S
sendiseptiawan
My computer has been randomly crashing without a BSOD, i check form event viewer, i see the "The computer has rebooted from a bugcheck. The bugcheck was: 0x00000035 (0xfffffa8036622010, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000). A dump was saved in: C:\Windows\MEMORY.DMP. Report Id: 111318-10280-01."
If anyone can help me with this, I'd really appreciate it. I can upload my dump file if needed.thank you
Microsoft (R) Windows Debugger Version 10.0.17763.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Administrator\Documents\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 8 Kernel Version 9200 MP (12 procs) Free x64
Product: Server, suite: TerminalServer SingleUserTS
Built by: 9200.16384.amd64fre.win8_rtm.120725-1247
Machine Name:
Kernel base = 0xfffff803`c8e12000 PsLoadedModuleList = 0xfffff803`c90dca60
Debug session time: Tue Nov 13 08:50:38.454 2018 (UTC + 7:00)
System Uptime: 2 days 23:37:33.064
Loading Kernel Symbols
...............................................................
...............................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000007f5`ff5af018). Type ".hh dbgerr001" for details
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 35, {fffffa8036622010, 0, 0, 0}
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Probably caused by : partmgr.sys ( partmgr!PmGlobalDispatch+185 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NO_MORE_IRP_STACK_LOCATIONS (35)
A higher level driver has attempted to call a lower level driver through
the IoCallDriver() interface, but there are no more stack locations in the
packet, hence, the lower level driver would not be able to access its
parameters, as there are no parameters for it. This is a disasterous
situation, since the higher level driver "thinks" it has filled in the
parameters for the lower level driver (something it MUST do before it calls
it), but since there is no stack location for the latter driver, the former
has written off of the end of the packet. This means that some other memory
has probably been trashed at this point.
Arguments:
Arg1: fffffa8036622010, Address of the IRP
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
KEY_VALUES_STRING: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 9200.16384.amd64fre.win8_rtm.120725-1247
SYSTEM_MANUFACTURER: VMware, Inc.
VIRTUAL_MACHINE: VMware
SYSTEM_PRODUCT_NAME: VMware Virtual Platform
SYSTEM_VERSION: None
BIOS_VENDOR: Phoenix Technologies LTD
BIOS_VERSION: 6.00
BIOS_DATE: 04/05/2016
BASEBOARD_MANUFACTURER: Intel Corporation
BASEBOARD_PRODUCT: 440BX Desktop Reference Platform
BASEBOARD_VERSION: None
DUMP_TYPE: 1
BUGCHECK_P1: fffffa8036622010
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
CPU_COUNT: c
CPU_MHZ: 8fc
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 55
CPU_STEPPING: 4
CPU_MICROCODE: 6,55,4,0 (F,M,S,R) SIG: 200004D'00000000 (cache) 200004D'00000000 (init)
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x35
PROCESS_NAME: sqlservr.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: SFITBSVR
ANALYSIS_SESSION_TIME: 11-13-2018 14:35:43.0744
ANALYSIS_VERSION: 10.0.17763.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff803c8e8d032 to fffff803c8e8d040
STACK_TEXT:
fffff880`08a07bc8 fffff803`c8e8d032 : 00000000`00000035 fffffa80`36622010 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`08a07bd0 fffff803`c8fe0a5b : 00000000`0000f000 00000000`0000f000 fffffa80`3210d000 fffffa80`32165010 : nt!KiBugCheck3+0x12
fffff880`08a07c00 fffff880`01a028b0 : 00000000`00000000 00000000`00000000 fffffa80`35a6b010 0000008a`f8ce9600 : nt! ?? ::FNODOBFM::`string'+0xae71
fffff880`08a07c30 fffff880`01a01ec8 : fffffa80`3210d000 fffffa80`359eaaf0 00000000`00000100 fffffa80`00101000 : CLASSPNP!ServiceTransferRequest+0x400
fffff880`08a07ce0 fffff880`0152b195 : 00000000`00000000 00000000`002245cd 00000000`00000000 fffffa80`31947910 : CLASSPNP!ClassReadWrite+0xf8
fffff880`08a07d80 fffff880`0158e14e : ffff0000`00000000 fffffa80`34487b00 fffffa80`31986b40 00000000`0652e600 : partmgr!PmGlobalDispatch+0x185
fffff880`08a07dd0 fffff880`01d4e66f : fffffa80`359eaaf0 fffffa80`3219f190 00000000`00000000 fffff880`09227a10 : volmgr!VmReadWrite+0x13e
