WINDOWS SERVER 2012, BSOD The bugcheck was: 0x00000035

S

sendiseptiawan

My computer has been randomly crashing without a BSOD, i check form event viewer, i see the "The computer has rebooted from a bugcheck. The bugcheck was: 0x00000035 (0xfffffa8036622010, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000). A dump was saved in: C:\Windows\MEMORY.DMP. Report Id: 111318-10280-01."


If anyone can help me with this, I'd really appreciate it. I can upload my dump file if needed.thank you



Microsoft (R) Windows Debugger Version 10.0.17763.1 AMD64

Copyright (c) Microsoft Corporation. All rights reserved.





Loading Dump File [C:\Users\Administrator\Documents\MEMORY.DMP]

Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.



Symbol search path is: srv*

Executable search path is:

Windows 8 Kernel Version 9200 MP (12 procs) Free x64

Product: Server, suite: TerminalServer SingleUserTS

Built by: 9200.16384.amd64fre.win8_rtm.120725-1247

Machine Name:

Kernel base = 0xfffff803`c8e12000 PsLoadedModuleList = 0xfffff803`c90dca60

Debug session time: Tue Nov 13 08:50:38.454 2018 (UTC + 7:00)

System Uptime: 2 days 23:37:33.064

Loading Kernel Symbols

...............................................................

...............................................................

Loading User Symbols

PEB is paged out (Peb.Ldr = 000007f5`ff5af018). Type ".hh dbgerr001" for details

Loading unloaded module list

.....

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************



Use !analyze -v to get detailed debugging information.



BugCheck 35, {fffffa8036622010, 0, 0, 0}



Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Probably caused by : partmgr.sys ( partmgr!PmGlobalDispatch+185 )



Followup: MachineOwner

---------



2: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************



NO_MORE_IRP_STACK_LOCATIONS (35)

A higher level driver has attempted to call a lower level driver through

the IoCallDriver() interface, but there are no more stack locations in the

packet, hence, the lower level driver would not be able to access its

parameters, as there are no parameters for it. This is a disasterous

situation, since the higher level driver "thinks" it has filled in the

parameters for the lower level driver (something it MUST do before it calls

it), but since there is no stack location for the latter driver, the former

has written off of the end of the packet. This means that some other memory

has probably been trashed at this point.

Arguments:

Arg1: fffffa8036622010, Address of the IRP

Arg2: 0000000000000000

Arg3: 0000000000000000

Arg4: 0000000000000000



Debugging Details:

------------------



Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details



KEY_VALUES_STRING: 1





STACKHASH_ANALYSIS: 1



TIMELINE_ANALYSIS: 1





DUMP_CLASS: 1



DUMP_QUALIFIER: 401



BUILD_VERSION_STRING: 9200.16384.amd64fre.win8_rtm.120725-1247



SYSTEM_MANUFACTURER: VMware, Inc.



VIRTUAL_MACHINE: VMware



SYSTEM_PRODUCT_NAME: VMware Virtual Platform



SYSTEM_VERSION: None



BIOS_VENDOR: Phoenix Technologies LTD



BIOS_VERSION: 6.00



BIOS_DATE: 04/05/2016



BASEBOARD_MANUFACTURER: Intel Corporation



BASEBOARD_PRODUCT: 440BX Desktop Reference Platform



BASEBOARD_VERSION: None



DUMP_TYPE: 1



BUGCHECK_P1: fffffa8036622010



BUGCHECK_P2: 0



BUGCHECK_P3: 0



BUGCHECK_P4: 0



CPU_COUNT: c



CPU_MHZ: 8fc



CPU_VENDOR: GenuineIntel



CPU_FAMILY: 6



CPU_MODEL: 55



CPU_STEPPING: 4



CPU_MICROCODE: 6,55,4,0 (F,M,S,R) SIG: 200004D'00000000 (cache) 200004D'00000000 (init)



DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT



BUGCHECK_STR: 0x35



PROCESS_NAME: sqlservr.exe



CURRENT_IRQL: 0



ANALYSIS_SESSION_HOST: SFITBSVR



ANALYSIS_SESSION_TIME: 11-13-2018 14:35:43.0744



ANALYSIS_VERSION: 10.0.17763.1 amd64fre



LAST_CONTROL_TRANSFER: from fffff803c8e8d032 to fffff803c8e8d040



STACK_TEXT:

fffff880`08a07bc8 fffff803`c8e8d032 : 00000000`00000035 fffffa80`36622010 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx

fffff880`08a07bd0 fffff803`c8fe0a5b : 00000000`0000f000 00000000`0000f000 fffffa80`3210d000 fffffa80`32165010 : nt!KiBugCheck3+0x12

fffff880`08a07c00 fffff880`01a028b0 : 00000000`00000000 00000000`00000000 fffffa80`35a6b010 0000008a`f8ce9600 : nt! ?? ::FNODOBFM::`string'+0xae71

fffff880`08a07c30 fffff880`01a01ec8 : fffffa80`3210d000 fffffa80`359eaaf0 00000000`00000100 fffffa80`00101000 : CLASSPNP!ServiceTransferRequest+0x400

fffff880`08a07ce0 fffff880`0152b195 : 00000000`00000000 00000000`002245cd 00000000`00000000 fffffa80`31947910 : CLASSPNP!ClassReadWrite+0xf8

fffff880`08a07d80 fffff880`0158e14e : ffff0000`00000000 fffffa80`34487b00 fffffa80`31986b40 00000000`0652e600 : partmgr!PmGlobalDispatch+0x185

fffff880`08a07dd0 fffff880`01d4e66f : fffffa80`359eaaf0 fffffa80`3219f190 00000000`00000000 fffff880`09227a10 : volmgr!VmReadWrite+0x13e

fffff880`08a07e10 fffff880`00a1fb65 : fffffa80`3471a870 fffff880`09227a10 fffff880`05d66df0 fffffa80`33881b00 : volsnap!VolsnapWriteFilter+0x2af

fffff880`08a07f50 fffff803`c8e87767 : fffff880`05d66df0 00000000`00000000 00000000`00000000 00000000`00000001 : Ntfs!NtfsStorageDriverCallout+0x16

fffff880`08a07f80 fffff803`c8e8772d : 00000000`00000000 00000000`00000000 00000000`00000002 fffff803`c8ecdf1e : nt!KxSwitchKernelStackCallout+0x27

fffff880`09227a10 fffff803`c8ecdf1e : fffff680`00000007 00000000`00000000 00000000`00000007 00000000`00000000 : nt!KiSwitchKernelStackContinue

fffff880`09227a30 fffff803`c8eced85 : fffff880`00a1fb50 fffff880`09227ba8 00000000`00000000 fffff803`c8e49537 : nt!KeExpandKernelStackAndCalloutInternal+0x20e

fffff880`09227b30 fffff880`00a1fa9c : fffffa80`00000000 fffffa80`359eaaf0 00000000`00000000 fffffa80`332a9328 : nt!KeExpandKernelStackAndCalloutEx+0x25

fffff880`09227b70 fffff880`00a1e45a : fffffa80`31eb6e10 fffffa80`3471a870 fffff8a0`02118140 00000000`00000000 : Ntfs!NtfsMultipleAsync+0xac

fffff880`09227be0 fffff880`00a265fa : 00000000`00000000 fffff8a0`02118010 fffff8a0`02118140 00000000`00000700 : Ntfs!NtfsNonCachedIo+0x26a

fffff880`09227da0 fffff880`00a297ee : fffffa80`3471a870 fffff880`09228020 fffff880`09228038 00000000`00000000 : Ntfs!NtfsCommonWrite+0x9fa

fffff880`09227ff0 fffff880`0189e0ee : fffffa80`326d0ce0 fffffa80`359eaaf0 fffffa80`32f3f7d0 fffffa80`359eaaf0 : Ntfs!NtfsFsdWrite+0x21e

fffff880`092280b0 fffff803`c92589e8 : 00000000`00000001 fffff880`09228191 fffffa80`32f3f7d0 00000000`00000000 : fltmgr!FltpDispatch+0xee

fffff880`09228110 fffff803`c9278704 : fffffa80`32f3f704 00000000`05171000 fffff880`09228280 fffffa80`32f3f7d0 : nt!IopSynchronousServiceTail+0x158

fffff880`092281e0 fffff803`c8e8c053 : 00000000`00fc3601 00000000`0000028c 00000000`00000000 00000000`34b637b0 : nt!NtWriteFile+0x833

fffff880`09228310 000007fc`f3232c2a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13

