cardyology
New Member
- Joined
- Jun 28, 2011
- Messages
- 2
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff96000172f61, The address that the exception occurred at...
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff96000172f61, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000020, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
FAULTING_IP:
win32k!ClearWakeBit+d
fffff960`00172f61 83791000 cmp dword ptr [rcx+10h],0
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000020
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b5100
0000000000000020
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x1E
PROCESS_NAME: conhost.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800a6447d0 -- (.trap 0xfffff8800a6447d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000010 rbx=0000000000000000 rcx=0000000000000010
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff96000172f61 rsp=fffff8800a644960 rbp=fffff900c1c04cd0
r8=fffff900c1b29c30 r9=0000000000000000 r10=fffff960001743c0
r11=fffff900c1c04cd0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
win32k!ClearWakeBit+0xd:
fffff960`00172f61 83791000 cmp dword ptr [rcx+10h],0 ds:0060:00000000`00000020=????????
Resetting default scope
MISALIGNED_IP:
win32k!ClearWakeBit+d
fffff960`00172f61 83791000 cmp dword ptr [rcx+10h],0
LAST_CONTROL_TRANSFER: from fffff80002ed15d8 to fffff80002e85d00
STACK_TEXT:
fffff880`0a643f48 fffff800`02ed15d8 : 00000000`0000001e ffffffff`c0000005 fffff960`00172f61 00000000`00000000 : nt!KeBugCheckEx
fffff880`0a643f50 fffff800`02e85382 : fffff880`0a644728 00000000`000300d2 fffff880`0a6447d0 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4987d
fffff880`0a6445f0 fffff800`02e83efa : 00000000`00000000 00000000`00000020 fffffa01`c0000000 00000000`000300d2 : nt!KiExceptionDispatch+0xc2
fffff880`0a6447d0 fffff960`00172f61 : fffff8a0`0f1afa01 fffff880`0a644968 fffff880`00020019 fffff880`0a6449d0 : nt!KiPageFault+0x23a
fffff880`0a644960 fffff8a0`0f1afa01 : fffff880`0a644968 fffff880`00020019 fffff880`0a6449d0 fffff880`0a6449a8 : win32k!ClearWakeBit+0xd
fffff880`0a644968 fffff880`0a644968 : fffff880`00020019 fffff880`0a6449d0 fffff880`0a6449a8 00000000`00000000 : 0xfffff8a0`0f1afa01
fffff880`0a644970 fffff880`00020019 : fffff880`0a6449d0 fffff880`0a6449a8 00000000`00000000 00000000`00000100 : 0xfffff880`0a644968
fffff880`0a644978 fffff880`0a6449d0 : fffff880`0a6449a8 00000000`00000000 00000000`00000100 00000000`00620060 : 0xfffff880`00020019
fffff880`0a644980 fffff880`0a6449a8 : 00000000`00000000 00000000`00000100 00000000`00620060 00000000`0022f650 : 0xfffff880`0a6449d0
fffff880`0a644988 00000000`00000000 : 00000000`00000100 00000000`00620060 00000000`0022f650 00000000`00000000 : 0xfffff880`0a6449a8
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -db !win32k
15 errors : !win32k (fffff960001720be-fffff96000172ff6)
fffff960001720b0 00 00 8b 74 24 50 81 fe 00 01 00 00 0f 85 *16 04 ...t$P..........
...
fffff96000172230 08 00 00 00 41 3b c5 77 70 48 8b 86 50 01 *08 00 ....A;.wpH..P...
fffff96000172240 48 89 84 24 88 02 00 00 48 8d 84 24 88 02 *40 00 H..$....H..$..@.
...
fffff96000172270 01 18 89 7c 24 20 4c 8d 8c 24 50 01 00 00 *55 33 ...|$ L..$P...U3
...
fffff96000172510 00 00 00 4d 8b c1 49 c1 e8 18 44 22 c3 41 *90 c8 ...M..I...D".A..
fffff96000172520 a0 45 8a d0 44 32 d3 39 bc 24 bc 00 00 00 *7d 66 .E..D2.9.$....}f
...
fffff960001726e0 00 4c 3b fa 75 0f 45 0f b7 8e c2 02 00 00 *51 c1 .L;.u.E.......Q.
...
fffff960001727b0 01 00 00 8b 50 18 41 0b 96 28 02 00 00 f6 *ca 40 ....P.A..(.....@
...
fffff960001727f0 b4 24 68 03 00 00 *f9 80 00 00 00 44 8b 6c 24 50 .$h........D.l$P
...
fffff96000172940 24 50 45 33 c0 41 *9b d5 41 8b cd e8 c0 06 03 00 $PE3.A..A.......
...
fffff96000172a70 03 fe 7f 48 0f af c8 48 c1 e9 18 49 8b 86 *68 01 ...H...H...I..h.
...
fffff96000172e30 00 66 41 21 43 06 4c 3b e7 74 1b ba 40 20 *08 00 .fA!C.L;.t..@ ..
...
fffff96000172e50 41 21 5b 06 eb 46 48 8b 05 93 f6 24 00 48 *9b 88 A![..FH....$.H..
...
fffff96000172fd0 0f 66 89 74 24 32 *76 89 74 24 30 48 89 44 24 38 .f.t$2v.t$0H.D$8
...
fffff96000172ff0 3b c6 0f 84 2c 01 *18 00 48 8b 0d f1 f4 24 00 48 ;...,...H....$.H
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
Followup: memory_corruption
---------