Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.22000.194 X86
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\Minidump\011022-4875-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 19041 MP (12 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
- Machine Name:
- Kernel base = 0xfffff801`3aa00000 PsLoadedModuleList = 0xfffff801`3b62a1b0
- Debug session time: Mon Jan 10 23:37:24.378 2022 (UTC - 5:00)
- System Uptime: 0 days 0:53:10.998
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................................
- Loading User Symbols
- Loading unloaded module list
- ......
- For analysis of this file, run !analyze -v
- 5: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Some common problems are exception code 0x80000003. This means a hard
- coded breakpoint or assertion was hit, but this system was booted
- /NODEBUG. This is not supposed to happen as developers should never have
- hardcoded breakpoints in retail code, but ...
- If this happens, make sure a debugger gets connected, and the
- system is booted /DEBUG. This will let us see why this breakpoint is
- happening.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff8013aff5ece, The address that the exception occurred at
- Arg3: fffff106c0ac2978, Exception Record Address
- Arg4: fffff106c0ac21b0, Context Record Address
- Debugging Details:
- ------------------
- *** WARNING: Unable to verify timestamp for win32k.sys
- KEY_VALUES_STRING: 1
- Key : AV.Dereference
- Value: NullPtr
- Key : AV.Fault
- Value: Write
- Key : Analysis.CPU.mSec
- Value: 3500
- Key : Analysis.DebugAnalysisManager
- Value: Create
- Key : Analysis.Elapsed.mSec
- Value: 6485
- Key : Analysis.Init.CPU.mSec
- Value: 1577
- Key : Analysis.Init.Elapsed.mSec
- Value: 57908
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 92
- Key : WER.OS.Branch
- Value: vb_release
- Key : WER.OS.Timestamp
- Value: 2019-12-06T14:06:00Z
- Key : WER.OS.Version
- Value: 10.0.19041.1
- BUGCHECK_CODE: 7e
- BUGCHECK_P1: ffffffffc0000005
- BUGCHECK_P2: fffff8013aff5ece
- BUGCHECK_P3: fffff106c0ac2978
- BUGCHECK_P4: fffff106c0ac21b0
- EXCEPTION_RECORD: fffff106c0ac2978 -- (.exr 0xfffff106c0ac2978)
- ExceptionAddress: fffff8013aff5ece (nt!ObpReferenceObjectByHandleWithTag+0x00000000000001fe)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 2
- Parameter[0]: 0000000000000001
- Parameter[1]: 0000000000000000
- Attempt to write to address 0000000000000000
- CONTEXT: fffff106c0ac21b0 -- (.cxr 0xfffff106c0ac21b0)
- rax=0000000000000000 rbx=ffff9f8efcda7050 rcx=0000000000001000
- rdx=000000003245001e rsi=0000000000000000 rdi=ffffdd0ac0575bc0
- rip=fffff8013aff5ece rsp=fffff106c0ac2bb0 rbp=00000000001fffff
- r8=ffffdd0abba5f001 r9=fffff8013aa00000 r10=0000fffff8013b06
- r11=ffffbafaee200000 r12=fffff106c0ac2cd0 r13=0000000000000000
- r14=ffffcfc77e6d3828 r15=ffff9f8efef31040
- iopl=0 nv up ei pl zr na po nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
- nt!ObpReferenceObjectByHandleWithTag+0x1fe:
- fffff801`3aff5ece 0000 add byte ptr [rax],al ds:002b:00000000`00000000=??
- Resetting default scope
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXWINLOGON: 1
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: System
- WRITE_ADDRESS: fffff8013b6fb390: Unable to get MiVisibleState
- Unable to get NonPagedPoolStart
- Unable to get NonPagedPoolEnd
- Unable to get PagedPoolStart
- Unable to get PagedPoolEnd
- unable to get nt!MmSpecialPagesInUse
- 0000000000000000
- ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- EXCEPTION_CODE_STR: c0000005
- EXCEPTION_PARAMETER1: 0000000000000001
- EXCEPTION_PARAMETER2: 0000000000000000
- MISALIGNED_IP:
- nt!ObpReferenceObjectByHandleWithTag+1fe
- fffff801`3aff5ece 0000 add byte ptr [rax],al
- EXCEPTION_STR: 0xc0000005
- STACK_TEXT:
- fffff106`c0ac2bb0 fffff801`3aff5c81 : ffff9f8e`f2a8c040 00000000`00001000 ffff9f8e`f2a59e30 00000000`00000000 : nt!ObpReferenceObjectByHandleWithTag+0x1fe
- fffff106`c0ac2c40 fffff801`3b065314 : ffff9f8e`fcda7080 ffffdd0a`c0d52c68 fffff106`c0ac2d8c ffff9f8e`fcda7080 : nt!ObReferenceObjectByHandleWithTag+0x31
- fffff106`c0ac2c90 fffff801`3ae08ab8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtQueryInformationProcess+0x34f4
- fffff106`c0ac3680 fffff801`3adfaf30 : fffff801`4c1bdc9e ffffdd0a`c0d52bf0 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
- fffff106`c0ac3888 fffff801`4c1bdc9e : ffffdd0a`c0d52bf0 00000000`00000000 00000000`00000000 ffffdd0a`c0c15ae0 : nt!KiServiceLinkage
- fffff106`c0ac3890 fffff801`3b0fb3b7 : ffffdd0a`c0c15ae0 ffffdd0a`baebd2a8 ffffdd0a`c0d9d8b0 ffff9f8e`00000000 : bam!BampThrottledProcessWakeNotificationCallback+0xbe
- fffff106`c0ac3ab0 fffff801`3b0fb1a5 : ffff9f8e`fef31040 fffff801`3b0fb180 ffff9f8e`f2aa3c40 00000000`00000000 : nt!ExpWnfDispatchKernelSubscription+0x1e3
- fffff106`c0ac3b40 fffff801`3acb85f5 : ffff9f8e`fef31040 fffff801`3b0fb180 ffff9f8e`f2aa3c40 ffff9f8f`00000000 : nt!ExpWnfWorkItemRoutine+0x25
- fffff106`c0ac3b70 fffff801`3ad55935 : ffff9f8e`fef31040 00000000`00000080 ffff9f8e`f2a8c040 00000000`00000001 : nt!ExpWorkerThread+0x105
- fffff106`c0ac3c10 fffff801`3adfe728 : ffffcb00`48a79180 ffff9f8e`fef31040 fffff801`3ad558e0 00000000`00000246 : nt!PspSystemThreadStartup+0x55
- fffff106`c0ac3c60 00000000`00000000 : fffff106`c0ac4000 fffff106`c0abe000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
- SYMBOL_NAME: bam!BampThrottledProcessWakeNotificationCallback+be
- IMAGE_VERSION: 10.0.19041.1030
- STACK_COMMAND: .cxr 0xfffff106c0ac21b0 ; kb
- MODULE_NAME: hardware
- IMAGE_NAME: hardware
- FAILURE_BUCKET_ID: IP_MISALIGNED
- OS_VERSION: 10.0.19041.1
- BUILDLAB_STR: vb_release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement