R
RyanO'pry
I was away from my computer while it happened but when I returned I went into the event viewer and found the error code 0x0000003b with event ID 1001. I read the dump file to find that it has to do with "FLTMGR". I left the information under this. This isn't the first time I've dealt with a BSOD, I've been dealing with multiple for the past month or so. Please help, thanks.
Microsoft (R) Windows Debugger Version 10.0.19041.685 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\010321-11515-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\SymCache*Symbol information
Symbol search path is: SRV*C:\SymCache*Symbol information
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`49a00000 PsLoadedModuleList = 0xfffff804`4a62a2b0
Debug session time: Sun Jan 3 18:06:07.760 2021 (UTC - 6:00)
System Uptime: 1 days 0:31:56.652
Loading Kernel Symbols
...............................................................
................................................................
................................................................
........
Loading User Symbols
Loading unloaded module list
.....................................
For analysis of this file, run !analyze -v
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff804462d7c7a, Address of the instruction which caused the bugcheck
Arg3: ffff908d8b075c70, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-59M94KS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 10
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff804462d7c7a
BUGCHECK_P3: ffff908d8b075c70
BUGCHECK_P4: 0
CONTEXT: ffff908d8b075c70 -- (.cxr 0xffff908d8b075c70)
rax=0000000020206f49 rbx=ffffa9817d858dc0 rcx=ffffa9817d858dc0
rdx=0000000020206f49 rsi=ffffa9816c555010 rdi=000000000000000a
rip=fffff804462d7c7a rsp=ffff908d8b076670 rbp=0000000000000001
r8=0000000000000000 r9=0000000000000000 r10=fffff80449c54560
r11=ffffa9816c340010 r12=0000000010000000 r13=ffffa9816cbf1d20
r14=0000000000000208 r15=0000000000000001
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
FLTMGR!FltpMoveIrpToCallbackData+0xa:
fffff804`462d7c7a 8b4230 mov eax,dword ptr [rdx+30h] ds:002b:00000000`20206f79=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: vrserver.exe
STACK_TEXT:
ffff908d`8b076670 fffff804`462d7a70 : ffffa981`7d858dc0 00000000`00000000 ffff908d`8b0767a1 fffff804`49c501c1 : FLTMGR!FltpMoveIrpToCallbackData+0xa
ffff908d`8b0766a0 fffff804`462d4b32 : ffff908d`8b0767c0 ffff908d`8b0767c0 00000000`20206f49 ffff908d`8b0767d0 : FLTMGR!FltpAllocateIrpCtrlInternal+0x1b0
ffff908d`8b076700 fffff804`4630caaf : ffffa981`69016880 00000000`00000000 00000000`000000e0 fffff804`4a02af81 : FLTMGR!FltpPassThrough+0x1c2
ffff908d`8b0767a0 fffff804`49c52f55 : ffffa981`0000000a ffffa981`7f92ed60 00000000`00000002 00000000`00000001 : FLTMGR!FltpFsControl+0xbf
ffff908d`8b076800 fffff804`49ffd518 : ffff908d`8b076b80 ffffa981`7f92ed60 00000000`00000001 ffffa981`877b8080 : nt!IofCallDriver+0x55
ffff908d`8b076840 fffff804`49ffcde5 : 00000000`0011400c ffff908d`8b076b80 00000000`00000005 ffff908d`8b076b80 : nt!IopSynchronousServiceTail+0x1a8
ffff908d`8b0768e0 fffff804`4a0c20e6 : 00000000`00000000 00000000`000007c8 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x5e5
ffff908d`8b076a20 fffff804`49e071b8 : ffffa981`7c8ad540 0000000b`aa2ff648 ffff908d`8b076aa8 00000000`00000000 : nt!NtFsControlFile+0x56
ffff908d`8b076a90 00007ffc`214cc6d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000000b`aa2ff628 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`214cc6d4
SYMBOL_NAME: FLTMGR!FltpMoveIrpToCallbackData+a
MODULE_NAME: FLTMGR
IMAGE_NAME: FLTMGR.SYS
IMAGE_VERSION: 10.0.19041.264
STACK_COMMAND: .cxr 0xffff908d8b075c70 ; kb
BUCKET_ID_FUNC_OFFSET: a
FAILURE_BUCKET_ID: 0x3B_c0000005_FLTMGR!FltpMoveIrpToCallbackData
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a73af0ae-6f85-3b3e-9e46-f62d27bd7138}
Followup: MachineOwner
---------
Continue reading...
