FAST_ERESOURCE_PRECONDITION_VIOLATION (1c6)
The current thread is performing an invalid call to a fast resource routine.
Arguments:
Arg1: 000000000000000f, The caller passed a fast resource to a legacy routine that
supports fast resources, but the fast resource was not
initialized with EX_FAST_RESOURCE_ENABLE_LEGACY_APIS.
Arg2: ffffc084cd31b690, Pointer to the resource.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 5220
BIOS_DATE: 09/12/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME B350M-A
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: f
BUGCHECK_P2: ffffc084cd31b690
BUGCHECK_P3: 0
BUGCHECK_P4: 0
CPU_COUNT: 8
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 11
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x1C6
PROCESS_NAME: WmiPrvSE.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-28-2020 03:30:47.0060
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff80615a93b9d to fffff80615bc14e0
STACK_TEXT:
ffff810e`b4f791d8 fffff806`15a93b9d : 00000000`000001c6 00000000`0000000f ffffc084`cd31b690 00000000`00000000 : nt!KeBugCheckEx
ffff810e`b4f791e0 fffff806`15fef89b : 00000110`288f92b0 fffff806`16349070 ffffc084`ccefb080 ffffc084`ccefb508 : nt!SeSecurityAttributePresent+0x18d
ffff810e`b4f79240 fffff806`15fe1e48 : fffff6fb`7dbed010 ffffc084`00040000 00000800`00000000 00000000`00000000 : nt!ExpGetProcessInformation+0x1eb
ffff810e`b4f798b0 fffff806`15fe150b : 00000110`288c7380 00000000`00003801 00000000`00000000 00000000`00000840 : nt!ExpQuerySystemInformation+0x818
ffff810e`b4f79ac0 fffff806`15bd2d18 : ffffc084`cc969080 00000000`00000001 00000000`00000000 ffffc084`cb6efe60 : nt!NtQuerySystemInformation+0x2b
ffff810e`b4f79b00 00007ff9`f939c784 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000000c`36d7cd78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`f939c784
THREAD_SHA1_HASH_MOD_FUNC: 4773e7af99e53eafb1262b63db1c1bff466a0f72
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: b8f68b88d002a88a240030de0807f86fcaa51f0a
THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
FOLLOWUP_IP:
nt!SeSecurityAttributePresent+18d
fffff806`15a93b9d cc int 3
FAULT_INSTR_CODE: cccccccc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!SeSecurityAttributePresent+18d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4f6eba0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 18d
FAILURE_BUCKET_ID: 0x1C6_nt!SeSecurityAttributePresent
BUCKET_ID: 0x1C6_nt!SeSecurityAttributePresent
PRIMARY_PROBLEM_CLASS: 0x1C6_nt!SeSecurityAttributePresent
TARGET_TIME: 2020-01-27T22:17:56.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 2bcf
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1c6_nt!sesecurityattributepresent
FAILURE_ID_HASH: {8e1828bd-8a15-0873-9d56-34d59892885e}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: ffffd13dc403dfa5, The address that the exception occurred at
Arg3: 0000000000000001, Parameter 0 of the exception
Arg4: 000000000000000f, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 5220
BIOS_DATE: 09/12/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME B350M-A
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: ffffd13dc403dfa5
BUGCHECK_P3: 1
BUGCHECK_P4: f
WRITE_ADDRESS: fffff807367733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
000000000000000f
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
win32kbase!DirectComposition::CResourceMarshaler::EmitUpdateCommand<<lambda_0792d512e18448bf4ac5474847912d54> >+35
ffffd13d`c403dfa5 c70210000000 mov dword ptr [rdx],10h
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: 000000000000000f
BUGCHECK_STR: 0x1E_c0000005_W
CPU_COUNT: 8
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 11
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-28-2020 03:30:41.0354
ANALYSIS_VERSION: 10.0.18362.1 x86fre
EXCEPTION_RECORD: ffff8140a0502000 -- (.exr 0xffff8140a0502000)
ExceptionAddress: 0000000000000000
ExceptionCode: a5519867
ExceptionFlags: 0a000001
NumberParameters: 0
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
LAST_CONTROL_TRANSFER: from fffff8073642fda7 to fffff807363c14e0
STACK_TEXT:
ffff8482`dbedefa8 fffff807`3642fda7 : 00000000`0000001e ffffffff`c0000005 ffffd13d`c403dfa5 00000000`00000001 : nt!KeBugCheckEx
ffff8482`dbedefb0 fffff807`363d341d : ffff8140`a0502000 ffff8482`dbedf840 ffff8000`00000000 00000000`0000000f : nt!KiDispatchException+0x1689d7
ffff8482`dbedf660 fffff807`363cf605 : 00000000`00000000 ffffd13d`00000000 ffffd10a`40e117a0 ffff8482`dbedf8b0 : nt!KiExceptionDispatch+0x11d
ffff8482`dbedf840 ffffd13d`c403dfa5 : ffffd13d`c3c92a4a 00000000`00000018 00000000`00000000 00000000`0739fb40 : nt!KiPageFault+0x445
ffff8482`dbedf9d8 00007ffb`04bf6550 : 00007ffb`2029bfb0 ffffd10a`00000001 00000000`00000000 00000000`0739fca0 : win32kbase!DirectComposition::CResourceMarshaler::EmitUpdateCommand<<lambda_0792d512e18448bf4ac5474847912d54> >+0x35
ffff8482`dbedfa08 00007ffb`2029bfb0 : ffffd10a`00000001 00000000`00000000 00000000`0739fca0 00000000`00000000 : 0x00007ffb`04bf6550
ffff8482`dbedfa10 ffffd10a`00000001 : 00000000`00000000 00000000`0739fca0 00000000`00000000 00000000`00000000 : 0x00007ffb`2029bfb0
ffff8482`dbedfa18 00000000`00000000 : 00000000`0739fca0 00000000`00000000 00000000`00000000 ffffd10a`44140a80 : 0xffffd10a`00000001
THREAD_SHA1_HASH_MOD_FUNC: 1b082c2186964961521c48a315a6951ff6b13dbe
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3dcb6cf74139107716b3370bb0396c8b283ddb9e
THREAD_SHA1_HASH_MOD: 0080a282132315c9f53e77cfca44170128e88811
FOLLOWUP_IP:
win32kbase!DirectComposition::CResourceMarshaler::EmitUpdateCommand<<lambda_0792d512e18448bf4ac5474847912d54> >+35
ffffd13d`c403dfa5 c70210000000 mov dword ptr [rdx],10h
FAULT_INSTR_CODE: 1002c7
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: win32kbase!DirectComposition::CResourceMarshaler::EmitUpdateCommand<<lambda_0792d512e18448bf4ac5474847912d54> >+35
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 35
FAILURE_BUCKET_ID: 0x1E_c0000005_W_win32kbase!DirectComposition::CResourceMarshaler::EmitUpdateCommand__lambda_0792d512e18448bf4ac5474847912d54___
BUCKET_ID: 0x1E_c0000005_W_win32kbase!DirectComposition::CResourceMarshaler::EmitUpdateCommand__lambda_0792d512e18448bf4ac5474847912d54___
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_W_win32kbase!DirectComposition::CResourceMarshaler::EmitUpdateCommand__lambda_0792d512e18448bf4ac5474847912d54___
TARGET_TIME: 2020-01-27T22:04:33.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: b19e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_w_win32kbase!directcomposition::cresourcemarshaler::emitupdatecommand__lambda_0792d512e18448bf4ac5474847912d54___
FAILURE_ID_HASH: {daf681cf-d6b8-ee7f-9a3d-910f0c62d812}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
buffer overrun.
Arg2: ffffee8dfabda090, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffee8dfabd9fe8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 5220
BIOS_DATE: 09/12/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME B350M-A
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: 2
BUGCHECK_P2: ffffee8dfabda090
BUGCHECK_P3: ffffee8dfabd9fe8
BUGCHECK_P4: 0
TRAP_FRAME: ffffee8dfabda090 -- (.trap 0xffffee8dfabda090)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8b87e01b0000 rbx=0000000000000000 rcx=0000000000000002
rdx=ffffee8dfabda800 rsi=0000000000000000 rdi=0000000000000000
rip=ffff8b87e026d495 rsp=ffffee8dfabda228 rbp=ffffee8dfabda800
r8=0000000000000001 r9=ffffee8dfabdb439 r10=ffffee8dfabdb438
r11=0000000000000180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
win32kbase!_report_gsfailure+0x5:
ffff8b87`e026d495 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffee8dfabd9fe8 -- (.exr 0xffffee8dfabd9fe8)
ExceptionAddress: ffff8b87e026d495 (win32kbase!_report_gsfailure+0x0000000000000005)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000002
Subcode: 0x2 FAST_FAIL_STACK_COOKIE_CHECK_FAILURE
CPU_COUNT: 8
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 11
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
DEFAULT_BUCKET_ID: FAIL_FAST_STACK_COOKIE_CHECK_FAILURE
WATSON_BKT_EVENT: BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000002
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-28-2020 03:30:53.0151
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff804527d32e9 to fffff804527c14e0
STACK_TEXT:
ffffee8d`fabd9d68 fffff804`527d32e9 : 00000000`00000139 00000000`00000002 ffffee8d`fabda090 ffffee8d`fabd9fe8 : nt!KeBugCheckEx
ffffee8d`fabd9d70 fffff804`527d3710 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffc880`d4f44100 : nt!KiBugCheckDispatch+0x69
ffffee8d`fabd9eb0 fffff804`527d1aa5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffee8d`fabda090 ffff8b87`e026d495 : ffff8b87`e026f1b2 ffff8bb0`80629000 ffffee8d`fabda810 ffffee8d`fabda300 : nt!KiRaiseSecurityCheckFailure+0x325
ffffee8d`fabda228 ffff8b87`e026f1b2 : ffff8bb0`80629000 ffffee8d`fabda810 ffffee8d`fabda300 ffff8b87`e01ce144 : win32kbase!_report_gsfailure+0x5
ffffee8d`fabda230 ffff8b87`e026f147 : ffffee8d`fabda800 fffff804`526c5e34 ffffee8d`fabda8e0 00000000`00000000 : win32kbase!_GSHandlerCheckCommon+0x5a
ffffee8d`fabda260 fffff804`527ca312 : ffff8b87`e03ca000 ffff8b87`e01b0000 00018204`002a5000 00000000`0010001f : win32kbase!_GSHandlerCheck+0x13
ffffee8d`fabda290 fffff804`526c2fa5 : ffffee8d`fabdb1f8 00000000`00000000 ffffee8d`fabda800 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
ffffee8d`fabda2c0 fffff804`526c753e : ffffee8d`fabdb1f8 ffffee8d`fabdaf40 ffffee8d`fabdb1f8 ffff8bb0`80629000 : nt!RtlDispatchException+0x4a5
ffffee8d`fabdaa10 fffff804`527d341d : 00000000`00000000 0000895e`00000000 ffffee8d`fabdb1c4 00000000`00000000 : nt!KiDispatchException+0x16e
ffffee8d`fabdb0c0 fffff804`527cd9ab : ffff8bb0`84160690 00000002`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x11d
ffffee8d`fabdb2a0 ffff8b87`e01ce144 : ffff8b87`e0388920 ffff8b87`e0388920 ffff8bb0`80629000 00000001`862651e1 : nt!KiInvalidOpcodeFault+0x32b
ffffee8d`fabdb438 ffffee8d`fabdb6a0 : ffffee8d`fabdb750 ffffee8d`fabdb6a0 ffff8bb0`80629a60 ffff8b87`e0388920 : win32kbase!CMouseProcessor::ProcessMouseMove+0x150
ffffee8d`fabdb5f8 ffffee8d`fabdb750 : ffffee8d`fabdb6a0 ffff8bb0`80629a60 ffff8b87`e0388920 00000000`00000003 : 0xffffee8d`fabdb6a0
ffffee8d`fabdb600 ffffee8d`fabdb6a0 : ffff8bb0`80629a60 ffff8b87`e0388920 00000000`00000003 ffff8b87`e0383e10 : 0xffffee8d`fabdb750
ffffee8d`fabdb608 ffff8bb0`80629a60 : ffff8b87`e0388920 00000000`00000003 ffff8b87`e0383e10 ffffee8d`fabdb700 : 0xffffee8d`fabdb6a0
ffffee8d`fabdb610 ffff8b87`e0388920 : 00000000`00000003 ffff8b87`e0383e10 ffffee8d`fabdb700 00000000`00000001 : 0xffff8bb0`80629a60
ffffee8d`fabdb618 00000000`00000003 : ffff8b87`e0383e10 ffffee8d`fabdb700 00000000`00000001 ffff8bb0`80629a60 : win32kbase!WPP_a819e7d240c13332848bedce030fc704_Traceguids
ffffee8d`fabdb620 ffff8b87`e0383e10 : ffffee8d`fabdb700 00000000`00000001 ffff8bb0`80629a60 00000000`00000000 : 0x3
ffffee8d`fabdb628 ffffee8d`fabdb700 : 00000000`00000001 ffff8bb0`80629a60 00000000`00000000 ffff8b87`e01cd3e1 : win32kbase!CMouseProcessor::CMoveEvent::`vftable'
ffffee8d`fabdb630 00000000`00000001 : ffff8bb0`80629a60 00000000`00000000 ffff8b87`e01cd3e1 ffff8b87`e037cdf0 : 0xffffee8d`fabdb700
ffffee8d`fabdb638 ffff8bb0`80629a60 : 00000000`00000000 ffff8b87`e01cd3e1 ffff8b87`e037cdf0 ffff8b87`e03c8698 : 0x1
ffffee8d`fabdb640 00000000`00000000 : ffff8b87`e01cd3e1 ffff8b87`e037cdf0 ffff8b87`e03c8698 ffffee8d`00000000 : 0xffff8bb0`80629a60
THREAD_SHA1_HASH_MOD_FUNC: 27093e8eb338658231b5f09bda9658e84b78f715
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: fd1096ac5268ca3e5c0e40273a7e2140027172cd
THREAD_SHA1_HASH_MOD: a4a6061c256763aa26de5f62c738682ff1a562bc
FOLLOWUP_IP:
win32kbase!_report_gsfailure+5
ffff8b87`e026d495 cd29 int 29h
FAULT_INSTR_CODE: cccc29cd
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: win32kbase!_report_gsfailure+5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_win32kbase!_report_gsfailure
BUCKET_ID: 0x139_MISSING_GSFRAME_win32kbase!_report_gsfailure
PRIMARY_PROBLEM_CLASS: 0x139_MISSING_GSFRAME_win32kbase!_report_gsfailure
TARGET_TIME: 2020-01-27T22:44:26.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 48d1
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_missing_gsframe_win32kbase!_report_gsfailure
FAILURE_ID_HASH: {f22c2e43-4b0d-a5dc-7d6c-399075f6e217}
Followup: MachineOwner
---------