Jump to content
Microsoft Windows Bulletin Board

WINDOWS SERVER 2012, BSOD The bugcheck was: 0x00000035


Recommended Posts

Guest sendiseptiawan
Posted

My computer has been randomly crashing without a BSOD, i check form event viewer, i see the "The computer has rebooted from a bugcheck. The bugcheck was: 0x00000035 (0xfffffa8036622010, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000). A dump was saved in: C:\Windows\MEMORY.DMP. Report Id: 111318-10280-01."

 

 

If anyone can help me with this, I'd really appreciate it. I can upload my dump file if needed.thank you

 

 

 

Microsoft ® Windows Debugger Version 10.0.17763.1 AMD64

 

Copyright © Microsoft Corporation. All rights reserved.

 

 

 

 

 

Loading Dump File [C:\Users\Administrator\Documents\MEMORY.DMP]

 

Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

 

 

 

Symbol search path is: srv*

 

Executable search path is:

 

Windows 8 Kernel Version 9200 MP (12 procs) Free x64

 

Product: Server, suite: TerminalServer SingleUserTS

 

Built by: 9200.16384.amd64fre.win8_rtm.120725-1247

 

Machine Name:

 

Kernel base = 0xfffff803`c8e12000 PsLoadedModuleList = 0xfffff803`c90dca60

 

Debug session time: Tue Nov 13 08:50:38.454 2018 (UTC + 7:00)

 

System Uptime: 2 days 23:37:33.064

 

Loading Kernel Symbols

 

...............................................................

 

...............................................................

 

Loading User Symbols

 

PEB is paged out (Peb.Ldr = 000007f5`ff5af018). Type ".hh dbgerr001" for details

 

Loading unloaded module list

 

.....

 

*******************************************************************************

 

* *

 

* Bugcheck Analysis *

 

* *

 

*******************************************************************************

 

 

 

Use !analyze -v to get detailed debugging information.

 

 

 

BugCheck 35, {fffffa8036622010, 0, 0, 0}

 

 

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Probably caused by : partmgr.sys ( partmgr!PmGlobalDispatch+185 )

 

 

 

Followup: MachineOwner

 

---------

 

 

 

2: kd> !analyze -v

 

*******************************************************************************

 

* *

 

* Bugcheck Analysis *

 

* *

 

*******************************************************************************

 

 

 

NO_MORE_IRP_STACK_LOCATIONS (35)

 

A higher level driver has attempted to call a lower level driver through

 

the IoCallDriver() interface, but there are no more stack locations in the

 

packet, hence, the lower level driver would not be able to access its

 

parameters, as there are no parameters for it. This is a disasterous

 

situation, since the higher level driver "thinks" it has filled in the

 

parameters for the lower level driver (something it MUST do before it calls

 

it), but since there is no stack location for the latter driver, the former

 

has written off of the end of the packet. This means that some other memory

 

has probably been trashed at this point.

 

Arguments:

 

Arg1: fffffa8036622010, Address of the IRP

 

Arg2: 0000000000000000

 

Arg3: 0000000000000000

 

Arg4: 0000000000000000

 

 

 

Debugging Details:

 

------------------

 

 

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

 

 

KEY_VALUES_STRING: 1

 

 

 

 

 

STACKHASH_ANALYSIS: 1

 

 

 

TIMELINE_ANALYSIS: 1

 

 

 

 

 

DUMP_CLASS: 1

 

 

 

DUMP_QUALIFIER: 401

 

 

 

BUILD_VERSION_STRING: 9200.16384.amd64fre.win8_rtm.120725-1247

 

 

 

SYSTEM_MANUFACTURER: VMware, Inc.

 

 

 

VIRTUAL_MACHINE: VMware

 

 

 

SYSTEM_PRODUCT_NAME: VMware Virtual Platform

 

 

 

SYSTEM_VERSION: None

 

 

 

BIOS_VENDOR: Phoenix Technologies LTD

 

 

 

BIOS_VERSION: 6.00

 

 

 

BIOS_DATE: 04/05/2016

 

 

 

BASEBOARD_MANUFACTURER: Intel Corporation

 

 

 

BASEBOARD_PRODUCT: 440BX Desktop Reference Platform

 

 

 

BASEBOARD_VERSION: None

 

 

 

DUMP_TYPE: 1

 

 

 

BUGCHECK_P1: fffffa8036622010

 

 

 

BUGCHECK_P2: 0

 

 

 

BUGCHECK_P3: 0

 

 

 

BUGCHECK_P4: 0

 

 

 

CPU_COUNT: c

 

 

 

CPU_MHZ: 8fc

 

 

 

CPU_VENDOR: GenuineIntel

 

 

 

CPU_FAMILY: 6

 

 

 

CPU_MODEL: 55

 

 

 

CPU_STEPPING: 4

 

 

 

CPU_MICROCODE: 6,55,4,0 (F,M,S,R) SIG: 200004D'00000000 (cache) 200004D'00000000 (init)

 

 

 

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

 

 

 

BUGCHECK_STR: 0x35

 

 

 

PROCESS_NAME: sqlservr.exe

 

 

 

CURRENT_IRQL: 0

 

 

 

ANALYSIS_SESSION_HOST: SFITBSVR

 

 

 

ANALYSIS_SESSION_TIME: 11-13-2018 14:35:43.0744

 

 

 

ANALYSIS_VERSION: 10.0.17763.1 amd64fre

 

 

 

LAST_CONTROL_TRANSFER: from fffff803c8e8d032 to fffff803c8e8d040

 

 

 

STACK_TEXT:

 

fffff880`08a07bc8 fffff803`c8e8d032 : 00000000`00000035 fffffa80`36622010 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx

 

fffff880`08a07bd0 fffff803`c8fe0a5b : 00000000`0000f000 00000000`0000f000 fffffa80`3210d000 fffffa80`32165010 : nt!KiBugCheck3+0x12

 

fffff880`08a07c00 fffff880`01a028b0 : 00000000`00000000 00000000`00000000 fffffa80`35a6b010 0000008a`f8ce9600 : nt! ?? ::FNODOBFM::`string'+0xae71

 

fffff880`08a07c30 fffff880`01a01ec8 : fffffa80`3210d000 fffffa80`359eaaf0 00000000`00000100 fffffa80`00101000 : CLASSPNP!ServiceTransferRequest+0x400

 

fffff880`08a07ce0 fffff880`0152b195 : 00000000`00000000 00000000`002245cd 00000000`00000000 fffffa80`31947910 : CLASSPNP!ClassReadWrite+0xf8

 

fffff880`08a07d80 fffff880`0158e14e : ffff0000`00000000 fffffa80`34487b00 fffffa80`31986b40 00000000`0652e600 : partmgr!PmGlobalDispatch+0x185

 

fffff880`08a07dd0 fffff880`01d4e66f : fffffa80`359eaaf0 fffffa80`3219f190 00000000`00000000 fffff880`09227a10 : volmgr!VmReadWrite+0x13e

 

fffff880`08a07e10 fffff880`00a1fb65 : fffffa80`3471a870 fffff880`09227a10 fffff880`05d66df0 fffffa80`33881b00 : volsnap!VolsnapWriteFilter+0x2af

 

fffff880`08a07f50 fffff803`c8e87767 : fffff880`05d66df0 00000000`00000000 00000000`00000000 00000000`00000001 : Ntfs!NtfsStorageDriverCallout+0x16

 

fffff880`08a07f80 fffff803`c8e8772d : 00000000`00000000 00000000`00000000 00000000`00000002 fffff803`c8ecdf1e : nt!KxSwitchKernelStackCallout+0x27

 

fffff880`09227a10 fffff803`c8ecdf1e : fffff680`00000007 00000000`00000000 00000000`00000007 00000000`00000000 : nt!KiSwitchKernelStackContinue

 

fffff880`09227a30 fffff803`c8eced85 : fffff880`00a1fb50 fffff880`09227ba8 00000000`00000000 fffff803`c8e49537 : nt!KeExpandKernelStackAndCalloutInternal+0x20e

 

fffff880`09227b30 fffff880`00a1fa9c : fffffa80`00000000 fffffa80`359eaaf0 00000000`00000000 fffffa80`332a9328 : nt!KeExpandKernelStackAndCalloutEx+0x25

 

fffff880`09227b70 fffff880`00a1e45a : fffffa80`31eb6e10 fffffa80`3471a870 fffff8a0`02118140 00000000`00000000 : Ntfs!NtfsMultipleAsync+0xac

 

fffff880`09227be0 fffff880`00a265fa : 00000000`00000000 fffff8a0`02118010 fffff8a0`02118140 00000000`00000700 : Ntfs!NtfsNonCachedIo+0x26a

 

fffff880`09227da0 fffff880`00a297ee : fffffa80`3471a870 fffff880`09228020 fffff880`09228038 00000000`00000000 : Ntfs!NtfsCommonWrite+0x9fa

 

fffff880`09227ff0 fffff880`0189e0ee : fffffa80`326d0ce0 fffffa80`359eaaf0 fffffa80`32f3f7d0 fffffa80`359eaaf0 : Ntfs!NtfsFsdWrite+0x21e

 

fffff880`092280b0 fffff803`c92589e8 : 00000000`00000001 fffff880`09228191 fffffa80`32f3f7d0 00000000`00000000 : fltmgr!FltpDispatch+0xee

 

fffff880`09228110 fffff803`c9278704 : fffffa80`32f3f704 00000000`05171000 fffff880`09228280 fffffa80`32f3f7d0 : nt!IopSynchronousServiceTail+0x158

 

fffff880`092281e0 fffff803`c8e8c053 : 00000000`00fc3601 00000000`0000028c 00000000`00000000 00000000`34b637b0 : nt!NtWriteFile+0x833

 

fffff880`09228310 000007fc`f3232c2a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13

 

00000000`54469298 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007fc`f3232c2a

 

 

 

 

 

THREAD_SHA1_HASH_MOD_FUNC: 0df66de2c20873ec343e0131a42dab19a0a8b42c

 

 

 

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f0cb4cba3c1dcc9c506a63c2d6259934bd808b3f

 

 

 

THREAD_SHA1_HASH_MOD: e0a735c3468be760d4e5178b8de084f35c59acaf

 

 

 

FOLLOWUP_IP:

 

partmgr!PmGlobalDispatch+185

 

fffff880`0152b195 4c8b6c2458 mov r13,qword ptr [rsp+58h]

 

 

 

FAULT_INSTR_CODE: 246c8b4c

 

 

 

SYMBOL_STACK_INDEX: 5

 

 

 

SYMBOL_NAME: partmgr!PmGlobalDispatch+185

 

 

 

FOLLOWUP_NAME: MachineOwner

 

 

 

MODULE_NAME: partmgr

 

 

 

IMAGE_NAME: partmgr.sys

 

 

 

DEBUG_FLR_IMAGE_TIMESTAMP: 5010abab

 

 

 

STACK_COMMAND: .thread ; .cxr ; kb

 

 

 

BUCKET_ID_FUNC_OFFSET: 185

 

 

 

FAILURE_BUCKET_ID: 0x35_partmgr!PmGlobalDispatch

 

 

 

BUCKET_ID: 0x35_partmgr!PmGlobalDispatch

 

 

 

PRIMARY_PROBLEM_CLASS: 0x35_partmgr!PmGlobalDispatch

 

 

 

TARGET_TIME: 2018-11-13T01:50:38.000Z

 

 

 

OSBUILD: 9200

 

 

 

OSSERVICEPACK: 16384

 

 

 

SERVICEPACK_NUMBER: 0

 

 

 

OS_REVISION: 0

 

 

 

SUITE_MASK: 272

 

 

 

PRODUCT_TYPE: 3

 

 

 

