Windows 10 I manually initiated the BSOD, could someone help me try and find the problem (driver) which keeps on crashing my Windows?

  • Thread starter Thread starter KrapnixFootball
  • Start date Start date
K

KrapnixFootball

[COLOR=rgba(30, 30, 30, 1)]Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`7e400000 PsLoadedModuleList = 0xfffff805`7f02a2f0
Debug session time: Tue Jan 26 12:06:31.848 2021 (UTC + 1:00)
System Uptime: 0 days 12:44:03.473
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.................
Loading User Symbols

Loading unloaded module list
...............
For analysis of this file, run [/COLOR][COLOR=rgba(0, 0, 255, 1)]!analyze -v
[/COLOR][COLOR=rgba(30, 30, 30, 1)]nt!KeBugCheckEx:
fffff805`7e7f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff805`81e8e900=00000000000000e2
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MANUALLY_INITIATED_CRASH (e2)
The user manually initiated this crash dump.
Arguments:
Arg1: 0000000000000000
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4702

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-EFBQQVC

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 8959

Key : Analysis.Memory.CommitPeak.Mb
Value: 97

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: e2

BUGCHECK_P1: 0

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 ([/COLOR][COLOR=rgba(0, 0, 255, 1)]!blackboxbsd[/COLOR][COLOR=rgba(30, 30, 30, 1)])


BLACKBOXNTFS: 1 ([/COLOR][COLOR=rgba(0, 0, 255, 1)]!blackboxntfs[/COLOR][COLOR=rgba(30, 30, 30, 1)])


BLACKBOXPNP: 1 ([/COLOR][COLOR=rgba(0, 0, 255, 1)]!blackboxpnp[/COLOR][COLOR=rgba(30, 30, 30, 1)])


