Skip to content

Instantly share code, notes, and snippets.

Embed
What would you like to do?
WinDbg dump analysis of Dump caused by avp.exe with fvevol.sys after updating KB4051963
Microsoft (R) Windows Debugger Version 10.0.16299.15 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\LaruYan\Desktop\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 16299 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 16299.15.amd64fre.rs3_release.170928-1534
Machine Name:
Kernel base = 0xfffff803`6be02000 PsLoadedModuleList = 0xfffff803`6c164010
Debug session time: Sun Dec 3 19:31:45.516 2017 (UTC + 9:00)
System Uptime: 0 days 3:29:05.329
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`00e2e018). Type ".hh dbgerr001" for details
Loading unloaded module list
..............................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff8036c0116b4, 0, 2c}
*** ERROR: Module load completed but symbols could not be loaded for klbackupdisk.sys
*** ERROR: Module load completed but symbols could not be loaded for klbackupflt.sys
*** ERROR: Module load completed but symbols could not be loaded for klif.sys
Probably caused by : fvevol.sys ( fvevol!AcquireRequestResources+1c1 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8036c0116b4, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 000000000000002c, Parameter 1 of the exception
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 16299.15.amd64fre.rs3_release.170928-1534
SYSTEM_MANUFACTURER: Microsoft Corporation
SYSTEM_PRODUCT_NAME: Surface Pro 4
SYSTEM_SKU: Surface_Pro_4
SYSTEM_VERSION: D:0B:08F:1C:03P:38
BIOS_VENDOR: Microsoft Corporation
BIOS_VERSION: 107.1741.768
BIOS_DATE: 06/13/2017
BASEBOARD_MANUFACTURER: Microsoft Corporation
BASEBOARD_PRODUCT: Surface Pro 4
DUMP_TYPE: 1
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8036c0116b4
BUGCHECK_P3: 0
BUGCHECK_P4: 2c
READ_ADDRESS: 000000000000002c
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
FAULTING_IP:
nt!MmAreMdlPagesCached+4
fffff803`6c0116b4 8b512c mov edx,dword ptr [rcx+2Ch]
EXCEPTION_PARAMETER2: 000000000000002c
BUGCHECK_STR: 0x1E_c0000005_R
CPU_COUNT: 4
CPU_MHZ: 9c0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 4e
CPU_STEPPING: 3
CPU_MICROCODE: 6,4e,3,0 (F,M,S,R) SIG: BA'00000000 (cache) BA'00000000 (init)
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: avp.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST:
ANALYSIS_SESSION_TIME: 12-03-2017 19:55:54.0212
ANALYSIS_VERSION: 10.0.16299.15 amd64fre
TRAP_FRAME: ffff808dcbc4f508 -- (.trap 0xffff808dcbc4f508)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=000000000000002c rsp=ffffb10b2d374cb0 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 vip ov up ei pl zr na pe nc
c4a0:002c ?? ???
Resetting default scope
BAD_STACK_POINTER: ffffb10b2d374cb0
LAST_CONTROL_TRANSFER: from fffff8036bf800d1 to fffff8036bf660e0
STACK_TEXT:
ffff808d`cbc4ed08 fffff803`6bf800d1 : 00000000`0000001e ffffffff`c0000005 fffff803`6c0116b4 00000000`00000000 : nt!KeBugCheckEx
ffff808d`cbc4ed10 fffff803`6bf71ace : 00000000`00000000 00000000`0000002c ffff808d`cbc4f508 c0000022`00000000 : nt!KiDispatchException+0x162931
ffff808d`cbc4f3c0 fffff803`6bf6fd57 : 00000001`00000001 00000007`1eb037cf 00000000`00000000 ffffb10b`2c43fc00 : nt!KiExceptionDispatch+0xce
ffff808d`cbc4f5a0 fffff803`6c0116b4 : ffffb10b`2d22a180 ffffb10b`2c463960 00000007`1eb037cd ffffb10b`3be2c4a0 : nt!KiPageFault+0x217
ffff808d`cbc4f730 fffff800`8d4f1cd1 : 00000000`00002000 ffffb10b`3bc78100 ffffb10b`3bc781f8 ffffb10b`2d22a180 : nt!MmAreMdlPagesCached+0x4
ffff808d`cbc4f760 fffff800`8d4f17dd : 00000000`00000001 ffffb10b`3be2c4a0 fffff800`8d4dd000 0000003a`cc2b8000 : fvevol!AcquireRequestResources+0x1c1
ffff808d`cbc4f830 fffff800`8d4c5178 : ffffb10b`2d22a100 ffffb10b`3be2c4a0 ffffb10b`2d22a180 fffff803`00000002 : fvevol!FveFilterReadWrite+0x18d
ffff808d`cbc4f910 fffff800`8d4c4dd7 : ffffb10b`397f1d00 ffffb10b`31a2f630 ffffb10b`2b2c4820 ffffb10b`3be2c4a0 : fvevol!FveFilterRundownReadWrite+0x388
ffff808d`cbc4f9f0 fffff803`6be3a8d9 : 00000000`00000000 fffff800`8ecd3862 00000000`00060101 ffff808d`cbc4fbe0 : fvevol!FveFilterRundownRead+0x27
ffff808d`cbc4fa20 fffff800`8d5f1217 : 00000000`00000000 fffff800`8ecd3dd6 00000000`00000003 ffffb10b`2e36e680 : nt!IofCallDriver+0x59
ffff808d`cbc4fa60 fffff800`8d5f108e : ffff808d`cbc4fc80 ffff808d`cbc4fca0 ffff808d`00002000 ffffb10b`2d363b00 : rdyboost!SmdProcessReadWrite+0x147
ffff808d`cbc4fb30 fffff803`6be3a8d9 : ffffb10b`3be2c4a0 00000000`00000000 ffffb10b`2d35fb10 00000000`00000000 : rdyboost!SmdDispatchReadWrite+0x7e
ffff808d`cbc4fb60 fffff800`8ecd4039 : 00000000`00000000 ffffb10b`2d35fb10 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x59
ffff808d`cbc4fba0 fffff800`8ecd5236 : 00000000`00000002 ffff808d`cbc4fce0 ffffb10b`3be2c4a0 ffff808d`cbc4fc80 : iorate!IoRateIssueAndRecordIo+0x79
ffff808d`cbc4fbe0 fffff800`8ecd247f : fffff800`00000001 ffff808d`00000080 ffff808d`c7559350 ffff808d`c7559301 : iorate!IoRateProcessIrp+0x186
ffff808d`cbc4fd30 fffff803`6be3a8d9 : ffffb10b`3e4538d0 fffff800`8cdf2699 ffffb101`00000000 ffffb10b`2cb20318 : iorate!memset+0x13f
ffff808d`cbc4fd70 fffff800`8d57102d : ffffb10b`2d375180 ffff0000`00000008 00000000`00000000 ffff808d`c7559360 : nt!IofCallDriver+0x59
ffff808d`cbc4fdb0 fffff803`6be3a8d9 : ffffa00f`9847ff8e 00000aaf`00000000 00000000`00000000 00000000`00000004 : volume!VolumePassThrough+0x1d
ffff808d`cbc4fde0 fffff800`8cdf61dd : ffffb10b`2d285190 ffff808d`c7558a00 ffffb10b`2c49aef0 ffff808d`cbc4fe50 : nt!IofCallDriver+0x59
ffff808d`cbc4fe20 fffff803`6be3a8d9 : ffffb10b`2c49ada0 ffffb10b`3be2c4a0 ffffb10b`2d285190 00000000`00000000 : klbackupdisk+0x61dd
ffff808d`cbc4fe70 fffff800`8d585b7c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x59
ffff808d`cbc4feb0 fffff800`8d5814f9 : ffff808d`c7558b70 00000000`00000000 00000000`00000000 00000000`00000004 : volsnap!memset+0x15bc
ffff808d`cbc4fee0 fffff803`6be3a8d9 : 00000000`00000000 ffff31ee`7a8956c6 00000000`00000000 00000000`00000004 : volsnap!VolSnapRead+0x19
ffff808d`cbc4ff10 fffff800`8cf36886 : ffffb10b`2cb20318 ffffb10b`3d27eb40 ffff808d`ccac7390 ffffb10b`397e8080 : nt!IofCallDriver+0x59
ffff808d`cbc4ff50 fffff803`6bf69017 : ffff808d`ccac7390 00000000`00000000 000000ec`2cfffb68 00000000`fffffdc0 : NTFS!NtfsStorageDriverCallout+0x16
ffff808d`cbc4ff80 fffff803`6bf68fdd : 00000000`00000012 ffffb10b`2e36e680 ffff808d`cbc50000 fffff803`6beb1d8d : nt!KxSwitchKernelStackCallout+0x27
ffff808d`c75589d0 fffff803`6beb1d8d : 00000000`00000000 00000000`00000005 ffffb10b`2ceb5060 00000000`00000000 : nt!KiSwitchKernelStackContinue
ffff808d`c75589f0 fffff803`6beb1b3a : fffff800`8cf36870 ffff808d`c7558b70 00000000`00000000 00000000`00000005 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x11d
ffff808d`c7558a60 fffff803`6beb19df : ffff808d`c7558cf0 ffff808d`c7558b70 00000000`00002000 ffffb10b`3be2c888 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xba
ffff808d`c7558ab0 fffff803`6beb199d : ffffb10b`3be2c888 ffffb10b`2d375180 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x2f
ffff808d`c7558b00 fffff800`8cf13b9c : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`8ed23acb : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffff808d`c7558b40 fffff800`8cf3b05b : ffff808d`c7558d50 ffffb10b`3e27a860 ffff808d`c7558c40 ffff808d`c7558c20 : NTFS!NtfsCallStorageDriver+0x44
ffff808d`c7558bb0 fffff800`8cf45b55 : ffffb10b`00000003 ffffb10b`3be2c888 00000000`02ed0000 00000000`00000000 : NTFS!NtfsPagingFileIo+0x2e3
ffff808d`c7558cc0 fffff803`6be3a8d9 : ffffb10b`3e27a780 ffffb10b`3be2c4a0 00000000`00000000 ffffb10b`3be2c8d0 : NTFS!NtfsFsdRead+0x23375
ffff808d`c7558d80 fffff800`8c208773 : ffffb10b`2d998c88 ffffb10b`3a96e000 00000000`00000000 ffffb10b`3e27a860 : nt!IofCallDriver+0x59
ffff808d`c7558dc0 fffff800`8c205d4a : ffff808d`c7558e58 ffff808d`c7558e79 00000000`00000000 ffffb10b`2d3f77e0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x1a3
ffff808d`c7558e30 fffff800`8c20340f : ffffb10b`3e27a780 00000000`02ed0000 00000000`00000000 ffffb10b`3a96e000 : FLTMGR!FltPerformSynchronousIo+0x30a
ffff808d`c7558ee0 fffff800`8c203281 : ffffa00f`8fb3fc90 00000000`00000001 00000000`00000fff 00000000`00001001 : FLTMGR!FltReadFileEx+0x17f
ffff808d`c7558fd0 fffff800`8df7410e : ffffb10b`2debc870 00000000`00000004 ffff808d`c75591d0 ffff808d`c7559130 : FLTMGR!FltReadFile+0x51
ffff808d`c7559040 fffff800`8df77ce9 : ffffb10b`2d998c80 ffffa00f`78c96830 ffff808d`c7559470 ffffb10b`2d8bed60 : klbackupflt+0x410e
ffff808d`c75590c0 fffff800`8df7965f : ffffb10b`2debc8d0 ffff808d`c75591d0 ffff808d`c75591b0 00000000`00000000 : klbackupflt+0x7ce9
ffff808d`c7559110 fffff800`8c207852 : ffffb10b`2debc8d0 ffff808d`c75591d0 ffff808d`c75591b0 ffffb10b`2debc7f0 : klbackupflt+0x965f
ffff808d`c7559140 fffff800`8c2073f8 : ffff808d`c7559330 ffff808d`c7559600 ffffb10b`3ba6a00d 00000000`00000000 : FLTMGR!FltpPerformPreCallbacks+0x2e2
ffff808d`c7559260 fffff800`8c206ffb : 00000000`00000000 ffff808d`c7559330 ffffb10b`3ba6a010 ffff808d`c7559340 : FLTMGR!FltpPassThroughInternal+0x88
ffff808d`c7559290 fffff800`8c23a3ab : 00000000`00000000 fffff803`00000200 00000000`00000000 00000000`00000000 : FLTMGR!FltpPassThrough+0x1ab
ffff808d`c7559310 fffff803`6be3a8d9 : 00000000`00002001 ffffb10b`2c5f78b0 00000000`00000000 00000000`00000004 : FLTMGR!FltpFsControl+0xcb
ffff808d`c7559370 fffff800`8cdf649e : ffffb10b`2c49aef0 00000000`00002000 ffffb10b`397f1d10 00000000`00000000 : nt!IofCallDriver+0x59
ffff808d`c75593b0 fffff800`8cdf203f : ffffb10b`2c49aef0 ffffb10b`8320005f ffff808d`c7559470 00000000`00000020 : klbackupdisk+0x649e
ffff808d`c7559440 fffff800`8cdf1b14 : ffffb10b`2c46bde0 00000000`00001767 ffffb10b`3a96e000 00000000`00002000 : klbackupdisk+0x203f
ffff808d`c75594a0 fffff800`8cdf5620 : ffffb10b`2c46bde0 00000000`00001767 ffffb10b`3a96e000 00000000`00002000 : klbackupdisk+0x1b14
ffff808d`c75594d0 fffff800`8cdf3e92 : ffffb10b`2c499870 00000000`00000049 00000000`000a313c ffffb10b`3a96e000 : klbackupdisk+0x5620
ffff808d`c7559680 fffff800`8cdf2d06 : ffffb10b`2d3b2000 ffffa00f`847864c8 ffffa00f`88ecf520 00000000`00000200 : klbackupdisk+0x3e92
ffff808d`c7559750 fffff800`8cdf5cb0 : ffffb10b`2c49ada0 ffffb10b`3b4f39b0 ffffb10b`3b4f39b0 ffff808d`c75598c9 : klbackupdisk+0x2d06
ffff808d`c75597b0 fffff803`6be3a8d9 : ffffb10b`2c49ada0 ffffb10b`3b4f39b0 ffffb10b`3b4f39b0 fffff803`6beb199d : klbackupdisk+0x5cb0
ffff808d`c7559820 fffff800`8d59a830 : ffffb10b`2d285040 00000000`83100053 ffff808d`c7559ab0 fffff803`6be3a917 : nt!IofCallDriver+0x59
ffff808d`c7559860 fffff803`6be3a8d9 : ffffa00f`88ecf520 fffff803`00000200 ffffb10b`2d285040 ffff808d`c75599f8 : volsnap!VolSnapDeviceControl+0xd0
ffff808d`c7559930 fffff800`8df73382 : 00000000`83100053 ffff808d`c7559a88 ffffa00f`00000020 ffff808d`c75599c8 : nt!IofCallDriver+0x59
ffff808d`c7559970 fffff800`8df73bdf : ffffb10b`2d998c80 00000000`83100053 ffff808d`c7559a88 ffff8d01`00000020 : klbackupflt+0x3382
ffff808d`c7559a40 fffff800`8df72679 : ffffb10b`00000200 ffffb10b`2d998c80 ffffb10b`2d9fd5c0 00000000`00000001 : klbackupflt+0x3bdf
ffff808d`c7559af0 fffff800`8df77e25 : ffffb10b`2d8ecba0 ffffb10b`2d998c80 ffffb10b`2d9fd5c0 00020000`000430f6 : klbackupflt+0x2679
ffff808d`c7559c20 fffff800`8df7978e : ffffb10b`3e1a6a40 ffff808d`c7559d90 ffff808d`c7559d70 ffffb10b`3e1a6960 : klbackupflt+0x7e25
ffff808d`c7559cd0 fffff800`8c207852 : ffffb10b`3e1a6a40 ffff808d`c7559d90 ffff808d`c7559d70 ffffb10b`3e1a6960 : klbackupflt+0x978e
ffff808d`c7559d00 fffff800`8c2073f8 : ffff808d`c7559e78 ffffb10b`2d3f7800 ffffb10b`3e1a690d ffffb10b`2d3f7800 : FLTMGR!FltpPerformPreCallbacks+0x2e2
ffff808d`c7559e20 fffff800`8c205d36 : ffffb10b`3e1a6a40 ffff808d`c7559e99 00000000`00000000 ffffb10b`2d3f77e0 : FLTMGR!FltpPassThroughInternal+0x88
ffff808d`c7559e50 fffff800`8c2371bb : ffffb10b`3e1a6960 ffffb10b`3e1a6a40 00000000`00000000 ffffb10b`35e74500 : FLTMGR!FltPerformSynchronousIo+0x2f6
ffff808d`c7559f00 fffff800`8c2370b5 : ffffa00f`981bf090 ffff808d`c755a168 00000000`00000000 00000000`00000000 : FLTMGR!IssueControlOperation+0xfb
ffff808d`c7559f80 fffff800`8e017db5 : ffffb10b`2d9fdb10 ffffa00f`78fc4720 ffff808d`c755a020 00000000`00000000 : FLTMGR!FltFsControlFile+0x45
ffff808d`c7559fe0 fffff800`8e016f9d : ffffb10b`2d9fdb10 ffffa00f`78fc4720 ffffb10b`83200077 ffffa00f`981bf090 : klif+0x7db5
ffff808d`c755a040 fffff800`8e016ea2 : ffffb10b`2d9fdb10 ffffa00f`78fc4720 ffff808d`c755a0f0 ffff808d`c755a168 : klif+0x6f9d
ffff808d`c755a0a0 fffff800`8e01971f : ffffb10b`2e1481f0 ffff808d`c755a168 00000000`00000000 ffffb10b`00000040 : klif+0x6ea2
ffff808d`c755a130 fffff800`8e024ce1 : ffffb10b`35e74540 00000000`27a2cb30 00000000`00000048 00000000`158ff7a0 : klif+0x971f
ffff808d`c755a1c0 fffff800`8e0d4f29 : ffffb10b`31ac7b90 ffffb10b`31bfee00 00000000`27a2cb30 00000000`00000048 : klif+0x14ce1
ffff808d`c755a520 fffff800`8e105181 : ffffb10b`31ac7b90 ffffb10b`31bfee00 00000000`27a2cb30 00000000`00000048 : klif+0xc4f29
ffff808d`c755a570 fffff800`8c20be56 : ffffb10b`31ac7b90 00000000`27a2cb30 ffffb10b`00000048 00000000`158ff7a0 : klif+0xf5181
ffff808d`c755a5d0 fffff800`8c23a2af : ffffb10b`39797a00 00000000`158ff7a0 ffffb10b`39797930 00000000`00000000 : FLTMGR!FltpFilterMessage+0xca
ffff808d`c755a630 fffff800`8c206de9 : ffffb10b`2cebee40 00000000`00000002 00000000`00000000 ffffb10b`39797930 : FLTMGR!FltpMsgDispatch+0x15f
ffff808d`c755a6a0 fffff803`6be3a8d9 : ffffb10b`39797930 fffff803`6c308020 00000000`00000000 00000000`00000000 : FLTMGR!FltpDispatch+0xe9
ffff808d`c755a700 fffff803`6c2cf55e : ffffb10b`39797930 ffff808d`c755aa80 00000000`00000000 00000000`00000001 : nt!IofCallDriver+0x59
ffff808d`c755a740 fffff803`6c2ced9c : 00000000`00000000 ffffb10b`31bca8f0 00000000`00000000 ffff808d`c755aa80 : nt!IopSynchronousServiceTail+0x19e
ffff808d`c755a7f0 fffff803`6c2ce716 : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x66c
ffff808d`c755a920 fffff803`6bf71553 : ffffb10b`2e36e680 00000000`157fe578 ffff808d`c755a9a8 fffff803`6c2ed500 : nt!NtDeviceIoControlFile+0x56
ffff808d`c755a990 00000000`59ef1e5c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`157fee88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x59ef1e5c
THREAD_SHA1_HASH_MOD_FUNC: cc3de3f5e11a9509d763859dae785282dd722efd
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 4cb5da71bb7d70286700b8ff2ee10768a0ead745
THREAD_SHA1_HASH_MOD: b9244340ccd8db674994429a81face5be4b023df
FOLLOWUP_IP:
fvevol!AcquireRequestResources+1c1
fffff800`8d4f1cd1 85c0 test eax,eax
FAULT_INSTR_CODE: 840fc085
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: fvevol!AcquireRequestResources+1c1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: fvevol
IMAGE_NAME: fvevol.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 2493bbe7
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1c1
FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_fvevol!AcquireRequestResources
BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_fvevol!AcquireRequestResources
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_STACKPTR_ERROR_fvevol!AcquireRequestResources
TARGET_TIME: 2017-12-03T10:31:45.000Z
OSBUILD: 16299
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-11-26 20:49:20
BUILDDATESTAMP_STR: 170928-1534
BUILDLAB_STR: rs3_release
BUILDOSVER_STR: 10.0.16299.15.amd64fre.rs3_release.170928-1534
ANALYSIS_SESSION_ELAPSED_TIME: f9e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_stackptr_error_fvevol!acquirerequestresources
FAILURE_ID_HASH: {285f5ef0-9a75-90fc-a276-8ffcd076b044}
Followup: MachineOwner
---------
2: kd> lmvm fvevol
Browse full module list
start end module name
fffff800`8d4b0000 fffff800`8d568000 fvevol (pdb symbols) C:\ProgramData\dbg\sym\fvevol.pdb\1EB883BD76F97C3CD3DA9549EFD915E81\fvevol.pdb
Loaded symbol image file: fvevol.sys
Image path: \SystemRoot\System32\DRIVERS\fvevol.sys
Image name: fvevol.sys
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 2493BBE7 (This is a reproducible build file hash, not a timestamp)
CheckSum: 000B717D
ImageSize: 000B8000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.