MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 000001feb2c37000
Arg3: 0000000000000009
Arg4: ffffbc0b15bcd6f0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd
SYSTEM_PRODUCT_NAME: MS-7B38
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2.GP
BIOS_DATE: 11/15/2019
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd
BASEBOARD_PRODUCT: B350M PRO-VD PLUS (MS-7B38)
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: 61941
BUGCHECK_P2: 1feb2c37000
BUGCHECK_P3: 9
BUGCHECK_P4: ffffbc0b15bcd6f0
BUGCHECK_STR: 0x1a_61941
CPU_COUNT: 4
CPU_MHZ: dac
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 11
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: WmiPrvSE.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-18-2020 16:42:12.0940
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: ffffbc0b15bcd6f0 -- (.trap 0xffffbc0b15bcd6f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000001feb2c37000
rdx=000001feb2c3d000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8064fab0959 rsp=ffffbc0b15bcd880 rbp=ffffbc0b15bcdb80
r8=0000000000000003 r9=0000000000000000 r10=0000000000038000
r11=ffffbc0b15bcdab8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!ProbeForWrite+0x39:
fffff806`4fab0959 0fb601 movzx eax,byte ptr [rcx] ds:000001fe`b2c37000=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8064f64288c to fffff8064f5c2380
STACK_TEXT:
ffffbc0b`15bcd548 fffff806`4f64288c : 00000000`0000001a 00000000`00061941 000001fe`b2c37000 00000000`00000009 : nt!KeBugCheckEx
ffffbc0b`15bcd550 fffff806`4f5d0420 : ffffa702`481a7040 ffffa702`481a7040 00000000`00000001 ffffa702`481a7040 : nt!MmAccessFault+0x179a1c
ffffbc0b`15bcd6f0 fffff806`4fab0959 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
ffffbc0b`15bcd880 fffff806`4faaacf6 : 00000068`510fc9f0 00000000`00001000 00000068`510fc9e0 000001fe`b2c05000 : nt!ProbeForWrite+0x39
ffffbc0b`15bcd8b0 fffff806`4faaab1b : 000001fe`b2c04e01 00000000`00000000 00000000`00000000 00000000`00017000 : nt!ExpQuerySystemInformation+0xb6
ffffbc0b`15bcdac0 fffff806`4f5d3c18 : ffffa702`481a7040 00000000`00000001 00000000`00000000 ffffa702`4805b6e0 : nt!NtQuerySystemInformation+0x2b
ffffbc0b`15bcdb00 00007ffb`ed05c784 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000068`510fccf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`ed05c784
THREAD_SHA1_HASH_MOD_FUNC: cc6d0be3deb5fff9d208c84fa213fffd783d14a5
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: bfef6d67f549a76153b1dad42afa6d0ae8f27986
THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6
FOLLOWUP_IP:
nt!KiPageFault+360
fffff806`4f5d0420 85c0 test eax,eax
FAULT_INSTR_CODE: 367cc085
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+360
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.719
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 360
FAILURE_BUCKET_ID: 0x1a_61941_nt!KiPageFault
BUCKET_ID: 0x1a_61941_nt!KiPageFault
PRIMARY_PROBLEM_CLASS: 0x1a_61941_nt!KiPageFault
TARGET_TIME: 2020-03-18T13:12:51.000Z
OSBUILD: 18362
OSSERVICEPACK: 719
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 17a4
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_61941_nt!kipagefault
FAILURE_ID_HASH: {60820728-e269-54d0-27b9-6b64c44bb18e}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8070bedb59b, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 10
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8070bedb59b
READ_ADDRESS: fffff8070c1733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000010
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiSwapNumaStandbyPage+8b
fffff807`0bedb59b 49037e10 add rdi,qword ptr [r14+10h]
CPU_COUNT: 4
CPU_MHZ: dac
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 11
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: javaw.exe
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-18-2020 16:42:09.0478
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: ffff808e382d8180 -- (.trap 0xffff808e382d8180)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8070c0680c0 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffffffffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff8070bedb59b rsp=ffff808e382d8310 rbp=ffff808e382d8390
r8=0000000000000000 r9=0000000000000012 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!MiSwapNumaStandbyPage+0x8b:
fffff807`0bedb59b 49037e10 add rdi,qword ptr [r14+10h] ds:00000000`00000010=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8070bdd41e9 to fffff8070bdc2380
STACK_TEXT:
ffff808e`382d8038 fffff807`0bdd41e9 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff808e`382d8040 fffff807`0bdd052b : ffff0e08`ca62fb91 00000002`08e84000 00000000`00000000 00000000`00000006 : nt!KiBugCheckDispatch+0x69
ffff808e`382d8180 fffff807`0bedb59b : 00000000`00190715 fffff807`0bd246df fffff3f0`000000ae 00000000`00000004 : nt!KiPageFault+0x46b
ffff808e`382d8310 fffff807`0be45799 : 00000000`000001af 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiSwapNumaStandbyPage+0x8b
ffff808e`382d83d0 fffff807`0bccdf41 : fffff807`0c06a3c0 ffffb18f`000000af 00000000`000000af 00000000`00000000 : nt!MiGetPage+0x177299
ffff808e`382d84b0 fffff807`0bccbc6a : 00000000`00000000 00000000`00000000 fffff3f9`fcfe7000 ffff808e`382d8810 : nt!MiGetPageChain+0x181
ffff808e`382d86a0 fffff807`0bcc8429 : ffff808e`382d8a58 00000000`00000000 00000000`00000010 00000000`00000010 : nt!MiResolvePrivateZeroFault+0x14a
ffff808e`382d87c0 fffff807`0bcc9850 : ffff808e`382d8a20 ffff808e`382d8960 ffff808e`382d8968 ffff808e`382d88f0 : nt!MiZeroFault+0x389
ffff808e`382d88b0 fffff807`0bcc8fbe : 00000000`00000001 ffff808e`382d8830 ffffffff`00000111 fffff31f`b106c8c6 : nt!MiUserFault+0x3a0
ffff808e`382d8960 fffff807`0bdd0420 : ffffb18f`a6c22080 00000000`1a4cf100 00000000`00000401 00000000`00e73420 : nt!MmAccessFault+0x14e
ffff808e`382d8b00 00007ffb`a3491534 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
00000000`1a4ce158 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`a3491534
THREAD_SHA1_HASH_MOD_FUNC: 92bd1be9f3ec997fbcacedb8640c1a498415e0e9
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e5a2c932a5b680a25e08b3f9740a81cd266804f6
THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c
FOLLOWUP_IP:
nt!MiSwapNumaStandbyPage+8b
fffff807`0bedb59b 49037e10 add rdi,qword ptr [r14+10h]
FAULT_INSTR_CODE: 107e0349
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiSwapNumaStandbyPage+8b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.720
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 8b
FAILURE_BUCKET_ID: AV_nt!MiSwapNumaStandbyPage
BUCKET_ID: AV_nt!MiSwapNumaStandbyPage
PRIMARY_PROBLEM_CLASS: AV_nt!MiSwapNumaStandbyPage
TARGET_TIME: 2020-03-18T09:10:47.000Z
OSBUILD: 18362
OSSERVICEPACK: 720
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 25e6
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!miswapnumastandbypage
FAILURE_ID_HASH: {522a635a-0d98-8289-7b34-c2db782a6bc9}
Followup: MachineOwner
---------
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8071c0aedb4, Virtual address for the attempted write.
Arg2: 8900000000105121, PTE contents.