fffff880`08a07e10 fffff880`00a1fb65 : fffffa80`3471a870 fffff880`09227a10 fffff880`05d66df0 fffffa80`33881b00 : volsnap!VolsnapWriteFilter+0x2af
fffff880`08a07f50 fffff803`c8e87767 : fffff880`05d66df0 00000000`00000000 00000000`00000000 00000000`00000001 : Ntfs!NtfsStorageDriverCallout+0x16
fffff880`08a07f80 fffff803`c8e8772d : 00000000`00000000 00000000`00000000 00000000`00000002 fffff803`c8ecdf1e : nt!KxSwitchKernelStackCallout+0x27
fffff880`09227a10 fffff803`c8ecdf1e : fffff680`00000007 00000000`00000000 00000000`00000007 00000000`00000000 : nt!KiSwitchKernelStackContinue
fffff880`09227a30 fffff803`c8eced85 : fffff880`00a1fb50 fffff880`09227ba8 00000000`00000000 fffff803`c8e49537 : nt!KeExpandKernelStackAndCalloutInternal+0x20e
fffff880`09227b30 fffff880`00a1fa9c : fffffa80`00000000 fffffa80`359eaaf0 00000000`00000000 fffffa80`332a9328 : nt!KeExpandKernelStackAndCalloutEx+0x25
fffff880`09227b70 fffff880`00a1e45a : fffffa80`31eb6e10 fffffa80`3471a870 fffff8a0`02118140 00000000`00000000 : Ntfs!NtfsMultipleAsync+0xac
fffff880`09227be0 fffff880`00a265fa : 00000000`00000000 fffff8a0`02118010 fffff8a0`02118140 00000000`00000700 : Ntfs!NtfsNonCachedIo+0x26a
fffff880`09227da0 fffff880`00a297ee : fffffa80`3471a870 fffff880`09228020 fffff880`09228038 00000000`00000000 : Ntfs!NtfsCommonWrite+0x9fa
fffff880`09227ff0 fffff880`0189e0ee : fffffa80`326d0ce0 fffffa80`359eaaf0 fffffa80`32f3f7d0 fffffa80`359eaaf0 : Ntfs!NtfsFsdWrite+0x21e
fffff880`092280b0 fffff803`c92589e8 : 00000000`00000001 fffff880`09228191 fffffa80`32f3f7d0 00000000`00000000 : fltmgr!FltpDispatch+0xee
fffff880`09228110 fffff803`c9278704 : fffffa80`32f3f704 00000000`05171000 fffff880`09228280 fffffa80`32f3f7d0 : nt!IopSynchronousServiceTail+0x158
fffff880`092281e0 fffff803`c8e8c053 : 00000000`00fc3601 00000000`0000028c 00000000`00000000 00000000`34b637b0 : nt!NtWriteFile+0x833
fffff880`09228310 000007fc`f3232c2a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`54469298 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007fc`f3232c2a
THREAD_SHA1_HASH_MOD_FUNC: 0df66de2c20873ec343e0131a42dab19a0a8b42c
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f0cb4cba3c1dcc9c506a63c2d6259934bd808b3f
THREAD_SHA1_HASH_MOD: e0a735c3468be760d4e5178b8de084f35c59acaf
FOLLOWUP_IP:
partmgr!PmGlobalDispatch+185
fffff880`0152b195 4c8b6c2458 mov r13,qword ptr [rsp+58h]
FAULT_INSTR_CODE: 246c8b4c
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: partmgr!PmGlobalDispatch+185
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: partmgr
IMAGE_NAME: partmgr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5010abab
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 185
FAILURE_BUCKET_ID: 0x35_partmgr!PmGlobalDispatch
BUCKET_ID: 0x35_partmgr!PmGlobalDispatch
PRIMARY_PROBLEM_CLASS: 0x35_partmgr!PmGlobalDispatch
TARGET_TIME: 2018-11-13T01:50:38.000Z
OSBUILD: 9200
OSSERVICEPACK: 16384
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 3
OSPLATFORM_TYPE: x64
OSNAME: Windows 8
OSEDITION: Windows 8 Server TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2012-07-26 09:32:43
BUILDDATESTAMP_STR: 120725-1247
BUILDLAB_STR: win8_rtm
BUILDOSVER_STR: 6.2.9200.16384.amd64fre.win8_rtm.120725-1247
ANALYSIS_SESSION_ELAPSED_TIME: 3d8
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x35_partmgr!pmglobaldispatch
FAILURE_ID_HASH: {426ff38a-3e3b-1c22-415b-f1eb0b5c5c93}
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NO_MORE_IRP_STACK_LOCATIONS (35)
A higher level driver has attempted to call a lower level driver through
the IoCallDriver() interface, but there are no more stack locations in the
packet, hence, the lower level driver would not be able to access its
parameters, as there are no parameters for it. This is a disasterous
situation, since the higher level driver "thinks" it has filled in the
parameters for the lower level driver (something it MUST do before it calls
it), but since there is no stack location for the latter driver, the former
has written off of the end of the packet. This means that some other memory
has probably been trashed at this point.
Arguments:
Arg1: fffffa8036622010, Address of the IRP
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
KEY_VALUES_STRING: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 9200.16384.amd64fre.win8_rtm.120725-1247
SYSTEM_MANUFACTURER: VMware, Inc.
VIRTUAL_MACHINE: VMware
SYSTEM_PRODUCT_NAME: VMware Virtual Platform
SYSTEM_VERSION: None
BIOS_VENDOR: Phoenix Technologies LTD
BIOS_VERSION: 6.00
BIOS_DATE: 04/05/2016
BASEBOARD_MANUFACTURER: Intel Corporation
BASEBOARD_PRODUCT: 440BX Desktop Reference Platform
BASEBOARD_VERSION: None
DUMP_TYPE: 1
BUGCHECK_P1: fffffa8036622010
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
CPU_COUNT: c
CPU_MHZ: 8fc
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 55
CPU_STEPPING: 4
CPU_MICROCODE: 6,55,4,0 (F,M,S,R) SIG: 200004D'00000000 (cache) 200004D'00000000 (init)
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x35
PROCESS_NAME: sqlservr.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: SFITBSVR
ANALYSIS_SESSION_TIME: 11-13-2018 14:35:44.0730
ANALYSIS_VERSION: 10.0.17763.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff803c8e8d032 to fffff803c8e8d040
STACK_TEXT:
fffff880`08a07bc8 fffff803`c8e8d032 : 00000000`00000035 fffffa80`36622010 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`08a07bd0 fffff803`c8fe0a5b : 00000000`0000f000 00000000`0000f000 fffffa80`3210d000 fffffa80`32165010 : nt!KiBugCheck3+0x12
fffff880`08a07c00 fffff880`01a028b0 : 00000000`00000000 00000000`00000000 fffffa80`35a6b010 0000008a`f8ce9600 : nt! ?? ::FNODOBFM::`string'+0xae71
fffff880`08a07c30 fffff880`01a01ec8 : fffffa80`3210d000 fffffa80`359eaaf0 00000000`00000100 fffffa80`00101000 : CLASSPNP!ServiceTransferRequest+0x400
fffff880`08a07ce0 fffff880`0152b195 : 00000000`00000000 00000000`002245cd 00000000`00000000 fffffa80`31947910 : CLASSPNP!ClassReadWrite+0xf8
fffff880`08a07d80 fffff880`0158e14e : ffff0000`00000000 fffffa80`34487b00 fffffa80`31986b40 00000000`0652e600 : partmgr!PmGlobalDispatch+0x185
fffff880`08a07dd0 fffff880`01d4e66f : fffffa80`359eaaf0 fffffa80`3219f190 00000000`00000000 fffff880`09227a10 : volmgr!VmReadWrite+0x13e
fffff880`08a07e10 fffff880`00a1fb65 : fffffa80`3471a870 fffff880`09227a10 fffff880`05d66df0 fffffa80`33881b00 : volsnap!VolsnapWriteFilter+0x2af
fffff880`08a07f50 fffff803`c8e87767 : fffff880`05d66df0 00000000`00000000 00000000`00000000 00000000`00000001 : Ntfs!NtfsStorageDriverCallout+0x16
fffff880`08a07f80 fffff803`c8e8772d : 00000000`00000000 00000000`00000000 00000000`00000002 fffff803`c8ecdf1e : nt!KxSwitchKernelStackCallout+0x27
fffff880`09227a10 fffff803`c8ecdf1e : fffff680`00000007 00000000`00000000 00000000`00000007 00000000`00000000 : nt!KiSwitchKernelStackContinue
fffff880`09227a30 fffff803`c8eced85 : fffff880`00a1fb50 fffff880`09227ba8 00000000`00000000 fffff803`c8e49537 : nt!KeExpandKernelStackAndCalloutInternal+0x20e
fffff880`09227b30 fffff880`00a1fa9c : fffffa80`00000000 fffffa80`359eaaf0 00000000`00000000 fffffa80`332a9328 : nt!KeExpandKernelStackAndCalloutEx+0x25
fffff880`09227b70 fffff880`00a1e45a : fffffa80`31eb6e10 fffffa80`3471a870 fffff8a0`02118140 00000000`00000000 : Ntfs!NtfsMultipleAsync+0xac
fffff880`09227be0 fffff880`00a265fa : 00000000`00000000 fffff8a0`02118010 fffff8a0`02118140 00000000`00000700 : Ntfs!NtfsNonCachedIo+0x26a
fffff880`09227da0 fffff880`00a297ee : fffffa80`3471a870 fffff880`09228020 fffff880`09228038 00000000`00000000 : Ntfs!NtfsCommonWrite+0x9fa
fffff880`09227ff0 fffff880`0189e0ee : fffffa80`326d0ce0 fffffa80`359eaaf0 fffffa80`32f3f7d0 fffffa80`359eaaf0 : Ntfs!NtfsFsdWrite+0x21e
fffff880`092280b0 fffff803`c92589e8 : 00000000`00000001 fffff880`09228191 fffffa80`32f3f7d0 00000000`00000000 : fltmgr!FltpDispatch+0xee
fffff880`09228110 fffff803`c9278704 : fffffa80`32f3f704 00000000`05171000 fffff880`09228280 fffffa80`32f3f7d0 : nt!IopSynchronousServiceTail+0x158
fffff880`092281e0 fffff803`c8e8c053 : 00000000`00fc3601 00000000`0000028c 00000000`00000000 00000000`34b637b0 : nt!NtWriteFile+0x833
fffff880`09228310 000007fc`f3232c2a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`54469298 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007fc`f3232c2a
THREAD_SHA1_HASH_MOD_FUNC: 0df66de2c20873ec343e0131a42dab19a0a8b42c
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f0cb4cba3c1dcc9c506a63c2d6259934bd808b3f
THREAD_SHA1_HASH_MOD: e0a735c3468be760d4e5178b8de084f35c59acaf
FOLLOWUP_IP:
partmgr!PmGlobalDispatch+185
fffff880`0152b195 4c8b6c2458 mov r13,qword ptr [rsp+58h]
FAULT_INSTR_CODE: 246c8b4c
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: partmgr!PmGlobalDispatch+185
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: partmgr
IMAGE_NAME: partmgr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5010abab
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 185
FAILURE_BUCKET_ID: 0x35_partmgr!PmGlobalDispatch
BUCKET_ID: 0x35_partmgr!PmGlobalDispatch
PRIMARY_PROBLEM_CLASS: 0x35_partmgr!PmGlobalDispatch
TARGET_TIME: 2018-11-13T01:50:38.000Z
OSBUILD: 9200
OSSERVICEPACK: 16384
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 3
OSPLATFORM_TYPE: x64
OSNAME: Windows 8
OSEDITION: Windows 8 Server TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2012-07-26 09:32:43
BUILDDATESTAMP_STR: 120725-1247
BUILDLAB_STR: win8_rtm
BUILDOSVER_STR: 6.2.9200.16384.amd64fre.win8_rtm.120725-1247
ANALYSIS_SESSION_ELAPSED_TIME: 3d8
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x35_partmgr!pmglobaldispatch
FAILURE_ID_HASH: {426ff38a-3e3b-1c22-415b-f1eb0b5c5c93}
Followup: MachineOwner
---------
Continue reading...
If anyone can help me with this, I'd really appreciate it. I can upload my dump file if needed.thank you
Microsoft (R) Windows Debugger Version 10.0.17763.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Administrator\Documents\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 8 Kernel Version 9200 MP (12 procs) Free x64
Product: Server, suite: TerminalServer SingleUserTS
Built by: 9200.16384.amd64fre.win8_rtm.120725-1247
Machine Name:
Kernel base = 0xfffff803`c8e12000 PsLoadedModuleList = 0xfffff803`c90dca60
Debug session time: Tue Nov 13 08:50:38.454 2018 (UTC + 7:00)
System Uptime: 2 days 23:37:33.064
Loading Kernel Symbols
...............................................................
...............................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000007f5`ff5af018). Type ".hh dbgerr001" for details
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 35, {fffffa8036622010, 0, 0, 0}
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Probably caused by : partmgr.sys ( partmgr!PmGlobalDispatch+185 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NO_MORE_IRP_STACK_LOCATIONS (35)
A higher level driver has attempted to call a lower level driver through
the IoCallDriver() interface, but there are no more stack locations in the
packet, hence, the lower level driver would not be able to access its
parameters, as there are no parameters for it. This is a disasterous
situation, since the higher level driver "thinks" it has filled in the
parameters for the lower level driver (something it MUST do before it calls
it), but since there is no stack location for the latter driver, the former
has written off of the end of the packet. This means that some other memory
has probably been trashed at this point.
Arguments:
Arg1: fffffa8036622010, Address of the IRP
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
KEY_VALUES_STRING: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 9200.16384.amd64fre.win8_rtm.120725-1247
SYSTEM_MANUFACTURER: VMware, Inc.
VIRTUAL_MACHINE: VMware
SYSTEM_PRODUCT_NAME: VMware Virtual Platform
SYSTEM_VERSION: None
BIOS_VENDOR: Phoenix Technologies LTD
BIOS_VERSION: 6.00
BIOS_DATE: 04/05/2016
BASEBOARD_MANUFACTURER: Intel Corporation
BASEBOARD_PRODUCT: 440BX Desktop Reference Platform
BASEBOARD_VERSION: None
DUMP_TYPE: 1
BUGCHECK_P1: fffffa8036622010
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
CPU_COUNT: c
CPU_MHZ: 8fc
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 55
CPU_STEPPING: 4
CPU_MICROCODE: 6,55,4,0 (F,M,S,R) SIG: 200004D'00000000 (cache) 200004D'00000000 (init)
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x35
PROCESS_NAME: sqlservr.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: SFITBSVR
ANALYSIS_SESSION_TIME: 11-13-2018 14:35:43.0744
ANALYSIS_VERSION: 10.0.17763.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff803c8e8d032 to fffff803c8e8d040
STACK_TEXT:
fffff880`08a07bc8 fffff803`c8e8d032 : 00000000`00000035 fffffa80`36622010 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`08a07bd0 fffff803`c8fe0a5b : 00000000`0000f000 00000000`0000f000 fffffa80`3210d000 fffffa80`32165010 : nt!KiBugCheck3+0x12
fffff880`08a07c00 fffff880`01a028b0 : 00000000`00000000 00000000`00000000 fffffa80`35a6b010 0000008a`f8ce9600 : nt! ?? ::FNODOBFM::`string'+0xae71
fffff880`08a07c30 fffff880`01a01ec8 : fffffa80`3210d000 fffffa80`359eaaf0 00000000`00000100 fffffa80`00101000 : CLASSPNP!ServiceTransferRequest+0x400
fffff880`08a07ce0 fffff880`0152b195 : 00000000`00000000 00000000`002245cd 00000000`00000000 fffffa80`31947910 : CLASSPNP!ClassReadWrite+0xf8
fffff880`08a07d80 fffff880`0158e14e : ffff0000`00000000 fffffa80`34487b00 fffffa80`31986b40 00000000`0652e600 : partmgr!PmGlobalDispatch+0x185
fffff880`08a07dd0 fffff880`01d4e66f : fffffa80`359eaaf0 fffffa80`3219f190 00000000`00000000 fffff880`09227a10 : volmgr!VmReadWrite+0x13e
fffff880`08a07e10 fffff880`00a1fb65 : fffffa80`3471a870 fffff880`09227a10 fffff880`05d66df0 fffffa80`33881b00 : volsnap!VolsnapWriteFilter+0x2af
fffff880`08a07f50 fffff803`c8e87767 : fffff880`05d66df0 00000000`00000000 00000000`00000000 00000000`00000001 : Ntfs!NtfsStorageDriverCallout+0x16
fffff880`08a07f80 fffff803`c8e8772d : 00000000`00000000 00000000`00000000 00000000`00000002 fffff803`c8ecdf1e : nt!KxSwitchKernelStackCallout+0x27
fffff880`09227a10 fffff803`c8ecdf1e : fffff680`00000007 00000000`00000000 00000000`00000007 00000000`00000000 : nt!KiSwitchKernelStackContinue
fffff880`09227a30 fffff803`c8eced85 : fffff880`00a1fb50 fffff880`09227ba8 00000000`00000000 fffff803`c8e49537 : nt!KeExpandKernelStackAndCalloutInternal+0x20e
fffff880`09227b30 fffff880`00a1fa9c : fffffa80`00000000 fffffa80`359eaaf0 00000000`00000000 fffffa80`332a9328 : nt!KeExpandKernelStackAndCalloutEx+0x25
fffff880`09227b70 fffff880`00a1e45a : fffffa80`31eb6e10 fffffa80`3471a870 fffff8a0`02118140 00000000`00000000 : Ntfs!NtfsMultipleAsync+0xac
fffff880`09227be0 fffff880`00a265fa : 00000000`00000000 fffff8a0`02118010 fffff8a0`02118140 00000000`00000700 : Ntfs!NtfsNonCachedIo+0x26a
fffff880`09227da0 fffff880`00a297ee : fffffa80`3471a870 fffff880`09228020 fffff880`09228038 00000000`00000000 : Ntfs!NtfsCommonWrite+0x9fa
fffff880`09227ff0 fffff880`0189e0ee : fffffa80`326d0ce0 fffffa80`359eaaf0 fffffa80`32f3f7d0 fffffa80`359eaaf0 : Ntfs!NtfsFsdWrite+0x21e
fffff880`092280b0 fffff803`c92589e8 : 00000000`00000001 fffff880`09228191 fffffa80`32f3f7d0 00000000`00000000 : fltmgr!FltpDispatch+0xee
fffff880`09228110 fffff803`c9278704 : fffffa80`32f3f704 00000000`05171000 fffff880`09228280 fffffa80`32f3f7d0 : nt!IopSynchronousServiceTail+0x158
fffff880`092281e0 fffff803`c8e8c053 : 00000000`00fc3601 00000000`0000028c 00000000`00000000 00000000`34b637b0 : nt!NtWriteFile+0x833
fffff880`09228310 000007fc`f3232c2a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`54469298 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007fc`f3232c2a
THREAD_SHA1_HASH_MOD_FUNC: 0df66de2c20873ec343e0131a42dab19a0a8b42c
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f0cb4cba3c1dcc9c506a63c2d6259934bd808b3f
THREAD_SHA1_HASH_MOD: e0a735c3468be760d4e5178b8de084f35c59acaf
FOLLOWUP_IP:
partmgr!PmGlobalDispatch+185
fffff880`0152b195 4c8b6c2458 mov r13,qword ptr [rsp+58h]
FAULT_INSTR_CODE: 246c8b4c
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: partmgr!PmGlobalDispatch+185
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: partmgr
IMAGE_NAME: partmgr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5010abab
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 185
FAILURE_BUCKET_ID: 0x35_partmgr!PmGlobalDispatch
BUCKET_ID: 0x35_partmgr!PmGlobalDispatch
PRIMARY_PROBLEM_CLASS: 0x35_partmgr!PmGlobalDispatch
TARGET_TIME: 2018-11-13T01:50:38.000Z
OSBUILD: 9200
OSSERVICEPACK: 16384
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 3
OSPLATFORM_TYPE: x64
OSNAME: Windows 8
OSEDITION: Windows 8 Server TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2012-07-26 09:32:43
BUILDDATESTAMP_STR: 120725-1247
BUILDLAB_STR: win8_rtm
BUILDOSVER_STR: 6.2.9200.16384.amd64fre.win8_rtm.120725-1247
ANALYSIS_SESSION_ELAPSED_TIME: 3d8
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x35_partmgr!pmglobaldispatch
FAILURE_ID_HASH: {426ff38a-3e3b-1c22-415b-f1eb0b5c5c93}
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NO_MORE_IRP_STACK_LOCATIONS (35)
A higher level driver has attempted to call a lower level driver through
the IoCallDriver() interface, but there are no more stack locations in the
packet, hence, the lower level driver would not be able to access its
parameters, as there are no parameters for it. This is a disasterous
situation, since the higher level driver "thinks" it has filled in the
parameters for the lower level driver (something it MUST do before it calls
it), but since there is no stack location for the latter driver, the former
has written off of the end of the packet. This means that some other memory
has probably been trashed at this point.
Arguments:
Arg1: fffffa8036622010, Address of the IRP
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
Page f96400 not present in the dump file. Type ".hh dbgerr004" for details
KEY_VALUES_STRING: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 9200.16384.amd64fre.win8_rtm.120725-1247
SYSTEM_MANUFACTURER: VMware, Inc.
VIRTUAL_MACHINE: VMware
SYSTEM_PRODUCT_NAME: VMware Virtual Platform
SYSTEM_VERSION: None
BIOS_VENDOR: Phoenix Technologies LTD
BIOS_VERSION: 6.00
BIOS_DATE: 04/05/2016
BASEBOARD_MANUFACTURER: Intel Corporation
BASEBOARD_PRODUCT: 440BX Desktop Reference Platform
BASEBOARD_VERSION: None
DUMP_TYPE: 1
BUGCHECK_P1: fffffa8036622010
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
CPU_COUNT: c
CPU_MHZ: 8fc
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 55
CPU_STEPPING: 4
CPU_MICROCODE: 6,55,4,0 (F,M,S,R) SIG: 200004D'00000000 (cache) 200004D'00000000 (init)
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x35
PROCESS_NAME: sqlservr.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: SFITBSVR
ANALYSIS_SESSION_TIME: 11-13-2018 14:35:44.0730
ANALYSIS_VERSION: 10.0.17763.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff803c8e8d032 to fffff803c8e8d040
STACK_TEXT:
fffff880`08a07bc8 fffff803`c8e8d032 : 00000000`00000035 fffffa80`36622010 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`08a07bd0 fffff803`c8fe0a5b : 00000000`0000f000 00000000`0000f000 fffffa80`3210d000 fffffa80`32165010 : nt!KiBugCheck3+0x12
fffff880`08a07c00 fffff880`01a028b0 : 00000000`00000000 00000000`00000000 fffffa80`35a6b010 0000008a`f8ce9600 : nt! ?? ::FNODOBFM::`string'+0xae71
fffff880`08a07c30 fffff880`01a01ec8 : fffffa80`3210d000 fffffa80`359eaaf0 00000000`00000100 fffffa80`00101000 : CLASSPNP!ServiceTransferRequest+0x400
fffff880`08a07ce0 fffff880`0152b195 : 00000000`00000000 00000000`002245cd 00000000`00000000 fffffa80`31947910 : CLASSPNP!ClassReadWrite+0xf8
fffff880`08a07d80 fffff880`0158e14e : ffff0000`00000000 fffffa80`34487b00 fffffa80`31986b40 00000000`0652e600 : partmgr!PmGlobalDispatch+0x185
fffff880`08a07dd0 fffff880`01d4e66f : fffffa80`359eaaf0 fffffa80`3219f190 00000000`00000000 fffff880`09227a10 : volmgr!VmReadWrite+0x13e
fffff880`08a07e10 fffff880`00a1fb65 : fffffa80`3471a870 fffff880`09227a10 fffff880`05d66df0 fffffa80`33881b00 : volsnap!VolsnapWriteFilter+0x2af
fffff880`08a07f50 fffff803`c8e87767 : fffff880`05d66df0 00000000`00000000 00000000`00000000 00000000`00000001 : Ntfs!NtfsStorageDriverCallout+0x16
fffff880`08a07f80 fffff803`c8e8772d : 00000000`00000000 00000000`00000000 00000000`00000002 fffff803`c8ecdf1e : nt!KxSwitchKernelStackCallout+0x27
fffff880`09227a10 fffff803`c8ecdf1e : fffff680`00000007 00000000`00000000 00000000`00000007 00000000`00000000 : nt!KiSwitchKernelStackContinue
