SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800702252cc, Address of the instruction which caused the bugcheck
Arg3: fffffb8f07827f20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4421
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 4882
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff800702252cc
BUGCHECK_P3: fffffb8f07827f20
BUGCHECK_P4: 0
CONTEXT: fffffb8f07827f20 -- (.cxr 0xfffffb8f07827f20)
rax=0000000000000000 rbx=ffff8a08de92f500 rcx=ffff8a08dc0c0e80
rdx=0000000000000080 rsi=ffff8a08dc0c0e80 rdi=0000000000000080
rip=fffff800702252cc rsp=fffffb8f07828920 rbp=0000000000000000
r8=0000000000000000 r9=000000000000005d r10=0000000000000000
r11=fffff80070000000 r12=0000000000000000 r13=0000000000000080
r14=0000000000000000 r15=ffff8a08de92f640
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!KeAbPreAcquire+0x11c:
fffff800`702252cc 0fb64220 movzx eax,byte ptr [rdx+20h] ds:002b:00000000`000000a0=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: NVIDIA Share.exe
STACK_TEXT:
fffffb8f`07828920 fffff800`7040bdd6 : ffff8a08`de92f500 fffffb8f`07828a01 00000000`00000000 ffff8a08`00000000 : nt!KeAbPreAcquire+0x11c
fffffb8f`07828970 fffff800`70231feb : ffff8a08`dc0c0e80 00000000`00000006 ffffe381`13199001 ffff8a08`cfa99000 : nt!KeWaitForSingleObject+0x1e54b6
fffffb8f`07828a60 fffff800`7060b250 : fffffb8f`07828e20 00000000`00000001 00000000`00000001 00000000`00000000 : nt!KeWaitForMultipleObjects+0x45b
fffffb8f`07828b70 ffffa16b`a683fc22 : 00000000`000186a0 00000000`00030d40 ffffa109`447f5090 ffff8a08`dd63e070 : nt!ObWaitForMultipleObjects+0x2f0
fffffb8f`07829070 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32kfull!xxxMsgWaitForMultipleObjectsEx+0x8e
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kfull
ffffa16ba679946b-ffffa16ba679946c 2 bytes - win32kfull!NtUserCallHwnd+bb
[ 8b 74:89 54 ]
ffffa16ba679946e-ffffa16ba67994b3 70 bytes - win32kfull!NtUserCallHwnd+be (+0x03)
[ 58 48 8b c3 48 8b 5c 24:10 53 56 57 41 54 41 55 ]
ffffa16ba67994b5-ffffa16ba67994c0 12 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+25 (+0x47)
[ 8b da 8b f9 c7 44 24 38:89 74 24 40 44 8b a4 24 ]
ffffa16ba67994c2-ffffa16ba67994cb 10 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+32 (+0x0d)
[ bf 01 00 00 00 41 8b d7:f7 c4 e0 ff ff ff 0f 85 ]
ffffa16ba67994d8-ffffa16ba6799526 79 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+48 (+0x16)
[ 48 8b 05 41 da 2b 00 48:84 e7 0f 85 0e 99 0e 00 ]
ffffa16ba6799528-ffffa16ba679955f 56 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+98 (+0x50)
[ 41 f6 c4 04 0f 84 92 04:00 4c 8b f8 48 85 c0 0f ]
ffffa16ba679985e-ffffa16ba679987c 31 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+3ce (+0x336)
[ 54 24 40 48 89 54 24 58:89 44 24 30 48 8b 05 b7 ]
ffffa16ba679987f-ffffa16ba6799894 22 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+3ef (+0x21)
[ 44 8b 84 24 40 09 00 00:80 f7 ff ff 41 8b 08 48 ]
ffffa16ba6799896-ffffa16ba67998b5 32 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+406 (+0x17)
[ d6 2b 00 4c 8b 30 48 ba:48 0c 41 83 be 88 04 00 ]
ffffa16ba67998b7-ffffa16ba67998da 36 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+427 (+0x21)
[ 0f af c8 48 c1 e9 18 49:c1 ef 18 85 ff 0f 84 a6 ]
ffffa16ba67998dc-ffffa16ba67998eb 16 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+44c (+0x25)
[ 48 8b 18 41 8b 38 48 0f:00 00 0f 8c 8e 95 0e 00 ]
ffffa16ba67998ed-ffffa16ba67998f4 8 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+45d (+0x11)
[ 84 da 97 0e 00 48 8b cb:ba f0 22 48 89 83 c0 04 ]
ffffa16ba6799901-ffffa16ba6799904 4 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+471 (+0x14)
[ 89 bb 88 04:e8 1a bb 30 ]
ffffa16ba6799906-ffffa16ba6799909 4 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+476 (+0x05)
[ 00 83 bb e0:49 8b 86 b8 ]
ffffa16ba679990d-ffffa16ba6799929 29 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+47d (+0x07)
[ 00 0f 8c c2 97 0e 00 48:66 89 70 0a 41 81 a6 c0 ]
ffffa16ba6799936-ffffa16ba6799946 17 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+4a6 (+0x29)
[ 49 8b 86 b8 01 00 00 66:95 0e 00 48 8b cf 4c 8b ]
ffffa16ba6799948-ffffa16ba679994c 5 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+4b8 (+0x12)
[ ff fb ff ff 65:48 85 c0 74 03 ]
ffffa16ba679994f-ffffa16ba6799954 6 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+4bf (+0x07)
[ 3c 25 88 01 00 00:30 48 8b 44 24 50 ]
ffffa16ba683fc22-ffffa16ba683fc46 37 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+8e (+0xa62d3)
[ 48 89 4c 24 50 8b bc 24:8b d8 85 c0 78 0c 40 84 ]
ffffa16ba683fc48 - win32kfull!xxxMsgWaitForMultipleObjectsEx+b4 (+0x26)
[ 64:ac ]
ffffa16ba683fc4a-ffffa16ba683fc55 12 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+b6 (+0x02)
[ 44 48 89 74 24 30 44 8b:c0 00 00 00 44 8b 64 24 ]
ffffa16ba683fc57-ffffa16ba683fc65 15 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+c3 (+0x0d)
[ 28 41 b0 01 49 8b d5 c6:b0 00 00 00 45 85 ff 75 ]
ffffa16ba683fc72-ffffa16ba683fc8a 25 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+de (+0x1b)
[ 8b d8 85 c0 78 0c 40 84:58 b9 03 00 00 00 48 8b ]
ffffa16ba683fc97-ffffa16ba683fcb4 30 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+103 (+0x25)
[ 8b ac 24 c0 00 00 00 44:0f 84 0d ff ff ff 85 db ]
ffffa16ba683fcb6-ffffa16ba683fcb8 3 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+122 (+0x1f)
[ 86 b8 eb:76 24 ef ]
ffffa16ba683fcba-ffffa16ba683fcf6 61 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+126 (+0x04)
[ 85 c0 74 2f 48 8b 44 24:83 c8 ff 48 83 c4 68 41 ]
ffffa16ba683fd03-ffffa16ba683fd1d 27 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+16f (+0x49)
[ 8b c8 e8 36 24 ef ff 83:28 48 8b 09 4c 8b 15 32 ]
ffffa16ba683fd20-ffffa16ba683fd21 2 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+18c (+0x1d)
[ cc cc:48 89 ]
ffffa16ba6a36bd4 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bd4)
[ 90:60 ]
ffffa16ba6a36bd8 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bd8) (+0x04)
[ d2:a2 ]
ffffa16ba6a36bdc - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bdc) (+0x04)
[ dc:ec ]
ffffa16ba6a36be0 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346be0) (+0x04)
[ e0:b0 ]
ffffa16ba6a36be4-ffffa16ba6a36be5 2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346be4) (+0x04)
[ 10 9d:e0 9c ]
ffffa16ba6a36be8 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346be8) (+0x04)
[ 20:30 ]
ffffa16ba6a36bec-ffffa16ba6a36bed 2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bec) (+0x04)
[ 20 9d:f0 9c ]
ffffa16ba6a36bf0 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bf0) (+0x04)
[ 91:61 ]
ffffa16ba6a36bf4 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bf4) (+0x04)
[ 6c:7c ]
ffffa16ba6a36bf8 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bf8) (+0x04)
[ a0:70 ]
ffffa16ba6a36bfc - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bfc) (+0x04)
[ 6e:3e ]
ffffa16ba6a36c00 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c00) (+0x04)
[ c4:d4 ]
ffffa16ba6a36c04 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c04) (+0x04)
[ 80:50 ]
ffffa16ba6a36c08 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c08) (+0x04)
