Skip to content

Instantly share code, notes, and snippets.

@jadbox
Created July 15, 2019 20:34
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save jadbox/77408da2a657191e909d25b11b9f6e3d to your computer and use it in GitHub Desktop.
Save jadbox/77408da2a657191e909d25b11b9f6e3d to your computer and use it in GitHub Desktop.
Windows 10 Insider Preview 18936.1000 (rs_prerelease) - Error 0xc0000005
Windows 10 Insider Preview 18936.1000 (rs_prerelease) - Error 0xc0000005
sutuperr.log
2019-07-15 11:25:30, Error CONX 0xd0000034 Failed to add user mode driver [%SystemRoot%\system32\DRIVERS\UMDF\uicciso.dll]
2019-07-15 11:30:09, Error SP pSPRemoveUpgradeRegTree: failed to delete reg tree HKLM\SYSTEM\Setup\Upgrade[gle=0x00000005]
2019-07-15 11:30:19, Error MIG Ignoring replacement manifest with no settingsVersionRange or versionRange attribute in migration element: Microsoft-Windows-Container-Manager
2019-07-15 11:30:21, Error [0x080831] MIG CSIAgent: Invalid xml format: FormatException: "script" attribute is mandatory. class Mig::CMXEMerge *__cdecl Mig::CMXEMigrationXml::LoadMerge(class UnBCL::XmlNode *,int,class Mig::CMXEMigrationXml *,class Mig::CMXEXmlComponent *)
2019-07-15 11:30:22, Error [0x080831] MIG CSIAgent: Invalid xml format: FormatException: "script" attribute is mandatory. class Mig::CMXEMerge *__cdecl Mig::CMXEMigrationXml::LoadMerge(class UnBCL::XmlNode *,int,class Mig::CMXEMigrationXml *,class Mig::CMXEXmlComponent *)
2019-07-15 11:30:51, Error MIG Ignoring replacement manifest with no settingsVersionRange or versionRange attribute in migration element: Microsoft-Windows-Container-Manager
2019-07-15 11:30:53, Error [0x080831] MIG CSIAgent: Invalid xml format: FormatException: Component with display name: Plugin/{C939EC0F-2F56-4CE8-AF56-2336596A5FA7} already loaded __cdecl Mig::CMXEMigrationXml::CMXEMigrationXml(class Mig::CPlatform *,class UnBCL::String *,class UnBCL::XmlDocument *,class UnBCL::String *,class UnBCL::String *)
2019-07-15 11:32:19, FatalError SP Exception handler called! Details:
2019-07-15 11:32:19, FatalError SP Exception record: 0
2019-07-15 11:32:19, FatalError SP Exception code: 0xc0000005
2019-07-15 11:32:19, FatalError SP Exception flags: 0x0
2019-07-15 11:32:19, FatalError SP Exception address: 00007FFDC9C55E93
2019-07-15 11:32:19, FatalError SP Exception parameter 0: 0000000000000000
2019-07-15 11:32:19, FatalError SP Exception parameter 1: 0000000000000010
2019-07-15 11:32:19, FatalError [0x090001] PANTHR Exception (code 0xC0000005: ACCESS_VIOLATION) occurred at 0x00007FFDC9C55E93 in C:\$WINDOWS.~BT\Sources\unbcl.dll (+0000000000055E93). Minidump attached (188151 bytes) to diagerr.xml and C:\WINDOWS\Panther\UnattendGC\mnd4D4A.diagerr.mdmp.
===== DUMP
Microsoft (R) Windows Debugger Version 10.0.18914.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Panther\UnattendGC\mnd4D4A.diagerr.mdmp]
User Mini Dump File: Only registers, stack and portions of memory are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Version 18922 MP (16 procs) Free x64
Product: WinNt, suite: SingleUserTS
18922.1000.amd64fre.rs_prerelease.190614-1427
Machine Name:
Debug session time: Mon Jul 15 11:32:19.000 2019 (UTC - 7:00)
System Uptime: not available
Process Uptime: 0 days 0:07:25.000
................................................................
................................................................
....................................................
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(3290.b78): Access violation - code c0000005 (first/second chance not available)
For analysis of this file, run !analyze -v
ntdll!NtGetContextThread+0x14:
00007ffd`e806f1c4 c3 ret
0:000> !analyze -v
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
Failed to request MethodData, not in JIT code range
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullClassPtr
Key : AV.Fault
Value: Read
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.Elapsed.Sec
Value: 38
Key : Analysis.Memory.CommitPeak.Mb
Value: 210
Key : CLR.Engine
Value: CLR
Key : CLR.Version
Value: 4.0.30319.0
Key : Timeline.Process.Start.DeltaSec
Value: 445
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
Timeline: !analyze.Start
Name: <blank>
Time: 2019-07-15T20:29:26.953Z
Diff: 7027953 mSec
Timeline: Dump.Current
Name: <blank>
Time: 2019-07-15T18:32:19.0Z
Diff: 0 mSec
Timeline: Process.Start
Name: <blank>
Time: 2019-07-15T18:24:54.0Z
Diff: 445000 mSec
DUMP_CLASS: 2
DUMP_QUALIFIER: 400
MODLIST_WITH_TSCHKSUM_HASH: 522ab0d4afe5bda38d5f8ad165aecf98bd232579
MODLIST_SHA1_HASH: 9a9cdadca80c6b8233ada3c7cbef7848414ae024
DUMP_FLAGS: 0
DUMP_TYPE: 2
CONTEXT: (.ecxr)
rax=00000000045a87eb rbx=0000022b3be600a8 rcx=0000022b3be60098
rdx=0000000000000000 rsi=0000000000000000 rdi=0000022b3be60098
rip=00007ffdc9c55e93 rsp=000000343cb7ecc0 rbp=000000343cb7ee50
r8=0000000000000000 r9=0000000000000000 r10=00000fffafc985fe
r11=000000343cb7ecf8 r12=0000000000000000 r13=0000022b3dab86c8
r14=00007ffd7de79410 r15=0000022b3dab9208
iopl=0 nv up ei pl nz na po nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010206
unbcl!UnBCL::String::String+0x43:
00007ffd`c9c55e93 488b4a10 mov rcx,qword ptr [rdx+10h] ds:00000000`00000010=????????????????
Resetting default scope
FAULTING_IP:
unbcl!UnBCL::String::String+43
00007ffd`c9c55e93 488b4a10 mov rcx,qword ptr [rdx+10h]
EXCEPTION_RECORD: (.exr -1)
ExceptionAddress: 00007ffdc9c55e93 (unbcl!UnBCL::String::String+0x0000000000000043)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000010
Attempt to read from address 0000000000000010
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_READ
PROCESS_NAME: SetupHost.Exe
FOLLOWUP_IP:
unbcl!UnBCL::String::String+43
00007ffd`c9c55e93 488b4a10 mov rcx,qword ptr [rdx+10h]
READ_ADDRESS: 0000000000000010
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000010
WATSON_BKT_PROCSTAMP: 8c6b889d
WATSON_BKT_PROCVER: 10.0.18936.1000
PROCESS_VER_PRODUCT: Microsoft® Windows® Operating System
WATSON_BKT_MODULE: unbcl.dll
WATSON_BKT_MODSTAMP: 23d0cfcd
WATSON_BKT_MODOFFSET: 55e93
WATSON_BKT_MODVER: 10.0.18936.1000
MODULE_VER_PRODUCT: Microsoft® Windows® Operating System
BUILD_VERSION_STRING: 18922.1000.amd64fre.rs_prerelease.190614-1427
MISSING_CLR_SYMBOL: 0
ANALYSIS_SESSION_HOST: DESKTOP-P2MHEAH
ANALYSIS_SESSION_TIME: 07-15-2019 13:29:26.0953
ANALYSIS_VERSION: 10.0.18914.1001 amd64fre
MANAGED_CODE: 1
MANAGED_ENGINE_MODULE: clr
MANAGED_ANALYSIS_PROVIDER: SOS
MANAGED_THREAD_ID: b78
THREAD_ATTRIBUTES:
BUGCHECK_STR: APPLICATION_FAULT_NULL_CLASS_PTR_READ_NULL_CLASS_PTR_DEREFERENCE_INVALID_POINTER_READ
PRIMARY_PROBLEM_CLASS: APPLICATION_FAULT
PROBLEM_CLASSES:
ID: [0n313]
Type: [@ACCESS_VIOLATION]
Class: Addendum
Scope: BUCKET_ID
Name: Omit
Data: Omit
PID: [Unspecified]
TID: [0xb78]
Frame: [0] : unbcl!UnBCL::String::String
ID: [0n285]
Type: [INVALID_POINTER_READ]
Class: Primary
Scope: BUCKET_ID
Name: Add
Data: Omit
PID: [Unspecified]
TID: [0xb78]
Frame: [0] : unbcl!UnBCL::String::String
ID: [0n309]
Type: [NULL_CLASS_PTR_DEREFERENCE]
Class: Primary
Scope: BUCKET_ID
Name: Add
Data: Omit
PID: [Unspecified]
TID: [0xb78]
Frame: [0] : unbcl!UnBCL::String::String
ID: [0n310]
Type: [NULL_CLASS_PTR_READ]
Class: Primary
Scope: DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
BUCKET_ID
Name: Add
Data: Omit
PID: [0x3290]
TID: [0xb78]
Frame: [0] : unbcl!UnBCL::String::String
LAST_CONTROL_TRANSFER: from 00007ffd7da27798 to 00007ffdc9c55e93
STACK_TEXT:
00000034`3cb7ecc0 00007ffd`7da27798 : 0000022b`3be60098 0000022b`3be600a8 0000022b`3be60098 00007ffd`c9c01d32 : unbcl!UnBCL::String::String+0x43
00000034`3cb7ed00 00007ffd`7da27c16 : 0000022b`3be60098 00000000`00000000 00007ffd`7de793f8 00000000`00000001 : SetupPlatform!CARPValidator::GetRegStringValue+0x94
00000034`3cb7ed50 00007ffd`7da28d7c : 00000034`3cb7f020 00000034`3cb7f030 00007ffd`7da28b94 00000000`00000000 : SetupPlatform!CARPValidator::AddToARPList+0x436
00000034`3cb7ef70 00007ffd`7da2a4ef : 0000022b`00000000 00000000`00000000 0000022b`00000000 0000022b`3dab86c8 : SetupPlatform!CARPValidator::BuildARPList+0xaf0
00000034`3cb7f140 00007ffd`7db4691a : 0000022b`3c2658e8 0000022b`46acfb58 00007ffd`7db46854 0000022b`3dab86c8 : SetupPlatform!CARPValidator::ValidatePostExecution+0x1ef
00000034`3cb7f230 00007ffd`7d8fddca : 00000000`00000000 00000000`00000000 00000000`00000000 00007ffd`7de1bac4 : SetupPlatform!COperationQueue::ExecuteOperations+0x3206
00000034`3cb7f550 00007ffd`7d8ff04d : 0000022b`35c77d80 00007ffd`7d8fefc2 00000000`00000000 00000000`00000064 : SetupPlatform!CDeploymentBase::DoExecuteOperations+0x5a
00000034`3cb7f5d0 00007ffd`96acce14 : 0000022b`35c77ce8 00007ffd`00000000 0000022b`332573e8 80000000`00000001 : SetupPlatform!CDeploymentBase::ExecuteCurrentOperations+0x67d
00000034`3cb7f750 00007ffd`96a8922a : 0000022b`33257620 00000034`3cb7f879 0000022b`332573d0 0000022b`332573d0 : SetupCore!CMoSetupPlatformT<CUnknownImpl<IUnknown> >::ExecuteOperations+0xd0
00000034`3cb7f7b0 00007ffd`96a87b80 : 0000022b`332573d0 0000022b`3be0a690 0000022b`332573d0 0000022b`3650d284 : SetupCore!CDlpActionDataMigrate::MigrateData+0x80e
00000034`3cb7f8e0 00007ffd`96abc977 : 0000022b`332573d0 0000022b`332573d0 0000022b`35d08cb0 00000000`00000000 : SetupCore!CDlpActionDataMigrate::ExecuteRoutine+0x760
00000034`3cb7f960 00007ffd`ad609383 : 0000d53f`00000003 0000022b`35d08cb0 0000022b`35d08cb0 00000000`00000000 : SetupCore!CDlpActionImpl<CDlpErrorImpl<CDlpObjectInternalImpl<CUnknownImpl<IMoSetupDlpAction> > > >::Execute+0x1b7
00000034`3cb7f9d0 00007ffd`ad5fb308 : 0000022b`35d08cb0 00000034`3cb7fad9 0000022b`35d08cb0 0000022b`35d08cb0 : WinDlp!CDlpTask::ExecuteAction+0x7b
00000034`3cb7fa40 00007ffd`e7a35ee4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : WinDlp!CDlpTask::ExecuteActionsThreadProc+0x338
00000034`3cb7fb40 00007ffd`e80432f1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0x14
00000034`3cb7fb70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21
THREAD_SHA1_HASH_MOD_FUNC: 2cd3b51c3ef171b98836ca25f23da0dfd0411f39
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 8e36d72af084c51f69ece5d4ea98a4acff5ec0c3
THREAD_SHA1_HASH_MOD: 4fcff459afdc59e394d2dc4151d20f434fcb8466
FAULT_INSTR_CODE: 104a8b48
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: unbcl!UnBCL::String::String+43
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: unbcl
IMAGE_NAME: unbcl.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 23d0cfcd
STACK_COMMAND: ~33s ; .ecxr ; kb
FAILURE_BUCKET_ID: NULL_CLASS_PTR_READ_c0000005_unbcl.dll!UnBCL::String::String
BUCKET_ID: APPLICATION_FAULT_NULL_CLASS_PTR_READ_NULL_CLASS_PTR_DEREFERENCE_INVALID_POINTER_READ_unbcl!UnBCL::String::String+43
FAILURE_EXCEPTION_CODE: c0000005
FAILURE_IMAGE_NAME: unbcl.dll
BUCKET_ID_IMAGE_STR: unbcl.dll
FAILURE_MODULE_NAME: unbcl
BUCKET_ID_MODULE_STR: unbcl
FAILURE_FUNCTION_NAME: UnBCL::String::String
BUCKET_ID_FUNCTION_STR: UnBCL::String::String
BUCKET_ID_OFFSET: 43
BUCKET_ID_MODTIMEDATESTAMP: 23d0cfcd
BUCKET_ID_MODCHECKSUM: 1133f7
BUCKET_ID_MODVER_STR: 10.0.18936.1000
BUCKET_ID_PREFIX_STR: APPLICATION_FAULT_NULL_CLASS_PTR_READ_NULL_CLASS_PTR_DEREFERENCE_INVALID_POINTER_READ_
FAILURE_PROBLEM_CLASS: APPLICATION_FAULT
FAILURE_SYMBOL_NAME: unbcl.dll!UnBCL::String::String
TARGET_TIME: 2019-07-15T18:32:19.000Z
OSBUILD: 18922
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 256
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190614-1427
BUILDLAB_STR: rs_prerelease
BUILDOSVER_STR: 10.0.18922.1000.amd64fre.rs_prerelease.190614-1427
ANALYSIS_SESSION_ELAPSED_TIME: 977b
ANALYSIS_SOURCE: UM
FAILURE_ID_HASH_STRING: um:null_class_ptr_read_c0000005_unbcl.dll!unbcl::string::string
FAILURE_ID_HASH: {7f9d7412-0073-0c1a-fb1f-53b71ba84521}
Followup: MachineOwner
---------
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment