pastebin - collaborative debugging tool
nrubsig.kpaste.net RSS


Kernel panic 2
Posted by Anonymous on Thu 2nd Nov 2023 21:37
raw | new post

  1.  
  2. ************* Preparing the environment for Debugger Extensions Gallery repositories **************
  3.    ExtensionRepository : Implicit
  4.    UseExperimentalFeatureForNugetShare : true
  5.    AllowNugetExeUpdate : true
  6.    AllowNugetMSCredentialProviderInstall : true
  7.    AllowParallelInitializationOfLocalRepositories : true
  8.  
  9.    -- Configuring repositories
  10.       ----> Repository : LocalInstalled, Enabled: true
  11.       ----> Repository : UserExtensions, Enabled: true
  12.  
  13. >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.016 seconds
  14.  
  15. ************* Waiting for Debugger Extensions Gallery to Initialize **************
  16.  
  17. >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.313 seconds
  18.    ----> Repository : UserExtensions, Enabled: true, Packages count: 0
  19.    ----> Repository : LocalInstalled, Enabled: true, Packages count: 36
  20.  
  21. Microsoft (R) Windows Debugger Version 10.0.25921.1001 AMD64
  22. Copyright (c) Microsoft Corporation. All rights reserved.
  23.  
  24.  
  25. Loading Dump File [C:\cygwin64\home\roland_mainz\tmp\nfs_crash20231102_002_MEMORY.DMP]
  26. Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
  27.  
  28.  
  29. ************* Path validation summary **************
  30. Response                         Time (ms)     Location
  31. Deferred                                       srv*
  32. Symbol search path is: srv*
  33. Executable search path is:
  34. Windows 10 Kernel Version 19041 MP (6 procs) Free x64
  35. Product: WinNt, suite: TerminalServer SingleUserTS
  36. Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
  37. Kernel base = 0xfffff806`46000000 PsLoadedModuleList = 0xfffff806`46c2a360
  38. Debug session time: Thu Nov  2 22:05:10.029 2023 (UTC + 1:00)
  39. System Uptime: 0 days 13:30:26.743
  40. Loading Kernel Symbols
  41. ...............................................................
  42. ................................................................
  43. ................................................................
  44.  
  45. Loading User Symbols
  46. PEB is paged out (Peb.Ldr = 00000077`55071018).  Type ".hh dbgerr001" for details
  47. Loading unloaded module list
  48. ........
  49. For analysis of this file, run !analyze -v
  50. Unable to load image \SystemRoot\system32\DRIVERS\nfs41_driver.sys, Win32 error 0n2
  51. nt!KeBugCheckEx:
  52. fffff806`463fd640 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffffd87`3b27bf20=0000000000000027
  53. 0: kd> !analyze -v
  54. *******************************************************************************
  55. *                                                                             *
  56. *                        Bugcheck Analysis                                    *
  57. *                                                                             *
  58. *******************************************************************************
  59.  
  60. RDR_FILE_SYSTEM (27)
  61.     If you see RxExceptionFilter on the stack then the 2nd and 3rd parameters are the
  62.     exception record and context record. Do a .cxr on the 3rd parameter and then kb to
  63.     obtain a more informative stack trace.
  64.     The high 16 bits of the first parameter is the RDBSS BugCheck code, which is defined
  65.     as follows:
  66.      RDBSS_BUG_CHECK_CACHESUP  = 0xca550000,
  67.      RDBSS_BUG_CHECK_CLEANUP   = 0xc1ee0000,
  68.      RDBSS_BUG_CHECK_CLOSE     = 0xc10e0000,
  69.      RDBSS_BUG_CHECK_NTEXCEPT  = 0xbaad0000,
  70. Arguments:
  71. Arg1: 00000000baad0080
  72. Arg2: fffffd873b27cf88
  73. Arg3: fffffd873b27c7c0
  74. Arg4: fffff806465f7617
  75.  
  76. Debugging Details:
  77. ------------------
  78.  
  79.  
  80. KEY_VALUES_STRING: 1
  81.  
  82.     Key  : AV.Fault
  83.     Value: Read
  84.  
  85.     Key  : Analysis.CPU.mSec
  86.     Value: 3968
  87.  
  88.     Key  : Analysis.Elapsed.mSec
  89.     Value: 4006
  90.  
  91.     Key  : Analysis.IO.Other.Mb
  92.     Value: 0
  93.  
  94.     Key  : Analysis.IO.Read.Mb
  95.     Value: 1
  96.  
  97.     Key  : Analysis.IO.Write.Mb
  98.     Value: 2
  99.  
  100.     Key  : Analysis.Init.CPU.mSec
  101.     Value: 1000
  102.  
  103.     Key  : Analysis.Init.Elapsed.mSec
  104.     Value: 7317
  105.  
  106.     Key  : Analysis.Memory.CommitPeak.Mb
  107.     Value: 96
  108.  
  109.     Key  : Bugcheck.Code.KiBugCheckData
  110.     Value: 0x27
  111.  
  112.     Key  : Bugcheck.Code.LegacyAPI
  113.     Value: 0x27
  114.  
  115.     Key  : Failure.Bucket
  116.     Value: 0x27_nfs41_driver!handle_upcall
  117.  
  118.     Key  : Failure.Hash
  119.     Value: {8cc3c03c-4f74-c78a-fa41-0d8f60b7b819}
  120.  
  121.     Key  : Hypervisor.Enlightenments.Value
  122.     Value: 12576
  123.  
  124.     Key  : Hypervisor.Enlightenments.ValueHex
  125.     Value: 3120
  126.  
  127.     Key  : Hypervisor.Flags.AnyHypervisorPresent
  128.     Value: 1
  129.  
  130.     Key  : Hypervisor.Flags.ApicEnlightened
  131.     Value: 0
  132.  
  133.     Key  : Hypervisor.Flags.ApicVirtualizationAvailable
  134.     Value: 0
  135.  
  136.     Key  : Hypervisor.Flags.AsyncMemoryHint
  137.     Value: 0
  138.  
  139.     Key  : Hypervisor.Flags.CoreSchedulerRequested
  140.     Value: 0
  141.  
  142.     Key  : Hypervisor.Flags.CpuManager
  143.     Value: 0
  144.  
  145.     Key  : Hypervisor.Flags.DeprecateAutoEoi
  146.     Value: 1
  147.  
  148.     Key  : Hypervisor.Flags.DynamicCpuDisabled
  149.     Value: 0
  150.  
  151.     Key  : Hypervisor.Flags.Epf
  152.     Value: 0
  153.  
  154.     Key  : Hypervisor.Flags.ExtendedProcessorMasks
  155.     Value: 0
  156.  
  157.     Key  : Hypervisor.Flags.HardwareMbecAvailable
  158.     Value: 0
  159.  
  160.     Key  : Hypervisor.Flags.MaxBankNumber
  161.     Value: 0
  162.  
  163.     Key  : Hypervisor.Flags.MemoryZeroingControl
  164.     Value: 0
  165.  
  166.     Key  : Hypervisor.Flags.NoExtendedRangeFlush
  167.     Value: 1
  168.  
  169.     Key  : Hypervisor.Flags.NoNonArchCoreSharing
  170.     Value: 0
  171.  
  172.     Key  : Hypervisor.Flags.Phase0InitDone
  173.     Value: 1
  174.  
  175.     Key  : Hypervisor.Flags.PowerSchedulerQos
  176.     Value: 0
  177.  
  178.     Key  : Hypervisor.Flags.RootScheduler
  179.     Value: 0
  180.  
  181.     Key  : Hypervisor.Flags.SynicAvailable
  182.     Value: 1
  183.  
  184.     Key  : Hypervisor.Flags.UseQpcBias
  185.     Value: 0
  186.  
  187.     Key  : Hypervisor.Flags.Value
  188.     Value: 536632
  189.  
  190.     Key  : Hypervisor.Flags.ValueHex
  191.     Value: 83038
  192.  
  193.     Key  : Hypervisor.Flags.VpAssistPage
  194.     Value: 1
  195.  
  196.     Key  : Hypervisor.Flags.VsmAvailable
  197.     Value: 0
  198.  
  199.     Key  : Hypervisor.RootFlags.AccessStats
  200.     Value: 0
  201.  
  202.     Key  : Hypervisor.RootFlags.CrashdumpEnlightened
  203.     Value: 0
  204.  
  205.     Key  : Hypervisor.RootFlags.CreateVirtualProcessor
  206.     Value: 0
  207.  
  208.     Key  : Hypervisor.RootFlags.DisableHyperthreading
  209.     Value: 0
  210.  
  211.     Key  : Hypervisor.RootFlags.HostTimelineSync
  212.     Value: 0
  213.  
  214.     Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
  215.     Value: 0
  216.  
  217.     Key  : Hypervisor.RootFlags.IsHyperV
  218.     Value: 0
  219.  
  220.     Key  : Hypervisor.RootFlags.LivedumpEnlightened
  221.     Value: 0
  222.  
  223.     Key  : Hypervisor.RootFlags.MapDeviceInterrupt
  224.     Value: 0
  225.  
  226.     Key  : Hypervisor.RootFlags.MceEnlightened
  227.     Value: 0
  228.  
  229.     Key  : Hypervisor.RootFlags.Nested
  230.     Value: 0
  231.  
  232.     Key  : Hypervisor.RootFlags.StartLogicalProcessor
  233.     Value: 0
  234.  
  235.     Key  : Hypervisor.RootFlags.Value
  236.     Value: 0
  237.  
  238.     Key  : Hypervisor.RootFlags.ValueHex
  239.     Value: 0
  240.  
  241.     Key  : SecureKernel.HalpHvciEnabled
  242.     Value: 0
  243.  
  244.     Key  : WER.OS.Branch
  245.     Value: vb_release
  246.  
  247.     Key  : WER.OS.Version
  248.     Value: 10.0.19041.1
  249.  
  250.  
  251. BUGCHECK_CODE:  27
  252.  
  253. BUGCHECK_P1: baad0080
  254.  
  255. BUGCHECK_P2: fffffd873b27cf88
  256.  
  257. BUGCHECK_P3: fffffd873b27c7c0
  258.  
  259. BUGCHECK_P4: fffff806465f7617
  260.  
  261. FILE_IN_CAB:  nfs_crash20231102_002_MEMORY.DMP
  262.  
  263. EXCEPTION_RECORD:  fffffd873b27cf88 -- (.exr 0xfffffd873b27cf88)
  264. ExceptionAddress: fffff806465f7617 (nt!SeTokenCanImpersonate+0x0000000000000047)
  265.    ExceptionCode: c0000005 (Access violation)
  266.   ExceptionFlags: 00000000
  267. NumberParameters: 2
  268.    Parameter[0]: 0000000000000000
  269.    Parameter[1]: ffffffffffffffff
  270. Attempt to read from address ffffffffffffffff
  271.  
  272. CONTEXT:  fffffd873b27c7c0 -- (.cxr 0xfffffd873b27c7c0)
  273. rax=fffffd873b27d228 rbx=000000000065006c rcx=ffffaf89e2b130c0
  274. rdx=007200610077002d rsi=007200610077002d rdi=ffffaf89e2b130c0
  275. rip=fffff806465f7617 rsp=fffffd873b27d1c0 rbp=ffff8801b18f5300
  276.  r8=000000000065006c  r9=fffffd873b27d2c0 r10=ffff8801ae4f2080
  277. r11=fffffd873b27d2c0 r12=0000000000000000 r13=ffff8801af1787f8
  278. r14=ffffaf89e2b130c0 r15=0000000000000001
  279. iopl=0         nv up ei pl nz na po nc
  280. cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
  281. nt!SeTokenCanImpersonate+0x47:
  282. fffff806`465f7617 817a18e6030000  cmp     dword ptr [rdx+18h],3E6h ds:002b:00720061`00770045=????????
  283. Resetting default scope
  284.  
