KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80579c42660, The address that the exception occurred at
Arg3: fffff902a908e578, Parameter 0 of the exception
Arg4: fffff902a908ddb0, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 10030
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 44154
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80579c42660
BUGCHECK_P3: fffff902a908e578
BUGCHECK_P4: fffff902a908ddb0
WRITE_ADDRESS: fffff805782fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8057820f340: Unable to get Flags value from nt!KdVersionBlock
fffff8057820f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff902a908ddb0
EXCEPTION_PARAMETER1: fffff902a908e578
EXCEPTION_PARAMETER2: fffff902a908ddb0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: FIFA21.exe
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
STACK_TEXT:
fffff902`a908d538 fffff805`77b0e6bf : 00000000`0000001e ffffffff`c0000005 fffff805`79c42660 fffff902`a908e578 : nt!KeBugCheckEx
fffff902`a908d540 fffff805`77a0d066 : fffff902`a908ddb0 fffff805`7788db25 fffff902`a908e7b0 fffff805`79c42660 : nt!KiFatalFilter+0x1f
fffff902`a908d580 fffff805`779cb25f : fffff805`00000002 fffff805`776c9aa4 fffff902`a9089000 fffff902`a9090000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
fffff902`a908d5c0 fffff805`779fd45f : fffff805`776c9aa4 fffff902`a908dba0 fffff805`779cb1c0 00000000`00000000 : nt!_C_specific_handler+0x9f
fffff902`a908d630 fffff805`77852d97 : fffff902`a908dba0 00000000`00000000 fffff902`a908f110 fffff805`7780d468 : nt!RtlpExecuteHandlerForException+0xf
fffff902`a908d660 fffff805`778519a6 : fffff902`a908e578 fffff902`a908e2b0 fffff902`a908e578 ffff9b8d`8b545c48 : nt!RtlDispatchException+0x297
fffff902`a908dd80 fffff805`77a066ac : 00000000`00001000 fffff902`a908e620 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
fffff902`a908e440 fffff805`77a02843 : 00000000`00003000 00000000`00007000 ffff9b8d`8b545590 00000000`ffffffff : nt!KiExceptionDispatch+0x12c
fffff902`a908e620 fffff805`79c42660 : ffff9b8d`00003000 fffff805`00000000 ffff9b8d`91c03700 00000000`00000000 : nt!KiPageFault+0x443
fffff902`a908e7b0 fffff805`79c43c8d : ffff9b8d`8eaf6528 ffff9b8d`8b545590 ffff9b8d`8252bc20 00000000`00004000 : Ntfs!NtfsPostWriteProcessing+0x54
fffff902`a908e850 fffff805`79c42de3 : ffff9b8d`8eaf6528 ffff9b8d`8b545590 fffff902`a908f5a8 00000000`00000000 : Ntfs!NtfsCommonWrite+0xc2d
fffff902`a908ea80 fffff805`778cd805 : ffff9b8d`93557300 ffff9b8d`8b545590 ffff9b8d`8b545590 ffff9b8d`824bdb90 : Ntfs!NtfsFsdWrite+0x1d3
fffff902`a908eb50 fffff805`73b06ccf : 00060001`00000001 fffff805`00000002 00000000`00000000 fffff805`0000001a : nt!IofCallDriver+0x55
fffff902`a908eb90 fffff805`73b048d3 : fffff902`a908ec20 00000000`7162e300 ffff9b8d`7fe0a7d0 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
fffff902`a908ec00 fffff805`778cd805 : ffff9b8d`890ee4e0 00000000`00000004 fffff902`a908f000 00000000`00000000 : FLTMGR!FltpDispatch+0xa3
fffff902`a908ec60 fffff805`778cd805 : fffff902`a908ed70 fffff805`73b04b46 fffff902`a9090000 fffff902`a9089000 : nt!IofCallDriver+0x55
fffff902`a908eca0 fffff805`73b06ccf : 00000000`00000200 00000000`00000000 00000000`000006b8 fffff805`77fb1094 : nt!IofCallDriver+0x55
fffff902`a908ece0 fffff805`73b048d3 : fffff902`a908ed70 00000000`7162e368 00000000`00000015 ffff9b8d`85849840 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
fffff902`a908ed50 fffff805`778cd805 : ffff9b8d`8b545590 fffff805`778cd847 00000000`00000015 ffffc38f`0cc1a200 : FLTMGR!FltpDispatch+0xa3
fffff902`a908edb0 fffff805`7791a31f : ffff9b8d`823f84b0 ffff9b8d`8b545590 ffff9b8d`7fe0a7d0 fffff902`a908f080 : nt!IofCallDriver+0x55
fffff902`a908edf0 fffff805`7789defe : ffffc38f`0cc0ad00 00000000`00000008 fffff902`a908f040 fffff805`79d0b4d1 : nt!IoSynchronousPageWriteEx+0x13b
fffff902`a908ee30 fffff805`79c3f368 : ffffc38f`0cc1a2c8 fffff805`79c3f30f 00000000`00000000 00000000`00000000 : nt!IoSynchronousPageWrite+0x1e
fffff902`a908ee80 fffff805`79c3e575 : 00000000`7162e368 00000000`00004000 00000000`00000000 00000000`00000000 : Ntfs!LfsFlushHeadOfTheLog+0x4c
fffff902`a908eec0 fffff805`79c3dd85 : ffffc38f`0cc0ad00 00000000`7162e368 00000000`00000000 fffff902`a908f100 : Ntfs!LfsFlushLfcb+0x7d5
fffff902`a908f0e0 fffff805`7780d468 : fffff902`a908f1f0 ffffc38f`0cc0ad00 00000000`00000000 00000000`00000701 : Ntfs!LfsFlushLfcbCallout+0x25
fffff902`a908f110 fffff805`7780d3dd : fffff805`79c3dd60 fffff902`a908f1f0 00000000`00000000 00000000`00000010 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff902`a908f180 fffff805`79c42180 : 00000000`00000000 fffff902`a908f300 ffffc38f`0cc0ad00 00000000`00000008 : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff902`a908f1c0 fffff805`79d25db2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000727 : Ntfs!LfsFlushLfcbOnNewStack+0x58
fffff902`a908f220 fffff805`79d25c0d : 7fffffff`ffffffff 00000000`00000000 ffff9b8d`92f84a98 7fffffff`ffffffff : Ntfs!LfsFlushToLsnPriv+0x14a
fffff902`a908f2c0 fffff805`79d269d5 : ffffc38f`0d59b070 ffff9b8d`82514180 ffffc38f`27a336e0 ffff9b8d`92f84a98 : Ntfs!LfsFlushToLsnWithoutDiskCacheFlush+0xa9
fffff902`a908f310 fffff805`79d25ef9 : ffff9b8d`92f84a98 ffff9b8d`945c9010 ffff9b8d`92f84a01 fffff902`a908f540 : Ntfs!NtfsCommonFlushBuffers+0x589
fffff902`a908f430 fffff805`7780d468 : fffff902`a908f540 ffff9b8d`92f84a98 ffff9b8d`00000000 ffff9b8d`945c9010 : Ntfs!NtfsCommonFlushBuffersCallout+0x19
fffff902`a908f460 fffff805`7780d3dd : fffff805`79d25ee0 fffff902`a908f540 00000000`00000000 fffff805`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff902`a908f4d0 fffff805`79d80f9b : 00000000`00000000 00000000`00000310 fffff902`a9090000 00000000`00000030 : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff902`a908f510 fffff805`79d80ec5 : 00000000`00000000 ffff9b8d`7feca3c0 fffff902`a908f5a8 00000000`00000000 : Ntfs!NtfsCommonFlushBuffersOnNewStack+0x67
fffff902`a908f580 fffff805`778cd805 : ffff9b8d`93557300 ffff9b8d`945c9010 ffff9b8d`92f84a98 fffff902`a908f5a8 : Ntfs!NtfsFsdFlushBuffers+0xe5
fffff902`a908f5f0 fffff805`73b06ccf : 00060000`00000001 fffff805`00000000 00000000`00000000 00000000`0000001f : nt!IofCallDriver+0x55
fffff902`a908f630 fffff805`73b048d3 : fffff902`a908f6c0 00000000`00000000 ffff9b8d`8ef999a0 ffff9b8d`7fdaa680 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
fffff902`a908f6a0 fffff805`778cd805 : ffff9b8d`890ee4e0 00000000`00000009 ffff9b8d`8ef99900 00000000`00000000 : FLTMGR!FltpDispatch+0xa3
fffff902`a908f700 fffff805`778cd805 : fffff902`a908f810 fffff805`73b04b46 fffff902`a9090000 fffff902`a9089000 : nt!IofCallDriver+0x55
fffff902`a908f740 fffff805`73b06ccf : 00000000`00000001 fffff805`778660c0 00000000`0000000f ffff9b8d`91c036d0 : nt!IofCallDriver+0x55
fffff902`a908f780 fffff805`73b048d3 : fffff902`a908f810 00000000`00000000 00000000`00000001 ffff9b8d`85849840 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
fffff902`a908f7f0 fffff805`778cd805 : ffff9b8d`945c9010 00000000`00000001 fffff902`00000000 00000000`00000000 : FLTMGR!FltpDispatch+0xa3
fffff902`a908f850 fffff805`77cc2528 : fffff902`a908fa80 ffff9b8d`945c9010 00000000`00000001 fffff805`00000000 : nt!IofCallDriver+0x55
fffff902`a908f890 fffff805`77c703d9 : ffff9b8d`00000000 fffff902`a908fa80 00000000`00000000 fffff902`a908fa80 : nt!IopSynchronousServiceTail+0x1a8
fffff902`a908f930 fffff805`77c701c6 : ffff9b8d`91c03080 00000000`00000000 ffff9b8d`87b702b0 00000000`00000000 : nt!NtFlushBuffersFileEx+0x1f9
fffff902`a908f9c0 fffff805`77a05fb5 : ffff9b8d`91c03080 00000000`00000000 ffffffff`feced300 ffff9b8d`00000000 : nt!NtFlushBuffersFile+0x16
fffff902`a908fa00 00007ffe`9052c6f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`0522fc88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`9052c6f4
SYMBOL_NAME: Ntfs!NtfsPostWriteProcessing+54
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 54
FAILURE_BUCKET_ID: 0x1E_c0000005_Ntfs!NtfsPostWriteProcessing
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {712530de-9701-1abe-5421-6f2ca8d91d5e}
Followup: MachineOwner
---------
KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000011, Type of corruption detected
Arg2: ffffbb0125c02100, Address of the heap that reported the corruption
Arg3: ffffbb0132ce2470, Address at which the corruption was detected
Arg4: 0000000000000000
Debugging Details:
------------------
fffff803040fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8030400f340: Unable to get Flags value from nt!KdVersionBlock
HeapDbgInitExtension Failed
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 11828
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 22527
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 13a
BUGCHECK_P1: 11
BUGCHECK_P2: ffffbb0125c02100
BUGCHECK_P3: ffffbb0132ce2470
BUGCHECK_P4: 0
POOL_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8030400f340: Unable to get Flags value from nt!KdVersionBlock
fffff8030400f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffbb0132ce2470
FREED_POOL_TAG: Mdl_
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: FIFA21.exe
DPC_STACK_BASE: FFFFF80308874FB0
STACK_TEXT:
