KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8010f1fd147, The address that the exception occurred at
Arg3: fffffc898ae75498, Parameter 0 of the exception
Arg4: ffffbb80e7181920, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5656
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 15954
Key : Analysis.Memory.CommitPeak.Mb
Value: 87
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8010f1fd147
BUGCHECK_P3: fffffc898ae75498
BUGCHECK_P4: ffffbb80e7181920
WRITE_ADDRESS: fffff8010fafb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8010fa0f340: Unable to get Flags value from nt!KdVersionBlock
fffff8010fa0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffbb80e7181920
EXCEPTION_PARAMETER1: fffffc898ae75498
EXCEPTION_PARAMETER2: ffffbb80e7181920
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: javaw.exe
TRAP_FRAME: ce8b480874f68548 -- (.trap 0xce8b480874f68548)
Unable to read trap frame at ce8b4808`74f68548
BAD_STACK_POINTER: ffffbb80e71810a8
STACK_TEXT:
ffffbb80`e71810a8 fffff801`0f30e59f : 00000000`0000001e ffffffff`c0000005 fffff801`0f1fd147 fffffc89`8ae75498 : nt!KeBugCheckEx
ffffbb80`e71810b0 fffff801`0f20dc66 : ffffbb80`e7181920 fffff801`0f08d9e5 fffffc89`8ae756d0 fffff801`0f1fd147 : nt!KiFatalFilter+0x1f
ffffbb80`e71810f0 fffff801`0f1cbed2 : fffff801`00000002 fffff801`0eec9aa4 fffffc89`8ae71000 fffffc89`8ae77000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
ffffbb80`e7181130 fffff801`0f1fe0d2 : fffff801`0eec9aa4 ffffbb80`e7181710 fffff801`0f1cbe30 00000000`00000000 : nt!_C_specific_handler+0xa2
ffffbb80`e71811a0 fffff801`0f052db7 : ffffbb80`e7181710 00000000`00000000 fffffc89`8ae762a0 fffff801`0f00d468 : nt!RtlpExecuteHandlerForException+0x12
ffffbb80`e71811d0 fffff801`0f0519a6 : fffffc89`8ae75498 ffffbb80`e7181e20 fffffc89`8ae75498 ffff9209`2d909750 : nt!RtlDispatchException+0x297
ffffbb80`e71818f0 fffff801`0f1f60a2 : 88250c8b`4865ff99 ff982260`e8000001 ce8b4808`74f68548 e8cd8b00`00150be8 : nt!KiDispatchException+0x186
ffffbb80`e7181fb0 fffff801`0f1f6070 : fffff801`0f2072a5 fffffc89`8ae75810 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffffc89`8ae75358 fffff801`0f2072a5 : fffffc89`8ae75810 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffffc89`8ae75360 fffff801`0f202fe0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125
fffffc89`8ae75540 fffff801`0f1fd147 : ffff9209`2188bc00 fffff801`1d806d7c 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
fffffc89`8ae756d0 fffff801`1d806d7c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault
fffffc89`8ae756e0 fffff801`1d8044fb : 00000000`00000002 ffff9209`2d909750 fffffc89`8ae759a0 00000000`00000000 : Ndu!PplGenericAllocateFunction+0x1c
fffffc89`8ae75720 fffff801`11318cee : 00000000`00000000 fffffc89`8ae75829 00000000`00000000 fffffc89`8ae75af0 : Ndu!NduOutboundTransportClassify+0x38b
fffffc89`8ae757c0 fffff801`123c3ffb : 00000000`00000000 00000000`00000000 ffff9209`2c22acb0 ffff9209`2c22acb0 : NETIO!KfdClassify2+0x19e
fffffc89`8ae75890 fffff801`123c322b : ffff9209`1971f988 00000000`02d8fc64 00000000`00000014 ffff9209`22e57d90 : tcpip!IppInspectLocalDatagramsOut+0x6cb
fffffc89`8ae75b60 fffff801`123c1d99 : ffffbb80`00000000 00000000`00000000 fffff801`12588230 ffff9209`2c22acb0 : tcpip!IppSendDatagramsCommon+0x41b
fffffc89`8ae75ce0 fffff801`123e4536 : ffff9209`278f9790 00000000`00000014 00000000`00000000 ffff9209`2c22acb0 : tcpip!IpNlpFastSendDatagram+0x349
fffffc89`8ae75da0 fffff801`123e2884 : fffffc89`8ae76300 fffffc89`8ae76410 fffffc89`8ae76220 00000000`00000001 : tcpip!TcpTcbSend+0x1736
fffffc89`8ae76120 fffff801`123e24ee : 00000000`00000000 00000000`00000000 fffffc89`8ae76380 fffff801`123e24c0 : tcpip!TcpEnqueueTcbSend+0x374
fffffc89`8ae76260 fffff801`0f00d468 : ffff9209`27aaee01 00000000`00000000 fffffc89`00000000 00000000`00000001 : tcpip!TcpTlConnectionSendCalloutRoutine+0x2e
fffffc89`8ae762a0 fffff801`0f00d3dd : fffff801`123e24c0 fffffc89`8ae76380 ffff9209`3440fdb8 00000000`00000001 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffffc89`8ae76310 fffff801`12401d30 : ffff9209`3440fbb0 00000000`00000000 03eb0c04`100003eb 80000000`00000026 : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffffc89`8ae76350 fffff801`1c79c0cf : ffff9209`3440fdb8 ffff9209`27aaee40 00000000`0000000b ffff9209`3440fdb8 : tcpip!TcpTlConnectionSend+0x80
fffffc89`8ae763c0 fffff801`1c79befa : ffff9209`27aaee40 fffffc89`8ae76b80 ffff9209`2d7ac110 ffff9209`3440fbb0 : afd!AfdTLStartBufferedVcSend+0x9f
fffffc89`8ae76470 fffff801`1c781720 : ffff9209`3440fdb8 00000000`00000000 ffff9209`0000000b fffffc89`8ae76968 : afd!AfdFastConnectionSend+0x2a2
fffffc89`8ae76540 fffff801`0f4c1b92 : 00000000`00000000 00000000`0001201f fffffc89`8ae76b80 ffff9209`2fe85c70 : afd!AfdFastIoDeviceControl+0xf90
fffffc89`8ae768e0 fffff801`0f4c17f6 : 00000000`00000000 00000000`00000efc 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382
fffffc89`8ae76a20 fffff801`0f206bb8 : 00000000`00000002 00000000`00000000 ffff9209`16ec9600 ffffbb80`e6d9e180 : nt!NtDeviceIoControlFile+0x56
fffffc89`8ae76a90 00007ffe`4f5cbe84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000099`bef3edb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`4f5cbe84
SYMBOL_NAME: Ndu!PplGenericAllocateFunction+1c
MODULE_NAME: Ndu
IMAGE_NAME: Ndu.sys
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1c
FAILURE_BUCKET_ID: 0x1E_c0000005_STACKPTR_ERROR_Ndu!PplGenericAllocateFunction
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {040fbfea-4e33-dce2-4a10-b9c4b0dd9e1c}
Followup: MachineOwner
---------