Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.22621.755 X86
- Copyright (c) Microsoft Corporation. All rights reserved.
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 8.1 Kernel Version 9600 MP (8 procs) Free x64
- Product: Server, suite: TerminalServer
- Edition build lab: 9600.20718.amd64fre.winblue_ltsb_escrow.221111-1730
- Machine Name:
- Kernel base = 0xfffff803`b9405000 PsLoadedModuleList = 0xfffff803`b96cb6b0
- Debug session time: Tue Dec 27 07:26:11.183 2022 (UTC - 8:00)
- System Uptime: 7 days 7:58:23.149
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- .................
- Loading User Symbols
- Loading unloaded module list
- ..................................................
- For analysis of this file, run !analyze -v
- 0: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- WINLOGON_FATAL_ERROR (c000021a)
- The Winlogon process terminated unexpectedly.
- Arguments:
- Arg1: ffffc001b2d59760, String that identifies the problem.
- Arg2: 0000000000000000, Error Code.
- Arg3: 0000000000000000
- Arg4: 0000000000000000
- Debugging Details:
- ------------------
- ETW minidump data unavailable
- GetUlongPtrFromAddress: unable to read from fffff803b9755308
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 9249
- Key : Analysis.DebugAnalysisManager
- Value: Create
- Key : Analysis.Elapsed.mSec
- Value: 12362
- Key : Analysis.Init.CPU.mSec
- Value: 10203
- Key : Analysis.Init.Elapsed.mSec
- Value: 230595
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 72
- Key : WER.OS.Branch
- Value: winblue_ltsb_escrow
- Key : WER.OS.Timestamp
- Value: 2022-11-11T17:30:00Z
- Key : WER.OS.Version
- Value: 8.1.9600.20718
- FILE_IN_CAB: 122722-30281-01.dmp
- VIRTUAL_MACHINE: VMware
- ERROR_CODE: (NTSTATUS) 0xc000021a - {Fatal System Error} The %hs system process terminated unexpectedly with a status of 0x
- EXCEPTION_CODE_STR: c000021a
- EXCEPTION_PARAMETER1: ffffc001b2d59760
- EXCEPTION_PARAMETER2: 0000000000000000
- EXCEPTION_PARAMETER3: 0000000000000000
- EXCEPTION_PARAMETER4: 0
- BUGCHECK_CODE: c000021a
- BUGCHECK_P1: ffffc001b2d59760
- BUGCHECK_P2: 0
- BUGCHECK_P3: 0
- BUGCHECK_P4: 0
- PROCESS_NAME: services.exe
- ADDITIONAL_DEBUG_TEXT: Windows must now restart because the Remote Procedure Call (RPC) service terminated unexpectedly
- TAG_NOT_DEFINED_1004c:
- This is a STATUS_SYSTEM_PROCESS_TERMINATED bugcheck.
- It signals that the system is rebooting due to a critical service termination.
- The bugcheck is not very useful for debugging. To investigate the root cause
- find the related svchost.exe crashes that happened on the same machine
- around the time of this dump.
- IMAGE_NAME: ntkrnlmp.exe
- MODULE_NAME: nt
- CUSTOMER_CRASH_COUNT: 1
- STACK_TEXT:
- ffffd000`22ec66b8 fffff803`b977e8d1 : 00000000`0000004c 00000000`c000021a ffffd000`251993f8 ffffe001`0afd1130 : nt!KeBugCheckEx
- ffffd000`22ec66c0 fffff803`b9776194 : 00000000`00000000 ffffd000`22ec67d9 00000000`00000000 00000000`00000002 : nt!PopGracefulShutdown+0x2c9
- ffffd000`22ec6700 fffff803`b9555f13 : ffffe001`102d6880 fffff803`b952bf00 00000000`c0000004 fffff803`b9484200 : nt! ?? ::OKHAJAOM::`string'+0x1d64
- ffffd000`22ec6840 fffff803`b9549130 : fffff803`b9977389 00000000`00000001 ffffd000`22ec6a58 00000000`c0000004 : nt!KiSystemServiceCopyEnd+0x13
- ffffd000`22ec69d8 fffff803`b9977389 : 00000000`00000001 ffffd000`22ec6a58 00000000`c0000004 ffffd000`5417c180 : nt!KiServiceLinkage
- ffffd000`22ec69e0 fffff803`b98c043b : 00000000`00000000 00000000`00000000 ffffd000`5417c180 ffffe001`102d69c0 : nt! ?? ::NNGAKEGL::`string'+0x5e3a9
- ffffd000`22ec6aa0 fffff803`b949ccfe : fffff803`b949cc44 00000000`00000000 00000000`00000002 00000000`00000000 : nt!PopPolicyWorkerAction+0x63
- ffffd000`22ec6b10 fffff803`b944566f : fffff803`00000002 ffffe001`102d6880 fffff803`b96b2100 00000000`00000000 : nt!PopPolicyWorkerThread+0xba
- ffffd000`22ec6b50 fffff803`b94d6a2a : 00000000`00020000 fffff803`b96e7180 00000000`00000080 ffffe001`05023840 : nt!ExpWorkerThread+0x69f
- ffffd000`22ec6c00 fffff803`b954d5e6 : fffff803`b96e7180 ffffe001`102d6880 ffffe001`0ec4b880 ffffe001`05b224c0 : nt!PspSystemThreadStartup+0x18a
- ffffd000`22ec6c60 00000000`00000000 : ffffd000`22ec7000 ffffd000`22ec1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
- SYMBOL_NAME: nt! ?? ::OKHAJAOM::`string'+1d64
- IMAGE_VERSION: 6.3.9600.20718
- STACK_COMMAND: .cxr; .ecxr ; kb
- BUCKET_ID_FUNC_OFFSET: 1d64
- FAILURE_BUCKET_ID: 0xc000021a_rpcss.dll_Critical_Service_Terminated_nt!_??_::OKHAJAOM::_string_
- OS_VERSION: 8.1.9600.20718
- BUILDLAB_STR: winblue_ltsb_escrow
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 8.1
- FAILURE_ID_HASH: {985ba5ee-c7fd-3ab7-c026-2d066fd15a29}
- Followup: MachineOwner
- ---------
- This is a STATUS_SYSTEM_PROCESS_TERMINATED bugcheck.
- It signals that the system is rebooting due to a critical service termination.
- The bugcheck is not very useful for debugging. To investigate the root cause
- find the related svchost.exe crashes that happened on the same machine
- around the time of this dump.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement