Sistemi de yazayım isterseniz. İşlemcim ve ekran kartım amd çünkü.Çözüm: DRIVER_IRQL_NOT_LESS_OR_EQUAL
DRIVER_IRQL_NOT_LESS_OR_EQUAL mavi ekran hatası alıyorsanız bu sorun genelde sistemle uyumlu olmayan bir sürücüden kaynaklanıyordur ve bu sorunu, ilgili sürücüyü güncelleeyrek çözebilirsiniz. Bu örnekte çıkan mavi ekran hatasına bakalım: A problem has been detected and Windows has been shut...www.technopat.net
Sistemi de yazayım isterseniz. İşlemcim ve ekran kartım amd çünkü.
Sistemini yazabilir misin?Sistemi de yazayım isterseniz. İşlemcim ve ekran kartım amd çünkü.
m5a78l-m lx3 (bios 1201 son çıkan 1401 ama usb okumuyor o yüzden güncelleyemedim)@Murat5038 hocamız müsait ise yardım eder benim gözüme çarptı konu bakarken linkte elimin altında hazırdı. Büyük ihtimal sürücü uyuşmazlığı ama hangi sürücü onu bilmemiz için dump'ı okumak gerekiyor.
Sistemini yazabilir misin?
Çözüm var BIOS güncellemeye çalış hiç bir usb çalışmıyor mu? Sonra ram'leri tek tek deneyebiliyorsan öyle bir dene. Yakın zaman da bir güncelleme veya güncel bir sürücü yüklemesi yaptıysan kaldırıp öyle dene.m5a78l-m lx3 (bios 1201 son çıkan 1401 ama usb okumuyor o yüzden güncelleyemedim)
amd fx 6100 Six core
radeon r7 265 (son çıkan güncellemeyi kurdum optional olan)
8gb (4x2) (kingstondu galiba nereden bakılıyor bilmiyorum)
Eski pc 4 yıl oldu ama iyi kötü işimi görüyor. Mavi ekran verince korktum, inşallah çözümü vardır. Teşekkür ederim.
Elimde 1 tane usb var o da kingston. Biosu açıp (anakart asus bu arada) ez flash 2'yi seçiyorum ama C: D: ve D: E: sürücüleri çıkıyor, usb çıkmıyor.Çözüm var BIOS güncellemeye çalış hiç bir usb çalışmıyor mu? Sonra ram'leri tek tek deneyebiliyorsan öyle bir dene. Yakın zaman da bir güncelleme veya güncel bir sürücü yüklemesi yaptıysan kaldırıp öyle dene.
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8052e2a6cb3, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 41
Key : Analysis.Elapsed.Sec
Value: 119
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 1201
BIOS_DATE: 04/19/2013
BASEBOARD_MANUFACTURER: ASUSTeK Computer INC.
BASEBOARD_PRODUCT: M5A78L-M LX3
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8052e2a6cb3
READ_ADDRESS: GetUlongFromAddress: unable to read from fffff80529cd9400
fffff80529d54390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
L1C63x64!DmaFillTpds+177
fffff805`2e2a6cb3 488b08 mov rcx,qword ptr [rax]
CPU_COUNT: 6
CPU_MHZ: cf3
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 1
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: chrome.exe
ANALYSIS_SESSION_HOST: DESKTOP-I8FA0KP
ANALYSIS_SESSION_TIME: 08-27-2019 00:11:14.0528
ANALYSIS_VERSION: 10.0.18914.1001 amd64fre
TRAP_FRAME: ffffa289fb897df0 -- (.trap 0xffffa289fb897df0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=00000000000015f2
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8052e2a6cb3 rsp=ffffa289fb897f80 rbp=ffffbc8ed97c98d0
r8=0000000000000032 r9=ffffbc8ed6fb0000 r10=0000fffff8052e2a
r11=ffff99fe6dc00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
L1C63x64!DmaFillTpds+0x177:
fffff805`2e2a6cb3 488b08 mov rcx,qword ptr [rax] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff805299d77e9 to fffff805299c5f50
STACK_TEXT:
ffffa289`fb897ca8 fffff805`299d77e9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffa289`fb897cb0 fffff805`299d3bd4 : ffffaa00`3cdf16e0 fffff805`2a2a952a 00000000`00000000 ffffbc8e`db7fee38 : nt!KiBugCheckDispatch+0x69
ffffa289`fb897df0 fffff805`2e2a6cb3 : ffffbc8e`e0f882f0 ffffbc8e`e007d4b8 00000000`a7fc44d0 fffff805`299c1201 : nt!KiPageFault+0x454
ffffa289`fb897f80 fffff805`2e2a6edb : ffffbc8e`000005b2 00000000`00000000 ffffbc8e`d97c98d0 ffffa289`fb8980a0 : L1C63x64!DmaFillTpds+0x177
ffffa289`fb897fe0 fffff805`2a2a7e31 : ffffbc8e`e94a8f98 ffffbc8e`e94a8f80 ffffbc8e`e007db6e 00000000`0000069e : L1C63x64!DmaProcessSGList+0x9f
ffffa289`fb898010 fffff805`2a2a7ac4 : ffffbc8e`d912f050 ffffbc8e`d663dd20 ffffbc8e`d663dd01 ffffbc8e`00000000 : hal!HalpAllocateAdapterCallbackV2+0x171
ffffa289`fb8980a0 fffff805`2a2a73b5 : fffff805`2a2a7cc0 ffffbc8e`d912f050 ffffbc8e`e0f882f0 00000000`00000001 : hal!HalAllocateAdapterChannelV2+0x148
ffffa289`fb8980f0 fffff805`2a29dfcb : 00000000`00000000 ffffbc8e`e0f882f0 00000000`00000000 ffffbc8e`e0f882f0 : hal!HalAllocateAdapterChannel+0x45
ffffa289`fb898130 fffff805`2a28779a : ffffbc8e`d663dd20 ffffbc8e`d912f050 ffffbc8e`e0f882f0 ffffbc8e`e007d4d0 : hal!HalBuildScatterGatherListV2+0x1850b
ffffa289`fb8981d0 fffff805`2c916407 : 00000000`00000000 ffffbc8e`d6eb6950 8a000000`a7fc4b63 ffffefde`477003f0 : hal!HalGetScatterGatherList+0x6a
ffffa289`fb898260 fffff805`2e2a70e4 : ffffbc8e`e007d4d0 00000000`00000000 ffffbc8e`d97c98d0 ffffbc8e`d6ee22c0 : ndis!NdisMAllocateNetBufferSGList+0x427
ffffa289`fb898330 fffff805`2e2a7512 : ffffbc8e`d6fb0000 ffffbc8e`da8ed9c0 ffffbc8e`00000000 ffffbc8e`d6fb0a20 : L1C63x64!DmaSendNetBufferList+0x1d0
ffffa289`fb898410 fffff805`2c915769 : ffffbc8e`d6ee1c02 00000000`00000001 ffffbc8e`d912f1a0 ffffbc8e`d672e8a0 : L1C63x64!MiniportSendNetBufferLists+0x11e
ffffa289`fb898450 fffff805`2c91563e : ffffbc8e`d912f100 ffffbc8e`da8ed9c0 00000000`00000000 ffffbc8e`d912f1a0 : ndis!ndisMSendNBLToMiniportInternal+0x119
ffffa289`fb898510 fffff805`2c916bd7 : ffffa289`fb898640 00000000`00000000 ffffbc8e`d65819c0 fffff805`2ca87a6c : ndis!ndisMSendNBLToMiniport+0xe
ffffa289`fb898550 fffff805`2c912f7e : 00000000`00000000 ffffa289`fb8986a0 ffffbc8e`d912f1a0 00000000`00000000 : ndis!ndisCallSendHandler+0xb7
ffffa289`fb8985a0 fffff805`2daad406 : ffffbc8e`d9894010 ffffbc8e`da8ed9c0 ffffa289`00000000 ffffbc8e`d9893010 : ndis!NdisSendNetBufferLists+0x2de
ffffa289`fb8986e0 fffff805`2daad127 : ffffbc8e`d6eed510 fffff805`2dc3c200 00000000`00000800 00000000`00000000 : tcpip!FlpSendPacketsHelper+0x2c6
ffffa289`fb8987a0 fffff805`2da4c762 : 00000000`00000000 00000000`00000004 ffffbc8e`d668a8e8 00000000`00000004 : tcpip!FlSendPackets+0x57
ffffa289`fb8987d0 fffff805`2da4b7c9 : 00000000`00000004 00000000`00000000 fffff805`2dc3c290 fffff805`2da85fdd : tcpip!IppFragmentPackets+0x492
ffffa289`fb8988b0 fffff805`2da4b430 : fffff805`2dc3c290 ffffbc8e`d668a8e8 00000000`00140005 00000000`00000001 : tcpip!IppDispatchSendPacketHelper+0xb1
ffffa289`fb898a10 fffff805`2da49fff : fffff805`00000500 00000000`00000007 00000000`00000000 ffffbc8e`d668a8e8 : tcpip!IppPacketizeDatagrams+0x2f0
ffffa289`fb898b50 fffff805`2da490a5 : ffffbc8e`e1cd9000 ffffa289`fb898f80 fffff805`2dc3c290 ffffbc8e`dedefb20 : tcpip!IppSendDatagramsCommon+0x5df
ffffa289`fb898ce0 fffff805`2da56a11 : ffffbc8e`00000014 ffffbc8e`e94f5b01 00000000`00000000 ffffbc8e`db0920f0 : tcpip!IpNlpFastSendDatagram+0x5c5
ffffa289`fb898da0 fffff805`2da59302 : ffffa289`fb899340 ffffa289`fb899430 ffffa289`fb8991c9 ffffa289`fb899340 : tcpip!TcpTcbSend+0x571
ffffa289`fb899120 fffff805`2da58e84 : ffffbc8e`d6968110 00000000`00000002 ffffa289`fb899340 ffffa289`fb899340 : tcpip!TcpEnqueueTcbSend+0x462
ffffa289`fb899230 fffff805`298f29c8 : ffffa289`fb899b01 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpTlConnectionSendCalloutRoutine+0x24
ffffa289`fb899260 fffff805`298f293d : fffff805`2da58e60 ffffa289`fb899340 ffffbc8e`df78f0e0 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffa289`fb8992d0 fffff805`2da9590c : ffffbc8e`e31a9030 fffff805`2d6e28e0 00000000`00000040 00000000`00009780 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffa289`fb899310 fffff805`2d6fad90 : ffffbc8e`df78f0e0 ffffa289`fb899b80 00000000`00000b4a 00000000`00000258 : tcpip!TcpTlConnectionSend+0x7c
ffffa289`fb899380 fffff805`2d6e1eec : ffffbc8e`00000000 00000000`0000000a 00000000`00000030 ffffa289`fb8997a0 : afd!AfdFastConnectionSend+0x420
ffffa289`fb899560 fffff805`29e3457b : ffffbc8e`00000000 ffffbc8e`e21943b0 ffffa289`fb899b80 00000000`00000018 : afd!AfdFastIoDeviceControl+0xe9c
ffffa289`fb8998e0 fffff805`29daad56 : ffffbc8e`e9eadc10 00000000`00000874 00000000`00000000 000001f5`0cafebe0 : nt!IopXxxControlFile+0x81b
ffffa289`fb899a20 fffff805`299d7208 : ffffa289`fb899ad8 00000000`00000001 00000000`00000000 ffffd98e`88640d00 : nt!NtDeviceIoControlFile+0x56
ffffa289`fb899a90 00007ffb`b9e5f844 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000001e`a71feb68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`b9e5f844
THREAD_SHA1_HASH_MOD_FUNC: 0cab5c50211051d1c60b14e439362a02eff68b8f
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: cd5fd2acf394499d02cb4abce0ec29aad1d17be8
THREAD_SHA1_HASH_MOD: 246b77381a3f7a7d55d22289a39f3c97cb3a6c70
FOLLOWUP_IP:
L1C63x64!DmaFillTpds+177
fffff805`2e2a6cb3 488b08 mov rcx,qword ptr [rax]
FAULT_INSTR_CODE: 48088b48
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: L1C63x64!DmaFillTpds+177
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: L1C63x64
IMAGE_NAME: L1C63x64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5158fbc5
IMAGE_VERSION: 2.1.0.16
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 177
FAILURE_BUCKET_ID: AV_L1C63x64!DmaFillTpds
BUCKET_ID: AV_L1C63x64!DmaFillTpds
PRIMARY_PROBLEM_CLASS: AV_L1C63x64!DmaFillTpds
TARGET_TIME: 2019-08-26T18:33:34.000Z
OSBUILD: 17763
OSSERVICEPACK: 678
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: 1d459
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_l1c63x64!dmafilltpds
FAILURE_ID_HASH: {76270725-45a3-0ed5-02d4-c98791835399}
Followup: MachineOwner
Windows'u 1903 mü yapayım? Çok fazla sorun olduğunu söylüyorlar o yüzden yapmadım. BIOS için de yukarıda yazdığım gibi USB tanımıyor bir yolu var mı tanıtmanın? Bir de mavi ekrandan sonra kulaklığın sol tarafından ses gelmemeye başladı. Bunun çözümü nedir? Teşekkürler.Windows güncelle. BIOS güncelle.
Kablolu sürücüyü güncelle.
Kod:DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff8052e2a6cb3, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 41 Key : Analysis.Elapsed.Sec Value: 119 Key : Analysis.Memory.CommitPeak.Mb Value: 80 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434 SYSTEM_MANUFACTURER: System manufacturer SYSTEM_PRODUCT_NAME: System Product Name SYSTEM_SKU: To Be Filled By O.E.M. SYSTEM_VERSION: System Version BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 1201 BIOS_DATE: 04/19/2013 BASEBOARD_MANUFACTURER: ASUSTeK Computer INC. BASEBOARD_PRODUCT: M5A78L-M LX3 BASEBOARD_VERSION: Rev X.0x DUMP_TYPE: 2 BUGCHECK_P1: 0 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff8052e2a6cb3 READ_ADDRESS: GetUlongFromAddress: unable to read from fffff80529cd9400 fffff80529d54390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd 0000000000000000 CURRENT_IRQL: 2 FAULTING_IP: L1C63x64!DmaFillTpds+177 fffff805`2e2a6cb3 488b08 mov rcx,qword ptr [rax] CPU_COUNT: 6 CPU_MHZ: cf3 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 15 CPU_MODEL: 1 CPU_STEPPING: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXPNP: 1 (!blackboxpnp) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: AV PROCESS_NAME: chrome.exe ANALYSIS_SESSION_HOST: DESKTOP-I8FA0KP ANALYSIS_SESSION_TIME: 08-27-2019 00:11:14.0528 ANALYSIS_VERSION: 10.0.18914.1001 amd64fre TRAP_FRAME: ffffa289fb897df0 -- (.trap 0xffffa289fb897df0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=00000000000015f2 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8052e2a6cb3 rsp=ffffa289fb897f80 rbp=ffffbc8ed97c98d0 r8=0000000000000032 r9=ffffbc8ed6fb0000 r10=0000fffff8052e2a r11=ffff99fe6dc00000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc L1C63x64!DmaFillTpds+0x177: fffff805`2e2a6cb3 488b08 mov rcx,qword ptr [rax] ds:00000000`00000000=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff805299d77e9 to fffff805299c5f50 STACK_TEXT: ffffa289`fb897ca8 fffff805`299d77e9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffa289`fb897cb0 fffff805`299d3bd4 : ffffaa00`3cdf16e0 fffff805`2a2a952a 00000000`00000000 ffffbc8e`db7fee38 : nt!KiBugCheckDispatch+0x69 ffffa289`fb897df0 fffff805`2e2a6cb3 : ffffbc8e`e0f882f0 ffffbc8e`e007d4b8 00000000`a7fc44d0 fffff805`299c1201 : nt!KiPageFault+0x454 ffffa289`fb897f80 fffff805`2e2a6edb : ffffbc8e`000005b2 00000000`00000000 ffffbc8e`d97c98d0 ffffa289`fb8980a0 : L1C63x64!DmaFillTpds+0x177 ffffa289`fb897fe0 fffff805`2a2a7e31 : ffffbc8e`e94a8f98 ffffbc8e`e94a8f80 ffffbc8e`e007db6e 00000000`0000069e : L1C63x64!DmaProcessSGList+0x9f ffffa289`fb898010 fffff805`2a2a7ac4 : ffffbc8e`d912f050 ffffbc8e`d663dd20 ffffbc8e`d663dd01 ffffbc8e`00000000 : hal!HalpAllocateAdapterCallbackV2+0x171 ffffa289`fb8980a0 fffff805`2a2a73b5 : fffff805`2a2a7cc0 ffffbc8e`d912f050 ffffbc8e`e0f882f0 00000000`00000001 : hal!HalAllocateAdapterChannelV2+0x148 ffffa289`fb8980f0 fffff805`2a29dfcb : 00000000`00000000 ffffbc8e`e0f882f0 00000000`00000000 ffffbc8e`e0f882f0 : hal!HalAllocateAdapterChannel+0x45 ffffa289`fb898130 fffff805`2a28779a : ffffbc8e`d663dd20 ffffbc8e`d912f050 ffffbc8e`e0f882f0 ffffbc8e`e007d4d0 : hal!HalBuildScatterGatherListV2+0x1850b ffffa289`fb8981d0 fffff805`2c916407 : 00000000`00000000 ffffbc8e`d6eb6950 8a000000`a7fc4b63 ffffefde`477003f0 : hal!HalGetScatterGatherList+0x6a ffffa289`fb898260 fffff805`2e2a70e4 : ffffbc8e`e007d4d0 00000000`00000000 ffffbc8e`d97c98d0 ffffbc8e`d6ee22c0 : ndis!NdisMAllocateNetBufferSGList+0x427 ffffa289`fb898330 fffff805`2e2a7512 : ffffbc8e`d6fb0000 ffffbc8e`da8ed9c0 ffffbc8e`00000000 ffffbc8e`d6fb0a20 : L1C63x64!DmaSendNetBufferList+0x1d0 ffffa289`fb898410 fffff805`2c915769 : ffffbc8e`d6ee1c02 00000000`00000001 ffffbc8e`d912f1a0 ffffbc8e`d672e8a0 : L1C63x64!MiniportSendNetBufferLists+0x11e ffffa289`fb898450 fffff805`2c91563e : ffffbc8e`d912f100 ffffbc8e`da8ed9c0 00000000`00000000 ffffbc8e`d912f1a0 : ndis!ndisMSendNBLToMiniportInternal+0x119 ffffa289`fb898510 fffff805`2c916bd7 : ffffa289`fb898640 00000000`00000000 ffffbc8e`d65819c0 fffff805`2ca87a6c : ndis!ndisMSendNBLToMiniport+0xe ffffa289`fb898550 fffff805`2c912f7e : 00000000`00000000 ffffa289`fb8986a0 ffffbc8e`d912f1a0 00000000`00000000 : ndis!ndisCallSendHandler+0xb7 ffffa289`fb8985a0 fffff805`2daad406 : ffffbc8e`d9894010 ffffbc8e`da8ed9c0 ffffa289`00000000 ffffbc8e`d9893010 : ndis!NdisSendNetBufferLists+0x2de ffffa289`fb8986e0 fffff805`2daad127 : ffffbc8e`d6eed510 fffff805`2dc3c200 00000000`00000800 00000000`00000000 : tcpip!FlpSendPacketsHelper+0x2c6 ffffa289`fb8987a0 fffff805`2da4c762 : 00000000`00000000 00000000`00000004 ffffbc8e`d668a8e8 00000000`00000004 : tcpip!FlSendPackets+0x57 ffffa289`fb8987d0 fffff805`2da4b7c9 : 00000000`00000004 00000000`00000000 fffff805`2dc3c290 fffff805`2da85fdd : tcpip!IppFragmentPackets+0x492 ffffa289`fb8988b0 fffff805`2da4b430 : fffff805`2dc3c290 ffffbc8e`d668a8e8 00000000`00140005 00000000`00000001 : tcpip!IppDispatchSendPacketHelper+0xb1 ffffa289`fb898a10 fffff805`2da49fff : fffff805`00000500 00000000`00000007 00000000`00000000 ffffbc8e`d668a8e8 : tcpip!IppPacketizeDatagrams+0x2f0 ffffa289`fb898b50 fffff805`2da490a5 : ffffbc8e`e1cd9000 ffffa289`fb898f80 fffff805`2dc3c290 ffffbc8e`dedefb20 : tcpip!IppSendDatagramsCommon+0x5df ffffa289`fb898ce0 fffff805`2da56a11 : ffffbc8e`00000014 ffffbc8e`e94f5b01 00000000`00000000 ffffbc8e`db0920f0 : tcpip!IpNlpFastSendDatagram+0x5c5 ffffa289`fb898da0 fffff805`2da59302 : ffffa289`fb899340 ffffa289`fb899430 ffffa289`fb8991c9 ffffa289`fb899340 : tcpip!TcpTcbSend+0x571 ffffa289`fb899120 fffff805`2da58e84 : ffffbc8e`d6968110 00000000`00000002 ffffa289`fb899340 ffffa289`fb899340 : tcpip!TcpEnqueueTcbSend+0x462 ffffa289`fb899230 fffff805`298f29c8 : ffffa289`fb899b01 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpTlConnectionSendCalloutRoutine+0x24 ffffa289`fb899260 fffff805`298f293d : fffff805`2da58e60 ffffa289`fb899340 ffffbc8e`df78f0e0 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78 ffffa289`fb8992d0 fffff805`2da9590c : ffffbc8e`e31a9030 fffff805`2d6e28e0 00000000`00000040 00000000`00009780 : nt!KeExpandKernelStackAndCalloutEx+0x1d ffffa289`fb899310 fffff805`2d6fad90 : ffffbc8e`df78f0e0 ffffa289`fb899b80 00000000`00000b4a 00000000`00000258 : tcpip!TcpTlConnectionSend+0x7c ffffa289`fb899380 fffff805`2d6e1eec : ffffbc8e`00000000 00000000`0000000a 00000000`00000030 ffffa289`fb8997a0 : afd!AfdFastConnectionSend+0x420 ffffa289`fb899560 fffff805`29e3457b : ffffbc8e`00000000 ffffbc8e`e21943b0 ffffa289`fb899b80 00000000`00000018 : afd!AfdFastIoDeviceControl+0xe9c ffffa289`fb8998e0 fffff805`29daad56 : ffffbc8e`e9eadc10 00000000`00000874 00000000`00000000 000001f5`0cafebe0 : nt!IopXxxControlFile+0x81b ffffa289`fb899a20 fffff805`299d7208 : ffffa289`fb899ad8 00000000`00000001 00000000`00000000 ffffd98e`88640d00 : nt!NtDeviceIoControlFile+0x56 ffffa289`fb899a90 00007ffb`b9e5f844 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 0000001e`a71feb68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`b9e5f844 THREAD_SHA1_HASH_MOD_FUNC: 0cab5c50211051d1c60b14e439362a02eff68b8f THREAD_SHA1_HASH_MOD_FUNC_OFFSET: cd5fd2acf394499d02cb4abce0ec29aad1d17be8 THREAD_SHA1_HASH_MOD: 246b77381a3f7a7d55d22289a39f3c97cb3a6c70 FOLLOWUP_IP: L1C63x64!DmaFillTpds+177 fffff805`2e2a6cb3 488b08 mov rcx,qword ptr [rax] FAULT_INSTR_CODE: 48088b48 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: L1C63x64!DmaFillTpds+177 FOLLOWUP_NAME: MachineOwner MODULE_NAME: L1C63x64 IMAGE_NAME: L1C63x64.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5158fbc5 IMAGE_VERSION: 2.1.0.16 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 177 FAILURE_BUCKET_ID: AV_L1C63x64!DmaFillTpds BUCKET_ID: AV_L1C63x64!DmaFillTpds PRIMARY_PROBLEM_CLASS: AV_L1C63x64!DmaFillTpds TARGET_TIME: 2019-08-26T18:33:34.000Z OSBUILD: 17763 OSSERVICEPACK: 678 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: unknown_date BUILDDATESTAMP_STR: 180914-1434 BUILDLAB_STR: rs5_release BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434 ANALYSIS_SESSION_ELAPSED_TIME: 1d459 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:av_l1c63x64!dmafilltpds FAILURE_ID_HASH: {76270725-45a3-0ed5-02d4-c98791835399} Followup: MachineOwner