00000000`54469298 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007fc`f3232c2a





THREAD_SHA1_HASH_MOD_FUNC: 0df66de2c20873ec343e0131a42dab19a0a8b42c



THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f0cb4cba3c1dcc9c506a63c2d6259934bd808b3f



THREAD_SHA1_HASH_MOD: e0a735c3468be760d4e5178b8de084f35c59acaf



FOLLOWUP_IP:

partmgr!PmGlobalDispatch+185

fffff880`0152b195 4c8b6c2458 mov r13,qword ptr [rsp+58h]



FAULT_INSTR_CODE: 246c8b4c



SYMBOL_STACK_INDEX: 5



SYMBOL_NAME: partmgr!PmGlobalDispatch+185



FOLLOWUP_NAME: MachineOwner



MODULE_NAME: partmgr



IMAGE_NAME: partmgr.sys



DEBUG_FLR_IMAGE_TIMESTAMP: 5010abab



STACK_COMMAND: .thread ; .cxr ; kb



BUCKET_ID_FUNC_OFFSET: 185



FAILURE_BUCKET_ID: 0x35_partmgr!PmGlobalDispatch



BUCKET_ID: 0x35_partmgr!PmGlobalDispatch



PRIMARY_PROBLEM_CLASS: 0x35_partmgr!PmGlobalDispatch



TARGET_TIME: 2018-11-13T01:50:38.000Z



OSBUILD: 9200



OSSERVICEPACK: 16384



SERVICEPACK_NUMBER: 0



OS_REVISION: 0



SUITE_MASK: 272



PRODUCT_TYPE: 3



OSPLATFORM_TYPE: x64



OSNAME: Windows 8



OSEDITION: Windows 8 Server TerminalServer SingleUserTS



OS_LOCALE:



USER_LCID: 0



OSBUILD_TIMESTAMP: 2012-07-26 09:32:43



BUILDDATESTAMP_STR: 120725-1247



BUILDLAB_STR: win8_rtm



BUILDOSVER_STR: 6.2.9200.16384.amd64fre.win8_rtm.120725-1247



ANALYSIS_SESSION_ELAPSED_TIME: 3d8



ANALYSIS_SOURCE: KM



FAILURE_ID_HASH_STRING: km:0x35_partmgr!pmglobaldispatch



FAILURE_ID_HASH: {426ff38a-3e3b-1c22-415b-f1eb0b5c5c93}



Followup: MachineOwner

---------



2: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************



NO_MORE_IRP_STACK_LOCATIONS (35)

A higher level driver has attempted to call a lower level driver through

the IoCallDriver() interface, but there are no more stack locations in the

packet, hence, the lower level driver would not be able to access its

parameters, as there are no parameters for it. This is a disasterous

situation, since the higher level driver "thinks" it has filled in the

parameters for the lower level driver (something it MUST do before it calls

it), but since there is no stack location for the latter driver, the former

has written off of the end of the packet. This means that some other memory

has probably been trashed at this point.

Arguments:

Arg1: fffffa8036622010, Address of the IRP

Arg2: 0000000000000000

Arg3: 0000000000000000

Arg4: 0000000000000000



Debugging Details:

------------------



Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details



KEY_VALUES_STRING: 1





STACKHASH_ANALYSIS: 1



TIMELINE_ANALYSIS: 1





DUMP_CLASS: 1



DUMP_QUALIFIER: 401



BUILD_VERSION_STRING: 9200.16384.amd64fre.win8_rtm.120725-1247



SYSTEM_MANUFACTURER: VMware, Inc.



VIRTUAL_MACHINE: VMware



SYSTEM_PRODUCT_NAME: VMware Virtual Platform



SYSTEM_VERSION: None



BIOS_VENDOR: Phoenix Technologies LTD



BIOS_VERSION: 6.00



BIOS_DATE: 04/05/2016



BASEBOARD_MANUFACTURER: Intel Corporation



BASEBOARD_PRODUCT: 440BX Desktop Reference Platform



BASEBOARD_VERSION: None



DUMP_TYPE: 1



BUGCHECK_P1: fffffa8036622010



BUGCHECK_P2: 0



BUGCHECK_P3: 0



BUGCHECK_P4: 0



CPU_COUNT: c



CPU_MHZ: 8fc



CPU_VENDOR: GenuineIntel



CPU_FAMILY: 6



CPU_MODEL: 55



CPU_STEPPING: 4



CPU_MICROCODE: 6,55,4,0 (F,M,S,R) SIG: 200004D'00000000 (cache) 200004D'00000000 (init)



DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT



BUGCHECK_STR: 0x35



PROCESS_NAME: sqlservr.exe



CURRENT_IRQL: 0



ANALYSIS_SESSION_HOST: SFITBSVR



ANALYSIS_SESSION_TIME: 11-13-2018 14:35:44.0730



ANALYSIS_VERSION: 10.0.17763.1 amd64fre



LAST_CONTROL_TRANSFER: from fffff803c8e8d032 to fffff803c8e8d040



STACK_TEXT:

fffff880`08a07bc8 fffff803`c8e8d032 : 00000000`00000035 fffffa80`36622010 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx

fffff880`08a07bd0 fffff803`c8fe0a5b : 00000000`0000f000 00000000`0000f000 fffffa80`3210d000 fffffa80`32165010 : nt!KiBugCheck3+0x12

fffff880`08a07c00 fffff880`01a028b0 : 00000000`00000000 00000000`00000000 fffffa80`35a6b010 0000008a`f8ce9600 : nt! ?? ::FNODOBFM::`string'+0xae71

fffff880`08a07c30 fffff880`01a01ec8 : fffffa80`3210d000 fffffa80`359eaaf0 00000000`00000100 fffffa80`00101000 : CLASSPNP!ServiceTransferRequest+0x400

fffff880`08a07ce0 fffff880`0152b195 : 00000000`00000000 00000000`002245cd 00000000`00000000 fffffa80`31947910 : CLASSPNP!ClassReadWrite+0xf8

fffff880`08a07d80 fffff880`0158e14e : ffff0000`00000000 fffffa80`34487b00 fffffa80`31986b40 00000000`0652e600 : partmgr!PmGlobalDispatch+0x185

fffff880`08a07dd0 fffff880`01d4e66f : fffffa80`359eaaf0 fffffa80`3219f190 00000000`00000000 fffff880`09227a10 : volmgr!VmReadWrite+0x13e

fffff880`08a07e10 fffff880`00a1fb65 : fffffa80`3471a870 fffff880`09227a10 fffff880`05d66df0 fffffa80`33881b00 : volsnap!VolsnapWriteFilter+0x2af

fffff880`08a07f50 fffff803`c8e87767 : fffff880`05d66df0 00000000`00000000 00000000`00000000 00000000`00000001 : Ntfs!NtfsStorageDriverCallout+0x16

fffff880`08a07f80 fffff803`c8e8772d : 00000000`00000000 00000000`00000000 00000000`00000002 fffff803`c8ecdf1e : nt!KxSwitchKernelStackCallout+0x27

fffff880`09227a10 fffff803`c8ecdf1e : fffff680`00000007 00000000`00000000 00000000`00000007 00000000`00000000 : nt!KiSwitchKernelStackContinue

fffff880`09227a30 fffff803`c8eced85 : fffff880`00a1fb50 fffff880`09227ba8 00000000`00000000 fffff803`c8e49537 : nt!KeExpandKernelStackAndCalloutInternal+0x20e

fffff880`09227b30 fffff880`00a1fa9c : fffffa80`00000000 fffffa80`359eaaf0 00000000`00000000 fffffa80`332a9328 : nt!KeExpandKernelStackAndCalloutEx+0x25

