H
Hereiyu
Guest
I have been having KMode exception not handled boot loops after updating to 20H2 and I don't have anything to system restore to.
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\Debugging\121020-12562-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`75200000 PsLoadedModuleList = 0xfffff804`75e2a310
Debug session time: Thu Dec 10 03:03:34.208 2020 (UTC - 8:00)
System Uptime: 0 days 0:00:10.965
Loading Kernel Symbols
...............................................................
................................................................
......................................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`755f45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffca06`d3d6ca10=000000000000001e
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff804757bd9bc, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2327
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on MEDIASERVER
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3347
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff804757bd9bc
BUGCHECK_P3: 0
BUGCHECK_P4: 0
READ_ADDRESS: fffff80475efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80475e0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80475e0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: smss.exe
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
STACK_TEXT:
ffffca06`d3d6ca08 fffff804`75630105 : 00000000`0000001e ffffffff`c0000005 fffff804`757bd9bc 00000000`00000000 : nt!KeBugCheckEx
ffffca06`d3d6ca10 fffff804`756066ac : 00000000`00001000 ffffca06`d3d6d2b0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1de8e5
ffffca06`d3d6d0d0 fffff804`75602843 : 00000000`c0000225 ffffba0e`5faa9c50 00000000`00000000 ffffca06`d3d6d3f1 : nt!KiExceptionDispatch+0x12c
ffffca06`d3d6d2b0 fffff804`757bd9bc : 00000000`11000001 fffff804`75b6b2b7 00000000`c0000023 00000000`12000004 : nt!KiPageFault+0x443
ffffca06`d3d6d440 fffff804`75b6ef3a : 00000000`00000000 00000000`00000000 ffffca06`d3d6d500 ffffba0e`5f3ef650 : nt!BiSpacesUpdatePhysicalDevicePath+0x30
ffffca06`d3d6d4a0 fffff804`75b6d10c : ffffffff`800008f8 ffffba0e`5f3ef650 fffff804`0000002a 00000000`00000000 : nt!BiUpdateEfiEntry+0x96
ffffca06`d3d6d540 fffff804`75b6c427 : ffffba0e`5f3ef650 00000000`00000000 ffffba0e`6109abb0 ffffffff`800008f8 : nt!BiCreateEfiEntry+0x104
ffffca06`d3d6d5a0 fffff804`75b6c612 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffffff`800008f4 : nt!BiBindEfiEntries+0xc7
ffffca06`d3d6d5d0 fffff804`75a444fa : 00000000`00000000 ffffba0e`00000000 00000000`00000000 00000000`00000006 : nt!BiBindEfiNamespaceObjects+0x52
ffffca06`d3d6d610 fffff804`75966836 : ffffca06`d3d6d780 00000000`00000000 00000000`00000004 00000000`00000001 : nt!BiOpenSystemStore+0xdd35e
ffffca06`d3d6d690 fffff804`75af1835 : 00000000`00000000 ffffca06`d3d6d730 00000000`00000000 00000000`00000000 : nt!BcdOpenStore+0x6e
ffffca06`d3d6d6d0 fffff804`75974433 : 00000000`00000000 ffffca06`d3d6d730 00000000`00000000 00000000`00000000 : nt!PopBcdOpen+0x11
ffffca06`d3d6d700 fffff804`75973970 : 00000000`00000000 ffffca06`00000000 00000000`00000000 fffff804`75609f60 : nt!PoInitHiberServices+0x9b
ffffca06`d3d6d770 fffff804`75970ee0 : ffffa78f`f0d6d040 00000000`00000000 00000000`c0000001 00000000`00000000 : nt!CmCompleteRegistryInitialization+0x108
ffffca06`d3d6d800 fffff804`75605fb5 : ffff3096`6047abc7 ffffa78f`f2bf74f8 00000000`00000001 00000000`00000001 : nt!NtInitializeRegistry+0x60
ffffca06`d3d6d830 fffff804`755f8400 : fffff804`75970eaa 00000000`00000080 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
ffffca06`d3d6d9c8 fffff804`75970eaa : 00000000`00000080 00000000`00000000 00000000`00000000 0000026a`64c051a0 : nt!KiServiceLinkage
ffffca06`d3d6d9d0 fffff804`75605fb5 : ffffa78f`f0d6d040 00000000`00000000 ffffca06`00000000 ffffa78f`00000000 : nt!NtInitializeRegistry+0x2a
ffffca06`d3d6da00 00007ffe`a23cdd84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000b8`5916ef78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`a23cdd84
SYMBOL_NAME: nt!BiSpacesUpdatePhysicalDevicePath+30
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 30
FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!BiSpacesUpdatePhysicalDevicePath
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e4c03c60-e4b1-6143-d04d-dd444ded48fc}
Followup: MachineOwner
---------
Continue reading...
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\Debugging\121020-12562-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`75200000 PsLoadedModuleList = 0xfffff804`75e2a310
Debug session time: Thu Dec 10 03:03:34.208 2020 (UTC - 8:00)
System Uptime: 0 days 0:00:10.965
Loading Kernel Symbols
...............................................................
................................................................
......................................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`755f45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffca06`d3d6ca10=000000000000001e
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff804757bd9bc, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2327
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on MEDIASERVER
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3347
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff804757bd9bc
BUGCHECK_P3: 0
BUGCHECK_P4: 0
READ_ADDRESS: fffff80475efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80475e0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80475e0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: smss.exe
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
STACK_TEXT:
ffffca06`d3d6ca08 fffff804`75630105 : 00000000`0000001e ffffffff`c0000005 fffff804`757bd9bc 00000000`00000000 : nt!KeBugCheckEx
ffffca06`d3d6ca10 fffff804`756066ac : 00000000`00001000 ffffca06`d3d6d2b0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1de8e5
ffffca06`d3d6d0d0 fffff804`75602843 : 00000000`c0000225 ffffba0e`5faa9c50 00000000`00000000 ffffca06`d3d6d3f1 : nt!KiExceptionDispatch+0x12c
ffffca06`d3d6d2b0 fffff804`757bd9bc : 00000000`11000001 fffff804`75b6b2b7 00000000`c0000023 00000000`12000004 : nt!KiPageFault+0x443
ffffca06`d3d6d440 fffff804`75b6ef3a : 00000000`00000000 00000000`00000000 ffffca06`d3d6d500 ffffba0e`5f3ef650 : nt!BiSpacesUpdatePhysicalDevicePath+0x30
ffffca06`d3d6d4a0 fffff804`75b6d10c : ffffffff`800008f8 ffffba0e`5f3ef650 fffff804`0000002a 00000000`00000000 : nt!BiUpdateEfiEntry+0x96
ffffca06`d3d6d540 fffff804`75b6c427 : ffffba0e`5f3ef650 00000000`00000000 ffffba0e`6109abb0 ffffffff`800008f8 : nt!BiCreateEfiEntry+0x104
ffffca06`d3d6d5a0 fffff804`75b6c612 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffffff`800008f4 : nt!BiBindEfiEntries+0xc7
ffffca06`d3d6d5d0 fffff804`75a444fa : 00000000`00000000 ffffba0e`00000000 00000000`00000000 00000000`00000006 : nt!BiBindEfiNamespaceObjects+0x52
ffffca06`d3d6d610 fffff804`75966836 : ffffca06`d3d6d780 00000000`00000000 00000000`00000004 00000000`00000001 : nt!BiOpenSystemStore+0xdd35e
ffffca06`d3d6d690 fffff804`75af1835 : 00000000`00000000 ffffca06`d3d6d730 00000000`00000000 00000000`00000000 : nt!BcdOpenStore+0x6e
ffffca06`d3d6d6d0 fffff804`75974433 : 00000000`00000000 ffffca06`d3d6d730 00000000`00000000 00000000`00000000 : nt!PopBcdOpen+0x11
ffffca06`d3d6d700 fffff804`75973970 : 00000000`00000000 ffffca06`00000000 00000000`00000000 fffff804`75609f60 : nt!PoInitHiberServices+0x9b
ffffca06`d3d6d770 fffff804`75970ee0 : ffffa78f`f0d6d040 00000000`00000000 00000000`c0000001 00000000`00000000 : nt!CmCompleteRegistryInitialization+0x108
ffffca06`d3d6d800 fffff804`75605fb5 : ffff3096`6047abc7 ffffa78f`f2bf74f8 00000000`00000001 00000000`00000001 : nt!NtInitializeRegistry+0x60
ffffca06`d3d6d830 fffff804`755f8400 : fffff804`75970eaa 00000000`00000080 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
ffffca06`d3d6d9c8 fffff804`75970eaa : 00000000`00000080 00000000`00000000 00000000`00000000 0000026a`64c051a0 : nt!KiServiceLinkage
ffffca06`d3d6d9d0 fffff804`75605fb5 : ffffa78f`f0d6d040 00000000`00000000 ffffca06`00000000 ffffa78f`00000000 : nt!NtInitializeRegistry+0x2a
ffffca06`d3d6da00 00007ffe`a23cdd84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000b8`5916ef78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`a23cdd84
SYMBOL_NAME: nt!BiSpacesUpdatePhysicalDevicePath+30
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 30
FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!BiSpacesUpdatePhysicalDevicePath
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e4c03c60-e4b1-6143-d04d-dd444ded48fc}
Followup: MachineOwner
---------
Continue reading...