- ************* Preparing the environment for Debugger Extensions Gallery repositories **************
- ExtensionRepository : Implicit
- UseExperimentalFeatureForNugetShare : true
- AllowNugetExeUpdate : true
- NonInteractiveNuget : true
- AllowNugetMSCredentialProviderInstall : true
- AllowParallelInitializationOfLocalRepositories : true
- EnableRedirectToV8JsProvider : false
- -- Configuring repositories
- ----> Repository : LocalInstalled, Enabled: true
- ----> Repository : UserExtensions, Enabled: true
- >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
- ************* Waiting for Debugger Extensions Gallery to Initialize **************
- >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.360 seconds
- ----> Repository : UserExtensions, Enabled: true, Packages count: 0
- ----> Repository : LocalInstalled, Enabled: true, Packages count: 41
- Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\MEMORY.DMP]
- Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
- ************* Path validation summary **************
- Response Time (ms) Location
- Deferred srv*
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 19041 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
- Kernel base = 0xfffff805`77000000 PsLoadedModuleList = 0xfffff805`77c2a790
- Debug session time: Sat Apr 20 05:17:02.875 2024 (UTC + 2:00)
- System Uptime: 0 days 11:24:19.923
- Loading Kernel Symbols
- ...............................................................
- ............Page de1a not present in the dump file. Type ".hh dbgerr004" for details
- ....................................................
- ................................................................
- .......
- Loading User Symbols
- PEB is paged out (Peb.Ldr = 000000eb`d7dd9018). Type ".hh dbgerr001" for details
- Loading unloaded module list
- .....
- For analysis of this file, run !analyze -v
- nt!KeBugCheckEx:
- fffff805`773fda40 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffbe8a`957d34a0=000000000000003b
- 5: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- SYSTEM_SERVICE_EXCEPTION (3b)
- An exception happened while executing a system service routine.
- Arguments:
- Arg1: 00000000c0000005, Exception code that caused the BugCheck
- Arg2: fffff80586139c9c, Address of the instruction which caused the BugCheck
- Arg3: ffffbe8a957d3da0, Address of the context record for the exception that caused the BugCheck
- Arg4: 0000000000000000, zero.
- Debugging Details:
- ------------------
- *** WARNING: Check Image - Checksum mismatch - Dump: 0x15afe, File: 0x1431b - C:\ProgramData\Dbg\sym\condrv.sys\232C8BF312000\condrv.sys
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 3468
- Key : Analysis.Elapsed.mSec
- Value: 3531
- Key : Analysis.IO.Other.Mb
- Value: 1
- Key : Analysis.IO.Read.Mb
- Value: 0
- Key : Analysis.IO.Write.Mb
- Value: 24
- Key : Analysis.Init.CPU.mSec
- Value: 1218
- Key : Analysis.Init.Elapsed.mSec
- Value: 17441
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 95
- Key : Bugcheck.Code.KiBugCheckData
- Value: 0x3b
- Key : Bugcheck.Code.LegacyAPI
- Value: 0x3b
- Key : Bugcheck.Code.TargetModel
- Value: 0x3b
- Key : Failure.Bucket
- Value: AV_condrv!CdpReadIoInput
- Key : Failure.Hash
- Value: {560092f7-ed27-1156-716a-d2dad3e79b70}
- Key : Hypervisor.Enlightenments.Value
- Value: 12576
- Key : Hypervisor.Enlightenments.ValueHex
- Value: 3120
- Key : Hypervisor.Flags.AnyHypervisorPresent
- Value: 1
- Key : Hypervisor.Flags.ApicEnlightened
- Value: 0
- Key : Hypervisor.Flags.ApicVirtualizationAvailable
- Value: 0
- Key : Hypervisor.Flags.AsyncMemoryHint
- Value: 0
- Key : Hypervisor.Flags.CoreSchedulerRequested
- Value: 0
- Key : Hypervisor.Flags.CpuManager
- Value: 0
- Key : Hypervisor.Flags.DeprecateAutoEoi
- Value: 1
- Key : Hypervisor.Flags.DynamicCpuDisabled
- Value: 0
- Key : Hypervisor.Flags.Epf
- Value: 0
- Key : Hypervisor.Flags.ExtendedProcessorMasks
- Value: 0
- Key : Hypervisor.Flags.HardwareMbecAvailable
- Value: 0
- Key : Hypervisor.Flags.MaxBankNumber
- Value: 0
- Key : Hypervisor.Flags.MemoryZeroingControl
- Value: 0
- Key : Hypervisor.Flags.NoExtendedRangeFlush
- Value: 1
- Key : Hypervisor.Flags.NoNonArchCoreSharing
- Value: 0
- Key : Hypervisor.Flags.Phase0InitDone
- Value: 1
- Key : Hypervisor.Flags.PowerSchedulerQos
- Value: 0
- Key : Hypervisor.Flags.RootScheduler
- Value: 0
- Key : Hypervisor.Flags.SynicAvailable
- Value: 1
- Key : Hypervisor.Flags.UseQpcBias
- Value: 0
- Key : Hypervisor.Flags.Value
- Value: 536632
- Key : Hypervisor.Flags.ValueHex
- Value: 83038
- Key : Hypervisor.Flags.VpAssistPage
- Value: 1
- Key : Hypervisor.Flags.VsmAvailable
- Value: 0
- Key : Hypervisor.RootFlags.AccessStats
- Value: 0
- Key : Hypervisor.RootFlags.CrashdumpEnlightened
- Value: 0
- Key : Hypervisor.RootFlags.CreateVirtualProcessor
- Value: 0
- Key : Hypervisor.RootFlags.DisableHyperthreading
- Value: 0
- Key : Hypervisor.RootFlags.HostTimelineSync
- Value: 0
- Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
- Value: 0
- Key : Hypervisor.RootFlags.IsHyperV
- Value: 0
- Key : Hypervisor.RootFlags.LivedumpEnlightened
- Value: 0
- Key : Hypervisor.RootFlags.MapDeviceInterrupt
- Value: 0
- Key : Hypervisor.RootFlags.MceEnlightened
- Value: 0
- Key : Hypervisor.RootFlags.Nested
- Value: 0
- Key : Hypervisor.RootFlags.StartLogicalProcessor
- Value: 0
- Key : Hypervisor.RootFlags.Value
- Value: 0
- Key : Hypervisor.RootFlags.ValueHex
- Value: 0
- Key : SecureKernel.HalpHvciEnabled
- Value: 0
- Key : WER.OS.Branch
- Value: vb_release
- Key : WER.OS.Version
- Value: 10.0.19041.1
- BUGCHECK_CODE: 3b
- BUGCHECK_P1: c0000005
- BUGCHECK_P2: fffff80586139c9c
- BUGCHECK_P3: ffffbe8a957d3da0
- BUGCHECK_P4: 0
- FILE_IN_CAB: MEMORY.DMP
- CONTEXT: ffffbe8a957d3da0 -- (.cxr 0xffffbe8a957d3da0)
- rax=0000000000000000 rbx=0000000000030501 rcx=000002b114b51a20
- rdx=0000000000000065 rsi=0000000000000000 rdi=000002b114b51a20
- rip=fffff80586139c9c rsp=ffffbe8a957d47a0 rbp=ffffbe8a957d4b80
- r8=0000000000000000 r9=0000000015f8bdde r10=ffffbe8a957d4810
- r11=0000000000000018 r12=0000000000000000 r13=ffffbe8a957d4958
- r14=000000000000000d r15=ffffbe8a957d4818
- iopl=0 nv up ei pl nz na pe nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
- condrv!CdpReadIoInput+0x4c:
- fffff805`86139c9c 8b4328 mov eax,dword ptr [rbx+28h] ds:002b:00000000`00030529=????????
- Resetting default scope
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXWINLOGON: 1
- PROCESS_NAME: conhost.exe
- STACK_TEXT:
- ffffbe8a`957d47a0 fffff805`86138ee8 : ffff988d`bf5443d0 000000eb`d7f7fb10 ffff988d`bf544390 00000000`00000000 : condrv!CdpReadIoInput+0x4c
- ffffbe8a`957d47f0 fffff805`861389c5 : 00000000`00000018 00000000`00000000 ffffc305`30aeb4e0 00000000`00000001 : condrv!CdReadIoInput+0xd8
- ffffbe8a`957d4840 fffff805`8613adcd : 000000eb`d7f7fb10 fffff805`8613ad60 ffffc305`394bbcf0 00000000`00000000 : condrv!CdpServerFastIoctl+0xf5
- ffffbe8a`957d4880 fffff805`7762d9d6 : 00000000`00000003 00000000`00000006 ffffbe8a`957d49e0 ffffc305`394bbcf0 : condrv!CdpFastIoDeviceControl+0x6d
- ffffbe8a`957d48d0 fffff805`7762d236 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x786
- ffffbe8a`957d4a20 fffff805`774119c5 : 00000000`00000000 ffffbe8a`957d4b80 00000000`00000000 ffffc305`394bbcf0 : nt!NtDeviceIoControlFile+0x56
- ffffbe8a`957d4a90 00007ff8`b6dad0c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
- 000000eb`d7f7f9f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`b6dad0c4
- SYMBOL_NAME: condrv!CdpReadIoInput+4c
- MODULE_NAME: condrv
- IMAGE_NAME: condrv.sys
- STACK_COMMAND: .cxr 0xffffbe8a957d3da0 ; kb
- BUCKET_ID_FUNC_OFFSET: 4c
- FAILURE_BUCKET_ID: AV_condrv!CdpReadIoInput
- OS_VERSION: 10.0.19041.1
- BUILDLAB_STR: vb_release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {560092f7-ed27-1156-716a-d2dad3e79b70}
- Followup: MachineOwner
- ---------
Kernel crash in |CdpReadIoInput()|
Posted by Anonymous on Sat 20th Apr 2024 11:40
raw | new post
Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.