bh25 - 2021-05-10

Hello. Since setting up a new Windows 10 Home laptop and installing VeraCrypt for system encryption, I am getting hard freezes/hangs every few days that force a hard reboot.

I configured windows to allow manually initiating a memory dump in these conditions, and since then have been collecting MEMORY.DMP files. I am not expert enough to understand these fully, but in every dump I have generated, VeraCrypt is indicated on some of the information.

So my question is if anyone can help to interpret/confirm from this WInDbg analysis of the dump files if these hangs are being caused by VeraCrypt?

Here is a sample dump file from last night:


Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [Y:\BSOD Crash Dumps\051021-34484-01-MEMORY.DMP]
Kernel Bitmap Dump File: Full address space is available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff807`45800000 PsLoadedModuleList = 0xfffff807`4642a3d0
Debug session time: Mon May 10 05:04:32.128 2021 (UTC + 2:00)
System Uptime: 0 days 18:20:13.825
Loading Kernel Symbols
...............................................................
................................................................
................................................................
........................................................
Loading User Symbols

Loading unloaded module list
....................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`45bf5e40 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff807`4c0ade70=00000000000000e2
0: kd> !analyze -v -hang
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MANUALLY_INITIATED_CRASH (e2)
The user manually initiated this crash dump.
Arguments:
Arg1: 0000000000000000
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

Unable to load image \SystemRoot\system32\drivers\aswArDisk.sys, Win32 error 0n2
Unable to load image \SystemRoot\System32\drivers\veracrypt.sys, Win32 error 0n2
Scanning for threads blocked on locks ...
Cannot get _ERESOURCE type

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8562

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12913

    Key  : Analysis.Init.CPU.mSec
    Value: 937

    Key  : Analysis.Init.Elapsed.mSec
    Value: 33384

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  e2

BUGCHECK_P1: 0

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

IRP_ADDRESS: ffffe080011c4a20

DEVICE_OBJECT: ffffe08fdcc1e040

DRIVER_OBJECT: ffffe08fdc892b00

IMAGE_NAME:  veracrypt.sys

MODULE_NAME: veracrypt

FAULTING_MODULE: fffff8074ac40000 veracrypt

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME:  System

BLOCKED_THREAD:  fffff80746527600

STACK_TEXT:
fffff807`4c0ade68 fffff807`66a372f5     : 00000000`000000e2 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff807`4c0ade70 fffff807`66a36bd9     : ffffe08f`f5465970 ffffe08f`f5465980 ffffe08f`f5465980 00000000`00000002 : i8042prt!I8xProcessCrashDump+0x269
fffff807`4c0adeb0 fffff807`45b27f55     : ffff8901`cf20e280 ffffe08f`f5465820 ffff8901`cf20e38e ffffe08f`f5465d04 : i8042prt!I8042KeyboardInterruptService+0x449
fffff807`4c0adf40 fffff807`45bf766f     : fffff807`4c09e510 ffff8901`cf20e280 000077a8`6b7df394 fffff807`45bf78ea : nt!KiCallInterruptServiceRoutine+0xa5
fffff807`4c0adf90 fffff807`45bf7937     : 3169db2a`7b0d4207 9deead71`e8b43bcd 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatch+0x11f
fffff807`4c09e490 fffff807`45b96ba9     : fffff807`45b96179 ffffe08f`da9d0210 ffffe08f`daaff000 00000000`0000000f : nt!KiInterruptDispatch+0x37
fffff807`4c09e628 fffff807`45b96179     : ffffe08f`da9d0210 ffffe08f`daaff000 00000000`0000000f 00000000`00000010 : nt!HalpAcpiPmRegisterReadPort+0x9
fffff807`4c09e630 fffff807`499b670a     : 00000000`00000000 fffff807`45a77403 fffff807`49a11f98 fffff807`4c09e710 : nt!HalpAcpiPmRegisterRead+0x39
fffff807`4c09e660 fffff807`499b64a4     : fffff807`4c09e800 fffff807`45a087f9 00000000`00000000 fffff807`41b8f200 : ACPI!ACPIReadGpeStatusRegister+0x66
fffff807`4c09e6a0 fffff807`499b5c01     : 00000000`80010000 ffffe08f`da703a20 00000000`80010000 00000000`00400a02 : ACPI!ACPIInterruptDispatchEvents+0x5c
fffff807`4c09e730 fffff807`45a0781e     : fffff807`41b8f240 fffff807`4c09e860 fffff807`4c09ea40 fffff807`00000002 : ACPI!ACPIInterruptServiceRoutineDPC+0xb1
fffff807`4c09e760 fffff807`45a06b04     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff807`4c09e8d0 fffff807`45bf99ae     : 00000000`00000000 fffff807`41b8c180 fffff807`46527600 ffffe080`0a1f9080 : nt!KiRetireDpcList+0x1f4
fffff807`4c09eb60 00000000`00000000     : fffff807`4c09f000 fffff807`4c098000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xE2_IMAGE_veracrypt.sys

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {aae260cf-b1b5-649b-1161-6f9da0e8b1c9}

Followup:     MachineOwner
---------

0: kd> ~0
0: kd> !thread
THREAD fffff80746527600  Cid 0000.0000  Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 0
Not impersonating
DeviceMap                 ffffb90161e487e0
Owning Process            fffff80746524a00       Image:         Idle
Attached Process          ffffe08fda702080       Image:         System
Wait Start TickCount      4224830        Ticks: 54 (0:00:00:00.843)
Context Switch Count      48386153       IdealProcessor: 0
UserTime                  00:00:00.000
KernelTime                15:54:25.687
Win32 Start Address nt!KiIdleLoop (0xfffff80745bf9910)
Stack Init fffff8074c09eb90 Current fffff8074c09eb20
Base fffff8074c09f000 Limit fffff8074c098000 Call 0000000000000000
Priority 0 BasePriority 0 PriorityDecrement 0 IoPriority 0 PagePriority 5
Child-SP          RetAddr               : Args to Child                                                           : Call Site
fffff807`4c0ade68 fffff807`66a372f5     : 00000000`000000e2 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff807`4c0ade70 fffff807`66a36bd9     : ffffe08f`f5465970 ffffe08f`f5465980 ffffe08f`f5465980 00000000`00000002 : i8042prt!I8xProcessCrashDump+0x269
fffff807`4c0adeb0 fffff807`45b27f55     : ffff8901`cf20e280 ffffe08f`f5465820 ffff8901`cf20e38e ffffe08f`f5465d04 : i8042prt!I8042KeyboardInterruptService+0x449
fffff807`4c0adf40 fffff807`45bf766f     : fffff807`4c09e510 ffff8901`cf20e280 000077a8`6b7df394 fffff807`45bf78ea : nt!KiCallInterruptServiceRoutine+0xa5
fffff807`4c0adf90 fffff807`45bf7937     : 3169db2a`7b0d4207 9deead71`e8b43bcd 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatch+0x11f (TrapFrame @ fffff807`4c0ade70)
fffff807`4c09e490 fffff807`45b96ba9     : fffff807`45b96179 ffffe08f`da9d0210 ffffe08f`daaff000 00000000`0000000f : nt!KiInterruptDispatch+0x37 (TrapFrame @ fffff807`4c09e490)
fffff807`4c09e628 fffff807`45b96179     : ffffe08f`da9d0210 ffffe08f`daaff000 00000000`0000000f 00000000`00000010 : nt!HalpAcpiPmRegisterReadPort+0x9
fffff807`4c09e630 fffff807`499b670a     : 00000000`00000000 fffff807`45a77403 fffff807`49a11f98 fffff807`4c09e710 : nt!HalpAcpiPmRegisterRead+0x39
fffff807`4c09e660 fffff807`499b64a4     : fffff807`4c09e800 fffff807`45a087f9 00000000`00000000 fffff807`41b8f200 : ACPI!ACPIReadGpeStatusRegister+0x66
fffff807`4c09e6a0 fffff807`499b5c01     : 00000000`80010000 ffffe08f`da703a20 00000000`80010000 00000000`00400a02 : ACPI!ACPIInterruptDispatchEvents+0x5c
fffff807`4c09e730 fffff807`45a0781e     : fffff807`41b8f240 fffff807`4c09e860 fffff807`4c09ea40 fffff807`00000002 : ACPI!ACPIInterruptServiceRoutineDPC+0xb1
fffff807`4c09e760 fffff807`45a06b04     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff807`4c09e8d0 fffff807`45bf99ae     : 00000000`00000000 fffff807`41b8c180 fffff807`46527600 ffffe080`0a1f9080 : nt!KiRetireDpcList+0x1f4
fffff807`4c09eb60 00000000`00000000     : fffff807`4c09f000 fffff807`4c098000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e