[ 51:21 ]
ffffa16ba6a36c0c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c0c) (+0x04)
[ 80:90 ]
ffffa16ba6a36c10 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c10) (+0x04)
[ 60:30 ]
ffffa16ba6a36c14 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c14) (+0x04)
[ e7:b7 ]
ffffa16ba6a36c18 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c18) (+0x04)
[ 98:a8 ]
ffffa16ba6a36c1c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c1c) (+0x04)
[ f0:c0 ]
ffffa16ba6a36c20 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c20) (+0x04)
[ a9:79 ]
ffffa16ba6a36c24 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c24) (+0x04)
[ a8:b8 ]
ffffa16ba6a36c28 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c28) (+0x04)
[ a9:79 ]
ffffa16ba6a36c2c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c2c) (+0x04)
[ 3a:0a ]
ffffa16ba6a36c30 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c30) (+0x04)
[ b8:c8 ]
ffffa16ba6a36c34 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c34) (+0x04)
[ 3a:0a ]
ffffa16ba6a36c38 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c38) (+0x04)
[ 39:09 ]
ffffa16ba6a36c3c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c3c) (+0x04)
[ cc:dc ]
ffffa16ba6a36c40 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c40) (+0x04)
[ 40:10 ]
ffffa16ba6a36c44 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c44) (+0x04)
[ 68:38 ]
ffffa16ba6a36c48 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c48) (+0x04)
[ 04:14 ]
ffffa16ba6a36c4c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c4c) (+0x04)
[ 70:40 ]
ffffa16ba6a36c50 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c50) (+0x04)
[ ef:bf ]
ffffa16ba6a36c54 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c54) (+0x04)
[ 6c:7c ]
ffffa16ba6a36c58 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c58) (+0x04)
[ f8:c8 ]
ffffa16ba6a36c5c-ffffa16ba6a36c5d 2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c5c) (+0x04)
[ 05 ac:d5 ab ]
ffffa16ba6a36c60 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c60) (+0x04)
[ 94:a4 ]
ffffa16ba6a36c64-ffffa16ba6a36c65 2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c64) (+0x04)
[ 0c ac:dc ab ]
ffffa16ba6a36c68-ffffa16ba6a36c69 2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c68) (+0x04)
[ 2d ac:fd ab ]
ffffa16ba6a36c6c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c6c) (+0x04)
[ 64:74 ]
ffffa16ba6a36c70 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c70) (+0x04)
[ 34:04 ]
ffffa16ba6a36c74 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c74) (+0x04)
[ 84:54 ]
ffffa16ba6a36c78 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c78) (+0x04)
[ cc:dc ]
ffffa16ba6a36c7c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c7c) (+0x04)
[ 90:60 ]
ffffa16ba6a36c80 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c80) (+0x04)
[ 8b:5b ]
ffffa16ba6a36c84 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c84) (+0x04)
[ 34:44 ]
ffffa16ba6a36c88 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c88) (+0x04)
[ 94:64 ]
ffffa16ba6a36c8c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c8c) (+0x04)
[ 79:49 ]
ffffa16ba6a36c90-ffffa16ba6a36c91 2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c90) (+0x04)
[ f8 a7:08 a8 ]
ffffa16ba6a36c94 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c94) (+0x04)
[ 80:50 ]
ffffa16ba6a36c98-ffffa16ba6a36c99 2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c98) (+0x04)
[ 16 e4:e6 e3 ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.
783 errors : !win32kfull (ffffa16ba679946b-ffffa16ba6a3eab8)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: .cxr 0xfffffb8f07827f20 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffab81aabe7e70
Arg3: 00000000d1d64b08
Arg4: fffff8015a7fb346
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3983
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 11120
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7f
BUGCHECK_P1: 8
BUGCHECK_P2: ffffab81aabe7e70
BUGCHECK_P3: d1d64b08
BUGCHECK_P4: fffff8015a7fb346
TRAP_FRAME: ffffab81aabe7e70 -- (.trap 0xffffab81aabe7e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000102 rbx=0000000000000000 rcx=ffffd6855a6162e0
rdx=000000007457624f rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015a7fb346 rsp=00000000d1d64b08 rbp=ffff9309d1d64b80
r8=0000000100000045 r9=ffffab81aab80180 r10=0000000000000000
r11=fffff8015a200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!ObWaitForSingleObject+0xc6:
fffff801`5a7fb346 415e pop r14
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steam.exe
BAD_STACK_POINTER: 00000000d1d64b08
STACK_TEXT:
ffffab81`aabe7d28 fffff801`5a5ef929 : 00000000`0000007f 00000000`00000008 ffffab81`aabe7e70 00000000`d1d64b08 : nt!KeBugCheckEx
ffffab81`aabe7d30 fffff801`5a5ea743 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffab81`aabe7e70 fffff801`5a7fb346 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3
00000000`d1d64b08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0xc6
SYMBOL_NAME: nt!KiDoubleFaultAbort+2c3
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.329
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2c3
FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c5b9990d-856b-1bb5-7662-4621e5941c84}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000100000005d, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80272817b17, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3483
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6268
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 100000005d
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80272817b17
READ_ADDRESS: fffff802732fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8027320f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8027320f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000100000005d
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: RainbowSix.exe
TRAP_FRAME: fffffe0b0211e4e0 -- (.trap 0xfffffe0b0211e4e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbc800b7b0370 rbx=0000000000000000 rcx=d4be284b6a560000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80272817b17 rsp=fffffe0b0211e678 rbp=fffffe0b0211e560
r8=0000000000000000 r9=0000000fffffffff r10=ffffbf8000005bd0
r11=fffffff000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiGetPageChain+0x317:
fffff802`72817b17 415f pop r15
Resetting default scope
STACK_TEXT:
fffffe0b`0211e398 fffff802`729ef929 : 00000000`0000000a 00000010`0000005d 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffe0b`0211e3a0 fffff802`729ebc29 : 00000000`00000000 00000000`00000000 00000000`003d3abd 00000000`00000002 : nt!KiBugCheckDispatch+0x69
fffffe0b`0211e4e0 fffff802`72817b17 : ffff8004`e674f700 00000000`00000040 0000025b`23430000 00000000`00000001 : nt!KiPageFault+0x469
fffffe0b`0211e678 fffff802`72815656 : 00000000`00000005 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetPageChain+0x317
fffffe0b`0211e6c0 fffff802`72821890 : ffff9081`a9c95180 00000000`00000000 ffffffff`ffffffff fffff802`73250ac0 : nt!MiResolvePrivateZeroFault+0x176
fffffe0b`0211e7e0 fffff802`72813382 : fffffe0b`0211ea20 fffffe0b`0211e960 fffffe0b`0211e970 fffffe0b`0211e908 : nt!MiZeroFault+0x380
fffffe0b`0211e8d0 fffff802`72812a4a : ffff8004`e8dc8001 ffff8004`00000003 ffff9081`00000000 fffff802`729e4c32 : nt!MiUserFault+0x3c2
fffffe0b`0211e960 fffff802`729ebb1e : ffff8004`e783e080 ffff8004`e62c86e0 00000000`00000000 ffff8004`00000000 : nt!MmAccessFault+0x16a
fffffe0b`0211eb00 00007ff7`4f014b12 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000ca`015fe860 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff7`4f014b12
SYMBOL_NAME: nt!MiGetPageChain+317
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.329
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 317
FAILURE_BUCKET_ID: AV_nt!MiGetPageChain
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0e6728ab-cf4f-0ce6-a21d-b2680731698a}
Followup: MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff8055dcfa318, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding this single DPC timeout
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7514
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10580
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 0
BUGCHECK_P2: 501
BUGCHECK_P3: 500
BUGCHECK_P4: fffff8055dcfa318
DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED
TRAP_FRAME: ffffdb0bfca29630 -- (.trap 0xffffdb0bfca29630)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000634bd4c4 rbx=0000000000000000 rcx=ffffdb0bfca29820
rdx=ffffdb0bfca29840 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8055d233395 rsp=ffffdb0bfca297c0 rbp=ffffdb0bfca29960
r8=ffff9600aa9e6280 r9=0000000000000000 r10=0000fffff8055d9b
r11=ffff85fcc4a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KeYieldProcessorEx+0x15:
fffff805`5d233395 f390 pause
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffff9600`aa3f9e18 fffff805`5d4593ee : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
ffff9600`aa3f9e20 fffff805`5d2ca2ed : 00004263`5c669e20 00000000`00000000 ffffdb0b`fca29600 ffff9600`aa9e6180 : nt!KeAccumulateTicks+0x18bf6e
ffff9600`aa3f9e80 fffff805`5d2ca16a : ffffcb05`e74c7480 ffffdb0b`fca296b0 fffff805`0014fe2b 00000000`00000000 : nt!KeClockInterruptNotify+0xbd
ffff9600`aa3f9f30 fffff805`5d208705 : ffffcb05`e74c7480 00000000`00000000 00000000`00000000 ffff59d8`7c552baa : nt!HalpTimerClockIpiRoutine+0x1a
ffff9600`aa3f9f60 fffff805`5d3df4ca : ffffdb0b`fca296b0 ffffcb05`e74c7480 00004253`8cd78a5e 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff9600`aa3f9fb0 fffff805`5d3dfa37 : 00000032`01166a3f fffff805`625796af ffffdb0b`fca29840 fffff805`5d3dfa44 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffdb0b`fca29630 fffff805`5d233395 : 00000000`00000010 00000000`00000246 ffffdb0b`fca297e8 00000000`00000018 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffdb0b`fca297c0 fffff805`5d9ba819 : 00000000`00000002 00000000`00000000 ffff9600`aa9e6180 00000000`00000001 : nt!KeYieldProcessorEx+0x15
ffffdb0b`fca297f0 fffff805`5d9b90f5 : 00000000`634bd4c4 ffff9600`aa9e6180 ffffcb05`f2c77140 00000000`00000000 : nt!IopLiveDumpProcessCorralStateChange+0x2d
ffffdb0b`fca29820 fffff805`5d23a69e : ffff9600`aa9e9240 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopLiveDumpCorralDpc+0x55
ffffdb0b`fca29860 fffff805`5d239984 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
ffffdb0b`fca299d0 fffff805`5d3e158e : ffffffff`00000000 ffff9600`aa9e6180 ffff9600`aa9f1340 ffffcb05`f12a5080 : nt!KiRetireDpcList+0x1f4
ffffdb0b`fca29c60 00000000`00000000 : ffffdb0b`fca2a000 ffffdb0b`fca24000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KeAccumulateTicks+18bf6e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.329
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 18bf6e
FAILURE_BUCKET_ID: 0x133_DPC_nt!KeAccumulateTicks
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {88dc98ce-f842-4daa-98d0-858621db6b0f}
Followup: MachineOwner
---------