OSPLATFORM_TYPE: x64

 

 

 

OSNAME: Windows 8

 

 

 

OSEDITION: Windows 8 Server TerminalServer SingleUserTS

 

 

 

OS_LOCALE:

 

 

 

USER_LCID: 0

 

 

 

OSBUILD_TIMESTAMP: 2012-07-26 09:32:43

 

 

 

BUILDDATESTAMP_STR: 120725-1247

 

 

 

BUILDLAB_STR: win8_rtm

 

 

 

BUILDOSVER_STR: 6.2.9200.16384.amd64fre.win8_rtm.120725-1247

 

 

 

ANALYSIS_SESSION_ELAPSED_TIME: 3d8

 

 

 

ANALYSIS_SOURCE: KM

 

 

 

FAILURE_ID_HASH_STRING: km:0x35_partmgr!pmglobaldispatch

 

 

 

FAILURE_ID_HASH: {426ff38a-3e3b-1c22-415b-f1eb0b5c5c93}

 

 

 

Followup: MachineOwner

 

---------

 

 

 

2: kd> !analyze -v

 

*******************************************************************************

 

* *

 

* Bugcheck Analysis *

 

* *

 

*******************************************************************************

 

 

 

NO_MORE_IRP_STACK_LOCATIONS (35)

 

A higher level driver has attempted to call a lower level driver through

 

the IoCallDriver() interface, but there are no more stack locations in the

 

packet, hence, the lower level driver would not be able to access its

 

parameters, as there are no parameters for it. This is a disasterous

 

situation, since the higher level driver "thinks" it has filled in the

 

parameters for the lower level driver (something it MUST do before it calls

 

it), but since there is no stack location for the latter driver, the former

 

has written off of the end of the packet. This means that some other memory

 

has probably been trashed at this point.

 

Arguments:

 

Arg1: fffffa8036622010, Address of the IRP

 

Arg2: 0000000000000000

 

Arg3: 0000000000000000

 

Arg4: 0000000000000000

 

 

 

Debugging Details:

 

------------------

 

 

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

Page f96400 not present in the dump file. Type ".hh dbgerr004" for details

 

 

 

KEY_VALUES_STRING: 1

 

 

 

 

 

STACKHASH_ANALYSIS: 1

 

 

 

TIMELINE_ANALYSIS: 1

 

 

 

 

 

DUMP_CLASS: 1

 

 

 

DUMP_QUALIFIER: 401

 

 

 

BUILD_VERSION_STRING: 9200.16384.amd64fre.win8_rtm.120725-1247

 

 

 

SYSTEM_MANUFACTURER: VMware, Inc.

 

 

 

VIRTUAL_MACHINE: VMware

 

 

 

SYSTEM_PRODUCT_NAME: VMware Virtual Platform

 

 

 

SYSTEM_VERSION: None

 

 

 

BIOS_VENDOR: Phoenix Technologies LTD

 

 

 

BIOS_VERSION: 6.00

 

 

 

BIOS_DATE: 04/05/2016

 

 

 

BASEBOARD_MANUFACTURER: Intel Corporation

 

 

 

BASEBOARD_PRODUCT: 440BX Desktop Reference Platform

 

 

 

BASEBOARD_VERSION: None

 

 

 

DUMP_TYPE: 1

 

 

 

BUGCHECK_P1: fffffa8036622010

 

 

 

BUGCHECK_P2: 0

 

 

 

BUGCHECK_P3: 0

 

 

 

BUGCHECK_P4: 0

 

 

 

CPU_COUNT: c

 

 

 

CPU_MHZ: 8fc

 

 

 

CPU_VENDOR: GenuineIntel

 

 

 

CPU_FAMILY: 6

 

 

 

CPU_MODEL: 55

 

 

 

CPU_STEPPING: 4

 

 

 

CPU_MICROCODE: 6,55,4,0 (F,M,S,R) SIG: 200004D'00000000 (cache) 200004D'00000000 (init)

 

 

 

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

 

 

 

BUGCHECK_STR: 0x35

 

 

 

PROCESS_NAME: sqlservr.exe

 

 

 

CURRENT_IRQL: 0

 

 

 

ANALYSIS_SESSION_HOST: SFITBSVR

 

 

 

ANALYSIS_SESSION_TIME: 11-13-2018 14:35:44.0730

 

 

 

ANALYSIS_VERSION: 10.0.17763.1 amd64fre

 

 

 

LAST_CONTROL_TRANSFER: from fffff803c8e8d032 to fffff803c8e8d040

 

 

 

STACK_TEXT:

 

fffff880`08a07bc8 fffff803`c8e8d032 : 00000000`00000035 fffffa80`36622010 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx

 

fffff880`08a07bd0 fffff803`c8fe0a5b : 00000000`0000f000 00000000`0000f000 fffffa80`3210d000 fffffa80`32165010 : nt!KiBugCheck3+0x12

 

fffff880`08a07c00 fffff880`01a028b0 : 00000000`00000000 00000000`00000000 fffffa80`35a6b010 0000008a`f8ce9600 : nt! ?? ::FNODOBFM::`string'+0xae71

 

fffff880`08a07c30 fffff880`01a01ec8 : fffffa80`3210d000 fffffa80`359eaaf0 00000000`00000100 fffffa80`00101000 : CLASSPNP!ServiceTransferRequest+0x400

 

fffff880`08a07ce0 fffff880`0152b195 : 00000000`00000000 00000000`002245cd 00000000`00000000 fffffa80`31947910 : CLASSPNP!ClassReadWrite+0xf8

 

fffff880`08a07d80 fffff880`0158e14e : ffff0000`00000000 fffffa80`34487b00 fffffa80`31986b40 00000000`0652e600 : partmgr!PmGlobalDispatch+0x185

 

fffff880`08a07dd0 fffff880`01d4e66f : fffffa80`359eaaf0 fffffa80`3219f190 00000000`00000000 fffff880`09227a10 : volmgr!VmReadWrite+0x13e

 

fffff880`08a07e10 fffff880`00a1fb65 : fffffa80`3471a870 fffff880`09227a10 fffff880`05d66df0 fffffa80`33881b00 : volsnap!VolsnapWriteFilter+0x2af

 

fffff880`08a07f50 fffff803`c8e87767 : fffff880`05d66df0 00000000`00000000 00000000`00000000 00000000`00000001 : Ntfs!NtfsStorageDriverCallout+0x16

 

fffff880`08a07f80 fffff803`c8e8772d : 00000000`00000000 00000000`00000000 00000000`00000002 fffff803`c8ecdf1e : nt!KxSwitchKernelStackCallout+0x27

 

fffff880`09227a10 fffff803`c8ecdf1e : fffff680`00000007 00000000`00000000 00000000`00000007 00000000`00000000 : nt!KiSwitchKernelStackContinue

 

fffff880`09227a30 fffff803`c8eced85 : fffff880`00a1fb50 fffff880`09227ba8 00000000`00000000 fffff803`c8e49537 : nt!KeExpandKernelStackAndCalloutInternal+0x20e

 

fffff880`09227b30 fffff880`00a1fa9c : fffffa80`00000000 fffffa80`359eaaf0 00000000`00000000 fffffa80`332a9328 : nt!KeExpandKernelStackAndCalloutEx+0x25

 

fffff880`09227b70 fffff880`00a1e45a : fffffa80`31eb6e10 fffffa80`3471a870 fffff8a0`02118140 00000000`00000000 : Ntfs!NtfsMultipleAsync+0xac

 

fffff880`09227be0 fffff880`00a265fa : 00000000`00000000 fffff8a0`02118010 fffff8a0`02118140 00000000`00000700 : Ntfs!NtfsNonCachedIo+0x26a

 

fffff880`09227da0 fffff880`00a297ee : fffffa80`3471a870 fffff880`09228020 fffff880`09228038 00000000`00000000 : Ntfs!NtfsCommonWrite+0x9fa

 

fffff880`09227ff0 fffff880`0189e0ee : fffffa80`326d0ce0 fffffa80`359eaaf0 fffffa80`32f3f7d0 fffffa80`359eaaf0 : Ntfs!NtfsFsdWrite+0x21e

 

fffff880`092280b0 fffff803`c92589e8 : 00000000`00000001 fffff880`09228191 fffffa80`32f3f7d0 00000000`00000000 : fltmgr!FltpDispatch+0xee

 

fffff880`09228110 fffff803`c9278704 : fffffa80`32f3f704 00000000`05171000 fffff880`09228280 fffffa80`32f3f7d0 : nt!IopSynchronousServiceTail+0x158

 

fffff880`092281e0 fffff803`c8e8c053 : 00000000`00fc3601 00000000`0000028c 00000000`00000000 00000000`34b637b0 : nt!NtWriteFile+0x833

 

fffff880`09228310 000007fc`f3232c2a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13

 

00000000`54469298 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007fc`f3232c2a

 

 

 

 

 

THREAD_SHA1_HASH_MOD_FUNC: 0df66de2c20873ec343e0131a42dab19a0a8b42c

 

 

 

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f0cb4cba3c1dcc9c506a63c2d6259934bd808b3f

 

 

 

THREAD_SHA1_HASH_MOD: e0a735c3468be760d4e5178b8de084f35c59acaf

 

 

 

FOLLOWUP_IP:

 

partmgr!PmGlobalDispatch+185

 

fffff880`0152b195 4c8b6c2458 mov r13,qword ptr [rsp+58h]

 

 

 

FAULT_INSTR_CODE: 246c8b4c

 

 

 

SYMBOL_STACK_INDEX: 5

 

 

 

SYMBOL_NAME: partmgr!PmGlobalDispatch+185

 

 

 

FOLLOWUP_NAME: MachineOwner

 

 

 

MODULE_NAME: partmgr

 

 

 

IMAGE_NAME: partmgr.sys

 

 

 

DEBUG_FLR_IMAGE_TIMESTAMP: 5010abab

 

 

 

STACK_COMMAND: .thread ; .cxr ; kb

 

 

 

BUCKET_ID_FUNC_OFFSET: 185

 

 

 

FAILURE_BUCKET_ID: 0x35_partmgr!PmGlobalDispatch

 

 

 

BUCKET_ID: 0x35_partmgr!PmGlobalDispatch

 

 

 

PRIMARY_PROBLEM_CLASS: 0x35_partmgr!PmGlobalDispatch

 

 

 

TARGET_TIME: 2018-11-13T01:50:38.000Z

 

 

 

OSBUILD: 9200

 

 

 

OSSERVICEPACK: 16384

 

 

 

SERVICEPACK_NUMBER: 0

 

 

 

OS_REVISION: 0

 

 

 

SUITE_MASK: 272

 

 

 

PRODUCT_TYPE: 3

 

 

 

OSPLATFORM_TYPE: x64

 

 

 

OSNAME: Windows 8

 

 

 

OSEDITION: Windows 8 Server TerminalServer SingleUserTS

 

 

 

OS_LOCALE:

 

 

 

USER_LCID: 0

 

 

 

OSBUILD_TIMESTAMP: 2012-07-26 09:32:43

 

 

 

BUILDDATESTAMP_STR: 120725-1247

 

 

 

BUILDLAB_STR: win8_rtm

 

 

 

BUILDOSVER_STR: 6.2.9200.16384.amd64fre.win8_rtm.120725-1247

 

 

 

ANALYSIS_SESSION_ELAPSED_TIME: 3d8

 

 

 

ANALYSIS_SOURCE: KM

 

 

 

FAILURE_ID_HASH_STRING: km:0x35_partmgr!pmglobaldispatch

 

 

 

FAILURE_ID_HASH: {426ff38a-3e3b-1c22-415b-f1eb0b5c5c93}

 

 

 

Followup: MachineOwner

 

---------

 

Continue reading...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...