I am experiencing periodic BSOD crashes showing code KMODE_EXCEPTION_NOT_HANDLED
The following is the data from the dump file:
Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\122921-7171-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff807
Debug session time: Wed Dec 29 18:10:51.411 2021 (UTC - 6:00)
System Uptime: 0 days 0:15:32.066
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
...............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807
4: kd> !analyze -v
***
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff807116cc218, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000002ff0, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2702
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11069
Key : Analysis.Init.CPU.mSec
Value: 577
Key : Analysis.Init.Elapsed.mSec
Value: 19207
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
FILE_IN_CAB: 122921-7171-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff807116cc218
BUGCHECK_P3: 0
BUGCHECK_P4: 2ff0
READ_ADDRESS: fffff80711cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000002ff0
EXCEPTION_PARAMETER2: 0000000000002ff0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000
SYMBOL_NAME: nt!HvpGetCellPaged+68
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1415
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 68
FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!HvpGetCellPaged
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f86e9d75-9ce4-8799-af45-48af90ca5aaf}
Followup: MachineOwner
---------
Any ideas what is causing it? I dont see any driver issues and I've reinstalled the video driver just to make certain. I'm stumped at this point.
The following is the data from the dump file:
Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\122921-7171-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff807
11000000 PsLoadedModuleList = 0xfffff807
11c2a1b0Debug session time: Wed Dec 29 18:10:51.411 2021 (UTC - 6:00)
System Uptime: 0 days 0:15:32.066
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
...............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807
113f70d0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9186
28c3b270=000000000000001e4: kd> !analyze -v
***
- *
- Bugcheck Analysis *
- *
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff807116cc218, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000002ff0, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2702
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11069
Key : Analysis.Init.CPU.mSec
Value: 577
Key : Analysis.Init.Elapsed.mSec
Value: 19207
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
FILE_IN_CAB: 122921-7171-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff807116cc218
BUGCHECK_P3: 0
BUGCHECK_P4: 2ff0
READ_ADDRESS: fffff80711cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000002ff0
EXCEPTION_PARAMETER2: 0000000000002ff0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000
00000000
STACK_TEXT:
ffff9186
28c3b268 fffff80711459dcb : 00000000
0000001e ffffffffc0000005 fffff807
116cc218 0000000000000000 : nt!KeBugCheckEx
ffff9186
28c3b270 fffff807114091ac : 00000000
00001000 ffff918628c3bb10 ffff8000
00000000 0000000000000000 : nt!KiDispatchException+0x17449b
ffff9186
28c3b930 fffff80711405343 : 00000000
00000000 ffff818fea266040 00000000
00000003 ffff818fea266040 : nt!KiExceptionDispatch+0x12c
ffff9186
28c3bb10 fffff807116cc218 : fffff807
115e8b89 ffff940c43d6e150 ffff940c
43d6e150 0000000000000000 : nt!KiPageFault+0x443
ffff9186
28c3bca8 fffff807115e8b89 : ffff940c
43d6e150 ffff940c43d6e150 00000000
00000000 fffff80711289392 : nt!HvpGetCellPaged+0x68
ffff9186
28c3bcb0 fffff807115e892e : 00000000
ffffffff ffff918628c3bd90 00000000
00000001 ffff940c43d49d30 : nt!CmpConstructNameFromKeyNodes+0x199
ffff9186
28c3bd30 fffff80711867098 : 00000000
00000000 0000000000000017 fffff807
119342d0 ffff940c43d49d30 : nt!CmpConstructNameWithStatus+0xee
ffff9186
28c3bd90 fffff807117de537 : ffff940c
43d49d30 ffff918600000004 ffff940c
43d49d30 ffff940c4f8fdfa0 : nt!CmpEtwDumpKcb+0x70
ffff9186
28c3be50 fffff80711652c97 : ffff940c
43d49d30 ffff940c4f8fd000 00000000
000000aa ffff940c4f8fe000 : nt!CmpCleanUpKcbCacheWithLock+0x1f7a0b
ffff9186
28c3be80 fffff80711652aa5 : 00000000
00000000 0000000000040000 ffff9186
28c3c000 ffff918628c3bf20 : nt!CmpCleanUpKCBCacheTable+0xcf
ffff9186
28c3bf10 fffff80711652a25 : 00000000
00040000 ffff918628c3c039 ffff940c
43d0e520 0000000000000006 : nt!CmpEnumerateAllOpenSubKeys+0x35
ffff9186
28c3bf50 fffff80711650542 : 00000000
00040000 ffff918628c3c039 ffff940c
43d0e520 0000000000000006 : nt!CmpDoesKeyHaveOpenSubkeys+0x25
ffff9186
28c3bfa0 fffff807116502e9 : ffff940c
571ce960 0000000000000000 00000000
0000007a 0000000000000000 : nt!CmpPerformUnloadKey+0x146
ffff9186
28c3c0a0 fffff8071164fa61 : ffff8181
00000000 ffff918628c3c360 ffff818f
e6cafb00 0000000067655256 : nt!CmUnloadKey+0x42d
ffff9186
28c3c340 fffff80711408ab5 : 00000000
00000003 ffff940c419e5080 00000000
00000000 0000000000000001 : nt!NtUnloadKey+0x11
ffff9186
28c3c370 fffff807113faf30 : fffff807
115ccdad ffff940c00000002 ffff940c
00000000 ffff918628c3c5a0 : nt!KiSystemServiceCopyEnd+0x25
ffff9186
28c3c508 fffff807115ccdad : ffff940c
00000002 ffff940c00000000 ffff9186
28c3c5a0 ffff918628c3c5a0 : nt!KiServiceLinkage
ffff9186
28c3c510 fffff807115ccc53 : ffff940c
5af4b8b0 ffff918628c3c640 ffff940c
5a73bc00 ffff940c438197a0 : nt!VrpUnloadDifferencingHive+0x135
ffff9186
28c3c580 fffff807115ca4fd : 00000000
00000000 0000000000000008 ffff818f
e0a08700 ffff818f00000060 : nt!VrpCleanupNamespace+0x8f
ffff9186
28c3c5c0 fffff807115ca67f : 00000000
00000000 ffff818feea3e500 ffff818f
eea3e430 ffff8181031f5370 : nt!VrpHandleIoctlUnloadDynamicallyLoadedHives+0x111
ffff9186
28c3c650 fffff8071128f7d5 : ffff818f
eea3e430 0000000000000000 00000000
00000001 ffff818103105250 : nt!VrpIoctlDeviceDispatch+0x12f
ffff9186
28c3c700 fffff80711675a08 : ffff9186
28c3ca80 ffff818feea3e430 00000000
00000001 ffff818fea227080 : nt!IofCallDriver+0x55
ffff9186
28c3c740 fffff807116752d5 : 00000000
00220018 ffff918628c3ca80 00000000
00000005 ffff918628c3ca80 : nt!IopSynchronousServiceTail+0x1a8
ffff9186
28c3c7e0 fffff80711674cd6 : 00000000
00000000 0000000000000000 00000000
00000000 0000000000000000 : nt!IopXxxControlFile+0x5e5
ffff9186
28c3c920 fffff80711408ab5 : 00000000
000006d0 000000a3a197ee08 ffff9186
28c3c9a8 0000000000000000 : nt!NtDeviceIoControlFile+0x56
ffff9186
28c3c990 00007ffca148ce54 : 00000000
00000000 0000000000000000 00000000
00000000 0000000000000000 : nt!KiSystemServiceCopyEnd+0x25
000000a3
a197eef8 0000000000000000 : 00000000
00000000 0000000000000000 00000000
00000000 0000000000000000 : 0x00007ffc
a148ce54SYMBOL_NAME: nt!HvpGetCellPaged+68
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1415
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 68
FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!HvpGetCellPaged
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f86e9d75-9ce4-8799-af45-48af90ca5aaf}
Followup: MachineOwner
---------
Any ideas what is causing it? I dont see any driver issues and I've reinstalled the video driver just to make certain. I'm stumped at this point.