Guest sendiseptiawan Posted November 13, 2018 Posted November 13, 2018 My computer has been randomly crashing without a BSOD, i check form event viewer, i see the "The computer has rebooted from a bugcheck. The bugcheck was: 0x00000035 (0xfffffa8036622010, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000). A dump was saved in: C:\Windows\MEMORY.DMP. Report Id: 111318-10280-01." If anyone can help me with this, I'd really appreciate it. I can upload my dump file if needed.thank you Microsoft ® Windows Debugger Version 10.0.17763.1 AMD64 Copyright © Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Administrator\Documents\MEMORY.DMP] Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available. Symbol search path is: srv* Executable search path is: Windows 8 Kernel Version 9200 MP (12 procs) Free x64 Product: Server, suite: TerminalServer SingleUserTS Built by: 9200.16384.amd64fre.win8_rtm.120725-1247 Machine Name: Kernel base = 0xfffff803`c8e12000 PsLoadedModuleList = 0xfffff803`c90dca60 Debug session time: Tue Nov 13 08:50:38.454 2018 (UTC + 7:00) System Uptime: 2 days 23:37:33.064 Loading Kernel Symbols ............................................................... ............................................................... Loading User Symbols PEB is paged out (Peb.Ldr = 000007f5`ff5af018). Type ".hh dbgerr001" for details Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 35, {fffffa8036622010, 0, 0, 0} Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Probably caused by : partmgr.sys ( partmgr!PmGlobalDispatch+185 ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* NO_MORE_IRP_STACK_LOCATIONS (35) A higher level driver has attempted to call a lower level driver through the IoCallDriver() interface, but there are no more stack locations in the packet, hence, the lower level driver would not be able to access its parameters, as there are no parameters for it. This is a disasterous situation, since the higher level driver "thinks" it has filled in the parameters for the lower level driver (something it MUST do before it calls it), but since there is no stack location for the latter driver, the former has written off of the end of the packet. This means that some other memory has probably been trashed at this point. Arguments: Arg1: fffffa8036622010, Address of the IRP Arg2: 0000000000000000 Arg3: 0000000000000000 Arg4: 0000000000000000 Debugging Details: ------------------ Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details KEY_VALUES_STRING: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 401 BUILD_VERSION_STRING: 9200.16384.amd64fre.win8_rtm.120725-1247 SYSTEM_MANUFACTURER: VMware, Inc. VIRTUAL_MACHINE: VMware SYSTEM_PRODUCT_NAME: VMware Virtual Platform SYSTEM_VERSION: None BIOS_VENDOR: Phoenix Technologies LTD BIOS_VERSION: 6.00 BIOS_DATE: 04/05/2016 BASEBOARD_MANUFACTURER: Intel Corporation BASEBOARD_PRODUCT: 440BX Desktop Reference Platform BASEBOARD_VERSION: None DUMP_TYPE: 1 BUGCHECK_P1: fffffa8036622010 BUGCHECK_P2: 0 BUGCHECK_P3: 0 BUGCHECK_P4: 0 CPU_COUNT: c CPU_MHZ: 8fc CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 55 CPU_STEPPING: 4 CPU_MICROCODE: 6,55,4,0 (F,M,S,R) SIG: 200004D'00000000 (cache) 200004D'00000000 (init) DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0x35 PROCESS_NAME: sqlservr.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: SFITBSVR ANALYSIS_SESSION_TIME: 11-13-2018 14:35:43.0744 ANALYSIS_VERSION: 10.0.17763.1 amd64fre LAST_CONTROL_TRANSFER: from fffff803c8e8d032 to fffff803c8e8d040 STACK_TEXT: fffff880`08a07bc8 fffff803`c8e8d032 : 00000000`00000035 fffffa80`36622010 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx fffff880`08a07bd0 fffff803`c8fe0a5b : 00000000`0000f000 00000000`0000f000 fffffa80`3210d000 fffffa80`32165010 : nt!KiBugCheck3+0x12 fffff880`08a07c00 fffff880`01a028b0 : 00000000`00000000 00000000`00000000 fffffa80`35a6b010 0000008a`f8ce9600 : nt! ?? ::FNODOBFM::`string'+0xae71 fffff880`08a07c30 fffff880`01a01ec8 : fffffa80`3210d000 fffffa80`359eaaf0 00000000`00000100 fffffa80`00101000 : CLASSPNP!ServiceTransferRequest+0x400 fffff880`08a07ce0 fffff880`0152b195 : 00000000`00000000 00000000`002245cd 00000000`00000000 fffffa80`31947910 : CLASSPNP!ClassReadWrite+0xf8 fffff880`08a07d80 fffff880`0158e14e : ffff0000`00000000 fffffa80`34487b00 fffffa80`31986b40 00000000`0652e600 : partmgr!PmGlobalDispatch+0x185 fffff880`08a07dd0 fffff880`01d4e66f : fffffa80`359eaaf0 fffffa80`3219f190 00000000`00000000 fffff880`09227a10 : volmgr!VmReadWrite+0x13e fffff880`08a07e10 fffff880`00a1fb65 : fffffa80`3471a870 fffff880`09227a10 fffff880`05d66df0 fffffa80`33881b00 : volsnap!VolsnapWriteFilter+0x2af fffff880`08a07f50 fffff803`c8e87767 : fffff880`05d66df0 00000000`00000000 00000000`00000000 00000000`00000001 : Ntfs!NtfsStorageDriverCallout+0x16 fffff880`08a07f80 fffff803`c8e8772d : 00000000`00000000 00000000`00000000 00000000`00000002 fffff803`c8ecdf1e : nt!KxSwitchKernelStackCallout+0x27 fffff880`09227a10 fffff803`c8ecdf1e : fffff680`00000007 00000000`00000000 00000000`00000007 00000000`00000000 : nt!KiSwitchKernelStackContinue fffff880`09227a30 fffff803`c8eced85 : fffff880`00a1fb50 fffff880`09227ba8 00000000`00000000 fffff803`c8e49537 : nt!KeExpandKernelStackAndCalloutInternal+0x20e fffff880`09227b30 fffff880`00a1fa9c : fffffa80`00000000 fffffa80`359eaaf0 00000000`00000000 fffffa80`332a9328 : nt!KeExpandKernelStackAndCalloutEx+0x25 fffff880`09227b70 fffff880`00a1e45a : fffffa80`31eb6e10 fffffa80`3471a870 fffff8a0`02118140 00000000`00000000 : Ntfs!NtfsMultipleAsync+0xac fffff880`09227be0 fffff880`00a265fa : 00000000`00000000 fffff8a0`02118010 fffff8a0`02118140 00000000`00000700 : Ntfs!NtfsNonCachedIo+0x26a fffff880`09227da0 fffff880`00a297ee : fffffa80`3471a870 fffff880`09228020 fffff880`09228038 00000000`00000000 : Ntfs!NtfsCommonWrite+0x9fa fffff880`09227ff0 fffff880`0189e0ee : fffffa80`326d0ce0 fffffa80`359eaaf0 fffffa80`32f3f7d0 fffffa80`359eaaf0 : Ntfs!NtfsFsdWrite+0x21e fffff880`092280b0 fffff803`c92589e8 : 00000000`00000001 fffff880`09228191 fffffa80`32f3f7d0 00000000`00000000 : fltmgr!FltpDispatch+0xee fffff880`09228110 fffff803`c9278704 : fffffa80`32f3f704 00000000`05171000 fffff880`09228280 fffffa80`32f3f7d0 : nt!IopSynchronousServiceTail+0x158 fffff880`092281e0 fffff803`c8e8c053 : 00000000`00fc3601 00000000`0000028c 00000000`00000000 00000000`34b637b0 : nt!NtWriteFile+0x833 fffff880`09228310 000007fc`f3232c2a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`54469298 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007fc`f3232c2a THREAD_SHA1_HASH_MOD_FUNC: 0df66de2c20873ec343e0131a42dab19a0a8b42c THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f0cb4cba3c1dcc9c506a63c2d6259934bd808b3f THREAD_SHA1_HASH_MOD: e0a735c3468be760d4e5178b8de084f35c59acaf FOLLOWUP_IP: partmgr!PmGlobalDispatch+185 fffff880`0152b195 4c8b6c2458 mov r13,qword ptr [rsp+58h] FAULT_INSTR_CODE: 246c8b4c SYMBOL_STACK_INDEX: 5 SYMBOL_NAME: partmgr!PmGlobalDispatch+185 FOLLOWUP_NAME: MachineOwner MODULE_NAME: partmgr IMAGE_NAME: partmgr.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5010abab STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 185 FAILURE_BUCKET_ID: 0x35_partmgr!PmGlobalDispatch BUCKET_ID: 0x35_partmgr!PmGlobalDispatch PRIMARY_PROBLEM_CLASS: 0x35_partmgr!PmGlobalDispatch TARGET_TIME: 2018-11-13T01:50:38.000Z OSBUILD: 9200 OSSERVICEPACK: 16384 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 3 OSPLATFORM_TYPE: x64 OSNAME: Windows 8 OSEDITION: Windows 8 Server TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2012-07-26 09:32:43 BUILDDATESTAMP_STR: 120725-1247 BUILDLAB_STR: win8_rtm BUILDOSVER_STR: 6.2.9200.16384.amd64fre.win8_rtm.120725-1247 ANALYSIS_SESSION_ELAPSED_TIME: 3d8 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x35_partmgr!pmglobaldispatch FAILURE_ID_HASH: {426ff38a-3e3b-1c22-415b-f1eb0b5c5c93} Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* NO_MORE_IRP_STACK_LOCATIONS (35) A higher level driver has attempted to call a lower level driver through the IoCallDriver() interface, but there are no more stack locations in the packet, hence, the lower level driver would not be able to access its parameters, as there are no parameters for it. This is a disasterous situation, since the higher level driver "thinks" it has filled in the parameters for the lower level driver (something it MUST do before it calls it), but since there is no stack location for the latter driver, the former has written off of the end of the packet. This means that some other memory has probably been trashed at this point. Arguments: Arg1: fffffa8036622010, Address of the IRP Arg2: 0000000000000000 Arg3: 0000000000000000 Arg4: 0000000000000000 Debugging Details: ------------------ Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details Page f96400 not present in the dump file. Type ".hh dbgerr004" for details KEY_VALUES_STRING: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 401 BUILD_VERSION_STRING: 9200.16384.amd64fre.win8_rtm.120725-1247 SYSTEM_MANUFACTURER: VMware, Inc. VIRTUAL_MACHINE: VMware SYSTEM_PRODUCT_NAME: VMware Virtual Platform SYSTEM_VERSION: None BIOS_VENDOR: Phoenix Technologies LTD BIOS_VERSION: 6.00 BIOS_DATE: 04/05/2016 BASEBOARD_MANUFACTURER: Intel Corporation BASEBOARD_PRODUCT: 440BX Desktop Reference Platform BASEBOARD_VERSION: None DUMP_TYPE: 1 BUGCHECK_P1: fffffa8036622010 BUGCHECK_P2: 0 BUGCHECK_P3: 0 BUGCHECK_P4: 0 CPU_COUNT: c CPU_MHZ: 8fc CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 55 CPU_STEPPING: 4 CPU_MICROCODE: 6,55,4,0 (F,M,S,R) SIG: 200004D'00000000 (cache) 200004D'00000000 (init) DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0x35 PROCESS_NAME: sqlservr.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: SFITBSVR ANALYSIS_SESSION_TIME: 11-13-2018 14:35:44.0730 ANALYSIS_VERSION: 10.0.17763.1 amd64fre LAST_CONTROL_TRANSFER: from fffff803c8e8d032 to fffff803c8e8d040 STACK_TEXT: fffff880`08a07bc8 fffff803`c8e8d032 : 00000000`00000035 fffffa80`36622010 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx fffff880`08a07bd0 fffff803`c8fe0a5b : 00000000`0000f000 00000000`0000f000 fffffa80`3210d000 fffffa80`32165010 : nt!KiBugCheck3+0x12 fffff880`08a07c00 fffff880`01a028b0 : 00000000`00000000 00000000`00000000 fffffa80`35a6b010 0000008a`f8ce9600 : nt! ?? ::FNODOBFM::`string'+0xae71 fffff880`08a07c30 fffff880`01a01ec8 : fffffa80`3210d000 fffffa80`359eaaf0 00000000`00000100 fffffa80`00101000 : CLASSPNP!ServiceTransferRequest+0x400 fffff880`08a07ce0 fffff880`0152b195 : 00000000`00000000 00000000`002245cd 00000000`00000000 fffffa80`31947910 : CLASSPNP!ClassReadWrite+0xf8 fffff880`08a07d80 fffff880`0158e14e : ffff0000`00000000 fffffa80`34487b00 fffffa80`31986b40 00000000`0652e600 : partmgr!PmGlobalDispatch+0x185 fffff880`08a07dd0 fffff880`01d4e66f : fffffa80`359eaaf0 fffffa80`3219f190 00000000`00000000 fffff880`09227a10 : volmgr!VmReadWrite+0x13e fffff880`08a07e10 fffff880`00a1fb65 : fffffa80`3471a870 fffff880`09227a10 fffff880`05d66df0 fffffa80`33881b00 : volsnap!VolsnapWriteFilter+0x2af fffff880`08a07f50 fffff803`c8e87767 : fffff880`05d66df0 00000000`00000000 00000000`00000000 00000000`00000001 : Ntfs!NtfsStorageDriverCallout+0x16 fffff880`08a07f80 fffff803`c8e8772d : 00000000`00000000 00000000`00000000 00000000`00000002 fffff803`c8ecdf1e : nt!KxSwitchKernelStackCallout+0x27 fffff880`09227a10 fffff803`c8ecdf1e : fffff680`00000007 00000000`00000000 00000000`00000007 00000000`00000000 : nt!KiSwitchKernelStackContinue fffff880`09227a30 fffff803`c8eced85 : fffff880`00a1fb50 fffff880`09227ba8 00000000`00000000 fffff803`c8e49537 : nt!KeExpandKernelStackAndCalloutInternal+0x20e fffff880`09227b30 fffff880`00a1fa9c : fffffa80`00000000 fffffa80`359eaaf0 00000000`00000000 fffffa80`332a9328 : nt!KeExpandKernelStackAndCalloutEx+0x25 fffff880`09227b70 fffff880`00a1e45a : fffffa80`31eb6e10 fffffa80`3471a870 fffff8a0`02118140 00000000`00000000 : Ntfs!NtfsMultipleAsync+0xac fffff880`09227be0 fffff880`00a265fa : 00000000`00000000 fffff8a0`02118010 fffff8a0`02118140 00000000`00000700 : Ntfs!NtfsNonCachedIo+0x26a fffff880`09227da0 fffff880`00a297ee : fffffa80`3471a870 fffff880`09228020 fffff880`09228038 00000000`00000000 : Ntfs!NtfsCommonWrite+0x9fa fffff880`09227ff0 fffff880`0189e0ee : fffffa80`326d0ce0 fffffa80`359eaaf0 fffffa80`32f3f7d0 fffffa80`359eaaf0 : Ntfs!NtfsFsdWrite+0x21e fffff880`092280b0 fffff803`c92589e8 : 00000000`00000001 fffff880`09228191 fffffa80`32f3f7d0 00000000`00000000 : fltmgr!FltpDispatch+0xee fffff880`09228110 fffff803`c9278704 : fffffa80`32f3f704 00000000`05171000 fffff880`09228280 fffffa80`32f3f7d0 : nt!IopSynchronousServiceTail+0x158 fffff880`092281e0 fffff803`c8e8c053 : 00000000`00fc3601 00000000`0000028c 00000000`00000000 00000000`34b637b0 : nt!NtWriteFile+0x833 fffff880`09228310 000007fc`f3232c2a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`54469298 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007fc`f3232c2a THREAD_SHA1_HASH_MOD_FUNC: 0df66de2c20873ec343e0131a42dab19a0a8b42c THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f0cb4cba3c1dcc9c506a63c2d6259934bd808b3f THREAD_SHA1_HASH_MOD: e0a735c3468be760d4e5178b8de084f35c59acaf FOLLOWUP_IP: partmgr!PmGlobalDispatch+185 fffff880`0152b195 4c8b6c2458 mov r13,qword ptr [rsp+58h] FAULT_INSTR_CODE: 246c8b4c SYMBOL_STACK_INDEX: 5 SYMBOL_NAME: partmgr!PmGlobalDispatch+185 FOLLOWUP_NAME: MachineOwner MODULE_NAME: partmgr IMAGE_NAME: partmgr.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5010abab STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 185 FAILURE_BUCKET_ID: 0x35_partmgr!PmGlobalDispatch BUCKET_ID: 0x35_partmgr!PmGlobalDispatch PRIMARY_PROBLEM_CLASS: 0x35_partmgr!PmGlobalDispatch TARGET_TIME: 2018-11-13T01:50:38.000Z OSBUILD: 9200 OSSERVICEPACK: 16384 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 3 OSPLATFORM_TYPE: x64 OSNAME: Windows 8 OSEDITION: Windows 8 Server TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2012-07-26 09:32:43 BUILDDATESTAMP_STR: 120725-1247 BUILDLAB_STR: win8_rtm BUILDOSVER_STR: 6.2.9200.16384.amd64fre.win8_rtm.120725-1247 ANALYSIS_SESSION_ELAPSED_TIME: 3d8 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x35_partmgr!pmglobaldispatch FAILURE_ID_HASH: {426ff38a-3e3b-1c22-415b-f1eb0b5c5c93} Followup: MachineOwner --------- Continue reading... Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.