psychomax13
Kilopat
- Katılım
- 25 Ağustos 2016
- Mesajlar
- 176
- Çözümler
- 2
Daha fazla
- Cinsiyet
- Erkek
- Meslek
- English Teacher
Yüksek boyutlu üç adet PDF ile işlem sırasında bir PDF'in boyutunu küçültmek için PDF olarak yazdır demiştim. Bunu yaparken ayrıca bir dosya indiriyordum ve mavi ekran hatası aldım. Chrome da açıktı. Minidump dosya analizi yaptım ancak ndu.sys diye tam ne olduğunu bilmediğim bir sistem dosyasına işaret ediyor. Sorunun kaynağını bulabilir miyiz acaba?
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff806303fd147, The address that the exception occurred at
Arg3: fffff80634a71858, Parameter 0 of the exception
Arg4: fffff80634a81920, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3843
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-DINV828
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9766
Key : Analysis.Memory.CommitPeak.Mb
Value: 125
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff806303fd147
BUGCHECK_P3: fffff80634a71858
BUGCHECK_P4: fffff80634a81920
WRITE_ADDRESS: fffff80634a81920
EXCEPTION_PARAMETER1: fffff80634a71858
EXCEPTION_PARAMETER2: fffff80634a81920
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
BAD_STACK_POINTER: fffff80634a810a8
STACK_TEXT:
fffff806`34a810a8 fffff806`3050e59f : 00000000`0000001e ffffffff`c0000005 fffff806`303fd147 fffff806`34a71858 : nt!KeBugCheckEx
fffff806`34a810b0 fffff806`3040dc66 : fffff806`34a81920 fffff806`3028d9e5 fffff806`34a71a90 fffff806`303fd147 : nt!KiFatalFilter+0x1f
fffff806`34a810f0 fffff806`303cbed2 : fffff806`00000001 fffff806`300c9aa4 fffff806`34a6e000 fffff806`34a74000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
fffff806`34a81130 fffff806`303fe0d2 : fffff806`300c9aa4 fffff806`34a81710 fffff806`303cbe30 00000000`00000000 : nt!_C_specific_handler+0xa2
fffff806`34a811a0 fffff806`30252db7 : fffff806`34a81710 00000000`00000000 fffff806`34a731c0 fffff806`3020d468 : nt!RtlpExecuteHandlerForException+0x12
fffff806`34a811d0 fffff806`302519a6 : fffff806`34a71858 fffff806`34a81e20 fffff806`34a71858 ffffb587`2f881cf0 : nt!RtlDispatchException+0x297
fffff806`34a818f0 fffff806`303f60a2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
fffff806`34a81fb0 fffff806`303f6070 : fffff806`304072a5 00000001`26000000 fffff806`3da08187 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff806`34a71718 fffff806`304072a5 : 00000001`26000000 fffff806`3da08187 00000000`00000000 ffffb587`266ea2e0 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff806`34a71720 fffff806`30402fe0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125
fffff806`34a71900 fffff806`303fd147 : 00000000`00000000 fffff806`3e3c4316 00000000`00000002 ffffb587`2f881cf0 : nt!KiGeneralProtectionFault+0x320
fffff806`34a71a90 fffff806`3e3c4316 : 00000000`00000002 ffffb587`2f881cf0 fffff806`34a71d20 ffff8d80`547d6180 : nt!ExpInterlockedPopEntrySListFault
fffff806`34a71aa0 fffff806`34008cee : 00000000`00000000 fffff806`34a71ba9 00000000`00000000 fffff806`34a71e70 : Ndu!NduOutboundTransportClassify+0x1a6
fffff806`34a71b40 fffff806`34133ffb : 00000000`00000000 fffff806`302caf2f ffffb587`449e1a20 ffffb587`449e1a20 : NETIO!KfdClassify2+0x19e
fffff806`34a71c10 fffff806`3413322b : ffffb587`22fdd9c8 00000000`00000000 00000000`00007a0c 00000000`00000328 : tcpip!IppInspectLocalDatagramsOut+0x6cb
fffff806`34a71ee0 fffff806`34132df0 : 00000000`00000100 00000000`0000ffff fffff806`342f8230 ffffb587`449e1a20 : tcpip!IppSendDatagramsCommon+0x41b
fffff806`34a72060 fffff806`3411115c : ffffb587`319dc810 fffff806`34a721a0 00000000`00000020 ffffb587`36f8ac3c : tcpip!IpNlpSendDatagrams+0x40
fffff806`34a720a0 fffff806`3411e976 : ffffb587`449e1a80 ffffb587`319dc810 ffffb587`2a5f9210 00000000`00001000 : tcpip!TcpTcbHeaderSend+0x6ec
fffff806`34a72350 fffff806`34114dde : 00000000`00000000 00000000`00000005 ffffb587`397c7d70 ffffb587`397c7d70 : tcpip!TcpTcbCarefulDatagram+0x4936
fffff806`34a727b0 fffff806`34113fff : 00000000`00000028 fffff806`34a72b00 ffffb587`26b03780 ffffb587`26020008 : tcpip!TcpTcbReceive+0x30e
fffff806`34a72a00 fffff806`34113088 : 00000010`999bc44f 00000000`00989680 ffff8d80`55b27322 ffffb587`22bf8920 : tcpip!TcpMatchReceive+0x51f
fffff806`34a72cb0 fffff806`3411174e : ffffb587`22d23d00 fffff806`3e3d1168 ffffb587`00000000 00000000`00000000 : tcpip!TcpReceive+0x358
fffff806`34a72da0 fffff806`34123999 : 00000000`00000000 ffffb587`26b042a0 ffffb587`2ac613a0 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e
fffff806`34a72de0 fffff806`3417e57e : ffffb587`270b4140 ffffb587`22c55010 ffffb587`26489e06 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
fffff806`34a73070 fffff806`3020d468 : ffffb587`22ffff60 00000000`00000002 ffffb587`207d1080 fffff806`34a73368 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
fffff806`34a731c0 fffff806`3020d3dd : fffff806`3417e450 fffff806`34a73368 ffffb587`22bf4dd0 00000000`00000002 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff806`34a73230 fffff806`341715ed : 00000000`00000000 00000000`00000000 fffff806`34a732e0 fffff806`3d42df1b : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff806`34a73270 fffff806`34170ccd : 00000000`00000001 fffff806`34a733d0 ffffb587`22c55010 ffffb587`2aaeaf60 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff806`34a732d0 fffff806`33e81eb0 : 00000000`00000000 ffffb587`26b042a0 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff806`34a73580 fffff806`33e81ccb : ffffb587`270f0010 ffffb587`270f0001 ffffb587`00000000 00000001`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff806`34a73660 fffff806`33e87ef0 : ffffb587`264c41a0 ffffb587`270e4b01 ffffb587`264c41a0 ffffb587`270f4490 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff806`34a736e0 fffff806`33ebdee3 : ffffb587`397c7d70 fffff806`34a737b1 00000000`00000000 00000000`00000fff : ndis!ndisCallReceiveHandler+0x60
fffff806`34a73730 fffff806`33e84a94 : 00000000`0006f66a 00000000`00000001 ffffb587`264c41a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff806`34a73800 fffff806`3da26a28 : ffffb587`26903000 ffffb587`26903000 00000000`00000000 00000000`00000000 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff806`34a73890 fffff806`3da25cbd : 00004a78`d9915908 ffffb587`26903000 ffffb587`266d9dc0 ffffb587`266ea6f0 : rt640x64+0x26a28
fffff806`34a739f0 fffff806`3da0636c : ffffb587`26903000 ffffb587`266ea6f0 fffff806`34a73b00 00000000`00000000 : rt640x64+0x25cbd
fffff806`34a73a40 fffff806`3da02a23 : ffffb587`26903000 fffff806`34a73b49 00000000`00000000 00000000`00000000 : rt640x64+0x636c
fffff806`34a73aa0 fffff806`33e87886 : ffffb587`2dab3c01 ffffb587`26fc6010 ffffb587`264c41a0 ffffb587`309ed1c0 : rt640x64+0x2a23
fffff806`34a73ad0 fffff806`302e535e : fffff806`2c531240 fffff806`2c52e180 00000000`00000000 ffffb587`2d73b080 : ndis!ndisInterruptDpc+0x196
fffff806`34a73bb0 fffff806`302e4644 : fffff806`2c52e180 00000000`00000000 00000000`0000002a 00000000`0004267e : nt!KiExecuteAllDpcs+0x30e
fffff806`34a73d20 fffff806`303fc255 : 00000000`00000000 fffff806`2c52e180 ffff8d80`54e3f280 ffffb587`206b9a50 : nt!KiRetireDpcList+0x1f4
fffff806`34a73fb0 fffff806`303fc040 : 00000000`00000062 fffff806`303fb8e1 00000000`01000010 00000000`00000282 : nt!KxRetireDpcList+0x5
ffff810b`76d626e0 fffff806`303fb8f5 : ffffb587`206b9a50 fffff806`303f6d81 00000000`00000000 fffff806`303f6d81 : nt!KiDispatchInterruptContinue
ffff810b`76d62710 fffff806`303f6d81 : 00000000`00000000 fffff806`303f6d81 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
ffff810b`76d62720 fffff806`303f915e : fffff806`3034517e 00000000`0000010c 00000000`00000000 ffffb587`206b9a50 : nt!KiInterruptDispatch+0xb1
ffff810b`76d628b8 fffff806`3034517e : 00000000`0000010c 00000000`00000000 ffffb587`206b9a50 fffff806`00000000 : nt!KeZeroPages+0x1e
ffff810b`76d628c0 fffff806`30344f78 : ffffb587`206b9a50 00000000`00000010 fffff806`30c50c00 ffffb587`2069a050 : nt!MiZeroPage+0x11e
ffff810b`76d62a70 fffff806`303b15d8 : ffffb587`206b9a50 ffff810b`00000002 fffff806`30c50c00 00000000`00000008 : nt!MiZeroLargePages+0xd08
ffff810b`76d62b60 fffff806`302a29a5 : 00000000`00000000 ffffb587`2069a050 fffff300`00007000 fffff806`30c50c00 : nt!MiZeroLargePageThread+0x88
ffff810b`76d62c10 fffff806`303fc868 : ffff8d80`541e0180 ffffb587`207d1080 fffff806`302a2950 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff810b`76d62c60 00000000`00000000 : ffff810b`76d63000 ffff810b`76d5d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: Ndu!NduOutboundTransportClassify+1a6
MODULE_NAME: Ndu
IMAGE_NAME: Ndu.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1a6
FAILURE_BUCKET_ID: 0x1E_c0000005_STACKPTR_ERROR_Ndu!NduOutboundTransportClassify
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {63910737-ea4e-e75d-e79f-6296ef230e3e}
Followup: MachineOwner
---------
||1:0: kd> lmvm Ndu
Browse full module list
start end module name
fffff806`3e3c0000 fffff806`3e3e7000 Ndu # (pdb symbols) C:\ProgramData\Dbg\sym\ndu.pdb\DE8513570D241399F32498307981576C1\ndu.pdb
Loaded symbol image file: Ndu.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\Ndu.sys\ABC6C89427000\Ndu.sys
Image path: \SystemRoot\system32\drivers\Ndu.sys
Image name: Ndu.sys
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: ABC6C894 (This is a reproducible build file hash, not a timestamp)
CheckSum: 000213E1
ImageSize: 00027000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables: