Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\maksu\Desktop\sdf\122620-3343-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`20800000 PsLoadedModuleList = 0xfffff803`2142a3b0
Debug session time: Sat Dec 26 20:57:49.470 2020 (UTC + 3:00)
System Uptime: 0 days 0:01:49.111
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`20bf5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffb00`545d9650=000000000000003b
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8032fd3f940, Address of the instruction which caused the bugcheck
Arg3: fffffb00545d9f50, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6687
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7841
Key : Analysis.Memory.CommitPeak.Mb
Value: 100
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8032fd3f940
BUGCHECK_P3: fffffb00545d9f50
BUGCHECK_P4: 0
CONTEXT: fffffb00545d9f50 -- (.cxr 0xfffffb00545d9f50)
rax=ffffa982fee89280 rbx=0000000000000000 rcx=ffffa98302479000
rdx=ffffa982fefa3bb0 rsi=0000000000000000 rdi=ffffa982fed32520
rip=fffff8032fd3f940 rsp=fffffb00545da950 rbp=fffffb00545da9d0
r8=ffffa982fee89280 r9=7fffa982fefa3e88 r10=fffff8032ffb1010
r11=ffffa3fea69ca0ff r12=ffb4b4b4ffb4b4b4 r13=ffb4b4b4ffb4b4b4
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
dxgkrnl!ADAPTER_DISPLAY::DdiSetPointerPosition+0x114:
fffff803`2fd3f940 418b4d0c mov ecx,dword ptr [r13+0Ch] ds:002b:ffb4b4b4`ffb4b4c0=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
STACK_TEXT:
fffffb00`545da950 fffff803`2fd3f49f : 00000000`00000000 ffffa983`0247b018 00000000`00000000 ffffa983`0247b018 : dxgkrnl!ADAPTER_DISPLAY::DdiSetPointerPosition+0x114
fffffb00`545daa00 fffff803`2fd3ef3c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkSetPointerPosition+0x543
fffffb00`545dabc0 ffff82e4`19aafe6c : ffff8281`44e3f480 00000000`0000020b 00000000`0000020b 00000000`00000000 : dxgkrnl!DxgkCddSetPointerPosition+0x3c
fffffb00`545dabf0 ffff82e4`19aafde4 : ffff8281`4060f010 00000000`00000000 00000000`0000020b ffff8281`40911000 : cdd!MovePointerInternal+0x74
fffffb00`545dac40 ffff82e4`197b29f4 : ffff8281`4060f010 ffff82e4`1941ffb3 00000000`00000000 fffffb00`545dace0 : cdd!DrvMovePointerEx+0x14
fffffb00`545dac70 ffff82e4`197b118a : 00000000`00000000 fffffb00`545dace0 ffff8281`40911000 ffff8281`4060f010 : win32kfull!vMovePointer+0x68
fffffb00`545dacb0 ffff82e4`197b5bfa : ffff8281`40911000 00000000`0000020b 00000000`000000d5 00000000`00000000 : win32kfull!GreMovePointer+0x13a
fffffb00`545dad20 ffff82e4`197b63e1 : fffffb00`545db110 00000000`00000000 ffffa982`fef16410 fffff803`20adbc43 : win32kfull!xxxMoveEventAbsolute+0x20a
fffffb00`545dae20 ffff82e4`194aeecb : 00000000`00000000 00000000`00000000 fffffb00`545db000 00000000`00000000 : win32kfull!EditionCommitMousePosAndMove+0x91
fffffb00`545dae90 ffff82e4`194aee00 : 00000000`00000000 fffffb00`545db050 fffff803`20adbb10 ffff82e4`194b1f7a : win32kbase!EditionCommitMousePosAndMove+0x83
fffffb00`545daf00 ffff82e4`194aec6a : 00000000`00000001 fffffb00`545db009 00000000`00000000 00000000`00000001 : win32kbase!ApiSetEditionCommitMousePosAndMove+0xd4
fffffb00`545daf80 ffff82e4`1945b16d : 000000d2`0000020a fffffb00`545db0b0 ffff8281`4063e000 fffffb00`545db280 : win32kbase!CMouseProcessor::CommitMousePosAndMoveCursor+0x126
fffffb00`545db070 ffff82e4`195c9675 : 000000d5`0000020b 000000d2`0000020a ffff8281`406067e8 00000000`00000000 : win32kbase!CMouseProcessor::ProcessMouseInputData+0x169
fffffb00`545db0f0 ffff82e4`195ba89a : ffff8281`406067d0 ffff82e4`195ba985 ffffa983`025bc0c8 ffff8281`406062d0 : win32kbase!CMouseProcessor::ProcessInput+0x549
fffffb00`545db330 ffff82e4`195bac03 : ffff8281`406062d0 00000000`412ae138 ffff8281`406067d0 ffffa983`025bc0c8 : win32kbase!CMouseSensor::FlushMouseReports+0x42
fffffb00`545db370 ffff82e4`195bab34 : ffff8281`40606320 00000000`00000018 ffff8281`40606200 ffff8281`406062d0 : win32kbase!CMouseSensor::ProcessInputWithRateLimitingIfEnabled+0xb3
fffffb00`545db3c0 ffff82e4`195ac3fa : ffff82e4`196104c0 fffffb00`545db500 ffff8281`406062d0 00000000`00000000 : win32kbase!CMouseSensor::ProcessInput+0x54
fffffb00`545db400 ffff82e4`1941956d : 00000000`00000040 ffff82e4`196104c0 00000000`00000001 ffffa983`025ae8a0 : win32kbase!CBaseInput::OnReadNotification+0x52a
fffffb00`545db540 ffff82e4`19419242 : ffffa983`025bb080 ffff8281`40660830 00000000`00000006 ffff5d73`862dce45 : win32kbase!CBaseInput::OnDispatcherObjectSignaled+0x31d
fffffb00`545db680 ffff82e4`194101be : ffff82e4`196582b0 ffff8281`40660830 ffff82e4`19651970 00000000`00000000 : win32kbase!CBaseInput::_OnDispatcherObjectSignaled+0x12
fffffb00`545db6b0 ffff82e4`1940ff10 : 00000000`00000006 ffff82e4`196582b0 00000000`00000006 ffff8281`40660830 : win32kbase!LegacyInputDispatcher::Dispatch+0x52
fffffb00`545db6e0 ffff82e4`197a0748 : ffff8281`4060f010 ffff8281`4060f010 00000000`00000004 00000000`00000001 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x100
fffffb00`545db810 ffff82e4`197a0314 : 00000000`00000004 00000000`00000004 00000000`0000000d ffff82e4`19659a80 : win32kfull!xxxDesktopThreadWaiter+0x130
fffffb00`545db890 ffff82e4`1948ae33 : ffffa983`025bb080 ffffa983`025bb080 00000000`00000000 00000000`00000005 : win32kfull!xxxDesktopThread+0x544
fffffb00`545db970 ffff82e4`19738d20 : ffffa983`025bb080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
fffffb00`545dbaa0 ffff82e4`19e0474d : ffffa983`025bb080 ffffa983`025bb080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
fffffb00`545dbad0 fffff803`20c06bb8 : ffffa983`00000005 00000000`00000005 000001bb`54604070 00000000`000002fc : win32k!NtUserCallNoParam+0x15
fffffb00`545dbb00 00007ff9`f1fc10e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000078`b8c7fd18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`f1fc10e4
SYMBOL_NAME: dxgkrnl!ADAPTER_DISPLAY::DdiSetPointerPosition+114
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .cxr 0xfffffb00545d9f50 ; kb
BUCKET_ID_FUNC_OFFSET: 114
FAILURE_BUCKET_ID: 0x3B_c0000005_dxgkrnl!ADAPTER_DISPLAY::DdiSetPointerPosition
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a8097140-3fce-4150-646e-6d192cb1a04a}
Followup: MachineOwner
---------