pastebin - collaborative debugging tool
nrubsig.kpaste.net RSS


Kernel crash in |CdpReadIoInput()|
Posted by Anonymous on Sat 20th Apr 2024 11:40
raw | new post

  1.  
  2. ************* Preparing the environment for Debugger Extensions Gallery repositories **************
  3.    ExtensionRepository : Implicit
  4.    UseExperimentalFeatureForNugetShare : true
  5.    AllowNugetExeUpdate : true
  6.    NonInteractiveNuget : true
  7.    AllowNugetMSCredentialProviderInstall : true
  8.    AllowParallelInitializationOfLocalRepositories : true
  9.  
  10.    EnableRedirectToV8JsProvider : false
  11.  
  12.    -- Configuring repositories
  13.       ----> Repository : LocalInstalled, Enabled: true
  14.       ----> Repository : UserExtensions, Enabled: true
  15.  
  16. >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
  17.  
  18. ************* Waiting for Debugger Extensions Gallery to Initialize **************
  19.  
  20. >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.360 seconds
  21.    ----> Repository : UserExtensions, Enabled: true, Packages count: 0
  22.    ----> Repository : LocalInstalled, Enabled: true, Packages count: 41
  23.  
  24. Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
  25. Copyright (c) Microsoft Corporation. All rights reserved.
  26.  
  27.  
  28. Loading Dump File [C:\Windows\MEMORY.DMP]
  29. Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
  30.  
  31.  
  32. ************* Path validation summary **************
  33. Response                         Time (ms)     Location
  34. Deferred                                       srv*
  35. Symbol search path is: srv*
  36. Executable search path is:
  37. Windows 10 Kernel Version 19041 MP (8 procs) Free x64
  38. Product: WinNt, suite: TerminalServer SingleUserTS
  39. Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
  40. Kernel base = 0xfffff805`77000000 PsLoadedModuleList = 0xfffff805`77c2a790
  41. Debug session time: Sat Apr 20 05:17:02.875 2024 (UTC + 2:00)
  42. System Uptime: 0 days 11:24:19.923
  43. Loading Kernel Symbols
  44. ...............................................................
  45. ............Page de1a not present in the dump file. Type ".hh dbgerr004" for details
  46. ....................................................
  47. ................................................................
  48. .......
  49. Loading User Symbols
  50. PEB is paged out (Peb.Ldr = 000000eb`d7dd9018).  Type ".hh dbgerr001" for details
  51. Loading unloaded module list
  52. .....
  53. For analysis of this file, run !analyze -v
  54. nt!KeBugCheckEx:
  55. fffff805`773fda40 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffbe8a`957d34a0=000000000000003b
  56. 5: kd> !analyze -v
  57. *******************************************************************************
  58. *                                                                             *
  59. *                        Bugcheck Analysis                                    *
  60. *                                                                             *
  61. *******************************************************************************
  62.  
  63. SYSTEM_SERVICE_EXCEPTION (3b)
  64. An exception happened while executing a system service routine.
  65. Arguments:
  66. Arg1: 00000000c0000005, Exception code that caused the BugCheck
  67. Arg2: fffff80586139c9c, Address of the instruction which caused the BugCheck
  68. Arg3: ffffbe8a957d3da0, Address of the context record for the exception that caused the BugCheck
  69. Arg4: 0000000000000000, zero.
  70.  
  71. Debugging Details:
  72. ------------------
  73.  
  74. *** WARNING: Check Image - Checksum mismatch - Dump: 0x15afe, File: 0x1431b - C:\ProgramData\Dbg\sym\condrv.sys\232C8BF312000\condrv.sys
  75.  
  76. KEY_VALUES_STRING: 1
  77.  
  78.     Key  : Analysis.CPU.mSec
  79.     Value: 3468
  80.  
  81.     Key  : Analysis.Elapsed.mSec
  82.     Value: 3531
  83.  
  84.     Key  : Analysis.IO.Other.Mb
  85.     Value: 1
  86.  
  87.     Key  : Analysis.IO.Read.Mb
  88.     Value: 0
  89.  
  90.     Key  : Analysis.IO.Write.Mb
  91.     Value: 24
  92.  
  93.     Key  : Analysis.Init.CPU.mSec
  94.     Value: 1218
  95.  
  96.     Key  : Analysis.Init.Elapsed.mSec
  97.     Value: 17441
  98.  
  99.     Key  : Analysis.Memory.CommitPeak.Mb
  100.     Value: 95
  101.  
  102.     Key  : Bugcheck.Code.KiBugCheckData
  103.     Value: 0x3b
  104.  
  105.     Key  : Bugcheck.Code.LegacyAPI
  106.     Value: 0x3b
  107.  
  108.     Key  : Bugcheck.Code.TargetModel
  109.     Value: 0x3b
  110.  
  111.     Key  : Failure.Bucket
  112.     Value: AV_condrv!CdpReadIoInput
  113.  
  114.     Key  : Failure.Hash
  115.     Value: {560092f7-ed27-1156-716a-d2dad3e79b70}
  116.  
  117.     Key  : Hypervisor.Enlightenments.Value
  118.     Value: 12576
  119.  
  120.     Key  : Hypervisor.Enlightenments.ValueHex
  121.     Value: 3120
  122.  
  123.     Key  : Hypervisor.Flags.AnyHypervisorPresent
  124.     Value: 1
  125.  
  126.     Key  : Hypervisor.Flags.ApicEnlightened
  127.     Value: 0
  128.  
  129.     Key  : Hypervisor.Flags.ApicVirtualizationAvailable
  130.     Value: 0
  131.  
  132.     Key  : Hypervisor.Flags.AsyncMemoryHint
  133.     Value: 0
  134.  
  135.     Key  : Hypervisor.Flags.CoreSchedulerRequested
  136.     Value: 0
  137.  
  138.     Key  : Hypervisor.Flags.CpuManager
  139.     Value: 0
  140.  
  141.     Key  : Hypervisor.Flags.DeprecateAutoEoi
  142.     Value: 1
  143.  
  144.     Key  : Hypervisor.Flags.DynamicCpuDisabled
  145.     Value: 0
  146.  
  147.     Key  : Hypervisor.Flags.Epf
  148.     Value: 0
  149.  
  150.     Key  : Hypervisor.Flags.ExtendedProcessorMasks
  151.     Value: 0
  152.  
  153.     Key  : Hypervisor.Flags.HardwareMbecAvailable
  154.     Value: 0
  155.  
  156.     Key  : Hypervisor.Flags.MaxBankNumber
  157.     Value: 0
  158.  
  159.     Key  : Hypervisor.Flags.MemoryZeroingControl
  160.     Value: 0
  161.  
  162.     Key  : Hypervisor.Flags.NoExtendedRangeFlush
  163.     Value: 1
  164.  
  165.     Key  : Hypervisor.Flags.NoNonArchCoreSharing
  166.     Value: 0
  167.  
  168.     Key  : Hypervisor.Flags.Phase0InitDone
  169.     Value: 1
  170.  
  171.     Key  : Hypervisor.Flags.PowerSchedulerQos
  172.     Value: 0
  173.  
  174.     Key  : Hypervisor.Flags.RootScheduler
  175.     Value: 0
  176.  
  177.     Key  : Hypervisor.Flags.SynicAvailable
  178.     Value: 1
  179.  
  180.     Key  : Hypervisor.Flags.UseQpcBias
  181.     Value: 0
  182.  
  183.     Key  : Hypervisor.Flags.Value
  184.     Value: 536632
  185.  
  186.     Key  : Hypervisor.Flags.ValueHex
  187.     Value: 83038
  188.  
  189.     Key  : Hypervisor.Flags.VpAssistPage
  190.     Value: 1
  191.  
  192.     Key  : Hypervisor.Flags.VsmAvailable
  193.     Value: 0
  194.  
  195.     Key  : Hypervisor.RootFlags.AccessStats
  196.     Value: 0
  197.  
  198.     Key  : Hypervisor.RootFlags.CrashdumpEnlightened
  199.     Value: 0
  200.  
  201.     Key  : Hypervisor.RootFlags.CreateVirtualProcessor
  202.     Value: 0
  203.  
  204.     Key  : Hypervisor.RootFlags.DisableHyperthreading
  205.     Value: 0
  206.  
  207.     Key  : Hypervisor.RootFlags.HostTimelineSync
  208.     Value: 0
  209.  
  210.     Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
  211.     Value: 0
  212.  
  213.     Key  : Hypervisor.RootFlags.IsHyperV
  214.     Value: 0
  215.  
  216.     Key  : Hypervisor.RootFlags.LivedumpEnlightened
  217.     Value: 0
  218.  
  219.     Key  : Hypervisor.RootFlags.MapDeviceInterrupt
  220.     Value: 0
  221.  
  222.     Key  : Hypervisor.RootFlags.MceEnlightened
  223.     Value: 0
  224.  
  225.     Key  : Hypervisor.RootFlags.Nested
  226.     Value: 0
  227.  
  228.     Key  : Hypervisor.RootFlags.StartLogicalProcessor
  229.     Value: 0
  230.  
  231.     Key  : Hypervisor.RootFlags.Value
  232.     Value: 0
  233.  
  234.     Key  : Hypervisor.RootFlags.ValueHex
  235.     Value: 0
  236.  
  237.     Key  : SecureKernel.HalpHvciEnabled
  238.     Value: 0
  239.  
  240.     Key  : WER.OS.Branch
  241.     Value: vb_release
  242.  
  243.     Key  : WER.OS.Version
  244.     Value: 10.0.19041.1
  245.  
  246.  
  247. BUGCHECK_CODE:  3b
  248.  
  249. BUGCHECK_P1: c0000005
  250.  
  251. BUGCHECK_P2: fffff80586139c9c
  252.  
  253. BUGCHECK_P3: ffffbe8a957d3da0
  254.  
  255. BUGCHECK_P4: 0
  256.  
  257. FILE_IN_CAB:  MEMORY.DMP
  258.  
  259. CONTEXT:  ffffbe8a957d3da0 -- (.cxr 0xffffbe8a957d3da0)
  260. rax=0000000000000000 rbx=0000000000030501 rcx=000002b114b51a20
  261. rdx=0000000000000065 rsi=0000000000000000 rdi=000002b114b51a20
  262. rip=fffff80586139c9c rsp=ffffbe8a957d47a0 rbp=ffffbe8a957d4b80
  263.  r8=0000000000000000  r9=0000000015f8bdde r10=ffffbe8a957d4810
  264. r11=0000000000000018 r12=0000000000000000 r13=ffffbe8a957d4958
  265. r14=000000000000000d r15=ffffbe8a957d4818
  266. iopl=0         nv up ei pl nz na pe nc
  267. cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
  268. condrv!CdpReadIoInput+0x4c:
  269. fffff805`86139c9c 8b4328          mov     eax,dword ptr [rbx+28h] ds:002b:00000000`00030529=????????
  270. Resetting default scope
  271.  
  272. BLACKBOXBSD: 1 (!blackboxbsd)
  273.  
  274.  
  275. BLACKBOXNTFS: 1 (!blackboxntfs)
  276.  
  277.  
  278. BLACKBOXWINLOGON: 1
  279.  
  280. PROCESS_NAME:  conhost.exe
  281.  
  282. STACK_TEXT:  
  283. ffffbe8a`957d47a0 fffff805`86138ee8     : ffff988d`bf5443d0 000000eb`d7f7fb10 ffff988d`bf544390 00000000`00000000 : condrv!CdpReadIoInput+0x4c
  284. ffffbe8a`957d47f0 fffff805`861389c5     : 00000000`00000018 00000000`00000000 ffffc305`30aeb4e0 00000000`00000001 : condrv!CdReadIoInput+0xd8
  285. ffffbe8a`957d4840 fffff805`8613adcd     : 000000eb`d7f7fb10 fffff805`8613ad60 ffffc305`394bbcf0 00000000`00000000 : condrv!CdpServerFastIoctl+0xf5
  286. ffffbe8a`957d4880 fffff805`7762d9d6     : 00000000`00000003 00000000`00000006 ffffbe8a`957d49e0 ffffc305`394bbcf0 : condrv!CdpFastIoDeviceControl+0x6d
  287. ffffbe8a`957d48d0 fffff805`7762d236     : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x786
  288. ffffbe8a`957d4a20 fffff805`774119c5     : 00000000`00000000 ffffbe8a`957d4b80 00000000`00000000 ffffc305`394bbcf0 : nt!NtDeviceIoControlFile+0x56
  289. ffffbe8a`957d4a90 00007ff8`b6dad0c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
  290. 000000eb`d7f7f9f8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`b6dad0c4
  291.  
  292.  
  293. SYMBOL_NAME:  condrv!CdpReadIoInput+4c
  294.  
  295. MODULE_NAME: condrv
  296.  
  297. IMAGE_NAME:  condrv.sys
  298.  
  299. STACK_COMMAND:  .cxr 0xffffbe8a957d3da0 ; kb
  300.  
  301. BUCKET_ID_FUNC_OFFSET:  4c
  302.  
  303. FAILURE_BUCKET_ID:  AV_condrv!CdpReadIoInput
  304.  
  305. OS_VERSION:  10.0.19041.1
  306.  
  307. BUILDLAB_STR:  vb_release
  308.  
  309. OSPLATFORM_TYPE:  x64
  310.  
  311. OSNAME:  Windows 10
  312.  
  313. FAILURE_ID_HASH:  {560092f7-ed27-1156-716a-d2dad3e79b70}
  314.  
  315. Followup:     MachineOwner
  316. ---------

Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.

Syntax highlighting:

To highlight particular lines, prefix each line with {%HIGHLIGHT}




All content is user-submitted.
The administrators of this site (kpaste.net) are not responsible for their content.
Abuse reports should be emailed to us at