APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
BugCheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ff98122ce04, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 0000000000000001, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffffc108ca1a3b80, Call type (0 - system call, 1 - worker routine)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 530
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 16472
Key : Analysis.Init.CPU.mSec
Value: 109
Key : Analysis.Init.Elapsed.mSec
Value: 11251
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 051322-6859-01.dmp
BUGCHECK_CODE: 1
BUGCHECK_P1: 7ff98122ce04
BUGCHECK_P2: 0
BUGCHECK_P3: 1
BUGCHECK_P4: ffffc108ca1a3b80
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
STACK_TEXT:
ffffc108`ca1a3948 fffff800`74409c69 : 00000000`00000001 00007ff9`8122ce04 00000000`00000000 00000000`00000001 : nt!KeBugCheckEx
ffffc108`ca1a3950 fffff800`74409b33 : ffffcb09`54d5f080 00000000`00000000 00000000`00000000 00005aca`01b166a8 : nt!KiBugCheckDispatch+0x69
ffffc108`ca1a3a90 00007ff9`8122ce04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
000000fb`c41fefa8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`8122ce04
SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1706
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1fe
FAILURE_BUCKET_ID: 0x1_SysCallNum_6_nt!KiSystemServiceExitPico
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {86ef4402-c30f-c6ef-f6d3-34a22389d637}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80214eaf74a, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 717
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 13509
Key : Analysis.Init.CPU.mSec
Value: 93
Key : Analysis.Init.Elapsed.mSec
Value: 10823
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 051322-6515-01.dmp
BUGCHECK_CODE: a
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80214eaf74a
READ_ADDRESS: fffff802158fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000000
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff582b36d8590 -- (.trap 0xfffff582b36d8590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=8000000000000000 rbx=0000000000000000 rcx=000000000000ffff
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80214eaf74a rsp=fffff582b36d8720 rbp=fffff582b36d8920
r8=000400000043b430 r9=8000000000000117 r10=ffffaf3fffffff78
r11=fffffb800c1b67b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiResolveProtoPteFault+0x9ea:
fffff802`14eaf74a 488b12 mov rdx,qword ptr [rdx] ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
fffff582`b36d8448 fffff802`15009c69 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff582`b36d8450 fffff802`15005f69 : ffffc40b`36ea2540 00000000`00000000 ffffd90a`b0a9e6d0 fffff802`14e5049e : nt!KiBugCheckDispatch+0x69
fffff582`b36d8590 fffff802`14eaf74a : 00000000`00000000 00000000`00000000 00000000`00000000 00000007`ffd4b220 : nt!KiPageFault+0x469
fffff582`b36d8720 fffff802`14ea87a5 : fffff582`b36d8880 00000000`00000000 fffff582`b36d8860 fffff582`b36d8a20 : nt!MiResolveProtoPteFault+0x9ea
fffff582`b36d8820 fffff802`14ea66e9 : 00000000`00000000 00000000`00000100 00000000`c0000016 ffffc40b`3052d208 : nt!MiDispatchFault+0x3d5
fffff582`b36d8960 fffff802`15005e5e : ffffd90a`b0a9e080 54e32796`20820000 fffff582`00000001 ffffd90a`00000000 : nt!MmAccessFault+0x189
fffff582`b36d8b00 00007ffd`4b25f10c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000023`43ccea58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`4b25f10c
SYMBOL_NAME: nt!MiResolveProtoPteFault+9ea
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1706
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 9ea
FAILURE_BUCKET_ID: AV_nt!MiResolveProtoPteFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2f2238e9-4751-e3c3-543c-b0cdf930b219}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffcf0a506673f0, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffcf0a50667348, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32kbase.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 687
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 18469
Key : Analysis.Init.CPU.mSec
Value: 92
Key : Analysis.Init.Elapsed.mSec
Value: 13215
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 051322-6109-01.dmp
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffcf0a506673f0
BUGCHECK_P3: ffffcf0a50667348
BUGCHECK_P4: 0
TRAP_FRAME: ffffcf0a506673f0 -- (.trap 0xffffcf0a506673f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8025d9e9095 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff848f48f95080 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802587fd60c rsp=ffffcf0a50667580 rbp=ffffcf0a50667790
r8=ffffa68f371b5410 r9=7ffff80258c48340 r10=fffff80258cdb590
r11=ffffcf0a50667688 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
nt!CmpCallCallBacksEx+0x1eb34c:
fffff802`587fd60c cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffcf0a50667348 -- (.exr 0xffffcf0a50667348)
ExceptionAddress: fffff802587fd60c (nt!CmpCallCallBacksEx+0x00000000001eb34c)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: explorer.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffcf0a`506670c8 fffff802`58409c69 : 00000000`00000139 00000000`00000003 ffffcf0a`506673f0 ffffcf0a`50667348 : nt!KeBugCheckEx
ffffcf0a`506670d0 fffff802`5840a090 : ffffffff`ffffffff 00000000`00000003 00000000`00000000 00000000`00000210 : nt!KiBugCheckDispatch+0x69
ffffcf0a`50667210 fffff802`58408423 : ffffa68f`3c902030 ffffcf0a`00000024 ffffcf0a`506674f0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffcf0a`506673f0 fffff802`587fd60c : fffff802`58c48350 ffffa68f`00000000 ffffa68f`00000000 00000000`00000001 : nt!KiRaiseSecurityCheckFailure+0x323
ffffcf0a`50667580 fffff802`5860f05c : ffff848f`0000001c ffffcf0a`50667740 ffffcf0a`506676f8 00000000`ffffff01 : nt!CmpCallCallBacksEx+0x1eb34c
ffffcf0a`50667690 fffff802`5861319e : fffff802`5860ee00 00000000`00000000 ffff848f`48f81010 ffffcf0a`50667900 : nt!CmpParseKey+0x24c
ffffcf0a`50667830 fffff802`586354ea : ffff848f`48f81000 ffffcf0a`50667a98 ffff848f`00000240 ffff848f`3db5c980 : nt!ObpLookupObjectName+0x3fe
ffffcf0a`50667a00 fffff802`586352cc : ffffa68f`00000000 00000000`00000000 00000000`00000000 ffff848f`3db5c980 : nt!ObOpenObjectByNameEx+0x1fa
ffffcf0a`50667b30 fffff802`58634df1 : ffffcf0a`50668000 ffffcf0a`50667ea0 00000000`00000000 ffffcf0a`50667f90 : nt!ObOpenObjectByName+0x5c
ffffcf0a`50667b80 fffff802`58634b1f : 00000000`00000000 ffffa68f`3c1a7870 00000000`00001678 00000000`00000000 : nt!CmOpenKey+0x2c1
ffffcf0a`50667de0 fffff802`584096b8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`000f003f : nt!NtOpenKeyEx+0xf
ffffcf0a`50667e20 fffff802`583fbbc0 : fffff802`585e955e 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
ffffcf0a`50667fb8 fffff802`585e955e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
ffffcf0a`50667fc0 fffff802`585e948e : 00000000`00000000 ffffffff`800030a4 00000000`00000000 ffffa68f`349711a0 : nt!_RegRtlOpenKeyTransacted+0xba
ffffcf0a`50668060 fffff802`585e5f3d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SysCtxRegOpenKey+0x3a
ffffcf0a`506680a0 fffff802`585d83c6 : 00000000`00000000 ffffa68f`3c9d6120 ffffcf0a`50668318 ffffa68f`3c9d6120 : nt!_PnpOpenPropertiesKey+0x179
ffffcf0a`506681d0 fffff802`585d82a6 : fffff802`58009f08 ffffcf0a`50668700 00000000`00000000 fffff802`00000000 : nt!_CmGetInterfaceClassMappedPropertyFromRegValue+0xea
ffffcf0a`50668260 fffff802`585d4c76 : 00000000`00000000 ffffcf0a`506683c0 ffffcf0a`50668700 00000000`00000000 : nt!_CmGetInterfaceClassMappedProperty+0xba
ffffcf0a`506682d0 fffff802`5867fd90 : ffffa68f`3484e4f0 00000000`00000400 00000000`c0000016 fffff802`5867e7f3 : nt!_PnpDispatchInterfaceClass+0xa6
ffffcf0a`50668340 fffff802`5867fc12 : ffffcf0a`50668668 00000000`00000400 ffffa68f`3ab44b30 00000000`00000004 : nt!PnpGetMappedPropertyDispatch+0xa4
ffffcf0a`506683d0 fffff802`5867fad4 : ffffcf0a`50668668 ffffcf0a`50668700 ffffcf0a`50668511 ffffa68f`3484e4f0 : nt!_PnpGetObjectPropertyWorker+0xba
ffffcf0a`50668470 fffff802`5867f95d : ffffcf0a`50668668 00000000`47706e50 00000000`00000000 00000000`00000000 : nt!_PnpGetObjectProperty+0x108
ffffcf0a`50668540 fffff802`585d8649 : 00000000`00000000 00000000`00000000 ffffcf0a`506686d0 00000000`00000000 : nt!PnpGetObjectProperty+0xd1
ffffcf0a`506685d0 fffff802`585d8f42 : fffff802`00000034 00000000`00180016 ffff848f`469dd710 00000000`00000000 : nt!IopGetDeviceInterfaces+0x189
ffffcf0a`506687a0 ffff8067`c88c241c : 00000000`00000000 00000000`09fae8e0 ffff848f`469dd710 ffff8009`4060c910 : nt!IoGetDeviceInterfaces+0x32
ffffcf0a`506687e0 00000000`00000000 : 00000000`09fae8e0 ffff848f`469dd710 ffff8009`4060c910 ffff8009`45f3c8a0 : win32kbase+0xc241c
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1706
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}
Followup: MachineOwner
---------
EFERENCE_BY_POINTER (18)
Arguments:
Arg1: ffffba89060b8ae0, Object type of the object whose reference count is being lowered
Arg2: ffffba89122bcb60, Object whose reference count is being lowered
Arg3: 0000000000000001, Reserved
Arg4: 00007ff92cfb6849, Reserved
The reference count of an object is illegal for the current state of the object.
Each time a driver uses a pointer to an object the driver calls a kernel routine
to increment the reference count of the object. When the driver is done with the
pointer the driver calls another kernel routine to decrement the reference count.
Drivers must match calls to the increment and decrement routines. This BugCheck
can occur because an object's reference count goes to zero while there are still
open handles to the object, in which case the fourth parameter indicates the number
of opened handles. It may also occur when the object's reference count drops below zero
whether or not there are open handles to the object, and in that case the fourth parameter
contains the actual value of the pointer references count.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 405
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11715
Key : Analysis.Init.CPU.mSec
Value: 124
Key : Analysis.Init.Elapsed.mSec
Value: 11132
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 051322-7468-01.dmp
BUGCHECK_CODE: 18
BUGCHECK_P1: ffffba89060b8ae0
BUGCHECK_P2: ffffba89122bcb60
BUGCHECK_P3: 1
BUGCHECK_P4: 7ff92cfb6849
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: QtWebEngineProcess.exe
STACK_TEXT:
fffff409`4d7bd468 fffff800`3942ef20 : 00000000`00000018 ffffba89`060b8ae0 ffffba89`122bcb60 00000000`00000001 : nt!KeBugCheckEx
fffff409`4d7bd470 fffff800`39614929 : ffffba89`122bcb30 ffff9601`438fe5e0 00000000`00000000 ffffba89`11abe670 : nt!ObfDereferenceObjectWithTag+0x1de3a0
fffff409`4d7bd4b0 fffff800`396c19e5 : ffffba89`12cf3098 fffff800`39250f39 ffffba89`12cf3060 00000000`00000000 : nt!ObCloseHandleTableEntry+0x6c9
fffff409`4d7bd5f0 fffff800`3970700d : ffffba89`12cf3060 ffffba89`062d2080 ffffffff`ffffff01 ffffba89`0f65d4d8 : nt!ExSweepHandleTable+0xd5
fffff409`4d7bd6a0 fffff800`396fa8a8 : ffffffff`ffffffff ffffba89`0f65d080 fffff409`4d7bd6f0 fffff800`396509d0 : nt!ObKillProcess+0x35
fffff409`4d7bd6d0 fffff800`395e34de : ffffba89`0f65d080 ffff9601`3b676910 fffff409`4d7bd920 00000000`00000000 : nt!PspRundownSingleProcess+0x204
fffff409`4d7bd760 fffff800`396d7888 : 00000000`80000003 fffff800`34d74b01 00000081`8baff570 00000081`8b409000 : nt!PspExitThread+0x5f6
fffff409`4d7bd860 fffff800`39257817 : fffff409`4d7bda68 fffff800`39257a60 ffffba89`11d55c80 00000000`00000001 : nt!KiSchedulerApcTerminate+0x38
fffff409`4d7bd8a0 fffff800`393fc300 : 00000000`00000000 fffff409`4d7bd950 00000000`00000000 00000081`00000000 : nt!KiDeliverApc+0x487
fffff409`4d7bd950 fffff800`3940975f : ffffba89`062d2080 00000081`8baff548 fffff409`4d7bdaa8 00000257`53c39a30 : nt!KiInitiateUserApc+0x70
fffff409`4d7bda90 00007ff9`8a4ace64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000081`8baff528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`8a4ace64
SYMBOL_NAME: nt!ObfDereferenceObjectWithTag+1de3a0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1706
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1de3a0
FAILURE_BUCKET_ID: 0x18_CORRUPT_REF_COUNT_nt!ObfDereferenceObjectWithTag
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {fa6b3516-71cb-1e92-b987-b8bebd3458ac}
Followup: MachineOwner
---------