Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bugcheck 0x1a on Windows Server 2022 #7778

Closed
1 of 2 tasks
DjArt opened this issue Nov 30, 2021 · 3 comments
Closed
1 of 2 tasks

Bugcheck 0x1a on Windows Server 2022 #7778

DjArt opened this issue Nov 30, 2021 · 3 comments

Comments

@DjArt
Copy link

DjArt commented Nov 30, 2021

Version

Microsoft Windows [Version 10.0.20348.350]

WSL Version

  • WSL 2
  • WSL 1

Kernel Version

5.10.16

Distro Version

Ubuntu 20.04

Other Software

ViPNet Client 4U for Linux

Repro Steps

sudo dpkg -i vipnetclient-gui_gost_ru_amd64_4.12.0-8655.deb

Expected Behavior

Successful installation

Actual Behavior

Windows bugcheck

Diagnostic Logs

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000042001, The subtype of the BugCheck.
Arg2: ffff9c8a480da900
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6484

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 19573

    Key  : Analysis.Init.CPU.mSec
    Value: 1468

    Key  : Analysis.Init.Elapsed.mSec
    Value: 154151

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 93

    Key  : WER.OS.Branch
    Value: fe_release

    Key  : WER.OS.Timestamp
    Value: 2021-05-07T15:00:00Z

    Key  : WER.OS.Version
    Value: 10.0.20348.1


FILE_IN_CAB:  MEMORY.DMP

DUMP_FILE_ATTRIBUTES: 0x800

BUGCHECK_CODE:  1a

BUGCHECK_P1: 42001

BUGCHECK_P2: ffff9c8a480da900

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME:  vipnetclient

STACK_TEXT:  
ffffb80c`205998a8 fffff800`23cc483f     : 00000000`0000001a 00000000`00042001 ffff9c8a`480da900 00000000`00000000 : nt!KeBugCheckEx
ffffb80c`205998b0 fffff800`23b26ffb     : ffff9c8a`4ab06310 ffff9c8a`4d42fa0e ffff9c8a`480daf30 00000000`00000000 : nt!MiDecrementSubsectionViewCount+0x19d80f
ffffb80c`205998f0 fffff800`23b271d4     : ffff9c8a`4ab06290 00000000`00000001 00000000`00000000 00000000`00000000 : nt!MiDecrementSubsections+0x7b
ffffb80c`20599920 fffff800`23f77c9f     : 00000000`00000008 ffff9c8a`4ab06290 ffff9483`59f770c0 ffff9483`5995f780 : nt!MiUnmapViewSubsections+0x54
ffffb80c`20599960 fffff800`23fc42b9     : ffff9483`59f770c0 ffff9483`5995f780 00000000`00000000 ffff9c8a`480daf30 : nt!MiDeleteVad+0x2af
ffffb80c`20599a10 fffff800`23fc4095     : ffff9483`5995f780 00000000`00000000 ffff9483`59f770c0 00000000`00000000 : nt!MiUnmapVad+0x49
ffffb80c`20599a40 fffff800`23fc3f0f     : ffff9483`59f770c0 00007f64`00000008 ffff9483`306ee640 00000000`00000000 : nt!MiUnmapViewOfSection+0x155
ffffb80c`20599b30 fffff800`23fc35cc     : ffff9483`5abd2080 00000000`00000000 00010008`00030009 ffff9483`59f770c0 : nt!NtUnmapViewOfSectionEx+0x9f
ffffb80c`20599b80 fffff800`23c28535     : 00000000`4143784c fffff800`23800000 00000000`00000003 ffffe18a`fdda5e60 : nt!NtUnmapViewOfSection+0xc
ffffb80c`20599bb0 fffff800`23c1a8f0     : fffff800`28d280ce ffffe18b`1c1a6090 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
ffffb80c`20599d48 fffff800`28d280ce     : ffffe18b`1c1a6090 00000000`00000000 00000000`00000000 00000000`24e6f3ec : nt!KiServiceLinkage
ffffb80c`20599d50 fffff800`28cfed2a     : ffffe18a`f3da0950 ffffe18b`18aae008 00000000`00000000 ffffb80c`20599fd0 : LXCORE!LxpMiVadNodeCleanup+0x62
ffffb80c`20599d80 fffff800`28cff4db     : 00000000`80000000 ffffb80c`20599ef0 ffffe18a`eb9cb780 ffffe18b`18aae000 : LXCORE!LxpProcessConvertToZombie+0x172
ffffb80c`20599dc0 fffff800`28ca1708     : 00000000`80000000 ffffb80c`20599ef0 ffffe18a`eb9cb780 ffffe18b`18aae000 : LXCORE!LxpProcessNotifyAssociatedThreadGroupInactive+0x27
ffffb80c`20599df0 fffff800`28d1c953     : ffffe18b`18aae000 fffff800`00000000 ffffe18b`18aae0f8 ffffe18b`18aae000 : LXCORE!LxpThreadGroupConvertToZombie+0x2b4
ffffb80c`20599f40 fffff800`28d19069     : ffffe18b`18aae000 ffffffff`8001cbe4 00000000`00000000 ffffb80c`2059a120 : LXCORE!LxpThreadGroupEnd+0x7b
ffffb80c`20599f90 fffff800`28d1abcc     : ffffb80c`2059a1e8 ffffe18b`00000000 00000000`00000011 ffffb80c`2059a120 : LXCORE!LxpThreadEnd+0x2b1
ffffb80c`2059a0d0 fffff800`28d90eae     : ffff9483`4fc96290 ffffb80c`2059a1f9 fffff800`28d90e60 ffffb80c`2059a1e8 : LXCORE!LxpThreadSignalApc+0xd0
ffffb80c`2059a100 fffff800`23a212e9     : ffff9483`5abd2080 ffffb80c`2059a3a0 ffff9483`59f77740 00000000`00000000 : LXCORE!LxpNtStateThreadApcUser+0x4e
ffffb80c`2059a1a0 fffff800`23c1b050     : 00000000`00000000 ffffb80c`2059a260 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x4d9
ffffb80c`2059a260 fffff800`23c2883a     : 00007f64`191ec6a0 00000000`00000000 00000000`00000469 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffffb80c`2059a3a0 00007f64`190e62c6     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x47
00007fff`e5423788 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007f64`190e62c6


SYMBOL_NAME:  LXCORE!LxpMiVadNodeCleanup+62

MODULE_NAME: LXCORE

IMAGE_NAME:  LXCORE.SYS

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  62

FAILURE_BUCKET_ID:  0x1a_42001_LXCORE!LxpMiVadNodeCleanup

OS_VERSION:  10.0.20348.1

BUILDLAB_STR:  fe_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {827f63a2-f8bf-b91b-775e-3072d53b1561}

Followup:     MachineOwner
---------


@Biswa96
Copy link

Biswa96 commented Nov 30, 2021

BSOD related issues should be reported as stated here https://github.com/microsoft/WSL/blob/master/CONTRIBUTING.md

@HenkPoley
Copy link

Sent a mail to secure@microsoft.com with a very similar issue.

Their reply is basically that this will not be resolved. First line Microsoft support will never put this crash log near a WSL developer.

Thank you for contacting the Microsoft Security Response Center (MSRC). These types of support issues are not something that we can assist with directly.

The appropriate page to contact support is available at:

"Contact us"
<https://support.microsoft.com/en-us/contactus>

"International Support"
https://support2.microsoft.com/common/international.aspx

Or you can call Microsoft Customer Service at:

1 (800) 642-7676

@FrankHB
Copy link

FrankHB commented Oct 4, 2022

Same for Windows 11 (22000.1).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants