DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff806106fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding this single DPC timeout
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8155
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 54854
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 0
BUGCHECK_P2: 501
BUGCHECK_P3: 500
BUGCHECK_P4: fffff806106fb320
DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED
TRAP_FRAME: fffff80614a6bff0 -- (.trap 0xfffff80614a6bff0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000000a rbx=0000000000000000 rcx=fffff80614a6c204
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8060fcbecd7 rsp=fffff80614a6c180 rbp=fffff80614a6c219
r8=0000000000000000 r9=fffff80614a6c210 r10=0000000000000fff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KeYieldProcessorEx+0x17:
fffff806`0fcbecd7 4883c420 add rsp,20h
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff806`14a7ae18 fffff806`0fe87372 : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
fffff806`14a7ae20 fffff806`0fd26853 : 0000006c`393e7a38 fffff806`0ca5b180 00000000`00000000 fffff806`0ca5b180 : nt!KeAccumulateTicks+0x15e2c2
fffff806`14a7ae80 fffff806`0fd2633a : fffff806`106f38c0 fffff806`14a6c070 fffff806`133b3c00 00000000`0000a301 : nt!KeClockInterruptNotify+0x453
fffff806`14a7af30 fffff806`0fc2ecd5 : fffff806`106f38c0 fffff806`14a7af40 00000000`0000000c ffffe65c`495d07b4 : nt!HalpTimerClockIpiRoutine+0x1a
fffff806`14a7af60 fffff806`0fdf6cba : fffff806`14a6c070 fffff806`106f38c0 ffffba81`473df180 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff806`14a7afb0 fffff806`0fdf7227 : 00000000`00000002 fffff806`0fcc5826 fffff806`0ca5b180 fffff806`0fdf7234 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff806`14a6bff0 fffff806`0fcbecd7 : ffffffff`ffffffd2 fffff806`0ff19472 00000000`00000010 00000000`00000286 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff806`14a6c180 fffff806`0ff1946e : 00000000`00b81018 00000000`00000000 ffff8602`00000020 fffff806`14a6c1e0 : nt!KeYieldProcessorEx+0x17
fffff806`14a6c1b0 fffff806`0fe67082 : fffff806`0ca5b180 fffff806`1ea4e000 ffff8602`00000004 fffff806`14a6c2bc : nt!KiHeteroChooseTargetProcessor+0x55e
fffff806`14a6c280 fffff806`0fcc5001 : fffff806`14a6c4b0 ffff8602`bf69b000 00000000`00000000 fffff806`1e91ae45 : nt!KiDeferredReadySingleThread+0x1a1dc2
fffff806`14a6c470 fffff806`0fcc4a8a : 00000000`00000000 fffff806`00000000 ffff8602`c1104180 00000000`00000000 : nt!KiExitDispatcher+0x141
fffff806`14a6c4e0 fffff806`1f052e29 : ffff8602`00000001 00000000`00002148 ffff8602`bf69b000 ffff8602`c1099640 : nt!KeSetEvent+0xea
fffff806`14a6c570 ffff8602`00000001 : 00000000`00002148 ffff8602`bf69b000 ffff8602`c1099640 ffff8d40`a2e4da6d : nvlddmkm+0x842e29
fffff806`14a6c578 00000000`00002148 : ffff8602`bf69b000 ffff8602`c1099640 ffff8d40`a2e4da6d fffff806`1e90bffe : 0xffff8602`00000001
fffff806`14a6c580 ffff8602`bf69b000 : ffff8602`c1099640 ffff8d40`a2e4da6d fffff806`1e90bffe ffff8602`bf69b000 : 0x2148
fffff806`14a6c588 ffff8602`c1099640 : ffff8d40`a2e4da6d fffff806`1e90bffe ffff8602`bf69b000 fffff806`1e90c05e : 0xffff8602`bf69b000
fffff806`14a6c590 ffff8d40`a2e4da6d : fffff806`1e90bffe ffff8602`bf69b000 fffff806`1e90c05e ffff8602`bf69b000 : 0xffff8602`c1099640
fffff806`14a6c598 fffff806`1e90bffe : ffff8602`bf69b000 fffff806`1e90c05e ffff8602`bf69b000 fffff806`1bdd40e3 : 0xffff8d40`a2e4da6d
fffff806`14a6c5a0 ffff8602`bf69b000 : fffff806`1e90c05e ffff8602`bf69b000 fffff806`1bdd40e3 ffff8602`bf6a6410 : nvlddmkm+0xfbffe
fffff806`14a6c5a8 fffff806`1e90c05e : ffff8602`bf69b000 fffff806`1bdd40e3 ffff8602`bf6a6410 00000000`00000000 : 0xffff8602`bf69b000
fffff806`14a6c5b0 ffff8602`bf69b000 : fffff806`1bdd40e3 ffff8602`bf6a6410 00000000`00000000 00000000`00000000 : nvlddmkm+0xfc05e
fffff806`14a6c5b8 fffff806`1bdd40e3 : ffff8602`bf6a6410 00000000`00000000 00000000`00000000 fffff806`1f0533c5 : 0xffff8602`bf69b000
fffff806`14a6c5c0 fffff806`1bddbca1 : 00000000`00000000 00000000`00002148 00000000`00002148 00000000`00000000 : amdppm!GetCpcDifferentialFeedback+0x33
fffff806`14a6c5f0 ffff8602`c4d5d010 : ffff8602`bf077000 ffff8602`c1103000 00000011`b9c4b1a0 ffffe65c`495c6ea4 : amdppm!PerfReadWrappingCounter+0x41
fffff806`14a6c640 ffff8602`bf077000 : ffff8602`c1103000 00000011`b9c4b1a0 ffffe65c`495c6ea4 ffffba81`47d38ab0 : 0xffff8602`c4d5d010
fffff806`14a6c648 ffff8602`c1103000 : 00000011`b9c4b1a0 ffffe65c`495c6ea4 ffffba81`47d38ab0 ffff8602`bf0a66e8 : 0xffff8602`bf077000
fffff806`14a6c650 00000011`b9c4b1a0 : ffffe65c`495c6ea4 ffffba81`47d38ab0 ffff8602`bf0a66e8 ffff8602`bf082ba8 : 0xffff8602`c1103000
fffff806`14a6c658 ffffe65c`495c6ea4 : ffffba81`47d38ab0 ffff8602`bf0a66e8 ffff8602`bf082ba8 ffffba81`485e9000 : 0x00000011`b9c4b1a0
fffff806`14a6c660 ffffba81`47d38ab0 : ffff8602`bf0a66e8 ffff8602`bf082ba8 ffffba81`485e9000 00000000`00000000 : 0xffffe65c`495c6ea4
fffff806`14a6c668 ffff8602`bf0a66e8 : ffff8602`bf082ba8 ffffba81`485e9000 00000000`00000000 00000000`00000000 : 0xffffba81`47d38ab0
fffff806`14a6c670 ffff8602`bf082ba8 : ffffba81`485e9000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffff8602`bf0a66e8
fffff806`14a6c678 ffffba81`485e9000 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff806`1f03c13e : 0xffff8602`bf082ba8
fffff806`14a6c680 00000000`00000000 : 00000000`00000000 00000000`00000000 fffff806`1f03c13e 00000000`0000178f : 0xffffba81`485e9000
SYMBOL_NAME: nvlddmkm+842e29
