Issue still present after updating to the Beta
First BSOD after the beta update
0: kd> !analyze -v
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000046, The exception code that was not handled
Arg2: fffff803329282ba, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
*** WARNING: Unable to verify timestamp for aswNetHub.sys
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2858
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11208
Key : Analysis.Init.CPU.mSec
Value: 327
Key : Analysis.Init.Elapsed.mSec
Value: 7781
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 021122-14046-01.dmp
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000046
BUGCHECK_P2: fffff803329282ba
BUGCHECK_P3: 0
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff8033785cbc8 fffff803
32af5aae : 000000000000001e ffffffff
c0000046 fffff803329282ba 00000000
00000000 : nt!KeBugCheckEx
fffff8033785cbd0 fffff803
32a0026f : fffff80332af5a8c 00000000
00000000 0000000000000000 00000000
00000000 : nt!HvlpVtlCallExceptionHandler+0x22
fffff8033785cc10 fffff803
328e6f87 : fffff8033785d180 00000000
00000000 fffff8033785fb60 fffff803
329faf1e : nt!RtlpExecuteHandlerForException+0xf
fffff8033785cc40 fffff803
328e69f6 : fffff8033785d8a0 fffff803
3785d900 fffff8033785d3a0 00000000
00000000 : nt!RtlDispatchException+0x297
fffff8033785d360 fffff803
329282ba : 0000000000000001 fffff803
2e000180 0000000000000000 00000000
00000001 : nt!RtlRaiseException+0xf6
fffff8033785d8e0 fffff803
32885eba : 0000000000000000 fffff803
4947eb58 0000000000000000 fffff803
3785df41 : nt!RtlRaiseStatus+0x4a
fffff8033785de80 fffff803
32884ea4 : ffff910400000000 00000000
00000001 fffff8033785e390 fffff803
4947eb00 : nt!KeReleaseMutant+0x2ca
fffff8033785df70 fffff803
4945bde1 : fffff8033785df20 00000000
00000000 ffff910435a08ab1 01d81f1e
73a0e9a0 : nt!KeReleaseMutex+0x14
fffff8033785dfa0 fffff803
3785df20 : 0000000000000000 ffff9104
35a08ab1 01d81f1e73a0e9a0 00000000
00000000 : aswNetHub+0x5bde1
fffff8033785dfa8 00000000
00000000 : ffff910435a08ab1 01d81f1e
73a0e9a0 0000000000000000 fffff803
4940d7ff : 0xfffff803`3785df20
SYMBOL_NAME: aswNetHub+5bde1
MODULE_NAME: aswNetHub
IMAGE_NAME: aswNetHub.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 5bde1
FAILURE_BUCKET_ID: 0x1E_C0000046_aswNetHub!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d617c233-dc06-b91b-7d1f-2dfc8f5a5a87}
Followup: MachineOwner
This was the 2nd BSOD after updating
Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\021122-14046-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\021322-14296-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff80004800000 PsLoadedModuleList = 0xfffff800
0542a2d0
Debug session time: Sun Feb 13 18:17:17.083 2022 (UTC + 2:00)
System Uptime: 2 days 8:08:52.066
Loading Kernel Symbols
…
…
…
…
Loading User Symbols
Loading unloaded module list
…
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff80004bf73b0 48894c2408 mov qword ptr [rsp+8],rcx ss:ffff868d
616b8670=00000000000000b8
0: kd> !analyze -v
ATTEMPTED_SWITCH_FROM_DPC (b8)
A wait operation, attach process, or yield was attempted from a DPC routine.
This is an illegal operation and the stack track will lead to the offending
code and original DPC routine.
Arguments:
Arg1: ffff88827b206080, Original thread which is the cause of the failure
Arg2: ffff888273c3d080, New thread
Arg3: 0000000000000000, Stack address of the original thread
Arg4: 0000000000000000
Debugging Details:
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2515
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 18306
Key : Analysis.Init.CPU.mSec
Value: 514
Key : Analysis.Init.Elapsed.mSec
Value: 36287
Key : Analysis.Memory.CommitPeak.Mb
Value: 90
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 021322-14296-01.dmp
BUGCHECK_CODE: b8
BUGCHECK_P1: ffff88827b206080
BUGCHECK_P2: ffff888273c3d080
BUGCHECK_P3: 0
BUGCHECK_P4: 0
FAULTING_THREAD: ffff88827b206080
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
DPC_STACK_BASE: FFFFF8000C867FB0
STACK_TEXT:
fffff8000c865f80 fffff800
04a0c800 : ffff8882786d9390 00000000
00000000 ffff88827960da50 fffff800
20876a85 : nt!KiSwapContext+0x76
fffff8000c8660c0 fffff800
04a0bd2f : 0000000000000001 ffff8882
00043b00 fffff8000c866280 00000000
00000000 : nt!KiSwapThread+0x500
fffff8000c866170 fffff800
04a0b5d3 : fffff80000000000 ffff8882
00000000 ffff888280a7fc00 ffff8882
7b2061c0 : nt!KiCommitThreadWait+0x14f
fffff8000c866210 fffff800
1e9ebc43 : fffff8001ea0eb58 ffff8882
00000000 ffff888257c02100 fffff800
04a89300 : nt!KeWaitForSingleObject+0x233
fffff8000c866300 fffff800
1ea0eb58 : ffff888200000000 ffff8882
57c02100 fffff80004a89300 00000000
00000000 : aswNetHub+0x5bc43
fffff8000c866308 ffff8882
00000000 : ffff888257c02100 fffff800
04a89300 0000000000000000 fffff800
1e99d7ff : aswNetHub+0x7eb58
fffff8000c866310 ffff8882
57c02100 : fffff80004a89300 00000000
00000000 fffff8001e99d7ff ffff8882
752b6f00 : 0xffff888200000000 fffff800
0c866318 fffff80004a89300 : 00000000
00000000 fffff8001e99d7ff ffff8882
752b6f00 fffff80000000000 : 0xffff8882
57c02100
fffff8000c866320 fffff800
1e99d767 : fffff8000c866458 fffff800
0c866520 0000000000000001 fffff800
0c866470 : nt!ExFreeHeapPool+0x280
fffff8000c866400 fffff800
0c866458 : fffff8000c866520 00000000
00000001 fffff8000c866470 ffff8882
00000000 : aswNetHub+0xd767
fffff8000c866408 fffff800
0c866520 : 0000000000000001 fffff800
0c866470 ffff888200000000 00000000
00000000 : 0xfffff8000c866458 fffff800
0c866410 0000000000000001 : fffff800
0c866470 ffff888200000000 00000000
00000000 0000000000000000 : 0xfffff800
0c866520
fffff8000c866418 fffff800
0c866470 : ffff888200000000 00000000
00000000 0000000000000000 00000000
00000000 : 0x1
fffff8000c866420 ffff8882
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : 0xfffff8000c866470 fffff800
0c866428 0000000000000000 : 00000000
00000000 0000000000000000 00000000
00000000 0000000000000000 : 0xffff8882
00000000
SYMBOL_NAME: aswNetHub+5bc43
MODULE_NAME: aswNetHub
IMAGE_NAME: aswNetHub.sys
STACK_COMMAND: .process /r /p 0xffff88827898d080; .thread 0xffff88827b206080 ; kb
BUCKET_ID_FUNC_OFFSET: 5bc43
FAILURE_BUCKET_ID: 0xB8_aswNetHub!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9ddec478-1451-b023-7c0c-f2d8300c2426}
Followup: MachineOwner