Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffaa0bbabc6500, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000, The process object that initiated the termination.
Arg4: 0000000000000000
Debugging Details:
------------------
ETW minidump data unavailable
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1093
Key : Analysis.Elapsed.mSec
Value: 9610
Key : Analysis.IO.Other.Mb
Value: 8
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 16
Key : Analysis.Init.CPU.mSec
Value: 561
Key : Analysis.Init.Elapsed.mSec
Value: 1834250
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Bugcheck.Code.LegacyAPI
Value: 0xef
Key : Bugcheck.Code.TargetModel
Value: 0xef
Key : CriticalProcessDied.ExceptionCode
Value: 22209800
Key : CriticalProcessDied.Process
Value: svchost.exe
Key : Dump.Attributes.AsUlong
Value: c
Key : Dump.Attributes.InsufficientDumpfileSize
Value: 1
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.RequiredDumpfileSize
Value: 0x12705f83f4
Key : Failure.Bucket
Value: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_22209800_nt!PspCatchCriticalBreak
Key : Failure.Hash
Value: {4d8edfb2-4f2b-c20b-df09-3db481f3c676}
Key : WER.OS.Branch
Value: rs1_release
Key : WER.OS.Version
Value: 10.0.14393.5921
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffaa0bbabc6500
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
FILE_IN_CAB: 052124-49625-01.dmp
DUMP_FILE_ATTRIBUTES: 0xc
Insufficient Dumpfile Size
Kernel Generated Triage Dump
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
ERROR_CODE: (NTSTATUS) 0x22209800 - <Unable to get error code text>
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffffdd00`e7bd32b8 fffff802`52682da2 : 00000000`000000ef ffffaa0b`babc6500 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffdd00`e7bd32c0 fffff802`525e67bb : ffffaa0b`babc6500 ffffb205`22209b80 00000000`00000000 00000000`00000000 : nt!PspCatchCriticalBreak+0xd6
ffffdd00`e7bd3320 fffff802`5244111d : ffffaa0b`00000001 ffffaa0b`babc6500 ffffb205`22209b80 00000000`00000000 : nt!PspTerminateAllThreads+0xe56cf
ffffdd00`e7bd3390 fffff802`52440ed4 : ffffaa0b`babc6500 00000000`c0000005 ffffaa0b`babc6500 ffffb205`22209800 : nt!PspTerminateProcess+0x101
ffffdd00`e7bd33d0 fffff802`52170c03 : ffffaa0b`babc6500 ffffb205`22209800 ffffdd00`e7bd34c0 ffffffff`ffffffff : nt!NtTerminateProcess+0x9c
ffffdd00`e7bd3440 00007ffe`7aa26214 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000049`c637fc28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`7aa26214
SYMBOL_NAME: nt!PspCatchCriticalBreak+d6
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.14393.5921
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: d6
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_22209800_nt!PspCatchCriticalBreak
OS_VERSION: 10.0.14393.5921
BUILDLAB_STR: rs1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4d8edfb2-4f2b-c20b-df09-3db481f3c676}
Followup: MachineOwner
---------