or et
Kairox
80+
Bugün, 18:55
Sayfa işareti ekle (bookmark)
#3
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`7c800000 PsLoadedModuleList = 0xfffff805`7d42a390
Debug session time: Fri Feb 19 16:58:17.488 2021 (UTC + 3:00)
System Uptime: 0 days 0:47:28.206
Loading Kernel Symbols
...............................................................
................................................................
.........................................................
Loading User Symbols
Loading unloaded module list
............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`7cbf5a80 48894c2408 mov qword ptr [rsp+8],rcx ss:ffff8e86`09339790=000000000000001e
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: ffffcbadf405179f, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5702
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-ASUFFRK
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 37280
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: ffffcbadf405179f
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff8057d4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8057d40f330: Unable to get Flags value from nt!KdVersionBlock
fffff8057d40f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
EXCEPTION_PARAMETER2: ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: mmc.exe
STACK_TEXT:
ffff8e86`09339788 fffff805`7cc914d3 : 00000000`0000001e ffffffff`c0000005 ffffcbad`f405179f 00000000`00000000 : nt!KeBugCheckEx
ffff8e86`09339790 fffff805`7cc07bac : ffffcb81`c0fd1bd0 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x166ad3
ffff8e86`09339e50 fffff805`7cc038e0 : fffff805`7ca61420 ffffcbad`f405142d ffffcb81`c76c0e00 ffffa70e`d371a5e0 : nt!KiExceptionDispatch+0x12c
ffff8e86`0933a030 ffffcbad`f405179f : 00000000`210416cf 00000000`00000001 ffffcb81`c09f0e00 00000000`00040047 : nt!KiGeneralProtectionFault+0x320
ffff8e86`0933a1c8 fffff805`7caef77f : ffffcbad`f4045aee 00000000`00000000 00000000`00000001 00000000`00000001 : win32kbase!RGNOBJ::vCopy+0xf
ffff8e86`0933a1f8 ffffcbad`f4045aee : 00000000`00000000 00000000`00000001 00000000`00000001 ffffcbad`f4016b4b : nt!PerfInfoLogInterrupt+0x13f
ffff8e86`0933a200 00000000`08000000 : ffffcb81`c09f0e00 00000000`00000060 00000000`00000000 00000000`00000000 : win32kbase!ThreadUnlock1+0x6e
ffff8e86`0933a230 ffffcb81`c09f0e00 : 00000000`00000060 00000000`00000000 00000000`00000000 00000000`00000001 : 0x8000000
ffff8e86`0933a238 00000000`00000060 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000060 : 0xffffcb81`c09f0e00
ffff8e86`0933a240 00000000`00000000 : 00000000`00000000 00000000`00000001 00000000`00000060 00000000`00000000 : 0x60
SYMBOL_NAME: win32kbase!RGNOBJ::vCopy+f
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.19041.1136
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: f
FAILURE_BUCKET_ID: 0x1E_c0000005_R_win32kbase!RGNOBJ::vCopy
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a1324c4f-917b-c5cb-7c63-f671fa41245e}
Followup: MachineOwner
---------