pastebin - collaborative debugging tool
nrubsig.kpaste.net RSS


Kernel panic
Posted by Anonymous on Thu 2nd Nov 2023 09:32
raw | new post

  1.  
  2. ************* Preparing the environment for Debugger Extensions Gallery repositories **************
  3.    ExtensionRepository : Implicit
  4.    UseExperimentalFeatureForNugetShare : true
  5.    AllowNugetExeUpdate : true
  6.    AllowNugetMSCredentialProviderInstall : true
  7.    AllowParallelInitializationOfLocalRepositories : true
  8.  
  9.    -- Configuring repositories
  10.       ----> Repository : LocalInstalled, Enabled: true
  11.       ----> Repository : UserExtensions, Enabled: true
  12.  
  13. >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.016 seconds
  14.  
  15. ************* Waiting for Debugger Extensions Gallery to Initialize **************
  16.  
  17. >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.312 seconds
  18.    ----> Repository : UserExtensions, Enabled: true, Packages count: 0
  19.    ----> Repository : LocalInstalled, Enabled: true, Packages count: 36
  20.  
  21. Microsoft (R) Windows Debugger Version 10.0.25921.1001 AMD64
  22. Copyright (c) Microsoft Corporation. All rights reserved.
  23.  
  24.  
  25. Loading Dump File [C:\cygwin64\home\roland_mainz\tmp\nfs_crash20231102_001_MEMORY.DMP]
  26. Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
  27.  
  28.  
  29. ************* Path validation summary **************
  30. Response                         Time (ms)     Location
  31. Deferred                                       srv*
  32. Symbol search path is: srv*
  33. Executable search path is:
  34. Windows 10 Kernel Version 19041 MP (6 procs) Free x64
  35. Product: WinNt, suite: TerminalServer SingleUserTS
  36. Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
  37. Kernel base = 0xfffff801`5cc00000 PsLoadedModuleList = 0xfffff801`5d82a360
  38. Debug session time: Thu Nov  2 08:34:25.949 2023 (UTC + 1:00)
  39. System Uptime: 0 days 3:29:58.668
  40. Loading Kernel Symbols
  41. ...............................................................
  42. ................................................................
  43. ..............................................................
  44. Loading User Symbols
  45. PEB is paged out (Peb.Ldr = 00000084`2a3d2018).  Type ".hh dbgerr001" for details
  46. Loading unloaded module list
  47. ......
  48. For analysis of this file, run !analyze -v
  49. Unable to load image \SystemRoot\system32\DRIVERS\nfs41_driver.sys, Win32 error 0n2
  50. nt!KeBugCheckEx:
  51. fffff801`5cffd640 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffc88d`adf73f20=0000000000000027
  52. 1: kd> !analyze -v
  53. *******************************************************************************
  54. *                                                                             *
  55. *                        Bugcheck Analysis                                    *
  56. *                                                                             *
  57. *******************************************************************************
  58.  
  59. RDR_FILE_SYSTEM (27)
  60.     If you see RxExceptionFilter on the stack then the 2nd and 3rd parameters are the
  61.     exception record and context record. Do a .cxr on the 3rd parameter and then kb to
  62.     obtain a more informative stack trace.
  63.     The high 16 bits of the first parameter is the RDBSS BugCheck code, which is defined
  64.     as follows:
  65.      RDBSS_BUG_CHECK_CACHESUP  = 0xca550000,
  66.      RDBSS_BUG_CHECK_CLEANUP   = 0xc1ee0000,
  67.      RDBSS_BUG_CHECK_CLOSE     = 0xc10e0000,
  68.      RDBSS_BUG_CHECK_NTEXCEPT  = 0xbaad0000,
  69. Arguments:
  70. Arg1: 00000000baad0080
  71. Arg2: ffffc88dadf74f88
  72. Arg3: ffffc88dadf747c0
  73. Arg4: fffff8015d1f7617
  74.  
  75. Debugging Details:
  76. ------------------
  77.  
  78.  
  79. KEY_VALUES_STRING: 1
  80.  
  81.     Key  : AV.Fault
  82.     Value: Read
  83.  
  84.     Key  : Analysis.CPU.mSec
  85.     Value: 4312
  86.  
  87.     Key  : Analysis.Elapsed.mSec
  88.     Value: 4406
  89.  
  90.     Key  : Analysis.IO.Other.Mb
  91.     Value: 0
  92.  
  93.     Key  : Analysis.IO.Read.Mb
  94.     Value: 2
  95.  
  96.     Key  : Analysis.IO.Write.Mb
  97.     Value: 2
  98.  
  99.     Key  : Analysis.Init.CPU.mSec
  100.     Value: 1031
  101.  
  102.     Key  : Analysis.Init.Elapsed.mSec
  103.     Value: 7286
  104.  
  105.     Key  : Analysis.Memory.CommitPeak.Mb
  106.     Value: 101
  107.  
  108.     Key  : Bugcheck.Code.KiBugCheckData
  109.     Value: 0x27
  110.  
  111.     Key  : Bugcheck.Code.LegacyAPI
  112.     Value: 0x27
  113.  
  114.     Key  : Failure.Bucket
  115.     Value: 0x27_nfs41_driver!handle_upcall
  116.  
  117.     Key  : Failure.Hash
  118.     Value: {8cc3c03c-4f74-c78a-fa41-0d8f60b7b819}
  119.  
  120.     Key  : Hypervisor.Enlightenments.Value
  121.     Value: 12576
  122.  
  123.     Key  : Hypervisor.Enlightenments.ValueHex
  124.     Value: 3120
  125.  
  126.     Key  : Hypervisor.Flags.AnyHypervisorPresent
  127.     Value: 1
  128.  
  129.     Key  : Hypervisor.Flags.ApicEnlightened
  130.     Value: 0
  131.  
  132.     Key  : Hypervisor.Flags.ApicVirtualizationAvailable
  133.     Value: 0
  134.  
  135.     Key  : Hypervisor.Flags.AsyncMemoryHint
  136.     Value: 0
  137.  
  138.     Key  : Hypervisor.Flags.CoreSchedulerRequested
  139.     Value: 0
  140.  
  141.     Key  : Hypervisor.Flags.CpuManager
  142.     Value: 0
  143.  
  144.     Key  : Hypervisor.Flags.DeprecateAutoEoi
  145.     Value: 1
  146.  
  147.     Key  : Hypervisor.Flags.DynamicCpuDisabled
  148.     Value: 0
  149.  
  150.     Key  : Hypervisor.Flags.Epf
  151.     Value: 0
  152.  
  153.     Key  : Hypervisor.Flags.ExtendedProcessorMasks
  154.     Value: 0
  155.  
  156.     Key  : Hypervisor.Flags.HardwareMbecAvailable
  157.     Value: 0
  158.  
  159.     Key  : Hypervisor.Flags.MaxBankNumber
  160.     Value: 0
  161.  
  162.     Key  : Hypervisor.Flags.MemoryZeroingControl
  163.     Value: 0
  164.  
  165.     Key  : Hypervisor.Flags.NoExtendedRangeFlush
  166.     Value: 1
  167.  
  168.     Key  : Hypervisor.Flags.NoNonArchCoreSharing
  169.     Value: 0
  170.  
  171.     Key  : Hypervisor.Flags.Phase0InitDone
  172.     Value: 1
  173.  
  174.     Key  : Hypervisor.Flags.PowerSchedulerQos
  175.     Value: 0
  176.  
  177.     Key  : Hypervisor.Flags.RootScheduler
  178.     Value: 0
  179.  
  180.     Key  : Hypervisor.Flags.SynicAvailable
  181.     Value: 1
  182.  
  183.     Key  : Hypervisor.Flags.UseQpcBias
  184.     Value: 0
  185.  
  186.     Key  : Hypervisor.Flags.Value
  187.     Value: 536632
  188.  
  189.     Key  : Hypervisor.Flags.ValueHex
  190.     Value: 83038
  191.  
  192.     Key  : Hypervisor.Flags.VpAssistPage
  193.     Value: 1
  194.  
  195.     Key  : Hypervisor.Flags.VsmAvailable
  196.     Value: 0
  197.  
  198.     Key  : Hypervisor.RootFlags.AccessStats
  199.     Value: 0
  200.  
  201.     Key  : Hypervisor.RootFlags.CrashdumpEnlightened
  202.     Value: 0
  203.  
  204.     Key  : Hypervisor.RootFlags.CreateVirtualProcessor
  205.     Value: 0
  206.  
  207.     Key  : Hypervisor.RootFlags.DisableHyperthreading
  208.     Value: 0
  209.  
  210.     Key  : Hypervisor.RootFlags.HostTimelineSync
  211.     Value: 0
  212.  
  213.     Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
  214.     Value: 0
  215.  
  216.     Key  : Hypervisor.RootFlags.IsHyperV
  217.     Value: 0
  218.  
  219.     Key  : Hypervisor.RootFlags.LivedumpEnlightened
  220.     Value: 0
  221.  
  222.     Key  : Hypervisor.RootFlags.MapDeviceInterrupt
  223.     Value: 0
  224.  
  225.     Key  : Hypervisor.RootFlags.MceEnlightened
  226.     Value: 0
  227.  
  228.     Key  : Hypervisor.RootFlags.Nested
  229.     Value: 0
  230.  
  231.     Key  : Hypervisor.RootFlags.StartLogicalProcessor
  232.     Value: 0
  233.  
  234.     Key  : Hypervisor.RootFlags.Value
  235.     Value: 0
  236.  
  237.     Key  : Hypervisor.RootFlags.ValueHex
  238.     Value: 0
  239.  
  240.     Key  : SecureKernel.HalpHvciEnabled
  241.     Value: 0
  242.  
  243.     Key  : WER.OS.Branch
  244.     Value: vb_release
  245.  
  246.     Key  : WER.OS.Version
  247.     Value: 10.0.19041.1
  248.  
  249.  
  250. BUGCHECK_CODE:  27
  251.  
  252. BUGCHECK_P1: baad0080
  253.  
  254. BUGCHECK_P2: ffffc88dadf74f88
  255.  
  256. BUGCHECK_P3: ffffc88dadf747c0
  257.  
  258. BUGCHECK_P4: fffff8015d1f7617
  259.  
  260. FILE_IN_CAB:  nfs_crash20231102_001_MEMORY.DMP
  261.  
  262. EXCEPTION_RECORD:  ffffc88dadf74f88 -- (.exr 0xffffc88dadf74f88)
  263. ExceptionAddress: fffff8015d1f7617 (nt!SeTokenCanImpersonate+0x0000000000000047)
  264.    ExceptionCode: c0000005 (Access violation)
  265.   ExceptionFlags: 00000000
  266. NumberParameters: 2
  267.    Parameter[0]: 0000000000000000
  268.    Parameter[1]: ffffffffffffffff
  269. Attempt to read from address ffffffffffffffff
  270.  
  271. CONTEXT:  ffffc88dadf747c0 -- (.cxr 0xffffc88dadf747c0)
  272. rax=ffffc88dadf75228 rbx=00000000007a0079 rcx=ffffe28e3d7ee400
  273. rdx=006f006900670065 rsi=006f006900670065 rdi=ffffe28e3d7ee400
  274. rip=fffff8015d1f7617 rsp=ffffc88dadf751c0 rbp=ffffa80d057ead00
  275.  r8=00000000007a0079  r9=ffffc88dadf752c0 r10=ffffa80d05872080
  276. r11=ffffc88dadf752c0 r12=0000000000000000 r13=ffffa80d057c0538
  277. r14=ffffe28e3d7ee400 r15=0000000000000001
  278. iopl=0         nv up ei pl nz na po nc
  279. cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
  280. nt!SeTokenCanImpersonate+0x47:
  281. fffff801`5d1f7617 817a18e6030000  cmp     dword ptr [rdx+18h],3E6h ds:002b:006f0069`0067007d=????????
  282. Resetting default scope
  283.  
  284. BLACKBOXBSD: 1 (!blackboxbsd)
  285.  
  286.  
  287. BLACKBOXNTFS: 1 (!blackboxntfs)
  288.  
  289.  
  290. BLACKBOXWINLOGON: 1
  291.  
  292. PROCESS_NAME:  nfsd_debug.exe
  293.  
  294. READ_ADDRESS:  ffffffffffffffff
  295.  
  296. ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%p verwies auf Arbeitsspeicher bei 0x%p. Der Vorgang %s konnte im Arbeitsspeicher nicht durchgef hrt werden.
  297.  
  298. EXCEPTION_CODE_STR:  c0000005
  299.  
  300. EXCEPTION_PARAMETER1:  0000000000000000
  301.  
  302. EXCEPTION_PARAMETER2:  ffffffffffffffff
  303.  
  304. EXCEPTION_STR:  0xc0000005
  305.  
  306. STACK_TEXT:  
  307. ffffc88d`adf751c0 fffff801`5d1f7ac6     : ffffa80d`057c0000 fffff801`61c4fe00 00000000`00000000 ffffc88d`00000000 : nt!SeTokenCanImpersonate+0x47
  308. ffffc88d`adf75230 fffff801`5d321035     : 00000000`00000000 fffff801`007a0079 ffffa80d`047f7010 ffffc88d`adf75368 : nt!PsImpersonateClient+0x126
  309. ffffc88d`adf752c0 fffff801`61c34869     : 00000000`00000001 ffffa80d`057eadc0 fffff801`61c4fe40 fffff801`5ce1dff0 : nt!SeImpersonateClientEx+0x35
  310. ffffc88d`adf75300 fffff801`61c400d7     : ffffa80d`047f7010 ffffa80d`06f441c0 ffffc88d`adf75384 00000000`00000000 : nfs41_driver!handle_upcall+0x59 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c @ 1331]
  311. ffffc88d`adf75350 fffff801`61c39de8     : ffffa80d`047f7010 ffffc88d`00282018 00000000`00000000 ffffa80d`05c77ef0 : nfs41_driver!nfs41_upcall+0xe7 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c @ 1547]
  312. ffffc88d`adf753c0 fffff801`61c65976     : ffffa80d`047f7010 ffffa80c`ffd7f060 00000000`00000002 ffffa80d`047f7010 : nfs41_driver!nfs41_DevFcbXXXControlFile+0x128 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c @ 2363]
  313. ffffc88d`adf75440 fffff801`61c65698     : ffffa80d`047f7010 ffffa80d`047f7010 ffffa80c`ffd7f000 ffffa80d`047f7010 : nfs41_driver!RxXXXControlFileCallthru+0x76 [base\fs\rdr2\rdbss\ntdevfcb.c @ 130]
  314. ffffc88d`adf75470 fffff801`61c45a52     : 00000000`00000000 ffffa80d`057eadc0 ffffa80c`ffd7f001 00000000`00000000 : nfs41_driver!RxCommonDevFCBIoCtl+0x58 [base\fs\rdr2\rdbss\ntdevfcb.c @ 491]
  315. ffffc88d`adf754a0 fffff801`61c5c97d     : fffff801`61c4f370 00000000`00001000 ffffa80d`05c77e50 ffffa80c`ffd7f060 : nfs41_driver!RxFsdCommonDispatch+0x442 [base\fs\rdr2\rdbss\ntfsd.c @ 848]
  316. ffffc88d`adf755a0 fffff801`61c3a927     : ffffa80d`04e68570 00000000`00000001 00000000`00000000 00000000`00000000 : nfs41_driver!RxFsdDispatch+0xfd [base\fs\rdr2\rdbss\ntfsd.c @ 442]
  317. ffffc88d`adf755d0 fffff801`5ce10665     : ffffa80c`ffd7f060 ffffa80d`057eadc0 ffffa80d`05872730 fffff801`5ce1ffcb : nfs41_driver!nfs41_FsdDispatch+0x67 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c @ 6618]
  318. ffffc88d`adf75610 fffff801`60d6f248     : fffff801`60d68000 00000000`00000000 ffffa80c`ffb13950 ffffa80d`04a8ce78 : nt!IofCallDriver+0x55
  319. ffffc88d`adf75650 fffff801`60d6ed99     : ffffe28e`2d61bd80 00000000`00000000 fffff801`60d68000 00000000`00000000 : mup!MupiCallUncProvider+0xb8
  320. ffffc88d`adf756c0 fffff801`60d6ecce     : ffffa80d`057eadc0 ffffa80d`04a8ce70 ffffa80d`05c77e50 00000000`00000000 : mup!MupStateMachine+0x59
  321. ffffc88d`adf756f0 fffff801`5ce10665     : ffffa80d`05c77e50 00000000`00000000 ffffa80d`04e68570 00000000`00000001 : mup!MupFsdIrpPassThrough+0x17e
  322. ffffc88d`adf75760 fffff801`5a044a76     : 00000000`00282018 ffffc88d`adf75958 ffffa80c`ffd7f060 fffff801`5d202441 : nt!IofCallDriver+0x55
  323. ffffc88d`adf757a0 fffff801`5ce10665     : 00000000`00000002 00000000`00000000 ffffc88d`20206f49 ffffc88d`adf75958 : FLTMGR!FltpDispatch+0xd6
  324. ffffc88d`adf75800 fffff801`5d20142c     : 00000000`00000001 ffffa80d`057eaf68 ffffa80d`05c77e50 ffffa80d`057c0080 : nt!IofCallDriver+0x55
  325. ffffc88d`adf75840 fffff801`5d201081     : ffffa80d`057eaf68 ffffc88d`adf75b80 00000000`00000005 ffffa80d`057eaf68 : nt!IopSynchronousServiceTail+0x34c
  326. ffffc88d`adf758e0 fffff801`5d2003f6     : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xc71
  327. ffffc88d`adf75a20 fffff801`5d010ef5     : 00000000`00000000 fffff801`5ce204de ffffa80d`04339080 00000084`2a3d2000 : nt!NtDeviceIoControlFile+0x56
  328. ffffc88d`adf75a90 00007ffa`549cd0c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
  329. 00000084`2c0fdac8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`549cd0c4
  330.  
  331.  
  332. FAULTING_SOURCE_LINE:  C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c
  333.  
  334. FAULTING_SOURCE_FILE:  C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c
  335.  
  336. FAULTING_SOURCE_LINE_NUMBER:  1331
  337.  
  338. FAULTING_SOURCE_CODE:  
  339.   1327:     PLOWIO_CONTEXT LowIoContext = &RxContext->LowIoContext;
  340.   1328:     ULONG cbOut = LowIoContext->ParamsFor.IoCtl.OutputBufferLength;
  341.   1329:     unsigned char *pbOut = LowIoContext->ParamsFor.IoCtl.pOutputBuffer;
  342.   1330:
  343. > 1331:     status = SeImpersonateClientEx(entry->psec_ctx, NULL);
  344.   1332:     if (status != STATUS_SUCCESS) {
  345.   1333:         print_error("SeImpersonateClientEx failed %x\n", status);
  346.   1334:         goto out;
  347.   1335:     }
  348.   1336:
  349.  