0: kd> ~1
1: kd> !thread
THREAD ffff8901cdd11240  Cid 0000.0000  Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 1
Not impersonating
DeviceMap                 ffffb90161e487e0
Owning Process            fffff80746524a00       Image:         Idle
Attached Process          ffffe08fda702080       Image:         System
Wait Start TickCount      4224041        Ticks: 843 (0:00:00:13.171)
Context Switch Count      17736340       IdealProcessor: 1
UserTime                  00:00:00.000
KernelTime                16:25:11.890
Win32 Start Address nt!KiIdleLoop (0xfffff80745bf9910)
Stack Init ffff8781cfe2fb90 Current ffff8781cfe2fb20
Base ffff8781cfe30000 Limit ffff8781cfe29000 Call 0000000000000000
Priority 0 BasePriority 0 PriorityDecrement 0 IoPriority 0 PagePriority 0
Child-SP          RetAddr               : Args to Child                                                           : Call Site
ffff8781`cfe2f5b0 fffff807`45a71396     : 00000000`000002e5 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PpmIdleGuestExecute+0x1d
ffff8781`cfe2f5f0 fffff807`45a70154     : 00000000`00000000 00001f80`00000006 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0x10c6
ffff8781`cfe2f9f0 fffff807`45bf9964     : ffffffff`00000000 ffff8901`cdd11240 ffffe080`087e2080 00000000`00000ed4 : nt!PoIdle+0x374
ffff8781`cfe2fb60 00000000`00000000     : ffff8781`cfe30000 ffff8781`cfe29000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54

1: kd> ~2
2: kd> !thread
THREAD ffff8901cdb91240  Cid 0000.0000  Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 2
Not impersonating
DeviceMap                 ffffb90161e487e0
Owning Process            fffff80746524a00       Image:         Idle
Attached Process          ffffe08fda702080       Image:         System
Wait Start TickCount      4224760        Ticks: 124 (0:00:00:01.937)
Context Switch Count      53325912       IdealProcessor: 2
UserTime                  00:00:00.000
KernelTime                15:29:46.312
Win32 Start Address nt!KiIdleLoop (0xfffff80745bf9910)
Stack Init ffff8781cfe3fb90 Current ffff8781cfe3fb20
Base ffff8781cfe40000 Limit ffff8781cfe39000 Call 0000000000000000
Priority 0 BasePriority 0 PriorityDecrement 0 IoPriority 0 PagePriority 0
Child-SP          RetAddr               : Args to Child                                                           : Call Site
ffff8781`cfe3f5b0 fffff807`45a71396     : 00000000`0000028e 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PpmIdleGuestExecute+0x1d
ffff8781`cfe3f5f0 fffff807`45a70154     : 00000000`00000000 00001f80`00000000 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0x10c6
ffff8781`cfe3f9f0 fffff807`45bf9964     : ffffffff`00000000 ffff8901`cdb91240 ffffe080`096cc080 00000000`000011a0 : nt!PoIdle+0x374
ffff8781`cfe3fb60 00000000`00000000     : ffff8781`cfe40000 ffff8781`cfe39000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54

2: kd> ~3
3: kd> !thread
THREAD ffffe080056ee080  Cid 6f58.68e4  Teb: 000000b34cf62000 Win32Thread: ffffe08003d6ef00 RUNNING on processor 3
IRP List:
    ffffe08006370010: (0006,0868) Flags: 00060070  Mdl: 00000000
Not impersonating
DeviceMap                 ffffb90161e487e0
Owning Process            ffffe080097eb080       Image:         WmiApSrv.exe
Attached Process          N/A            Image:         N/A
Wait Start TickCount      4224884        Ticks: 0
Context Switch Count      1877           IdealProcessor: 3
UserTime                  00:00:00.062
KernelTime                00:00:01.031
Win32 Start Address 0x00007ffc0f00df30
Stack Init ffff8781d14bbb90 Current ffff8781d14b99c0
Base ffff8781d14bc000 Limit ffff8781d14b5000 Call 0000000000000000
Priority 8 BasePriority 8 PriorityDecrement 0 IoPriority 2 PagePriority 5
Unable to load image \SystemRoot\System32\drivers\esif_lf.sys, Win32 error 0n2
Child-SP          RetAddr               : Args to Child                                                           : Call Site
ffff8781`d14b97f0 fffff807`45d10e7c     : ffff8901`cdec0180 00000000`00000000 00000000`00000000 ffffe08f`ddc39b0e : nt!KxWaitForSpinLockAndAcquire+0x2c
ffff8781`d14b9820 fffff807`45c5a9ab     : fffff807`49a11f98 ffffe080`08883700 00000000`0000006e 00000099`c6d69976 : nt!KiAcquireSpinLockInstrumented+0xb0
ffff8781`d14b9870 fffff807`499f0b9d     : fffff795`0001d780 00000000`0000000d fffff795`0001d8d8 ffffe08f`dc733c30 : nt!KeAcquireSpinLockRaiseToDpc+0x17626b
ffff8781`d14b98a0 fffff807`499e3661     : ffffe08f`dc733c30 ffffe08f`dc733c00 00000000`00000001 ffffe08f`dc733c30 : ACPI!ACPIVectorDisable+0x2d
ffff8781`d14b98e0 fffff807`499e4272     : ffffe08f`dc733c30 ffffe08f`dc733c00 00000000`00000001 ffffe08f`dc733c30 : ACPI!ACPIEcMaskInterrupt+0x39
ffff8781`d14b9910 fffff807`499e3576     : 00000000`00000000 ffffe08f`dc733c88 ffffe08f`dc733c88 00000000`00000000 : ACPI!ACPIEcServiceDevice+0x72
ffff8781`d14b9940 fffff807`499e33fd     : 00000000`00000001 ffffe080`08883780 fffff807`499b3a90 ffffcae5`7823ff40 : ACPI!ACPIEcQueueEcIrp+0x136
ffff8781`d14b9980 fffff807`499b742e     : ffffe08f`ddbd46f8 00000000`00000000 00000000`00000000 ffffe08f`fd145720 : ACPI!ACPIEcOpRegionHandler+0x4d
ffff8781`d14b99d0 fffff807`499b97cf     : ffffe080`08883740 00000000`00000001 ffffe08f`fd145d58 fffff807`499b442a : ACPI!InternalOpRegionHandler+0x6e
ffff8781`d14b9a30 fffff807`49994c00     : ffffe08f`fd145720 ffff8781`d14b9b79 ffffe08f`fd1458a8 00000000`00000000 : ACPI!WriteCookAccess+0x12f
ffff8781`d14b9ab0 fffff807`49994685     : 00000000`00000000 ffffe08f`fd145720 00000000`00000000 00000000`00000009 : ACPI!RunContext+0x1f0
ffff8781`d14b9be0 fffff807`49995ffe     : 00000000`00000000 ffff8781`d14b9d40 00000000`00000000 ffffe08f`fd145900 : ACPI!InsertReadyQueue+0x2a5
ffff8781`d14b9c40 fffff807`49994308     : 00000000`00000001 00000000`00000005 00000000`0032c000 ffffe08f`ddc39970 : ACPI!AsyncEvalObject+0xb2e
ffff8781`d14b9d80 fffff807`4999b989     : ffff8781`00000000 ffffe08f`ddc39970 00000000`00000000 00000000`0032c03c : ACPI!SyncEvalObject+0x238
ffff8781`d14b9e30 fffff807`4999b7aa     : 00000000`00000000 ffffb901`82ae1b10 00000000`00000000 00000000`00000000 : ACPI!AMLIEvalNameSpaceObject+0xa9
ffff8781`d14b9e90 fffff807`4999b667     : ffffe080`010d9c80 fffff807`00000000 ffffb901`82ae1b10 ffffe08f`ddc399e8 : ACPI!ACPIIoctlEvalControlMethod+0xa6
ffff8781`d14b9f20 fffff807`499910d6     : ffffe08f`da70a010 00000000`00000007 ffffe080`010d9d98 fffff807`45b15121 : ACPI!ACPIIrpDispatchDeviceControl+0x187
ffff8781`d14b9f60 fffff807`45a52f55     : 00000000`00000007 00000000`00000001 ffff8781`d14ba0b9 ffff8781`d14ba1b0 : ACPI!ACPIDispatchIrp+0xc6
ffff8781`d14b9fe0 fffff807`496e35a7     : 00000000`00000010 00000000`00000000 ffff8781`d14ba1b0 ffff8781`d14ba0b9 : nt!IofCallDriver+0x55
ffff8781`d14ba020 fffff807`496e1eb3     : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000001 : Wdf01000+0x35a7
ffff8781`d14ba050 fffff807`496f7b97     : 00000000`00000000 ffff8781`d14ba200 ffff8781`00000000 00000000`00000000 : Wdf01000+0x1eb3
ffff8781`d14ba120 fffff807`496f7a08     : ffffe08f`fa1325c0 fffff807`496f79c0 ffff8781`d14ba530 ffff8781`00000018 : Wdf01000+0x17b97
ffff8781`d14ba3c0 fffff807`60a3ace7     : 00000000`00000000 00000000`00000000 00000070`00000070 00000000`000000c0 : Wdf01000+0x17a08
ffff8781`d14ba420 fffff807`60a3be67     : ffff8781`d14ba660 00000000`00000001 ffff8781`d14ba660 00000000`00000001 : esif_lf+0x2ace7
ffff8781`d14ba4e0 fffff807`60a3bc98     : ffffe08f`fa9be920 fffff807`60a13306 00000000`00000000 ffffe08f`fa9e60d0 : esif_lf+0x2be67
ffff8781`d14ba580 fffff807`60a15829     : 00000000`00000000 ffff8781`d14ba679 00000000`00000001 00000000`ffffffff : esif_lf+0x2bc98
ffff8781`d14ba5f0 fffff807`60a1df82     : 00000000`00000000 fffff807`60a156c0 ffffe08f`f643bf20 00000000`00000000 : esif_lf+0x5829
ffff8781`d14ba6d0 fffff807`60a2b1c5     : ffffe08f`fab05010 ffffe08f`facb46a0 ffffe08f`fab05010 ffffe080`01c8e1e0 : esif_lf+0xdf82
ffff8781`d14ba780 fffff807`60a2b057     : 00000000`00000000 00000000`00000000 ffff8781`d14ba940 ffff8781`d14ba958 : esif_lf+0x1b1c5
ffff8781`d14ba800 fffff807`60a2b129     : fffff807`00000001 00000000`00000000 00000000`00000000 00000000`0000442e : esif_lf+0x1b057
ffff8781`d14ba910 fffff807`60a2e065     : 00000000`00000001 fffff807`60a2dfac 00000000`00000000 00000000`00000070 : esif_lf+0x1b129
ffff8781`d14ba990 fffff807`60a1a056     : ffff8901`cdec0180 fffff807`45a4a31a ffff8781`d14bae40 ffff8781`d14bab49 : esif_lf+0x1e065
ffff8781`d14baa40 fffff807`60a195fb     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff807`496e3402 : esif_lf+0xa056
ffff8781`d14baac0 fffff807`60a1df82     : 00000000`00000000 fffff807`45c5a9ab ffffe08f`f643bf20 fffff807`60a19160 : esif_lf+0x95fb
ffff8781`d14baba0 fffff807`60a2b1c5     : ffffe08f`fab05010 ffffe08f`facb46a0 ffffe08f`fab05010 ffffe080`01c8c110 : esif_lf+0xdf82
ffff8781`d14bac50 fffff807`60a2b057     : 00000000`00000000 00000000`00000000 ffff8781`d14bae40 ffff8781`d14bae58 : esif_lf+0x1b1c5
ffff8781`d14bacd0 fffff807`60a659af     : ffffe08f`f89ffd70 ffff8781`d14bae69 00000000`00000001 00000000`00000000 : esif_lf+0x1b057
ffff8781`d14bade0 fffff807`4971edc7     : ffffe08f`da6d3780 ffffe08f`f89ffc80 ffffe08f`f89ffc80 fffff807`496ec900 : esif_lf+0x559af
ffff8781`d14baed0 fffff807`49720771     : 00000000`00000000 00000000`00000210 00000000`c0000095 00000000`00000000 : Wdf01000+0x3edc7
ffff8781`d14baf50 fffff807`496f8122     : 00000000`00000000 ffffe080`06370010 ffffe08f`fa991ba0 ffffe08f`da6d3780 : Wdf01000+0x40771

3: kd> ~4
4: kd> !thread
THREAD ffff8901cdf8c240  Cid 0000.0000  Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 4
Not impersonating
DeviceMap                 ffffb90161e487e0
Owning Process            fffff80746524a00       Image:         Idle
Attached Process          ffffe08fda702080       Image:         System
Wait Start TickCount      4224826        Ticks: 58 (0:00:00:00.906)
Context Switch Count      49293452       IdealProcessor: 4
UserTime                  00:00:00.000
KernelTime                15:49:38.125
Win32 Start Address nt!KiIdleLoop (0xfffff80745bf9910)
Stack Init ffff8781cfe5fb90 Current ffff8781cfe5fb20
Base ffff8781cfe60000 Limit ffff8781cfe59000 Call 0000000000000000
Priority 0 BasePriority 0 PriorityDecrement 0 IoPriority 0 PagePriority 0
Child-SP          RetAddr               : Args to Child                                                           : Call Site
ffff8781`cfe5f5b0 fffff807`45a71396     : 00000000`000003bf 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PpmIdleGuestExecute+0x1d
ffff8781`cfe5f5f0 fffff807`45a70154     : 00000000`00000000 00001f80`00000006 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0x10c6
ffff8781`cfe5f9f0 fffff807`45bf9964     : 00000000`00000000 ffff8901`cdf8c240 ffffe080`05ac1080 00000000`00000a6c : nt!PoIdle+0x374
ffff8781`cfe5fb60 00000000`00000000     : ffff8781`cfe60000 ffff8781`cfe59000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54

4: kd> ~5
5: kd> !thread
THREAD ffff8901ce0cb240  Cid 0000.0000  Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 5
Not impersonating
DeviceMap                 ffffb90161e487e0
Owning Process            fffff80746524a00       Image:         Idle
Attached Process          ffffe08fda702080       Image:         System
Wait Start TickCount      4224884        Ticks: 0
Context Switch Count      26358452       IdealProcessor: 5
UserTime                  00:00:00.000
KernelTime                16:58:34.375
Win32 Start Address nt!KiIdleLoop (0xfffff80745bf9910)
Stack Init ffff8781cfe6fb90 Current ffff8781cfe6fb20
Base ffff8781cfe70000 Limit ffff8781cfe69000 Call 0000000000000000
Priority 0 BasePriority 0 PriorityDecrement 0 IoPriority 0 PagePriority 0
Child-SP          RetAddr               : Args to Child                                                           : Call Site
ffff8781`cfe6f5b0 fffff807`45a71396     : 00000000`00000082 00000000`00000000 00000000`00000000 00000000`030b867a : nt!PpmIdleGuestExecute+0x1d
ffff8781`cfe6f5f0 fffff807`45a70154     : 00000000`00000000 00001f80`00000000 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0x10c6
ffff8781`cfe6f9f0 fffff807`45bf9964     : 00000000`00000000 ffff8901`ce0cb240 ffffe08f`da703040 00000000`000004aa : nt!PoIdle+0x374
ffff8781`cfe6fb60 00000000`00000000     : ffff8781`cfe70000 ffff8781`cfe69000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54

5: kd> ~6
6: kd> !thread
THREAD ffff8901ce1cb240  Cid 0000.0000  Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 6
Not impersonating
DeviceMap                 ffffb90161e487e0
Owning Process            fffff80746524a00       Image:         Idle
Attached Process          ffffe08fda702080       Image:         System
Wait Start TickCount      4224828        Ticks: 56 (0:00:00:00.875)
Context Switch Count      37894422       IdealProcessor: 6
UserTime                  00:00:00.000
KernelTime                15:37:13.671
Win32 Start Address nt!KiIdleLoop (0xfffff80745bf9910)
Stack Init ffff8781cfe7fb90 Current ffff8781cfe7fb20
Base ffff8781cfe80000 Limit ffff8781cfe79000 Call 0000000000000000
Priority 0 BasePriority 0 PriorityDecrement 0 IoPriority 0 PagePriority 0
Child-SP          RetAddr               : Args to Child                                                           : Call Site
ffff8781`cfe7f5b0 fffff807`45a71396     : 00000000`000003aa 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PpmIdleGuestExecute+0x1d
ffff8781`cfe7f5f0 fffff807`45a70154     : 00000000`00000000 00001f80`00000000 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0x10c6
ffff8781`cfe7f9f0 fffff807`45bf9964     : 00000000`00000000 ffff8901`ce1cb240 ffffe080`07321080 00000000`00000930 : nt!PoIdle+0x374
ffff8781`cfe7fb60 00000000`00000000     : ffff8781`cfe80000 ffff8781`cfe79000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54

6: kd> ~7
7: kd> !thread
THREAD ffff8901ce2cb240  Cid 0000.0000  Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 7
Not impersonating
DeviceMap                 ffffb90161e487e0
Owning Process            fffff80746524a00       Image:         Idle
Attached Process          ffffe08fda702080       Image:         System
Wait Start TickCount      4224821        Ticks: 63 (0:00:00:00.984)
Context Switch Count      26774026       IdealProcessor: 7
UserTime                  00:00:00.000
KernelTime                16:21:44.234
Win32 Start Address nt!KiIdleLoop (0xfffff80745bf9910)
Stack Init ffff8781cfe8fb90 Current ffff8781cfe8fb20
Base ffff8781cfe90000 Limit ffff8781cfe89000 Call 0000000000000000
Priority 0 BasePriority 0 PriorityDecrement 0 IoPriority 0 PagePriority 0
Child-SP          RetAddr               : Args to Child                                                           : Call Site
ffff8781`cfe8f5b0 fffff807`45a71396     : 00000000`00000280 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PpmIdleGuestExecute+0x1d
ffff8781`cfe8f5f0 fffff807`45a70154     : 00000000`00000000 00001f80`00000006 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0x10c6
ffff8781`cfe8f9f0 fffff807`45bf9964     : 00000000`00000000 ffff8901`ce2cb240 ffffe08f`dcdb4040 00000000`000017e5 : nt!PoIdle+0x374
ffff8781`cfe8fb60 00000000`00000000     : ffff8781`cfe90000 ffff8781`cfe89000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54

7: kd> ~8
8 is not a valid processor number