Çözüldü Windows 10 APC_INDEX_MISMATCH mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Durum
Mesaj gönderimine kapalı.
İşletim sistemi
Windows 10

ru.zgar7117

Megapat
Katılım
1 Ağustos 2015
Mesajlar
124
Çözümler
2
Yer
İstanbul
Daha fazla  
Cinsiyet
Erkek
Meslek
UI / UX Tasarım, Full Stack Geliştirici
Öncelikle herkese merhaba,

3 gün önce yeni bir sistem topladım, fakat sürekli mavi ekran hatası alıyorum. Konu başlığında yazdığım hata sadece bir kod. Farklı hata kodları da aldım, fakat hepsini aklımda tutamadım. Siz istemeden minidump dosyalarını paylaşıyorum. Sürücüler ve BIOS güncel.

Google drive minidump

Sistem özelliklerim.
  • AMD Ryzen 5 3600.
  • ASUS TUF Gaming B450 PLUS.
  • Corsair Vengeance 16 GB 3200MHz.
  • MSI GTX 1660 Super Gaming X 6 GB.
  • SanDisk Ultra 3D 500GB M.2 SSD.

 
Son düzenleyen: Moderatör:
Çözüm
Öncelikle tekrar merhaba, sorun çözüme kavuştu. Sorun işlemcideymiş. En son aklıma gelen parça oldu. İşlemcilerin de arızalı olabileceğini görmüş olduk. İlgilenen arkadaşlara ve forum yöneticilerine teşekkür ederim.

Buradan şunu da belirtmek isterim, çoğu arkadaş paylaştığım minidump dosyalarında yer alan programların mavi ekran verdirdiğini söyledi ve bu programları kaldırarak çözüme kavuşabileceğini söylediler. Arkadaşlar siz oyun oynamak veya iş yapmak amaçlı topladığınız sistemden oyunun ile alakalı programları veya oyunu kaldırarak bu durumu çözemezsiniz. Araştırmaların sonucunda çok fazla R5 3600 sistemde bu hatalar mevcut. Onun için sorunu hiç çözemiyorsanız işlemcinizi garantiye yollamakta fayda var derim.

Gelelim sorunu nasıl bulduğuma. Yakın zamanda arkadaşımda R5 3600'lü bir sistem topladı. Arkadaşımın ricası ile işlemcileri 2 haftalığına takas ettik. Kullanımlarımız sonucunda bende 2 hafta boyunca en ufak bir kasma mavi ekran sorunu vermedi. Arkadaşımda ise bilgisayar hiç stabil çalışmıyordu ancak mavi ekranda vermiyordu. Ancak işlemcide bir sıkıntı olduğu belliydi. Sistemi geç açılıyordu, oyunlarda FPS düşmesi alıyordu. Sonrasında işlemcileri tekrar takas ettik ve taktıktan 5 dk sonra gene mavi ekran verdi. Ürünü Endeks Bilişim'e yolladım ve onlar da ürünü kusurlu buldular. İşlemcilerin tamiri mümkün olmadığından iade veya değişim hakkı tanıdılar. Herkese teşekkür ediyor, sağlıklı günler diliyorum.

Screenshot_2.png
SSD'nin Firmware güncellemesini yaptınız mı? BIOS default ettiniz mi? Vaziyet aynı demişsiniz, yeni dosyaları atın. Bir de @Recep Baltaş baksın bakalım.

Şimdi deniyorum. Bu da yeni oluşan mavi ekran hatası Minidump. Farklı bir hata aldım.
SSD'nin Firmware güncellemesini yaptınız mı? BIOS default ettiniz mi? Vaziyet aynı demişsiniz, yeni dosyaları atın. Bir de @Recep Baltaş baksın bakalım.

SSD yazılımı güncel görünüyor. Denetle dediğimde de güncel diyor.
 

Dosya Ekleri

  • Adsız.png
    Adsız.png
    103,8 KB · Görüntüleme: 55
Son düzenleme:
Son attığınız dosyada ekran kartı ve işlemci kaynaklı sorunlar görüyorum. Bu ikisinin (özellikle işlemcinin) aynı anda bozulmasına ihtimal vermiyorum. Belleklere bir test yapın bakalım.

Test sonucu hata çıkmazsa anakartı servise gönderin diyeceğim. Ayrıca PSU'nuzun modeli nedir, yazdığınızı görmedim.
 
Son attığınız dosyada ekran kartı ve işlemci kaynaklı sorunlar görüyorum. Bu ikisinin (özellikle işlemcinin) aynı anda bozulmasına ihtimal vermiyorum. Belleklere bir test yapın bakalım.

Test sonucu hata çıkmazsa anakartı servise gönderin diyeceğim. Ayrıca PSU'nuzun modeli nedir, yazdığınızı görmedim.
Memtest86 ile taratmıştım, hata çıkmadı. PSU olarak çok kaliteli değil frisbi’nin kasasıda gelen 650w 80 bronze psu.
 
PSU kaynaklı olabilir o zaman. Yine böyle bir PSU kullanan sistemde PSU değişimi sonrası mavi ekran sorunlarının çözüldüğünü görmüştüm, sizinki de buna benziyor. Sürekli yüksek güç tüketen bileşenlerde sorun çıkması da bunu destekliyor. PSU'yu değiştirmenizi öneririm.
 
PSU kaynaklı olabilir o zaman. Yine böyle bir PSU kullanan sistemde PSU değişimi sonrası mavi ekran sorunlarının çözüldüğünü görmüştüm, sizinki de buna benziyor. Sürekli yüksek güç tüketen bileşenlerde sorun çıkması da bunu destekliyor. PSU'yu değiştirmenizi öneririm.

Elimde Cooler Master 850W güç kaynağı var uyar mı sizce? Ama sertifikası var mı bilmiyorum. Çok güç tüketir diye takmamıştım.
 
Son düzenleyen: Moderatör:
Çok güç tüketmenin PSU ile alakası yok ki, sistemle alakası var. Büyük ihtimalle uyacaktır, zaten abartı bir sisteminiz yok.
 
Kesin bir sebep bulamadım ama PSU sorunu olabilir. Sen ilk iş bir PSU değişmi yap bakalım. Frisby ile olacak iş değil.

Kod:
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff806106fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding this single DPC timeout

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8155

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 54854

Key : Analysis.Memory.CommitPeak.Mb
Value: 86

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 133

BUGCHECK_P1: 0

BUGCHECK_P2: 501

BUGCHECK_P3: 500

BUGCHECK_P4: fffff806106fb320

DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED

TRAP_FRAME:  fffff80614a6bff0 -- (.trap 0xfffff80614a6bff0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000000a rbx=0000000000000000 rcx=fffff80614a6c204
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8060fcbecd7 rsp=fffff80614a6c180 rbp=fffff80614a6c219
r8=0000000000000000 r9=fffff80614a6c210 r10=0000000000000fff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KeYieldProcessorEx+0x17:
fffff806`0fcbecd7 4883c420 add rsp,20h
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
fffff806`14a7ae18 fffff806`0fe87372 : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
fffff806`14a7ae20 fffff806`0fd26853 : 0000006c`393e7a38 fffff806`0ca5b180 00000000`00000000 fffff806`0ca5b180 : nt!KeAccumulateTicks+0x15e2c2
fffff806`14a7ae80 fffff806`0fd2633a : fffff806`106f38c0 fffff806`14a6c070 fffff806`133b3c00 00000000`0000a301 : nt!KeClockInterruptNotify+0x453
fffff806`14a7af30 fffff806`0fc2ecd5 : fffff806`106f38c0 fffff806`14a7af40 00000000`0000000c ffffe65c`495d07b4 : nt!HalpTimerClockIpiRoutine+0x1a
fffff806`14a7af60 fffff806`0fdf6cba : fffff806`14a6c070 fffff806`106f38c0 ffffba81`473df180 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff806`14a7afb0 fffff806`0fdf7227 : 00000000`00000002 fffff806`0fcc5826 fffff806`0ca5b180 fffff806`0fdf7234 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff806`14a6bff0 fffff806`0fcbecd7 : ffffffff`ffffffd2 fffff806`0ff19472 00000000`00000010 00000000`00000286 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff806`14a6c180 fffff806`0ff1946e : 00000000`00b81018 00000000`00000000 ffff8602`00000020 fffff806`14a6c1e0 : nt!KeYieldProcessorEx+0x17
fffff806`14a6c1b0 fffff806`0fe67082 : fffff806`0ca5b180 fffff806`1ea4e000 ffff8602`00000004 fffff806`14a6c2bc : nt!KiHeteroChooseTargetProcessor+0x55e
fffff806`14a6c280 fffff806`0fcc5001 : fffff806`14a6c4b0 ffff8602`bf69b000 00000000`00000000 fffff806`1e91ae45 : nt!KiDeferredReadySingleThread+0x1a1dc2
fffff806`14a6c470 fffff806`0fcc4a8a : 00000000`00000000 fffff806`00000000 ffff8602`c1104180 00000000`00000000 : nt!KiExitDispatcher+0x141
fffff806`14a6c4e0 fffff806`1f052e29 : ffff8602`00000001 00000000`00002148 ffff8602`bf69b000 ffff8602`c1099640 : nt!KeSetEvent+0xea
fffff806`14a6c570 ffff8602`00000001 : 00000000`00002148 ffff8602`bf69b000 ffff8602`c1099640 ffff8d40`a2e4da6d : nvlddmkm+0x842e29
fffff806`14a6c578 00000000`00002148 : ffff8602`bf69b000 ffff8602`c1099640 ffff8d40`a2e4da6d fffff806`1e90bffe : 0xffff8602`00000001
fffff806`14a6c580 ffff8602`bf69b000 : ffff8602`c1099640 ffff8d40`a2e4da6d fffff806`1e90bffe ffff8602`bf69b000 : 0x2148
fffff806`14a6c588 ffff8602`c1099640 : ffff8d40`a2e4da6d fffff806`1e90bffe ffff8602`bf69b000 fffff806`1e90c05e : 0xffff8602`bf69b000
fffff806`14a6c590 ffff8d40`a2e4da6d : fffff806`1e90bffe ffff8602`bf69b000 fffff806`1e90c05e ffff8602`bf69b000 : 0xffff8602`c1099640
fffff806`14a6c598 fffff806`1e90bffe : ffff8602`bf69b000 fffff806`1e90c05e ffff8602`bf69b000 fffff806`1bdd40e3 : 0xffff8d40`a2e4da6d
fffff806`14a6c5a0 ffff8602`bf69b000 : fffff806`1e90c05e ffff8602`bf69b000 fffff806`1bdd40e3 ffff8602`bf6a6410 : nvlddmkm+0xfbffe
fffff806`14a6c5a8 fffff806`1e90c05e : ffff8602`bf69b000 fffff806`1bdd40e3 ffff8602`bf6a6410 00000000`00000000 : 0xffff8602`bf69b000
fffff806`14a6c5b0 ffff8602`bf69b000 : fffff806`1bdd40e3 ffff8602`bf6a6410 00000000`00000000 00000000`00000000 : nvlddmkm+0xfc05e
fffff806`14a6c5b8 fffff806`1bdd40e3 : ffff8602`bf6a6410 00000000`00000000 00000000`00000000 fffff806`1f0533c5 : 0xffff8602`bf69b000
fffff806`14a6c5c0 fffff806`1bddbca1 : 00000000`00000000 00000000`00002148 00000000`00002148 00000000`00000000 : amdppm!GetCpcDifferentialFeedback+0x33
fffff806`14a6c5f0 ffff8602`c4d5d010 : ffff8602`bf077000 ffff8602`c1103000 00000011`b9c4b1a0 ffffe65c`495c6ea4 : amdppm!PerfReadWrappingCounter+0x41
fffff806`14a6c640 ffff8602`bf077000 : ffff8602`c1103000 00000011`b9c4b1a0 ffffe65c`495c6ea4 ffffba81`47d38ab0 : 0xffff8602`c4d5d010
fffff806`14a6c648 ffff8602`c1103000 : 00000011`b9c4b1a0 ffffe65c`495c6ea4 ffffba81`47d38ab0 ffff8602`bf0a66e8 : 0xffff8602`bf077000
fffff806`14a6c650 00000011`b9c4b1a0 : ffffe65c`495c6ea4 ffffba81`47d38ab0 ffff8602`bf0a66e8 ffff8602`bf082ba8 : 0xffff8602`c1103000
fffff806`14a6c658 ffffe65c`495c6ea4 : ffffba81`47d38ab0 ffff8602`bf0a66e8 ffff8602`bf082ba8 ffffba81`485e9000 : 0x00000011`b9c4b1a0
fffff806`14a6c660 ffffba81`47d38ab0 : ffff8602`bf0a66e8 ffff8602`bf082ba8 ffffba81`485e9000 00000000`00000000 : 0xffffe65c`495c6ea4
fffff806`14a6c668 ffff8602`bf0a66e8 : ffff8602`bf082ba8 ffffba81`485e9000 00000000`00000000 00000000`00000000 : 0xffffba81`47d38ab0
fffff806`14a6c670 ffff8602`bf082ba8 : ffffba81`485e9000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffff8602`bf0a66e8
fffff806`14a6c678 ffffba81`485e9000 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff806`1f03c13e : 0xffff8602`bf082ba8
fffff806`14a6c680 00000000`00000000 : 00000000`00000000 00000000`00000000 fffff806`1f03c13e 00000000`0000178f : 0xffffba81`485e9000


SYMBOL_NAME: nvlddmkm+842e29

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 842e29

FAILURE_BUCKET_ID: 0x133_DPC_nvlddmkm!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {15c3af0e-5564-7a80-2e26-65b5115ecc4d}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000900, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000040, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80714729d94, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5514

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 7566

Key : Analysis.Memory.CommitPeak.Mb
Value: 84

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: a

BUGCHECK_P1: 900

BUGCHECK_P2: ff

BUGCHECK_P3: 40

BUGCHECK_P4: fffff80714729d94

READ_ADDRESS: fffff807150fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8071500f340: Unable to get Flags value from nt!KdVersionBlock
fffff8071500f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000900

