Microsoft (R) Windows Debugger Version 10.0.17712.1000 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\MEMORY.DMP] Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available. Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 17134 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 17134.1.amd64fre.rs4_release.180410-1804 Machine Name: Kernel base = 0xfffff800`bc41d000 PsLoadedModuleList = 0xfffff800`bc7d81f0 Debug session time: Fri Aug 3 17:07:40.311 2018 (UTC - 3:00) System Uptime: 0 days 0:36:33.060 Loading Kernel Symbols ............................................................... ................................................................ ............................................. Loading User Symbols ................................................................ .................... Loading unloaded module list ............................. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck EF, {ffffd78228649580, 0, 0, 0} *** ERROR: Symbol file could not be found. Defaulted to export symbols for KERNELBASE.dll - Probably caused by : ntdll.dll ( ntdll!NtTerminateProcess+14 ) Followup: MachineOwner --------- nt!KeBugCheckEx: fffff800`bc5b5560 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff38f`f41ee940=00000000000000ef 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* CRITICAL_PROCESS_DIED (ef) A critical system process died Arguments: Arg1: ffffd78228649580, Process object or thread object Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died. Arg3: 0000000000000000 Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 401 BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804 SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd. SYSTEM_PRODUCT_NAME: B85M-D3PH SYSTEM_SKU: To be filled by O.E.M. SYSTEM_VERSION: To be filled by O.E.M. BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: F4 BIOS_DATE: 07/04/2014 BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd. BASEBOARD_PRODUCT: B85M-D3PH BASEBOARD_VERSION: x.x DUMP_TYPE: 1 BUGCHECK_P1: ffffd78228649580 BUGCHECK_P2: 0 BUGCHECK_P3: 0 BUGCHECK_P4: 0 PROCESS_NAME: svchost.exe CRITICAL_PROCESS: svchost.exe EXCEPTION_CODE: (NTSTATUS) 0x1d431301 - ERROR_CODE: (NTSTATUS) 0x1d431301 - CRITICAL_PROCESS_REPORTGUID: {dfc15a2c-5d4b-4f97-bd45-85370b7d3c01} IMAGE_NAME: ntdll.dll DEBUG_FLR_IMAGE_TIMESTAMP: 0 MODULE_NAME: ntdll FAULTING_MODULE: 00007ffa17e00000 psmserviceexthost CPU_COUNT: 4 CPU_MHZ: c79 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 3c CPU_STEPPING: 3 CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 22'00000000 (cache) 22'00000000 (init) BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXPNP: 1 (!blackboxpnp) DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0xEF CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-FIQ6N0I ANALYSIS_SESSION_TIME: 08-03-2018 18:31:23.0664 ANALYSIS_VERSION: 10.0.17712.1000 amd64fre EXCEPTION_RECORD: 000000e9f85fef30 -- (.exr 0xe9f85fef30) ExceptionAddress: 000000000000027f ExceptionCode: 1d431301 ExceptionFlags: 00007ffa NumberParameters: 0 CONTEXT: 0000000000000c00 -- (.cxr 0xc00) Unable to read context, NTSTATUS 0xC0000147 EXCEPTION_CODE_STR: 1d431301 LAST_CONTROL_TRANSFER: from fffff800bcba95e1 to fffff800bc5b5560 STACK_TEXT: fffff38f`f41ee938 fffff800`bcba95e1 : 00000000`000000ef ffffd782`28649580 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx fffff38f`f41ee940 fffff800`bcad4467 : 00000000`00000000 fffff800`bc5036c9 ffffd782`28649580 00000000`c0000005 : nt!PspCatchCriticalBreak+0xfd fffff38f`f41ee9e0 fffff800`bc993e74 : ffffd782`00000000 00000000`00000000 ffffd782`28649580 ffffd782`28649858 : nt!PspTerminateAllThreads+0x13f7b3 fffff38f`f41eea50 fffff800`bc993c35 : ffffffff`ffffffff fffff38f`f41eeb80 ffffd782`28649580 fffff800`bc8ec201 : nt!PspTerminateProcess+0xe0 fffff38f`f41eea90 fffff800`bc5c5c43 : ffffd782`000003cc ffffd782`286cb080 ffffd782`28649580 000000e9`f85ff86c : nt!NtTerminateProcess+0xa9 fffff38f`f41eeb00 00007ffa`1d4aa434 : 00007ffa`1d518e63 00000000`00000000 00007ffa`1d54470c 000000e9`f85ff86c : nt!KiSystemServiceCopyEnd+0x13 000000e9`f85fe5f8 00007ffa`1d518e63 : 00000000`00000000 00007ffa`1d54470c 000000e9`f85ff86c 000000e9`f85fe6a0 : ntdll!NtTerminateProcess+0x14 000000e9`f85fe600 00007ffa`1d4b120e : 00007ffa`1d54470c 00000000`00000006 00000000`00000000 00000000`00000000 : ntdll!TppWorkerpInnerExceptionFilter+0x5b 000000e9`f85fe630 00007ffa`1d49ab06 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!TppWorkerThread$filt$5+0x19 000000e9`f85fe670 00007ffa`1d4a9aae : 00007ffa`1d5447cc 000000e9`f85ff330 000000e9`f85ff830 00007ffa`00000000 : ntdll!_C_specific_handler+0x96 000000e9`f85fe6e0 00007ffa`1d4aeced : 00000000`00000000 000000e9`f85fe840 000000e9`f85fee40 00000000`00000000 : ntdll!_GSHandlerCheck_SEH+0x6a 000000e9`f85fe710 00007ffa`1d416c86 : 000000e9`f85fe840 000000e9`f85fee40 00007ffa`1d572050 00000000`00000000 : ntdll!RtlpExecuteHandlerForException+0xd 000000e9`f85fe740 00007ffa`1d4adc1e : 000000e9`f85fef30 00000000`00000c00 00007ffa`17e92e80 00007ffa`187056c4 : ntdll!RtlDispatchException+0x3c6 000000e9`f85fee40 00007ffa`17e56744 : 000000e9`00000000 000000e9`f85ff5d8 00000004`0b002e06 00007c86`d56b34fb : ntdll!KiUserExceptionDispatch+0x2e 000000e9`f85ff570 00007ffa`17e58c7c : 00000259`c06fd870 00007ffa`17e75308 00000259`c06fd870 00007ffa`17e75308 : psmserviceexthost!RmpCpuSetManagerReleaseProcessRegistrationEx+0x24 000000e9`f85ff5a0 00007ffa`17e58bc1 : 00000000`00000000 0000bf57`00000002 00000259`c06fd870 00007ffa`1d453365 : psmserviceexthost!RmpGameModeUnapplyCpuSetAllocation+0x6c 000000e9`f85ff620 00007ffa`17e4a1f6 : 00007ffa`17e93048 000000e9`f85ff750 00007ffa`17e930a0 00000259`c06fd8c8 : psmserviceexthost!RmpGameModeUnapplyAndReleaseRecipientResources+0x49 000000e9`f85ff650 00007ffa`1d43148c : 00000259`bfc20ea0 00000000`00000000 00000000`7ffe03b0 00007ffa`1d431350 : psmserviceexthost!RmpGameModePolicyWorker+0x1c146 000000e9`f85ff7e0 00007ffa`1d42fa19 : 00000259`bfc16798 00000000`00000000 00007ffa`1d433140 00000000`00000000 : ntdll!TppWorkpExecuteCallback+0x13c 000000e9`f85ff830 00007ffa`1acb3034 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!TppWorkerThread+0x6f9 000000e9`f85ffb20 00007ffa`1d481431 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : KERNEL32!BaseThreadInitThunk+0x14 000000e9`f85ffb50 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21 STACK_COMMAND: .cxr 0xc00 ; kb THREAD_SHA1_HASH_MOD_FUNC: 97aed03ad5881119c64983e9810bab9b3d5e7f4e THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 7a844a5dd06a2f2894e7438fca3b6c4435a0e8e0 THREAD_SHA1_HASH_MOD: 1256746af5654137768ce56ecac7907b62164ef0 FOLLOWUP_IP: ntdll!NtTerminateProcess+14 00007ffa`1d4aa434 c3 ret FAULT_INSTR_CODE: c32ecdc3 SYMBOL_STACK_INDEX: 6 SYMBOL_NAME: ntdll!NtTerminateProcess+14 FOLLOWUP_NAME: MachineOwner BUCKET_ID_FUNC_OFFSET: 14 FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_286cb080_psmserviceexthost.dll!?RmpCpuSetManagerReleaseProcessRegistrationEx@@YAXPEAU_RM_CPU_SET_MANAGER@@PEAU_RM_CPU_SET_PROCESS_REGISTRATION@@K@Z_ntdll!NtTerminateProcess BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_286cb080_psmserviceexthost.dll!?RmpCpuSetManagerReleaseProcessRegistrationEx@@YAXPEAU_RM_CPU_SET_MANAGER@@PEAU_RM_CPU_SET_PROCESS_REGISTRATION@@K@Z_ntdll!NtTerminateProcess PRIMARY_PROBLEM_CLASS: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_286cb080_psmserviceexthost.dll!?RmpCpuSetManagerReleaseProcessRegistrationEx@@YAXPEAU_RM_CPU_SET_MANAGER@@PEAU_RM_CPU_SET_PROCESS_REGISTRATION@@K@Z_ntdll!NtTerminateProcess TARGET_TIME: 2018-08-03T20:07:40.000Z OSBUILD: 17134 OSSERVICEPACK: 0 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 784 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2018-07-14 00:53:27 BUILDDATESTAMP_STR: 180410-1804 BUILDLAB_STR: rs4_release BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804 ANALYSIS_SESSION_ELAPSED_TIME: b24 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0xef_svchost.exe_bugcheck_critical_process_286cb080_psmserviceexthost.dll!?rmpcpusetmanagerreleaseprocessregistrationex@@yaxpeau_rm_cpu_set_manager@@peau_rm_cpu_set_process_registration@@k@z_ntdll!ntterminateprocess FAILURE_ID_HASH: {bd28847b-0a5d-53a1-f6f7-3ceae1603990} Followup: MachineOwner --------- 2: kd> lmvm psmserviceexthost Browse full module list start end module name 00007ffa`17e00000 00007ffa`17e9e000 psmserviceexthost (pdb symbols) C:\ProgramData\Dbg\sym\PsmServiceExtHost.pdb\52353B5A03F3A3D7CE2AC7ADE48632751\PsmServiceExtHost.pdb Loaded symbol image file: psmserviceexthost.dll Image path: C:\Windows\SYSTEM32\psmserviceexthost.dll Image name: psmserviceexthost.dll Browse all global symbols functions data Image was built with /Brepro flag. Timestamp: 113B6578 (This is a reproducible build file hash, not a timestamp) CheckSum: 000A11DD ImageSize: 0009E000 File version: 10.0.17134.137 Product version: 10.0.17134.137 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 1.0 App File date: 00000000.00000000 Translations: 0409.04b0 Information from resource tables: CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: PSMServiceExtHost.dll OriginalFilename: PSMServiceExtHost.dll ProductVersion: 10.0.17134.137 FileVersion: 10.0.17134.137 (WinBuild.160101.0800) FileDescription: Resource Manager PSM Service Extension LegalCopyright: © Microsoft Corporation. All rights reserved.