WINLOGON_FATAL_ERROR (c000021a)
The Winlogon process terminated unexpectedly.
Arguments:
Arg1: ffffab07b66ae0e0, String that identifies the problem.
Arg2: ffffffffc0000428, Error Code.
Arg3: 0000000000000000
Arg4: 0000012a2d000000
Debugging Details:
------------------
ETW minidump data unavailable
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2437
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11316
Key : Analysis.IO.Other.Mb
Value: 6
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 18
Key : Analysis.Init.CPU.mSec
Value: 234
Key : Analysis.Init.Elapsed.mSec
Value: 8784
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Bugcheck.Code.DumpHeader
Value: 0xc000021a
Key : Bugcheck.Code.Register
Value: 0x4c
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 120921-27203-01.dmp
ERROR_CODE: (NTSTATUS) 0xc000021a - { nemli Sistem Hatas } %hs sistem i lemi, 0x
EXCEPTION_CODE_STR: c000021a
EXCEPTION_PARAMETER1: ffffab07b66ae0e0
EXCEPTION_PARAMETER2: ffffffffc0000428
EXCEPTION_PARAMETER3: 0000000000000000
EXCEPTION_PARAMETER4: 12a2d000000
BUGCHECK_CODE: c000021a
BUGCHECK_P1: ffffab07b66ae0e0
BUGCHECK_P2: ffffffffc0000428
BUGCHECK_P3: 0
BUGCHECK_P4: 12a2d000000
PROCESS_NAME: smss.exe
ADDITIONAL_DEBUG_TEXT: initial session process or
IMAGE_NAME: ntkrnlmp.exe
MODULE_NAME: nt
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffffe18a`cbd80598 fffff803`5f5ae38a : 00000000`0000004c 00000000`c000021a ffffe18a`cbea03f0 ffffc00a`42854d10 : nt!KeBugCheckEx
ffffe18a`cbd805a0 fffff803`5f58f31b : ffffe18a`cbd806c0 ffffe18a`cbd80660 ffffe18a`cbd806c0 ffffe18a`cbd80660 : nt!PopGracefulShutdown+0x29a
ffffe18a`cbd805e0 fffff803`5f595e6c : 00000000`00000001 fffff803`00000006 00000000`00000005 00000000`00000000 : nt!PopTransitionSystemPowerStateEx+0x1217
ffffe18a`cbd806a0 fffff803`5f008cb8 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!NtSetSystemPowerState+0x4c
ffffe18a`cbd80880 fffff803`5effb100 : fffff803`5f443a9b 00000000`00000014 ffffffff`ffffff00 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
ffffe18a`cbd80a18 fffff803`5f443a9b : 00000000`00000014 ffffffff`ffffff00 00000000`00000000 fffff803`5f8239a0 : nt!KiServiceLinkage
ffffe18a`cbd80a20 fffff803`5f363379 : 00000000`00000000 ffffc00a`3fd17a60 00000000`00000000 00000000`00000000 : nt!PopIssueActionRequest+0xe0603
ffffe18a`cbd80ac0 fffff803`5ef53764 : 00000000`00000001 00000000`00000000 ffffffff`ffffffff fffff803`5f823900 : nt!PopPolicyWorkerAction+0x79
ffffe18a`cbd80b30 fffff803`5eeb8515 : ffffc00a`00000001 ffffc00a`41b32040 fffff803`5ef536d0 ffffc00a`00000000 : nt!PopPolicyWorkerThread+0x94
ffffe18a`cbd80b70 fffff803`5ef55855 : ffffc00a`41b32040 00000000`00000080 ffffc00a`3fc9f040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffe18a`cbd80c10 fffff803`5effe8f8 : ffffd080`ede80180 ffffc00a`41b32040 fffff803`5ef55800 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffe18a`cbd80c60 00000000`00000000 : ffffe18a`cbd81000 ffffe18a`cbd7b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!PopTransitionSystemPowerStateEx+1217
IMAGE_VERSION: 10.0.19041.1348
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1217
FAILURE_BUCKET_ID: 0xc000021a_SmpDestroyControlBlock_smss.exe_Terminated_c0000428_nt!PopTransitionSystemPowerStateEx
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {11c026a4-042b-4c24-02dc-2da456397475}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: ffffa1392b57e13c, Address of the instruction which caused the BugCheck
Arg3: ffffea80a7d9bbd0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3030
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11815
Key : Analysis.IO.Other.Mb
Value: 7
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 23
Key : Analysis.Init.CPU.mSec
Value: 311
Key : Analysis.Init.Elapsed.mSec
Value: 9998
Key : Analysis.Memory.CommitPeak.Mb
Value: 95
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 120821-28390-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffffa1392b57e13c
BUGCHECK_P3: ffffea80a7d9bbd0
BUGCHECK_P4: 0
CONTEXT: ffffea80a7d9bbd0 -- (.cxr 0xffffea80a7d9bbd0)
rax=0000000000000000 rbx=0000000000000000 rcx=ffffa1392b7c3ea4
rdx=0000000000000000 rsi=ffffa15c8060ed18 rdi=ffffa15c8060ed18
rip=ffffa1392b57e13c rsp=ffffea80a7d9c5d0 rbp=ffffea80a7d9c699
r8=0000000000000000 r9=0000000000000000 r10=ffffa15c8060b010
r11=0000000000000001 r12=0000000000000000 r13=ffffea80a7d9c780
r14=0000000000000005 r15=ffffa1392b7c3ea4
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
win32kfull!MAPPER::bFoundExactMatch+0x20c:
ffffa139`2b57e13c 66453b463c cmp r8w,word ptr [r14+3Ch] ds:002b:00000000`00000041=????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
ffffea80`a7d9c5d0 ffffa139`2b57def4 : ffffa15c`8060a6c0 ffffa15c`8060a6c0 ffffa15c`8066d470 ffffea80`a7d9c9e0 : win32kfull!MAPPER::bFoundExactMatch+0x20c
ffffea80`a7d9c700 ffffa139`2b57f7fc : 00000000`00000000 ffffa15c`846688a8 00000000`00000000 ffffa15c`8066d470 : win32kfull!ppfeGetAMatch+0x1e4
ffffea80`a7d9c8f0 ffffa139`2b57f2f5 : 00000000`00000000 00000000`00000000 ffffea80`a7d9c9e8 ffffea80`a7d9ca00 : win32kfull!LFONTOBJ::ppfeMapFont+0x28c
ffffea80`a7d9c9b0 ffffa139`2b57f095 : 00000000`00000000 00000000`00000020 ffffa15c`80615000 00000000`00000000 : win32kfull!GreGetTextFaceW+0x1d5
ffffea80`a7d9ca60 ffffa139`2bd0c081 : 00000000`190100d1 00000067`7ea7c600 ffffa139`2bd0c06c fffff804`3f21ddd0 : win32kfull!NtGdiGetTextFaceW+0x85
ffffea80`a7d9cac0 fffff804`3ea08cb8 : 00000067`7ea7c600 ffffea80`a7d9cb80 ffffea80`00000000 ffffa139`2bd0c06c : win32k!NtGdiGetTextFaceW+0x15
ffffea80`a7d9cb00 00007ffc`2e7d1fe4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000067`7ea7c508 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`2e7d1fe4
SYMBOL_NAME: win32kfull!MAPPER::bFoundExactMatch+20c
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.19041.1348
STACK_COMMAND: .cxr 0xffffea80a7d9bbd0 ; kb
BUCKET_ID_FUNC_OFFSET: 20c
FAILURE_BUCKET_ID: AV_win32kfull!MAPPER::bFoundExactMatch
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {44a94e3b-0111-b7b3-b6e9-09dcf25c0fd6}
Followup: MachineOwner
---------
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000002, A list entry was corrupt
Arg2: 00000000001664a7, entry in list being removed
Arg3: 000000000021f37f, highest physical page number
Arg4: 0000000000000001, reference count of entry being removed
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1827
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 10598
Key : Analysis.IO.Other.Mb
Value: 7
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 22
Key : Analysis.Init.CPU.mSec
Value: 250
Key : Analysis.Init.Elapsed.mSec
Value: 9167
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Bugcheck.Code.DumpHeader
Value: 0x4e
Key : Bugcheck.Code.Register
Value: 0x4e
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 120921-27437-01.dmp
BUGCHECK_CODE: 4e
BUGCHECK_P1: 2
BUGCHECK_P2: 1664a7
BUGCHECK_P3: 21f37f
BUGCHECK_P4: 1
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
TRAP_FRAME: ffff890103f6f460 -- (.trap 0xffff890103f6f460)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000007
rdx=00000000001717a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8024c6cc2a2 rsp=ffff890103f6f5f8 rbp=ffffa805f8466000
r8=000000000000001c r9=ffffbb8847952080 r10=ffffa805fd0957a0
r11=00000000000007a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!HvpGetCellPaged+0xa2:
fffff802`4c6cc2a2 418b02 mov eax,dword ptr [r10] ds:ffffa805`fd0957a0=ffffff98
Resetting default scope
STACK_TEXT:
ffff8901`03f6efa8 fffff802`4c2aa8f9 : 00000000`0000004e 00000000`00000002 00000000`001664a7 00000000`0021f37f : nt!KeBugCheckEx
ffff8901`03f6efb0 fffff802`4c2a9990 : 00000000`00000003 00000000`00000000 ffffa805`f8ac48e0 00000000`00000000 : nt!MiUnlinkPageFromList+0xc89