  285. BLACKBOXBSD: 1 (!blackboxbsd)
  286.  
  287.  
  288. BLACKBOXNTFS: 1 (!blackboxntfs)
  289.  
  290.  
  291. BLACKBOXPNP: 1 (!blackboxpnp)
  292.  
  293.  
  294. BLACKBOXWINLOGON: 1
  295.  
  296. PROCESS_NAME:  nfsd_debug.exe
  297.  
  298. READ_ADDRESS:  ffffffffffffffff
  299.  
  300. ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%p verwies auf Arbeitsspeicher bei 0x%p. Der Vorgang %s konnte im Arbeitsspeicher nicht durchgef hrt werden.
  301.  
  302. EXCEPTION_CODE_STR:  c0000005
  303.  
  304. EXCEPTION_PARAMETER1:  0000000000000000
  305.  
  306. EXCEPTION_PARAMETER2:  ffffffffffffffff
  307.  
  308. EXCEPTION_STR:  0xc0000005
  309.  
  310. STACK_TEXT:  
  311. fffffd87`3b27d1c0 fffff806`465f7ac6     : ffff8801`af178300 fffff806`4a0dfe00 00000000`00000000 fffffd87`00000000 : nt!SeTokenCanImpersonate+0x47
  312. fffffd87`3b27d230 fffff806`46721035     : 00000000`00000000 fffff806`0065006c ffff8801`afaa8010 fffffd87`3b27d368 : nt!PsImpersonateClient+0x126
  313. fffffd87`3b27d2c0 fffff806`4a0c4869     : 00000000`00000001 ffff8801`b18f5330 fffff806`4a0dfe40 fffff806`4621dff0 : nt!SeImpersonateClientEx+0x35
  314. fffffd87`3b27d300 fffff806`4a0d00d7     : ffff8801`afaa8010 ffff8801`ae603a30 fffffd87`3b27d384 00000000`00000000 : nfs41_driver!handle_upcall+0x59 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c @ 1331]
  315. fffffd87`3b27d350 fffff806`4a0c9de8     : ffff8801`afaa8010 fffffd87`00282018 00000000`00000000 ffff8801`ad656250 : nfs41_driver!nfs41_upcall+0xe7 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c @ 1547]
  316. fffffd87`3b27d3c0 fffff806`4a0f5976     : ffff8801`afaa8010 ffff8801`a8467770 00000000`00000002 ffff8801`afaa8010 : nfs41_driver!nfs41_DevFcbXXXControlFile+0x128 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c @ 2363]
  317. fffffd87`3b27d440 fffff806`4a0f5698     : ffff8801`afaa8010 ffff8801`afaa8010 ffff8801`a8467700 ffff8801`afaa8010 : nfs41_driver!RxXXXControlFileCallthru+0x76 [base\fs\rdr2\rdbss\ntdevfcb.c @ 130]
  318. fffffd87`3b27d470 fffff806`4a0d5a52     : 00000000`00000000 ffff8801`b18f5330 ffff8801`a8467701 00000000`00000000 : nfs41_driver!RxCommonDevFCBIoCtl+0x58 [base\fs\rdr2\rdbss\ntdevfcb.c @ 491]
  319. fffffd87`3b27d4a0 fffff806`4a0ec97d     : fffff806`4a0df370 00000000`00000000 ffff8801`ad6561b0 ffff8801`a8467770 : nfs41_driver!RxFsdCommonDispatch+0x442 [base\fs\rdr2\rdbss\ntfsd.c @ 848]
  320. fffffd87`3b27d5a0 fffff806`4a0ca927     : ffff8801`b2a02db0 00000000`00000001 00000000`00000000 00000000`00000000 : nfs41_driver!RxFsdDispatch+0xfd [base\fs\rdr2\rdbss\ntfsd.c @ 442]
  321. fffffd87`3b27d5d0 fffff806`46210665     : ffff8801`a8467770 ffff8801`b18f5330 ffff8801`ae4f2730 fffff806`4621ffcb : nfs41_driver!nfs41_FsdDispatch+0x67 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c @ 6618]