fffff880`09227a30 fffff803`c8eced85 : fffff880`00a1fb50 fffff880`09227ba8 00000000`00000000 fffff803`c8e49537 : nt!KeExpandKernelStackAndCalloutInternal+0x20e
fffff880`09227b30 fffff880`00a1fa9c : fffffa80`00000000 fffffa80`359eaaf0 00000000`00000000 fffffa80`332a9328 : nt!KeExpandKernelStackAndCalloutEx+0x25
fffff880`09227b70 fffff880`00a1e45a : fffffa80`31eb6e10 fffffa80`3471a870 fffff8a0`02118140 00000000`00000000 : Ntfs!NtfsMultipleAsync+0xac
fffff880`09227be0 fffff880`00a265fa : 00000000`00000000 fffff8a0`02118010 fffff8a0`02118140 00000000`00000700 : Ntfs!NtfsNonCachedIo+0x26a
fffff880`09227da0 fffff880`00a297ee : fffffa80`3471a870 fffff880`09228020 fffff880`09228038 00000000`00000000 : Ntfs!NtfsCommonWrite+0x9fa
fffff880`09227ff0 fffff880`0189e0ee : fffffa80`326d0ce0 fffffa80`359eaaf0 fffffa80`32f3f7d0 fffffa80`359eaaf0 : Ntfs!NtfsFsdWrite+0x21e
fffff880`092280b0 fffff803`c92589e8 : 00000000`00000001 fffff880`09228191 fffffa80`32f3f7d0 00000000`00000000 : fltmgr!FltpDispatch+0xee
fffff880`09228110 fffff803`c9278704 : fffffa80`32f3f704 00000000`05171000 fffff880`09228280 fffffa80`32f3f7d0 : nt!IopSynchronousServiceTail+0x158
fffff880`092281e0 fffff803`c8e8c053 : 00000000`00fc3601 00000000`0000028c 00000000`00000000 00000000`34b637b0 : nt!NtWriteFile+0x833
fffff880`09228310 000007fc`f3232c2a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`54469298 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007fc`f3232c2a
THREAD_SHA1_HASH_MOD_FUNC: 0df66de2c20873ec343e0131a42dab19a0a8b42c
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f0cb4cba3c1dcc9c506a63c2d6259934bd808b3f
THREAD_SHA1_HASH_MOD: e0a735c3468be760d4e5178b8de084f35c59acaf
FOLLOWUP_IP:
partmgr!PmGlobalDispatch+185
fffff880`0152b195 4c8b6c2458 mov r13,qword ptr [rsp+58h]
FAULT_INSTR_CODE: 246c8b4c
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: partmgr!PmGlobalDispatch+185
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: partmgr
IMAGE_NAME: partmgr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5010abab
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 185
FAILURE_BUCKET_ID: 0x35_partmgr!PmGlobalDispatch
BUCKET_ID: 0x35_partmgr!PmGlobalDispatch
PRIMARY_PROBLEM_CLASS: 0x35_partmgr!PmGlobalDispatch
TARGET_TIME: 2018-11-13T01:50:38.000Z
OSBUILD: 9200
OSSERVICEPACK: 16384
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 3
OSPLATFORM_TYPE: x64
OSNAME: Windows 8
OSEDITION: Windows 8 Server TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2012-07-26 09:32:43
BUILDDATESTAMP_STR: 120725-1247
BUILDLAB_STR: win8_rtm
BUILDOSVER_STR: 6.2.9200.16384.amd64fre.win8_rtm.120725-1247
ANALYSIS_SESSION_ELAPSED_TIME: 3d8
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x35_partmgr!pmglobaldispatch
FAILURE_ID_HASH: {426ff38a-3e3b-1c22-415b-f1eb0b5c5c93}
Followup: MachineOwner
---------
Continue reading...