Hi
I have been having system crashes lately and the log details have been mentioned below. Kindly help me find out the reason for the crash.
Thanks in advance
Microsoft (R) Windows Debugger Version 10.0.22415.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Path validation summary *
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (20 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806
Debug session time: Thu Aug 26 13:22:23.394 2021 (UTC + 5:30)
System Uptime: 0 days 0:10:57.006
Loading Kernel Symbols
...............................................................
.....Page 847528 not present in the dump file. Type ".hh dbgerr004" for details
...........................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Can't set dump file contexts
MachineInfo::SetContext failed - Thread: 000002BA30870600 Handle: 11 Id: 11 - Error == 0x8000FFFF
Path validation summary *
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (20 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806
Debug session time: Thu Aug 26 13:22:23.394 2021 (UTC + 5:30)
System Uptime: 0 days 0:10:57.006
Loading Kernel Symbols
...............................................................
.....Page 847528 not present in the dump file. Type ".hh dbgerr004" for details
...........................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
..........
nt!KeBugCheckEx:
fffff806
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Can't set dump file contexts
MachineInfo::SetContext failed - Thread: 000002BA330CFD00 Handle: 11 Id: 11 - Error == 0x8000FFFF
Path validation summary *
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (20 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806
Debug session time: Thu Aug 26 13:22:23.394 2021 (UTC + 5:30)
System Uptime: 0 days 0:10:57.006
Loading Kernel Symbols
...............................................................
.....Page 847528 not present in the dump file. Type ".hh dbgerr004" for details
...........................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
..........
nt!KeBugCheckEx:
fffff806
||2:16: kd> !analyze -v
***
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8067ae87f3d, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2202
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 9712
Key : Analysis.Init.CPU.mSec
Value: 812
Key : Analysis.Init.Elapsed.mSec
Value: 40324
Key : Analysis.Memory.CommitPeak.Mb
Value: 138
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8067ae87f3d
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: ffffffffffffffff
EXCEPTION_PARAMETER2: ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
STACK_TEXT:
ffff8600
ffff8600
ffff8600
ffff8600
ffff8600
ffff8600
ffffb307
ffffb307
ffffb307
ffffb307
ffffb307
ffffb307
ffffb307
ffffb307
ffffb307
ffffb307
ffffb307
ffffb307
ffffb307
ffffb307
ffffb307
ffffb307
ffffb307
ffffb307
ffffb307
ffffb307
SYMBOL_NAME: nvlddmkm+843f8
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 843f8
FAILURE_BUCKET_ID: 0x1E_c0000005_R_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5d60e010-dfb5-f385-5e0f-7c104332ff0c}
Followup: MachineOwner
---------
I have been having system crashes lately and the log details have been mentioned below. Kindly help me find out the reason for the crash.
Thanks in advance
Microsoft (R) Windows Debugger Version 10.0.22415.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Path validation summary *
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (20 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806
7ac00000 PsLoadedModuleList = 0xfffff806
7b82a190Debug session time: Thu Aug 26 13:22:23.394 2021 (UTC + 5:30)
System Uptime: 0 days 0:10:57.006
Loading Kernel Symbols
...............................................................
.....Page 847528 not present in the dump file. Type ".hh dbgerr004" for details
...........................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806
7aff71d0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8600
d2899160=000000000000001eLoading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Can't set dump file contexts
MachineInfo::SetContext failed - Thread: 000002BA30870600 Handle: 11 Id: 11 - Error == 0x8000FFFF
Path validation summary *
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (20 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806
7ac00000 PsLoadedModuleList = 0xfffff806
7b82a190Debug session time: Thu Aug 26 13:22:23.394 2021 (UTC + 5:30)
System Uptime: 0 days 0:10:57.006
Loading Kernel Symbols
...............................................................
.....Page 847528 not present in the dump file. Type ".hh dbgerr004" for details
...........................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
..........
nt!KeBugCheckEx:
fffff806
7aff71d0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8600
d2899160=000000000000001eLoading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Can't set dump file contexts
MachineInfo::SetContext failed - Thread: 000002BA330CFD00 Handle: 11 Id: 11 - Error == 0x8000FFFF
Path validation summary *
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (20 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806
7ac00000 PsLoadedModuleList = 0xfffff806
7b82a190Debug session time: Thu Aug 26 13:22:23.394 2021 (UTC + 5:30)
System Uptime: 0 days 0:10:57.006
Loading Kernel Symbols
...............................................................
.....Page 847528 not present in the dump file. Type ".hh dbgerr004" for details
...........................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
..........
nt!KeBugCheckEx:
fffff806
7aff71d0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8600
d2899160=000000000000001e||2:16: kd> !analyze -v
***
- *
- Bugcheck Analysis *
- *
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8067ae87f3d, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2202
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 9712
Key : Analysis.Init.CPU.mSec
Value: 812
Key : Analysis.Init.Elapsed.mSec
Value: 40324
Key : Analysis.Memory.CommitPeak.Mb
Value: 138
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8067ae87f3d
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: ffffffffffffffff
EXCEPTION_PARAMETER2: ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
STACK_TEXT:
ffff8600
d2899158 fffff806
7b0f5a2e : 000000000000001e ffffffff
c0000005 fffff8067ae87f3d 00000000
00000000 : nt!KeBugCheckExffff8600
d2899160 fffff806
7b00008f : fffff8067b0f5a0c 00000000
00000000 0000000000000000 00000000
00000000 : nt!HvlpVtlCallExceptionHandler+0x22ffff8600
d28991a0 fffff806
7aee6dd7 : ffff8600d2899710 00000000
00000000 ffffb307d571fb60 fffff806
7affad3e : nt!RtlpExecuteHandlerForException+0xfffff8600
d28991d0 fffff806
7aee59c6 : ffffb307d571eca8 ffff8600
d2899e20 ffffb307d571eca8 009d0000
000017b0 : nt!RtlDispatchException+0x297ffff8600
d28998f0 fffff806
7aff8062 : 4e4f495441434946 0d455255
4c494146 000000200000000a 4e555f52
45564153 : nt!KiDispatchException+0x186ffff8600
d2899fb0 fffff806
7aff8030 : fffff8067b0092a5 00000000
00000000 0000000000000000 00000000
00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12ffffb307
d571eb68 fffff806
7b0092a5 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiExceptionDispatchOnExceptionStackContinueffffb307
d571eb70 fffff806
7b004fe0 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiExceptionDispatch+0x125ffffb307
d571ed50 fffff806
7ae87f3d : ffff8600d2840180 00000000
00000000 ffffba0600000004 ffffb307
d571ef1c : nt!KiGeneralProtectionFault+0x320ffffb307
d571eee0 fffff806
7ae871b1 : ffff8600d2840180 00000000
0000000c ffffba06515bd1c0 fffff806
7ae8221a : nt!KiDeferredReadySingleThread+0xacdffffb307
d571f0d0 fffff806
7aeb7bf8 : 0000000000000000 ffffba06
00000000 ffffba06514c8180 ffffba06
4f099cd0 : nt!KiExitDispatcher+0x141ffffb307
d571f140 fffff806
7af42998 : ffffba064f084570 00000000
00000000 ffffba0669877f00 ffffba06
00000000 : nt!ExpQueueWorkItem+0x1d8ffffb307
d571f1d0 fffff806
7af4294b : 0000000000000001 00000000
00000001 fffff806983de6d0 00000000
00000000 : nt!ExQueueWorkItemFromIo+0x40ffffb307
d571f210 fffff806
981b43f8 : ffffba0657a03a18 fffff806
983df1cc 0000000000000112 00000000
3b9aca00 : nt!IoQueueWorkItemEx+0x1bffffb307
d571f240 fffff806
983df286 : ffffba06613c0000 ffffba06
57d96000 ffffba0657823c70 ffffba06
57823c70 : nvlddmkm+0x843f8ffffb307
d571f280 fffff806
985dd5e0 : ffffba0661316000 169ecbef
3535b6e0 0000000000000000 fffff806
7b5b21c4 : nvlddmkm+0x2af286ffffb307
d571f2c0 fffff806
986827ad : 0000000000000000 169ecbef
35369200 ffffba0661316000 00000000
00000001 : nvlddmkm+0x4ad5e0ffffb307
d571f2f0 fffff806
9825733c : ffffba0657d96000 ffffba06
57d9b790 ffffba0657d9b790 fffff806
00000000 : nvlddmkm+0x5527adffffb307
d571f330 fffff806
98257575 : 0000000000000000 00000000
00000034 ffffba0668e606d8 ffffba06
57b59010 : nvlddmkm+0x12733cffffb307
d571f390 fffff806
98258839 : 0000000000000001 ffffb307
d571f5b0 0000000000000001 ffffba06
57d96000 : nvlddmkm+0x127575ffffb307
d571f410 fffff806
9867d386 : 0000000000000002 fffff806
981db880 ffffba0657d96000 ffffba06
57d9b790 : nvlddmkm+0x128839ffffb307
d571f470 fffff806
981b8703 : ffffba0657d96000 ffffba06
57d9b790 ffffba0664a0f080 ffffb307
d571f559 : nvlddmkm+0x54d386ffffb307
d571f4b0 fffff806
7ae9a3ae : ffff8600d2843240 ffffb307
d571fa10 ffffb307d571fa20 ffff8600
d2840180 : nvlddmkm+0x88703ffffb307
d571f760 fffff806
7ae99694 : 0000000000000000 00000000
00000000 0000000000140001 00000000
00000000 : nt!KiExecuteAllDpcs+0x30effffb307
d571f8d0 fffff806
7affad3e : ffffffff00000000 ffff8600
d2840180 ffff8600d284b540 ffffba06
4f230140 : nt!KiRetireDpcList+0x1f4ffffb307
d571fb60 00000000
00000000 : ffffb307d5720000 ffffb307
d5719000 0000000000000000 00000000
00000000 : nt!KiIdleLoop+0x9eSYMBOL_NAME: nvlddmkm+843f8
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 843f8
FAILURE_BUCKET_ID: 0x1E_c0000005_R_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5d60e010-dfb5-f385-5e0f-7c104332ff0c}
Followup: MachineOwner
---------
Last edited by a moderator: