69af710 00000000`00000018     : fffff800`28e929ac ffffb704`7bbe9040 fffff800`28e3e34d ffffb704`8686bc90 : 0xffffb487`e69af920
ffffb487`e69af718 fffff800`28e929ac     : ffffb704`7bbe9040 fffff800`28e3e34d ffffb704`8686bc90 ffffb487`e69af930 : 0x18
ffffb487`e69af720 ffffb704`7bbe9040     : fffff800`28e3e34d ffffb704`8686bc90 ffffb487`e69af930 ffffb487`e69af7d0 : cfosspeed6+0x1029ac
ffffb487`e69af728 fffff800`28e3e34d     : ffffb704`8686bc90 ffffb487`e69af930 ffffb487`e69af7d0 00000000`00000000 : 0xffffb704`7bbe9040
ffffb487`e69af730 ffffb704`8686bc90     : ffffb487`e69af930 ffffb487`e69af7d0 00000000`00000000 00000000`00000000 : cfosspeed6+0xae34d
ffffb487`e69af738 ffffb487`e69af930     : ffffb487`e69af7d0 00000000`00000000 00000000`00000000 ffffb704`8686be20 : 0xffffb704`8686bc90
ffffb487`e69af740 ffffb487`e69af7d0     : 00000000`00000000 00000000`00000000 ffffb704`8686be20 ffffb487`e69af800 : 0xffffb487`e69af930
ffffb487`e69af748 00000000`00000000     : 00000000`00000000 ffffb704`8686be20 ffffb487`e69af800 fffff800`28f1b900 : 0xffffb487`e69af7d0


SYMBOL_NAME:  NETIO!PplGenericAllocateFunction+1c

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1c

FAILURE_BUCKET_ID:  0x133_DPC_NETIO!PplGenericAllocateFunction

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {34812c13-3484-8100-3f56-b8a48cf6380b}

Followup:     MachineOwner
---------



KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff807077fbdd7, The address that the exception occurred at
Arg3: fffffe0f9cefe418, Parameter 0 of the exception
Arg4: ffffc9812ce7f920, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8109

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 28896

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 87

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff807077fbdd7

BUGCHECK_P3: fffffe0f9cefe418

BUGCHECK_P4: ffffc9812ce7f920

WRITE_ADDRESS: fffff807080fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8070800f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8070800f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffc9812ce7f920

EXCEPTION_PARAMETER1:  fffffe0f9cefe418

EXCEPTION_PARAMETER2:  ffffc9812ce7f920

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  nvcontainer.exe

TRAP_FRAME:  fffff8000e0f0117 -- (.trap 0xfffff8000e0f0117)
Unable to read trap frame at fffff800`0e0f0117

BAD_STACK_POINTER:  ffffc9812ce7f0a8

STACK_TEXT: 
ffffc981`2ce7f0a8 fffff807`0790ed9f     : 00000000`0000001e ffffffff`c0000005 fffff807`077fbdd7 fffffe0f`9cefe418 : nt!KeBugCheckEx
ffffc981`2ce7f0b0 fffff807`0780f4d6     : ffffc981`2ce7f920 fffff807`07653a05 fffffe0f`9cefe650 fffff807`077fbdd7 : nt!KiFatalFilter+0x1f
ffffc981`2ce7f0f0 fffff807`077cae5f     : fffff807`00000002 fffff807`074d2f90 fffffe0f`9cef9000 fffffe0f`9cf00000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
ffffc981`2ce7f130 fffff807`077fcd5f     : fffff807`074d2f90 ffffc981`2ce7f710 fffff807`077cadc0 00000000`00000000 : nt!_C_specific_handler+0x9f
ffffc981`2ce7f1a0 fffff807`07685027     : ffffc981`2ce7f710 00000000`00000000 fffffe0f`9ceff1a0 fffff807`076b8908 : nt!RtlpExecuteHandlerForException+0xf
ffffc981`2ce7f1d0 fffff807`07683ce6     : fffffe0f`9cefe418 ffffc981`2ce7fe20 fffffe0f`9cefe418 ffffe58e`60db1d90 : nt!RtlDispatchException+0x297
ffffc981`2ce7f8f0 fffff807`077f4d32     : ffff9380`ca486210 ffffffff`c0000005 fffff800`0e0f0117 ffff9880`47686210 : nt!KiDispatchException+0x186
ffffc981`2ce7ffb0 fffff807`077f4d00     : fffff807`07805fa5 00001a71`00000004 fffff807`0b9a2ae5 ffffe58e`5f0ec601 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffffe0f`9cefe2d8 fffff807`07805fa5     : 00001a71`00000004 fffff807`0b9a2ae5 ffffe58e`5f0ec601 ffffe58e`5ede7860 : nt!KiExceptionDispatchOnExceptionStackContinue
fffffe0f`9cefe2e0 fffff807`07801ce0     : fffff807`0d651000 ffffe58e`5f0ec670 ffffe58e`00000000 fffff807`0d0d4f90 : nt!KiExceptionDispatch+0x125
fffffe0f`9cefe4c0 fffff807`077fbdd7     : ffffe58e`5bbc2e80 fffff807`20796d7c 00000000`00020001 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
fffffe0f`9cefe650 fffff807`20796d7c     : 00000000`00020001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault
fffffe0f`9cefe660 fffff807`207944fc     : ffffe58e`5b88d8c0 ffffe58e`60db1d90 fffffe0f`9cefe920 00000000`00000000 : Ndu!PplGenericAllocateFunction+0x1c
fffffe0f`9cefe6a0 fffff807`0d258c5f     : 00000000`00000000 fffffe0f`9cefe7a9 50dd59d7`00000004 fffffe0f`9cefea70 : Ndu!NduOutboundTransportClassify+0x38c
fffffe0f`9cefe740 fffff807`0d33cdab     : ffffe58e`540bd8a8 fffff807`077fbdc7 ffffe58e`5ea7fbb0 ffffe58e`5ea7fbb0 : NETIO!KfdClassify2+0x19f
fffffe0f`9cefe810 fffff807`0d33bfdb     : ffffe58e`540bd988 00000000`0000060c 00000000`0000ff00 ffffe58e`540bd8a8 : tcpip!IppInspectLocalDatagramsOut+0x6cb
fffffe0f`9cefeae0 fffff807`0d33bba0     : 00000000`00010e00 00000000`0000ffff fffff807`0d4da230 ffffe58e`5ea7fbb0 : tcpip!IppSendDatagramsCommon+0x41b
fffffe0f`9cefec60 fffff807`0d3493ae     : ffffe58e`542ea370 00000000`00000000 ffffe58e`62200000 00000000`00000000 : tcpip!IpNlpSendDatagrams+0x40
fffffe0f`9cefeca0 fffff807`0d34b904     : fffffe0f`9ceff280 fffffe0f`9ceff310 fffffe0f`9ceff120 00000000`00000000 : tcpip!TcpTcbSend+0xdde
fffffe0f`9ceff020 fffff807`0d34b56e     : 00000000`00000000 00000000`00000000 fffffe0f`9ceff280 fffff807`0d34b540 : tcpip!TcpEnqueueTcbSend+0x374
fffffe0f`9ceff160 fffff807`076b8908     : ffffe58e`5e9d2d01 00000000`00000000 00000000`00000000 00000000`00000001 : tcpip!TcpTlConnectionSendCalloutRoutine+0x2e
fffffe0f`9ceff1a0 fffff807`076b887d     : fffff807`0d34b540 fffffe0f`9ceff280 ffffe58e`61c421b8 ffffe58e`61e921b8 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffffe0f`9ceff210 fffff807`0d2e49e0     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff807`077fac9f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffffe0f`9ceff250 fffff807`22f8c0d0     : ffffe58e`61c421b8 ffffe58e`5e9d2dc0 00000000`00000081 ffffe58e`61c421b8 : tcpip!TcpTlConnectionSend+0x80
fffffe0f`9ceff2c0 fffff807`22f8befa     : ffffe58e`5e9d2dc0 fffffe0f`9ceffa80 ffffe58e`606b4c30 ffffe58e`61c427e0 : afd!AfdTLStartBufferedVcSend+0xa0
fffffe0f`9ceff370 fffff807`22f71720     : ffffe58e`61c421b8 00000000`00000000 00000000`00000081 fffffe0f`9ceff868 : afd!AfdFastConnectionSend+0x2a2
fffffe0f`9ceff440 fffff807`07aa6622     : 00000000`00000000 00000000`0001201f fffffe0f`9ceffa80 ffffe58e`5eadcbc0 : afd!AfdFastIoDeviceControl+0xf90
fffffe0f`9ceff7e0 fffff807`07aa6286     : 00000000`00000001 00000000`00000d70 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382
fffffe0f`9ceff920 fffff807`078058b5     : 00000000`00000000 00000000`00000000 00000000`00000102 ffffe58e`61b30ee0 : nt!NtDeviceIoControlFile+0x56
fffffe0f`9ceff990 00007ff9`6ae0bea4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000f2`e3eff978 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`6ae0bea4


SYMBOL_NAME:  Ndu!PplGenericAllocateFunction+1c

MODULE_NAME: Ndu

IMAGE_NAME:  Ndu.sys

IMAGE_VERSION:  10.0.19041.1030

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1c

FAILURE_BUCKET_ID:  0x1E_c0000005_STACKPTR_ERROR_Ndu!PplGenericAllocateFunction

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {040fbfea-4e33-dce2-4a10-b9c4b0dd9e1c}

Followup:     MachineOwner
---------
 
Xbox kontrolcüsünün bağlantısını kesin. Belleklere test yapın.

Ağ sürücülerinizi güncelleyin, Wi-Fi adaptörü kullanıyorsanız modelini belirtin.

Ek MSI yazılımlarını kaldırın. Çipset sürücünüzü de güncelleyin.

Kod:
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling.
MmUnlockPages twice with the same list, etc). If a kernel debugger is.
available get the stack trace.
Arguments:
Arg1: 0000000000000007, A driver has unlocked a page more times than it locked it.
Arg2: 00000000001002ff, page frame number.
Arg3: 060002e0002efbfe, current share count.
Arg4: 0000000000000000, 0.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 7124.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on BORA.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 32449.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 77.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 4e.

BUGCHECK_P1: 7.

BUGCHECK_P2: 1002ff.

BUGCHECK_P3: 60002e0002efbfe.

BUGCHECK_P4: 0.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: GPU-Z.2.35.0.exe.

STACK_TEXT:
ffffbd01`c8d7eef8 fffff806`23e8bce1 : 00000000`0000004e 00000000`00000007 00000000`001002ff 060002e0`002efbfe : nt!KeBugCheckEx.
ffffbd01`c8d7ef00 fffff806`23d349e0 : 00000000`00000000 ffffb480`03008fd0 00000000`00000000 00000000`00000000 : nt!MiPfnReferenceCountIsZero+0x14f7f1.
ffffbd01`c8d7ef40 fffff806`23d7bff5 : ffffa90f`00000000 ffffbd01`c8d7f0a0 00000000`00000000 00000000`00000002 : nt!MiRemoveLockedPageChargeAndDecRef+0x230.
ffffbd01`c8d7ef70 fffff806`23d4820b : 00000000`001002ff 00000000`00000003 00000000`00040246 fffff806`23d2224e : nt!MiDoubleUnlockMdlPage+0x1d.
ffffbd01`c8d7efa0 fffff806`23d49cae : ffffbd01`c8d7f578 ffff8800`00028b80 00000000`00000000 ffff8800`00028b80 : nt!MiDeletePteRun+0x4cb.
ffffbd01`c8d7f1b0 fffff806`23d4a88b : ffffbd01`c8d7f2e0 00000000`00000000 ffff8800`00028b80 00000000`00000000 : nt!MiDeleteVaTail+0x6e.
ffffbd01`c8d7f1e0 fffff806`23d22ae0 : 00000000`00000002 ffffbd01`00000000 ffff9f87`890fa550 ffff9f87`99850080 : nt!MiDeletePagablePteRange+0x4ab.
ffffbd01`c8d7f4f0 fffff806`241517ff : ffff9f87`90e04ed0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360.
ffffbd01`c8d7f600 fffff806`23d1d713 : ffff9f87`8531c610 00000000`00000001 00000000`00000000 fffff806`23c9ccce : nt!MiUnmapLockedPagesInUserSpace+0xc3.
ffffbd01`c8d7f680 fffff806`7ea0210d : 00000000`000000c8 ffff9f87`8f2941a0 00000000`00000000 00000000`20206f49 : nt!MmUnmapLockedPages+0xf3.
ffffbd01`c8d7f6b0 00000000`000000c8 : ffff9f87`8f2941a0 00000000`00000000 00000000`20206f49 ffff9f87`96605250 : GPU_Z_v2+0x210d.
ffffbd01`c8d7f6b8 ffff9f87`8f2941a0 : 00000000`00000000 00000000`20206f49 ffff9f87`96605250 ffff9f87`8f294050 : 0xc8.
ffffbd01`c8d7f6c0 00000000`00000000 : 00000000`20206f49 ffff9f87`96605250 ffff9f87`8f294050 ffff9f87`96605250 : 0xffff9f87`8f2941a0.

SYMBOL_NAME: nt!MiPfnReferenceCountIsZero+14f7f1.

MODULE_NAME: nt.

IMAGE_VERSION: 10.0.19041.572.

STACK_COMMAND: .thread ; .cxr ; kb.

IMAGE_NAME: ntkrnlmp.exe.

BUCKET_ID_FUNC_OFFSET: 14f7f1.

FAILURE_BUCKET_ID: 0x4E_7_nt!MiPfnReferenceCountIsZero.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {d4c4fdf2-bb42-a5bb-4f52-718a7a31638a}

Followup: MachineOwner.
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled.
Arg2: fffff800503fbdd7, The address that the exception occurred at.
Arg3: ffff88829880e418, Parameter 0 of the exception.
Arg4: ffff8f00dd8fd920, Parameter 1 of the exception.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 7530.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on BORA.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 24213.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 86.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 1e.

BUGCHECK_P1: ffffffffc0000005.

BUGCHECK_P2: fffff800503fbdd7.

BUGCHECK_P3: ffff88829880e418.

BUGCHECK_P4: ffff8f00dd8fd920.

WRITE_ADDRESS: fffff80050cfa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff80050c0f2e0: Unable to get Flags value from nt!KdVersionBlock.
fffff80050c0f2e0: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
ffff8f00dd8fd920.

EXCEPTION_PARAMETER1: ffff88829880e418.

EXCEPTION_PARAMETER2: ffff8f00dd8fd920.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: nvcontainer.exe.

TRAP_FRAME: 48fffffb38e90000 -- (.trap 0x48fffffb38e90000)
Unable to read trap frame at 48fffffb`38e90000.

BAD_STACK_POINTER: ffff8f00dd8fd0a8.

STACK_TEXT:
ffff8f00`dd8fd0a8 fffff800`5050ed9f : 00000000`0000001e ffffffff`c0000005 fffff800`503fbdd7 ffff8882`9880e418 : nt!KeBugCheckEx.
ffff8f00`dd8fd0b0 fffff800`5040f4d6 : ffff8f00`dd8fd920 fffff800`50253a05 ffff8882`9880e650 fffff800`503fbdd7 : nt!KiFatalFilter+0x1f.
ffff8f00`dd8fd0f0 fffff800`503cae5f : fffff800`00000002 fffff800`500d2f90 ffff8882`98809000 ffff8882`98810000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16.
ffff8f00`dd8fd130 fffff800`503fcd5f : fffff800`500d2f90 ffff8f00`dd8fd710 fffff800`503cadc0 00000000`00000000 : nt!_C_specific_handler+0x9f.
ffff8f00`dd8fd1a0 fffff800`50285027 : ffff8f00`dd8fd710 00000000`00000000 ffff8882`9880f1a0 fffff800`502b8908 : nt!RtlpExecuteHandlerForException+0xf.
ffff8f00`dd8fd1d0 fffff800`50283ce6 : ffff8882`9880e418 ffff8f00`dd8fde20 ffff8882`9880e418 ffffd902`4991fd70 : nt!RtlDispatchException+0x297.
ffff8f00`dd8fd8f0 fffff800`503f4d32 : 840fffff`80520539 0014b941`00000480 48fffffb`38e90000 66c93345`d274d285 : nt!KiDispatchException+0x186.
ffff8f00`dd8fdfb0 fffff800`503f4d00 : fffff800`50405fa5 00000000`00000000 fffff800`00000004 ffffd902`47df1301 : nt!KxExceptionDispatchOnExceptionStack+0x12.
ffff8882`9880e2d8 fffff800`50405fa5 : 00000000`00000000 fffff800`00000004 ffffd902`47df1301 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue.
ffff8882`9880e2e0 fffff800`50401ce0 : fffff800`55251000 ffffd902`47df1340 ffffd902`00000000 fffff800`54cd4f90 : nt!KiExceptionDispatch+0x125.
ffff8882`9880e4c0 fffff800`503fbdd7 : ffffd902`43b17500 fffff800`6d8d6d7c 00000000`00020001 00000000`00000000 : nt!KiGeneralProtectionFault+0x320.
ffff8882`9880e650 fffff800`6d8d6d7c : 00000000`00020001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault.
ffff8882`9880e660 fffff800`6d8d44fc : ffffd902`498598d0 ffffd902`4991fd70 ffff8882`9880e920 00000000`00000000 : Ndu!PplGenericAllocateFunction+0x1c.
ffff8882`9880e6a0 fffff800`54e58c5f : 00000000`00000000 ffff8882`9880e7a9 00000000`00000004 ffff8882`9880ea70 : Ndu!NduOutboundTransportClassify+0x38c.
ffff8882`9880e740 fffff800`54f3cdab : ffffd902`3c1c38a8 ffff8882`00000230 ffffd902`4437f340 ffffd902`4437f340 : NETIO!KfdClassify2+0x19f.
ffff8882`9880e810 fffff800`54f3bfdb : ffffd902`3c1c3988 00000000`0000060c 00000000`0000ff00 ffffd902`3c1c38a8 : tcpip!IppInspectLocalDatagramsOut+0x6cb.
ffff8882`9880eae0 fffff800`54f3bba0 : 00000000`00009e00 00000000`0000ffff fffff800`550da230 ffffd902`4437f340 : tcpip!IppSendDatagramsCommon+0x41b.
ffff8882`9880ec60 fffff800`54f493ae : ffffd902`3c040490 00000000`00000000 00000000`00200000 00000000`00000000 : tcpip!IpNlpSendDatagrams+0x40.
ffff8882`9880eca0 fffff800`54f4b904 : ffff8882`9880f280 ffff8882`9880f310 ffff8882`9880f120 00000000`00000000 : tcpip!TcpTcbSend+0xdde.
ffff8882`9880f020 fffff800`54f4b56e : 00000000`00000000 00000000`00000000 ffff8882`9880f280 fffff800`54f4b540 : tcpip!TcpEnqueueTcbSend+0x374.
ffff8882`9880f160 fffff800`502b8908 : ffffd902`47f62101 00000000`00000000 e0cb7f01`00000000 00000000`00000001 : tcpip!TcpTlConnectionSendCalloutRoutine+0x2e.
ffff8882`9880f1a0 fffff800`502b887d : fffff800`54f4b540 ffff8882`9880f280 ffffd902`49c5f1b8 ffffd902`49bb91b8 : nt!KeExpandKernelStackAndCalloutInternal+0x78.
ffff8882`9880f210 fffff800`54ee49e0 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff3ec`8124ddd0 : nt!KeExpandKernelStackAndCalloutEx+0x1d.
ffff8882`9880f250 fffff800`6a33c0d0 : ffffd902`49c5f1b8 ffffd902`47f62150 00000000`00000081 ffffd902`49c5f1b8 : tcpip!TcpTlConnectionSend+0x80.
ffff8882`9880f2c0 fffff800`6a33befa : ffffd902`47f62150 ffff8882`9880fa80 ffffd902`447f8ce0 ffffd902`49c5f7e0 : afd!AfdTLStartBufferedVcSend+0xa0.
ffff8882`9880f370 fffff800`6a321720 : ffffd902`49c5f1b8 ffffd902`4990cae0 00000000`00000081 ffff8882`9880f868 : afd!AfdFastConnectionSend+0x2a2.
ffff8882`9880f440 fffff800`506a6622 : 00000000`00000000 00000000`0001201f ffff8882`9880fa80 ffffd902`497b20a0 : afd!AfdFastIoDeviceControl+0xf90.
ffff8882`9880f7e0 fffff800`506a6286 : 00000000`00000001 00000000`00000c70 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382.
ffff8882`9880f920 fffff800`504058b5 : 00000000`00000000 00000000`00000000 00000000`00000102 ffffd902`499374e0 : nt!NtDeviceIoControlFile+0x56.
ffff8882`9880f990 00007ffc`e360bea4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25.
000000b8`afe6f2e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`e360bea4.

SYMBOL_NAME: Ndu!PplGenericAllocateFunction+1c.

MODULE_NAME: Ndu.

IMAGE_NAME: Ndu.sys.

IMAGE_VERSION: 10.0.19041.1030.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 1c.

FAILURE_BUCKET_ID: 0x1E_c0000005_STACKPTR_ERROR_Ndu!PplGenericAllocateFunction.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {040fbfea-4e33-dce2-4a10-b9c4b0dd9e1c}

Followup: MachineOwner.
---------

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL.
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending.
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff8000eafa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains.
additional information regarding this single DPC timeout.

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 9265.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on BORA.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 37014.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 95.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 133.

BUGCHECK_P1: 0.

BUGCHECK_P2: 501.

BUGCHECK_P3: 500.

BUGCHECK_P4: fffff8000eafa320.

DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED.

TRAP_FRAME: ffffb487e6276c70 -- (.trap 0xffffb487e6276c70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000c2ed002f rbx=0000000000000000 rcx=ffffb70400000000.
rdx=ffffb70400000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8000e1fbdd7 rsp=ffffb487e6276e00 rbp=0000000000000001.
r8=ffffb70400000000 r9=ffffb7047b69ce40 r10=ffffb7047b69d580.
r11=000000000000004f r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei ng nz na po nc.
nt!ExpInterlockedPopEntrySListFault:
fffff800`0e1fbdd7 498b08 mov rcx,qword ptr [r8] ds:ffffb704`00000000=????????????????
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

DPC_STACK_BASE: FFFFB487E6277FB0.

STACK_TEXT:
ffff9380`ca5b6e18 fffff800`0e27955a : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx.
ffff9380`ca5b6e20 fffff800`0e10518d : 0000010f`d74a45eb 00000000`00000000 ffffb487`e6276b00 ffff9380`ca59d180 : nt!KeAccumulateTicks+0x17110a.
ffff9380`ca5b6e80 fffff800`0e10500a : ffffb704`798de600 ffffb487`e6276b60 00000000`00006382 00000000`00000003 : nt!KeClockInterruptNotify+0xbd.
ffff9380`ca5b6f30 fffff800`0e080795 : ffffb704`798de600 00000000`00000000 00000000`00000000 ffff1e84`b8cc0d0e : nt!HalpTimerClockIpiRoutine+0x1a.
ffff9380`ca5b6f60 fffff800`0e1f594a : ffffb487`e6276b60 ffffb704`798de600 00000000`00000001 f9a827e7`c5a896ab : nt!KiCallInterruptServiceRoutine+0xa5.
ffff9380`ca5b6fb0 fffff800`0e1f5eb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa.
ffffb487`e6276ae0 fffff800`0e202015 : ffffb704`8d01b8c0 00000000`00000000 00000000`5f636357 00000000`0000016a : nt!KiInterruptDispatchNoLockNoEtw+0x37.
ffffb487`e6276c70 fffff800`0e1fbdd7 : ffffb704`7b69d580 fffff800`12e5b4cc 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x315.
ffffb487`e6276e00 fffff800`12e5b4cc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault.
ffffb487`e6276e10 fffff800`12e423d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!PplGenericAllocateFunction+0x1c.
ffffb487`e6276e50 fffff800`131d135c : 00000000`00000000 ffffb704`8d01b8c0 ffffb704`82760bc0 00000000`00000000 : NETIO!WfpNblInfoAlloc+0x94.
ffffb487`e6276e90 fffff800`131d12bb : 00000000`00000000 ffffb704`85659ae0 ffffb704`82760bc0 fffff800`2a496d7c : fwpkclnt!FwppNetBufferListAssociateContext+0x7c.
ffffb487`e6276f30 fffff800`2a4943bd : 00000000`00000002 ffffb704`8ab293b0 ffffb487`e6277210 fffff800`131d1200 : fwpkclnt!FwpsNetBufferListAssociateContext1+0x7b.
ffffb487`e6276f90 fffff800`12e58c5f : 00000000`00000000 ffffb487`e6277099 00000000`00000000 ffffb487`e6277360 : Ndu!NduOutboundTransportClassify+0x24d.
ffffb487`e6277030 fffff800`12f3cdab : ffffb704`820c5b10 00000000`00000004 ffffb704`89680310 ffffb704`89680310 : NETIO!KfdClassify2+0x19f.
ffffb487`e6277100 fffff800`12f3bfdb : ffffb704`7b7c4988 00000000`00000000 fffff800`0000001e 00000000`00000202 : tcpip!IppInspectLocalDatagramsOut+0x6cb.
ffffb487`e62773d0 fffff800`12f38a09 : 00000000`00000000 00000000`00000000 fffff800`130da230 ffffb704`89680310 : tcpip!IppSendDatagramsCommon+0x41b.
ffffb487`e6277550 fffff800`12f48ca5 : ffffb704`85399ee0 00000000`00000014 00000000`00000000 ffffb704`849d5040 : tcpip!IpNlpFastSendDatagram+0x349.
ffffb487`e6277610 fffff800`12f2aa33 : 00000000`00000000 00000000`00000005 ffffb487`00000006 00000000`0005c53c : tcpip!TcpTcbSend+0x6d5.
ffffb487`e6277990 fffff800`0e0e9a3e : ffff9380`ca5a0240 ffffb704`79a1f000 ffffb487`e6277e70 ffff9380`ca59d180 : tcpip!TcpPeriodicTimeoutHandler+0x1683.
ffffb487`e6277bb0 fffff800`0e0e8d24 : ffff9380`ca59d180 00000000`00000000 00000000`00000008 00000000`00003704 : nt!KiExecuteAllDpcs+0x30e.
ffffb487`e6277d20 fffff800`0e1faee5 : 00000000`00000000 ffff9380`ca59d180 00000000`00000000 ffffb487`e69af750 : nt!KiRetireDpcList+0x1f4.
ffffb487`e6277fb0 fffff800`0e1facd0 : ffff9380`ca59d180 fffff800`0e0c92ea 00000000`00000000 ffffb704`00000000 : nt!KxRetireDpcList+0x5.
ffffb487`e69af530 fffff800`0e1fa39e : 00000000`00000002 00000000`3fffffff ffffb704`859c2b30 ffffb704`8cff4cc0 : nt!KiDispatchInterruptContinue.
ffffb487`e69af560 fffff800`0e120d50 : fffff800`28e3de1e ffffb487`e69af750 ffffb487`e69af920 00000000`00000018 : nt!KiDpcInterrupt+0x2ee.
ffffb487`e69af6f8 fffff800`28e3de1e : ffffb487`e69af750 ffffb487`e69af920 00000000`00000018 fffff800`28e929ac : nt!KzLowerIrql+0x20.
ffffb487`e69af700 ffffb487`e69af750 : ffffb487`e69af920 00000000`00000018 fffff800`28e929ac ffffb704`7bbe9040 : cfosspeed6+0xade1e.
ffffb487`e69af708 ffffb487`e69af920 : 00000000`00000018 fffff800`28e929ac ffffb704`7bbe9040 fffff800`28e3e34d : 0xffffb487`e69af750.
ffffb487`e69af710 00000000`00000018 : fffff800`28e929ac ffffb704`7bbe9040 fffff800`28e3e34d ffffb704`8686bc90 : 0xffffb487`e69af920.
ffffb487`e69af718 fffff800`28e929ac : ffffb704`7bbe9040 fffff800`28e3e34d ffffb704`8686bc90 ffffb487`e69af930 : 0x18.
ffffb487`e69af720 ffffb704`7bbe9040 : fffff800`28e3e34d ffffb704`8686bc90 ffffb487`e69af930 ffffb487`e69af7d0 : cfosspeed6+0x1029ac.
ffffb487`e69af728 fffff800`28e3e34d : ffffb704`8686bc90 ffffb487`e69af930 ffffb487`e69af7d0 00000000`00000000 : 0xffffb704`7bbe9040.
ffffb487`e69af730 ffffb704`8686bc90 : ffffb487`e69af930 ffffb487`e69af7d0 00000000`00000000 00000000`00000000 : cfosspeed6+0xae34d.
ffffb487`e69af738 ffffb487`e69af930 : ffffb487`e69af7d0 00000000`00000000 00000000`00000000 ffffb704`8686be20 : 0xffffb704`8686bc90.
ffffb487`e69af740 ffffb487`e69af7d0 : 00000000`00000000 00000000`00000000 ffffb704`8686be20 ffffb487`e69af800 : 0xffffb487`e69af930.
ffffb487`e69af748 00000000`00000000 : 00000000`00000000 ffffb704`8686be20 ffffb487`e69af800 fffff800`28f1b900 : 0xffffb487`e69af7d0.

SYMBOL_NAME: NETIO!PplGenericAllocateFunction+1c.

MODULE_NAME: NETIO.

IMAGE_NAME: NETIO.SYS.

IMAGE_VERSION: 10.0.19041.508.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 1c.

FAILURE_BUCKET_ID: 0x133_DPC_NETIO!PplGenericAllocateFunction.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {34812c13-3484-8100-3f56-b8a48cf6380b}

Followup: MachineOwner.
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled.
Arg2: fffff807077fbdd7, The address that the exception occurred at.
Arg3: fffffe0f9cefe418, Parameter 0 of the exception.
Arg4: ffffc9812ce7f920, Parameter 1 of the exception.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 8109.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on BORA.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 28896.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 87.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 1e.

BUGCHECK_P1: ffffffffc0000005.

BUGCHECK_P2: fffff807077fbdd7.

BUGCHECK_P3: fffffe0f9cefe418.

BUGCHECK_P4: ffffc9812ce7f920.

WRITE_ADDRESS: fffff807080fa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8070800f2e0: Unable to get Flags value from nt!KdVersionBlock.
fffff8070800f2e0: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
ffffc9812ce7f920.

EXCEPTION_PARAMETER1: fffffe0f9cefe418.

EXCEPTION_PARAMETER2: ffffc9812ce7f920.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: nvcontainer.exe.

TRAP_FRAME: fffff8000e0f0117 -- (.trap 0xfffff8000e0f0117)
Unable to read trap frame at fffff800`0e0f0117.

BAD_STACK_POINTER: ffffc9812ce7f0a8.

STACK_TEXT:
ffffc981`2ce7f0a8 fffff807`0790ed9f : 00000000`0000001e ffffffff`c0000005 fffff807`077fbdd7 fffffe0f`9cefe418 : nt!KeBugCheckEx.
ffffc981`2ce7f0b0 fffff807`0780f4d6 : ffffc981`2ce7f920 fffff807`07653a05 fffffe0f`9cefe650 fffff807`077fbdd7 : nt!KiFatalFilter+0x1f.
ffffc981`2ce7f0f0 fffff807`077cae5f : fffff807`00000002 fffff807`074d2f90 fffffe0f`9cef9000 fffffe0f`9cf00000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16.
ffffc981`2ce7f130 fffff807`077fcd5f : fffff807`074d2f90 ffffc981`2ce7f710 fffff807`077cadc0 00000000`00000000 : nt!_C_specific_handler+0x9f.
ffffc981`2ce7f1a0 fffff807`07685027 : ffffc981`2ce7f710 00000000`00000000 fffffe0f`9ceff1a0 fffff807`076b8908 : nt!RtlpExecuteHandlerForException+0xf.
ffffc981`2ce7f1d0 fffff807`07683ce6 : fffffe0f`9cefe418 ffffc981`2ce7fe20 fffffe0f`9cefe418 ffffe58e`60db1d90 : nt!RtlDispatchException+0x297.
ffffc981`2ce7f8f0 fffff807`077f4d32 : ffff9380`ca486210 ffffffff`c0000005 fffff800`0e0f0117 ffff9880`47686210 : nt!KiDispatchException+0x186.
ffffc981`2ce7ffb0 fffff807`077f4d00 : fffff807`07805fa5 00001a71`00000004 fffff807`0b9a2ae5 ffffe58e`5f0ec601 : nt!KxExceptionDispatchOnExceptionStack+0x12.
fffffe0f`9cefe2d8 fffff807`07805fa5 : 00001a71`00000004 fffff807`0b9a2ae5 ffffe58e`5f0ec601 ffffe58e`5ede7860 : nt!KiExceptionDispatchOnExceptionStackContinue.
fffffe0f`9cefe2e0 fffff807`07801ce0 : fffff807`0d651000 ffffe58e`5f0ec670 ffffe58e`00000000 fffff807`0d0d4f90 : nt!KiExceptionDispatch+0x125.
fffffe0f`9cefe4c0 fffff807`077fbdd7 : ffffe58e`5bbc2e80 fffff807`20796d7c 00000000`00020001 00000000`00000000 : nt!KiGeneralProtectionFault+0x320.
fffffe0f`9cefe650 fffff807`20796d7c : 00000000`00020001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault.
fffffe0f`9cefe660 fffff807`207944fc : ffffe58e`5b88d8c0 ffffe58e`60db1d90 fffffe0f`9cefe920 00000000`00000000 : Ndu!PplGenericAllocateFunction+0x1c.
fffffe0f`9cefe6a0 fffff807`0d258c5f : 00000000`00000000 fffffe0f`9cefe7a9 50dd59d7`00000004 fffffe0f`9cefea70 : Ndu!NduOutboundTransportClassify+0x38c.
fffffe0f`9cefe740 fffff807`0d33cdab : ffffe58e`540bd8a8 fffff807`077fbdc7 ffffe58e`5ea7fbb0 ffffe58e`5ea7fbb0 : NETIO!KfdClassify2+0x19f.
fffffe0f`9cefe810 fffff807`0d33bfdb : ffffe58e`540bd988 00000000`0000060c 00000000`0000ff00 ffffe58e`540bd8a8 : tcpip!IppInspectLocalDatagramsOut+0x6cb.
fffffe0f`9cefeae0 fffff807`0d33bba0 : 00000000`00010e00 00000000`0000ffff fffff807`0d4da230 ffffe58e`5ea7fbb0 : tcpip!IppSendDatagramsCommon+0x41b.
fffffe0f`9cefec60 fffff807`0d3493ae : ffffe58e`542ea370 00000000`00000000 ffffe58e`62200000 00000000`00000000 : tcpip!IpNlpSendDatagrams+0x40.
fffffe0f`9cefeca0 fffff807`0d34b904 : fffffe0f`9ceff280 fffffe0f`9ceff310 fffffe0f`9ceff120 00000000`00000000 : tcpip!TcpTcbSend+0xdde.
fffffe0f`9ceff020 fffff807`0d34b56e : 00000000`00000000 00000000`00000000 fffffe0f`9ceff280 fffff807`0d34b540 : tcpip!TcpEnqueueTcbSend+0x374.
fffffe0f`9ceff160 fffff807`076b8908 : ffffe58e`5e9d2d01 00000000`00000000 00000000`00000000 00000000`00000001 : tcpip!TcpTlConnectionSendCalloutRoutine+0x2e.
fffffe0f`9ceff1a0 fffff807`076b887d : fffff807`0d34b540 fffffe0f`9ceff280 ffffe58e`61c421b8 ffffe58e`61e921b8 : nt!KeExpandKernelStackAndCalloutInternal+0x78.
fffffe0f`9ceff210 fffff807`0d2e49e0 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff807`077fac9f : nt!KeExpandKernelStackAndCalloutEx+0x1d.
fffffe0f`9ceff250 fffff807`22f8c0d0 : ffffe58e`61c421b8 ffffe58e`5e9d2dc0 00000000`00000081 ffffe58e`61c421b8 : tcpip!TcpTlConnectionSend+0x80.
fffffe0f`9ceff2c0 fffff807`22f8befa : ffffe58e`5e9d2dc0 fffffe0f`9ceffa80 ffffe58e`606b4c30 ffffe58e`61c427e0 : afd!AfdTLStartBufferedVcSend+0xa0.
fffffe0f`9ceff370 fffff807`22f71720 : ffffe58e`61c421b8 00000000`00000000 00000000`00000081 fffffe0f`9ceff868 : afd!AfdFastConnectionSend+0x2a2.
fffffe0f`9ceff440 fffff807`07aa6622 : 00000000`00000000 00000000`0001201f fffffe0f`9ceffa80 ffffe58e`5eadcbc0 : afd!AfdFastIoDeviceControl+0xf90.
fffffe0f`9ceff7e0 fffff807`07aa6286 : 00000000`00000001 00000000`00000d70 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382.
fffffe0f`9ceff920 fffff807`078058b5 : 00000000`00000000 00000000`00000000 00000000`00000102 ffffe58e`61b30ee0 : nt!NtDeviceIoControlFile+0x56.
fffffe0f`9ceff990 00007ff9`6ae0bea4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25.
000000f2`e3eff978 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`6ae0bea4.

SYMBOL_NAME: Ndu!PplGenericAllocateFunction+1c.

MODULE_NAME: Ndu.

IMAGE_NAME: Ndu.sys.

IMAGE_VERSION: 10.0.19041.1030.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 1c.

FAILURE_BUCKET_ID: 0x1E_c0000005_STACKPTR_ERROR_Ndu!PplGenericAllocateFunction.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {040fbfea-4e33-dce2-4a10-b9c4b0dd9e1c}

Followup: MachineOwner.
---------

Testi yaptım bir sorun yok galiba çipset sürcüsünüde güncelledim şu anlık bir sorun yok. MSI uygulamaları derken Dragon Center dahilmi acaba?
 

Dosya Ekleri

  • IMG_20201020_104254.jpg
    IMG_20201020_104254.jpg
    129,7 KB · Görüntüleme: 28
Evet, dahil. Testte sorun bulunamamış, bu iyi haber. Şimdi dediğim her şeyi yaptığınızdan emin olun ve sistemi bir süre gözlemleyin. Yine mavi ekran alırsanız yeni dosyaları paylaşırsınız. Sorun çözülmüşse de belirtirseniz sevinirim.
 
Çözüm

Geri
Yukarı