Microsoft (R) Windows Debugger Version 10.0.19041.685 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\010321-11515-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\SymCache*Symbol information
Symbol search path is: SRV*C:\SymCache*Symbol information
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`49a00000 PsLoadedModuleList = 0xfffff804`4a62a2b0
Debug session time: Sun Jan 3 18:06:07.760 2021 (UTC - 6:00)
System Uptime: 1 days 0:31:56.652
Loading Kernel Symbols
...............................................................
................................................................
................................................................
........
Loading User Symbols
Loading unloaded module list
.....................................
For analysis of this file, run !analyze -v
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff804462d7c7a, Address of the instruction which caused the bugcheck
Arg3: ffff908d8b075c70, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-59M94KS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 10
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff804462d7c7a
BUGCHECK_P3: ffff908d8b075c70
BUGCHECK_P4: 0
CONTEXT: ffff908d8b075c70 -- (.cxr 0xffff908d8b075c70)
rax=0000000020206f49 rbx=ffffa9817d858dc0 rcx=ffffa9817d858dc0
rdx=0000000020206f49 rsi=ffffa9816c555010 rdi=000000000000000a
rip=fffff804462d7c7a rsp=ffff908d8b076670 rbp=0000000000000001
r8=0000000000000000 r9=0000000000000000 r10=fffff80449c54560
r11=ffffa9816c340010 r12=0000000010000000 r13=ffffa9816cbf1d20
r14=0000000000000208 r15=0000000000000001
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
FLTMGR!FltpMoveIrpToCallbackData+0xa:
fffff804`462d7c7a 8b4230 mov eax,dword ptr [rdx+30h] ds:002b:00000000`20206f79=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: vrserver.exe
STACK_TEXT:
ffff908d`8b076670 fffff804`462d7a70 : ffffa981`7d858dc0 00000000`00000000 ffff908d`8b0767a1 fffff804`49c501c1 : FLTMGR!FltpMoveIrpToCallbackData+0xa
ffff908d`8b0766a0 fffff804`462d4b32 : ffff908d`8b0767c0 ffff908d`8b0767c0 00000000`20206f49 ffff908d`8b0767d0 : FLTMGR!FltpAllocateIrpCtrlInternal+0x1b0
ffff908d`8b076700 fffff804`4630caaf : ffffa981`69016880 00000000`00000000 00000000`000000e0 fffff804`4a02af81 : FLTMGR!FltpPassThrough+0x1c2
ffff908d`8b0767a0 fffff804`49c52f55 : ffffa981`0000000a ffffa981`7f92ed60 00000000`00000002 00000000`00000001 : FLTMGR!FltpFsControl+0xbf
ffff908d`8b076800 fffff804`49ffd518 : ffff908d`8b076b80 ffffa981`7f92ed60 00000000`00000001 ffffa981`877b8080 : nt!IofCallDriver+0x55
ffff908d`8b076840 fffff804`49ffcde5 : 00000000`0011400c ffff908d`8b076b80 00000000`00000005 ffff908d`8b076b80 : nt!IopSynchronousServiceTail+0x1a8
ffff908d`8b0768e0 fffff804`4a0c20e6 : 00000000`00000000 00000000`000007c8 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x5e5
ffff908d`8b076a20 fffff804`49e071b8 : ffffa981`7c8ad540 0000000b`aa2ff648 ffff908d`8b076aa8 00000000`00000000 : nt!NtFsControlFile+0x56
ffff908d`8b076a90 00007ffc`214cc6d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000000b`aa2ff628 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`214cc6d4
SYMBOL_NAME: FLTMGR!FltpMoveIrpToCallbackData+a
MODULE_NAME: FLTMGR
IMAGE_NAME: FLTMGR.SYS
IMAGE_VERSION: 10.0.19041.264
STACK_COMMAND: .cxr 0xffff908d8b075c70 ; kb
BUCKET_ID_FUNC_OFFSET: a
FAILURE_BUCKET_ID: 0x3B_c0000005_FLTMGR!FltpMoveIrpToCallbackData
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a73af0ae-6f85-3b3e-9e46-f62d27bd7138}
Followup: MachineOwner
---------
Continue reading...