Windows 10 BSOD KMODE_EXCEPTION_NOT_HANDLED by OneDrive.exe during Rocket League

  • Thread starter Thread starter ChristianKl.
  • Start date Start date
C

ChristianKl.

Hi,


since a few weeks I get regular BOSDs with KMODE_EXCEPTION_NOT_HANDLED while playing Rocket League.

Strange thing is, that the issue seems to be caused bey OneDrive, but I cannot figure out why.

I don't sync any folders which should be touched by Rocket League or the Epic Games launcher, but this BOSD always appeared while playing Rocket League.

Can you please assist in identifying the cause?


Here are the details:

================================================================================

Microsoft (R) Windows Debugger Version 10.0.19041.685 X86

Copyright (c) Microsoft Corporation. All rights reserved.





Loading Dump File [C:\Windows\MEMORY.DMP]

Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.





************* Path validation summary **************

Response Time (ms) Location

Deferred SRV*C:\Windows\symbol_cache*Symbol information

Symbol search path is: SRV*C:\Windows\symbol_cache*Symbol information

Executable search path is:

Windows 10 Kernel Version 19041 MP (16 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS

Built by: 19041.1.amd64fre.vb_release.191206-1406

Machine Name:

Kernel base = 0xfffff805`21a00000 PsLoadedModuleList = 0xfffff805`2262a2b0

Debug session time: Mon Jan 4 21:47:20.192 2021 (UTC + 1:00)

System Uptime: 0 days 16:58:53.674

Loading Kernel Symbols

...............................................................

................................................................

................................................................

......................

Loading User Symbols

PEB is paged out (Peb.Ldr = 00000000`04e56018). Type ".hh dbgerr001" for details

Loading unloaded module list

.......................

For analysis of this file, run !analyze -v

windbg> .hh dbgerr001

9: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************



KMODE_EXCEPTION_NOT_HANDLED (1e)

This is a very common bugcheck. Usually the exception address pinpoints

the driver/function that caused the problem. Always note this address

as well as the link date of the driver/image that contains this address.

Arguments:

Arg1: ffffffffc0000005, The exception code that was not handled

Arg2: fffff80521dfd6b7, The address that the exception occurred at

Arg3: ffffd40cb6cddf28, Parameter 0 of the exception

Arg4: ffff8c80755e0920, Parameter 1 of the exception



Debugging Details:

------------------





KEY_VALUES_STRING: 1



Key : Analysis.CPU.Sec

Value: 3



Key : Analysis.DebugAnalysisProvider.CPP

Value: Create: 8007007e on DESKTOP-3Q92OO0



Key : Analysis.DebugData

Value: CreateObject



Key : Analysis.DebugModel

Value: CreateObject



Key : Analysis.Elapsed.Sec

Value: 25



Key : Analysis.Memory.CommitPeak.Mb

Value: 76



Key : Analysis.System

Value: CreateObject





BUGCHECK_CODE: 1e



BUGCHECK_P1: ffffffffc0000005



BUGCHECK_P2: fffff80521dfd6b7



BUGCHECK_P3: ffffd40cb6cddf28



BUGCHECK_P4: ffff8c80755e0920



WRITE_ADDRESS: ffff8c80755e0920



EXCEPTION_PARAMETER1: ffffd40cb6cddf28



EXCEPTION_PARAMETER2: ffff8c80755e0920



BLACKBOXBSD: 1 (!blackboxbsd)





BLACKBOXNTFS: 1 (!blackboxntfs)





BLACKBOXPNP: 1 (!blackboxpnp)





BLACKBOXWINLOGON: 1



PROCESS_NAME: OneDrive.exe



TRAP_FRAME: 46d0c19f591d501b -- (.trap 0x46d0c19f591d501b)

Unable to read trap frame at 46d0c19f`591d501b



BAD_STACK_POINTER: ffff8c80755e00a8



STACK_TEXT:

ffff8c80`755e00a8 fffff805`21f0ebaf : 00000000`0000001e ffffffff`c0000005 fffff805`21dfd6b7 ffffd40c`b6cddf28 : nt!KeBugCheckEx

ffff8c80`755e00b0 fffff805`21e11986 : ffff8c80`755e0920 fffff805`21d03845 ffffd40c`b6cde160 fffff805`21dfd6b7 : nt!KiFatalFilter+0x1f

ffff8c80`755e00f0 fffff805`21dcbf32 : fffff805`00000002 fffff805`21ad8e34 ffffd40c`b6cda000 ffffd40c`b6ce0000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16

ffff8c80`755e0130 fffff805`21dfe642 : fffff805`21ad8e34 ffff8c80`755e0710 fffff805`21dcbe90 00000000`00000000 : nt!_C_specific_handler+0xa2

ffff8c80`755e01a0 fffff805`21d2bf97 : ffff8c80`755e0710 00000000`00000000 ffffd40c`b6cdf2a0 fffff805`21d54488 : nt!RtlpExecuteHandlerForException+0x12

ffff8c80`755e01d0 fffff805`21d2ab86 : ffffd40c`b6cddf28 ffff8c80`755e0e20 ffffd40c`b6cddf28 00000000`00000000 : nt!RtlDispatchException+0x297

ffff8c80`755e08f0 fffff805`21df6612 : 041cc94b`9a2fc288 5e167a5a`103c3a2a 46d0c19f`591d501b a86c07f5`51ec0fbb : nt!KiDispatchException+0x186

ffff8c80`755e0fb0 fffff805`21df65e0 : fffff805`21e078a5 00000000`00000000 00000000`0000000a 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12

ffffd40c`b6cddde8 fffff805`21e078a5 : 00000000`00000000 00000000`0000000a 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue

ffffd40c`b6cdddf0 fffff805`21e035e0 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffc40f`7fe9d541 : nt!KiExceptionDispatch+0x125

ffffd40c`b6cddfd0 fffff805`21dfd6b7 : ffffc40f`7ea2ad80 fffff805`75d56d7c ffffc40f`7e7bd730 00000000`00000002 : nt!KiGeneralProtectionFault+0x320

ffffd40c`b6cde160 fffff805`75d56d7c : ffffc40f`7e7bd730 00000000`00000002 00000000`00000000 fffff805`277d14ac : nt!ExpInterlockedPopEntrySListFault

ffffd40c`b6cde170 fffff805`75d54b4f : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : Ndu!PplGenericAllocateFunction+0x1c

ffffd40c`b6cde1b0 fffff805`75d533c9 : 00000000`00000000 00060080`01000000 ffffc40f`877cc600 00000000`7e30a301 : Ndu!NduCreateNblContext+0x77

ffffd40c`b6cde1f0 fffff805`75d53251 : 00000000`00000000 00060080`01000000 00000000`00008b00 fffff805`3078a580 : Ndu!NduOutboundMacClassifyProcessSingleNbl+0x149

ffffd40c`b6cde270 fffff805`27138cee : ffffd40c`b6cde458 00000000`00000002 00000000`00000004 ffffd40c`ffffffff : Ndu!NduOutboundMacClassify+0x151

ffffd40c`b6cde2f0 fffff805`278514d5 : 00000000`00000000 ffffc40f`80e58500 ffffc40f`88349030 00000000`00000051 : NETIO!KfdClassify2+0x19e

ffffd40c`b6cde3c0 fffff805`278510ce : 00000000`00000000 ffffc40f`817f4c30 00000000`00000000 00000000`00000000 : wfplwfs!L2InspectNetBufferListsFast+0x165

ffffd40c`b6cde4d0 fffff805`26fb58e8 : 00000000`00000001 ffffc40f`88349030 ffffc40f`8096e9b0 fffff805`3069b2c0 : wfplwfs!LwfLowerSendNetBufferLists+0xbe

ffffd40c`b6cde580 fffff805`26fee102 : 00000000`00000000 ffffd40c`b6cde649 ffffc40f`7e007c50 00000000`00000000 : ndis!ndisCallSendHandler+0x58

ffffd40c`b6cde5d0 fffff805`26fb25dd : 00000000`00000000 ffffc40f`726561a0 ffffc40f`83e68680 fffff805`277d1200 : ndis!ndisInvokeNextSendHandler+0x10e

ffffd40c`b6cde6a0 fffff805`2755fcbd : ffffc40f`823d0060 ffffc40f`817f4c30 00000000`00000000 fffff805`00000000 : ndis!NdisSendNetBufferLists+0x17d

ffffd40c`b6cde7a0 fffff805`2755f9e7 : ffffc40f`857db810 00000000`00000000 00000000`00000800 ffffc40f`7f895900 : tcpip!FlpSendPacketsHelper+0x2bd

ffffd40c`b6cde850 fffff805`27515bc5 : 00000000`00000000 fffff805`276d9230 ffffc40f`777138e8 00000000`00000000 : tcpip!FlSendPackets+0x57

ffffd40c`b6cde880 fffff805`275150e3 : 0000bb01`76e20004 00000000`00000000 fffff805`276d9230 ffffc40f`00000000 : tcpip!IppFragmentPackets+0x2a5

ffffd40c`b6cde960 fffff805`27514d68 : ffffc40f`777138e8 00000000`00000001 00000000`00000000 00000000`00002ada : tcpip!IppDispatchSendPacketHelper+0xbf

ffffd40c`b6cdea30 fffff805`275139b8 : ffffc40f`777139c8 00000000`00000007 00000000`00000000 ffffc40f`777138e8 : tcpip!IppPacketizeDatagrams+0x2e8

ffffd40c`b6cdeb60 fffff805`275124a9 : 00000000`00000000 00000000`00000000 fffff805`276d9230 ffffc40f`7d70bce0 : tcpip!IppSendDatagramsCommon+0x498

ffffd40c`b6cdece0 fffff805`27534c46 : ffffc40f`7e77c520 ffff8880`00000014 00000000`00000000 ffffc40f`7d70bce0 : tcpip!IpNlpFastSendDatagram+0x349

ffffd40c`b6cdeda0 fffff805`27532f94 : ffffc40f`77793e58 00000000`00989680 ffffc40f`848b25e0 0000008e`56827d9d : tcpip!TcpTcbSend+0x1736

ffffd40c`b6cdf120 fffff805`27532bfe : 00000000`00000000 00000000`00000000 ffffd40c`b6cdf380 fffff805`27532bd0 : tcpip!TcpEnqueueTcbSend+0x374

ffffd40c`b6cdf260 fffff805`21d54488 : ffffc40f`84516801 00000000`00000000 00000000`00000000 00000000`00000001 : tcpip!TcpTlConnectionSendCalloutRoutine+0x2e

ffffd40c`b6cdf2a0 fffff805`21d543fd : fffff805`27532bd0 ffffd40c`b6cdf380 ffffc40f`880b6318 ffffa251`28944c40 : nt!KeExpandKernelStackAndCalloutInternal+0x78

ffffd40c`b6cdf310 fffff805`27552420 : 00000000`00000000 00000000`00000000 ffffc40f`88096000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x1d

ffffd40c`b6cdf350 fffff805`3059c0cf : ffffc40f`880b6318 ffffc40f`845168f0 00000000`00020105 ffffc40f`880b6318 : tcpip!TcpTlConnectionSend+0x80

ffffd40c`b6cdf3c0 fffff805`3059befa : ffffc40f`845168f0 ffffd40c`b6cdfb80 ffffc40f`7e2fc270 ffffc40f`880b6110 : afd!AfdTLStartBufferedVcSend+0x9f

ffffd40c`b6cdf470 fffff805`30581720 : ffffc40f`880b6318 00000000`00000000 ffffc40f`00020105 ffffd40c`b6cdf968 : afd!AfdFastConnectionSend+0x2a2

ffffd40c`b6cdf540 fffff805`21ffcb82 : 00000000`0001201f 00000000`00000058 ffffc40f`83853100 ffffc40f`881521b0 : afd!AfdFastIoDeviceControl+0xf90

ffffd40c`b6cdf8e0 fffff805`21ffc7e6 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`0ab79728 : nt!IopXxxControlFile+0x382

ffffd40c`b6cdfa20 fffff805`21e071b8 : 00000000`778e4660 00000000`0579eb88 00000000`0569fda0 00000000`04e21000 : nt!NtDeviceIoControlFile+0x56

ffffd40c`b6cdfa90 00000000`778e1cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28

00000000`0569eb48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x778e1cfc





SYMBOL_NAME: Ndu!PplGenericAllocateFunction+1c



MODULE_NAME: Ndu



IMAGE_NAME: Ndu.sys



STACK_COMMAND: .thread ; .cxr ; kb



BUCKET_ID_FUNC_OFFSET: 1c



FAILURE_BUCKET_ID: 0x1E_c0000005_STACKPTR_ERROR_Ndu!PplGenericAllocateFunction



OS_VERSION: 10.0.19041.1



BUILDLAB_STR: vb_release



OSPLATFORM_TYPE: x64



OSNAME: Windows 10



FAILURE_ID_HASH: {040fbfea-4e33-dce2-4a10-b9c4b0dd9e1c}



Followup: MachineOwner

---------

================================================================================


The dump file can be downloaded here: MEMORY.zip


If you need any additional information, please let me know.


Kind regards,

Christian




Edit:

I just found out that my realtek network drivers were outdated and might be the cause.

I'll update this thread after a few days, when I tested the latest version.

Continue reading...
 

Similar threads

Back
Top