  350.  
  351. SYMBOL_NAME:  nfs41_driver!handle_upcall+59
  352.  
  353. MODULE_NAME: nfs41_driver
  354.  
  355. IMAGE_NAME:  nfs41_driver.sys
  356.  
  357. STACK_COMMAND:  .cxr 0xffffc88dadf747c0 ; kb
  358.  
  359. BUCKET_ID_FUNC_OFFSET:  59
  360.  
  361. FAILURE_BUCKET_ID:  0x27_nfs41_driver!handle_upcall
  362.  
  363. OS_VERSION:  10.0.19041.1
  364.  
  365. BUILDLAB_STR:  vb_release
  366.  
  367. OSPLATFORM_TYPE:  x64
  368.  
  369. OSNAME:  Windows 10
  370.  
  371. FAILURE_ID_HASH:  {8cc3c03c-4f74-c78a-fa41-0d8f60b7b819}
  372.  
  373. Followup:     MachineOwner
  374. ---------
  375.  
  376. 1: kd> ~*kp
  377.        ^ Syntax error in '~*kp'
  378. 1: kd> kp
  379.  # Child-SP          RetAddr               Call Site
  380. 00 ffffc88d`adf73f18 fffff801`61c471c9     nt!KeBugCheckEx
  381. 01 ffffc88d`adf73f20 fffff801`61c4afc0     nfs41_driver!RxExceptionFilter(struct _RX_CONTEXT * RxContext = 0xffffa80d`047f7010, struct _EXCEPTION_POINTERS * ExceptionPointer = 0xffffc88d`adf74000)+0x159 [base\fs\rdr2\rdbss\ntexcept.c @ 126]
  382. 02 ffffc88d`adf73f90 fffff801`5cfd01bf     nfs41_driver!RxFsdCommonDispatch$filt$0+0x15 [base\fs\rdr2\rdbss\ntfsd.c @ 876]
  383. 03 ffffc88d`adf73fd0 fffff801`5d007d2f     nt!_C_specific_handler+0x9f
  384. 04 ffffc88d`adf74040 fffff801`5ceca3c7     nt!RtlpExecuteHandlerForException+0xf
  385. 05 ffffc88d`adf74070 fffff801`5cec94e6     nt!RtlDispatchException+0x297
  386. 06 ffffc88d`adf74790 fffff801`5d01186c     nt!KiDispatchException+0x186
  387. 07 ffffc88d`adf74e50 fffff801`5d00ce5a     nt!KiExceptionDispatch+0x12c
  388. 08 ffffc88d`adf75030 fffff801`5d1f7617     nt!KiGeneralProtectionFault+0x31a
  389. 09 ffffc88d`adf751c0 fffff801`5d1f7ac6     nt!SeTokenCanImpersonate+0x47
  390. 0a ffffc88d`adf75230 fffff801`5d321035     nt!PsImpersonateClient+0x126
  391. 0b ffffc88d`adf752c0 fffff801`61c34869     nt!SeImpersonateClientEx+0x35
  392. 0c ffffc88d`adf75300 fffff801`61c400d7     nfs41_driver!handle_upcall(struct _RX_CONTEXT * RxContext = 0xffffa80d`047f7010, struct _updowncall_entry * entry = 0xffffa80d`06f441c0, unsigned long * len = 0xffffc88d`adf75384)+0x59 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c @ 1331]
  393. 0d ffffc88d`adf75350 fffff801`61c39de8     nfs41_driver!nfs41_upcall(struct _RX_CONTEXT * RxContext = 0xffffa80d`047f7010)+0xe7 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c @ 1547]
  394. 0e ffffc88d`adf753c0 fffff801`61c65976     nfs41_driver!nfs41_DevFcbXXXControlFile(struct _RX_CONTEXT * RxContext = 0xffffa80d`047f7010)+0x128 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c @ 2363]
  395. 0f ffffc88d`adf75440 fffff801`61c65698     nfs41_driver!RxXXXControlFileCallthru(struct _RX_CONTEXT * RxContext = 0xffffa80d`047f7010, struct _IRP * Irp = 0xffffa80d`057eadc0)+0x76 [base\fs\rdr2\rdbss\ntdevfcb.c @ 130]
  396. 10 ffffc88d`adf75470 fffff801`61c45a52     nfs41_driver!RxCommonDevFCBIoCtl(struct _RX_CONTEXT * RxContext = 0xffffa80d`047f7010, struct _IRP * Irp = <Value unavailable error>)+0x58 [base\fs\rdr2\rdbss\ntdevfcb.c @ 491]
  397. 11 ffffc88d`adf754a0 fffff801`61c5c97d     nfs41_driver!RxFsdCommonDispatch(struct _RX_FSD_DISPATCH_VECTOR * DispatchVector = 0xfffff801`61c4f370, struct _IRP * Irp = 0xffffa80d`057eadc0, struct _FILE_OBJECT * FileObject = 0xffffa80d`05c77e50 "" - Device for "\FileSystem\Mup", struct _RDBSS_DEVICE_OBJECT * RxDeviceObject = 0xffffa80c`ffd7f060)+0x442 [base\fs\rdr2\rdbss\ntfsd.c @ 848]
  398. 12 ffffc88d`adf755a0 fffff801`61c3a927     nfs41_driver!RxFsdDispatch(struct _RDBSS_DEVICE_OBJECT * RxDeviceObject = <Value unavailable error>, struct _IRP * Irp = <Value unavailable error>)+0xfd [base\fs\rdr2\rdbss\ntfsd.c @ 442]
  399. 13 ffffc88d`adf755d0 fffff801`5ce10665     nfs41_driver!nfs41_FsdDispatch(struct _DEVICE_OBJECT * dev = 0xffffa80c`ffd7f060 Device for "\FileSystem\nfs41_driver", struct _IRP * Irp = 0xffffa80d`057eadc0)+0x67 [C:\cygwin64\home\roland_mainz\work\msnfs41_uidmapping\ms-nfs41-client\sys\nfs41_driver.c @ 6618]
  400. 14 ffffc88d`adf75610 fffff801`60d6f248     nt!IofCallDriver+0x55
  401. 15 ffffc88d`adf75650 fffff801`60d6ed99     mup!MupiCallUncProvider+0xb8
  402. 16 ffffc88d`adf756c0 fffff801`60d6ecce     mup!MupStateMachine+0x59
  403. 17 ffffc88d`adf756f0 fffff801`5ce10665     mup!MupFsdIrpPassThrough+0x17e
  404. 18 ffffc88d`adf75760 fffff801`5a044a76     nt!IofCallDriver+0x55
  405. 19 ffffc88d`adf757a0 fffff801`5ce10665     FLTMGR!FltpDispatch+0xd6
  406. 1a ffffc88d`adf75800 fffff801`5d20142c     nt!IofCallDriver+0x55
  407. 1b ffffc88d`adf75840 fffff801`5d201081     nt!IopSynchronousServiceTail+0x34c
  408. 1c ffffc88d`adf758e0 fffff801`5d2003f6     nt!IopXxxControlFile+0xc71
  409. 1d ffffc88d`adf75a20 fffff801`5d010ef5     nt!NtDeviceIoControlFile+0x56
  410. 1e ffffc88d`adf75a90 00007ffa`549cd0c4     nt!KiSystemServiceCopyEnd+0x25
  411. 1f 00000084`2c0fdac8 00000000`00000000     0x00007ffa`549cd0c4

Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.

Syntax highlighting:

To highlight particular lines, prefix each line with {%HIGHLIGHT}




All content is user-submitted.
The administrators of this site (kpaste.net) are not responsible for their content.
Abuse reports should be emailed to us at