Selamlar, aşağıdaki ağ sürücülerinizi indirip kurun. Görünüşe göre onlar sorun yaratmış. Sonra da sonucu belirtirseniz sevinirim.
Not: Bilgisayar özellikleriniz yerine modelini yazmanız da yeterdi. Tabii ben sistem detaylarını bulup başlığı düzenledim o ayrı konu
[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8043757b38b, The address that the exception occurred at
Arg3: fffff80437e6dcb8, Parameter 0 of the exception
Arg4: fffff80437e85920, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 9530
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 21543
Key : Analysis.Init.CPU.mSec
Value: 1015
Key : Analysis.Init.Elapsed.mSec
Value: 5241
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 021622-15562-01.dmp
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8043757b38b
BUGCHECK_P3: fffff80437e6dcb8
BUGCHECK_P4: fffff80437e85920
WRITE_ADDRESS: fffff80434efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff80437e85920
EXCEPTION_PARAMETER1: fffff80437e6dcb8
EXCEPTION_PARAMETER2: fffff80437e85920
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff80437e6dd60 -- (.trap 0xfffff80437e6dd60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbc0000000028 rbx=0000000000000000 rcx=00000000017a2d42
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043757b38b rsp=fffff80437e6def0 rbp=0000000000003728
r8=0000000000000008 r9=0000000000000800 r10=ffffbc0000000028
r11=0000007ffffffff8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
tcpip+0x4b38b:
fffff804`3757b38b 8b4308 mov eax,dword ptr [rbx+8] ds:00000000`00000008=????????
Resetting default scope
STACK_TEXT:
fffff804`37e850a8 fffff804`3470f86f : 00000000`0000001e ffffffff`c0000005 fffff804`3757b38b fffff804`37e6dcb8 : nt!KeBugCheckEx
fffff804`37e850b0 fffff804`34610ca6 : fffff804`37e85920 fffff804`34540745 fffff804`37e6def0 fffff804`3757b38b : nt!KiFatalFilter+0x1f
fffff804`37e850f0 fffff804`345cd112 : fffff804`00000002 fffff804`342d3d10 fffff804`37e69000 fffff804`37e70000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
fffff804`37e85130 fffff804`34600272 : fffff804`342d3d10 fffff804`37e85710 fffff804`345cd070 00000000`00000000 : nt!_C_specific_handler+0xa2
fffff804`37e851a0 fffff804`344e6f87 : fffff804`37e85710 00000000`00000000 fffff804`37e6ee30 fffff804`344f8608 : nt!RtlpExecuteHandlerForException+0x12
fffff804`37e851d0 fffff804`344e5b86 : fffff804`37e6dcb8 fffff804`37e85e20 fffff804`37e6dcb8 00000000`00002118 : nt!RtlDispatchException+0x297
fffff804`37e858f0 fffff804`345f8242 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
fffff804`37e85fb0 fffff804`345f8210 : fffff804`346094a5 ffff838b`64de86c8 fffff804`37e6dc80 00000000`00000002 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff804`37e6db78 fffff804`346094a5 : ffff838b`64de86c8 fffff804`37e6dc80 00000000`00000002 fffff804`371b5ffc : nt!KiExceptionDispatchOnExceptionStackContinue
fffff804`37e6db80 fffff804`34605643 : 00000000`00000000 00000000`00011353 00000000`00000001 00000000`00000000 : nt!KiExceptionDispatch+0x125
fffff804`37e6dd60 fffff804`3757b38b : 00000000`00000000 8a000003`f06009e3 00000000`00000000 fffff9c1`c6328c60 : nt!KiPageFault+0x443
fffff804`37e6def0 fffff804`3757bc54 : ffff838c`64f43750 00000000`00003728 ffff838c`64a81530 00000000`00000000 : tcpip+0x4b38b
fffff804`37e6df30 fffff804`3758db17 : ffff838c`00000000 ffff838c`400dac20 fffff804`37e6e080 fffff804`1825fc61 : tcpip+0x4bc54
fffff804`37e6dfb0 fffff804`37584c0e : 00000000`00000000 fffff804`3756d3f4 00000000`00000000 00000000`00000014 : tcpip+0x5db17
fffff804`37e6e420 fffff804`37583e2f : 00000000`00000028 fffff804`37e6e700 ffff838c`4dbc29f0 ffff838c`42120008 : tcpip+0x54c0e
fffff804`37e6e670 fffff804`37582ffd : ffff838c`00000000 00000000`00000001 ffffa800`b205fb22 ffff838c`56af4800 : tcpip+0x53e2f
fffff804`37e6e920 fffff804`375812d5 : 00000000`00000000 00000000`00000001 ffff838c`00000000 00000000`00000000 : tcpip+0x52ffd
fffff804`37e6ea10 fffff804`3755d169 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip+0x512d5
fffff804`37e6ea50 fffff804`375b325e : ffff838c`4a8ee5a0 ffff838c`4e1ce010 00000000`00000006 00000000`00000f00 : tcpip+0x2d169
fffff804`37e6ece0 fffff804`344f8608 : ffff838c`420ff240 00000000`00000002 fffff804`34f27a00 fffff804`37e6efd8 : tcpip+0x8325e
fffff804`37e6ee30 fffff804`344f857d : fffff804`375b3130 fffff804`37e6efd8 ffff838c`4007e370 fffff804`371623af : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff804`37e6eea0 fffff804`3758f66d : 00000000`00000010 00000000`00000282 ffff838c`630fd760 fffff804`3782142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff804`37e6eee0 fffff804`3758ed4d : 00000000`00000001 fffff804`37e6f040 ffff838c`4e1ce010 fffff804`37e6f050 : tcpip+0x5f66d
fffff804`37e6ef40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip+0x5ed4d
SYMBOL_NAME: tcpip+4b38b
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
IMAGE_VERSION: 10.0.19041.1503
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 4b38b
FAILURE_BUCKET_ID: 0x1E_c0000005_tcpip!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f0660295-dca0-87ec-e8bb-9e7ef82578b0}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80155185230, The address that the exception occurred at
Arg3: 0000000000000001, Parameter 0 of the exception
Arg4: ffff88872c4edcc0, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for NETIO.SYS
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6999
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 14612
Key : Analysis.Init.CPU.mSec
Value: 1109
Key : Analysis.Init.Elapsed.mSec
Value: 7349
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 021522-14859-01.dmp
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80155185230
BUGCHECK_P3: 1
BUGCHECK_P4: ffff88872c4edcc0
WRITE_ADDRESS: fffff80141efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff88872c4edcc0
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: ffff88872c4edcc0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
TRAP_FRAME: 35b1d2f215b2dca3 -- (.trap 0x35b1d2f215b2dca3)
Unable to read trap frame at 35b1d2f2`15b2dca3
STACK_TEXT:
ffffd200`313f8158 fffff801`416f5aae : 00000000`0000001e ffffffff`c0000005 fffff801`55185230 00000000`00000001 : nt!KeBugCheckEx
ffffd200`313f8160 fffff801`41600272 : fffff801`416f5a8c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffffd200`313f81a0 fffff801`414e6f87 : ffffd200`313f8710 00000000`00000000 ffffea05`a70b7fb0 fffff801`415fe3f5 : nt!RtlpExecuteHandlerForException+0x12
ffffd200`313f81d0 fffff801`414e5b86 : ffffea05`a70b76e8 ffffd200`313f8e20 ffffea05`a70b76e8 ffff8888`2f5ea070 : nt!RtlDispatchException+0x297
ffffd200`313f88f0 fffff801`415f8242 : 606dcdde`adc1ccfa 33357deb`4cfd1c6e 35b1d2f2`15b2dca3 ce213466`a3e2ba69 : nt!KiDispatchException+0x186
ffffd200`313f8fb0 fffff801`415f8210 : fffff801`416094a5 ffff8887`2c4edcc0 ffffea05`a70b76b0 ffffd200`313d8180 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffea05`a70b75a8 fffff801`416094a5 : ffff8887`2c4edcc0 ffffea05`a70b76b0 ffffd200`313d8180 fffff801`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffea05`a70b75b0 fffff801`41605643 : 00000000`00000000 fffff801`55185002 00000000`00000002 ffff8888`3129d080 : nt!KiExceptionDispatch+0x125
ffffea05`a70b7790 fffff801`55185230 : fffff801`5518511e ffff8888`3e770040 ffff8888`3c9c9460 ffffea05`00000000 : nt!KiPageFault+0x443
ffffea05`a70b7928 fffff801`5518511e : ffff8888`3e770040 ffff8888`3c9c9460 ffffea05`00000000 ffff8888`13ff4ae0 : Ndu!CarDisableCacheAwareReference+0x30
ffffea05`a70b7930 fffff801`4436ff9c : ffff8888`160c88a0 fffff801`551850a0 ffff8888`3e770040 00000000`00000000 : Ndu!NduFlowDelete+0x7e
ffffea05`a70b7960 ffff8888`160c88a0 : fffff801`551850a0 ffff8888`3e770040 00000000`00000000 ffff8888`38ff1cb0 : NETIO+0xff9c
ffffea05`a70b7968 fffff801`5518509f : ffff8888`3e770040 00000000`00000000 ffff8888`38ff1cb0 ffff8888`3e770010 : 0xffff8888`160c88a0
ffffea05`a70b7970 ffff8888`3e770040 : 00000000`00000000 ffff8888`38ff1cb0 ffff8888`3e770010 ffff8888`342f2bf8 : Ndu!NduWfpObjectCountDecrease+0x2b
ffffea05`a70b7978 00000000`00000000 : ffff8888`38ff1cb0 ffff8888`3e770010 ffff8888`342f2bf8 fffff801`4436fc2e : 0xffff8888`3e770040
SYMBOL_NAME: Ndu!CarDisableCacheAwareReference+30
MODULE_NAME: Ndu
IMAGE_NAME: Ndu.sys
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 30
FAILURE_BUCKET_ID: 0x1E_c0000005_W_Ndu!CarDisableCacheAwareReference
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4ec3ac88-3c37-93ea-f9d4-a2db387bdcac}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8037f896c44, The address that the exception occurred at
Arg3: 0000000000000001, Parameter 0 of the exception
Arg4: ffffc608436f3d90, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7108
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 16827
Key : Analysis.Init.CPU.mSec
Value: 953
Key : Analysis.Init.Elapsed.mSec
Value: 3359
Key : Analysis.Memory.CommitPeak.Mb
Value: 87
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 021622-14203-01.dmp
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8037f896c44
BUGCHECK_P3: 1
BUGCHECK_P4: ffffc608436f3d90
WRITE_ADDRESS: fffff803802fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffc608436f3d90
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: ffffc608436f3d90
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: audiodg.exe
TRAP_FRAME: ffffeb8273c47400 -- (.trap 0xffffeb8273c47400)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffeb8273c475f8 rbx=0000000000000000 rcx=ffffc608436f3dc0
rdx=0000000070436f49 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037f896c44 rsp=ffffeb8273c47590 rbp=ffffc609638934e0
r8=ffffc609659a1be0 r9=0000000000000010 r10=0000fffff8037f95
r11=ffffa0fad4600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ObfReferenceObjectWithTag+0x24:
fffff803`7f896c44 f0480fc15ed0 lock xadd qword ptr [rsi-30h],rbx ds:ffffffff`ffffffd0=????????????????
Resetting default scope
STACK_TEXT:
ffffb101`0b335158 fffff803`7faf5aae : 00000000`0000001e ffffffff`c0000005 fffff803`7f896c44 00000000`00000001 : nt!KeBugCheckEx
ffffb101`0b335160 fffff803`7fa00272 : fffff803`7faf5a8c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffffb101`0b3351a0 fffff803`7f8e6f87 : ffffb101`0b335710 00000000`00000000 ffffeb82`73c47fb0 fffff803`7f9fe3f5 : nt!RtlpExecuteHandlerForException+0x12
ffffb101`0b3351d0 fffff803`7f8e5b86 : ffffeb82`73c47358 ffffb101`0b335e20 ffffeb82`73c47358 00000000`00000000 : nt!RtlDispatchException+0x297
ffffb101`0b3358f0 fffff803`7f9f8242 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffb101`0b335fb0 fffff803`7f9f8210 : fffff803`7fa094a5 ffffc608`436f3d90 ffffeb82`73c47320 fffff803`9790aaa0 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffeb82`73c47218 fffff803`7fa094a5 : ffffc608`436f3d90 ffffeb82`73c47320 fffff803`9790aaa0 fffff803`9790aaa0 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffeb82`73c47220 fffff803`7fa05643 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125
ffffeb82`73c47400 fffff803`7f896c44 : ffffc609`43c37ad0 fffff803`7ffb1149 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443
ffffeb82`73c47590 fffff803`7f954b23 : ffffc608`436f3dc0 ffffc609`659a1be0 ffffc609`43c37ad0 00000000`00000001 : nt!ObfReferenceObjectWithTag+0x24
ffffeb82`73c475d0 fffff803`7f884ffe : ffffc609`638934e0 ffffeb82`73c47689 ffffc609`436f3dc0 ffffc609`63893ac3 : nt!IopUnloadSafeCompletion+0x43
ffffeb82`73c47600 fffff803`7f884ec7 : 00000000`00000001 00000000`00000000 ffffc609`5a314020 00000000`00000002 : nt!IopfCompleteRequest+0x11e
ffffeb82`73c476f0 fffff803`841b811a : 00000000`00000000 ffffc609`43b82af0 ffffc609`638934e0 ffffc609`5b4eaa20 : nt!IofCompleteRequest+0x17
ffffeb82`73c47720 fffff803`841b5bbf : 00000000`00000002 ffffeb82`73c47858 ffffc609`638934e0 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
ffffeb82`73c477b0 fffff803`a1c0265e : ffffc609`53d73690 ffffc609`53d734f0 00000000`00000002 ffffc609`5a314400 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
ffffeb82`73c47810 fffff803`a1c020e6 : ffffeb82`73c47ab8 ffffc609`5a314400 ffffeb82`00000060 ffffc609`4c36e401 : USBXHCI!Isoch_Stage_CompleteTD+0x47e
ffffeb82`73c478d0 fffff803`a1c01ef0 : ffffeb82`73c47a00 ffffeb82`73c47a00 00000000`00000000 ffffeb82`00000000 : USBXHCI!Isoch_ProcessTransferEventWithED1+0x1d6
ffffeb82`73c479b0 fffff803`a1c071c0 : 00000000`00000004 ffffeb82`73c47a88 00000000`00000008 ffffeb82`73c47a90 : USBXHCI!Isoch_EP_TransferEventHandler+0x10
ffffeb82`73c479e0 fffff803`a1c06cf5 : 00000000`00000780 000039f6`bc395300 ffffc609`4c27fa50 ffffc609`536a00d0 : USBXHCI!Endpoint_TransferEventHandler+0xb0
ffffeb82`73c47a40 fffff803`a1c069cc : ffffc609`3d0ebd70 ffffc609`3d0e0040 000039f6`bc37c748 ffffc609`3d0eb000 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
ffffeb82`73c47b40 fffff803`841b38f5 : 00000000`00000f44 00000000`00400a02 00000000`00000000 00000695`f00f15b6 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
ffffeb82`73c47b70 fffff803`7f89a3fe : ffffb101`0b318240 ffffc609`3d0c7000 ffffeb82`73c47e70 ffffb101`00000002 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa5 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
ffffeb82`73c47bb0 fffff803`7f8996e4 : ffffb101`0b315180 00000000`00000000 00000000`00000008 00000000`000145cc : nt!KiExecuteAllDpcs+0x30e
ffffeb82`73c47d20 fffff803`7f9fe3f5 : 00000000`00000000 ffffb101`0b315180 ffffb101`0c1958c0 000001f9`b0cdce38 : nt!KiRetireDpcList+0x1f4
ffffeb82`73c47fb0 fffff803`7f9fe1e0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
ffffeb82`7985fa80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
SYMBOL_NAME: USBXHCI!Isoch_Stage_CompleteTD+47e
MODULE_NAME: USBXHCI
IMAGE_NAME: USBXHCI.SYS
IMAGE_VERSION: 10.0.19041.1173
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 47e
FAILURE_BUCKET_ID: 0x1E_c0000005_W_USBXHCI!Isoch_Stage_CompleteTD
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ae77101c-bed7-4150-e20a-4680ac78c2f1}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff802cec45230, The address that the exception occurred at
Arg3: 0000000000000001, Parameter 0 of the exception
Arg4: ffffca88352a8c80, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for NETIO.SYS
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7390
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 12186
Key : Analysis.Init.CPU.mSec
Value: 1093
Key : Analysis.Init.Elapsed.mSec
Value: 6206
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 021622-14937-01.dmp
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff802cec45230
BUGCHECK_P3: 1
BUGCHECK_P4: ffffca88352a8c80
WRITE_ADDRESS: fffff802716fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffca88352a8c80
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: ffffca88352a8c80
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: lsass.exe
TRAP_FRAME: ffff8986ae667790 -- (.trap 0xffff8986ae667790)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=ffffca88352a8c80
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802cec45230 rsp=ffff8986ae667928 rbp=fffff802cec45002
r8=0000000000000001 r9=000000000000000c r10=ffffca893d55a6f0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
Ndu!CarDisableCacheAwareReference+0x30:
fffff802`cec45230 488701 xchg rax,qword ptr [rcx] ds:ffffca88`352a8c80=????????????????
Resetting default scope
STACK_TEXT:
ffffda80`9b8a9158 fffff802`70ef5aae : 00000000`0000001e ffffffff`c0000005 fffff802`cec45230 00000000`00000001 : nt!KeBugCheckEx
ffffda80`9b8a9160 fffff802`70e00272 : fffff802`70ef5a8c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffffda80`9b8a91a0 fffff802`70ce6f87 : ffffda80`9b8a9710 00000000`00000000 ffff8986`ae667fb0 fffff802`70dfe3f5 : nt!RtlpExecuteHandlerForException+0x12
ffffda80`9b8a91d0 fffff802`70ce5b86 : ffff8986`ae6676e8 ffffda80`9b8a9e20 ffff8986`ae6676e8 ffffca89`286f72b0 : nt!RtlDispatchException+0x297
ffffda80`9b8a98f0 fffff802`70df8242 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffda80`9b8a9fb0 fffff802`70df8210 : fffff802`70e094a5 ffffca88`352a8c80 ffff8986`ae6676b0 ffffda80`9b889180 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffff8986`ae6675a8 fffff802`70e094a5 : ffffca88`352a8c80 ffff8986`ae6676b0 ffffda80`9b889180 ffffca89`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffff8986`ae6675b0 fffff802`70e05643 : 00000000`00000000 fffff802`cec45002 00000000`00000002 ffffca89`27ba0080 : nt!KiExceptionDispatch+0x125
ffff8986`ae667790 fffff802`cec45230 : fffff802`cec4511e ffffca89`2d189d60 ffffca89`2c407f90 ffff8986`00000000 : nt!KiPageFault+0x443
ffff8986`ae667928 fffff802`cec4511e : ffffca89`2d189d60 ffffca89`2c407f90 ffff8986`00000000 ffffca89`0e9573e0 : Ndu!CarDisableCacheAwareReference+0x30
ffff8986`ae667930 fffff802`7516ff9c : ffffca89`0d2b3010 fffff802`cec450a0 ffffca89`2d189d60 00000000`00000000 : Ndu!NduFlowDelete+0x7e
ffff8986`ae667960 ffffca89`0d2b3010 : fffff802`cec450a0 ffffca89`2d189d60 00000000`00000000 ffffca89`2fc19990 : NETIO+0xff9c
ffff8986`ae667968 fffff802`cec4509f : ffffca89`2d189d60 00000000`00000000 ffffca89`2fc19990 ffffca89`2d189d30 : 0xffffca89`0d2b3010
ffff8986`ae667970 ffffca89`2d189d60 : 00000000`00000000 ffffca89`2fc19990 ffffca89`2d189d30 ffffca89`3566aba8 : Ndu!NduWfpObjectCountDecrease+0x2b
ffff8986`ae667978 00000000`00000000 : ffffca89`2fc19990 ffffca89`2d189d30 ffffca89`3566aba8 fffff802`7516fc2e : 0xffffca89`2d189d60
SYMBOL_NAME: Ndu!CarDisableCacheAwareReference+30
MODULE_NAME: Ndu
IMAGE_NAME: Ndu.sys
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 30
FAILURE_BUCKET_ID: 0x1E_c0000005_W_Ndu!CarDisableCacheAwareReference
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4ec3ac88-3c37-93ea-f9d4-a2db387bdcac}
Followup: MachineOwner
---------[/CODE]