BLACKBOXWINLOGON: 1

PROCESS_NAME: System

STACK_TEXT:
fffff805`81e8e8f8 fffff805`8acc4170 : 00000000`000000e2 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff805`81e8e900 fffff805`8acc3a7f : ffff9a8e`b0cd5520 fffff805`805b90fd ffff9a8e`b0daaae0 00000000`00000001 : kbdhid!KbdHidProcessCrashDump+0x1f0
fffff805`81e8e940 fffff805`8ac44cac : ffff9a8e`b0a4e190 ffff9a8e`b14bb04c 00000000`00000000 fffff805`8ac48110 : kbdhid!KbdHid_InsertCodesIntoQueue+0xbf
fffff805`81e8e9a0 fffff805`8ac44e0a : ffff9a8e`000000c6 fffff805`81e8ea59 ffff9a8e`b0de4770 fffff805`805b85fc : HIDPARSE!HidP_KbdPutKey+0x44
fffff805`81e8e9d0 fffff805`8ac44f87 : ffff9a8e`b14bb04c 00000000`00000100 00000000`00000002 ffff9a8e`bf4a2020 : HIDPARSE!HidP_ModifierCode+0x9a
fffff805`81e8ea00 fffff805`8ac45083 : ffff9a8e`b14bb8c0 ffff9a8e`b1477010 ffff9a8e`b1477010 fffff805`8ac43dca : HIDPARSE!HidP_TranslateUsage+0x8b
fffff805`81e8ea50 fffff805`8acc37af : 00000000`00000000 ffff9a8e`b1477010 ffff9a8e`b0a4e190 ffff9a8e`b0ddaa10 : HIDPARSE!HidP_TranslateUsageAndPagesToI8042ScanCodes+0xb3
fffff805`81e8eac0 fffff805`7e716f56 : 00000000`00000000 ffff9a8e`bf4a4502 ffff9a8e`00000000 00000000`00000001 : kbdhid!KbdHid_ReadComplete+0x43f
fffff805`81e8eb50 fffff805`7e64885e : ffff9a8e`b1477010 fffff805`81e8ec09 00000000`00000000 ffff9a8e`b14775f3 : nt!IopUnloadSafeCompletion+0x56
fffff805`81e8eb80 fffff805`7e648727 : 00000000`00000000 ffff9a8e`b144c406 ffff9a8e`b0881e50 00000000`00000000 : nt!IopfCompleteRequest+0x11e
fffff805`81e8ec70 fffff805`8ac0aef5 : ffff9a8e`bbc1c988 ffff9a8e`b0de5102 00000000`00000000 00000000`00000021 : nt!IofCompleteRequest+0x17
fffff805`81e8eca0 fffff805`8ac0a7ed : ffff9a8e`b0de51d0 ffff9a8e`b0de5102 ffff9a8e`b0de51d0 fffff805`00000021 : HIDCLASS!HidpDistributeInterruptReport+0x3f5
fffff805`81e8eda0 fffff805`7e64885e : ffff9a8e`b146c290 ffff9a8e`b146c290 00000000`00000001 00000000`00000000 : HIDCLASS!HidpInterruptReadComplete+0x37d
fffff805`81e8ee40 fffff805`7e648727 : 00000000`00000001 00000000`00000000 ffff9a8e`b005bb80 00000000`00000002 : nt!IopfCompleteRequest+0x11e
fffff805`81e8ef30 fffff805`805b811a : 00000000`00000000 ffff9a8e`b0cd5520 ffff9a8e`b146c290 00000000`00000000 : nt!IofCompleteRequest+0x17
fffff805`81e8ef60 fffff805`805b7eb1 : fffff805`80647e02 00000000`00000000 ffff9a8e`b146c290 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff805`81e8eff0 fffff805`8b7b547b : fffff805`81e8f0b0 ffff9a8e`b0dab8e0 fffff805`81e8f170 00000000`00000000 : Wdf01000!imp_WdfRequestCompleteWithInformation+0xa1 [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 571]
fffff805`81e8f050 fffff805`8b7b550b : ffff9a8e`b0881ed0 ffff9a8e`b0c37210 00000000`00000000 00006571`4f254718 : sshid+0x547b
fffff805`81e8f090 fffff805`8b7b23a7 : ffff9a8e`b0c37210 fffff805`81e8f170 00000000`00000000 ffff9a8e`b0de3aa0 : sshid+0x550b
fffff805`81e8f0f0 fffff805`8061d92f : ffff9a8e`00000000 fffff805`8cde23d8 fffff805`00000020 00000000`73556f49 : sshid+0x23a7
fffff805`81e8f1a0 fffff805`805b9248 : ffff9a8e`b0daa920 00000000`00000001 fffff805`8061d8c0 fffff805`00000000 : Wdf01000!FxUsbPipeContinuousReader::_FxUsbPipeRequestComplete+0x6f [minkernel\wdf\framework\shared\targets\usb\fxusbpipe.cpp @ 293]
fffff805`81e8f210 fffff805`805bc854 : 00006571`4f2556d8 ffff9a8e`b0daa920 ffff9a8e`b0daa920 00000000`00000000 : Wdf01000!FxRequestBase::CompleteSubmitted+0xe8 [minkernel\wdf\framework\shared\core\fxrequestbase.cpp @ 530]
fffff805`81e8f2a0 fffff805`7e716f56 : ffff9a8e`b0d92de0 ffff9a8e`b1494402 ffff9a8e`b1494420 fffff805`8c93a860 : Wdf01000!FxIoTarget::_RequestCompletionRoutine+0xe4 [minkernel\wdf\framework\shared\targets\general\fxiotarget.cpp @ 2448]
fffff805`81e8f310 fffff805`7e64885e : ffff9a8e`b1494420 fffff805`81e8f3c9 00000000`00000000 ffff9a8e`b14948e3 : nt!IopUnloadSafeCompletion+0x56
fffff805`81e8f340 fffff805`7e648727 : 00000000`00000001 00000000`00000000 ffff9a8e`b0dda630 00000000`00000002 : nt!IopfCompleteRequest+0x11e
fffff805`81e8f430 fffff805`805b811a : 00000000`00000000 ffff9a8e`b02c1460 ffff9a8e`b1494420 fffff805`81e8f510 : nt!IofCompleteRequest+0x17
fffff805`81e8f460 fffff805`805b5bbf : ffff9a8e`b713bc02 ffff9a8e`b7d72320 ffff9a8e`b1494420 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff805`81e8f4f0 fffff805`89c2b91c : 00000000`ffffff02 ffff9a8e`b713bb20 ffff9a8e`b0ddaa10 ffff9a8e`b0ddaa10 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffff805`81e8f550 fffff805`89c2b7e1 : ffff9a8e`b713bcc0 00000000`00000008 ffff9a8e`b713bd50 fffff805`81e8f768 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc8
fffff805`81e8f5b0 fffff805`89c2b5d0 : 00000000`00000004 fffff805`81e8f720 00000000`00000000 ffff9a8e`b0dda090 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd
fffff805`81e8f660 fffff805`89c26570 : 00000000`00000004 fffff805`81e8f738 00000000`00000008 fffff805`81e8f740 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffff805`81e8f690 fffff805`89c260a5 : 00000000`00000780 00006571`4f8bac00 ffff9a8e`b0c51410 ffff9a8e`afadc810 : USBXHCI!Endpoint_TransferEventHandler+0xb0
fffff805`81e8f6f0 fffff805`89c25d7c : ffff9a8e`b0a44328 fffff805`79d81180 00006571`55afbf88 fffff805`81e8f810 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
fffff805`81e8f7f0 fffff805`805b38f5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff805`81e8f820 fffff805`7e60781e : fffff805`79d84240 ffff9a8e`a7ce1000 fffff805`81e8fb20 fffff805`00000002 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa5 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
fffff805`81e8f860 fffff805`7e606b04 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff805`81e8f9d0 fffff805`7e7f92ee : 00000000`00000000 fffff805`79d81180 fffff805`7f126600 ffff9a8e`af7dc200 : nt!KiRetireDpcList+0x1f4
fffff805`81e8fc60 00000000`00000000 : fffff805`81e90000 fffff805`81e8a000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME: kbdhid!KbdHidProcessCrashDump+1f0

MODULE_NAME: [/COLOR][COLOR=rgba(0, 0, 255, 1)]kbdhid

[/COLOR][COLOR=rgba(30, 30, 30, 1)]IMAGE_NAME: kbdhid.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1f0

FAILURE_BUCKET_ID: MANUALLY_INITIATED_CRASH_kbdhid!KbdHidProcessCrashDump

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {a90fbd35-7a19-bced-0f76-fa89d249d332}

Followup: MachineOwner
---------[/COLOR]


Continue reading...
 
Back
Top