Arg3: fffffd8517a97960, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: fffff8071c0aedb4
BUGCHECK_P2: 8900000000105121
BUGCHECK_P3: fffffd8517a97960
BUGCHECK_P4: a
CPU_COUNT: 4
CPU_MHZ: dac
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 11
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0xBE
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-18-2020 16:42:05.0913
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: fffffd8517a97960 -- (.trap 0xfffffd8517a97960)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000001ba11520
rdx=000000001ba11520 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8070803c98a rsp=fffffd8517a97af0 rbp=000000000000001e
r8=fffff8071c0aeda0 r9=0000000000000000 r10=0000000000000004
r11=000000000000ffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!ExpScanGeneralLookasideList+0x4a:
fffff807`0803c98a 41894814 mov dword ptr [r8+14h],ecx ds:fffff807`1c0aedb4=00000000
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff807082001e7 to fffff807081c2380
STACK_TEXT:
fffffd85`17a97778 fffff807`082001e7 : 00000000`000000be fffff807`1c0aedb4 89000000`00105121 fffffd85`17a97960 : nt!KeBugCheckEx
fffffd85`17a97780 fffff807`080c92fa : 89000000`00105121 00000000`00000003 fffffd85`17a978c0 00000000`00000000 : nt!MiRaisedIrqlFault+0x19e437
fffffd85`17a977c0 fffff807`081d0420 : ffff8f85`52b4a080 fffff807`08113f14 ffff8f85`52b4a080 fffff807`0807e9cc : nt!MmAccessFault+0x48a
fffffd85`17a97960 fffff807`0803c98a : 00000000`00000001 fffff807`08431580 00000000`00000118 fffff807`0846a3c0 : nt!KiPageFault+0x360
fffffd85`17a97af0 fffff807`0818c8b2 : 00000000`00000007 00000000`ffffffff fffff807`0846a3c0 00000000`00000118 : nt!ExpScanGeneralLookasideList+0x4a
fffffd85`17a97b20 fffff807`0806bce5 : ffff8f85`52b4a080 00000000`00000080 fffff807`0818c790 00000000`00000000 : nt!KeBalanceSetManager+0x122
fffffd85`17a97c10 fffff807`081c99ca : ffffcd81`947cb180 ffff8f85`52b4a080 fffff807`0806bc90 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffffd85`17a97c60 00000000`00000000 : fffffd85`17a98000 fffffd85`17a92000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
THREAD_SHA1_HASH_MOD_FUNC: 9cdd30fab53e7c1afab33cb6bfa6ec5e581e0189
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f8c776b2197401b1635b15f6ebc0bc75129b9ea0
THREAD_SHA1_HASH_MOD: cb5f414824c2521bcc505eaa03e92fa10922dad8
FOLLOWUP_IP:
nt!MiRaisedIrqlFault+19e437
fffff807`082001e7 cc int 3
FAULT_INSTR_CODE: cf8b48cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiRaisedIrqlFault+19e437
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.720
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 19e437
FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault
BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault
PRIMARY_PROBLEM_CLASS: 0xBE_nt!MiRaisedIrqlFault
TARGET_TIME: 2020-03-17T14:49:49.000Z
OSBUILD: 18362
OSSERVICEPACK: 720
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 47e4
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xbe_nt!miraisedirqlfault
FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffad0e0a564200, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffad0e0a564158, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 3
BUGCHECK_P2: ffffad0e0a564200
BUGCHECK_P3: ffffad0e0a564158
BUGCHECK_P4: 0
TRAP_FRAME: ffffad0e0a564200 -- (.trap 0xffffad0e0a564200)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe98004141880 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8057ea3922a rsp=ffffad0e0a564390 rbp=ffffad0e0a564431
