Seems like I had BSOD - Need log looked out to find out why


  1. Posts : 35
    Windows 10 Pro 64bit
       #1

    Seems like I had BSOD - Need log looked out to find out why


    I left my computer be, while it was downloading a game. I came back later, And the screens were dark, that's normal as i set them them to turn off after 20mins. But when i moved mouse or pressed keyboard keys, the display would not appear. Thou i was accessing my shared HD on another computer only moments before. I rebooted the computer and checked the Event Viewer. And i found this Event 1001, Windows Error Reporting under Windows Logs/Application. Details of this log i pasted below, and also attached a V2 Log too.

    Fault bucket , type 0Event Name: BlueScreenResponse: Not availableCab Id: 0Problem signature:P1: 1eP2: ffffffff80000003P3: fffff8050890a0c5P4: fffff80509065e58P5: fffff805090656a0P6: 10_0_18362P7: 0_0P8: 256_1P9: P10: Attached files:\\?\C:\WINDOWS\Minidump\071919-6234-01.dmp\\?\C:\WINDOWS\TEMP\WER-23859-0.sysdata.xml\\?\C:\WINDOWS\MEMORY.DMP\\?\C:\ProgramData\Microsoft\Windows\WER\Temp\WER91FF.tmp.WERI nternalMetadata.xml\\?\C:\ProgramData\Microsoft\Windows\WER\Temp\WER921F.tmp.xml\\?\C:\ProgramData\M icrosoft\Windows\WER\Temp\WER92CA.tmp.csv\\?\C:\ProgramData\Microsoft\Windows\WER\Temp\WER9878.tmp.t xtThese files may be available here:\\?\C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Kernel_1e_2445132bfd6e98c27658c94835f97a7b cd8569ea_00000000_832212bd-c523-4cd9-b347-cfcd4f8906c2Analysis symbol: Rechecking for solution: 0Report Id: 831de57c-e9ef-4ad7-8f37-f7b6c043ff44Report Status: 4Hashed bucket: Cab Guid: 0
      My Computer


  2. Posts : 392
    W10
       #2

    Asus UEFI/BIOS dates from 2015. Please visit the Asus support website for your motherboard model and update the UEFI/BIOS to the latest available version. Be sure to see if Asus still supports your motherboard for later versions of W10.

    Please follow these instructions by axe0 to run Driver Verifier: BSOD on a new build after running fine for a week

    While waiting for a reply, please start with these free hardware diagnostics:
    1) Memtest86 (not 86+): MemTest86 - Official Site of the x86 Memory Testing Tool
    2) SeaGate SeaTools for Windows (test ALL hard drives - HDD/SSD/USB/etc): How to use SeaTools for Windows | Seagate Support US
    3) Intel Processor Diagnostic Tool: Download Intel(R) Processor Diagnostic Tool
    Let us know the results and we'll move on from there.
    Last edited by jdc1; 19 Jul 2019 at 15:36.
      My Computer


  3. Posts : 1,538
    Windows 8.1 Enterprise x64
       #3

    The KMODE_EXCEPTION_NOT_HANDLED bug check has a value of 0x0000001E. This indicates that a kernel-mode program generated an exception which the error handler did not catch.
    1st parameter = 0x8000000003 - A breakpoint or ASSERT was encountered when no kernel debugger was attached to the system.
    Code:
    Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\071919-6234-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*
    Symbol search path is: SRV*
    Executable search path is: 
    Windows 10 Kernel Version 18362 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 18362.1.amd64fre.19h1_release.190318-1202
    Machine Name:
    Kernel base = 0xfffff805`05800000 PsLoadedModuleList = 0xfffff805`05c432f0
    Debug session time: Fri Jul 19 09:14:49.172 2019 (UTC + 2:00)
    System Uptime: 0 days 5:08:47.908
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................................
    ...
    Loading User Symbols
    Loading unloaded module list
    .....................
    For analysis of this file, run !analyze -v
    0: kd> !analyze
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {ffffffff80000003, fffff8050890a0c5, fffff80509065e58, fffff805090656a0}
    
    *** WARNING: Unable to verify timestamp for win32k.sys
    Probably caused by : ntkrnlmp.exe ( nt!KiFatalFilter+1f )
    
    Followup:     MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffff80000003, The exception code that was not handled
    Arg2: fffff8050890a0c5, The address that the exception occurred at
    Arg3: fffff80509065e58, Parameter 0 of the exception
    Arg4: fffff805090656a0, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    KEY_VALUES_STRING: 1
    
    
    PROCESSES_ANALYSIS: 1
    
    SERVICE_ANALYSIS: 1
    
    STACKHASH_ANALYSIS: 1
    
    TIMELINE_ANALYSIS: 1
    
    
    DUMP_CLASS: 1
    
    DUMP_QUALIFIER: 400
    
    BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202
    
    DUMP_TYPE:  2
    
    BUGCHECK_P1: ffffffff80000003
    
    BUGCHECK_P2: fffff8050890a0c5
    
    BUGCHECK_P3: fffff80509065e58
    
    BUGCHECK_P4: fffff805090656a0
    
    EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more arguments are invalid
    
    FAULTING_IP: 
    +0
    fffff805`0890a0c5 cc              int     3
    
    EXCEPTION_PARAMETER1:  fffff80509065e58
    
    EXCEPTION_PARAMETER2:  fffff805090656a0
    
    BUGCHECK_STR:  0x1E_80000003
    
    CPU_COUNT: 8
    
    CPU_MHZ: d52
    
    CPU_VENDOR:  GenuineIntel
    
    CPU_FAMILY: 6
    
    CPU_MODEL: 3a
    
    CPU_STEPPING: 9
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    ANALYSIS_SESSION_HOST:  MICHAL
    
    ANALYSIS_SESSION_TIME:  07-19-2019 13:49:23.0330
    
    ANALYSIS_VERSION: 10.0.18362.1 amd64fre
    
    EXCEPTION_RECORD:  ffffa60157aea228 -- (.exr 0xffffa60157aea228)
    ExceptionAddress: 00000000deb5fec0
       ExceptionCode: 00000001
      ExceptionFlags: ffffa601
    NumberParameters: 256
       Parameter[0]: ffffa60157aea1f8
       Parameter[1]: 0000000000000001
       Parameter[2]: ffffa601579ad050
       Parameter[3]: 0000000000000000
       Parameter[4]: 00000000deb72000
       Parameter[5]: fffff80511848bb0
       Parameter[6]: ffffa60157ac9650
       Parameter[7]: 00000000deb72000
       Parameter[8]: ffffa601576d7510
       Parameter[9]: 0000000000000001
       Parameter[10]: 00000000deb6d000
       Parameter[11]: 0000000000001000
       Parameter[12]: 0000000000000000
       Parameter[13]: 00000000deb65000
       Parameter[14]: 0000000000001000
    
    LAST_CONTROL_TRANSFER:  from fffff80505aa39d7 to fffff805059bc900
    
    STACK_TEXT:  
    fffff805`09064df8 fffff805`05aa39d7 : 00000000`0000001e ffffffff`80000003 fffff805`0890a0c5 fffff805`09065e58 : nt!KeBugCheckEx
    fffff805`09064e00 fffff805`059d4536 : fffff805`0890a0c5 fffff805`0591c28b fffff805`09066090 fffff805`090656a0 : nt!KiFatalFilter+0x1f
    fffff805`09064e40 fffff805`059991ec : 00000000`00000002 fffff805`09066f80 fffff805`09062000 fffff805`09068000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
    fffff805`09064e80 fffff805`059c5632 : fffff805`09066f80 fffff805`09065460 00000000`00000000 00000000`0010001f : nt!_C_specific_handler+0xac
    fffff805`09064ef0 fffff805`058ca765 : 00000000`00000000 00000000`00000000 fffff805`09065460 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
    fffff805`09064f20 fffff805`058cecfe : fffff805`09065e58 fffff805`09065ba0 fffff805`09065e58 00000000`00000002 : nt!RtlDispatchException+0x4a5
    fffff805`09065670 fffff805`059ce81d : ffffa601`57aea228 fffff805`062d5b50 ffffa601`576d7510 00000000`00000000 : nt!KiDispatchException+0x16e
    fffff805`09065d20 fffff805`059c81d8 : ffffa601`ffffffff 00000000`00000022 00000000`00000002 ffffa601`5bba1c30 : nt!KiExceptionDispatch+0x11d
    fffff805`09065f00 fffff805`0890a0c6 : ffffa601`59e38380 00000000`00000002 ffffa601`00000002 00000000`00000006 : nt!KiBreakpointTrap+0x318
    fffff805`09066090 ffffa601`59e38380 : 00000000`00000002 ffffa601`00000002 00000000`00000006 00000000`00000000 : 0xfffff805`0890a0c6
    fffff805`09066098 00000000`00000002 : ffffa601`00000002 00000000`00000006 00000000`00000000 ffffa601`58d700c8 : 0xffffa601`59e38380
    fffff805`090660a0 ffffa601`00000002 : 00000000`00000006 00000000`00000000 ffffa601`58d700c8 ffffa601`00000001 : 0x2
    fffff805`090660a8 00000000`00000006 : 00000000`00000000 ffffa601`58d700c8 ffffa601`00000001 ffffd080`a08d64da : 0xffffa601`00000002
    fffff805`090660b0 00000000`00000000 : ffffa601`58d700c8 ffffa601`00000001 ffffd080`a08d64da 00000000`00000007 : 0x6
    
    
    THREAD_SHA1_HASH_MOD_FUNC:  f4f21530a30e077b9315736f0bbc2df81ac4b264
    
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  a01f3d60fe20c4b99fb2eec43d9ba5aa33314ed5
    
    THREAD_SHA1_HASH_MOD:  9f457f347057f10e1df248e166a3e95e6570ecfe
    
    FOLLOWUP_IP: 
    nt!KiFatalFilter+1f
    fffff805`05aa39d7 cc              int     3
    
    FAULT_INSTR_CODE:  cccccccc
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!KiFatalFilter+1f
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  3ed0f42
    
    IMAGE_VERSION:  10.0.18362.239
    
    STACK_COMMAND:  .thread ; .cxr ; kb
    
    BUCKET_ID_FUNC_OFFSET:  1f
    
    FAILURE_BUCKET_ID:  0x1E_80000003_nt!KiFatalFilter
    
    BUCKET_ID:  0x1E_80000003_nt!KiFatalFilter
    
    PRIMARY_PROBLEM_CLASS:  0x1E_80000003_nt!KiFatalFilter
    
    TARGET_TIME:  2019-07-19T07:14:49.000Z
    
    OSBUILD:  18362
    
    OSSERVICEPACK:  239
    
    SERVICEPACK_NUMBER: 0
    
    OS_REVISION: 0
    
    SUITE_MASK:  272
    
    PRODUCT_TYPE:  1
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS
    
    OS_LOCALE:  
    
    USER_LCID:  0
    
    OSBUILD_TIMESTAMP:  1972-02-02 09:33:06
    
    BUILDDATESTAMP_STR:  190318-1202
    
    BUILDLAB_STR:  19h1_release
    
    BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202
    
    ANALYSIS_SESSION_ELAPSED_TIME:  4c2a
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:0x1e_80000003_nt!kifatalfilter
    
    FAILURE_ID_HASH:  {bf9ab27a-b6c7-08e8-0d27-df10fdd7c681}
    
    Followup:     MachineOwner
    ---------
    
    0: kd> .load pde
    =========================================================================================
     PDE v11.3 - Copyright 2017 Andrew Richards
    =========================================================================================
    0: kd> !dpx
    Start memory scan  : 0xfffff80509064df8 ($csp)
    End memory scan    : 0xfffff80509068000 (Kernel Stack Base)
    
                   rsp : 0xfffff80509064df8 : 0xfffff80505aa39d7 : nt!KiFatalFilter+0x1f
                   r14 : 0xfffff805090654e0 : 0xfffff80505871a28 : nt!KeExpandKernelStackAndCalloutInternal+0x78
    0xfffff80509064df8 : 0xfffff80505aa39d7 : nt!KiFatalFilter+0x1f
    0xfffff80509064e30 : 0xfffff80505d86010 : nt!PsInvertedFunctionTable
    0xfffff80509064e38 : 0xfffff805059d4536 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
    0xfffff80509064e48 : 0xfffff8050591c28b : nt!KeCheckStackAndTargetAddress+0x2b
    0xfffff80509064e78 : 0xfffff805059991ec : nt!_C_specific_handler+0xac
    0xfffff80509064ea8 : 0xfffff80508697649 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x169
    0xfffff80509064ec0 : 0xfffff80505d117cc : "nt!Ports <PERF> (nt+0x5117cc)"
    0xfffff80509064ed8 : 0xfffff80505871a28 : nt!KeExpandKernelStackAndCalloutInternal+0x78
    0xfffff80509064ee8 : 0xfffff805059c5632 : nt!RtlpExecuteHandlerForException+0x12
    0xfffff80509064f10 : 0xfffff805090654e0 : 0xfffff80505871a28 : nt!KeExpandKernelStackAndCalloutInternal+0x78
    0xfffff80509064f18 : 0xfffff805058ca765 : nt!RtlDispatchException+0x4a5
    0xfffff80509064fc8 : 0xfffff805058311a5 : nt!IoAllocateMdl+0x75
    0xfffff80509064fe8 : 0xfffff80505848674 : nt!KiDeferredReadyThread+0x3c4
    0xfffff80509064ff8 : 0xfffff80509066ff0 : 0xfffff805086974e0 : tcpip!FlReceiveNetBufferListChainCalloutRoutine
    0xfffff80509065018 : 0xfffff805083cc77c : ndis!NdisAllocateCloneNetBufferList+0x2ec
    0xfffff80509065058 : 0xfffff8050587199d : nt!KeExpandKernelStackAndCalloutEx+0x1d
    0xfffff80509065088 : 0xfffff80511834d00 : rt640x64!MPReturnNetBufferLists+0x190
    0xfffff805090650a8 : 0xfffff80511834ffd : rt640x64!MPSendNetBufferListsNPQ+0x2a1
    0xfffff805090650e8 : 0xfffff80511834d10 : rt640x64!MPSendNetBufferLists
    0xfffff805090650f8 : 0xfffff80511834d57 : rt640x64!MPSendNetBufferLists+0x47
    0xfffff80509065118 : 0xfffff80508693cd3 : tcpip!WfppTaggedContextClone+0x43
    0xfffff80509065138 : 0xfffff80505847488 : nt!IopfCompleteRequest+0x908
    0xfffff80509065148 : 0xfffff805085411b9 : NETIO!WfpNblInfoAlloc+0x69
    0xfffff80509065210 : 0xffffa60152ead610 : 0xfffff805086a0790 : tcpip!InetInspectCreateEndpoint
    0xfffff80509065218 : 0xfffff80508593f66 : NETIO!FwppTruncateStreamDataAfterOffset+0x46
    0xfffff80509065238 : 0xfffff80508924612 : fwpkclnt!FwpsAllocateCloneNetBufferList0+0x62
    0xfffff80509065278 : 0xfffff805062dc52a : hal!HalpDmaSyncMapBuffers+0x2c6
    0xfffff805090652a8 : 0xfffff80508911040 : fwpkclnt!FwpsCopyStreamDataToBuffer0+0x30
    0xfffff805090652b8 : 0xfffff805062d812a : hal!HalpDmaNextContiguousPieceV2+0x2e
    0xfffff80509065338 : 0xfffff805062d8080 : hal!HalpDmaMapScatterTransferV2+0x110
    Unable to load image \SystemRoot\system32\DRIVERS\klwtp.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for klwtp.sys
    0xfffff80509065398 : 0xfffff8050587313d : nt!KeQueryCurrentStackInformationEx+0x6d
    0xfffff805090653d8 : 0xfffff805058ce5f4 : nt!RtlGetExtendedContextLength2+0x3c
    0xfffff805090653e8 : 0xfffff805059256e0 : nt!RtlpGetStackLimitsEx+0x14
    0xfffff80509065418 : 0xfffff805058ca3bc : nt!RtlDispatchException+0xfc
    0xfffff80509065458 : 0xfffff80505aa500b : nt!KeReleaseInStackQueuedSpinLockForDpc+0x6b
    0xfffff80509065470 : 0xfffff80505800000 : "nt!SeConvertSecurityDescriptorToStringSecurityDescriptor <PERF> (nt+0x0)"
    0xfffff80509065478 : 0xfffff80505999140 : nt!_C_specific_handler
    0xfffff805090654d0 : 0xfffff80505d117cc : "nt!Ports <PERF> (nt+0x5117cc)"
    0xfffff805090654d8 : 0xfffff805062d6526 : hal!IoFreeAdapterChannelV2+0x6a
    0xfffff805090654e0 : 0xfffff80505871a28 : nt!KeExpandKernelStackAndCalloutInternal+0x78
    0xfffff805090654e8 : 0xfffff80505800000 : "nt!SeConvertSecurityDescriptorToStringSecurityDescriptor <PERF> (nt+0x0)"
    0xfffff805090654f0 : 0xfffff80505d117cc : "nt!Ports <PERF> (nt+0x5117cc)"
    0xfffff80509065510 : 0xfffff80505999140 : nt!_C_specific_handler
    0xfffff80509065548 : 0xfffff805058719b0 : nt!KeExpandKernelStackAndCalloutInternal
    0xfffff80509065550 : 0xfffff8050869765a : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x17a
    0xfffff80509065558 : 0xfffff80508620000 : "tcpip!TcpLimitedTransmitTcbSend <PERF> (tcpip+0x0)"
    0xfffff80509065560 : 0xfffff80508832c5c : "tcpip!Microsoft_Windows_Networking_CorrelationTraceActivityPayload <PERF> (tcpip+0x212c5c)"
    0xfffff80509065568 : 0xfffff80508620000 : "tcpip!TcpLimitedTransmitTcbSend <PERF> (tcpip+0x0)"
    0xfffff80509065570 : 0xfffff805088317a4 : "tcpip!Microsoft_Windows_Networking_CorrelationTraceActivityPayload <PERF> (tcpip+0x2117a4)"
    0xfffff80509065578 : 0xfffff80508620000 : "tcpip!TcpLimitedTransmitTcbSend <PERF> (tcpip+0x0)"
    0xfffff80509065580 : 0xfffff805088316fc : "tcpip!Microsoft_Windows_Networking_CorrelationTraceActivityPayload <PERF> (tcpip+0x2116fc)"
    0xfffff80509065588 : 0xfffff80508620000 : "tcpip!TcpLimitedTransmitTcbSend <PERF> (tcpip+0x0)"
    0xfffff80509065590 : 0xfffff80508831684 : "tcpip!Microsoft_Windows_Networking_CorrelationTraceActivityPayload <PERF> (tcpip+0x211684)"
    0xfffff80509065598 : 0xfffff80508620000 : "tcpip!TcpLimitedTransmitTcbSend <PERF> (tcpip+0x0)"
    0xfffff805090655a0 : 0xfffff80508831588 : "tcpip!Microsoft_Windows_Networking_CorrelationTraceActivityPayload <PERF> (tcpip+0x211588)"
    0xfffff805090655a8 : 0xfffff80508620000 : "tcpip!TcpLimitedTransmitTcbSend <PERF> (tcpip+0x0)"
    0xfffff805090655b0 : 0xfffff80508832e24 : "tcpip!Microsoft_Windows_Networking_CorrelationTraceActivityPayload <PERF> (tcpip+0x212e24)"
    0xfffff805090655b8 : 0xfffff80508620000 : "tcpip!TcpLimitedTransmitTcbSend <PERF> (tcpip+0x0)"
    0xfffff805090655c0 : 0xfffff80508832584 : "tcpip!Microsoft_Windows_Networking_CorrelationTraceActivityPayload <PERF> (tcpip+0x212584)"
    0xfffff805090655c8 : 0xfffff80508620000 : "tcpip!TcpLimitedTransmitTcbSend <PERF> (tcpip+0x0)"
    0xfffff805090655d0 : 0xfffff80508833298 : "tcpip!Microsoft_Windows_Networking_CorrelationTraceActivityPayload <PERF> (tcpip+0x213298)"
    0xfffff805090655d8 : 0xfffff80505800000 : "nt!SeConvertSecurityDescriptorToStringSecurityDescriptor <PERF> (nt+0x0)"
    0xfffff805090655e0 : 0xfffff80505d117cc : "nt!Ports <PERF> (nt+0x5117cc)"
    0xfffff80509065628 : 0xfffff805058cf076 : nt!KdTrap+0x22
    0xfffff80509065668 : 0xfffff805058cecfe : nt!KiDispatchException+0x16e
    0xfffff805090656a8 : 0xfffff80511848bb0 : rt640x64!MpProcessSGList
    0xfffff80509065720 : 0xfffff805086bf886 : tcpip!WfpMarshalIncomingValues+0x5e
    0xfffff80509065728 : 0xfffff80508620000 : "tcpip!TcpLimitedTransmitTcbSend <PERF> (tcpip+0x0)"
    0xfffff805090657c8 : 0xfffff80511834d00 : rt640x64!MPReturnNetBufferLists+0x190
    0xfffff805090657e8 : 0xfffff80511834ffd : rt640x64!MPSendNetBufferListsNPQ+0x2a1
    0xfffff80509065828 : 0xfffff80511834d10 : rt640x64!MPSendNetBufferLists
    0xfffff80509065838 : 0xfffff80511834d57 : rt640x64!MPSendNetBufferLists+0x47
    0xfffff80509065958 : 0xfffff805083cdc70 : ndis!ndisMSendNBLToMiniport
    0xfffff80509065960 : 0xfffff80508991500 : wfplwfs!LwfLowerReturnNetBufferLists+0x70
    0xfffff80509065970 : 0xfffff805083cdc70 : ndis!ndisMSendNBLToMiniport
    0xfffff80509065978 : 0xfffff805083cea48 : ndis!ndisCallSendHandler+0x58
    Unable to load image \SystemRoot\system32\DRIVERS\klim6.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for klim6.sys
    0xfffff80509065a38 : 0xfffff80508922150 : fwpkclnt!FwppGetPacketInfo+0x10
    0xfffff80509065a78 : 0xfffff805062dc52a : hal!HalpDmaSyncMapBuffers+0x2c6
    0xfffff80509065ab8 : 0xfffff805062d812a : hal!HalpDmaNextContiguousPieceV2+0x2e
    0xfffff80509065af8 : 0xfffff805058ce5f4 : nt!RtlGetExtendedContextLength2+0x3c
    0xfffff80509065b38 : 0xfffff805058ce4ed : nt!RtlGetExtendedContextLength+0x2d
    0xfffff80509065b98 : 0xfffff805062d6163 : hal!HalpMapTransferV2+0x8f
    0xfffff80509065d18 : 0xfffff805059ce81d : nt!KiExceptionDispatch+0x11d
    0xfffff80509065d28 : 0xfffff805062d5b50 : hal!IoFreeAdapterChannel+0x20
    0xfffff80509065df8 : 0xfffff805089118fe : fwpkclnt!FwpsNetBufferListRetrieveContext0+0x4e
    0xfffff80509065ea8 : 0xfffff80511848bb0 : rt640x64!MpProcessSGList
    0xfffff80509065ee8 : 0xfffff805111f33e8 : Ndu!NduOutboundMacClassify+0x138
    0xfffff80509065ef8 : 0xfffff805059c81d8 : nt!KiBreakpointTrap+0x318
    0xfffff80509065f00 : 0xffffa601ffffffff :  Trap @ fffff80509065f00
    0xfffff80509065f38 : 0xfffff805086bf886 : tcpip!WfpMarshalIncomingValues+0x5e
    0xfffff80509065f40 : 0xfffff80508620000 : "tcpip!TcpLimitedTransmitTcbSend <PERF> (tcpip+0x0)"
    0xfffff80509065fe8 : 0xfffff80511834ffd : rt640x64!MPSendNetBufferListsNPQ+0x2a1
    0xfffff80509066028 : 0xfffff80511834d10 : rt640x64!MPSendNetBufferLists
    0xfffff80509066038 : 0xfffff80511834d57 : rt640x64!MPSendNetBufferLists+0x47
    0xfffff80509066050 : 0xfffff805083cdc70 : ndis!ndisMSendNBLToMiniport
    Unable to load image \SystemRoot\system32\DRIVERS\kneps.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for kneps.sys
    0xfffff805090661a8 : 0xfffff8050868d763 : tcpip!WfpTlShimInspectRecvTcpDatagram+0x97f
    0xfffff805090661c8 : 0xfffff805084008a0 : ndis!ndisInvokeNextSendHandler+0x194
    0xfffff80509066298 : 0xfffff805083cc13f : ndis!NdisSendNetBufferLists+0x1af
    0xfffff805090662d8 : 0xfffff80508551a2b : NETIO!NetioAllocateAndReferenceCopyNetBufferListEx+0x11b
    0xfffff80509066458 : 0xfffff80508642ee6 : tcpip!InetInspectReceiveTcpDatagram+0x576
    0xfffff805090664e0 : 0xfffff805088278eb : tcpip!AddressFamilyInformation+0x3
    0xfffff80509066538 : 0xfffff8050881f200 : tcpip!PktMonClientNotify+0x20
    0xfffff80509066598 : 0xfffff80508640b6d : tcpip!TcpTcbReceive+0x12d
    0xfffff805090665b8 : 0xfffff805111f3dc2 : Ndu!NduHandleNblContextRemoved+0x532
    0xfffff805090666b8 : 0xfffff805111f3762 : Ndu!NduNblNotifyCallback+0xb2
    0xfffff805090666c0 : 0xfffff8050881f202 : tcpip!PktMonClientNotify+0x22
    0xfffff805090666e8 : 0xfffff8050863a39b : tcpip!IpNlpFastSendDatagram+0x23b
    0xfffff80509066700 : 0xfffff8050881f2e0 : tcpip!Ipv4Global
    0xfffff80509066718 : 0xfffff80508911598 : fwpkclnt!FwppNetBufferListEventNotify+0x108
    0xfffff805090667a8 : 0xfffff80511834bac : rt640x64!MPReturnNetBufferLists+0x3c
    0xfffff805090667e8 : 0xfffff8050863fb50 : tcpip!TcpMatchReceive+0x1f0
    0xfffff80509066820 : 0xfffff805083d1360 : ndis!ndisReturnNblWithPowerQueue
    0xfffff80509066848 : 0xfffff805083d0f02 : ndis!ndisCallReceiveCompleteHandler+0x32
    0xfffff80509066888 : 0xfffff805083cd830 : ndis!NdisReturnNetBufferLists+0x2d0
    0xfffff80509066898 : 0xfffff8050584557c : nt!ExFreeHeapPool+0x53c
    0xfffff80509066988 : 0xffffa60157c11010 : 0xfffff8050882d340 : tcpip!gWfpGlobalTriageBlock
    0xfffff805090669b8 : 0xfffff805086860ac : tcpip!FlpReturnNetBufferListChain+0xbc
    0xfffff805090669e0 : 0xfffff80508685ff0 : tcpip!FlpReturnNetBufferListChain
    0xfffff80509066a18 : 0xfffff80508542e30 : NETIO!NetioDereferenceNetBufferListChain+0xf0
    0xfffff80509066a48 : 0xfffff805059be8c4 : nt!KiInterruptDispatchNoLockNoEtw+0x44
    0xfffff80509066a98 : 0xfffff8050863d6da : tcpip!TcpReceive+0x32a
    0xfffff80509066b98 : 0xfffff8050869202d : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2d
    0xfffff80509066bd0 : 0xfffff80508692000 : tcpip!TcpNlClientReceivePreValidatedDatagrams
    0xfffff80509066bd8 : 0xfffff8050867eb19 : tcpip!IpFlcReceivePreValidatedPackets+0xc49
    0xfffff80509066bf8 : 0xfffff80511834ffd : rt640x64!MPSendNetBufferListsNPQ+0x2a1
    0xfffff80509066c48 : 0xfffff80508695005 : tcpip!WfppTaggedContextInit+0x15
    0xfffff80509066c78 : 0xfffff80508552806 : NETIO!NetioInitializeNetBufferListAndFirstNetBufferContext+0x26
    0xfffff80509066ca0 : 0xffffa60153f7cd20 : 0xfffff8050881f2e0 : tcpip!Ipv4Global
    0xfffff80509066ce8 : 0xfffff8050881f648 : tcpip!Ipv4Global+0x368
    0xfffff80509066d00 : 0xfffff8050881f2e0 : tcpip!Ipv4Global
    0xfffff80509066d88 : 0xfffff805083cea48 : ndis!ndisCallSendHandler+0x58
    0xfffff80509066da8 : 0xfffff805062b3c53 : hal!HalpApicRequestInterrupt+0xa3
    0xfffff80509066de0 : 0xfffff8050591c5c0 : nt!KiIntSteerLoadCompare
    0xfffff80509066de8 : 0xfffff8050599b86e : nt!qsort+0x38e
    0xfffff80509066df8 : 0xfffff8050584938d : nt!KiChooseTargetProcessor+0x19d
    0xfffff80509066e08 : 0xfffff805062b3b95 : hal!HalSendSoftwareInterrupt+0xf5
    0xfffff80509066e10 : 0xfffff80508685ff0 : tcpip!FlpReturnNetBufferListChain
    0xfffff80509066e40 : 0xffffa60157c11010 : 0xfffff8050882d340 : tcpip!gWfpGlobalTriageBlock
    0xfffff80509066e48 : 0xfffff80508697649 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x169
    0xfffff80509066e58 : 0xffffa60157c11010 : 0xfffff8050882d340 : tcpip!gWfpGlobalTriageBlock
    0xfffff80509066ea8 : 0xfffff80508685ff0 : tcpip!FlpReturnNetBufferListChain
    0xfffff80509066eb8 : 0xfffff8050587313d : nt!KeQueryCurrentStackInformationEx+0x6d
    0xfffff80509066f08 : 0xfffff80505871b98 : nt!KiExpandKernelStackAndCalloutSwitchStack+0x108
    0xfffff80509066f38 : 0xfffff805059be8c4 : nt!KiInterruptDispatchNoLockNoEtw+0x44
    0xfffff80509066f58 : 0xfffff805086974e0 : tcpip!FlReceiveNetBufferListChainCalloutRoutine
    0xfffff80509066f78 : 0xfffff80505871a28 : nt!KeExpandKernelStackAndCalloutInternal+0x78
    0xfffff80509066f90 : 0xfffff80505d8c400 : nt!KiInitialThread
    0xfffff80509066f98 : 0xfffff805090670b8 : 0xffffa60157c11010 : 0xfffff8050882d340 : tcpip!gWfpGlobalTriageBlock
    0xfffff80509066fb8 : 0xfffff80505d8c400 : nt!KiInitialThread
    0xfffff80509066fe8 : 0xfffff8050587199d : nt!KeExpandKernelStackAndCalloutEx+0x1d
    0xfffff80509066ff0 : 0xfffff805086974e0 : tcpip!FlReceiveNetBufferListChainCalloutRoutine
    0xfffff80509066ff8 : 0xfffff805090670b8 : 0xffffa60157c11010 : 0xfffff8050882d340 : tcpip!gWfpGlobalTriageBlock
    0xfffff80509067028 : 0xfffff80508686521 : tcpip!FlReceiveNetBufferListChain+0x311
    0xfffff80509067038 : 0xfffff805111f6d2b : Ndu!PplGenericFreeFunction+0x3b
    0xfffff80509067058 : 0xfffff8050855508c : NETIO!PplGenericAllocateFunction+0x1c
    0xfffff805090670a8 : 0xfffff805111f6d2b : Ndu!PplGenericFreeFunction+0x3b
    0xfffff805090670b0 : 0xffffa60157c11010 : 0xfffff8050882d340 : tcpip!gWfpGlobalTriageBlock
    0xfffff805090670b8 : 0xffffa60157c11010 : 0xfffff8050882d340 : tcpip!gWfpGlobalTriageBlock
    0xfffff805090670e0 : 0xfffff80508685ff0 : tcpip!FlpReturnNetBufferListChain
    0xfffff80509067138 : 0xfffff805083dfe53 : ndis!NdisCopyFromNetBufferToNetBuffer+0xf3
    Unable to load image \??\C:\ProgramData\Kaspersky Lab\AVP19.0.0\Bases\klids.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for klids.sys
    0xfffff805090672c8 : 0xfffff805083cb530 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
    0xfffff805090673a8 : 0xfffff805083cb027 : ndis!ndisMTopReceiveNetBufferLists+0x227
    0xfffff805090673d8 : 0xfffff805083d12fd : ndis!NdisFIndicateReceiveNetBufferLists+0x6d
    0xfffff80509067480 : 0xfffff805083cae00 : ndis!ndisMTopReceiveNetBufferLists
    0xfffff805090674a0 : 0xfffff805083cae00 : ndis!ndisMTopReceiveNetBufferLists
    0xfffff805090674a8 : 0xfffff805083d0eb0 : ndis!ndisCallReceiveHandler+0x60
    0xfffff805090674e8 : 0xfffff805083caa50 : ndis!ndisMSendCompleteNetBufferListsInternal+0x120
    0xfffff805090675c8 : 0xfffff805083ce874 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
    0xfffff80509067600 : 0xfffff80508991010 : wfplwfs!LwfLowerRecvNetBufferLists
    0xfffff80509067608 : 0xfffff805083cbcdf : ndis!NdisMSendNetBufferListsComplete+0x1df
    0xfffff80509067658 : 0xfffff80511845bb9 : rt640x64!MpHandleRecvIntPriVLanJumbo+0xb41
    0xfffff805090676f8 : 0xfffff80505822dbc : nt!KiCheckForTimerExpiration+0x11c
    0xfffff80509067748 : 0xfffff80511832351 : rt640x64!MPHandleMessageInterrupt+0x341
    0xfffff80509067778 : 0xfffff805058228f0 : nt!KeAccumulateTicks+0x30
    0xfffff80509067798 : 0xfffff80511832010 : rt640x64!MPHandleMessageInterrupt
    0xfffff805090677b8 : 0xfffff805083cf2cc : ndis!ndisInterruptDpc+0x19c
    0xfffff805090677d0 : 0xfffff805119215a0 : intelppm!AcpiCStateIdleCancel
    0xfffff805090678b8 : 0xfffff80509067b20 : 0xfffff805083cf130 : ndis!ndisInterruptDpc
    0xfffff805090678e0 : 0xfffff805090679f0 : 0xfffff80505d8c400 : nt!KiInitialThread
    0xfffff805090678e8 : 0xfffff80505872a95 : nt!KiExecuteAllDpcs+0x305
    0xfffff80509067948 : 0xfffff805083cf130 : ndis!ndisInterruptDpc
    0xfffff80509067960 : 0xfffff80505d8c400 : nt!KiInitialThread
    0xfffff805090679f0 : 0xfffff80505d8c400 : nt!KiInitialThread
    0xfffff80509067a00 : 0xfffff80505d8c400 : nt!KiInitialThread
    0xfffff80509067a28 : 0xfffff805058720ef : nt!KiRetireDpcList+0x1ef
    0xfffff80509067a90 : 0xfffff805062cac50 : hal!HalpApicX2EndOfInterrupt
    0xfffff80509067a98 : 0xfffff805062b52ca : hal!HalPerformEndOfInterrupt+0x1a
    0xfffff80509067aa8 : 0xfffff80505d8c400 : nt!KiInitialThread
    0xfffff80509067ac8 : 0xfffff805059be405 : nt!KiInterruptDispatch+0x85
    0xfffff80509067b20 : 0xfffff805083cf130 : ndis!ndisInterruptDpc
    0xfffff80509067c58 : 0xfffff805059c03c4 : nt!KiIdleLoop+0x84
    0xfffff80509067c70 : 0xfffff80505d8c400 : nt!KiInitialThread
    
