QUOTA_UNDERFLOW (21)
This BugCheck occurs if a kernel component mishandles quota charges and
returns more quota than was previously charged to a particular quota block.
Arguments:
Arg1: ffffcc851a39e0c0, The process (if any) that was initially charged.
Arg2: 0000000000000002, The quota type in question (paged pool, nonpaged pool, etc.)
Arg3: ffffffffffffffff, The initial charge amount to return.
Arg4: fffffffffffa3550, The remaining (unreturned) charge.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3952
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 10529
Key : Analysis.Init.CPU.mSec
Value: 1077
Key : Analysis.Init.Elapsed.mSec
Value: 10540
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
BUGCHECK_CODE: 21
BUGCHECK_P1: ffffcc851a39e0c0
BUGCHECK_P2: 2
BUGCHECK_P3: ffffffffffffffff
BUGCHECK_P4: fffffffffffa3550
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: explorer.exe
STACK_TEXT:
ffff8884`b7aa75c8 fffff805`2c8630bb : 00000000`00000021 ffffcc85`1a39e0c0 00000000`00000002 ffffffff`ffffffff : nt!KeBugCheckEx
ffff8884`b7aa75d0 fffff805`2caa4ff9 : 00000000`00000001 ffffcc85`1a39e0c0 00000000`00000000 ffffffff`ffffffff : nt!PspReturnQuota+0x2334ab
ffff8884`b7aa7630 fffff805`2c646c09 : ffffcc85`19784d30 00000000`00000000 00000000`00000000 00000000`0001fffb : nt!PsReturnProcessPageFileQuota+0x25
ffff8884`b7aa7660 fffff805`2caa5da9 : ffffcc85`20337500 ffffcc85`1a39e0c0 ffffcc85`1a39e0c0 fffff805`2c739e75 : nt!MiReturnFullProcessCharges+0x39
ffff8884`b7aa7690 fffff805`2c644bbe : 00007ffe`e05b0000 ffffcc85`1a39e0c0 ffffcc85`20337500 00007ffe`e05ddfff : nt!MiRemoveVadCharges+0xb9
ffff8884`b7aa7710 fffff805`2caa1ef4 : 00000000`00000001 00007ffe`e05b0000 ffffcc85`19348540 ffffcc85`00000000 : nt!MiFinishVadDeletion+0xde
ffff8884`b7aa77a0 fffff805`2cb552b9 : ffffcc85`1a39e0c0 ffffcc85`20337500 ffffcc85`00000000 00000000`00000000 : nt!MiDeleteVad+0x244
ffff8884`b7aa7860 fffff805`2cb54e47 : ffffcc85`20337500 ffffcc85`19784d00 ffffcc85`19348540 00000000`00000000 : nt!MiUnmapVad+0x49
ffff8884`b7aa7890 fffff805`2cb4cf99 : ffffcc85`20337c80 ffffcc85`20337c80 ffffcc85`19348540 ffffcc85`1a39e0c0 : nt!MiCleanVad+0x2f
ffff8884`b7aa78c0 fffff805`2cae2531 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffcc85`1a39e0c0 : nt!MmCleanProcessAddressSpace+0x10d
ffff8884`b7aa7940 fffff805`2cdaf6c2 : 00000000`00000500 ffffcc85`1a39e0c0 fffff805`2d01bf20 fffff805`2d01bee0 : nt!PspRundownSingleProcess+0x135
ffff8884`b7aa79d0 fffff805`2c648aaf : ffffcc85`19348540 fffff805`2d01be00 ffffcc85`00000000 ffffcc85`00000000 : nt!PspProcessRundownWorkerSingle+0x32
ffff8884`b7aa7a00 fffff805`2c75b615 : ffffcc85`19348540 ffff9980`1044f000 ffffcc85`19348540 00000000`00400000 : nt!ExpWorkerThread+0x14f
ffff8884`b7aa7bf0 fffff805`2c816c24 : ffff9980`10440180 ffffcc85`19348540 fffff805`2c75b5c0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff8884`b7aa7c40 00000000`00000000 : ffff8884`b7aa8000 ffff8884`b7aa2000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME: nt!PspReturnQuota+2334ab
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22000.258
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2334ab
FAILURE_BUCKET_ID: 0x21_nt!PspReturnQuota
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e09333c9-b4c4-6d2b-abd9-55f32ac61379}