r8=0000000000000000 r9=0000000000000004 r10=0000000000000002
r11=0000000000000090 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!MiUnlinkNodeLargePage+0x186fea:
fffff805`7ea3922a cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffad0e0a564158 -- (.exr 0xffffad0e0a564158)
ExceptionAddress: fffff8057ea3922a (nt!MiUnlinkNodeLargePage+0x0000000000186fea)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: 4
CPU_MHZ: dac
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 11
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: javaw.exe
CURRENT_IRQL: 2
DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-18-2020 16:42:02.0147
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff8057e9d41e9 to fffff8057e9c2380
STACK_TEXT:
ffffad0e`0a563ed8 fffff805`7e9d41e9 : 00000000`00000139 00000000`00000003 ffffad0e`0a564200 ffffad0e`0a564158 : nt!KeBugCheckEx
ffffad0e`0a563ee0 fffff805`7e9d4610 : fffff805`7e8e5b10 fffff805`7e8e84b0 00007fff`ffff0000 00007fff`fffeffff : nt!KiBugCheckDispatch+0x69
ffffad0e`0a564020 fffff805`7e9d29a5 : 00000000`00000000 00000000`00000000 ffff9a08`cf52b060 00000000`000567fb : nt!KiFastFailDispatch+0xd0
ffffad0e`0a564200 fffff805`7ea3922a : 00000000`00000006 ffffad0e`0a564431 ffffe980`034d2500 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x325
ffffad0e`0a564390 fffff805`7e8140fb : 00000000`00000010 81000001`00000002 00000000`00000000 00000000`00000004 : nt!MiUnlinkNodeLargePage+0x186fea
ffffad0e`0a564480 fffff805`7e813cbc : 00000000`00000002 fffff805`7ec6a3c0 00000000`0008cb76 ffffad0e`0a564810 : nt!MiGetFreeZeroLargePage+0x63
ffffad0e`0a5644f0 fffff805`7e8cbf5e : 00000000`00000000 00000000`00000000 ffff88c4`62311000 ffffad0e`0a564810 : nt!MiGetLargePage+0xcc
ffffad0e`0a5646a0 fffff805`7e8c8429 : 00000000`00000060 00000000`00000000 00000000`00000010 00000000`00000001 : nt!MiResolvePrivateZeroFault+0x43e
ffffad0e`0a5647c0 fffff805`7e8c9850 : ffffad0e`0a564a20 ffffad0e`0a564960 ffffad0e`0a564968 ffffad0e`0a5648f0 : nt!MiZeroFault+0x389
ffffad0e`0a5648b0 fffff805`7e8c8fbe : 00000000`00000001 ffffad0e`0a564830 ffffffff`00000111 fffffb86`2ce2c8c6 : nt!MiUserFault+0x3a0
ffffad0e`0a564960 fffff805`7e9d0420 : ffff9a08`ce8d1080 00000000`1ae0f060 00000000`00000401 00000000`0186f6f0 : nt!MmAccessFault+0x14e
ffffad0e`0a564b00 00007ffe`8eda1534 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
00000000`1ae0e0b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`8eda1534
THREAD_SHA1_HASH_MOD_FUNC: b366742cf1fcd793b717cb1f6b3a47d8f82f3382
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 107d602b5845ea805e659df6593de0e22b337b74
THREAD_SHA1_HASH_MOD: dc844b1b94baa204d070855e43bbbd27eee98b94
FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff805`7e9d4610 c644242000 mov byte ptr [rsp+20h],0
FAULT_INSTR_CODE: 202444c6
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiFastFailDispatch+d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.720
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
TARGET_TIME: 2020-03-17T09:17:34.000Z
OSBUILD: 18362
OSSERVICEPACK: 720
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 2d22
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_nt!kifastfaildispatch
FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}
Followup: MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80374f73358, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd
SYSTEM_PRODUCT_NAME: MS-7B38
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2.GP
BIOS_DATE: 11/15/2019
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd
BASEBOARD_PRODUCT: B350M PRO-VD PLUS (MS-7B38)
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff80374f73358
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
CPU_COUNT: 4
CPU_MHZ: dac
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 11
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x133
PROCESS_NAME: chrome.exe
CURRENT_IRQL: d
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-18-2020 16:41:57.0747
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: ffffd70b3a8606e0 -- (.trap 0xffffd70b3a8606e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000001255a0005 rbx=0000000000000000 rcx=ffffaf7000270600
rdx=ffffaf7000270600 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80374bca2a7 rsp=ffffd70b3a860870 rbp=0000000000000002
r8=ffffaf7000270600 r9=0000000000000000 r10=ffffb28000005200
r11=0000000000000020 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ExpInterlockedPopEntrySListFault:
fffff803`74bca2a7 498b08 mov rcx,qword ptr [r8] ds:ffffaf70`00270600=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80374c3d8b1 to fffff80374bc2380
STACK_TEXT:
ffffe701`5b837b08 fffff803`74c3d8b1 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`74f73358 : nt!KeBugCheckEx
ffffe701`5b837b10 fffff803`74ab8e3c : 00000df0`7fab8e6c ffffe701`5b9cd180 00000000`00044338 00000000`00044338 : nt!KeAccumulateTicks+0x181631
ffffe701`5b837b70 fffff803`7495e4b7 : 00000000`00000000 ffffd70b`3a860550 ffffd70b`3a8605d0 00000000`00000002 : nt!KeClockInterruptNotify+0x98c
ffffe701`5b837f30 fffff803`74a2cc75 : 0000000a`29cd8d11 ffff9b87`ab6ce500 ffff9b87`ab6ce5b0 00000000`00000000 : hal!HalpTimerClockInterrupt+0xf7
ffffe701`5b837f60 fffff803`74bc3e1a : ffffd70b`3a8605d0 ffff9b87`ab6ce500 fffff803`74d7a250 ffff9b87`ab6ce500 : nt!KiCallInterruptServiceRoutine+0xa5
ffffe701`5b837fb0 fffff803`74bc4387 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffd70b`3a860550 fffff803`74bd03d7 : 00000001`255a0005 ffffd70b`3a860760 ffff9b87`ab6ce500 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffd70b`3a8606e0 fffff803`74bca2a7 : 00000000`00000000 fffff803`74ace5f1 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x317
ffffd70b`3a860870 fffff803`74ace5f1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault
ffffd70b`3a860880 fffff803`74acdf41 : fffff803`74e6a3c0 ffff9b87`00000020 00000000`00000020 00000000`00000000 : nt!MiGetPage+0xf1
ffffd70b`3a860960 fffff803`74acbc6a : 00000000`00000001 00000000`00000000 00000000`00000001 ffffd70b`3a860cd0 : nt!MiGetPageChain+0x181
ffffd70b`3a860b50 fffff803`74acb748 : ffff9b87`000007e6 00000000`00000001 00000000`00000050 00000000`00000050 : nt!MiResolvePrivateZeroFault+0x14a
ffffd70b`3a860c70 fffff803`74acb012 : ffffabd5`c08cea98 ffffd70b`3a861080 00000000`00000000 00000000`00000002 : nt!MiResolveDemandZeroFault+0x218
ffffd70b`3a860d60 fffff803`74ac8fd9 : 00000000`00000008 ffffd70b`0000001c 00000000`c0000016 fffff803`868a010f : nt!MiDispatchFault+0x982
ffffd70b`3a860eb0 fffff803`74a3f8f4 : ffffabd5`eaf57000 ffff9b87`b1ff4580 00000000`00000000 00000233`aa7b0000 : nt!MmAccessFault+0x169
ffffd70b`3a861050 fffff803`74b2e11c : 00000000`00000001 ffffab81`19d53d80 ffffd70b`3a8611c0 ffffabd5`eaf577f8 : nt!MiFaultInProbeAddress+0xbc
ffffd70b`3a861100 fffff803`74b2d62e : ffffd70b`3a861270 00000000`00000000 ffffd70b`3a861270 00000233`aa7b0000 : nt!MiLockPageLeafPageTable+0x15c