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME:  ffffb006b2245770 -- (.trap 0xffffb006b2245770)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000045fee5c5 rbx=0000000000000000 rcx=0000000000000001
rdx=00000000000000f6 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80714729d94 rsp=ffffb006b2245900 rbp=ffffb006b2245a00
r8=8000000000000000 r9=ffffb006b2245b50 r10=0000fffff8071476
r11=000000004622916e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!PpmIdlePrepare+0x164:
fffff807`14729d94 488903 mov qword ptr [rbx],rax ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT:
ffffb006`b2245628 fffff807`14807169 : 00000000`0000000a 00000000`00000900 00000000`000000ff 00000000`00000040 : nt!KeBugCheckEx
ffffb006`b2245630 fffff807`14803469 : 00000000`00000000 00000000`00000000 00000000`00000010 ffffb389`ea3706c0 : nt!KiBugCheckDispatch+0x69
ffffb006`b2245770 fffff807`14729d94 : ffffb389`effd3010 00000000`00989680 00000000`00000000 00000000`0001fefc : nt!KiPageFault+0x469
ffffb006`b2245900 fffff807`14726e87 : 00000000`00000000 00001f80`0065005b 00000000`00000003 00000000`00000002 : nt!PpmIdlePrepare+0x164
ffffb006`b2245af0 fffff807`147f8d34 : ffffffff`00000000 ffffe300`4b9e0340 ffffb389`f40dc080 00000000`00000900 : nt!PoIdle+0x1f7
ffffb006`b2245c60 00000000`00000000 : ffffb006`b2246000 ffffb006`b2240000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME: nt!PpmIdlePrepare+164

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.610

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 164

FAILURE_BUCKET_ID: AV_nt!PpmIdlePrepare

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {dd7d0096-4602-c4e5-a984-978d6ab3aa71}

Followup: MachineOwner
---------

APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ff945b8be24, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffffe18e827b8b80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3765

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 6402

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1

BUGCHECK_P1: 7ff945b8be24

BUGCHECK_P2: 0

BUGCHECK_P3: ffff

BUGCHECK_P4: ffffe18e827b8b80

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: EpicGamesLauncher.exe

STACK_TEXT:
ffffe18e`827b89b8 fffff804`22407169 : 00000000`00000001 00007ff9`45b8be24 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffffe18e`827b89c0 fffff804`22407033 : 00000232`3bce9640 ffffa30b`34481160 ffffe18e`827b8b18 ffffffff`fffe7960 : nt!KiBugCheckDispatch+0x69
ffffe18e`827b8b00 00007ff9`45b8be24 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
000000a9`925af978 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`45b8be24


SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.610

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1fe

FAILURE_BUCKET_ID: 0x1_SysCallNum_4_nt!KiSystemServiceExitPico

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {52cd694c-15ec-48c3-924a-3539560711db}

Followup: MachineOwner
---------

6: kd> !apc
*** Enumerating APCs in all processes
Process ffffa30b2888c040

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8057ea12281, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffff8c8f00000009, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5015

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 15519

Key : Analysis.Memory.CommitPeak.Mb
Value: 84

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8057ea12281

BUGCHECK_P3: 0

BUGCHECK_P4: ffff8c8f00000009

READ_ADDRESS: fffff8057f4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8057f40f340: Unable to get Flags value from nt!KdVersionBlock
fffff8057f40f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff8c8f00000009

EXCEPTION_PARAMETER2: ffff8c8f00000009

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

BAD_STACK_POINTER: ffffa0019f863158

STACK_TEXT:
ffffa001`9f863158 fffff805`7ecf451e : 00000000`0000001e ffffffff`c0000005 fffff805`7ea12281 00000000`00000000 : nt!KeBugCheckEx
ffffa001`9f863160 fffff805`7ebfe0d2 : fffff805`7ecf44fc 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffffa001`9f8631a0 fffff805`7ea52db7 : ffffa001`9f863710 00000000`00000000 ffffe201`ef86fc60 fffff805`7ebf8d7e : nt!RtlpExecuteHandlerForException+0x12
ffffa001`9f8631d0 fffff805`7ea519a6 : ffffe201`ef86f728 ffffa001`9f863e20 ffffe201`ef86f728 fffff805`7c512428 : nt!RtlDispatchException+0x297
ffffa001`9f8638f0 fffff805`7ebf60a2 : 0020002e`00730025 00740061`00740053 0020003a`00730075 cccc0000`00780025 : nt!KiDispatchException+0x186
ffffa001`9f863fb0 fffff805`7ebf6070 : fffff805`7ec072a5 ffff8c8f`00000009 ffffe201`ef86f6f0 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffe201`ef86f5e8 fffff805`7ec072a5 : ffff8c8f`00000009 ffffe201`ef86f6f0 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffe201`ef86f5f0 fffff805`7ec03443 : 00000000`00000000 00000000`00989680 00000000`00000002 00000000`00000000 : nt!KiExceptionDispatch+0x125
ffffe201`ef86f7d0 fffff805`7ea12281 : ffff8c8f`8cc0e010 00000006`94efb754 ffffffff`00000001 ffff8c8f`8cc0e1f8 : nt!KiPageFault+0x443
ffffe201`ef86f960 fffff805`7eae4dee : 00000000`00000000 00000000`00000000 00000000`00140001 ffffe201`ef86fa50 : nt!KiRemoveEntryTimer+0x51
ffffe201`ef86f9d0 fffff805`7ebf8d7e : ffffffff`00000000 ffffa001`9f843180 ffffa001`9f84e340 ffff8c8f`92551080 : nt!KiRetireDpcList+0x99e
ffffe201`ef86fc60 00000000`00000000 : ffffe201`ef870000 ffffe201`ef86a000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME: nt!KiRemoveEntryTimer+51

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.610

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 51

FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_nt!KiRemoveEntryTimer

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {4cc51259-b7cc-b242-ba85-41b7336e1769}

Followup: MachineOwner
---------
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ff82454be24, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffff9c039375bb80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3358

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 12511

Key : Analysis.Memory.CommitPeak.Mb
Value: 75

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1

BUGCHECK_P1: 7ff82454be24

BUGCHECK_P2: 0

BUGCHECK_P3: ffff

BUGCHECK_P4: ffff9c039375bb80

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: EpicGamesLauncher.exe

STACK_TEXT:
ffff9c03`9375b9b8 fffff802`35007169 : 00000000`00000001 00007ff8`2454be24 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffff9c03`9375b9c0 fffff802`35007033 : ffffa107`08196080 00000000`00000000 ffff9c03`9375bb18 ffffffff`fffe7960 : nt!KiBugCheckDispatch+0x69
ffff9c03`9375bb00 00007ff8`2454be24 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
0000002b`44c9fbe8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`2454be24


SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.630

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1fe

FAILURE_BUCKET_ID: 0x1_SysCallNum_4_nt!KiSystemServiceExitPico

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {52cd694c-15ec-48c3-924a-3539560711db}

Followup: MachineOwner
---------

7: kd> !apc
*** Enumerating APCs in all processes
Process ffffa10705a8e040

KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffffc906a89ef040, The address of the thread.
Arg2: ffffc906a9143160, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5468

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 16308

Key : Analysis.Memory.CommitPeak.Mb
Value: 78

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 192

BUGCHECK_P1: ffffc906a89ef040

BUGCHECK_P2: ffffc906a9143160

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

STACK_TEXT:
fffff408`87c2fed8 fffff801`212dac9f : 00000000`00000192 ffffc906`a89ef040 ffffc906`a9143160 00000000`00000000 : nt!KeBugCheckEx
fffff408`87c2fee0 fffff801`1da461cd : ffffc906`b2349520 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ExAcquireCacheAwarePushLockSharedEx+0x14f
fffff408`87c2ff20 fffff801`1da42801 : 00000000`00000000 fffff408`87c300ff fffff408`87c30100 ffffc906`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0x4ad
fffff408`87c30040 fffff801`21331c17 : fffff408`87c31000 00000000`00000000 fffff408`87c2b000 00000000`00000000 : FLTMGR!FltpPreFsFilterOperation+0x181
fffff408`87c300f0 fffff801`216ffd31 : fffff801`1da48a20 00000000`00000001 00000000`00000000 fffff801`1da42680 : nt!FsFilterPerformCallbacks+0xe7
fffff408`87c30160 fffff801`216ff99b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!FsRtlAcquireFileExclusiveCommon+0x121
fffff408`87c30450 fffff801`216ff877 : 00000000`00000000 00000000`00000002 00000000`00000001 fffff408`87c30808 : nt!FsRtlAcquireToCreateMappedSection+0x5b
fffff408`87c304d0 fffff801`216ff57d : ffffc906`00000000 ffffc906`00000000 fffff801`1da48a00 00000000`00000000 : nt!MiCallCreateSectionFilters+0x37
fffff408`87c30510 fffff801`216fed64 : 00000000`00000000 00000000`00000000 ffffc906`b4d8b580 00000000`00000000 : nt!MiCreateImageOrDataSection+0x13d
fffff408`87c30600 fffff801`216feb47 : 00000000`11000000 fffff408`87c309b1 00000000`00000000 00000000`00000002 : nt!MiCreateSection+0xf4
fffff408`87c30780 fffff801`216fe92c : fffff408`87c30910 fffff801`00000005 fffff408`87c30960 ffffc906`a7014cc0 : nt!MiCreateSectionCommon+0x207
fffff408`87c30860 fffff801`21707d88 : 00000000`00000000 00000000`00000000 fffff408`87c309b1 00000000`00000000 : nt!NtCreateSection+0x5c
fffff408`87c308d0 fffff801`217078b5 : 00000000`0000006c fffff408`87c30b00 ffffa60c`ed87541a ffffa60c`00000000 : nt!PfSnGetSectionObject+0x250
fffff408`87c30a00 fffff801`213034b5 : ffffc906`a89ef040 ffffc906`a89ef040 ffffc906`a6b24b30 00000000`00000000 : nt!PfSnPopulateReadList+0x2b5
fffff408`87c30b70 fffff801`212a29a5 : ffffc906`a89ef040 00000000`00000080 ffffc906`a6aaa040 00000000`00000000 : nt!ExpWorkerThread+0x105
fffff408`87c30c10 fffff801`213fc868 : ffff8800`add25180 ffffc906`a89ef040 fffff801`212a2950 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff408`87c30c60 00000000`00000000 : fffff408`87c31000 fffff408`87c2b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: nt!ExAcquireCacheAwarePushLockSharedEx+14f

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.610

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 14f

FAILURE_BUCKET_ID: 0x192_nt!ExAcquireCacheAwarePushLockSharedEx

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {0b3e94d6-ae37-4afe-1a69-72779fd6e91e}

Followup: MachineOwner
---------

RESOURCE_NOT_OWNED (e3)
A thread tried to release a resource it did not own.
Arguments:
Arg1: ffffa606af9c7b90, Address of resource
Arg2: ffffa606acd130c0, Address of thread
Arg3: 0000000000000000, Address of owner table if there is one
Arg4: 0000000000000002

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4577

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 47733

Key : Analysis.Memory.CommitPeak.Mb
Value: 76

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: e3

BUGCHECK_P1: ffffa606af9c7b90

BUGCHECK_P2: ffffa606acd130c0

BUGCHECK_P3: 0

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: svchost.exe

STACK_TEXT:
fffffb89`fa799eb8 fffff802`4b66d5af : 00000000`000000e3 ffffa606`af9c7b90 ffffa606`acd130c0 00000000`00000000 : nt!KeBugCheckEx
fffffb89`fa799ec0 fffff802`4b4dbc43 : 00000000`00000000 00000000`00000000 ffffa606`acd130c0 00000000`00000000 : nt!ExpReleaseResourceSharedForThreadLite+0x19188f
fffffb89`fa799f80 fffff802`4b8e71bf : ffffa606`ad2718a0 00000000`00000000 ffffce08`63f03dc0 ffffce08`574246d0 : nt!ExReleaseResourceLite+0xf3
fffffb89`fa799fe0 fffff802`4b8e97d6 : 00000000`00000000 fffffb89`fa79a230 fffffb89`fa79a940 00000000`00000000 : nt!CmpCheckOpenAccessOnKeyBody+0x31f
fffffb89`fa79a0d0 fffff802`4b8e82e3 : ffffce08`0000001c fffffb89`fa79a420 fffffb89`fa79a3d8 ffffa606`ad2718a0 : nt!CmpDoParseKey+0x626
fffffb89`fa79a370 fffff802`4b8ec3ae : fffff802`4b8e8001 00000000`00000000 ffffa606`ad2718a0 fffff802`4b4dc901 : nt!CmpParseKey+0x2c3
fffffb89`fa79a510 fffff802`4b8f566a : ffffa606`ad271800 fffffb89`fa79a778 ffffa606`00000040 ffffa606`a2ac3980 : nt!ObpLookupObjectName+0x3fe
fffffb89`fa79a6e0 fffff802`4b8f544c : ffffce08`00000000 00000000`00000000 00000000`00000000 ffffa606`a2ac3980 : nt!ObOpenObjectByNameEx+0x1fa
fffffb89`fa79a810 fffff802`4b8f4f71 : 00000051`02bfc488 fffffb89`fa79ab80 00000000`00000001 00007ffe`55a640e8 : nt!ObOpenObjectByName+0x5c
fffffb89`fa79a860 fffff802`4b8f4c9f : 00000000`00000fbc 00000000`00000000 00007ffe`55a7fef0 00007ffe`55a63eb8 : nt!CmOpenKey+0x2c1
fffffb89`fa79aac0 fffff802`4b606bb8 : ffffa606`acd13000 0000018f`b2dc0000 fffffb89`fa79ab80 ffffa606`acb47240 : nt!NtOpenKeyEx+0xf
fffffb89`fa79ab00 00007ffe`5af6e194 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000051`02bfc408 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`5af6e194


SYMBOL_NAME: nt!ExpReleaseResourceSharedForThreadLite+19188f

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.630

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 19188f

FAILURE_BUCKET_ID: 0xE3_nt!ExpReleaseResourceSharedForThreadLite

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {321aa310-6654-009f-ad13-07c9b7115742}

Followup: MachineOwner
---------

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000000000, page frame number
Arg3: 0000000000000000, current page state
Arg4: 0000000000000003, 0

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3577

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 8412

Key : Analysis.Memory.CommitPeak.Mb
Value: 76

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 4e

BUGCHECK_P1: 99

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 3

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: EpicGamesLauncher.exe

STACK_TEXT:
ffff9108`730ded88 fffff807`5ffed1e7 : 00000000`0000004e 00000000`00000099 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffff9108`730ded90 fffff807`5ff4a172 : 00000000`003c0cd5 fffff807`60850c00 1a000003`00000001 fffff807`000000d5 : nt!MiBadShareCount+0x5b
ffff9108`730dedd0 fffff807`5ff4a91e : 00000000`00000000 ffff9108`730df2f0 ffffc663`318fff00 ffff9108`730df360 : nt!MiDeletePteRun+0x17c2
ffff9108`730defe0 fffff807`5fee9a1d : 00000000`00000002 ffffb38a`3bdd1700 ffff9108`730df2f0 ffffc663`318ffef8 : nt!MiDeleteVaTail+0x6e
ffff9108`730df010 fffff807`5fee963b : ffffc663`318ff000 ffffb38a`3bdd1700 ffff9108`00000002 ffff9108`730df360 : nt!MiWalkPageTablesRecursively+0xc6d
ffff9108`730df0b0 fffff807`5fed859b : ffff9108`730df1c8 ffffb38a`3bdd1700 ffff9108`00000003 ffff9108`730df370 : nt!MiWalkPageTablesRecursively+0x88b
ffff9108`730df150 fffff807`5ff4b541 : ffff9108`730df2f0 ffffb38a`00000000 ffffffff`00000002 ffffc663`00000000 : nt!MiWalkPageTables+0x36b
ffff9108`730df250 fffff807`5ff229a0 : 00000000`00000001 ffff9108`00000000 ffffb38a`3bdd1550 ffffb38a`3c378080 : nt!MiDeletePagablePteRange+0x4f1
ffff9108`730df560 fffff807`60304aa9 : ffffb38a`3c2550c0 00000000`00000000 ffffb38a`00000000 ffffb38a`00000000 : nt!MiDeleteVad+0x360
ffff9108`730df670 fffff807`60303908 : ffffb38a`3c2550c0 ffffb38a`3aee5c20 ffffb38a`3c378080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff9108`730df6a0 fffff807`603027af : ffffb38a`3bd100e0 ffffb38a`3bd100e0 ffffb38a`3c2550c0 ffffb38a`3bdd1080 : nt!MiCleanVad+0x30
ffff9108`730df6d0 fffff807`601f164f : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffb38a`3bdd1080 : nt!MmCleanProcessAddressSpace+0x137
ffff9108`730df750 fffff807`601e6f96 : ffffb38a`3bdd1080 ffff8001`b4b4d060 ffff9108`730df990 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffff9108`730df7d0 fffff807`6027a978 : 00000000`c0000005 00000000`00000001 ffff9108`730df9e0 000000a3`f07f4000 : nt!PspExitThread+0x5f6
ffff9108`730df8d0 fffff807`5fee25c7 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff807`5feec806 : nt!KiSchedulerApcTerminate+0x38
ffff9108`730df910 fffff807`5fff97b0 : 00000000`00000000 ffff9108`730df9c0 ffff9108`730dfb80 000001b1`00000000 : nt!KiDeliverApc+0x487
ffff9108`730df9c0 fffff807`60006c5f : ffffb38a`3c378080 ffffb38a`3c7b8760 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffff9108`730dfb00 00007ff9`b600be24 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000a3`f93cfa38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`b600be24


SYMBOL_NAME: nt!MiBadShareCount+5b

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 5b

FAILURE_BUCKET_ID: 0x4E_99_nt!MiBadShareCount

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {60e553e9-e4c5-ed08-9be6-c353e0011003}

Followup: MachineOwner
---------

APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ffe8f32bfc4, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: fffffd0f7281bb80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3437

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 11122

Key : Analysis.Memory.CommitPeak.Mb
Value: 76

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1

BUGCHECK_P1: 7ffe8f32bfc4

BUGCHECK_P2: 0

BUGCHECK_P3: ffff

BUGCHECK_P4: fffffd0f7281bb80

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Illustrator.exe

STACK_TEXT:
fffffd0f`7281b948 fffff806`0d207169 : 00000000`00000001 00007ffe`8f32bfc4 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
fffffd0f`7281b950 fffff806`0d207033 : 00000000`00000000 000000c5`a6aff650 000000c5`a6aff660 00000000`00000018 : nt!KiBugCheckDispatch+0x69
fffffd0f`7281ba90 00007ffe`8f32bfc4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
000000c5`a6aff618 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`8f32bfc4


SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.610

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1fe

FAILURE_BUCKET_ID: 0x1_SysCallNum_11_nt!KiSystemServiceExitPico

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {514ee3f4-4c84-d755-6331-e284451fb4fa}

Followup: MachineOwner
---------

3: kd> lm
start             end                 module name
ffffb6cb`91400000 ffffb6cb`916de000   win32kbase   (deferred)             
ffffb6cb`916e0000 ffffb6cb`91a96000   win32kfull   (deferred)             
ffffb6cb`91aa0000 ffffb6cb`91ae8000   cdd        (deferred)             
ffffb6cb`921b0000 ffffb6cb`9224a000   win32k   # (pdb symbols)          C:\ProgramData\Dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
fffff806`0bef0000 fffff806`0bf18000   mcupdate_AuthenticAMD   (deferred)             
fffff806`0bf20000 fffff806`0bf26000   hal        (deferred)             
fffff806`0bf30000 fffff806`0bf3b000   kd         (deferred)             
fffff806`0bf40000 fffff806`0bf67000   tm         (deferred)             
fffff806`0bf70000 fffff806`0bfda000   CLFS       (deferred)             
fffff806`0bfe0000 fffff806`0bffa000   PSHED      (deferred)             
fffff806`0c000000 fffff806`0c00b000   BOOTVID    (deferred)             
fffff806`0c010000 fffff806`0c123000   clipsp     (deferred)             
fffff806`0c130000 fffff806`0c19f000   FLTMGR     (deferred)             
fffff806`0c1a0000 fffff806`0c1c9000   ksecdd     (deferred)             
fffff806`0c1d0000 fffff806`0c232000   msrpc      (deferred)             
fffff806`0c240000 fffff806`0c24e000   cmimcext   (deferred)             
fffff806`0c250000 fffff806`0c261000   werkernel   (deferred)             
fffff806`0c270000 fffff806`0c27c000   ntosext    (deferred)             
fffff806`0c280000 fffff806`0c293000   WDFLDR     (deferred)             
fffff806`0c2a0000 fffff806`0c2af000   SleepStudyHelper   (deferred)             
fffff806`0c2b0000 fffff806`0c2c1000   WppRecorder   (deferred)             
fffff806`0c2d0000 fffff806`0c2ea000   SgrmAgent   (deferred)             
fffff806`0ce00000 fffff806`0de46000   nt         (pdb symbols)          C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\030B757AB63151439866794BAD755AE11\ntkrnlmp.pdb
fffff806`11800000 fffff806`118e3000   CI         (deferred)             
fffff806`118f0000 fffff806`119a7000   cng        (deferred)             
fffff806`119b0000 fffff806`11a81000   Wdf01000   (deferred)             
fffff806`11a90000 fffff806`11ab6000   acpiex     (deferred)             
fffff806`11ac0000 fffff806`11b0b000   mssecflt   (deferred)             
fffff806`11b10000 fffff806`11bdc000   ACPI       (deferred)             
fffff806`11be0000 fffff806`11bec000   WMILIB     (deferred)             
fffff806`11c10000 fffff806`11c7b000   intelpep   (deferred)             
fffff806`11c80000 fffff806`11c97000   WindowsTrustedRT   (deferred)             
fffff806`11ca0000 fffff806`11cab000   IntelTA    (deferred)             
fffff806`11cb0000 fffff806`11cbb000   WindowsTrustedRTProxy   (deferred)             
fffff806`11cc0000 fffff806`11cd4000   pcw        (deferred)             
fffff806`11ce0000 fffff806`11ceb000   msisadrv   (deferred)             
fffff806`11cf0000 fffff806`11d68000   pci        (deferred)             
fffff806`11d70000 fffff806`11d85000   vdrvroot   (deferred)             
fffff806`11d90000 fffff806`11dbf000   pdc        (deferred)             
fffff806`11dc0000 fffff806`11dd9000   CEA        (deferred)             
fffff806`11de0000 fffff806`11e11000   partmgr    (deferred)             
fffff806`11e20000 fffff806`11eca000   spaceport   (deferred)             
fffff806`11ed0000 fffff806`11ee9000   volmgr     (deferred)             
fffff806`11ef0000 fffff806`11f53000   volmgrx    (deferred)             
fffff806`11f60000 fffff806`11f7e000   mountmgr   (deferred)             
fffff806`11f80000 fffff806`11fb2000   storahci   (deferred)             
fffff806`11fe0000 fffff806`11ffa000   fileinfo   (deferred)             
fffff806`12000000 fffff806`120b0000   storport   (deferred)             
fffff806`120c0000 fffff806`12100000   Wof        (deferred)             
fffff806`12110000 fffff806`1217c000   WdFilter   (deferred)             
fffff806`12180000 fffff806`12459000   Ntfs       (deferred)             
fffff806`12460000 fffff806`1246d000   Fs_Rec     (deferred)             
fffff806`12470000 fffff806`125df000   ndis       (deferred)             
fffff806`125e0000 fffff806`12678000   NETIO      (deferred)             
fffff806`12680000 fffff806`126b2000   ksecpkg    (deferred)             
fffff806`126c0000 fffff806`126e1000   amdpsp     (deferred)             
fffff806`126f0000 fffff806`129da000   tcpip      (deferred)             
fffff806`129e0000 fffff806`12a5f000   fwpkclnt   (deferred)             
fffff806`12a60000 fffff806`12a90000   wfplwfs    (deferred)             
fffff806`12aa0000 fffff806`12b68000   fvevol     (deferred)             
fffff806`12b70000 fffff806`12b7b000   volume     (deferred)             
fffff806`12b80000 fffff806`12bed000   volsnap    (deferred)             
fffff806`12bf0000 fffff806`12c40000   rdyboost   (deferred)             
fffff806`12c50000 fffff806`12c76000   mup        (deferred)             
fffff806`12c80000 fffff806`12c92000   iorate     (deferred)             
fffff806`12cc0000 fffff806`12cdc000   disk       (deferred)             
fffff806`12ce0000 fffff806`12d4c000   CLASSPNP   (deferred)             
fffff806`19600000 fffff806`199a3000   dxgkrnl    (deferred)             
fffff806`199b0000 fffff806`199c8000   watchdog   (deferred)             
fffff806`199d0000 fffff806`199e6000   BasicDisplay   (deferred)             
fffff806`199f0000 fffff806`19a01000   BasicRender   (deferred)             
fffff806`19a10000 fffff806`19a2c000   Npfs       (deferred)             
fffff806`19a30000 fffff806`19a41000   Msfs       (deferred)             
fffff806`19a50000 fffff806`19a6b000   CimFS      (deferred)             
fffff806`19a70000 fffff806`19a92000   tdx        (deferred)             
fffff806`19aa0000 fffff806`19ab0000   TDI        (deferred)             
fffff806`19ac0000 fffff806`19b1c000   netbt      (deferred)             
fffff806`19b20000 fffff806`19b33000   afunix     (deferred)             
fffff806`19b40000 fffff806`19be3000   afd        (deferred)             
fffff806`19bf0000 fffff806`19c0a000   vwififlt   (deferred)             
fffff806`19c10000 fffff806`19c3b000   pacer      (deferred)             
fffff806`19c40000 fffff806`19c54000   ndiscap    (deferred)             
fffff806`19c60000 fffff806`19c74000   netbios    (deferred)             
fffff806`19c80000 fffff806`19d21000   Vid        (deferred)             
fffff806`19d30000 fffff806`19d51000   winhvr     (deferred)             
fffff806`19d60000 fffff806`19ddb000   rdbss      (deferred)             
fffff806`19de0000 fffff806`19e74000   csc        (deferred)             
fffff806`19e80000 fffff806`19e92000   nsiproxy   (deferred)             
fffff806`19ea0000 fffff806`19eae000   npsvctrig   (deferred)             
fffff806`19eb0000 fffff806`19ec0000   mssmbios   (deferred)             
fffff806`19ed0000 fffff806`19eda000   gpuenergydrv   (deferred)             
fffff806`19ee0000 fffff806`19f0c000   dfsc       (deferred)             
fffff806`19f30000 fffff806`19f9c000   fastfat    (deferred)             
fffff806`19fa0000 fffff806`19fb7000   bam        (deferred)             
fffff806`19fc0000 fffff806`1a00e000   ahcache    (deferred)             
fffff806`1a010000 fffff806`1a022000   CompositeBus   (deferred)             
fffff806`1a030000 fffff806`1a03d000   kdnic      (deferred)             
fffff806`1a040000 fffff806`1a055000   umbus      (deferred)             
fffff806`1a060000 fffff806`1a0f8000   USBXHCI    (deferred)             
fffff806`1a100000 fffff806`1a144000   ucx01000   (deferred)             
fffff806`1a150000 fffff806`1a237000   rt640x64   (deferred)             
fffff806`1a240000 fffff806`1a2c0000   cldflt     (deferred)             
fffff806`1a2d0000 fffff806`1a2e8000   mslldp     (deferred)             
fffff806`1a2f0000 fffff806`1a30b000   rspndr     (deferred)             
fffff806`1a310000 fffff806`1a32d000   wanarp     (deferred)             
fffff806`1a330000 fffff806`1a386000   msquic     (deferred)             
fffff806`1a420000 fffff806`1a43e000   crashdmp   (deferred)             
fffff806`1a440000 fffff806`1a516000   peauth     (deferred)             
fffff806`1a520000 fffff806`1a550000   cdrom      (deferred)             
fffff806`1a560000 fffff806`1a575000   filecrypt   (deferred)             
fffff806`1a580000 fffff806`1a58e000   tbs        (deferred)             
fffff806`1a590000 fffff806`1a59a000   Null       (deferred)             
fffff806`1a5a0000 fffff806`1a5aa000   Beep       (deferred)             
fffff806`1c800000 fffff806`1c866000   portcls    (deferred)             
fffff806`1c870000 fffff806`1c891000   drmk       (deferred)             
fffff806`1c8a0000 fffff806`1c916000   ks         (deferred)             
fffff806`1c920000 fffff806`1c9ce000   UcmCxUcsiNvppc   (deferred)             
fffff806`1c9d0000 fffff806`1c9fc000   UcmCx      (deferred)             
fffff806`1ca00000 fffff806`1ca0a000   AMDPCIDev   (deferred)             
fffff806`1ca10000 fffff806`1ca2c000   serial     (deferred)             
fffff806`1ca30000 fffff806`1ca3f000   serenum    (deferred)             
fffff806`1ca40000 fffff806`1ca4d000   amdgpio2   (deferred)             
fffff806`1ca50000 fffff806`1ca82000   msgpioclx   (deferred)             
fffff806`1ca90000 fffff806`1ca9c000   wmiacpi    (deferred)             
fffff806`1caa0000 fffff806`1cadb000   amdppm     (deferred)             
fffff806`1cae0000 fffff806`1caea000   amdgpio3   (deferred)             
fffff806`1caf0000 fffff806`1cafe000   UEFI       (deferred)             
fffff806`1cb00000 fffff806`1cb11000   nvvad64v   (deferred)             
fffff806`1cb20000 fffff806`1cb2f000   ksthunk    (deferred)             
fffff806`1cb30000 fffff806`1cb3d000   NvModuleTracker   (deferred)             
fffff806`1cb40000 fffff806`1cb50000   nvvhci     (deferred)             
fffff806`1cb60000 fffff806`1cb6d000   NdisVirtualBus   (deferred)             
fffff806`1cb70000 fffff806`1cb7c000   swenum     (deferred)             
fffff806`1cb80000 fffff806`1cb8e000   rdpbus     (deferred)             
fffff806`1cb90000 fffff806`1cc33000   UsbHub3    (deferred)             
fffff806`1cc40000 fffff806`1cc4e000   USBD       (deferred)             
fffff806`1cc50000 fffff806`1cc88000   nvhda64v   (deferred)             
fffff806`1cc90000 fffff806`1ccff000   HdAudio    (deferred)             
fffff806`1cd10000 fffff806`1cd1e000   dump_diskdump   (deferred)             
fffff806`1cd60000 fffff806`1cd92000   dump_storahci   (deferred)             
fffff806`1cdc0000 fffff806`1cddd000   dump_dumpfve   (deferred)             
fffff806`1cde0000 fffff806`1cdf3000   HIDPARSE   (deferred)             
fffff806`1ce00000 fffff806`1ce25000   USBSTOR    (deferred)             
fffff806`1ce30000 fffff806`1ce63000   usbccgp    (deferred)             
fffff806`1ce70000 fffff806`1ce82000   hidusb     (deferred)             
fffff806`1ce90000 fffff806`1cecf000   HIDCLASS   (deferred)             
fffff806`1ced0000 fffff806`1cee1000   kbdhid     (deferred)             
fffff806`1cef0000 fffff806`1cf04000   kbdclass   (deferred)             
fffff806`1cf10000 fffff806`1cf20000   mouhid     (deferred)             
fffff806`1cf30000 fffff806`1cf43000   mouclass   (deferred)             
fffff806`1cf50000 fffff806`1d031000   dxgmms2    (deferred)             
fffff806`1d040000 fffff806`1d05b000   monitor    (deferred)             
fffff806`1d060000 fffff806`1d089000   luafv      (deferred)             
fffff806`1d090000 fffff806`1d0c6000   wcifs      (deferred)             
fffff806`1d0d0000 fffff806`1d124000   WUDFRd     (deferred)             
fffff806`1d130000 fffff806`1d13e000   WpdUpFltr   (deferred)             
fffff806`1d140000 fffff806`1d15a000   storqosflt   (deferred)             
fffff806`1d160000 fffff806`1d187000   bindflt    (deferred)             
fffff806`1d1a0000 fffff806`1f1a4000   nvlddmkm   (deferred)             
fffff806`1f1b0000 fffff806`1f1d5000   HDAudBus   (deferred)             
fffff806`1f1e0000 fffff806`1f1f8000   lltdio     (deferred)             
fffff806`5da00000 fffff806`5da93000   mrxsmb     (deferred)             
fffff806`5daa0000 fffff806`5dae5000   mrxsmb20   (deferred)             
fffff806`5daf0000 fffff806`5db43000   srvnet     (deferred)             
fffff806`5db50000 fffff806`5db64000   mmcss      (deferred)             
fffff806`5db70000 fffff806`5db85000   tcpipreg   (deferred)             
fffff806`5db90000 fffff806`5dbb7000   Ndu        (deferred)             
fffff806`5dbe0000 fffff806`5dd66000   HTTP       (deferred)             
fffff806`5dd70000 fffff806`5dd95000   bowser     (deferred)             
fffff806`5dda0000 fffff806`5ddba000   mpsdrv     (deferred)             
fffff806`5ef50000 fffff806`5f017000   srv2       (deferred)             
fffff806`5f020000 fffff806`5f03c000   rassstp    (deferred)             
fffff806`5f040000 fffff806`5f05d000   NDProxy    (deferred)             
fffff806`5f060000 fffff806`5f088000   AgileVpn   (deferred)             
fffff806`5f090000 fffff806`5f0b1000   rasl2tp    (deferred)             
fffff806`5f0c0000 fffff806`5f0e1000   raspptp    (deferred)             
fffff806`5f0f0000 fffff806`5f10c000   raspppoe   (deferred)             
fffff806`5f110000 fffff806`5f11f000   ndistapi   (deferred)             
fffff806`5f120000 fffff806`5f15a000   ndiswan    (deferred)             
fffff806`5f160000 fffff806`5f176000   WdNisDrv   (deferred)             
fffff806`5f180000 fffff806`5f193000   condrv     (deferred)             

Unloaded modules:
fffff806`11fc0000 fffff806`11fdd000 EhStorClass.
fffff806`1a450000 fffff806`1a45f000 dump_storpor
fffff806`1a4a0000 fffff806`1a4d3000 dump_storahc
fffff806`1a500000 fffff806`1a51e000 dump_dumpfve
fffff806`19f10000 fffff806`19f2c000 dam.sys
fffff806`11bf0000 fffff806`11c01000 WdBoot.sys
fffff806`12ca0000 fffff806`12cb1000 hwpolicy.sys
DRIVER_OVERRAN_STACK_BUFFER (f7)
A driver has overrun a stack-based buffer.  This overrun could potentially
allow a malicious user to gain control of this machine.
DESCRIPTION
A driver overran a stack-based buffer (or local variable) in a way that would
have overwritten the function's return address and jumped back to an arbitrary
address when the function returned. This is the classic "buffer overrun"
hacking attack and the system has been brought down to prevent a malicious user
from gaining complete control of it.
Do a kb to get a stack backtrace -- the last routine on the stack before the
buffer overrun handlers and bugcheck call is the one that overran its local
variable(s).
Arguments:
Arg1: 0000220727db4a00, Actual security check cookie from the stack
Arg2: 00003545299193ee, Expected security check cookie
Arg3: ffffcabad66e6c11, Complement of the expected security check cookie
Arg4: 0000000000000000, zero

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4639

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 17081

Key : Analysis.Memory.CommitPeak.Mb
Value: 87

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: f7

BUGCHECK_P1: 220727db4a00

BUGCHECK_P2: 3545299193ee

BUGCHECK_P3: ffffcabad66e6c11

BUGCHECK_P4: 0

SECURITY_COOKIE: Expected 00003545299193ee found 0000220727db4a00

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
ffffda06`18c458b8 fffff801`3f2b0435 : 00000000`000000f7 00002207`27db4a00 00003545`299193ee ffffcaba`d66e6c11 : nt!KeBugCheckEx
ffffda06`18c458c0 fffff801`3f12a07f : ffffffff`ffffffff ffffda06`18c45a00 00000000`00005731 ffffffff`ffffffff : nt!_report_gsfailure+0x25
ffffda06`18c45900 fffff801`3f126e87 : 00000000`00000000 00001f80`0005005b 00000000`00160c26 00000000`00000002 : nt!PpmIdlePrepare+0x44f
ffffda06`18c45af0 fffff801`3f1f8d34 : ffffffff`00000000 ffff8280`4efe0340 ffffb989`4d7bc080 00000000`000006c0 : nt!PoIdle+0x1f7
ffffda06`18c45c60 00000000`00000000 : ffffda06`18c46000 ffffda06`18c40000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME: nt!_report_gsfailure+25

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.630

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 25

FAILURE_BUCKET_ID: 0xF7_MISSING_GSFRAME_nt!_report_gsfailure

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {82d2c1b5-b0cb-60a5-9a5d-78c8c4284f84}

Followup: MachineOwner
---------

APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ffd8348be24, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffff8b892014fb80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3531

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 13532

Key : Analysis.Memory.CommitPeak.Mb
Value: 76

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1

BUGCHECK_P1: 7ffd8348be24

BUGCHECK_P2: 0

BUGCHECK_P3: ffff

BUGCHECK_P4: ffff8b892014fb80

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: EpicGamesLauncher.exe

STACK_TEXT:
ffff8b89`2014f9b8 fffff801`68207169 : 00000000`00000001 00007ffd`8348be24 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffff8b89`2014f9c0 fffff801`68207033 : 00000230`d0799520 00000000`00000000 ffff8b89`2014fb18 ffffffff`fffe7960 : nt!KiBugCheckDispatch+0x69
ffff8b89`2014fb00 00007ffd`8348be24 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
000000f2`ae18f6a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`8348be24


SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.610

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1fe

FAILURE_BUCKET_ID: 0x1_SysCallNum_4_nt!KiSystemServiceExitPico

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {52cd694c-15ec-48c3-924a-3539560711db}

Followup: MachineOwner
---------

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff805460fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5077

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 9615

Key : Analysis.Memory.CommitPeak.Mb
Value: 84

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff805460fb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  ffff808eeea53720 -- (.trap 0xffff808eeea53720)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000006c781029 rbx=0000000000000000 rcx=ffff808eeea53918
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805456becd7 rsp=ffff808eeea538b0 rbp=0000000000000007
r8=fffff80541cfaac0 r9=0000000000000000 r10=fffff80541cfaac0
r11=00000003b539ebac r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KeYieldProcessorEx+0x17:
fffff805`456becd7 4883c420 add rsp,20h
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
ffff8180`a5ce8c88 fffff805`458873f6 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff805`460fb320 : nt!KeBugCheckEx
ffff8180`a5ce8c90 fffff805`4572c2cd : 000005a6`05dc149e ffff8180`a5ccf180 00000000`00000246 00000000`0001ac22 : nt!KeAccumulateTicks+0x15e346
ffff8180`a5ce8cf0 fffff805`4572c871 : 00000000`00018d00 00000000`0000ff2f ffff8180`a5ccf180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
ffff8180`a5ce8d40 fffff805`457266e3 : ffff8180`a5ccf180 00000000`00000000 fffff805`46031680 00000000`00000000 : nt!KiUpdateTime+0x4a1
ffff8180`a5ce8e80 fffff805`4572eff2 : ffff808e`eea53720 ffff808e`eea537a0 ffff808e`eea53700 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
ffff8180`a5ce8f30 fffff805`4562ecd5 : 00000003`fce1144f ffff9284`8b2c8ac0 ffff9284`8b2c8b70 ffffb086`d82d6ced : nt!HalpTimerClockInterrupt+0xe2
ffff8180`a5ce8f60 fffff805`457f6cba : ffff808e`eea537a0 ffff9284`8b2c8ac0 ffff808e`eea53b10 57182474`89481024 : nt!KiCallInterruptServiceRoutine+0xa5
ffff8180`a5ce8fb0 fffff805`457f7227 : ffff9284`907cc300 ffff808e`eea538a0 ffff9284`9644c180 fffff805`457f7234 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff808e`eea53720 fffff805`456becd7 : 00000000`00000010 00000000`00000282 ffff808e`eea538d8 00000000`00000018 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff808e`eea538b0 fffff805`456bf83c : ffff9284`9645f180 00000000`00000000 ffff808e`eea53b18 00000000`00000000 : nt!KeYieldProcessorEx+0x17
ffff808e`eea538e0 fffff805`456e4e29 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`0000ed66 : nt!KiProcessExpiredTimerList+0x32c
ffff808e`eea539d0 fffff805`457f8d7e : ffffffff`00000000 ffff8180`a5ccf180 ffff8180`a5cda340 ffff9284`9645d080 : nt!KiRetireDpcList+0x9d9
ffff808e`eea53c60 00000000`00000000 : ffff808e`eea54000 ffff808e`eea4e000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME: nt!KeAccumulateTicks+15e346

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.610

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 15e346

FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup: MachineOwner
---------
 
Tamamdır, değişimi yapıp sonuçları paylaşacağım.

Artık makineyi kırasım geliyor. Açar açmaz mavi ekran verdi yine. Bir de uzay montaj deneyeceğim. PSU’dan da olmadığına göre hangi parça yüksek ihtimalle bozuk? İşlemciyi söküp tekrar takacağım. Belki bacaklarından biri oturmadı. Taktığım PSU ekte. Arasında ağırlık farkı çok yüksek.

3E31D27F-1604-4525-81AF-F5EF0E89EE7E.jpeg
E00FC35F-87BD-4C99-A79B-1062DBB69302.jpeg
 
Son düzenleyen: Moderatör:
PSU değişimi sonrası da sorun devam ediyor. Anakart ya da işlemci sorunu olması muhtemel bu durumda.


Sistemi uzay montaj olarak kurdum. Şu anda hata almıyorum ve kurduğum sistemden yazıyorum. İşlemciyi söküp yeniden taktım ve elimde fazladan bulunan 3600X soğutucusu ile değiştirdim. Yalnız bir şey dikkatimi çekti, sistemin ilk montajını yaptığımda sistem ilk defa başlatılırken "New CPU installed" uyarısı vermemişti. Ancak demin sistemi açtığımda karşıma çıkan ilk uyarı "New CPU installed" uyarısı oldu. Sanırım yonga seti ile işlemci stabil bir şekilde iletişim kuramıyordu. Umarım tekrar hata almam. Birkaç gün sonra hata vermediği taktirde çözüldü olarak işaretleyeceğim. Recep ve Bora Hocam yardımlarınız için çok teşekkür ederim. Hakkınızı helal edin 😉
 
Son düzenleyen: Moderatör:
Durum
Mesaj gönderimine kapalı.

Technopat Haberler

Yeni konular

Geri
Yukarı