*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80568a5e63a, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ExceptionRecord ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ContextRecord ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ExceptionRecord ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ContextRecord ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2500
Key : Analysis.Elapsed.mSec
Value: 3393
Key : Analysis.IO.Other.Mb
Value: 2
Key : Analysis.IO.Read.Mb
Value: 2
Key : Analysis.IO.Write.Mb
Value: 4
Key : Analysis.Init.CPU.mSec
Value: 62
Key : Analysis.Init.Elapsed.mSec
Value: 10026
Key : Analysis.Memory.CommitPeak.Mb
Value: 157
Key : Bugcheck.Code.KiBugCheckData
Value: 0x1e
Key : Bugcheck.Code.LegacyAPI
Value: 0x1e
Key : Failure.Bucket
Value: AV_R_CLASSPNP!ClasspSendSynchronousCompletion
Key : Failure.Hash
Value: {369d1b4e-50f5-d176-9262-a02ba6b5c7e2}
Key : WER.OS.Branch
Value: ni_release_svc_prod3
Key : WER.OS.Version
Value: 10.0.22621.1928
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80568a5e63a
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
FILE_IN_CAB: 082323-9875-01.dmp
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: fffff8056951c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: 173c27cb58dd7486 -- (.trap 0x173c27cb58dd7486)
Unable to read trap frame at 173c27cb`58dd7486
STACK_TEXT:
ffff8000`6031e0e8 fffff805`68d65fba : 00000000`0000001e ffffffff`c0000005 fffff805`68a5e63a 00000000`00000000 : nt!KeBugCheckEx
ffff8000`6031e0f0 fffff805`68c3c4c2 : ffff8000`6031e900 ffff8000`6031e1c0 fffff805`68800000 fffff805`68c3604e : nt!HvlpVtlCallExceptionHandler+0x22
ffff8000`6031e130 fffff805`68a6e8b3 : ffffdc0f`d4737950 ffffdc0f`d4736cf8 fffff805`68c3604e fffff805`688f3108 : nt!RtlpExecuteHandlerForException+0x12
ffff8000`6031e160 fffff805`68b22e5e : ffffffff`ffffffff ffffdc0f`d4736da0 ffffdc0f`d4736da0 ffff8000`6031e900 : nt!RtlDispatchException+0x2f3
ffff8000`6031e8d0 fffff805`68c32412 : ab86caac`a74218a9 92f2498f`1f77c908 173c27cb`58dd7486 3e8d2421`204c75a7 : nt!KiDispatchException+0x1ae
ffff8000`6031efb0 fffff805`68c323e0 : fffff805`68c469f5 00000000`00000000 00000000`00000000 ffffdc0f`d4736d10 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffdc0f`d4736bb8 fffff805`68c469f5 : 00000000`00000000 00000000`00000000 ffffdc0f`d4736d10 fffff805`68b5c18b : nt!KiExceptionDispatchOnExceptionStackContinue
ffffdc0f`d4736bc0 fffff805`68c41a83 : ffffc80f`ef1f5ee8 00000000`00000000 ffffc80f`ef2dd010 00000000`c1000002 : nt!KiExceptionDispatch+0x135
ffffdc0f`d4736da0 fffff805`68a5e63a : ffffc80f`ecc08000 fffff805`68b50b3c ffffc80f`ecc080e0 00000000`00000000 : nt!KiGeneralProtectionFault+0x343
ffffdc0f`d4736f30 fffff805`6bf78a04 : ffffc80f`ecc080e0 fffff805`68b4e515 ffffc80f`ecc08020 00000000`00000006 : nt!KeSetEvent+0xa
ffffdc0f`d4736fc0 fffff805`68a7dbc4 : ffffffff`ffffffff 00000000`00000000 ffffffff`ffffffff ffffc80f`ef2dc9b0 : CLASSPNP!ClasspSendSynchronousCompletion+0x54
ffffdc0f`d4737000 fffff805`68a7da77 : ffffc800`0bbc6aa0 ffffc80f`ef2e2101 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x134
ffffdc0f`d47370e0 fffff805`6b052aef : ffffc80f`ef32c058 ffffc80f`ef32c058 00000000`00000000 00000000`00000000 : nt!IofCompleteRequest+0x17
ffffdc0f`d4737110 fffff805`6b051d73 : 00000000`00000001 ffffc80f`ef32d050 00000000`00000000 00000000`00000000 : storport!RaidCompleteRequestEx+0x7f
ffffdc0f`d47371e0 fffff805`6b05de6b : ffffffff`fffd9da6 00000000`00000000 ffffc80f`ef2f0580 fffff780`00000320 : storport!RaidUnitCompleteRequest+0x603
ffffdc0f`d4737370 fffff805`68b439fc : 00000000`00000001 00000000`00000001 00000000`00000000 fffff805`90e73c4b : storport!RaidpAdapterRedirectDpcRoutine+0x8b
ffffdc0f`d4737410 fffff805`68b429ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x42c
ffffdc0f`d4737950 fffff805`68c3604e : 00000000`00000000 ffff8000`602a7180 ffffc80f`ecc46080 ffffc80f`fe6e6080 : nt!KiRetireDpcList+0x1ba
ffffdc0f`d4737c00 00000000`00000000 : ffffdc0f`d4738000 ffffdc0f`d4731000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: CLASSPNP!ClasspSendSynchronousCompletion+54
MODULE_NAME: CLASSPNP
IMAGE_NAME: CLASSPNP.SYS
IMAGE_VERSION: 10.0.22621.1690
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 54
FAILURE_BUCKET_ID: AV_R_CLASSPNP!ClasspSendSynchronousCompletion
OS_VERSION: 10.0.22621.1928
BUILDLAB_STR: ni_release_svc_prod3
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {369d1b4e-50f5-d176-9262-a02ba6b5c7e2}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: ffffe35a6f82afbc, Address of the instruction which caused the BugCheck
Arg3: ffffbb812bfc6e00, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1671
Key : Analysis.Elapsed.mSec
Value: 12641
Key : Analysis.IO.Other.Mb
Value: 1
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 2
Key : Analysis.Init.CPU.mSec
Value: 109
Key : Analysis.Init.Elapsed.mSec
Value: 6620
Key : Analysis.Memory.CommitPeak.Mb
Value: 154
Key : Bugcheck.Code.LegacyAPI
Value: 0x3b
Key : Failure.Bucket
Value: AV_win32kbase!DirectComposition::CApplicationChannel::ReleaseResource
Key : Failure.Hash
Value: {8493248d-fe3d-c7ca-63a2-ff7dbf52dfec}
Key : WER.OS.Branch
Value: ni_release_svc_prod3
Key : WER.OS.Version
Value: 10.0.22621.1928
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffffe35a6f82afbc
BUGCHECK_P3: ffffbb812bfc6e00
BUGCHECK_P4: 0
FILE_IN_CAB: 082023-10140-01.dmp
CONTEXT: ffffbb812bfc6e00 -- (.cxr 0xffffbb812bfc6e00)
rax=0000000000000001 rbx=7fffe68bac1d89e0 rcx=ffffe68b9d3da010
rdx=7fffe68bac1d89e0 rsi=0000000000000000 rdi=ffffe68b9d3da010
rip=ffffe35a6f82afbc rsp=ffffbb812bfc7820 rbp=ffffe68b9d3da010
r8=ffffe68bac09daf0 r9=ffffe68b9dcbe198 r10=ffffe68b9d3da010
r11=00000000c000000d r12=0000000000000000 r13=ffffe68b9d3da010
r14=ffffe68bac09dd10 r15=fffff803df5f0010
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
win32kbase!DirectComposition::CApplicationChannel::ReleaseResource+0x20:
ffffe35a`6f82afbc 48ff4a18 dec qword ptr [rdx+18h] ds:002b:7fffe68b`ac1d89f8=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
STACK_TEXT:
ffffbb81`2bfc7820 ffffe35a`6f809bc1 : ffffe68b`9dcbe198 ffffe68b`ac09daf0 00000000`00000000 00000000`00000000 : win32kbase!DirectComposition::CApplicationChannel::ReleaseResource+0x20
ffffbb81`2bfc7850 ffffe35a`6f824abc : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000000 : win32kbase!DirectComposition::CCompositionLightMarshaler::ReleaseResourceMarshalers+0x35
ffffbb81`2bfc7880 ffffe35a`6f880b0f : 00000000`00000000 00000000`00000001 ffffe68b`9d3da010 00000000`66624344 : win32kbase!DirectComposition::CPrimitiveGroupMarshaler::SetReferenceArrayProperty+0x7c
ffffbb81`2bfc78c0 ffffe35a`6f895204 : 00000000`00000000 ffffe68b`8f0c9c00 00000000`00000000 ffffbb81`2bfc7b20 : win32kbase!DirectComposition::CApplicationChannel::SetResourceReferenceArrayProperty+0x123
ffffbb81`2bfc7930 ffffe35a`6f894bc0 : ffffe68b`9d3da010 fffff803`df5f0014 00000000`00000000 00000000`00000001 : win32kbase!DirectComposition::CApplicationChannel::ProcessCommandBufferIterator+0x5a0
ffffbb81`2bfc79d0 ffffe35a`6fe5ff79 : ffffbb81`0000002a fffff803`00000014 00000091`ea3fca20 00000091`ea3fca10 : win32kbase!NtDCompositionProcessChannelBatchBuffer+0x170
ffffbb81`2bfc7a60 fffff803`82e45fe8 : ffffd089`ac0cc080 00000267`fdd5a25c 00000000`00000000 00000000`00044d01 : win32k!NtDCompositionProcessChannelBatchBuffer+0x15
ffffbb81`2bfc7aa0 00007ffd`224c3b14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000091`ea3fc988 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`224c3b14
SYMBOL_NAME: win32kbase!DirectComposition::CApplicationChannel::ReleaseResource+20
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.22621.1125
STACK_COMMAND: .cxr 0xffffbb812bfc6e00 ; kb
BUCKET_ID_FUNC_OFFSET: 20
FAILURE_BUCKET_ID: AV_win32kbase!DirectComposition::CApplicationChannel::ReleaseResource
OS_VERSION: 10.0.22621.1928
BUILDLAB_STR: ni_release_svc_prod3
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8493248d-fe3d-c7ca-63a2-ff7dbf52dfec}
Followup: MachineOwner
---------