ffffd70b`3a861170 fffff803`74b2d4b9 : 00000000`00000000 ffff8a08`36cf0d90 ffff8a08`36cf0d90 00000000`00000000 : nt!MiProbeAndLockPages+0x15e
ffffd70b`3a8612c0 fffff803`85e99f2c : ffffd70b`00000000 00000000`00042538 00000000`000e4000 ffff8a08`36cf1c50 : nt!MmProbeAndLockPages+0x29
ffffd70b`3a8612f0 fffff803`85e99e09 : ffff8a08`36cf1c50 ffff8a08`36cf1c50 00000000`00000000 00000233`aa7b0000 : dxgmms2!VIDMM_MDL_RANGE::Lock+0x6c
ffffd70b`3a861350 fffff803`85e96b17 : ffff8a08`36051120 ffff8a08`35cf5cb0 ffff9b87`00000000 ffff9b87`b1355de0 : dxgmms2!VIDMM_RECYCLE_HEAP_PHYSICAL_VIEW::LockRange+0x109
ffffd70b`3a8613d0 fffff803`85e969ff : ffff8a08`35d47910 00000000`000f0000 00000000`00000000 fffff803`85ea9bd3 : dxgmms2!VIDMM_RECYCLE_RANGE::Lock+0x7b
ffffd70b`3a861430 fffff803`85e9693b : ffff8a08`36b48610 00000000`00000000 00000000`00000000 00000000`000f0000 : dxgmms2!VIDMM_RECYCLE_MULTIRANGE::Lock+0x83
ffffd70b`3a861490 fffff803`85e9acd9 : ffff8a08`36b48610 ffff9b87`b148b000 00000000`00000030 00000000`00042538 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ProbeAndLockAllocation+0x7b
ffffd70b`3a861510 fffff803`85e9aaa1 : ffff9b87`b148b000 ffff8a08`35cf5cb0 ffff8a08`00000000 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::ProbeAndLockAllocation+0x55
ffffd70b`3a861560 fffff803`85e9adcf : ffff8a08`35cf5cb0 ffff9b87`b148b000 ffff8a08`35cf5cb0 00000000`00000000 : dxgmms2!VIDMM_SEGMENT::LockAllocationBackingStore+0xc5
ffffd70b`3a861620 fffff803`85e9c99f : ffff9b87`b9061110 ffff9b87`b148b000 00000000`00000000 ffff8a08`35cf5cb0 : dxgmms2!VIDMM_SYSMEM_SEGMENT::CommitResource+0x8f
ffffd70b`3a861660 fffff803`85ea7eb2 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::PageInOneAllocation+0x1ef
ffffd70b`3a861770 fffff803`85eb7da4 : 00000000`00000001 00000000`00989680 ffff8a08`2f616900 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0x862
ffffd70b`3a8619e0 fffff803`85eb6ee9 : ffff8a08`2c2f3c10 fffff803`74f91401 ffff9b87`b140e600 00000000`00000100 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xea4
ffffd70b`3a861be0 fffff803`74a6bce5 : ffff9b87`b140e680 fffff803`85eb6ee0 ffff8a08`2c2f3c10 00000067`b4bbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffffd70b`3a861c10 fffff803`74bc99ca : fffff803`70369180 ffff9b87`b140e680 fffff803`74a6bc90 8b44fd8b`42746024 : nt!PspSystemThreadStartup+0x55
ffffd70b`3a861c60 00000000`00000000 : ffffd70b`3a862000 ffffd70b`3a85c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
THREAD_SHA1_HASH_MOD_FUNC: 42b1f1008281954d1547b534124a75937d798cc7
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3344e0c95588065253384753029eb79ee384d992
THREAD_SHA1_HASH_MOD: dc0110497812df1b54d877b953dab680ed187995
FOLLOWUP_IP:
dxgmms2!VIDMM_MDL_RANGE::Lock+6c
fffff803`85e99f2c eb5d jmp dxgmms2!VIDMM_MDL_RANGE::Lock+0xcb (fffff803`85e99f8b)
FAULT_INSTR_CODE: 3d805deb
SYMBOL_STACK_INDEX: 13
SYMBOL_NAME: dxgmms2!VIDMM_MDL_RANGE::Lock+6c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 40bd916b
IMAGE_VERSION: 10.0.18362.719
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 6c
FAILURE_BUCKET_ID: 0x133_ISR_dxgmms2!VIDMM_MDL_RANGE::Lock
BUCKET_ID: 0x133_ISR_dxgmms2!VIDMM_MDL_RANGE::Lock
PRIMARY_PROBLEM_CLASS: 0x133_ISR_dxgmms2!VIDMM_MDL_RANGE::Lock
TARGET_TIME: 2020-03-14T00:48:18.000Z
OSBUILD: 18362
OSSERVICEPACK: 720
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 15018
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x133_isr_dxgmms2!vidmm_mdl_range::lock
FAILURE_ID_HASH: {2ea2a685-a337-d637-b4cf-df7f0dea36b2}
Followup: MachineOwner
---------