fffff803`088741a8 fffff803`0398d2c8 : 00000000`0000013a 00000000`00000011 ffffbb01`25c02100 ffffbb01`32ce2470 : nt!KeBugCheckEx
fffff803`088741b0 fffff803`0398d328 : 00000000`00000011 00000000`00000000 ffffbb01`25c02100 00000000`00000000 : nt!RtlpHeapHandleError+0x40
fffff803`088741f0 fffff803`0398cf55 : 00000000`000000d0 ffffbb01`32cbe000 ffffbb01`26cd0678 00000000`00000000 : nt!RtlpHpHeapHandleError+0x58
fffff803`08874220 fffff803`0382135e : 00000000`00000000 00000000`00000000 ffffe280`f5992480 ffff00f7`c8d67549 : nt!RtlpLogHeapFailure+0x45
fffff803`08874250 fffff803`036c73a2 : ffffbb01`25c02340 00000000`000000ff 00000000`00000000 00000000`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x1f87de
fffff803`08874300 fffff803`03db1019 : ffffbb01`00000000 ffffbb01`291fc6d0 fffff803`088744f9 01000000`00100000 : nt!ExFreeHeapPool+0x362
fffff803`088743e0 fffff803`0366cc6a : ffffbb01`292a6000 00000000`00000000 00000000`00000000 ffffbb01`292a55d0 : nt!ExFreePool+0x9
fffff803`08874410 fffff803`082a27b6 : fffff803`08875000 fffff803`0886e000 ffffbb01`292a5720 ffffbb01`292c4030 : nt!IoFreeMdl+0x9a
fffff803`08874440 fffff803`08875000 : fffff803`0886e000 ffffbb01`292a5720 ffffbb01`292c4030 ffffbb01`352254d3 : TWZDISK+0x27b6
fffff803`08874448 fffff803`0886e000 : ffffbb01`292a5720 ffffbb01`292c4030 ffffbb01`352254d3 fffff803`036c310e : 0xfffff803`08875000
fffff803`08874450 ffffbb01`292a5720 : ffffbb01`292c4030 ffffbb01`352254d3 fffff803`036c310e ffffbb01`35225010 : 0xfffff803`0886e000
fffff803`08874458 ffffbb01`292c4030 : ffffbb01`352254d3 fffff803`036c310e ffffbb01`35225010 00000000`00000000 : 0xffffbb01`292a5720
fffff803`08874460 ffffbb01`352254d3 : fffff803`036c310e ffffbb01`35225010 00000000`00000000 ffffbb01`35225010 : 0xffffbb01`292c4030
fffff803`08874468 fffff803`036c310e : ffffbb01`35225010 00000000`00000000 ffffbb01`35225010 ffffbb01`26cbc7d0 : 0xffffbb01`352254d3
fffff803`08874470 fffff803`036c2fd7 : 00000000`00000000 ffffbb01`35225301 ffffbb01`35225010 ffffbb01`292ad040 : nt!IopfCompleteRequest+0x11e
fffff803`08874560 fffff803`08445843 : 00000000`00000000 ffffbb01`3044c6c0 ffffbb01`3037d010 ffffbb01`3037d010 : nt!IofCompleteRequest+0x17
fffff803`08874590 fffff803`036c310e : ffffe280`f5a6f000 fffff803`088747b0 00000000`00000002 00000310`00000018 : CLASSPNP!TransferPktComplete+0x5e3
fffff803`088747a0 fffff803`036c2fd7 : ffffe280`f5a6f148 fffff803`0379e501 ffffbb01`26c64260 fffff803`08874a90 : nt!IopfCompleteRequest+0x11e
fffff803`08874890 fffff803`075e99e1 : fffff803`08874a90 fffff803`0379e4dd 00000000`00000000 ffffbb01`26c64260 : nt!IofCompleteRequest+0x17
fffff803`088748c0 fffff803`075e9354 : ffffe280`f5a6f020 00000000`00989680 fffff803`08874a90 ffffbb01`26cc11a0 : storport!RaidCompleteRequestEx+0x91
fffff803`08874990 fffff803`075f8edc : fffff803`08874b70 00000000`00000000 fffff780`00000320 ffffe280`f5a6f020 : storport!RaidUnitCompleteRequest+0xf64
fffff803`08874b10 fffff803`036e549e : fffff803`08874e70 ffffbb01`264ca000 fffff803`08874e70 fffff803`00000002 : storport!RaidpAdapterRedirectDpcRoutine+0x8c
fffff803`08874bb0 fffff803`036e4784 : fffff803`0069e180 00000000`00000000 00000000`00000008 00000000`0000849b : nt!KiExecuteAllDpcs+0x30e
fffff803`08874d20 fffff803`037fb5e5 : 00000000`00000000 fffff803`0069e180 ffffe280`f5174c80 00000000`58cce100 : nt!KiRetireDpcList+0x1f4
fffff803`08874fb0 fffff803`037fb3d0 : ffff8d0f`7f1a59d8 fffff803`0367460a 00000000`b041e130 00000001`63a937c0 : nt!KxRetireDpcList+0x5
ffff8d0f`7f1a59c0 fffff803`037fac85 : 00000000`58cce100 fffff803`037f6111 00000000`0000e91d 00000000`00000000 : nt!KiDispatchInterruptContinue
ffff8d0f`7f1a59f0 fffff803`037f6111 : 00000000`0000e91d 00000000`00000000 00000000`00000000 ffffbb01`00000000 : nt!KiDpcInterruptBypass+0x25
ffff8d0f`7f1a5a00 00000001`4263e394 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
00000000`b041f7b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00000001`4263e394
SYMBOL_NAME: TWZDISK+27b6
MODULE_NAME: TWZDISK
IMAGE_NAME: TWZDISK.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 27b6
FAILURE_BUCKET_ID: 0x13a_11_Mdl__TWZDISK!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {af87058a-45d3-32b6-fb58-f4071e557585}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80710a42660, The address that the exception occurred at
Arg3: ffff9f0f1ce94d98, Parameter 0 of the exception
Arg4: ffff9f0f1ce945d0, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6953
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 12823
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80710a42660
BUGCHECK_P3: ffff9f0f1ce94d98
BUGCHECK_P4: ffff9f0f1ce945d0
WRITE_ADDRESS: fffff8070e8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8070e80f340: Unable to get Flags value from nt!KdVersionBlock
fffff8070e80f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff9f0f1ce945d0
EXCEPTION_PARAMETER1: ffff9f0f1ce94d98
EXCEPTION_PARAMETER2: ffff9f0f1ce945d0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
STACK_TEXT:
ffff9f0f`1ce93d58 fffff807`0e10e6bf : 00000000`0000001e ffffffff`c0000005 fffff807`10a42660 ffff9f0f`1ce94d98 : nt!KeBugCheckEx
ffff9f0f`1ce93d60 fffff807`0e00d066 : ffff9f0f`1ce945d0 fffff807`0de8db25 ffff9f0f`1ce94fd0 fffff807`10a42660 : nt!KiFatalFilter+0x1f
ffff9f0f`1ce93da0 fffff807`0dfcb25f : fffff807`00000002 fffff807`0dcc9aa4 ffff9f0f`1ce91000 ffff9f0f`1ce98000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
ffff9f0f`1ce93de0 fffff807`0dffd45f : fffff807`0dcc9aa4 ffff9f0f`1ce943c0 fffff807`0dfcb1c0 00000000`00000000 : nt!_C_specific_handler+0x9f
ffff9f0f`1ce93e50 fffff807`0de52d97 : ffff9f0f`1ce943c0 00000000`00000000 ffff9f0f`1ce95930 fffff807`0de0d468 : nt!RtlpExecuteHandlerForException+0xf
ffff9f0f`1ce93e80 fffff807`0de519a6 : ffff9f0f`1ce94d98 ffff9f0f`1ce94ad0 ffff9f0f`1ce94d98 ffff8a8c`c601add8 : nt!RtlDispatchException+0x297
ffff9f0f`1ce945a0 fffff807`0e0066ac : 00000000`00001000 ffff9f0f`1ce94e40 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffff9f0f`1ce94c60 fffff807`0e002843 : 00000000`00002000 00000000`00018000 ffff8a8c`c601a720 00000000`ffffffff : nt!KiExceptionDispatch+0x12c
ffff9f0f`1ce94e40 fffff807`10a42660 : ffff8a8c`00002000 fffff807`00000000 ffff8a8c`c5a6d600 00000000`00000000 : nt!KiPageFault+0x443
ffff9f0f`1ce94fd0 fffff807`10a43c8d : ffff8a8c`c0d5ba28 ffff8a8c`c601a720 ffff8a8c`bd0da010 00000000`00016000 : Ntfs!NtfsPostWriteProcessing+0x54
ffff9f0f`1ce95070 fffff807`10a42de3 : ffff8a8c`c0d5ba28 ffff8a8c`c601a720 ffff9f0f`1ce96900 00000000`00000000 : Ntfs!NtfsCommonWrite+0xc2d
ffff9f0f`1ce952a0 fffff807`0decd805 : ffff8a8c`c34385a0 ffff8a8c`c601a720 ffff8a8c`c601a720 ffff8a8c`bae39d60 : Ntfs!NtfsFsdWrite+0x1d3
ffff9f0f`1ce95370 fffff807`0a8f6ccf : 00060001`00000001 fffff807`00000002 00000000`00000000 ffffc701`0000001a : nt!IofCallDriver+0x55
ffff9f0f`1ce953b0 fffff807`0a8f48d3 : ffff9f0f`1ce95440 00000000`592c0a00 ffff8a8c`baafe630 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffff9f0f`1ce95420 fffff807`0decd805 : ffff8a8c`c43bfdc0 00000000`00000004 ffff9f0f`1ce95800 00000000`00000000 : FLTMGR!FltpDispatch+0xa3
ffff9f0f`1ce95480 fffff807`0decd805 : ffff9f0f`1ce95590 fffff807`0a8f4b46 ffff9f0f`1ce98000 ffff9f0f`1ce91000 : nt!IofCallDriver+0x55
ffff9f0f`1ce954c0 fffff807`0a8f6ccf : 00000000`00000200 00000000`00000000 00000000`000006b8 fffff807`0e5b1094 : nt!IofCallDriver+0x55
ffff9f0f`1ce95500 fffff807`0a8f48d3 : ffff9f0f`1ce95590 00000000`592c0a13 00000000`00000015 ffff8a8c`ba947440 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffff9f0f`1ce95570 fffff807`0decd805 : ffff8a8c`c601a720 fffff807`0decd847 00000000`00000015 ffffc701`37011200 : FLTMGR!FltpDispatch+0xa3
ffff9f0f`1ce955d0 fffff807`0df1a31f : ffff8a8c`baff8720 ffff8a8c`c601a720 ffff8a8c`baafe630 ffff9f0f`1ce958a0 : nt!IofCallDriver+0x55
ffff9f0f`1ce95610 fffff807`0de9defe : ffffc701`35bef5e0 00000000`00000009 ffff9f0f`1ce95860 fffff807`10b0b4d1 : nt!IoSynchronousPageWriteEx+0x13b
ffff9f0f`1ce95650 fffff807`10a3f368 : ffffc701`370112c8 fffff807`10a3f30f 00000000`00000000 00000000`00000000 : nt!IoSynchronousPageWrite+0x1e
ffff9f0f`1ce956a0 fffff807`10a3e575 : 00000000`592c0a13 00000000`00016000 00000000`00000000 00000000`00000000 : Ntfs!LfsFlushHeadOfTheLog+0x4c
ffff9f0f`1ce956e0 fffff807`10a3dd85 : ffffc701`35bef5e0 00000000`592c0a13 ffff8a8c`c5cecc00 ffff9f0f`1ce95a01 : Ntfs!LfsFlushLfcb+0x7d5
ffff9f0f`1ce95900 fffff807`0de0d468 : ffff9f0f`1ce95a10 ffffc701`35bef5e0 00000000`00000000 ffff8a8c`c5cecc01 : Ntfs!LfsFlushLfcbCallout+0x25
ffff9f0f`1ce95930 fffff807`0de0d3dd : fffff807`10a3dd60 ffff9f0f`1ce95a10 00000000`00000000 00000000`00000010 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff9f0f`1ce959a0 fffff807`10a42180 : 00000000`00000001 00000000`00000000 ffffc701`35bef5e0 00000000`00000009 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffff9f0f`1ce959e0 fffff807`10b25db2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!LfsFlushLfcbOnNewStack+0x58
ffff9f0f`1ce95a40 fffff807`10b25c0d : 00000000`592c0a13 ffff9f0f`1ce95d90 00000000`00004000 00000000`592c0a13 : Ntfs!LfsFlushToLsnPriv+0x14a
ffff9f0f`1ce95ae0 fffff807`10a44544 : ffffc701`35f9b480 00000000`592c0a13 00000000`00000000 00000000`00004000 : Ntfs!LfsFlushToLsnWithoutDiskCacheFlush+0xa9
ffff9f0f`1ce95b30 fffff807`10a42de3 : ffff8a8c`c5cecc48 ffff8a8c`c64ec010 ffff9f0f`1ce96900 00000000`00000000 : Ntfs!NtfsCommonWrite+0x14e4
ffff9f0f`1ce95d60 fffff807`0decd805 : ffff8a8c`c4616010 ffff8a8c`c64ec010 ffff8a8c`c64ec010 ffff8a8c`bae39d60 : Ntfs!NtfsFsdWrite+0x1d3
ffff9f0f`1ce95e30 fffff807`0a8f6ccf : 00060001`00000001 fffff807`00000002 00000000`00000000 ffff9f0f`0000001a : nt!IofCallDriver+0x55
ffff9f0f`1ce95e70 fffff807`0a8f48d3 : ffff9f0f`1ce95f00 ffff9f0f`1ce96200 ffff8a8c`c7940e90 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffff9f0f`1ce95ee0 fffff807`0decd805 : ffff8a8c`c43bfdc0 00000000`00000004 ffff9f0f`1ce96100 00000000`00000000 : FLTMGR!FltpDispatch+0xa3
ffff9f0f`1ce95f40 fffff807`0decd805 : ffff9f0f`1ce96050 fffff807`0a8f4b46 ffff9f0f`1ce98000 ffff9f0f`1ce91000 : nt!IofCallDriver+0x55
ffff9f0f`1ce95f80 fffff807`0a8f6ccf : 00000000`00000200 00000000`00000000 00000000`000006b8 fffff807`0e5b1094 : nt!IofCallDriver+0x55
ffff9f0f`1ce95fc0 fffff807`0a8f48d3 : ffff9f0f`1ce96050 ffff9f0f`1ce962c0 00000000`00000015 ffff8a8c`ba947440 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffff9f0f`1ce96030 fffff807`0decd805 : ffff8a8c`c64ec010 fffff807`0decd847 00000000`00000015 00000000`00000000 : FLTMGR!FltpDispatch+0xa3
ffff9f0f`1ce96090 fffff807`0df1a31f : ffff9f0f`1ce962c0 ffff8a8c`c64ec010 ffff8a8c`c7940e90 ffff9f0f`1ce96150 : nt!IofCallDriver+0x55
ffff9f0f`1ce960d0 fffff807`0de8b6d0 : 00000000`00000000 ffff9f0f`1ce96170 ffff8a8c`c7940e90 fffff807`0df1dd9d : nt!IoSynchronousPageWriteEx+0x13b
ffff9f0f`1ce96110 fffff807`0def7c22 : 00000000`00000011 ffffc701`4716f010 00000000`00000000 00000000`00000000 : nt!MiIssueSynchronousFlush+0x70
ffff9f0f`1ce96190 fffff807`0df0d569 : ffff9f0f`1ce964d0 ffff9f0f`1ce96728 ffff8a8c`c7940e90 00000000`00000000 : nt!MiFlushSectionInternal+0x862
ffff9f0f`1ce96460 fffff807`0df0a1ca : 00000000`00000000 ffff8a8c`c5a6d080 00000000`00004000 00000000`00000000 : nt!MmFlushSection+0x155
ffff9f0f`1ce96510 fffff807`0de444ef : ffff8a8c`c79475c8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CcFlushCachePriv+0x42a
ffff9f0f`1ce96650 fffff807`10b252bd : 00000000`00000005 00000000`00000000 00000000`00000000 ffffc701`46558170 : nt!CcCoherencyFlushAndPurgeCache+0x6f
ffff9f0f`1ce966a0 fffff807`10b2517b : ffffc701`46558170 00000000`00000004 ffff8a8c`c2a57701 ffff8a8c`c2a57768 : Ntfs!NtfsCoherencyFlushAndPurgeCache+0x55
ffff9f0f`1ce966e0 fffff807`10b87f7e : 00000000`00000000 ffffc701`46558170 00000000`00000000 ffff8a8c`c2a57768 : Ntfs!NtfsFlushUserStream+0xa3
ffff9f0f`1ce96770 fffff807`10b0ebdf : ffff8a8c`c2a57768 ffffc701`46558170 ffff8a8c`bd0e8180 ffffc701`465583e0 : Ntfs!NtfsWriteUsnCloseRecord+0x172
ffff9f0f`1ce96810 fffff807`10b0e45d : ffff8a8c`c2a57768 00000000`00000001 00000000`00000000 00000000`00000000 : Ntfs!NtfsUserFsRequest+0x45f
ffff9f0f`1ce96890 fffff807`0decd805 : ffff8a8c`c4616010 fffff807`0a8f4b46 ffff8a8c`c64ec720 ffff9f0f`1ce91000 : Ntfs!NtfsFsdFileSystemControl+0x17d
ffff9f0f`1ce969b0 fffff807`0a8f6ccf : 00000000`00000001 fffff807`00000000 00000000`00000000 00000000`00000023 : nt!IofCallDriver+0x55
ffff9f0f`1ce969f0 fffff807`0a92caf4 : ffff9f0f`1ce96a80 00000000`00090000 ffff8a8c`c7940e90 ffff8a8c`baa76300 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffff9f0f`1ce96a60 fffff807`0decd805 : ffff9f0f`1ce96b00 ffff8a8c`c43bfdc0 00000000`00000000 00000000`00000000 : FLTMGR!FltpFsControl+0x104
ffff9f0f`1ce96ac0 fffff807`0decd805 : ffff9f0f`1ce96bd0 fffff807`0a8f4b46 ffff8a8c`c43bfdc0 ffff8a8c`c26c6a50 : nt!IofCallDriver+0x55
ffff9f0f`1ce96b00 fffff807`0a8f6ccf : 00000000`00000200 00000000`00000000 00000000`000006b8 fffff807`0e5b1094 : nt!IofCallDriver+0x55
ffff9f0f`1ce96b40 fffff807`0a92caf4 : ffff9f0f`1ce96bd0 00000000`000900ef 00000000`00000015 ffff8a8c`ba947440 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffff9f0f`1ce96bb0 fffff807`0decd805 : ffff9f0f`1ce96d40 ffff8a8c`c64ec720 ffff9f0f`1ce96d40 ffffea80`00000000 : FLTMGR!FltpFsControl+0x104
ffff9f0f`1ce96c10 fffff807`0e2614de : 00000000`00000001 00000000`20534c53 00001720`0fd01d23 00000000`00000000 : nt!IofCallDriver+0x55
ffff9f0f`1ce96c50 fffff807`0e30d063 : 00000000`00000000 ffffc701`46a4e760 00001720`0fd01d23 00000000`00000000 : nt!FsRtlKernelFsControlFile+0x15e
ffff9f0f`1ce96ce0 fffff807`0e2a687e : ffffc701`46aee750 ffff8a8c`c7940e90 00000000`00000050 00000000`00000000 : nt!SPCallServerHandleFileUsnQuery+0x3b7
ffff9f0f`1ce96d70 fffff807`0e2a5365 : 00000000`00000000 ffff9f0f`1ce97230 000001fc`3e5b90d0 fffff807`0e2a5340 : nt!SPCall2ServerInternal+0x1506
ffff9f0f`1ce97110 fffff807`0de0d468 : ffff9f0f`1ce97a80 00000000`00000000 ffff8a8c`00000000 00000000`0000019c : nt!CmpCmdHiveOpen+0x2b5
ffff9f0f`1ce97150 fffff807`0de0d3dd : fffff807`0e2a5340 ffff9f0f`1ce97230 ffff9f0f`1ce97310 00000000`20534c53 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff9f0f`1ce971c0 fffff807`0e1e5c9c : 00000000`0000019c fffff807`0e5b1094 ffff8a8c`00000003 00000000`0000ffff : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffff9f0f`1ce97200 fffff807`0e1e5ba6 : 00000000`00000000 ffff9f0f`1ce97a80 00000000`00000000 00000000`00000000 : nt!ExHandleSPCall2+0x26c
ffff9f0f`1ce97260 fffff807`0e2f1d1b : 00000000`00000000 000000ec`8107dcc8 00000000`00000000 000000ec`8107dcc8 : nt!ExHandleSPCall2+0x176
ffff9f0f`1ce97300 fffff807`0e2f18c7 : 00000000`00003f88 000000ec`8107dc78 00000000`00000000 000001fc`3d7c6cd0 : nt!ExpQuerySystemInformation+0x30b
ffff9f0f`1ce979c0 fffff807`0e005fb5 : ffff8a8c`c5a60000 ffff8a8c`c42a7080 ffff9f0f`1ce97a80 ffffc701`43896a30 : nt!NtQuerySystemInformation+0x37
ffff9f0f`1ce97a00 00007ffa`c26ac454 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ec`8107d9d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`c26ac454
SYMBOL_NAME: Ntfs!NtfsPostWriteProcessing+54
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 54
FAILURE_BUCKET_ID: 0x1E_c0000005_Ntfs!NtfsPostWriteProcessing
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {712530de-9701-1abe-5421-6f2ca8d91d5e}
Followup: MachineOwner
---------
MULTIPLE_IRP_COMPLETE_REQUESTS (44)
A driver has requested that an IRP be completed (IoCompleteRequest()), but
the packet has already been completed. This is a tough bug to find because
the easiest case, a driver actually attempted to complete its own packet
twice, is generally not what happened. Rather, two separate drivers each
believe that they own the packet, and each attempts to complete it. The
first actually works, and the second fails. Tracking down which drivers
in the system actually did this is difficult, generally because the trails
of the first driver have been covered by the second. However, the driver
stack for the current request can be found by examining the DeviceObject
fields in each of the stack locations.
Arguments:
Arg1: ffffd4014423d010, Address of the IRP
Arg2: 000000000000257c
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7764
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 21104
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 44
BUGCHECK_P1: ffffd4014423d010
BUGCHECK_P2: 257c
BUGCHECK_P3: 0
BUGCHECK_P4: 0
IRP_ADDRESS: ffffd4014423d010
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: FIFA21.exe
DPC_STACK_BASE: FFFFF98718857FB0
STACK_TEXT:
fffff987`188572a8 fffff805`19a68e10 : 00000000`00000044 ffffd401`4423d010 00000000`0000257c 00000000`00000000 : nt!KeBugCheckEx
fffff987`188572b0 fffff805`198cea73 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopFreeIrp+0x19a380
fffff987`188572f0 fffff805`198c3ae7 : ffffd401`4423d010 fffff987`188573a9 00000000`00000000 00000000`00000000 : nt!IoFreeIrp+0x13
fffff987`18857320 fffff805`198c2fd7 : ffffd401`4423d010 00000000`00000000 00000000`00000000 ffffd401`370328d0 : nt!IopfCompleteRequest+0xaf7
fffff987`18857410 fffff805`1f4a27e1 : fffff987`18858000 fffff987`18851000 ffffd401`37032a20 ffffd401`374cb030 : nt!IofCompleteRequest+0x17
fffff987`18857440 fffff987`18858000 : fffff987`18851000 ffffd401`37032a20 ffffd401`374cb030 ffffd401`43c9b4f3 : TWZDISK+0x27e1
fffff987`18857448 fffff987`18851000 : ffffd401`37032a20 ffffd401`374cb030 ffffd401`43c9b4f3 fffff805`198c310e : 0xfffff987`18858000
fffff987`18857450 ffffd401`37032a20 : ffffd401`374cb030 ffffd401`43c9b4f3 fffff805`198c310e ffffd401`43c9b030 : 0xfffff987`18851000
fffff987`18857458 ffffd401`374cb030 : ffffd401`43c9b4f3 fffff805`198c310e ffffd401`43c9b030 00000000`00000000 : 0xffffd401`37032a20
fffff987`18857460 ffffd401`43c9b4f3 : fffff805`198c310e ffffd401`43c9b030 00000000`00000000 ffffd401`43c9b030 : 0xffffd401`374cb030
fffff987`18857468 fffff805`198c310e : ffffd401`43c9b030 00000000`00000000 ffffd401`43c9b030 ffffd401`34e0fca0 : 0xffffd401`43c9b4f3
fffff987`18857470 fffff805`198c2fd7 : 00000000`00000000 ffffd401`43c9b301 ffffd401`43c9b030 ffffd401`374b4040 : nt!IopfCompleteRequest+0x11e
fffff987`18857560 fffff805`1f645843 : 00000000`00000000 ffffd401`344894b0 ffffd401`3ea59e10 ffffd401`3ea59e10 : nt!IofCompleteRequest+0x17
fffff987`18857590 fffff805`198c310e : ffffac01`2fc72000 00000000`00000000 00000000`00000000 00000000`00000000 : CLASSPNP!TransferPktComplete+0x5e3
fffff987`188577a0 fffff805`198c2fd7 : ffffac01`2fc72178 fffff805`1999e501 ffffd401`34e60b20 fffff987`18857a90 : nt!IopfCompleteRequest+0x11e
fffff987`18857890 fffff805`1e7e99e1 : fffff987`18857a90 fffff805`1999e4dd 00000000`00000000 ffffd401`34e60b20 : nt!IofCompleteRequest+0x17
fffff987`188578c0 fffff805`1e7e9354 : ffffac01`2fc72020 00000000`00989680 fffff987`18857a90 ffffd401`34e921a0 : storport!RaidCompleteRequestEx+0x91
fffff987`18857990 fffff805`1e7f8edc : fffff987`18857b70 00000000`00000000 fffff780`00000320 ffffac01`2fc72020 : storport!RaidUnitCompleteRequest+0xf64
fffff987`18857b10 fffff805`198e549e : fffff987`18857e70 ffffd401`346ca000 fffff987`18857e70 ffffac01`00000002 : storport!RaidpAdapterRedirectDpcRoutine+0x8c
fffff987`18857bb0 fffff805`198e4784 : ffffac01`2f10b180 7024548d`00000000 00000000`00000008 00000000`0000b315 : nt!KiExecuteAllDpcs+0x30e
fffff987`18857d20 fffff805`199fb5e5 : d5e8cc33`48000000 ffffac01`2f10b180 00000000`00000000 00000000`00770000 : nt!KiRetireDpcList+0x1f4
fffff987`18857fb0 fffff805`199fb3d0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff987`1d1879d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
SYMBOL_NAME: TWZDISK+27e1
MODULE_NAME: TWZDISK
IMAGE_NAME: TWZDISK.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 27e1
FAILURE_BUCKET_ID: 0x44_TWZDISK!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1908efc8-1309-0780-cab8-ae14236d8b64}
Followup: MachineOwner
---------
MULTIPLE_IRP_COMPLETE_REQUESTS (44)
A driver has requested that an IRP be completed (IoCompleteRequest()), but
the packet has already been completed. This is a tough bug to find because
the easiest case, a driver actually attempted to complete its own packet
twice, is generally not what happened. Rather, two separate drivers each
believe that they own the packet, and each attempts to complete it. The
first actually works, and the second fails. Tracking down which drivers
in the system actually did this is difficult, generally because the trails
of the first driver have been covered by the second. However, the driver
stack for the current request can be found by examining the DeviceObject
fields in each of the stack locations.
Arguments:
Arg1: ffffb802a966f010, Address of the IRP
Arg2: 0000000000001232
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8546
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 16722
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 44
BUGCHECK_P1: ffffb802a966f010
BUGCHECK_P2: 1232
BUGCHECK_P3: 0
BUGCHECK_P4: 0
IRP_ADDRESS: ffffb802a966f010
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
ffff8187`a5bb66c8 fffff805`31a66442 : 00000000`00000044 ffffb802`a966f010 00000000`00001232 00000000`00000000 : nt!KeBugCheckEx
ffff8187`a5bb66d0 fffff805`318c2e97 : ffffb802`ab5a7620 00000000`00000001 7fffffff`ffffffff ffffb802`a966f010 : nt!IopfCompleteRequest+0x1a3592
ffff8187`a5bb67c0 fffff805`3583cf68 : ffffb802`ab5a7500 7fffffff`00000001 ffffb802`ab5a7598 ffff07ca`c6d100cc : nt!IofCompleteRequest+0x17
ffff8187`a5bb67f0 fffff805`35836387 : 00000000`00000000 7fffffff`ffffffff ffffb802`ab5a75a0 ffff8187`a5bb6ab0 : Ntfs!NtfsExtendedCompleteRequestInternal+0x178
ffff8187`a5bb6850 fffff805`35832de3 : ffffb802`ab5a7598 ffffb802`a966f010 ffff8187`a5bb75a8 00000000`00000000 : Ntfs!NtfsCommonWrite+0x3327
ffff8187`a5bb6a80 fffff805`318cd6c5 : ffffb802`a80d6b20 ffffb802`a966f010 ffffb802`a966f010 ffffb802`a05d78d0 : Ntfs!NtfsFsdWrite+0x1d3
ffff8187`a5bb6b50 fffff805`2f5c6ccf : 00060001`00000001 fffff805`00000002 00000000`00000000 fffff805`0000001a : nt!IofCallDriver+0x55
ffff8187`a5bb6b90 fffff805`2f5c48d3 : ffff8187`a5bb6c20 00000000`9a349200 ffffb802`a02d67a0 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffff8187`a5bb6c00 fffff805`318cd6c5 : ffffb802`a9d98d40 00000000`00000004 ffff8187`a5bb7000 00000000`00000000 : FLTMGR!FltpDispatch+0xa3
ffff8187`a5bb6c60 fffff805`318cd6c5 : ffff8187`a5bb6d70 fffff805`2f5c4b46 ffff8187`a5bb8000 ffff8187`a5bb1000 : nt!IofCallDriver+0x55
ffff8187`a5bb6ca0 fffff805`2f5c6ccf : 00000000`00000200 00000000`00000000 00000000`000006b8 fffff805`31fb1094 : nt!IofCallDriver+0x55
ffff8187`a5bb6ce0 fffff805`2f5c48d3 : ffff8187`a5bb6d70 00000000`9a349294 00000000`00000015 ffffb802`a6570b80 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffff8187`a5bb6d50 fffff805`318cd6c5 : ffffb802`a966f010 fffff805`318cd707 00000000`00000015 ffff9601`91c1e200 : FLTMGR!FltpDispatch+0xa3
ffff8187`a5bb6db0 fffff805`3191a1df : ffffb802`a05e3e70 ffffb802`a966f010 ffffb802`a02d67a0 ffff8187`a5bb7080 : nt!IofCallDriver+0x55
ffff8187`a5bb6df0 fffff805`3189ddbe : ffff9601`91b14d50 00000000`00000009 ffff8187`a5bb7040 fffff805`358fb4d1 : nt!IoSynchronousPageWriteEx+0x13b
ffff8187`a5bb6e30 fffff805`3582f368 : ffff9601`91c1e2c8 fffff805`3582f30f 00000000`00000000 00000000`00000000 : nt!IoSynchronousPageWrite+0x1e
ffff8187`a5bb6e80 fffff805`3582e575 : 00000000`9a349294 00000000`0000a000 00000000`00000000 00000000`00000000 : Ntfs!LfsFlushHeadOfTheLog+0x4c
ffff8187`a5bb6ec0 fffff805`3582dd85 : ffff9601`91b14d50 00000000`9a349294 00000000`00000000 ffff8187`a5bb7100 : Ntfs!LfsFlushLfcb+0x7d5
ffff8187`a5bb70e0 fffff805`3180d468 : ffff8187`a5bb71f0 ffff9601`91b14d50 00000000`00000000 00000000`00000701 : Ntfs!LfsFlushLfcbCallout+0x25
ffff8187`a5bb7110 fffff805`3180d3dd : fffff805`3582dd60 ffff8187`a5bb71f0 00000000`00000000 00000000`00000010 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff8187`a5bb7180 fffff805`35832180 : 00000000`00000000 ffff8187`a5bb7300 ffff9601`91b14d50 00000000`00000009 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffff8187`a5bb71c0 fffff805`35915d42 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000727 : Ntfs!LfsFlushLfcbOnNewStack+0x58
ffff8187`a5bb7220 fffff805`35915b9d : 7fffffff`ffffffff 00000000`00000000 ffffb802`abb90a28 7fffffff`ffffffff : Ntfs!LfsFlushToLsnPriv+0x14a
ffff8187`a5bb72c0 fffff805`35916965 : ffff9601`91b95ee0 ffffb802`a08e2180 ffff9601`970a2210 ffffb802`abb90a28 : Ntfs!LfsFlushToLsnWithoutDiskCacheFlush+0xa9
ffff8187`a5bb7310 fffff805`35915e89 : ffffb802`abb90a28 ffffb802`ae343010 ffffb802`abb90a01 ffff8187`a5bb7540 : Ntfs!NtfsCommonFlushBuffers+0x589
ffff8187`a5bb7430 fffff805`3180d468 : ffff8187`a5bb7540 ffffb802`abb90a28 ffffb802`00000000 ffffb802`ae343010 : Ntfs!NtfsCommonFlushBuffersCallout+0x19
ffff8187`a5bb7460 fffff805`3180d3dd : fffff805`35915e70 ffff8187`a5bb7540 00000000`00000000 fffff805`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff8187`a5bb74d0 fffff805`35970f2b : 00000000`00000000 00000000`00000310 ffff8187`a5bb8000 00000000`00000030 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffff8187`a5bb7510 fffff805`35970e55 : 00000000`00000000 ffffb802`a027a1c0 ffff8187`a5bb75a8 00000000`00000000 : Ntfs!NtfsCommonFlushBuffersOnNewStack+0x67
ffff8187`a5bb7580 fffff805`318cd6c5 : ffffb802`a87705a0 ffffb802`ae343010 ffffb802`abb90a28 ffff8187`a5bb75a8 : Ntfs!NtfsFsdFlushBuffers+0xe5
ffff8187`a5bb75f0 fffff805`2f5c6ccf : 00060000`00000001 fffff805`00000000 00000000`00000000 00000000`0000001f : nt!IofCallDriver+0x55
ffff8187`a5bb7630 fffff805`2f5c48d3 : ffff8187`a5bb76c0 00000000`00000000 ffffb802`adcaf480 ffffb802`a0278080 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffff8187`a5bb76a0 fffff805`318cd6c5 : ffffb802`aa5bf820 ffffb802`adcaf409 ffffb802`adcaf400 00000000`00000000 : FLTMGR!FltpDispatch+0xa3
ffff8187`a5bb7700 fffff805`318cd6c5 : ffff8187`a5bb7810 fffff805`2f5c4b46 ffff8187`a5bb8000 ffff8187`a5bb1000 : nt!IofCallDriver+0x55
ffff8187`a5bb7740 fffff805`2f5c6ccf : ffffb802`aa639580 ffffb802`adcaf480 00000000`00000000 00000000`00000204 : nt!IofCallDriver+0x55
ffff8187`a5bb7780 fffff805`2f5c48d3 : ffff8187`a5bb7810 00000000`00000000 00000000`00000001 ffffb802`a6570b40 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffff8187`a5bb77f0 fffff805`318cd6c5 : ffffb802`ae343010 00000000`00006001 ffff8187`00000000 0000020d`a9f5d500 : FLTMGR!FltpDispatch+0xa3
ffff8187`a5bb7850 fffff805`31cc2528 : ffff8187`a5bb7a80 ffffb802`ae343010 00000000`00000001 ffff8187`00000000 : nt!IofCallDriver+0x55
ffff8187`a5bb7890 fffff805`31c703d9 : ffffb802`00000000 ffff8187`a5bb7a80 00000000`00000000 ffff8187`a5bb7a80 : nt!IopSynchronousServiceTail+0x1a8
ffff8187`a5bb7930 fffff805`31c701c6 : ffffb802`aa639580 00000000`00000000 ffffb802`a6fc0a50 0000020d`a7360100 : nt!NtFlushBuffersFileEx+0x1f9
ffff8187`a5bb79c0 fffff805`31a06bb5 : 0000020d`a7360000 0000020d`a7d095d0 ffff8187`a5bb7a80 ffffb802`ad96ede0 : nt!NtFlushBuffersFile+0x16
ffff8187`a5bb7a00 00007ffc`30acc704 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000d7`a117edf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`30acc704
SYMBOL_NAME: nt!IofCompleteRequest+17
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 17
FAILURE_BUCKET_ID: 0x44_nt!IofCompleteRequest
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {10bf0b0b-4caf-2e9c-30ae-ac07c3e144ed}
Followup: MachineOwner
---------