  322. fffffd87`3b27d610 fffff806`4976f248     : fffff806`49768000 00000000`00000000 ffff8801`a8d73dd0 ffff8801`af8c3368 : nt!IofCallDriver+0x55
  323. fffffd87`3b27d650 fffff806`4976ed99     : ffffaf89`d441b510 00000000`00000000 fffff806`49768000 00000000`00000000 : mup!MupiCallUncProvider+0xb8
  324. fffffd87`3b27d6c0 fffff806`4976ecce     : ffff8801`b18f5330 ffff8801`af8c3360 ffff8801`ad6561b0 00000000`00000000 : mup!MupStateMachine+0x59
  325. fffffd87`3b27d6f0 fffff806`46210665     : ffff8801`ad6561b0 00000000`00000000 ffff8801`b2a02db0 00000000`00000001 : mup!MupFsdIrpPassThrough+0x17e
  326. fffffd87`3b27d760 fffff806`42a84a76     : 00000000`00282018 fffffd87`3b27d958 ffff8801`a8467770 fffff806`46602441 : nt!IofCallDriver+0x55
  327. fffffd87`3b27d7a0 fffff806`46210665     : 00000000`00000002 00000000`00000000 fffffd87`20206f49 fffffd87`3b27d958 : FLTMGR!FltpDispatch+0xd6
  328. fffffd87`3b27d800 fffff806`4660142c     : 00000000`00000001 ffff8801`b18f54d8 ffff8801`ad6561b0 ffff8801`af178340 : nt!IofCallDriver+0x55
  329. fffffd87`3b27d840 fffff806`46601081     : ffff8801`b18f54d8 fffffd87`3b27db80 00000000`00000005 ffff8801`b18f54d8 : nt!IopSynchronousServiceTail+0x34c
  330. fffffd87`3b27d8e0 fffff806`466003f6     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xc71
  331. fffffd87`3b27da20 fffff806`46410ef5     : 00000000`00000000 fffff806`462204de ffff8801`ad150080 00000077`55071000 : nt!NtDeviceIoControlFile+0x56
  332. fffffd87`3b27da90 00007ffd`d056d0c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
  333. 00000077`565fde08 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`d056d0c4
  334.  
  335.  
  336. FAULTING_SOURCE_LINE:  C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c
  337.  
  338. FAULTING_SOURCE_FILE:  C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c
  339.  
  340. FAULTING_SOURCE_LINE_NUMBER:  1331
  341.  
  342. FAULTING_SOURCE_CODE:  
  343.   1327:     PLOWIO_CONTEXT LowIoContext = &RxContext->LowIoContext;
  344.   1328:     ULONG cbOut = LowIoContext->ParamsFor.IoCtl.OutputBufferLength;
  345.   1329:     unsigned char *pbOut = LowIoContext->ParamsFor.IoCtl.pOutputBuffer;
  346.   1330:
  347. > 1331:     status = SeImpersonateClientEx(entry->psec_ctx, NULL);
  348.   1332:     if (status != STATUS_SUCCESS) {
  349.   1333:         print_error("SeImpersonateClientEx failed %x\n", status);
  350.   1334:         goto out;
  351.   1335:     }
  352.   1336:
  353.  
  354.  
  355. SYMBOL_NAME:  nfs41_driver!handle_upcall+59
  356.  
  357. MODULE_NAME: nfs41_driver
  358.  
  359. IMAGE_NAME:  nfs41_driver.sys
  360.  
  361. STACK_COMMAND:  .cxr 0xfffffd873b27c7c0 ; kb
  362.  
  363. BUCKET_ID_FUNC_OFFSET:  59
  364.  
  365. FAILURE_BUCKET_ID:  0x27_nfs41_driver!handle_upcall
  366.  
  367. OS_VERSION:  10.0.19041.1
  368.  
  369. BUILDLAB_STR:  vb_release
  370.  
  371. OSPLATFORM_TYPE:  x64
  372.  
  373. OSNAME:  Windows 10
  374.  