    0: kd> lmvm klwtp
    Browse full module list
    start             end                 module name
    fffff805`10220000 fffff805`1024a000   klwtp    T (no symbols)           
        Loaded symbol image file: klwtp.sys
        Image path: \SystemRoot\system32\DRIVERS\klwtp.sys
        Image name: klwtp.sys
        Browse all global symbols  functions  data
        Timestamp:        Thu Jan 31 09:26:24 2019 (5C532FC0)
        CheckSum:         00038598
        ImageSize:        0002A000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
        Information from resource tables:
    0: kd> lmvm rt640x64
    Browse full module list
    start             end                 module name
    fffff805`11830000 fffff805`118d6000   rt640x64   (pdb symbols)          C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\sym\rt640x64.pdb\A333EFD411894F41BA2C83E5A727534D1\rt640x64.pdb
        Loaded symbol image file: rt640x64.sys
        Mapped memory image file: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\sym\rt640x64.sys\5BCDE005a6000\rt640x64.sys
        Image path: \SystemRoot\System32\drivers\rt640x64.sys
        Image name: rt640x64.sys
        Browse all global symbols  functions  data
        Timestamp:        Mon Oct 22 07:34:45 2018 (5BCDE005)
        CheckSum:         000ACC60
        ImageSize:        000A6000
        File version:     9.1.409.2015
        Product version:  9.1.409.2015
        File flags:       8 (Mask 3F) Private
        File OS:          40004 NT Win32
        File type:        3.6 Driver
        File date:        00000000.00000000
        Translations:     0000.04b0
        Information from resource tables:
            CompanyName:      Realtek                                            
            ProductName:      Realtek 8125/8136/8168/8169 PCI/PCIe Adapters                      
            InternalName:     rt640x64.sys
            OriginalFilename: rt640x64.sys
            ProductVersion:   9.001.0409.2015
            FileVersion:      9.001.0409.2015
            FileDescription:  Realtek 8125/8136/8168/8169 NDIS 6.40 64-bit Driver                
            LegalCopyright:   Copyright (C) 2018 Realtek Semiconductor Corporation. All Right Reserved.
    Update Realtek LAN driver (Realtek PCIe FE / GBE / 2.5G / Gaming Ethernet Family Controller Software - REALTEK) and:
    1. Run msconfig
    2. Go to "Boot" page
    3. Select "Advanced options"
    4. Check "Debug"
    5. Accept changes and reboot computer
      My Computer


  4. Posts : 35
    Windows 10 Pro 64bit
    Thread Starter
       #4

    I've updated bios to the lastest version. And i updated the Realtek Lan driver, and turned on debug in msconfig. I'll wait and see if get any more Blue Screens
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 13:31.
Find Us




Windows 10 Forums