Windows 10 BSODing, dmp readouts

  • Thread starter Thread starter MikeC18
  • Start date Start date
M

MikeC18

My computer has constantly been BSODing, and this morning I decided to do a fresh install of Windows 10 on it to see if it helps. The computer will run fine for gaming hours on end, but once i start to multitask is when it seems to go down, so the time interval between crashes is not consistent. I have updated the drivers and have now started looking at the minidump files trying to track down the issue.



One talks about discord.exe which i have now uninstalled, but before then it was still BSODing, and the other file i have references ntkrnlmp.exe. I have been looking around trying solutions i have been finding but am wondering if there is someone more experienced here that may be able to help me present time.

I have attached the .dmp readouts


Thanks





Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64

Copyright (c) Microsoft Corporation. All rights reserved.





Loading Dump File [C:\Windows\Minidump\040521-9265-01.dmp]

Mini Kernel Dump File: Only registers and stack trace are available



Symbol search path is: srv*

Executable search path is:

Windows 10 Kernel Version 19041 MP (12 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS Personal

Edition build lab: 19041.1.amd64fre.vb_release.191206-1406

Machine Name:

Kernel base = 0xfffff800`0be00000 PsLoadedModuleList = 0xfffff800`0ca2a3b0

Debug session time: Mon Apr 5 13:34:38.167 2021 (UTC - 5:00)

System Uptime: 0 days 3:59:04.793

Loading Kernel Symbols

...............................................................

................................................................

............................................

Loading User Symbols

Loading unloaded module list

........

For analysis of this file, run !analyze -v

nt!KeBugCheckEx:

fffff800`0c1f5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff68b`54f4e3b0=000000000000001e

1: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************



KMODE_EXCEPTION_NOT_HANDLED (1e)

This is a very common bugcheck. Usually the exception address pinpoints

the driver/function that caused the problem. Always note this address

as well as the link date of the driver/image that contains this address.

Arguments:

Arg1: ffffffffc0000005, The exception code that was not handled

Arg2: fffff8000c1fd147, The address that the exception occurred at

Arg3: 0000000000000000, Parameter 0 of the exception

Arg4: ffffffffffffffff, Parameter 1 of the exception



Debugging Details:

------------------





KEY_VALUES_STRING: 1



Key : Analysis.CPU.mSec

Value: 2827



Key : Analysis.DebugAnalysisManager

Value: Create



Key : Analysis.Elapsed.mSec

Value: 14513



Key : Analysis.Init.CPU.mSec

Value: 406



Key : Analysis.Init.Elapsed.mSec

Value: 20327



Key : Analysis.Memory.CommitPeak.Mb

Value: 74



Key : WER.OS.Branch

Value: vb_release



Key : WER.OS.Timestamp

Value: 2019-12-06T14:06:00Z



Key : WER.OS.Version

Value: 10.0.19041.1





BUGCHECK_CODE: 1e



BUGCHECK_P1: ffffffffc0000005



BUGCHECK_P2: fffff8000c1fd147



BUGCHECK_P3: 0



BUGCHECK_P4: ffffffffffffffff



READ_ADDRESS: fffff8000cafb390: Unable to get MiVisibleState

Unable to get NonPagedPoolStart

Unable to get NonPagedPoolEnd

Unable to get PagedPoolStart

Unable to get PagedPoolEnd

unable to get nt!MmSpecialPagesInUse

ffffffffffffffff



EXCEPTION_PARAMETER2: ffffffffffffffff



BLACKBOXBSD: 1 (!blackboxbsd)





BLACKBOXNTFS: 1 (!blackboxntfs)





BLACKBOXPNP: 1 (!blackboxpnp)





BLACKBOXWINLOGON: 1



CUSTOMER_CRASH_COUNT: 1



PROCESS_NAME: Discord.exe



TRAP_FRAME: fffff68b54f4ec50 -- (.trap 0xfffff68b54f4ec50)

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=00000005f1550000 rbx=0000000000000000 rcx=ffffc20b7e6ac800

rdx=0076006500440050 rsi=0000000000000000 rdi=0000000000000000

rip=fffff8000c1fd147 rsp=fffff68b54f4ede0 rbp=fffff68b54f4f009

r8=0076006500440050 r9=0000000000000001 r10=ffffc20b7e6ac800

r11=fffff68b54f4ee78 r12=0000000000000000 r13=0000000000000000

r14=0000000000000000 r15=0000000000000000

iopl=0 nv up ei pl nz na po nc

nt!ExpInterlockedPopEntrySListFault:

fffff800`0c1fd147 498b08 mov rcx,qword ptr [r8] ds:00760065`00440050=????????????????

Resetting default scope



STACK_TEXT:

fffff68b`54f4e3a8 fffff800`0c230d05 : 00000000`0000001e ffffffff`c0000005 fffff800`0c1fd147 00000000`00000000 : nt!KeBugCheckEx

fffff68b`54f4e3b0 fffff800`0c2072ac : ffffe683`b5d7ccc0 fffff68b`54f4eba0 fffff68b`54f4ec50 fffff68b`54f4eb90 : nt!KiDispatchException+0x1df4e5

fffff68b`54f4ea70 fffff800`0c202fe0 : ffffe683`b594d830 fffff800`0c4f51ae 00000000`00000000 fffff800`0c4edf27 : nt!KiExceptionDispatch+0x12c

fffff68b`54f4ec50 fffff800`0c1fd147 : ffffc20b`8e0710b0 fffff800`0c4f5f70 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320

fffff68b`54f4ede0 fffff800`0c4f5f70 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault

fffff68b`54f4edf0 fffff800`0c4f5da9 : ffffc20b`8e0710b0 00000000`00000000 ffffe683`b594d830 00000000`00000001 : nt!ObpCaptureObjectName+0x120

fffff68b`54f4ee80 fffff800`0c4f5537 : ffffc20b`8e071010 ffffc20b`7e6972a0 ffffe683`b5d7ccc0 fffff68b`54f4f050 : nt!ObpCaptureObjectCreateInformation+0x1c9

fffff68b`54f4ef20 fffff800`0c4f544c : 00000000`00000000 00000000`00000000 00000000`00000000 ffffc20b`7e6f1640 : nt!ObOpenObjectByNameEx+0xc7

fffff68b`54f4f050 fffff800`0c4f4f71 : fffff68b`54f4f510 fffff68b`54f4f3c0 00000000`00000000 01000000`00100000 : nt!ObOpenObjectByName+0x5c

fffff68b`54f4f0a0 fffff800`0c46c9b2 : ffffe683`b5863040 fffff800`0c4f138c 00000000`0000193c 00000000`00000000 : nt!CmOpenKey+0x2c1

fffff68b`54f4f300 fffff800`0c206bb8 : 00000000`00000000 fffff68b`54f4f650 00000000`00000002 00000000`00000000 : nt!NtOpenKey+0x12

fffff68b`54f4f340 fffff800`0c1f9070 : fffff800`0c43b38c ffffc20b`96b5f6d0 fffff800`0c1f9070 00000000`00000010 : nt!KiSystemServiceCopyEnd+0x28

fffff68b`54f4f4d8 fffff800`0c43b38c : ffffc20b`96b5f6d0 fffff800`0c1f9070 00000000`00000010 00000000`00040082 : nt!KiServiceLinkage

fffff68b`54f4f4e0 fffff800`0c43b1f1 : fffff68b`54f4f800 ffffffff`8000193c 00000000`006c006a fffff800`0c5bd7f0 : nt!SepRegOpenKey+0x68

fffff68b`54f4f550 fffff800`0c486f8b : fffff68b`54f4f800 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SepRegQueryDwordValue+0x29

fffff68b`54f4f590 fffff800`0c40be3a : fffff68b`54f4f840 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeGetImageRequiredSigningLevel+0x63

fffff68b`54f4f5f0 fffff800`0c40bbbf : 00000000`00000000 fffff68b`54f4f840 ffffe683`bd7a3500 ffffc20b`8e221400 : nt!MiValidateExistingImage+0x1e2

fffff68b`54f4f6a0 fffff800`0c4ff5ed : 00000000`00000000 fffff68b`54f4f840 ffffc20b`96b5f080 ffffc20b`a46042b0 : nt!MiShareExistingControlArea+0xc7

fffff68b`54f4f6d0 fffff800`0c4fed64 : ffffc20b`8e2214d0 00000000`00000000 ffffc20b`a46042b0 00000000`00000000 : nt!MiCreateImageOrDataSection+0x1ad

fffff68b`54f4f7c0 fffff800`0c4feb47 : 00000000`01000000 fffff68b`54f4fb80 00000000`00000001 00000000`00000010 : nt!MiCreateSection+0xf4

fffff68b`54f4f940 fffff800`0c4fe92c : 00000000`00b5e438 00000000`0000000d 00000000`00000000 00000000`00000001 : nt!MiCreateSectionCommon+0x207

fffff68b`54f4fa20 fffff800`0c206bb8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtCreateSection+0x5c

fffff68b`54f4fa90 00007ff8`ba46c6e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28

00000000`00b5e398 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`ba46c6e4





SYMBOL_NAME: nt!KiDispatchException+1df4e5



MODULE_NAME: nt



IMAGE_NAME: ntkrnlmp.exe



IMAGE_VERSION: 10.0.19041.631



STACK_COMMAND: .thread ; .cxr ; kb



BUCKET_ID_FUNC_OFFSET: 1df4e5



FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!KiDispatchException



OS_VERSION: 10.0.19041.1



BUILDLAB_STR: vb_release



OSPLATFORM_TYPE: x64



OSNAME: Windows 10



FAILURE_ID_HASH: {8cda4994-5937-8d70-909d-3f5236ba02c6}



Followup: MachineOwner

---------



1: kd> lmvm nt

Browse full module list

start end module name

fffff800`0be00000 fffff800`0ce46000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\F923DA2D238E7C7CE180B962B19A37811\ntkrnlmp.pdb

Loaded symbol image file: ntkrnlmp.exe

Mapped memory image file: C:\ProgramData\Dbg\sym\ntoskrnl.exe\ED9DC31E1046000\ntoskrnl.exe

Image path: ntkrnlmp.exe

Image name: ntkrnlmp.exe

Browse all global symbols functions data

Image was built with /Brepro flag.

Timestamp: ED9DC31E (This is a reproducible build file hash, not a timestamp)

CheckSum: 00A5F2BD

ImageSize: 01046000

File version: 10.0.19041.631

Product version: 10.0.19041.631

File flags: 0 (Mask 3F)

File OS: 40004 NT Win32

File type: 1.0 App

File date: 00000000.00000000

Translations: 0409.04b0

Information from resource tables:

CompanyName: Microsoft Corporation

ProductName: Microsoft® Windows® Operating System

InternalName: ntkrnlmp.exe

OriginalFilename: ntkrnlmp.exe

ProductVersion: 10.0.19041.631

FileVersion: 10.0.19041.631 (WinBuild.160101.0800)

FileDescription: NT Kernel & System

LegalCopyright: © Microsoft Corporation. All rights reserved.

NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2103.1004.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'

NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2103.1004.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'

NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2103.1004.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'

NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2103.1004.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'

NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2103.1004.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'

NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2103.1004.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'

NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2103.1004.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'

NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2103.1004.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'

NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2103.1004.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'

NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2103.1004.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'

NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2103.1004.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'

NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2103.1004.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'



Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64

Copyright (c) Microsoft Corporation. All rights reserved.





Loading Dump File [C:\Windows\Minidump\040521-5390-01.dmp]

Mini Kernel Dump File: Only registers and stack trace are available





************* Path validation summary **************

Response Time (ms) Location

Deferred srv*

Symbol search path is: srv*

Executable search path is:

Windows 10 Kernel Version 19041 MP (12 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS Personal

Edition build lab: 19041.1.amd64fre.vb_release.191206-1406

Machine Name:

Kernel base = 0xfffff804`5f400000 PsLoadedModuleList = 0xfffff804`6002a3b0

Debug session time: Mon Apr 5 09:11:27.339 2021 (UTC - 5:00)

System Uptime: 0 days 0:05:11.035

Loading Kernel Symbols

...............................................................

................................................................

...................................

Loading User Symbols

Loading unloaded module list

......