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 842e29
FAILURE_BUCKET_ID: 0x133_DPC_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {15c3af0e-5564-7a80-2e26-65b5115ecc4d}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000900, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000040, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80714729d94, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5514
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7566
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 900
BUGCHECK_P2: ff
BUGCHECK_P3: 40
BUGCHECK_P4: fffff80714729d94
READ_ADDRESS: fffff807150fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8071500f340: Unable to get Flags value from nt!KdVersionBlock
fffff8071500f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000900
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffb006b2245770 -- (.trap 0xffffb006b2245770)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000045fee5c5 rbx=0000000000000000 rcx=0000000000000001
rdx=00000000000000f6 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80714729d94 rsp=ffffb006b2245900 rbp=ffffb006b2245a00
r8=8000000000000000 r9=ffffb006b2245b50 r10=0000fffff8071476
r11=000000004622916e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!PpmIdlePrepare+0x164:
fffff807`14729d94 488903 mov qword ptr [rbx],rax ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffb006`b2245628 fffff807`14807169 : 00000000`0000000a 00000000`00000900 00000000`000000ff 00000000`00000040 : nt!KeBugCheckEx
ffffb006`b2245630 fffff807`14803469 : 00000000`00000000 00000000`00000000 00000000`00000010 ffffb389`ea3706c0 : nt!KiBugCheckDispatch+0x69
ffffb006`b2245770 fffff807`14729d94 : ffffb389`effd3010 00000000`00989680 00000000`00000000 00000000`0001fefc : nt!KiPageFault+0x469
ffffb006`b2245900 fffff807`14726e87 : 00000000`00000000 00001f80`0065005b 00000000`00000003 00000000`00000002 : nt!PpmIdlePrepare+0x164
ffffb006`b2245af0 fffff807`147f8d34 : ffffffff`00000000 ffffe300`4b9e0340 ffffb389`f40dc080 00000000`00000900 : nt!PoIdle+0x1f7
ffffb006`b2245c60 00000000`00000000 : ffffb006`b2246000 ffffb006`b2240000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME: nt!PpmIdlePrepare+164
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 164
FAILURE_BUCKET_ID: AV_nt!PpmIdlePrepare
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dd7d0096-4602-c4e5-a984-978d6ab3aa71}
Followup: MachineOwner
---------
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ff945b8be24, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffffe18e827b8b80, Call type (0 - system call, 1 - worker routine)
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3765
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6402
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1
BUGCHECK_P1: 7ff945b8be24
BUGCHECK_P2: 0
BUGCHECK_P3: ffff
BUGCHECK_P4: ffffe18e827b8b80
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicGamesLauncher.exe
STACK_TEXT:
ffffe18e`827b89b8 fffff804`22407169 : 00000000`00000001 00007ff9`45b8be24 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffffe18e`827b89c0 fffff804`22407033 : 00000232`3bce9640 ffffa30b`34481160 ffffe18e`827b8b18 ffffffff`fffe7960 : nt!KiBugCheckDispatch+0x69
ffffe18e`827b8b00 00007ff9`45b8be24 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
000000a9`925af978 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`45b8be24
SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1fe
FAILURE_BUCKET_ID: 0x1_SysCallNum_4_nt!KiSystemServiceExitPico
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {52cd694c-15ec-48c3-924a-3539560711db}
Followup: MachineOwner
---------
6: kd> !apc
*** Enumerating APCs in all processes
Process ffffa30b2888c040
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8057ea12281, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffff8c8f00000009, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5015
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 15519
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8057ea12281
BUGCHECK_P3: 0
BUGCHECK_P4: ffff8c8f00000009
READ_ADDRESS: fffff8057f4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8057f40f340: Unable to get Flags value from nt!KdVersionBlock
fffff8057f40f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff8c8f00000009
EXCEPTION_PARAMETER2: ffff8c8f00000009
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
BAD_STACK_POINTER: ffffa0019f863158
STACK_TEXT:
ffffa001`9f863158 fffff805`7ecf451e : 00000000`0000001e ffffffff`c0000005 fffff805`7ea12281 00000000`00000000 : nt!KeBugCheckEx
ffffa001`9f863160 fffff805`7ebfe0d2 : fffff805`7ecf44fc 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffffa001`9f8631a0 fffff805`7ea52db7 : ffffa001`9f863710 00000000`00000000 ffffe201`ef86fc60 fffff805`7ebf8d7e : nt!RtlpExecuteHandlerForException+0x12
ffffa001`9f8631d0 fffff805`7ea519a6 : ffffe201`ef86f728 ffffa001`9f863e20 ffffe201`ef86f728 fffff805`7c512428 : nt!RtlDispatchException+0x297
ffffa001`9f8638f0 fffff805`7ebf60a2 : 0020002e`00730025 00740061`00740053 0020003a`00730075 cccc0000`00780025 : nt!KiDispatchException+0x186
ffffa001`9f863fb0 fffff805`7ebf6070 : fffff805`7ec072a5 ffff8c8f`00000009 ffffe201`ef86f6f0 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffe201`ef86f5e8 fffff805`7ec072a5 : ffff8c8f`00000009 ffffe201`ef86f6f0 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffe201`ef86f5f0 fffff805`7ec03443 : 00000000`00000000 00000000`00989680 00000000`00000002 00000000`00000000 : nt!KiExceptionDispatch+0x125
ffffe201`ef86f7d0 fffff805`7ea12281 : ffff8c8f`8cc0e010 00000006`94efb754 ffffffff`00000001 ffff8c8f`8cc0e1f8 : nt!KiPageFault+0x443
ffffe201`ef86f960 fffff805`7eae4dee : 00000000`00000000 00000000`00000000 00000000`00140001 ffffe201`ef86fa50 : nt!KiRemoveEntryTimer+0x51
ffffe201`ef86f9d0 fffff805`7ebf8d7e : ffffffff`00000000 ffffa001`9f843180 ffffa001`9f84e340 ffff8c8f`92551080 : nt!KiRetireDpcList+0x99e
ffffe201`ef86fc60 00000000`00000000 : ffffe201`ef870000 ffffe201`ef86a000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiRemoveEntryTimer+51
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 51
FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_nt!KiRemoveEntryTimer
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4cc51259-b7cc-b242-ba85-41b7336e1769}
Followup: MachineOwner
---------
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ff82454be24, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffff9c039375bb80, Call type (0 - system call, 1 - worker routine)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3358
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 12511
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1
BUGCHECK_P1: 7ff82454be24
BUGCHECK_P2: 0
BUGCHECK_P3: ffff
BUGCHECK_P4: ffff9c039375bb80
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicGamesLauncher.exe
STACK_TEXT:
ffff9c03`9375b9b8 fffff802`35007169 : 00000000`00000001 00007ff8`2454be24 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffff9c03`9375b9c0 fffff802`35007033 : ffffa107`08196080 00000000`00000000 ffff9c03`9375bb18 ffffffff`fffe7960 : nt!KiBugCheckDispatch+0x69
ffff9c03`9375bb00 00007ff8`2454be24 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
0000002b`44c9fbe8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`2454be24
SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1fe
FAILURE_BUCKET_ID: 0x1_SysCallNum_4_nt!KiSystemServiceExitPico
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {52cd694c-15ec-48c3-924a-3539560711db}
Followup: MachineOwner
---------
7: kd> !apc
*** Enumerating APCs in all processes
Process ffffa10705a8e040
KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffffc906a89ef040, The address of the thread.
Arg2: ffffc906a9143160, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5468
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 16308
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 192
BUGCHECK_P1: ffffc906a89ef040
BUGCHECK_P2: ffffc906a9143160
BUGCHECK_P3: 0
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
fffff408`87c2fed8 fffff801`212dac9f : 00000000`00000192 ffffc906`a89ef040 ffffc906`a9143160 00000000`00000000 : nt!KeBugCheckEx
fffff408`87c2fee0 fffff801`1da461cd : ffffc906`b2349520 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ExAcquireCacheAwarePushLockSharedEx+0x14f
fffff408`87c2ff20 fffff801`1da42801 : 00000000`00000000 fffff408`87c300ff fffff408`87c30100 ffffc906`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0x4ad
fffff408`87c30040 fffff801`21331c17 : fffff408`87c31000 00000000`00000000 fffff408`87c2b000 00000000`00000000 : FLTMGR!FltpPreFsFilterOperation+0x181
fffff408`87c300f0 fffff801`216ffd31 : fffff801`1da48a20 00000000`00000001 00000000`00000000 fffff801`1da42680 : nt!FsFilterPerformCallbacks+0xe7
fffff408`87c30160 fffff801`216ff99b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!FsRtlAcquireFileExclusiveCommon+0x121
fffff408`87c30450 fffff801`216ff877 : 00000000`00000000 00000000`00000002 00000000`00000001 fffff408`87c30808 : nt!FsRtlAcquireToCreateMappedSection+0x5b
fffff408`87c304d0 fffff801`216ff57d : ffffc906`00000000 ffffc906`00000000 fffff801`1da48a00 00000000`00000000 : nt!MiCallCreateSectionFilters+0x37
fffff408`87c30510 fffff801`216fed64 : 00000000`00000000 00000000`00000000 ffffc906`b4d8b580 00000000`00000000 : nt!MiCreateImageOrDataSection+0x13d
fffff408`87c30600 fffff801`216feb47 : 00000000`11000000 fffff408`87c309b1 00000000`00000000 00000000`00000002 : nt!MiCreateSection+0xf4
fffff408`87c30780 fffff801`216fe92c : fffff408`87c30910 fffff801`00000005 fffff408`87c30960 ffffc906`a7014cc0 : nt!MiCreateSectionCommon+0x207
fffff408`87c30860 fffff801`21707d88 : 00000000`00000000 00000000`00000000 fffff408`87c309b1 00000000`00000000 : nt!NtCreateSection+0x5c
fffff408`87c308d0 fffff801`217078b5 : 00000000`0000006c fffff408`87c30b00 ffffa60c`ed87541a ffffa60c`00000000 : nt!PfSnGetSectionObject+0x250
fffff408`87c30a00 fffff801`213034b5 : ffffc906`a89ef040 ffffc906`a89ef040 ffffc906`a6b24b30 00000000`00000000 : nt!PfSnPopulateReadList+0x2b5
fffff408`87c30b70 fffff801`212a29a5 : ffffc906`a89ef040 00000000`00000080 ffffc906`a6aaa040 00000000`00000000 : nt!ExpWorkerThread+0x105
fffff408`87c30c10 fffff801`213fc868 : ffff8800`add25180 ffffc906`a89ef040 fffff801`212a2950 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff408`87c30c60 00000000`00000000 : fffff408`87c31000 fffff408`87c2b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!ExAcquireCacheAwarePushLockSharedEx+14f
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 14f
FAILURE_BUCKET_ID: 0x192_nt!ExAcquireCacheAwarePushLockSharedEx
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0b3e94d6-ae37-4afe-1a69-72779fd6e91e}
Followup: MachineOwner
---------
RESOURCE_NOT_OWNED (e3)
A thread tried to release a resource it did not own.
Arguments:
Arg1: ffffa606af9c7b90, Address of resource
Arg2: ffffa606acd130c0, Address of thread
Arg3: 0000000000000000, Address of owner table if there is one
Arg4: 0000000000000002
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4577
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 47733
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: e3
BUGCHECK_P1: ffffa606af9c7b90
BUGCHECK_P2: ffffa606acd130c0
BUGCHECK_P3: 0
BUGCHECK_P4: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
fffffb89`fa799eb8 fffff802`4b66d5af : 00000000`000000e3 ffffa606`af9c7b90 ffffa606`acd130c0 00000000`00000000 : nt!KeBugCheckEx
fffffb89`fa799ec0 fffff802`4b4dbc43 : 00000000`00000000 00000000`00000000 ffffa606`acd130c0 00000000`00000000 : nt!ExpReleaseResourceSharedForThreadLite+0x19188f
fffffb89`fa799f80 fffff802`4b8e71bf : ffffa606`ad2718a0 00000000`00000000 ffffce08`63f03dc0 ffffce08`574246d0 : nt!ExReleaseResourceLite+0xf3
fffffb89`fa799fe0 fffff802`4b8e97d6 : 00000000`00000000 fffffb89`fa79a230 fffffb89`fa79a940 00000000`00000000 : nt!CmpCheckOpenAccessOnKeyBody+0x31f
fffffb89`fa79a0d0 fffff802`4b8e82e3 : ffffce08`0000001c fffffb89`fa79a420 fffffb89`fa79a3d8 ffffa606`ad2718a0 : nt!CmpDoParseKey+0x626
fffffb89`fa79a370 fffff802`4b8ec3ae : fffff802`4b8e8001 00000000`00000000 ffffa606`ad2718a0 fffff802`4b4dc901 : nt!CmpParseKey+0x2c3
fffffb89`fa79a510 fffff802`4b8f566a : ffffa606`ad271800 fffffb89`fa79a778 ffffa606`00000040 ffffa606`a2ac3980 : nt!ObpLookupObjectName+0x3fe
fffffb89`fa79a6e0 fffff802`4b8f544c : ffffce08`00000000 00000000`00000000 00000000`00000000 ffffa606`a2ac3980 : nt!ObOpenObjectByNameEx+0x1fa
fffffb89`fa79a810 fffff802`4b8f4f71 : 00000051`02bfc488 fffffb89`fa79ab80 00000000`00000001 00007ffe`55a640e8 : nt!ObOpenObjectByName+0x5c
fffffb89`fa79a860 fffff802`4b8f4c9f : 00000000`00000fbc 00000000`00000000 00007ffe`55a7fef0 00007ffe`55a63eb8 : nt!CmOpenKey+0x2c1
fffffb89`fa79aac0 fffff802`4b606bb8 : ffffa606`acd13000 0000018f`b2dc0000 fffffb89`fa79ab80 ffffa606`acb47240 : nt!NtOpenKeyEx+0xf
fffffb89`fa79ab00 00007ffe`5af6e194 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000051`02bfc408 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`5af6e194
SYMBOL_NAME: nt!ExpReleaseResourceSharedForThreadLite+19188f
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 19188f
FAILURE_BUCKET_ID: 0xE3_nt!ExpReleaseResourceSharedForThreadLite
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {321aa310-6654-009f-ad13-07c9b7115742}
Followup: MachineOwner
---------
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000000000, page frame number
Arg3: 0000000000000000, current page state
Arg4: 0000000000000003, 0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3577
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8412
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 4e
BUGCHECK_P1: 99
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 3
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicGamesLauncher.exe
STACK_TEXT:
ffff9108`730ded88 fffff807`5ffed1e7 : 00000000`0000004e 00000000`00000099 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffff9108`730ded90 fffff807`5ff4a172 : 00000000`003c0cd5 fffff807`60850c00 1a000003`00000001 fffff807`000000d5 : nt!MiBadShareCount+0x5b
ffff9108`730dedd0 fffff807`5ff4a91e : 00000000`00000000 ffff9108`730df2f0 ffffc663`318fff00 ffff9108`730df360 : nt!MiDeletePteRun+0x17c2
ffff9108`730defe0 fffff807`5fee9a1d : 00000000`00000002 ffffb38a`3bdd1700 ffff9108`730df2f0 ffffc663`318ffef8 : nt!MiDeleteVaTail+0x6e
ffff9108`730df010 fffff807`5fee963b : ffffc663`318ff000 ffffb38a`3bdd1700 ffff9108`00000002 ffff9108`730df360 : nt!MiWalkPageTablesRecursively+0xc6d
ffff9108`730df0b0 fffff807`5fed859b : ffff9108`730df1c8 ffffb38a`3bdd1700 ffff9108`00000003 ffff9108`730df370 : nt!MiWalkPageTablesRecursively+0x88b
ffff9108`730df150 fffff807`5ff4b541 : ffff9108`730df2f0 ffffb38a`00000000 ffffffff`00000002 ffffc663`00000000 : nt!MiWalkPageTables+0x36b
ffff9108`730df250 fffff807`5ff229a0 : 00000000`00000001 ffff9108`00000000 ffffb38a`3bdd1550 ffffb38a`3c378080 : nt!MiDeletePagablePteRange+0x4f1
ffff9108`730df560 fffff807`60304aa9 : ffffb38a`3c2550c0 00000000`00000000 ffffb38a`00000000 ffffb38a`00000000 : nt!MiDeleteVad+0x360
ffff9108`730df670 fffff807`60303908 : ffffb38a`3c2550c0 ffffb38a`3aee5c20 ffffb38a`3c378080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff9108`730df6a0 fffff807`603027af : ffffb38a`3bd100e0 ffffb38a`3bd100e0 ffffb38a`3c2550c0 ffffb38a`3bdd1080 : nt!MiCleanVad+0x30
ffff9108`730df6d0 fffff807`601f164f : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffb38a`3bdd1080 : nt!MmCleanProcessAddressSpace+0x137
ffff9108`730df750 fffff807`601e6f96 : ffffb38a`3bdd1080 ffff8001`b4b4d060 ffff9108`730df990 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffff9108`730df7d0 fffff807`6027a978 : 00000000`c0000005 00000000`00000001 ffff9108`730df9e0 000000a3`f07f4000 : nt!PspExitThread+0x5f6
ffff9108`730df8d0 fffff807`5fee25c7 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff807`5feec806 : nt!KiSchedulerApcTerminate+0x38
ffff9108`730df910 fffff807`5fff97b0 : 00000000`00000000 ffff9108`730df9c0 ffff9108`730dfb80 000001b1`00000000 : nt!KiDeliverApc+0x487
ffff9108`730df9c0 fffff807`60006c5f : ffffb38a`3c378080 ffffb38a`3c7b8760 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffff9108`730dfb00 00007ff9`b600be24 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000a3`f93cfa38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`b600be24
SYMBOL_NAME: nt!MiBadShareCount+5b
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 5b
FAILURE_BUCKET_ID: 0x4E_99_nt!MiBadShareCount
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {60e553e9-e4c5-ed08-9be6-c353e0011003}
Followup: MachineOwner
---------
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ffe8f32bfc4, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: fffffd0f7281bb80, Call type (0 - system call, 1 - worker routine)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3437
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 11122
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1
BUGCHECK_P1: 7ffe8f32bfc4
BUGCHECK_P2: 0
BUGCHECK_P3: ffff
BUGCHECK_P4: fffffd0f7281bb80
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Illustrator.exe
STACK_TEXT:
fffffd0f`7281b948 fffff806`0d207169 : 00000000`00000001 00007ffe`8f32bfc4 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
fffffd0f`7281b950 fffff806`0d207033 : 00000000`00000000 000000c5`a6aff650 000000c5`a6aff660 00000000`00000018 : nt!KiBugCheckDispatch+0x69
fffffd0f`7281ba90 00007ffe`8f32bfc4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
000000c5`a6aff618 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`8f32bfc4
SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1fe
FAILURE_BUCKET_ID: 0x1_SysCallNum_11_nt!KiSystemServiceExitPico
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {514ee3f4-4c84-d755-6331-e284451fb4fa}
Followup: MachineOwner
---------
3: kd> lm
start end module name
ffffb6cb`91400000 ffffb6cb`916de000 win32kbase (deferred)
ffffb6cb`916e0000 ffffb6cb`91a96000 win32kfull (deferred)
ffffb6cb`91aa0000 ffffb6cb`91ae8000 cdd (deferred)
ffffb6cb`921b0000 ffffb6cb`9224a000 win32k # (pdb symbols) C:\ProgramData\Dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
fffff806`0bef0000 fffff806`0bf18000 mcupdate_AuthenticAMD (deferred)
fffff806`0bf20000 fffff806`0bf26000 hal (deferred)
fffff806`0bf30000 fffff806`0bf3b000 kd (deferred)
fffff806`0bf40000 fffff806`0bf67000 tm (deferred)
fffff806`0bf70000 fffff806`0bfda000 CLFS (deferred)
fffff806`0bfe0000 fffff806`0bffa000 PSHED (deferred)
fffff806`0c000000 fffff806`0c00b000 BOOTVID (deferred)
fffff806`0c010000 fffff806`0c123000 clipsp (deferred)
fffff806`0c130000 fffff806`0c19f000 FLTMGR (deferred)
fffff806`0c1a0000 fffff806`0c1c9000 ksecdd (deferred)
fffff806`0c1d0000 fffff806`0c232000 msrpc (deferred)
fffff806`0c240000 fffff806`0c24e000 cmimcext (deferred)
fffff806`0c250000 fffff806`0c261000 werkernel (deferred)
fffff806`0c270000 fffff806`0c27c000 ntosext (deferred)
fffff806`0c280000 fffff806`0c293000 WDFLDR (deferred)
fffff806`0c2a0000 fffff806`0c2af000 SleepStudyHelper (deferred)
fffff806`0c2b0000 fffff806`0c2c1000 WppRecorder (deferred)
fffff806`0c2d0000 fffff806`0c2ea000 SgrmAgent (deferred)
fffff806`0ce00000 fffff806`0de46000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\030B757AB63151439866794BAD755AE11\ntkrnlmp.pdb
fffff806`11800000 fffff806`118e3000 CI (deferred)
fffff806`118f0000 fffff806`119a7000 cng (deferred)
fffff806`119b0000 fffff806`11a81000 Wdf01000 (deferred)
fffff806`11a90000 fffff806`11ab6000 acpiex (deferred)
fffff806`11ac0000 fffff806`11b0b000 mssecflt (deferred)
fffff806`11b10000 fffff806`11bdc000 ACPI (deferred)
fffff806`11be0000 fffff806`11bec000 WMILIB (deferred)
fffff806`11c10000 fffff806`11c7b000 intelpep (deferred)
fffff806`11c80000 fffff806`11c97000 WindowsTrustedRT (deferred)
fffff806`11ca0000 fffff806`11cab000 IntelTA (deferred)
fffff806`11cb0000 fffff806`11cbb000 WindowsTrustedRTProxy (deferred)
fffff806`11cc0000 fffff806`11cd4000 pcw (deferred)
fffff806`11ce0000 fffff806`11ceb000 msisadrv (deferred)
fffff806`11cf0000 fffff806`11d68000 pci (deferred)
fffff806`11d70000 fffff806`11d85000 vdrvroot (deferred)
fffff806`11d90000 fffff806`11dbf000 pdc (deferred)
fffff806`11dc0000 fffff806`11dd9000 CEA (deferred)
fffff806`11de0000 fffff806`11e11000 partmgr (deferred)
fffff806`11e20000 fffff806`11eca000 spaceport (deferred)
fffff806`11ed0000 fffff806`11ee9000 volmgr (deferred)
fffff806`11ef0000 fffff806`11f53000 volmgrx (deferred)
fffff806`11f60000 fffff806`11f7e000 mountmgr (deferred)
fffff806`11f80000 fffff806`11fb2000 storahci (deferred)
fffff806`11fe0000 fffff806`11ffa000 fileinfo (deferred)
fffff806`12000000 fffff806`120b0000 storport (deferred)
fffff806`120c0000 fffff806`12100000 Wof (deferred)
fffff806`12110000 fffff806`1217c000 WdFilter (deferred)
fffff806`12180000 fffff806`12459000 Ntfs (deferred)
fffff806`12460000 fffff806`1246d000 Fs_Rec (deferred)
fffff806`12470000 fffff806`125df000 ndis (deferred)
fffff806`125e0000 fffff806`12678000 NETIO (deferred)
fffff806`12680000 fffff806`126b2000 ksecpkg (deferred)
fffff806`126c0000 fffff806`126e1000 amdpsp (deferred)
fffff806`126f0000 fffff806`129da000 tcpip (deferred)
fffff806`129e0000 fffff806`12a5f000 fwpkclnt (deferred)
fffff806`12a60000 fffff806`12a90000 wfplwfs (deferred)
fffff806`12aa0000 fffff806`12b68000 fvevol (deferred)
fffff806`12b70000 fffff806`12b7b000 volume (deferred)
fffff806`12b80000 fffff806`12bed000 volsnap (deferred)
fffff806`12bf0000 fffff806`12c40000 rdyboost (deferred)
fffff806`12c50000 fffff806`12c76000 mup (deferred)
fffff806`12c80000 fffff806`12c92000 iorate (deferred)
fffff806`12cc0000 fffff806`12cdc000 disk (deferred)
fffff806`12ce0000 fffff806`12d4c000 CLASSPNP (deferred)
fffff806`19600000 fffff806`199a3000 dxgkrnl (deferred)
fffff806`199b0000 fffff806`199c8000 watchdog (deferred)
fffff806`199d0000 fffff806`199e6000 BasicDisplay (deferred)
fffff806`199f0000 fffff806`19a01000 BasicRender (deferred)
fffff806`19a10000 fffff806`19a2c000 Npfs (deferred)
fffff806`19a30000 fffff806`19a41000 Msfs (deferred)
fffff806`19a50000 fffff806`19a6b000 CimFS (deferred)
fffff806`19a70000 fffff806`19a92000 tdx (deferred)
fffff806`19aa0000 fffff806`19ab0000 TDI (deferred)
fffff806`19ac0000 fffff806`19b1c000 netbt (deferred)
fffff806`19b20000 fffff806`19b33000 afunix (deferred)
fffff806`19b40000 fffff806`19be3000 afd (deferred)
fffff806`19bf0000 fffff806`19c0a000 vwififlt (deferred)
fffff806`19c10000 fffff806`19c3b000 pacer (deferred)
fffff806`19c40000 fffff806`19c54000 ndiscap (deferred)
fffff806`19c60000 fffff806`19c74000 netbios (deferred)
fffff806`19c80000 fffff806`19d21000 Vid (deferred)
fffff806`19d30000 fffff806`19d51000 winhvr (deferred)
fffff806`19d60000 fffff806`19ddb000 rdbss (deferred)
fffff806`19de0000 fffff806`19e74000 csc (deferred)
fffff806`19e80000 fffff806`19e92000 nsiproxy (deferred)
fffff806`19ea0000 fffff806`19eae000 npsvctrig (deferred)
fffff806`19eb0000 fffff806`19ec0000 mssmbios (deferred)
fffff806`19ed0000 fffff806`19eda000 gpuenergydrv (deferred)
fffff806`19ee0000 fffff806`19f0c000 dfsc (deferred)
fffff806`19f30000 fffff806`19f9c000 fastfat (deferred)
fffff806`19fa0000 fffff806`19fb7000 bam (deferred)
fffff806`19fc0000 fffff806`1a00e000 ahcache (deferred)
fffff806`1a010000 fffff806`1a022000 CompositeBus (deferred)
fffff806`1a030000 fffff806`1a03d000 kdnic (deferred)
fffff806`1a040000 fffff806`1a055000 umbus (deferred)
fffff806`1a060000 fffff806`1a0f8000 USBXHCI (deferred)
fffff806`1a100000 fffff806`1a144000 ucx01000 (deferred)
fffff806`1a150000 fffff806`1a237000 rt640x64 (deferred)
fffff806`1a240000 fffff806`1a2c0000 cldflt (deferred)
fffff806`1a2d0000 fffff806`1a2e8000 mslldp (deferred)
fffff806`1a2f0000 fffff806`1a30b000 rspndr (deferred)
fffff806`1a310000 fffff806`1a32d000 wanarp (deferred)
fffff806`1a330000 fffff806`1a386000 msquic (deferred)
fffff806`1a420000 fffff806`1a43e000 crashdmp (deferred)
fffff806`1a440000 fffff806`1a516000 peauth (deferred)
fffff806`1a520000 fffff806`1a550000 cdrom (deferred)
fffff806`1a560000 fffff806`1a575000 filecrypt (deferred)
fffff806`1a580000 fffff806`1a58e000 tbs (deferred)
fffff806`1a590000 fffff806`1a59a000 Null (deferred)
fffff806`1a5a0000 fffff806`1a5aa000 Beep (deferred)
fffff806`1c800000 fffff806`1c866000 portcls (deferred)
fffff806`1c870000 fffff806`1c891000 drmk (deferred)
fffff806`1c8a0000 fffff806`1c916000 ks (deferred)
fffff806`1c920000 fffff806`1c9ce000 UcmCxUcsiNvppc (deferred)
fffff806`1c9d0000 fffff806`1c9fc000 UcmCx (deferred)
fffff806`1ca00000 fffff806`1ca0a000 AMDPCIDev (deferred)
fffff806`1ca10000 fffff806`1ca2c000 serial (deferred)
fffff806`1ca30000 fffff806`1ca3f000 serenum (deferred)
fffff806`1ca40000 fffff806`1ca4d000 amdgpio2 (deferred)
fffff806`1ca50000 fffff806`1ca82000 msgpioclx (deferred)
fffff806`1ca90000 fffff806`1ca9c000 wmiacpi (deferred)
fffff806`1caa0000 fffff806`1cadb000 amdppm (deferred)
fffff806`1cae0000 fffff806`1caea000 amdgpio3 (deferred)
fffff806`1caf0000 fffff806`1cafe000 UEFI (deferred)
fffff806`1cb00000 fffff806`1cb11000 nvvad64v (deferred)
fffff806`1cb20000 fffff806`1cb2f000 ksthunk (deferred)
fffff806`1cb30000 fffff806`1cb3d000 NvModuleTracker (deferred)
fffff806`1cb40000 fffff806`1cb50000 nvvhci (deferred)
fffff806`1cb60000 fffff806`1cb6d000 NdisVirtualBus (deferred)
fffff806`1cb70000 fffff806`1cb7c000 swenum (deferred)
fffff806`1cb80000 fffff806`1cb8e000 rdpbus (deferred)
fffff806`1cb90000 fffff806`1cc33000 UsbHub3 (deferred)
fffff806`1cc40000 fffff806`1cc4e000 USBD (deferred)
fffff806`1cc50000 fffff806`1cc88000 nvhda64v (deferred)
fffff806`1cc90000 fffff806`1ccff000 HdAudio (deferred)
fffff806`1cd10000 fffff806`1cd1e000 dump_diskdump (deferred)
fffff806`1cd60000 fffff806`1cd92000 dump_storahci (deferred)
fffff806`1cdc0000 fffff806`1cddd000 dump_dumpfve (deferred)
fffff806`1cde0000 fffff806`1cdf3000 HIDPARSE (deferred)
fffff806`1ce00000 fffff806`1ce25000 USBSTOR (deferred)
fffff806`1ce30000 fffff806`1ce63000 usbccgp (deferred)
fffff806`1ce70000 fffff806`1ce82000 hidusb (deferred)
fffff806`1ce90000 fffff806`1cecf000 HIDCLASS (deferred)
fffff806`1ced0000 fffff806`1cee1000 kbdhid (deferred)
fffff806`1cef0000 fffff806`1cf04000 kbdclass (deferred)
fffff806`1cf10000 fffff806`1cf20000 mouhid (deferred)
fffff806`1cf30000 fffff806`1cf43000 mouclass (deferred)
fffff806`1cf50000 fffff806`1d031000 dxgmms2 (deferred)
fffff806`1d040000 fffff806`1d05b000 monitor (deferred)
fffff806`1d060000 fffff806`1d089000 luafv (deferred)
fffff806`1d090000 fffff806`1d0c6000 wcifs (deferred)
fffff806`1d0d0000 fffff806`1d124000 WUDFRd (deferred)
fffff806`1d130000 fffff806`1d13e000 WpdUpFltr (deferred)
fffff806`1d140000 fffff806`1d15a000 storqosflt (deferred)
fffff806`1d160000 fffff806`1d187000 bindflt (deferred)
fffff806`1d1a0000 fffff806`1f1a4000 nvlddmkm (deferred)
fffff806`1f1b0000 fffff806`1f1d5000 HDAudBus (deferred)
fffff806`1f1e0000 fffff806`1f1f8000 lltdio (deferred)
fffff806`5da00000 fffff806`5da93000 mrxsmb (deferred)
fffff806`5daa0000 fffff806`5dae5000 mrxsmb20 (deferred)
fffff806`5daf0000 fffff806`5db43000 srvnet (deferred)
fffff806`5db50000 fffff806`5db64000 mmcss (deferred)
fffff806`5db70000 fffff806`5db85000 tcpipreg (deferred)
fffff806`5db90000 fffff806`5dbb7000 Ndu (deferred)
fffff806`5dbe0000 fffff806`5dd66000 HTTP (deferred)
fffff806`5dd70000 fffff806`5dd95000 bowser (deferred)
fffff806`5dda0000 fffff806`5ddba000 mpsdrv (deferred)
fffff806`5ef50000 fffff806`5f017000 srv2 (deferred)
fffff806`5f020000 fffff806`5f03c000 rassstp (deferred)
fffff806`5f040000 fffff806`5f05d000 NDProxy (deferred)
fffff806`5f060000 fffff806`5f088000 AgileVpn (deferred)
fffff806`5f090000 fffff806`5f0b1000 rasl2tp (deferred)
fffff806`5f0c0000 fffff806`5f0e1000 raspptp (deferred)
fffff806`5f0f0000 fffff806`5f10c000 raspppoe (deferred)
fffff806`5f110000 fffff806`5f11f000 ndistapi (deferred)
fffff806`5f120000 fffff806`5f15a000 ndiswan (deferred)
fffff806`5f160000 fffff806`5f176000 WdNisDrv (deferred)
fffff806`5f180000 fffff806`5f193000 condrv (deferred)
Unloaded modules:
fffff806`11fc0000 fffff806`11fdd000 EhStorClass.
fffff806`1a450000 fffff806`1a45f000 dump_storpor
fffff806`1a4a0000 fffff806`1a4d3000 dump_storahc
fffff806`1a500000 fffff806`1a51e000 dump_dumpfve
fffff806`19f10000 fffff806`19f2c000 dam.sys
fffff806`11bf0000 fffff806`11c01000 WdBoot.sys
fffff806`12ca0000 fffff806`12cb1000 hwpolicy.sys
DRIVER_OVERRAN_STACK_BUFFER (f7)
A driver has overrun a stack-based buffer. This overrun could potentially
allow a malicious user to gain control of this machine.
DESCRIPTION
A driver overran a stack-based buffer (or local variable) in a way that would
have overwritten the function's return address and jumped back to an arbitrary
address when the function returned. This is the classic "buffer overrun"
hacking attack and the system has been brought down to prevent a malicious user
from gaining complete control of it.
Do a kb to get a stack backtrace -- the last routine on the stack before the
buffer overrun handlers and bugcheck call is the one that overran its local
variable(s).
Arguments:
Arg1: 0000220727db4a00, Actual security check cookie from the stack
Arg2: 00003545299193ee, Expected security check cookie
Arg3: ffffcabad66e6c11, Complement of the expected security check cookie
Arg4: 0000000000000000, zero
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4639
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 17081
Key : Analysis.Memory.CommitPeak.Mb
Value: 87
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: f7
BUGCHECK_P1: 220727db4a00
BUGCHECK_P2: 3545299193ee
BUGCHECK_P3: ffffcabad66e6c11
BUGCHECK_P4: 0
SECURITY_COOKIE: Expected 00003545299193ee found 0000220727db4a00
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffda06`18c458b8 fffff801`3f2b0435 : 00000000`000000f7 00002207`27db4a00 00003545`299193ee ffffcaba`d66e6c11 : nt!KeBugCheckEx
ffffda06`18c458c0 fffff801`3f12a07f : ffffffff`ffffffff ffffda06`18c45a00 00000000`00005731 ffffffff`ffffffff : nt!_report_gsfailure+0x25
ffffda06`18c45900 fffff801`3f126e87 : 00000000`00000000 00001f80`0005005b 00000000`00160c26 00000000`00000002 : nt!PpmIdlePrepare+0x44f
ffffda06`18c45af0 fffff801`3f1f8d34 : ffffffff`00000000 ffff8280`4efe0340 ffffb989`4d7bc080 00000000`000006c0 : nt!PoIdle+0x1f7
ffffda06`18c45c60 00000000`00000000 : ffffda06`18c46000 ffffda06`18c40000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME: nt!_report_gsfailure+25
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 25
FAILURE_BUCKET_ID: 0xF7_MISSING_GSFRAME_nt!_report_gsfailure
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {82d2c1b5-b0cb-60a5-9a5d-78c8c4284f84}
Followup: MachineOwner
---------
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ffd8348be24, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffff8b892014fb80, Call type (0 - system call, 1 - worker routine)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3531
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 13532
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1
BUGCHECK_P1: 7ffd8348be24
BUGCHECK_P2: 0
BUGCHECK_P3: ffff
BUGCHECK_P4: ffff8b892014fb80
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicGamesLauncher.exe
STACK_TEXT:
ffff8b89`2014f9b8 fffff801`68207169 : 00000000`00000001 00007ffd`8348be24 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffff8b89`2014f9c0 fffff801`68207033 : 00000230`d0799520 00000000`00000000 ffff8b89`2014fb18 ffffffff`fffe7960 : nt!KiBugCheckDispatch+0x69
ffff8b89`2014fb00 00007ffd`8348be24 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
000000f2`ae18f6a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`8348be24
SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1fe
FAILURE_BUCKET_ID: 0x1_SysCallNum_4_nt!KiSystemServiceExitPico
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {52cd694c-15ec-48c3-924a-3539560711db}
Followup: MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff805460fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5077
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9615
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff805460fb320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: ffff808eeea53720 -- (.trap 0xffff808eeea53720)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000006c781029 rbx=0000000000000000 rcx=ffff808eeea53918
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805456becd7 rsp=ffff808eeea538b0 rbp=0000000000000007
r8=fffff80541cfaac0 r9=0000000000000000 r10=fffff80541cfaac0
r11=00000003b539ebac r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KeYieldProcessorEx+0x17:
fffff805`456becd7 4883c420 add rsp,20h
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffff8180`a5ce8c88 fffff805`458873f6 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff805`460fb320 : nt!KeBugCheckEx
ffff8180`a5ce8c90 fffff805`4572c2cd : 000005a6`05dc149e ffff8180`a5ccf180 00000000`00000246 00000000`0001ac22 : nt!KeAccumulateTicks+0x15e346
ffff8180`a5ce8cf0 fffff805`4572c871 : 00000000`00018d00 00000000`0000ff2f ffff8180`a5ccf180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
ffff8180`a5ce8d40 fffff805`457266e3 : ffff8180`a5ccf180 00000000`00000000 fffff805`46031680 00000000`00000000 : nt!KiUpdateTime+0x4a1
ffff8180`a5ce8e80 fffff805`4572eff2 : ffff808e`eea53720 ffff808e`eea537a0 ffff808e`eea53700 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
ffff8180`a5ce8f30 fffff805`4562ecd5 : 00000003`fce1144f ffff9284`8b2c8ac0 ffff9284`8b2c8b70 ffffb086`d82d6ced : nt!HalpTimerClockInterrupt+0xe2
ffff8180`a5ce8f60 fffff805`457f6cba : ffff808e`eea537a0 ffff9284`8b2c8ac0 ffff808e`eea53b10 57182474`89481024 : nt!KiCallInterruptServiceRoutine+0xa5
ffff8180`a5ce8fb0 fffff805`457f7227 : ffff9284`907cc300 ffff808e`eea538a0 ffff9284`9644c180 fffff805`457f7234 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff808e`eea53720 fffff805`456becd7 : 00000000`00000010 00000000`00000282 ffff808e`eea538d8 00000000`00000018 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff808e`eea538b0 fffff805`456bf83c : ffff9284`9645f180 00000000`00000000 ffff808e`eea53b18 00000000`00000000 : nt!KeYieldProcessorEx+0x17
ffff808e`eea538e0 fffff805`456e4e29 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`0000ed66 : nt!KiProcessExpiredTimerList+0x32c
ffff808e`eea539d0 fffff805`457f8d7e : ffffffff`00000000 ffff8180`a5ccf180 ffff8180`a5cda340 ffff9284`9645d080 : nt!KiRetireDpcList+0x9d9
ffff808e`eea53c60 00000000`00000000 : ffff808e`eea54000 ffff808e`eea4e000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KeAccumulateTicks+15e346
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 15e346
FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
Followup: MachineOwner
---------