fffff880`09227b70 fffff880`00a1e45a : fffffa80`31eb6e10 fffffa80`3471a870 fffff8a0`02118140 00000000`00000000 : Ntfs!NtfsMultipleAsync+0xac

fffff880`09227be0 fffff880`00a265fa : 00000000`00000000 fffff8a0`02118010 fffff8a0`02118140 00000000`00000700 : Ntfs!NtfsNonCachedIo+0x26a

fffff880`09227da0 fffff880`00a297ee : fffffa80`3471a870 fffff880`09228020 fffff880`09228038 00000000`00000000 : Ntfs!NtfsCommonWrite+0x9fa

fffff880`09227ff0 fffff880`0189e0ee : fffffa80`326d0ce0 fffffa80`359eaaf0 fffffa80`32f3f7d0 fffffa80`359eaaf0 : Ntfs!NtfsFsdWrite+0x21e

fffff880`092280b0 fffff803`c92589e8 : 00000000`00000001 fffff880`09228191 fffffa80`32f3f7d0 00000000`00000000 : fltmgr!FltpDispatch+0xee

fffff880`09228110 fffff803`c9278704 : fffffa80`32f3f704 00000000`05171000 fffff880`09228280 fffffa80`32f3f7d0 : nt!IopSynchronousServiceTail+0x158

fffff880`092281e0 fffff803`c8e8c053 : 00000000`00fc3601 00000000`0000028c 00000000`00000000 00000000`34b637b0 : nt!NtWriteFile+0x833

fffff880`09228310 000007fc`f3232c2a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13

00000000`54469298 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007fc`f3232c2a





THREAD_SHA1_HASH_MOD_FUNC: 0df66de2c20873ec343e0131a42dab19a0a8b42c



THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f0cb4cba3c1dcc9c506a63c2d6259934bd808b3f



THREAD_SHA1_HASH_MOD: e0a735c3468be760d4e5178b8de084f35c59acaf



FOLLOWUP_IP:

partmgr!PmGlobalDispatch+185

fffff880`0152b195 4c8b6c2458 mov r13,qword ptr [rsp+58h]



FAULT_INSTR_CODE: 246c8b4c



SYMBOL_STACK_INDEX: 5



SYMBOL_NAME: partmgr!PmGlobalDispatch+185



FOLLOWUP_NAME: MachineOwner



MODULE_NAME: partmgr



IMAGE_NAME: partmgr.sys



DEBUG_FLR_IMAGE_TIMESTAMP: 5010abab



STACK_COMMAND: .thread ; .cxr ; kb



BUCKET_ID_FUNC_OFFSET: 185



FAILURE_BUCKET_ID: 0x35_partmgr!PmGlobalDispatch



BUCKET_ID: 0x35_partmgr!PmGlobalDispatch



PRIMARY_PROBLEM_CLASS: 0x35_partmgr!PmGlobalDispatch



TARGET_TIME: 2018-11-13T01:50:38.000Z



OSBUILD: 9200



OSSERVICEPACK: 16384



SERVICEPACK_NUMBER: 0



OS_REVISION: 0



SUITE_MASK: 272



PRODUCT_TYPE: 3



OSPLATFORM_TYPE: x64



OSNAME: Windows 8



OSEDITION: Windows 8 Server TerminalServer SingleUserTS



OS_LOCALE:



USER_LCID: 0



OSBUILD_TIMESTAMP: 2012-07-26 09:32:43



BUILDDATESTAMP_STR: 120725-1247



BUILDLAB_STR: win8_rtm



BUILDOSVER_STR: 6.2.9200.16384.amd64fre.win8_rtm.120725-1247



ANALYSIS_SESSION_ELAPSED_TIME: 3d8



ANALYSIS_SOURCE: KM



FAILURE_ID_HASH_STRING: km:0x35_partmgr!pmglobaldispatch



FAILURE_ID_HASH: {426ff38a-3e3b-1c22-415b-f1eb0b5c5c93}



Followup: MachineOwner

---------

Continue reading...
 
Back
Top Bottom