Hi,
This is the first time I'm seeing this error but I'm understanding this is a driver issue? This is what I got back after debugging the minidump file. Is the supposed issue with Ndu.sys? I'm new to this so any help would be nice.
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8045c5cabc7, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2703
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-33O254F
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3220
Key : Analysis.Memory.CommitPeak.Mb
Value: 90
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8045c5cabc7
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff8045c9713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8045c8283b8: Unable to get Flags value from nt!KdVersionBlock
fffff8045c8283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
EXCEPTION_PARAMETER2: ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: ModernWarfare.
DPC_STACK_BASE: FFFFF2867AE76FB0
TRAP_FRAME: ffff8a0c3c8e7c28 -- (.trap 0xffff8a0c3c8e7c28)
Unable to read trap frame at ffff8a0c
SYMBOL_NAME: Ndu!PplGenericAllocateFunction+1c
MODULE_NAME: Ndu
IMAGE_NAME: Ndu.sys
IMAGE_VERSION: 10.0.18362.904
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1c
FAILURE_BUCKET_ID: 0x1E_c0000005_R_Ndu!PplGenericAllocateFunction
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9b035f9e-021c-33b1-7c26-4c128c688a07}
Followup: MachineOwner
This is the first time I'm seeing this error but I'm understanding this is a driver issue? This is what I got back after debugging the minidump file. Is the supposed issue with Ndu.sys? I'm new to this so any help would be nice.
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8045c5cabc7, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2703
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-33O254F
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3220
Key : Analysis.Memory.CommitPeak.Mb
Value: 90
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8045c5cabc7
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff8045c9713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8045c8283b8: Unable to get Flags value from nt!KdVersionBlock
fffff8045c8283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
EXCEPTION_PARAMETER2: ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: ModernWarfare.
DPC_STACK_BASE: FFFFF2867AE76FB0
TRAP_FRAME: ffff8a0c3c8e7c28 -- (.trap 0xffff8a0c3c8e7c28)
Unable to read trap frame at ffff8a0c
3c8e7c28
STACK_TEXT:
fffff286
7ae74918 fffff8045c6a5f1e : 00000000
0000001e ffffffffc0000005 fffff804
5c5cabc7 0000000000000000 : nt!KeBugCheckEx
fffff286
7ae74920 fffff8045c5cbad2 : fffff804
5c90f000 fffff8045c400000 0005e1a0
00ab5000 000000000010001f : nt!KiFatalExceptionHandler+0x22
fffff286
7ae74960 fffff8045c40cca5 : 00000000
00000000 0000000000000000 fffff286
7ae74ed0 00007fffffff0000 : nt!RtlpExecuteHandlerForException+0x12
fffff286
7ae74990 fffff8045c40b33e : fffff286
7ae758c8 fffff2867ae75610 fffff286
7ae758c8 ffff8a0c3570a5c0 : nt!RtlDispatchException+0x4a5
fffff286
7ae750e0 fffff8045c5d4c5d : ffff8a0c
3c8e7c34 0000000000000000 ffff8a0c
3c8e7c28 000000000000000c : nt!KiDispatchException+0x16e
fffff286
7ae75790 fffff8045c5d09e0 : a3d70a3d
70a3d700 fffff8046126bf11 ffff8a0c
3a75fd00 ffff8a0c3a75fde0 : nt!KiExceptionDispatch+0x11d
fffff286
7ae75970 fffff8045c5cabc7 : ffff8a0c
35709580 fffff80461fa6d7c fffff286
7ae75ba0 0000000000000000 : nt!KiGeneralProtectionFault+0x320
fffff286
7ae75b00 fffff80461fa6d7c : fffff286
7ae75ba0 0000000000000000 00000000
00000000 fffff8045f3118fe : nt!ExpInterlockedPopEntrySListFault
fffff286
7ae75b10 fffff80461fa4c7b : fffff286
7ae75d00 0000000000000000 00000000
00000000 0000000000000000 : Ndu!PplGenericAllocateFunction+0x1c
fffff286
7ae75b50 fffff80461fa3568 : 00000000
00000000 0006008001000000 ffff8a0c
3a2202c0 0000000000000000 : Ndu!NduCreateNblContext+0x7b
fffff286
7ae75b90 fffff80461fa33e8 : ffff8a0c
3a2202c0 0006008001000000 00000000
00005d00 0000000000000000 : Ndu!NduOutboundMacClassifyProcessSingleNbl+0x148
fffff286
7ae75c20 fffff8045ef92f87 : fffff286
7ae75e30 0000000000000002 ffff8a0c
00000004 0000000000000000 : Ndu!NduOutboundMacClassify+0x138
fffff286
7ae75ca0 fffff8045edb17f3 : fffff286
7ae75e00 fffff8045edb4fc0 ffff8a0c
31248010 ffff8a0c3a2202c0 : NETIO!KfdClassify2+0x197
fffff286
7ae75d70 fffff8045ee0ea48 : 00000000
00000000 ffff8a0c3c8e78a0 ffff8a0c
3122fe30 fffff804612cb2c0 : wfplwfs!LwfLowerSendNetBufferLists+0x233
fffff286
7ae75eb0 fffff8045ee408dd : 00000000
00000000 fffff2867ae75f79 ffff8a0c
312550c0 0000000000000000 : ndis!ndisCallSendHandler+0x58
fffff286
7ae75f00 fffff8045ee0c13f : 00000000
00000000 ffff8a0c2bfd51a0 ffff8a0c
3126ca20 0000000000000500 : ndis!ndisInvokeNextSendHandler+0x111
fffff286
7ae75fd0 fffff8045f052b45 : ffff8a0c
31536b70 ffff8a0c3c8e78a0 00000000
00000000 ffff8a0c00000000 : ndis!NdisSendNetBufferLists+0x1af
fffff286
7ae760d0 fffff8045f05286c : ffff8a0c
30f47110 0000000000000000 00000000
00000800 0000000000000000 : tcpip!FlpSendPacketsHelper+0x2b5
fffff286
7ae76180 fffff8045f06e796 : 00000000
00000000 ffff8a0c31145e10 ffff8a0c
2b5188e8 0000000000000000 : tcpip!FlSendPackets+0x5c
fffff286
7ae761b0 fffff8045f06dba5 : 00000000
00000004 0000000000000000 fffff804
5f21e2e0 0000000000000000 : tcpip!IppFragmentPackets+0x2b6
fffff286
7ae76290 fffff8045f06d842 : 00000000
00000000 ffff8a0c3cefe3e4 00000000
00140005 0000000000000014 : tcpip!IppDispatchSendPacketHelper+0xa5
fffff286
7ae76360 fffff8045f06bfcc : 00000000
00000007 0000000000000007 ffff8a0c
2b5189b8 ffff8a0c2b5188e8 : tcpip!IppPacketizeDatagrams+0x302
fffff286
7ae764a0 fffff8045f04af00 : 00000000
00000000 0000000000000010 fffff804
5f21e2e0 ffff8a0c392209a0 : tcpip!IppSendDatagramsCommon+0x40c
fffff286
7ae76620 fffff8045f081889 : ffff8a0c
2b3cf480 ffff8a0c3a8ebbd0 00000000
00000000 0000000000000000 : tcpip!IpNlpSendDatagrams+0x40
fffff286
7ae76660 fffff8045f07e0c7 : 00000000
00000000 0000000000000006 fffff286
00000010 00000000002f9171 : tcpip!TcpTcbSend+0xb59
fffff286
7ae76a00 fffff8045c48d40a : ffffd900
edd3bf80 ffff8a0c229ec000 ffff8a0c
2b58aa48 ffffd900edd39180 : tcpip!TcpPeriodicTimeoutHandler+0x1757
fffff286
7ae76c40 fffff8045c48ca5f : ffffd900
edd39180 27d0000000000000 00000000
00000002 0000000000000004 : nt!KiExecuteAllDpcs+0x30a
fffff286
7ae76d80 fffff8045c5c9ce5 : 002a46d0
01002a46 ffffd900edd39180 00000000
00000000 0000026a2639cb90 : nt!KiRetireDpcList+0x1ef
fffff286
7ae76fb0 fffff8045c5c9ad0 : fffff286
00000000 fffff286828ccad0 00000000
00000004 ffff590cc476f04d : nt!KxRetireDpcList+0x5
fffff286
828ccad0 fffff8045c5c919e : 0000026a
2660b500 fffff286828ccb80 ffff8a0c
228a1b00 ffff8a0c3d7a9e60 : nt!KiDispatchInterruptContinue
fffff286
828ccb00 00007ff6f4850852 : 00000000
00000000 0000000000000000 00000000
00000000 0000000000000000 : nt!KiDpcInterrupt+0x2ee
000000fe
89efdc68 0000000000000000 : 00000000
00000000 0000000000000000 00000000
00000000 0000000000000000 : 0x00007ff6
f4850852SYMBOL_NAME: Ndu!PplGenericAllocateFunction+1c
MODULE_NAME: Ndu
IMAGE_NAME: Ndu.sys
IMAGE_VERSION: 10.0.18362.904
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1c
FAILURE_BUCKET_ID: 0x1E_c0000005_R_Ndu!PplGenericAllocateFunction
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9b035f9e-021c-33b1-7c26-4c128c688a07}
Followup: MachineOwner