ffff8901`03f6f040 fffff802`4c2a8f74 : ffff8901`03f6f1e0 ffff8901`03f6f280 0000000f`ffffffff 80000001`664a7962 : nt!MiHandleTransitionFault+0x180
ffff8901`03f6f0c0 fffff802`4c2a11fe : ffff8901`03f6f1e0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiResolveTransitionFault+0x424
ffff8901`03f6f180 fffff802`4c29f119 : 00000000`00000000 00000000`00000000 00000000`c0000016 00000000`00000000 : nt!MiDispatchFault+0x3fe
ffff8901`03f6f2c0 fffff802`4c40545e : 00000000`00000000 00000000`000000c0 00000000`000000d0 00000000`00000000 : nt!MmAccessFault+0x189
ffff8901`03f6f460 fffff802`4c6cc2a2 : fffff802`4c5e69df 00000000`9817fa5c ffff8901`03f6f920 00000000`00000000 : nt!KiPageFault+0x35e
ffff8901`03f6f5f8 fffff802`4c5e69df : 00000000`9817fa5c ffff8901`03f6f920 00000000`00000000 ffffa805`f851e010 : nt!HvpGetCellPaged+0xa2
ffff8901`03f6f600 fffff802`4c5ec815 : 00000001`ffffffff 00000000`3d165065 ffff8901`03f70068 00000000`00000000 : nt!CmpDoCompareKeyName+0x2f
ffff8901`03f6f650 fffff802`4c5efa39 : ffffa805`f851e010 00000000`00000001 ffff8901`03f6f850 ffff8901`03f6f8d0 : nt!CmpWalkOneLevel+0x6f5
ffff8901`03f6f750 fffff802`4c5ee323 : ffffa805`0000001c ffff8901`03f6faa0 ffff8901`03f6fa58 ffffbb88`4f116010 : nt!CmpDoParseKey+0x849
ffff8901`03f6f9f0 fffff802`4c5f23ee : fffff802`4c5ee001 00000000`00000000 ffffbb88`4f116010 00000000`01f63400 : nt!CmpParseKey+0x2c3
ffff8901`03f6fb90 fffff802`4c6948aa : ffffbb88`4f116000 ffff8901`03f6fdf8 00000000`00000240 ffffbb88`479f5d20 : nt!ObpLookupObjectName+0x3fe
ffff8901`03f6fd60 fffff802`4c69468c : 00000000`00000000 00000000`00000000 00000000`00000000 ffffbb88`479f5d20 : nt!ObOpenObjectByNameEx+0x1fa
ffff8901`03f6fe90 fffff802`4c6941b1 : ffff8901`03f70380 ffff8901`03f70200 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByName+0x5c
ffff8901`03f6fee0 fffff802`4c6e3212 : 00000001`00000000 ffffa805`f910f000 00000000`001697e2 00000000`00000000 : nt!CmOpenKey+0x2c1
ffff8901`03f70140 fffff802`4c408cb8 : 00000000`00000001 fffff802`50600000 ffff8901`03f704a0 00000000`00000000 : nt!NtOpenKey+0x12
ffff8901`03f70180 fffff802`4c3fb100 : fffff802`4c5e1bc0 00000000`00000000 ffff8901`03f70379 ffff8901`03f70698 : nt!KiSystemServiceCopyEnd+0x28
ffff8901`03f70318 fffff802`4c5e1bc0 : 00000000`00000000 ffff8901`03f70379 ffff8901`03f70698 ffffffff`ffffffff : nt!KiServiceLinkage
ffff8901`03f70320 fffff802`4c6c9f54 : ffffa805`f9010000 00000000`000000ac ffff8901`03f70698 00000000`00000000 : nt!RtlpGetRegistryHandle+0x12c
ffff8901`03f703e0 fffff802`4c6c9cde : ffffa805`f90100b0 fffff802`4c29f2a3 00000000`00000111 00000000`00000000 : nt!RtlpGetTimeZoneInfoHandle+0x44
ffff8901`03f70660 fffff802`4c6c995b : ffffa805`f9010000 00000000`00989680 ffffa805`f9010068 ffffbb88`4794e600 : nt!RtlpQueryTimeZoneInformationWorker+0x5e
ffff8901`03f70930 fffff802`4c6c91d7 : ffffffff`ffffff00 ffff8901`03f70a59 ffffffff`ffffff00 ffffbb88`00000000 : nt!EtwpAddLogHeader+0x237
ffff8901`03f709e0 fffff802`4c6c8fdb : ffffffff`ffffffff ffffffff`ffffffff ffffffff`800005a0 ffffbb88`4794e600 : nt!EtwpUpdateFileHeader+0xf3
ffff8901`03f70ac0 fffff802`4c6ca206 : ffffbb88`4794e600 ffffbb88`4794e600 ffffffff`ffffff01 ffffffff`fffffffd : nt!EtwpCreateLogFile+0x1f3
ffff8901`03f70b90 fffff802`4c355855 : ffffffff`fffffffd ffffbb88`47952080 00000000`00000080 fffff802`4c6c9fd0 : nt!EtwpLogger+0x236
ffff8901`03f70c10 fffff802`4c3fe8f8 : ffffdf01`3e128180 ffffbb88`47952080 fffff802`4c355800 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff8901`03f70c60 00000000`00000000 : ffff8901`03f71000 ffff8901`03f6b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiUnlinkPageFromList+c89
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1348
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: c89
FAILURE_BUCKET_ID: 0x4E_2_nt!MiUnlinkPageFromList
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b084f841-86a9-e353-1d26-a04cfe7406b4}
Followup: MachineOwner
---------