  375. FAILURE_ID_HASH:  {8cc3c03c-4f74-c78a-fa41-0d8f60b7b819}
  376.  
  377. Followup:     MachineOwner
  378. ---------
  379.  
  380. 0: kd> .exr 0xfffffd873b27cf88
  381. ExceptionAddress: fffff806465f7617 (nt!SeTokenCanImpersonate+0x0000000000000047)
  382.    ExceptionCode: c0000005 (Access violation)
  383.   ExceptionFlags: 00000000
  384. NumberParameters: 2
  385.    Parameter[0]: 0000000000000000
  386.    Parameter[1]: ffffffffffffffff
  387. Attempt to read from address ffffffffffffffff
  388. 0: kd> kp
  389.  # Child-SP          RetAddr               Call Site
  390. 00 fffffd87`3b27bf18 fffff806`4a0d71c9     nt!KeBugCheckEx
  391. 01 fffffd87`3b27bf20 fffff806`4a0dafc0     nfs41_driver!RxExceptionFilter(struct _RX_CONTEXT * RxContext = 0xffff8801`afaa8010, struct _EXCEPTION_POINTERS * ExceptionPointer = 0xfffffd87`3b27c000)+0x159 [base\fs\rdr2\rdbss\ntexcept.c @ 126]
  392. 02 fffffd87`3b27bf90 fffff806`463d01bf     nfs41_driver!RxFsdCommonDispatch$filt$0+0x15 [base\fs\rdr2\rdbss\ntfsd.c @ 876]
  393. 03 fffffd87`3b27bfd0 fffff806`46407d2f     nt!_C_specific_handler+0x9f
  394. 04 fffffd87`3b27c040 fffff806`462ca3c7     nt!RtlpExecuteHandlerForException+0xf
  395. 05 fffffd87`3b27c070 fffff806`462c94e6     nt!RtlDispatchException+0x297
  396. 06 fffffd87`3b27c790 fffff806`4641186c     nt!KiDispatchException+0x186
  397. 07 fffffd87`3b27ce50 fffff806`4640ce5a     nt!KiExceptionDispatch+0x12c
  398. 08 fffffd87`3b27d030 fffff806`465f7617     nt!KiGeneralProtectionFault+0x31a
  399. 09 fffffd87`3b27d1c0 fffff806`465f7ac6     nt!SeTokenCanImpersonate+0x47
  400. 0a fffffd87`3b27d230 fffff806`46721035     nt!PsImpersonateClient+0x126
  401. 0b fffffd87`3b27d2c0 fffff806`4a0c4869     nt!SeImpersonateClientEx+0x35
  402. 0c fffffd87`3b27d300 fffff806`4a0d00d7     nfs41_driver!handle_upcall(struct _RX_CONTEXT * RxContext = 0xffff8801`afaa8010, struct _updowncall_entry * entry = 0xffff8801`ae603a30, unsigned long * len = 0xfffffd87`3b27d384)+0x59 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c @ 1331]
  403. 0d fffffd87`3b27d350 fffff806`4a0c9de8     nfs41_driver!nfs41_upcall(struct _RX_CONTEXT * RxContext = 0xffff8801`afaa8010)+0xe7 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c @ 1547]
  404. 0e fffffd87`3b27d3c0 fffff806`4a0f5976     nfs41_driver!nfs41_DevFcbXXXControlFile(struct _RX_CONTEXT * RxContext = 0xffff8801`afaa8010)+0x128 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c @ 2363]
  405. 0f fffffd87`3b27d440 fffff806`4a0f5698     nfs41_driver!RxXXXControlFileCallthru(struct _RX_CONTEXT * RxContext = 0xffff8801`afaa8010, struct _IRP * Irp = 0xffff8801`b18f5330)+0x76 [base\fs\rdr2\rdbss\ntdevfcb.c @ 130]
  406. 10 fffffd87`3b27d470 fffff806`4a0d5a52     nfs41_driver!RxCommonDevFCBIoCtl(struct _RX_CONTEXT * RxContext = 0xffff8801`afaa8010, struct _IRP * Irp = <Value unavailable error>)+0x58 [base\fs\rdr2\rdbss\ntdevfcb.c @ 491]
  407. 11 fffffd87`3b27d4a0 fffff806`4a0ec97d     nfs41_driver!RxFsdCommonDispatch(struct _RX_FSD_DISPATCH_VECTOR * DispatchVector = 0xfffff806`4a0df370, struct _IRP * Irp = 0xffff8801`b18f5330, struct _FILE_OBJECT * FileObject = 0xffff8801`ad6561b0 "" - Device for "\FileSystem\Mup", struct _RDBSS_DEVICE_OBJECT * RxDeviceObject = 0xffff8801`a8467770)+0x442 [base\fs\rdr2\rdbss\ntfsd.c @ 848]
  408. 12 fffffd87`3b27d5a0 fffff806`4a0ca927     nfs41_driver!RxFsdDispatch(struct _RDBSS_DEVICE_OBJECT * RxDeviceObject = <Value unavailable error>, struct _IRP * Irp = <Value unavailable error>)+0xfd [base\fs\rdr2\rdbss\ntfsd.c @ 442]
  409. 13 fffffd87`3b27d5d0 fffff806`46210665     nfs41_driver!nfs41_FsdDispatch(struct _DEVICE_OBJECT * dev = 0xffff8801`a8467770 Device for "\FileSystem\nfs41_driver", struct _IRP * Irp = 0xffff8801`b18f5330)+0x67 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c @ 6618]
  410. 14 fffffd87`3b27d610 fffff806`4976f248     nt!IofCallDriver+0x55
  411. 15 fffffd87`3b27d650 fffff806`4976ed99     mup!MupiCallUncProvider+0xb8
  412. 16 fffffd87`3b27d6c0 fffff806`4976ecce     mup!MupStateMachine+0x59
  413. 17 fffffd87`3b27d6f0 fffff806`46210665     mup!MupFsdIrpPassThrough+0x17e
  414. 18 fffffd87`3b27d760 fffff806`42a84a76     nt!IofCallDriver+0x55
  415. 19 fffffd87`3b27d7a0 fffff806`46210665     FLTMGR!FltpDispatch+0xd6
  416. 1a fffffd87`3b27d800 fffff806`4660142c     nt!IofCallDriver+0x55
  417. 1b fffffd87`3b27d840 fffff806`46601081     nt!IopSynchronousServiceTail+0x34c
  418. 1c fffffd87`3b27d8e0 fffff806`466003f6     nt!IopXxxControlFile+0xc71
  419. 1d fffffd87`3b27da20 fffff806`46410ef5     nt!NtDeviceIoControlFile+0x56
  420. 1e fffffd87`3b27da90 00007ffd`d056d0c4     nt!KiSystemServiceCopyEnd+0x25
  421. 1f 00000077`565fde08 00000000`00000000     0x00007ffd`d056d0c4
  422. 0: kd> .cxr 0xfffffd873b27c7c0
  423. rax=fffffd873b27d228 rbx=000000000065006c rcx=ffffaf89e2b130c0
  424. rdx=007200610077002d rsi=007200610077002d rdi=ffffaf89e2b130c0
  425. rip=fffff806465f7617 rsp=fffffd873b27d1c0 rbp=ffff8801b18f5300
  426.  r8=000000000065006c  r9=fffffd873b27d2c0 r10=ffff8801ae4f2080
  427. r11=fffffd873b27d2c0 r12=0000000000000000 r13=ffff8801af1787f8
  428. r14=ffffaf89e2b130c0 r15=0000000000000001
  429. iopl=0         nv up ei pl nz na po nc
  430. cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
  431. nt!SeTokenCanImpersonate+0x47:
  432. fffff806`465f7617 817a18e6030000  cmp     dword ptr [rdx+18h],3E6h ds:002b:00720061`00770045=????????

Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.

Syntax highlighting:

To highlight particular lines, prefix each line with {%HIGHLIGHT}




All content is user-submitted.
The administrators of this site (kpaste.net) are not responsible for their content.
Abuse reports should be emailed to us at