For analysis of this file, run !analyze -v

nt!KeBugCheckEx:

fffff804`5f7f5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff804`6307ae20=0000000000000133

0: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************



DPC_WATCHDOG_VIOLATION (133)

The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL

or above.

Arguments:

Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending

component can usually be identified with a stack trace.

Arg2: 0000000000000501, The DPC time count (in ticks).

Arg3: 0000000000000500, The DPC time allotment (in ticks).

Arg4: fffff804600fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains

additional information regarding this single DPC timeout



Debugging Details:

------------------



*************************************************************************

*** ***

*** ***

*** Either you specified an unqualified symbol, or your debugger ***

*** doesn't have full symbol information. Unqualified symbol ***

*** resolution is turned off by default. Please either specify a ***

*** fully qualified symbol module!symbolname, or enable resolution ***

*** of unqualified symbols by typing ".symopt- 100". Note that ***

*** enabling unqualified symbol resolution with network symbol ***

*** server shares in the symbol path may cause the debugger to ***

*** appear to hang for long periods of time when an incorrect ***

*** symbol name is typed or the network symbol server is down. ***

*** ***

*** For some commands to work properly, your symbol path ***

*** must point to .pdb files that have full type information. ***

*** ***

*** Certain .pdb files (such as the public OS symbols) do not ***

*** contain the required information. Contact the group that ***

*** provided you with these symbols if you need this command to ***

*** work. ***

*** ***

*** Type referenced: TickPeriods ***

*** ***

*************************************************************************

*** WARNING: Unable to verify checksum for win32k.sys



KEY_VALUES_STRING: 1



Key : Analysis.CPU.mSec

Value: 5265



Key : Analysis.DebugAnalysisManager

Value: Create



Key : Analysis.Elapsed.mSec

Value: 12243



Key : Analysis.Init.CPU.mSec

Value: 452



Key : Analysis.Init.Elapsed.mSec

Value: 17440



Key : Analysis.Memory.CommitPeak.Mb

Value: 102



Key : WER.OS.Branch

Value: vb_release



Key : WER.OS.Timestamp

Value: 2019-12-06T14:06:00Z



Key : WER.OS.Version

Value: 10.0.19041.1





BUGCHECK_CODE: 133



BUGCHECK_P1: 0



BUGCHECK_P2: 501



BUGCHECK_P3: 500



BUGCHECK_P4: fffff804600fb320



DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED



TRAP_FRAME: fffff8046306ac90 -- (.trap 0xfffff8046306ac90)

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=00000007566d0003 rbx=0000000000000000 rcx=ffff800fd70febc0

rdx=ffff800f00000000 rsi=0000000000000000 rdi=0000000000000000

rip=fffff8045f7fd147 rsp=fffff8046306ae20 rbp=0000000000000001

r8=ffff800f00000000 r9=ffff800fda3a7ac0 r10=ffff800fd70febc0

r11=000000000000004f r12=0000000000000000 r13=0000000000000000

r14=0000000000000000 r15=0000000000000000

iopl=0 nv up ei ng nz na po nc

nt!ExpInterlockedPopEntrySListFault:

fffff804`5f7fd147 498b08 mov rcx,qword ptr [r8] ds:ffff800f`00000000=????????????????

Resetting default scope



BLACKBOXBSD: 1 (!blackboxbsd)





BLACKBOXNTFS: 1 (!blackboxntfs)





BLACKBOXPNP: 1 (!blackboxpnp)





BLACKBOXWINLOGON: 1



CUSTOMER_CRASH_COUNT: 1



PROCESS_NAME: System



STACK_TEXT:

fffff804`6307ae18 fffff804`5f887372 : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx

fffff804`6307ae20 fffff804`5f726853 : 00000113`327640fc fffff804`5b510180 00000000`00000000 fffff804`5b510180 : nt!KeAccumulateTicks+0x15e2c2

fffff804`6307ae80 fffff804`5f72633a : fffff804`600f38c0 fffff804`6306ab80 fffff804`6ecd2700 00000000`00006300 : nt!KeClockInterruptNotify+0x453

fffff804`6307af30 fffff804`5f62ecd5 : fffff804`600f38c0 fffff804`6307af40 00000000`0000000c ffffcb53`32eec707 : nt!HalpTimerClockIpiRoutine+0x1a

fffff804`6307af60 fffff804`5f7f6cba : fffff804`6306ab80 fffff804`600f38c0 00000000`00000001 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5

fffff804`6307afb0 fffff804`5f7f7227 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa

fffff804`6306ab00 fffff804`5f803315 : ffff800f`0000000b ffff800f`00000000 fffff804`00000000 fffff804`6306ace8 : nt!KiInterruptDispatchNoLockNoEtw+0x37

fffff804`6306ac90 fffff804`5f7fd147 : 00000000`00000000 fffff804`625b23af ffff800f`dbefa5e0 ffff800f`d7d0a8e8 : nt!KiPageFault+0x315

fffff804`6306ae20 fffff804`625b23af : ffff800f`dbefa5e0 ffff800f`d7d0a8e8 fffff804`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault

fffff804`6306ae30 fffff804`6298135c : 00000000`00000000 ffff800f`db679070 ffff800f`dae5e100 00000000`00000000 : NETIO!WfpNblInfoAlloc+0x6f

fffff804`6306ae70 fffff804`629812bb : 00000000`00000000 ffff800f`daf7c720 ffff800f`dae5e100 00000000`00000000 : fwpkclnt!FwppNetBufferListAssociateContext+0x7c

fffff804`6306af10 fffff804`5c6243bd : fffff804`6306b160 ffff800f`dc9d30a0 fffff804`6306b1f0 fffff804`6306afd8 : fwpkclnt!FwpsNetBufferListAssociateContext1+0x7b

fffff804`6306af70 fffff804`625c8cee : 00000000`00000000 fffff804`6306b079 00000000`0000004e fffff804`6306b340 : Ndu!NduOutboundTransportClassify+0x24d

fffff804`6306b010 fffff804`626c3ffb : 00000000`00000000 00000000`00000000 ffff800f`dc4f1a20 ffff800f`dc4f1a20 : NETIO!KfdClassify2+0x19e

fffff804`6306b0e0 fffff804`626c322b : ffff800f`d7d0a9c8 00000000`00000007 ffff800f`da3b5000 ffff800f`d7d5f000 : tcpip!IppInspectLocalDatagramsOut+0x6cb

fffff804`6306b3b0 fffff804`626c1d99 : 00000000`00000000 00000000`00000000 fffff804`62883000 ffff800f`dc4f1a20 : tcpip!IppSendDatagramsCommon+0x41b

fffff804`6306b530 fffff804`626a103d : ffff800f`dbefa520 00000000`00000028 00000000`00000000 ffff800f`dbde5990 : tcpip!IpNlpFastSendDatagram+0x349

fffff804`6306b5f0 fffff804`626a3206 : ffff800f`dbde5990 00000000`00000000 00000000`33e653db fffff804`62883368 : tcpip!TcpTcbHeaderSend+0x5cd

fffff804`6306b8a0 fffff804`62708a52 : ffff800f`d2fdf500 00000000`00005000 00000000`00000000 ffff800f`d7d5f001 : tcpip!TcpReceive+0x4d6

fffff804`6306b990 fffff804`626c9b30 : ffff800f`d8166780 fffff804`626c6f00 00000029`00000000 ffff800f`d2e5ba60 : tcpip!TcpNlClientReceiveDatagrams+0x22

fffff804`6306b9d0 fffff804`626c647b : 00000000`00000001 fffff804`6306bb00 00000000`00000000 ffff800f`d7d5f000 : tcpip!IppProcessDeliverList+0xc0

fffff804`6306bab0 fffff804`626c59ff : fffff804`62883000 ffff800f`d7db38e0 ffff800f`d7d5f000 ffff800f`da725c00 : tcpip!IppReceiveHeaderBatch+0x21b

fffff804`6306bbb0 fffff804`626c2d9c : ffff800f`d8ef2f20 ffff800f`d8166780 00000000`00000001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x32f

fffff804`6306bcd0 fffff804`6270efcf : ffff800f`d8166780 00000000`00000000 fffff804`6306bda1 00000000`00000000 : tcpip!IpFlcReceivePackets+0xc

fffff804`6306bd00 fffff804`6270e5cc : fffff804`5f7f1301 ffff800f`d8fa3800 fffff804`62701a50 fffff804`6306c0dc : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x26f

fffff804`6306be00 fffff804`5f60d468 : ffff800f`d7ddbea0 00000000`00000002 fffff804`60127600 fffff804`6306c0f8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x17c

fffff804`6306bf50 fffff804`5f60d3dd : fffff804`6270e450 fffff804`6306c0f8 ffff800f`d2cfe4d0 fffff804`628518c4 : nt!KeExpandKernelStackAndCalloutInternal+0x78

fffff804`6306bfc0 fffff804`627015ed : 00000000`00000028 fffff804`62766b2a ffff800f`d8166900 fffff804`6298142f : nt!KeExpandKernelStackAndCalloutEx+0x1d

fffff804`6306c000 fffff804`62700ccd : 00000000`00000001 fffff804`6306c160 ffff800f`d8fa38a0 fffff804`6306c170 : tcpip!NetioExpandKernelStackAndCallout+0x8d

fffff804`6306c060 fffff804`62441eb0 : ffff800f`d82d6081 00000000`00000001 ffff800f`d7ea4070 fffff804`6306c470 : tcpip!FlReceiveNetBufferListChain+0x46d

fffff804`6306c310 fffff804`62441ccb : ffff800f`d8fc4c00 fffff804`0000dd01 fffff804`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140

fffff804`6306c3f0 fffff804`62447ef0 : ffff800f`d80141a0 ffff800f`d8166701 ffff800f`d80141a0 00000000`00000001 : ndis!ndisMTopReceiveNetBufferLists+0x22b

fffff804`6306c470 fffff804`6247dee3 : ffff800f`d8166780 fffff804`6306c541 00000000`00000000 ffff800f`d83a8320 : ndis!ndisCallReceiveHandler+0x60

fffff804`6306c4c0 fffff804`62444a94 : 00000000`000048c1 00000000`00000001 ffff800f`d80141a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df

fffff804`6306c590 fffff804`6ec361d8 : ffff800f`d80a9000 ffff800f`d80a9000 00000000`00000000 ffff800f`d80a95f0 : ndis!NdisMIndicateReceiveNetBufferLists+0x104

fffff804`6306c620 fffff804`6ec21dc8 : 00000000`00000000 00000000`ad9a1c01 ffff800f`00000400 fffff804`6306c790 : rt640x64!MpHandleRecvIntPriVLanJumbo+0x2c4

fffff804`6306c710 fffff804`62483879 : 00000000`00000000 ffff800f`d81ec4f0 ffff800f`00000000 00000000`ffffffff : rt640x64!MPHandleInterrupt+0x398

fffff804`6306c780 fffff804`5f6e535e : fffff804`5b513240 00000000`00000000 00000000`00000004 fffff804`5b510180 : ndis!ndisInterruptDpc+0x3c189

fffff804`6306c860 fffff804`5f6e4644 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e

fffff804`6306c9d0 fffff804`5f7f8d7e : 00000000`00000000 fffff804`5b510180 fffff804`60127600 ffff800f`da663080 : nt!KiRetireDpcList+0x1f4

fffff804`6306cc60 00000000`00000000 : fffff804`6306d000 fffff804`63067000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e





SYMBOL_NAME: NETIO!WfpNblInfoAlloc+6f



MODULE_NAME: NETIO



IMAGE_NAME: NETIO.SYS



IMAGE_VERSION: 10.0.19041.867



STACK_COMMAND: .thread ; .cxr ; kb



BUCKET_ID_FUNC_OFFSET: 6f



FAILURE_BUCKET_ID: 0x133_DPC_NETIO!WfpNblInfoAlloc



OS_VERSION: 10.0.19041.1



BUILDLAB_STR: vb_release



OSPLATFORM_TYPE: x64



OSNAME: Windows 10



FAILURE_ID_HASH: {4517527a-bccb-804d-edb3-bfe381d04b2e}



Followup: MachineOwner

---------

Continue reading...
 
Back
Top