WinDbg dump analysis of Dump caused by avp.exe with fvevol.sys after updating KB4051963
Microsoft (R) Windows Debugger Version 10.0.16299.15 AMD64 | |
Copyright (c) Microsoft Corporation. All rights reserved. | |
Loading Dump File [C:\Users\LaruYan\Desktop\MEMORY.DMP] | |
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available. | |
Symbol search path is: srv* | |
Executable search path is: | |
Windows 10 Kernel Version 16299 MP (4 procs) Free x64 | |
Product: WinNt, suite: TerminalServer SingleUserTS | |
Built by: 16299.15.amd64fre.rs3_release.170928-1534 | |
Machine Name: | |
Kernel base = 0xfffff803`6be02000 PsLoadedModuleList = 0xfffff803`6c164010 | |
Debug session time: Sun Dec 3 19:31:45.516 2017 (UTC + 9:00) | |
System Uptime: 0 days 3:29:05.329 | |
Loading Kernel Symbols | |
............................................................... | |
................................................................ | |
................................................................ | |
......................................................... | |
Loading User Symbols | |
PEB is paged out (Peb.Ldr = 00000000`00e2e018). Type ".hh dbgerr001" for details | |
Loading unloaded module list | |
.............................. | |
******************************************************************************* | |
* * | |
* Bugcheck Analysis * | |
* * | |
******************************************************************************* | |
Use !analyze -v to get detailed debugging information. | |
BugCheck 1E, {ffffffffc0000005, fffff8036c0116b4, 0, 2c} | |
*** ERROR: Module load completed but symbols could not be loaded for klbackupdisk.sys | |
*** ERROR: Module load completed but symbols could not be loaded for klbackupflt.sys | |
*** ERROR: Module load completed but symbols could not be loaded for klif.sys | |
Probably caused by : fvevol.sys ( fvevol!AcquireRequestResources+1c1 ) | |
Followup: MachineOwner | |
--------- | |
2: kd> !analyze -v | |
******************************************************************************* | |
* * | |
* Bugcheck Analysis * | |
* * | |
******************************************************************************* | |
KMODE_EXCEPTION_NOT_HANDLED (1e) | |
This is a very common bugcheck. Usually the exception address pinpoints | |
the driver/function that caused the problem. Always note this address | |
as well as the link date of the driver/image that contains this address. | |
Arguments: | |
Arg1: ffffffffc0000005, The exception code that was not handled | |
Arg2: fffff8036c0116b4, The address that the exception occurred at | |
Arg3: 0000000000000000, Parameter 0 of the exception | |
Arg4: 000000000000002c, Parameter 1 of the exception | |
Debugging Details: | |
------------------ | |
DUMP_CLASS: 1 | |
DUMP_QUALIFIER: 401 | |
BUILD_VERSION_STRING: 16299.15.amd64fre.rs3_release.170928-1534 | |
SYSTEM_MANUFACTURER: Microsoft Corporation | |
SYSTEM_PRODUCT_NAME: Surface Pro 4 | |
SYSTEM_SKU: Surface_Pro_4 | |
SYSTEM_VERSION: D:0B:08F:1C:03P:38 | |
BIOS_VENDOR: Microsoft Corporation | |
BIOS_VERSION: 107.1741.768 | |
BIOS_DATE: 06/13/2017 | |
BASEBOARD_MANUFACTURER: Microsoft Corporation | |
BASEBOARD_PRODUCT: Surface Pro 4 | |
DUMP_TYPE: 1 | |
BUGCHECK_P1: ffffffffc0000005 | |
BUGCHECK_P2: fffff8036c0116b4 | |
BUGCHECK_P3: 0 | |
BUGCHECK_P4: 2c | |
READ_ADDRESS: 000000000000002c | |
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s. | |
FAULTING_IP: | |
nt!MmAreMdlPagesCached+4 | |
fffff803`6c0116b4 8b512c mov edx,dword ptr [rcx+2Ch] | |
EXCEPTION_PARAMETER2: 000000000000002c | |
BUGCHECK_STR: 0x1E_c0000005_R | |
CPU_COUNT: 4 | |
CPU_MHZ: 9c0 | |
CPU_VENDOR: GenuineIntel | |
CPU_FAMILY: 6 | |
CPU_MODEL: 4e | |
CPU_STEPPING: 3 | |
CPU_MICROCODE: 6,4e,3,0 (F,M,S,R) SIG: BA'00000000 (cache) BA'00000000 (init) | |
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT | |
PROCESS_NAME: avp.exe | |
CURRENT_IRQL: 0 | |
ANALYSIS_SESSION_HOST: | |
ANALYSIS_SESSION_TIME: 12-03-2017 19:55:54.0212 | |
ANALYSIS_VERSION: 10.0.16299.15 amd64fre | |
TRAP_FRAME: ffff808dcbc4f508 -- (.trap 0xffff808dcbc4f508) | |
NOTE: The trap frame does not contain all registers. | |
Some register values may be zeroed or incorrect. | |
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000 | |
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 | |
rip=000000000000002c rsp=ffffb10b2d374cb0 rbp=0000000000000000 | |
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000 | |
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 | |
r14=0000000000000000 r15=0000000000000000 | |
iopl=0 vip ov up ei pl zr na pe nc | |
c4a0:002c ?? ??? | |
Resetting default scope | |
BAD_STACK_POINTER: ffffb10b2d374cb0 | |
LAST_CONTROL_TRANSFER: from fffff8036bf800d1 to fffff8036bf660e0 | |
STACK_TEXT: | |
ffff808d`cbc4ed08 fffff803`6bf800d1 : 00000000`0000001e ffffffff`c0000005 fffff803`6c0116b4 00000000`00000000 : nt!KeBugCheckEx | |
ffff808d`cbc4ed10 fffff803`6bf71ace : 00000000`00000000 00000000`0000002c ffff808d`cbc4f508 c0000022`00000000 : nt!KiDispatchException+0x162931 | |
ffff808d`cbc4f3c0 fffff803`6bf6fd57 : 00000001`00000001 00000007`1eb037cf 00000000`00000000 ffffb10b`2c43fc00 : nt!KiExceptionDispatch+0xce | |
ffff808d`cbc4f5a0 fffff803`6c0116b4 : ffffb10b`2d22a180 ffffb10b`2c463960 00000007`1eb037cd ffffb10b`3be2c4a0 : nt!KiPageFault+0x217 | |
ffff808d`cbc4f730 fffff800`8d4f1cd1 : 00000000`00002000 ffffb10b`3bc78100 ffffb10b`3bc781f8 ffffb10b`2d22a180 : nt!MmAreMdlPagesCached+0x4 | |
ffff808d`cbc4f760 fffff800`8d4f17dd : 00000000`00000001 ffffb10b`3be2c4a0 fffff800`8d4dd000 0000003a`cc2b8000 : fvevol!AcquireRequestResources+0x1c1 | |
ffff808d`cbc4f830 fffff800`8d4c5178 : ffffb10b`2d22a100 ffffb10b`3be2c4a0 ffffb10b`2d22a180 fffff803`00000002 : fvevol!FveFilterReadWrite+0x18d | |
ffff808d`cbc4f910 fffff800`8d4c4dd7 : ffffb10b`397f1d00 ffffb10b`31a2f630 ffffb10b`2b2c4820 ffffb10b`3be2c4a0 : fvevol!FveFilterRundownReadWrite+0x388 | |
ffff808d`cbc4f9f0 fffff803`6be3a8d9 : 00000000`00000000 fffff800`8ecd3862 00000000`00060101 ffff808d`cbc4fbe0 : fvevol!FveFilterRundownRead+0x27 | |
ffff808d`cbc4fa20 fffff800`8d5f1217 : 00000000`00000000 fffff800`8ecd3dd6 00000000`00000003 ffffb10b`2e36e680 : nt!IofCallDriver+0x59 | |
ffff808d`cbc4fa60 fffff800`8d5f108e : ffff808d`cbc4fc80 ffff808d`cbc4fca0 ffff808d`00002000 ffffb10b`2d363b00 : rdyboost!SmdProcessReadWrite+0x147 | |
ffff808d`cbc4fb30 fffff803`6be3a8d9 : ffffb10b`3be2c4a0 00000000`00000000 ffffb10b`2d35fb10 00000000`00000000 : rdyboost!SmdDispatchReadWrite+0x7e | |
ffff808d`cbc4fb60 fffff800`8ecd4039 : 00000000`00000000 ffffb10b`2d35fb10 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x59 | |
ffff808d`cbc4fba0 fffff800`8ecd5236 : 00000000`00000002 ffff808d`cbc4fce0 ffffb10b`3be2c4a0 ffff808d`cbc4fc80 : iorate!IoRateIssueAndRecordIo+0x79 | |
ffff808d`cbc4fbe0 fffff800`8ecd247f : fffff800`00000001 ffff808d`00000080 ffff808d`c7559350 ffff808d`c7559301 : iorate!IoRateProcessIrp+0x186 | |
ffff808d`cbc4fd30 fffff803`6be3a8d9 : ffffb10b`3e4538d0 fffff800`8cdf2699 ffffb101`00000000 ffffb10b`2cb20318 : iorate!memset+0x13f | |
ffff808d`cbc4fd70 fffff800`8d57102d : ffffb10b`2d375180 ffff0000`00000008 00000000`00000000 ffff808d`c7559360 : nt!IofCallDriver+0x59 | |
ffff808d`cbc4fdb0 fffff803`6be3a8d9 : ffffa00f`9847ff8e 00000aaf`00000000 00000000`00000000 00000000`00000004 : volume!VolumePassThrough+0x1d | |
ffff808d`cbc4fde0 fffff800`8cdf61dd : ffffb10b`2d285190 ffff808d`c7558a00 ffffb10b`2c49aef0 ffff808d`cbc4fe50 : nt!IofCallDriver+0x59 | |
ffff808d`cbc4fe20 fffff803`6be3a8d9 : ffffb10b`2c49ada0 ffffb10b`3be2c4a0 ffffb10b`2d285190 00000000`00000000 : klbackupdisk+0x61dd | |
ffff808d`cbc4fe70 fffff800`8d585b7c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x59 | |
ffff808d`cbc4feb0 fffff800`8d5814f9 : ffff808d`c7558b70 00000000`00000000 00000000`00000000 00000000`00000004 : volsnap!memset+0x15bc | |
ffff808d`cbc4fee0 fffff803`6be3a8d9 : 00000000`00000000 ffff31ee`7a8956c6 00000000`00000000 00000000`00000004 : volsnap!VolSnapRead+0x19 | |
ffff808d`cbc4ff10 fffff800`8cf36886 : ffffb10b`2cb20318 ffffb10b`3d27eb40 ffff808d`ccac7390 ffffb10b`397e8080 : nt!IofCallDriver+0x59 | |
ffff808d`cbc4ff50 fffff803`6bf69017 : ffff808d`ccac7390 00000000`00000000 000000ec`2cfffb68 00000000`fffffdc0 : NTFS!NtfsStorageDriverCallout+0x16 | |
ffff808d`cbc4ff80 fffff803`6bf68fdd : 00000000`00000012 ffffb10b`2e36e680 ffff808d`cbc50000 fffff803`6beb1d8d : nt!KxSwitchKernelStackCallout+0x27 | |
ffff808d`c75589d0 fffff803`6beb1d8d : 00000000`00000000 00000000`00000005 ffffb10b`2ceb5060 00000000`00000000 : nt!KiSwitchKernelStackContinue | |
ffff808d`c75589f0 fffff803`6beb1b3a : fffff800`8cf36870 ffff808d`c7558b70 00000000`00000000 00000000`00000005 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x11d | |
ffff808d`c7558a60 fffff803`6beb19df : ffff808d`c7558cf0 ffff808d`c7558b70 00000000`00002000 ffffb10b`3be2c888 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xba | |
ffff808d`c7558ab0 fffff803`6beb199d : ffffb10b`3be2c888 ffffb10b`2d375180 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x2f | |
ffff808d`c7558b00 fffff800`8cf13b9c : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`8ed23acb : nt!KeExpandKernelStackAndCalloutEx+0x1d | |
ffff808d`c7558b40 fffff800`8cf3b05b : ffff808d`c7558d50 ffffb10b`3e27a860 ffff808d`c7558c40 ffff808d`c7558c20 : NTFS!NtfsCallStorageDriver+0x44 | |
ffff808d`c7558bb0 fffff800`8cf45b55 : ffffb10b`00000003 ffffb10b`3be2c888 00000000`02ed0000 00000000`00000000 : NTFS!NtfsPagingFileIo+0x2e3 | |
ffff808d`c7558cc0 fffff803`6be3a8d9 : ffffb10b`3e27a780 ffffb10b`3be2c4a0 00000000`00000000 ffffb10b`3be2c8d0 : NTFS!NtfsFsdRead+0x23375 | |
ffff808d`c7558d80 fffff800`8c208773 : ffffb10b`2d998c88 ffffb10b`3a96e000 00000000`00000000 ffffb10b`3e27a860 : nt!IofCallDriver+0x59 | |
ffff808d`c7558dc0 fffff800`8c205d4a : ffff808d`c7558e58 ffff808d`c7558e79 00000000`00000000 ffffb10b`2d3f77e0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x1a3 | |
ffff808d`c7558e30 fffff800`8c20340f : ffffb10b`3e27a780 00000000`02ed0000 00000000`00000000 ffffb10b`3a96e000 : FLTMGR!FltPerformSynchronousIo+0x30a | |
ffff808d`c7558ee0 fffff800`8c203281 : ffffa00f`8fb3fc90 00000000`00000001 00000000`00000fff 00000000`00001001 : FLTMGR!FltReadFileEx+0x17f | |
ffff808d`c7558fd0 fffff800`8df7410e : ffffb10b`2debc870 00000000`00000004 ffff808d`c75591d0 ffff808d`c7559130 : FLTMGR!FltReadFile+0x51 | |
ffff808d`c7559040 fffff800`8df77ce9 : ffffb10b`2d998c80 ffffa00f`78c96830 ffff808d`c7559470 ffffb10b`2d8bed60 : klbackupflt+0x410e | |
ffff808d`c75590c0 fffff800`8df7965f : ffffb10b`2debc8d0 ffff808d`c75591d0 ffff808d`c75591b0 00000000`00000000 : klbackupflt+0x7ce9 | |
ffff808d`c7559110 fffff800`8c207852 : ffffb10b`2debc8d0 ffff808d`c75591d0 ffff808d`c75591b0 ffffb10b`2debc7f0 : klbackupflt+0x965f | |
ffff808d`c7559140 fffff800`8c2073f8 : ffff808d`c7559330 ffff808d`c7559600 ffffb10b`3ba6a00d 00000000`00000000 : FLTMGR!FltpPerformPreCallbacks+0x2e2 | |
ffff808d`c7559260 fffff800`8c206ffb : 00000000`00000000 ffff808d`c7559330 ffffb10b`3ba6a010 ffff808d`c7559340 : FLTMGR!FltpPassThroughInternal+0x88 | |
ffff808d`c7559290 fffff800`8c23a3ab : 00000000`00000000 fffff803`00000200 00000000`00000000 00000000`00000000 : FLTMGR!FltpPassThrough+0x1ab | |
ffff808d`c7559310 fffff803`6be3a8d9 : 00000000`00002001 ffffb10b`2c5f78b0 00000000`00000000 00000000`00000004 : FLTMGR!FltpFsControl+0xcb | |
ffff808d`c7559370 fffff800`8cdf649e : ffffb10b`2c49aef0 00000000`00002000 ffffb10b`397f1d10 00000000`00000000 : nt!IofCallDriver+0x59 | |
ffff808d`c75593b0 fffff800`8cdf203f : ffffb10b`2c49aef0 ffffb10b`8320005f ffff808d`c7559470 00000000`00000020 : klbackupdisk+0x649e | |
ffff808d`c7559440 fffff800`8cdf1b14 : ffffb10b`2c46bde0 00000000`00001767 ffffb10b`3a96e000 00000000`00002000 : klbackupdisk+0x203f | |
ffff808d`c75594a0 fffff800`8cdf5620 : ffffb10b`2c46bde0 00000000`00001767 ffffb10b`3a96e000 00000000`00002000 : klbackupdisk+0x1b14 | |
ffff808d`c75594d0 fffff800`8cdf3e92 : ffffb10b`2c499870 00000000`00000049 00000000`000a313c ffffb10b`3a96e000 : klbackupdisk+0x5620 | |
ffff808d`c7559680 fffff800`8cdf2d06 : ffffb10b`2d3b2000 ffffa00f`847864c8 ffffa00f`88ecf520 00000000`00000200 : klbackupdisk+0x3e92 | |
ffff808d`c7559750 fffff800`8cdf5cb0 : ffffb10b`2c49ada0 ffffb10b`3b4f39b0 ffffb10b`3b4f39b0 ffff808d`c75598c9 : klbackupdisk+0x2d06 | |
ffff808d`c75597b0 fffff803`6be3a8d9 : ffffb10b`2c49ada0 ffffb10b`3b4f39b0 ffffb10b`3b4f39b0 fffff803`6beb199d : klbackupdisk+0x5cb0 | |
ffff808d`c7559820 fffff800`8d59a830 : ffffb10b`2d285040 00000000`83100053 ffff808d`c7559ab0 fffff803`6be3a917 : nt!IofCallDriver+0x59 | |
ffff808d`c7559860 fffff803`6be3a8d9 : ffffa00f`88ecf520 fffff803`00000200 ffffb10b`2d285040 ffff808d`c75599f8 : volsnap!VolSnapDeviceControl+0xd0 | |
ffff808d`c7559930 fffff800`8df73382 : 00000000`83100053 ffff808d`c7559a88 ffffa00f`00000020 ffff808d`c75599c8 : nt!IofCallDriver+0x59 | |
ffff808d`c7559970 fffff800`8df73bdf : ffffb10b`2d998c80 00000000`83100053 ffff808d`c7559a88 ffff8d01`00000020 : klbackupflt+0x3382 | |
ffff808d`c7559a40 fffff800`8df72679 : ffffb10b`00000200 ffffb10b`2d998c80 ffffb10b`2d9fd5c0 00000000`00000001 : klbackupflt+0x3bdf | |
ffff808d`c7559af0 fffff800`8df77e25 : ffffb10b`2d8ecba0 ffffb10b`2d998c80 ffffb10b`2d9fd5c0 00020000`000430f6 : klbackupflt+0x2679 | |
ffff808d`c7559c20 fffff800`8df7978e : ffffb10b`3e1a6a40 ffff808d`c7559d90 ffff808d`c7559d70 ffffb10b`3e1a6960 : klbackupflt+0x7e25 | |
ffff808d`c7559cd0 fffff800`8c207852 : ffffb10b`3e1a6a40 ffff808d`c7559d90 ffff808d`c7559d70 ffffb10b`3e1a6960 : klbackupflt+0x978e | |
ffff808d`c7559d00 fffff800`8c2073f8 : ffff808d`c7559e78 ffffb10b`2d3f7800 ffffb10b`3e1a690d ffffb10b`2d3f7800 : FLTMGR!FltpPerformPreCallbacks+0x2e2 | |
ffff808d`c7559e20 fffff800`8c205d36 : ffffb10b`3e1a6a40 ffff808d`c7559e99 00000000`00000000 ffffb10b`2d3f77e0 : FLTMGR!FltpPassThroughInternal+0x88 | |
ffff808d`c7559e50 fffff800`8c2371bb : ffffb10b`3e1a6960 ffffb10b`3e1a6a40 00000000`00000000 ffffb10b`35e74500 : FLTMGR!FltPerformSynchronousIo+0x2f6 | |
ffff808d`c7559f00 fffff800`8c2370b5 : ffffa00f`981bf090 ffff808d`c755a168 00000000`00000000 00000000`00000000 : FLTMGR!IssueControlOperation+0xfb | |
ffff808d`c7559f80 fffff800`8e017db5 : ffffb10b`2d9fdb10 ffffa00f`78fc4720 ffff808d`c755a020 00000000`00000000 : FLTMGR!FltFsControlFile+0x45 | |
ffff808d`c7559fe0 fffff800`8e016f9d : ffffb10b`2d9fdb10 ffffa00f`78fc4720 ffffb10b`83200077 ffffa00f`981bf090 : klif+0x7db5 | |
ffff808d`c755a040 fffff800`8e016ea2 : ffffb10b`2d9fdb10 ffffa00f`78fc4720 ffff808d`c755a0f0 ffff808d`c755a168 : klif+0x6f9d | |
ffff808d`c755a0a0 fffff800`8e01971f : ffffb10b`2e1481f0 ffff808d`c755a168 00000000`00000000 ffffb10b`00000040 : klif+0x6ea2 | |
ffff808d`c755a130 fffff800`8e024ce1 : ffffb10b`35e74540 00000000`27a2cb30 00000000`00000048 00000000`158ff7a0 : klif+0x971f | |
ffff808d`c755a1c0 fffff800`8e0d4f29 : ffffb10b`31ac7b90 ffffb10b`31bfee00 00000000`27a2cb30 00000000`00000048 : klif+0x14ce1 | |
ffff808d`c755a520 fffff800`8e105181 : ffffb10b`31ac7b90 ffffb10b`31bfee00 00000000`27a2cb30 00000000`00000048 : klif+0xc4f29 | |
ffff808d`c755a570 fffff800`8c20be56 : ffffb10b`31ac7b90 00000000`27a2cb30 ffffb10b`00000048 00000000`158ff7a0 : klif+0xf5181 | |
ffff808d`c755a5d0 fffff800`8c23a2af : ffffb10b`39797a00 00000000`158ff7a0 ffffb10b`39797930 00000000`00000000 : FLTMGR!FltpFilterMessage+0xca | |
ffff808d`c755a630 fffff800`8c206de9 : ffffb10b`2cebee40 00000000`00000002 00000000`00000000 ffffb10b`39797930 : FLTMGR!FltpMsgDispatch+0x15f | |
ffff808d`c755a6a0 fffff803`6be3a8d9 : ffffb10b`39797930 fffff803`6c308020 00000000`00000000 00000000`00000000 : FLTMGR!FltpDispatch+0xe9 | |
ffff808d`c755a700 fffff803`6c2cf55e : ffffb10b`39797930 ffff808d`c755aa80 00000000`00000000 00000000`00000001 : nt!IofCallDriver+0x59 | |
ffff808d`c755a740 fffff803`6c2ced9c : 00000000`00000000 ffffb10b`31bca8f0 00000000`00000000 ffff808d`c755aa80 : nt!IopSynchronousServiceTail+0x19e | |
ffff808d`c755a7f0 fffff803`6c2ce716 : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x66c | |
ffff808d`c755a920 fffff803`6bf71553 : ffffb10b`2e36e680 00000000`157fe578 ffff808d`c755a9a8 fffff803`6c2ed500 : nt!NtDeviceIoControlFile+0x56 | |
ffff808d`c755a990 00000000`59ef1e5c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 | |
00000000`157fee88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x59ef1e5c | |
THREAD_SHA1_HASH_MOD_FUNC: cc3de3f5e11a9509d763859dae785282dd722efd | |
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 4cb5da71bb7d70286700b8ff2ee10768a0ead745 | |
THREAD_SHA1_HASH_MOD: b9244340ccd8db674994429a81face5be4b023df | |
FOLLOWUP_IP: | |
fvevol!AcquireRequestResources+1c1 | |
fffff800`8d4f1cd1 85c0 test eax,eax | |
FAULT_INSTR_CODE: 840fc085 | |
SYMBOL_STACK_INDEX: 5 | |
SYMBOL_NAME: fvevol!AcquireRequestResources+1c1 | |
FOLLOWUP_NAME: MachineOwner | |
MODULE_NAME: fvevol | |
IMAGE_NAME: fvevol.sys | |
DEBUG_FLR_IMAGE_TIMESTAMP: 2493bbe7 | |
STACK_COMMAND: .thread ; .cxr ; kb | |
BUCKET_ID_FUNC_OFFSET: 1c1 | |
FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_fvevol!AcquireRequestResources | |
BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_fvevol!AcquireRequestResources | |
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_STACKPTR_ERROR_fvevol!AcquireRequestResources | |
TARGET_TIME: 2017-12-03T10:31:45.000Z | |
OSBUILD: 16299 | |
OSSERVICEPACK: 0 | |
SERVICEPACK_NUMBER: 0 | |
OS_REVISION: 0 | |
SUITE_MASK: 272 | |
PRODUCT_TYPE: 1 | |
OSPLATFORM_TYPE: x64 | |
OSNAME: Windows 10 | |
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS | |
OS_LOCALE: | |
USER_LCID: 0 | |
OSBUILD_TIMESTAMP: 2017-11-26 20:49:20 | |
BUILDDATESTAMP_STR: 170928-1534 | |
BUILDLAB_STR: rs3_release | |
BUILDOSVER_STR: 10.0.16299.15.amd64fre.rs3_release.170928-1534 | |
ANALYSIS_SESSION_ELAPSED_TIME: f9e | |
ANALYSIS_SOURCE: KM | |
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_stackptr_error_fvevol!acquirerequestresources | |
FAILURE_ID_HASH: {285f5ef0-9a75-90fc-a276-8ffcd076b044} | |
Followup: MachineOwner | |
--------- | |
2: kd> lmvm fvevol | |
Browse full module list | |
start end module name | |
fffff800`8d4b0000 fffff800`8d568000 fvevol (pdb symbols) C:\ProgramData\dbg\sym\fvevol.pdb\1EB883BD76F97C3CD3DA9549EFD915E81\fvevol.pdb | |
Loaded symbol image file: fvevol.sys | |
Image path: \SystemRoot\System32\DRIVERS\fvevol.sys | |
Image name: fvevol.sys | |
Browse all global symbols functions data | |
Image was built with /Brepro flag. | |
Timestamp: 2493BBE7 (This is a reproducible build file hash, not a timestamp) | |
CheckSum: 000B717D | |
ImageSize: 000B8000 | |
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment