We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
It run into a bugcheck.
Microsoft (R) Windows Debugger Version 10.0.22621.755 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\012323-13015-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (6 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Machine Name: Kernel base = 0xfffff804`10400000 PsLoadedModuleList = 0xfffff804`1102a310 Debug session time: Mon Jan 23 00:23:18.773 2023 (UTC + 8:00) System Uptime: 0 days 0:22:39.505 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ ....... Loading User Symbols Loading unloaded module list ..... For analysis of this file, run !analyze -v 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack extents for the thread. Arg2: ffffd200a22f7510, Address of the trap frame for the exception that caused the BugCheck Arg3: ffffd200a22f7468, Address of the exception record for the exception that caused the BugCheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for SimpleSvmHook.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1718 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 4457 Key : Analysis.Init.CPU.mSec Value: 1015 Key : Analysis.Init.Elapsed.mSec Value: 52591 Key : Analysis.Memory.CommitPeak.Mb Value: 89 Key : FailFast.Name Value: INCORRECT_STACK Key : FailFast.Type Value: 4 FILE_IN_CAB: 012323-13015-01.dmp DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump BUGCHECK_CODE: 139 BUGCHECK_P1: 4 BUGCHECK_P2: ffffd200a22f7510 BUGCHECK_P3: ffffd200a22f7468 BUGCHECK_P4: 0 TRAP_FRAME: 48bc75de3b490005 -- (.trap 0x48bc75de3b490005) Unable to read trap frame at 48bc75de`3b490005 EXCEPTION_RECORD: ffffd200a22f7468 -- (.exr 0xffffd200a22f7468) ExceptionAddress: fffff8041084ea79 (nt!RtlpGetStackLimitsEx+0x00000000001c9dd9) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001 NumberParameters: 1 Parameter[0]: 0000000000000004 Subcode: 0x4 FAST_FAIL_INCORRECT_STACK BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: crossfire.exe ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application. EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 0000000000000004 EXCEPTION_STR: 0xc0000409 STACK_TEXT: ffffd200`a22f71e8 fffff804`10805e69 : 00000000`00000139 00000000`00000004 ffffd200`a22f7510 ffffd200`a22f7468 : nt!KeBugCheckEx ffffd200`a22f71f0 fffff804`10806290 : 89481024`6c894808 20ec8348`57182474 33002b8d`c90d8d48 8b48ff98`3fe2e8db : nt!KiBugCheckDispatch+0x69 ffffd200`a22f7330 fffff804`10804623 : 840f07e8`83c38b00 7401e883`0000008e e8835674`01e88372 1e7401e8`833a7401 : nt!KiFastFailDispatch+0xd0 ffffd200`a22f7510 fffff804`1084ea79 : ffffd200`a22f7920 ffffbc0e`8c5f7bd8 ffffd200`a22f7710 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323 ffffd200`a22f76a0 fffff804`10684e71 : ffffd200`a22f7920 00000000`00000000 00000000`00000000 00000000`00000003 : nt!RtlpGetStackLimitsEx+0x1c9dd9 ffffd200`a22f76d0 fffff804`10683ce6 : ffffbc0e`8c5f7bd8 ffffd200`a22f7e20 ffffbc0e`8c5f7bd8 ffffbc0e`8ee5bec0 : nt!RtlDispatchException+0xe1 ffffd200`a22f78f0 fffff804`107f4d32 : 6857baff`fffc77e8 6c4ee8cf`8b486165 48bc75de`3b490005 246c8b48`30245c8b : nt!KiDispatchException+0x186 ffffd200`a22f7fb0 fffff804`107f4d00 : fffff804`10805fa5 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12 ffffbc0e`8c5f7a98 fffff804`10805fa5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue ffffbc0e`8c5f7aa0 fffff804`10801ce0 : 00000000`02bf0000 00000000`00000001 00000007`fb279000 fffff804`206018f2 : nt!KiExceptionDispatch+0x125 ffffbc0e`8c5f7c80 fffff804`20606488 : ffffbc0e`8903ca50 fffff804`206033af fffff804`10db2030 fffff804`206067fc : nt!KiGeneralProtectionFault+0x320 ffffbc0e`8c5f7e10 ffffbc0e`8903ca50 : fffff804`206033af fffff804`10db2030 fffff804`206067fc 40000001`00000000 : SimpleSvmHook+0x6488 ffffbc0e`8c5f7e18 fffff804`206033af : fffff804`10db2030 fffff804`206067fc 40000001`00000000 00000001`00870f10 : 0xffffbc0e`8903ca50 ffffbc0e`8c5f7e20 fffff804`10db202f : fffff804`206067fc 40000001`00000000 00000001`00870f10 fffff804`20609060 : SimpleSvmHook+0x33af ffffbc0e`8c5f7e28 fffff804`206067fc : 40000001`00000000 00000001`00870f10 fffff804`20609060 00000001`00000015 : nt!ExFreePool+0x1f ffffbc0e`8c5f7e30 40000001`00000000 : 00000001`00870f10 fffff804`20609060 00000001`00000015 00000000`0000020c : SimpleSvmHook+0x67fc ffffbc0e`8c5f7e38 00000001`00870f10 : fffff804`20609060 00000001`00000015 00000000`0000020c fffff804`20606641 : 0x40000001`00000000 ffffbc0e`8c5f7e40 fffff804`20609060 : 00000001`00000015 00000000`0000020c fffff804`20606641 ffffbc0e`8c5f2000 : 0x00000001`00870f10 ffffbc0e`8c5f7e48 00000001`00000015 : 00000000`0000020c fffff804`20606641 ffffbc0e`8c5f2000 ffffbc0e`8c5f7eb0 : SimpleSvmHook+0x9060 ffffbc0e`8c5f7e50 00000000`0000020c : fffff804`20606641 ffffbc0e`8c5f2000 ffffbc0e`8c5f7eb0 00000000`00000000 : 0x00000001`00000015 ffffbc0e`8c5f7e58 fffff804`20606641 : ffffbc0e`8c5f2000 ffffbc0e`8c5f7eb0 00000000`00000000 00000000`00000000 : 0x20c ffffbc0e`8c5f7e60 ffffbc0e`8c5f2000 : ffffbc0e`8c5f7eb0 00000000`00000000 00000000`00000000 00000000`00000000 : SimpleSvmHook+0x6641 ffffbc0e`8c5f7e68 ffffbc0e`8c5f7eb0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffbc0e`8c5f2000 ffffbc0e`8c5f7e70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000001`00000000 : 0xffffbc0e`8c5f7eb0 SYMBOL_NAME: SimpleSvmHook+6488 MODULE_NAME: SimpleSvmHook IMAGE_NAME: SimpleSvmHook.sys STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 6488 FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_SimpleSvmHook!unknown_function OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {fc016bc3-df79-ffa1-17aa-7b22dbcf9962} Followup: MachineOwner ---------
It seems that it crashed at [VmmMain.cpp][Line:250]
The text was updated successfully, but these errors were encountered:
No branches or pull requests
It run into a bugcheck.
It seems that it crashed at [VmmMain.cpp][Line:250]
The text was updated successfully, but these errors were encountered: