Hello Team,
I see following error with !analyze -v
need some help on how to dig deeper into the issue and find out what is happening
: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800dd9b3587, Address of the instruction which caused the bugcheck
Arg3: ffffd0002a5bb710, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for HPEDpHsmX64.sys
fffff8038a0abe58: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff8038a168308
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on IN-5CG0355GRV
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 8
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : Analysis.System
Value: CreateObject
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff800dd9b3587
BUGCHECK_P3: ffffd0002a5bb710
BUGCHECK_P4: 0
CONTEXT: ffffd0002a5bb710 -- (.cxr 0xffffd0002a5bb710)
rax=0000000000000000 rbx=ffffe0004d9fbd58 rcx=0000000000000000
rdx=ffffd0002a5bc2a8 rsi=fffff800dd9b8c58 rdi=ffffd0002a5bc190
rip=fffff800dd9b3587 rsp=ffffd0002a5bc130 rbp=ffffe0004892f0c0
r8=0000000000000000 r9=0000000000000000 r10=fffff800dd200000
r11=0000000000000000 r12=0000000000000000 r13=ffffe0004c5fd710
r14=0000000000000000 r15=ffffe0004892f2e0
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
HPEDpHsmX64+0x2587:
fffff800`dd9b3587 833846 cmp dword ptr [rax],46h ds:002b:00000000`00000000=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: loadsapr.exe
STACK_TEXT:
ffffd000`2a5bc130 00000000`00000001 : 00000000`00000003 00000000`00000000 ffffd000`22a11230 ffffe000`6d4e6f49 : HPEDpHsmX64+0x2587
ffffd000`2a5bc138 00000000`00000003 : 00000000`00000000 ffffd000`22a11230 ffffe000`6d4e6f49 00000000`00000009 : 0x1
ffffd000`2a5bc140 00000000`00000000 : ffffd000`22a11230 ffffe000`6d4e6f49 00000000`00000009 ffffc000`00000000 : 0x3
SYMBOL_NAME: HPEDpHsmX64+2587
MODULE_NAME: HPEDpHsmX64
IMAGE_NAME: HPEDpHsmX64.sys
STACK_COMMAND: .cxr 0xffffd0002a5bb710 ; kb
BUCKET_ID_FUNC_OFFSET: 2587
FAILURE_BUCKET_ID: 0x3B_c0000005_HPEDpHsmX64!unknown_function
OS_VERSION: 8.1.9600.19846
BUILDLAB_STR: winblue_ltsb_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {3238b1ad-c7a8-9dd2-2a88-e7b2caf24391}
Followup: MachineOwner
---------
1: kd> !dpx
No export dpx found
1: kd> .load C:\Users\mbn4\OneDrive - DXC Production\old laptop\temp\Symbols\EXT\PDE v11.3\x64\winext\pdel.dll
The call to LoadLibrary(C:\Users\mbn4\OneDrive - DXC Production\old laptop\temp\Symbols\EXT\PDE v11.3\x64\winext\pdel.dll) failed, Win32 error 0n126
"The specified module could not be found."
Please check your debugger configuration and/or network access.
1: kd> .load C:\Users\mbn4\OneDrive - DXC Production\old laptop\temp\Symbols\EXT\PDE v11.3\x64\winext\pde.dll
=========================================================================================
PDE v11.3 - Copyright 2017 Andrew Richards
=========================================================================================
1: kd> k
# Child-SP RetAddr Call Site
00 ffffd000`2a5bae58 fffff803`89f69769 nt!KeBugCheckEx
01 ffffd000`2a5bae60 fffff803`89f68e7c nt!KiBugCheckDispatch+0x69
02 ffffd000`2a5bafa0 fffff803`89f6206d nt!KiSystemServiceHandler+0x7c
03 ffffd000`2a5bafe0 fffff803`89e9f515 nt!RtlpExecuteHandlerForException+0xd
04 ffffd000`2a5bb010 fffff803`89ef2cc9 nt!RtlDispatchException+0x1a5
05 ffffd000`2a5bb6e0 fffff803`89f69842 nt!KiDispatchException+0x18d
06 ffffd000`2a5bbdc0 fffff803`89f66c82 nt!KiExceptionDispatch+0xc2
07 ffffd000`2a5bbfa0 fffff800`dd9b3587 nt!KiPageFault+0x402
*** WARNING: Unable to verify timestamp for HPEDpHsmX64.sys
08 ffffd000`2a5bc130 00000000`00000001 HPEDpHsmX64+0x2587
09 ffffd000`2a5bc138 00000000`00000003 0x1
0a ffffd000`2a5bc140 00000000`00000000 0x3
1: kd> !dpx
Start memory scan : 0xffffd0002a5bae58 ($csp)
End memory scan : 0xffffd0002a5bd000 (Kernel Stack Base)
rsp : 0xffffd0002a5bae58 : 0xfffff80389f69769 : nt!KiBugCheckDispatch+0x69
0xffffd0002a5bae58 : 0xfffff80389f69769 : nt!KiBugCheckDispatch+0x69
0xffffd0002a5bae88 : 0xfffff80389ede36f : nt!EtwpTraceFileName+0xb7
0xffffd0002a5baf58 : 0xfffff800dd206db5 : fltmgr!FltpGetFileNameInformation+0x4a5
0xffffd0002a5baf88 : 0xfffff80389f693e3 : nt!KiSystemServiceCopyEnd+0x13
0xffffd0002a5baf98 : 0xfffff80389f68e7c : nt!KiSystemServiceHandler+0x7c
0xffffd0002a5bafb8 : 0xfffff8038a29e5d5 : nt!IopCreateFile+0x825
0xffffd0002a5bafd0 : 0xfffff80389f693e3 : nt!KiSystemServiceCopyEnd+0x13
0xffffd0002a5bafd8 : 0xfffff80389f6206d : nt!RtlpExecuteHandlerForException+0xd
0xffffd0002a5bb000 : 0xffffd0002a5bb090 : 0xfffff80389f693e3 : nt!KiSystemServiceCopyEnd+0x13
0xffffd0002a5bb008 : 0xfffff80389e9f515 : nt!RtlDispatchException+0x1a5
0xffffd0002a5bb018 : 0xfffff80389e19000 : "nt!_guard_check_icall_fptr <PERF> (nt+0x0)"
0xffffd0002a5bb060 : 0xfffff80389e19000 : "nt!_guard_check_icall_fptr <PERF> (nt+0x0)"
0xffffd0002a5bb088 : 0xfffff800df164a03 : fileinfo!FIStreamGetInfo+0xe3
0xffffd0002a5bb090 : 0xfffff80389f693e3 : nt!KiSystemServiceCopyEnd+0x13
0xffffd0002a5bb098 : 0xfffff80389e19000 : "nt!_guard_check_icall_fptr <PERF> (nt+0x0)"
0xffffd0002a5bb0a0 : 0xfffff8038a12c428 : "nt!BcpCursor <PERF> (nt+0x313428)"
0xffffd0002a5bb0c0 : 0xfffff80389f68e00 : nt!KiSystemServiceHandler
0xffffd0002a5bb288 : 0xfffff80389e4bb7d : nt!EtwpReserveTraceBuffer+0xd9
0xffffd0002a5bb2b8 : 0xfffff80389e854e1 : nt!RtlCopyUnicodeString+0x45
0xffffd0002a5bb3a0 : 0xffffd0002a5bb5e8 : 0xfffff800dd200000 : "fltmgr!FltpProcessIrpCtrlStackProfiler <PERF> (fltmgr+0x0)"
0xffffd0002a5bb3a8 : 0xffffd0002a5bb648 : 0xfffff80389e19000 : "nt!_guard_check_icall_fptr <PERF> (nt+0x0)"
0xffffd0002a5bb3d8 : 0xfffff80389e8039d : nt!SepAccessCheck+0x2ed
0xffffd0002a5bb3f8 : 0xfffff800dd6a6b00 : Ntfs!NtfsCleanupIrpContext+0x140
0xffffd0002a5bb408 : 0xffffd0002a5bb610 : 0xfffff800dd2283f8 : "fltmgr!FltpVerifierFlags <PERF> (fltmgr+0x283f8)"
0xffffd0002a5bb440 : 0xffffd0002a5bb648 : 0xfffff80389e19000 : "nt!_guard_check_icall_fptr <PERF> (nt+0x0)"
0xffffd0002a5bb468 : 0xffffd0002a5bb610 : 0xfffff800dd2283f8 : "fltmgr!FltpVerifierFlags <PERF> (fltmgr+0x283f8)"
0xffffd0002a5bb490 : 0xffffd0002a5bb648 : 0xfffff80389e19000 : "nt!_guard_check_icall_fptr <PERF> (nt+0x0)"
0xffffd0002a5bb4a8 : 0xfffff80389e4bb7d : nt!EtwpReserveTraceBuffer+0xd9
0xffffd0002a5bb528 : 0xffffd0002a5bb660 : 0xfffff8038a139598 : "nt!BcpCursor <PERF> (nt+0x320598)"
0xffffd0002a5bb538 : 0xfffff80389e7fa30 : nt!SeAccessCheckWithHint+0x400
0xffffd0002a5bb578 : 0xfffff8038a46bee0 : nt!IopFileMapping
0xffffd0002a5bb588 : 0xfffff80389e46801 : nt!IopfCompleteRequest+0xc71
0xffffd0002a5bb5a8 : 0xfffff80389ee7510 : nt!KiOpFetchBytes+0x30
0xffffd0002a5bb5b8 : 0xfffff800dd202e80 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted
0xffffd0002a5bb5c0 : 0xfffff8038a2a6119 : nt!ObpLookupObjectName+0xbc9
0xffffd0002a5bb5c8 : 0xfffff800dd9b1000 : HPEDpHsmX64
0xffffd0002a5bb5d8 : 0xfffff800dd200000 : "fltmgr!FltpProcessIrpCtrlStackProfiler <PERF> (fltmgr+0x0)"
0xffffd0002a5bb5e0 : 0xfffff800dd2270d8 : "fltmgr!FltpVerifierFlags <PERF> (fltmgr+0x270d8)"
0xffffd0002a5bb5e8 : 0xfffff800dd200000 : "fltmgr!FltpProcessIrpCtrlStackProfiler <PERF> (fltmgr+0x0)"
0xffffd0002a5bb5f0 : 0xfffff800dd227138 : "fltmgr!FltpVerifierFlags <PERF> (fltmgr+0x27138)"
0xffffd0002a5bb5f8 : 0xfffff800dd200000 : "fltmgr!FltpProcessIrpCtrlStackProfiler <PERF> (fltmgr+0x0)"
0xffffd0002a5bb600 : 0xfffff800dd2270b4 : "fltmgr!FltpVerifierFlags <PERF> (fltmgr+0x270b4)"
0xffffd0002a5bb608 : 0xfffff800dd200000 : "fltmgr!FltpProcessIrpCtrlStackProfiler <PERF> (fltmgr+0x0)"
0xffffd0002a5bb610 : 0xfffff800dd2283f8 : "fltmgr!FltpVerifierFlags <PERF> (fltmgr+0x283f8)"
0xffffd0002a5bb618 : 0xfffff80389e19000 : "nt!_guard_check_icall_fptr <PERF> (nt+0x0)"
0xffffd0002a5bb620 : 0xfffff8038a13c1b4 : "nt!BcpCursor <PERF> (nt+0x3231b4)"
0xffffd0002a5bb628 : 0xfffff80389e19000 : "nt!_guard_check_icall_fptr <PERF> (nt+0x0)"
0xffffd0002a5bb630 : 0xfffff8038a141aa0 : "nt!BcpCursor <PERF> (nt+0x328aa0)"
0xffffd0002a5bb638 : 0xfffff80389e19000 : "nt!_guard_check_icall_fptr <PERF> (nt+0x0)"
0xffffd0002a5bb640 : 0xfffff8038a13c0b8 : "nt!BcpCursor <PERF> (nt+0x3230b8)"
0xffffd0002a5bb648 : 0xfffff80389e19000 : "nt!_guard_check_icall_fptr <PERF> (nt+0x0)"
0xffffd0002a5bb650 : 0xfffff8038a141914 : "nt!BcpCursor <PERF> (nt+0x328914)"
0xffffd0002a5bb658 : 0xfffff80389e19000 : "nt!_guard_check_icall_fptr <PERF> (nt+0x0)"
0xffffd0002a5bb660 : 0xfffff8038a139598 : "nt!BcpCursor <PERF> (nt+0x320598)"
0xffffd0002a5bb668 : 0xfffff80389e19000 : "nt!_guard_check_icall_fptr <PERF> (nt+0x0)"
0xffffd0002a5bb670 : 0xfffff8038a12c428 : "nt!BcpCursor <PERF> (nt+0x313428)"
0xffffd0002a5bb6d8 : 0xfffff80389ef2cc9 : nt!KiDispatchException+0x18d
0xffffd0002a5bb708 : 0xfffff8038a46be00 : nt!GUID_MOF_RESOURCE_ADDED_NOTIFICATION
0xffffd0002a5bb728 : 0xfffff80389e52ab0 : nt!SepTokenFromAccessInformation+0x120
0xffffd0002a5bb768 : 0xfffff800deb8af08 : luafv!LuafvEcpType
0xffffd0002a5bb7d8 : 0xfffff800dd200000 : "fltmgr!FltpProcessIrpCtrlStackProfiler <PERF> (fltmgr+0x0)"
0xffffd0002a5bb8b0 : 0x0064007200610048 : !du "Harddisk\Device\"
0xffffd0002a5bb8b8 : 0x006b007300690064 : !du "disk\Device\"
0xffffd0002a5bb8c0 : 0x007600650044005c : !du "\Device\"
0xffffd0002a5bbb48 : 0xfffff80389e84fa5 : nt!MiGetPteFromCopyList+0x3a5
0xffffd0002a5bbb78 : 0xfffff80389e84940 : nt!MiGetPteMappingPair+0x58
0xffffd0002a5bbba8 : 0xfffff80389e685f3 : nt!RtlGetExtendedContextLength+0x1f
0xffffd0002a5bbc98 : 0xfffff80389effbfc : nt!MiIsFaultPteIntact+0x20
0xffffd0002a5bbcb8 : 0xfffff80389e81f3d : nt!MiAddLockedPageChargeForModifiedPage+0x35
0xffffd0002a5bbce8 : 0xfffff800deb9d000 : luafv!LuafvQueryShortNameFromGlobal+0x118
0xffffd0002a5bbcf8 : 0xfffff8038a160ec0 : nt!MmSystemPtesWs
0xffffd0002a5bbd18 : 0xfffff80389e8946e : nt!MiAllocateWsle+0x1fe
0xffffd0002a5bbd48 : 0xfffff80389e8516c : nt!MiFreeInPageSupportBlock+0x84
0xffffd0002a5bbdb0 : 0xffffd0002a5bc020 : !du "\Device\"
0xffffd0002a5bbdb8 : 0xfffff80389f69842 : nt!KiExceptionDispatch+0xc2
0xffffd0002a5bbde8 : 0xfffff80389ffe5a4 : nt!MiResolvePageTablePage+0x180
0xffffd0002a5bbe98 : 0xfffff80389e644be : nt!MmAccessFault+0x71e
0xffffd0002a5bbf90 : 0xffffd0002a5bc020 : !du "\Device\"
0xffffd0002a5bbf98 : 0xfffff80389f66c82 : nt!KiPageFault+0x402
0xffffd0002a5bbfa0 : 0xfffff800dd9b8c58 : Trap @ ffffd0002a5bbfa0
0xffffd0002a5bbfc0 : 0xfffff8038a160ec0 : nt!MmSystemPtesWs
0xffffd0002a5bbff8 : 0xfffff800dd200000 : "fltmgr!FltpProcessIrpCtrlStackProfiler <PERF> (fltmgr+0x0)"
0xffffd0002a5bc010 : 0x0064007200610048 : !du "Harddisk\Device\"
0xffffd0002a5bc018 : 0x006b007300690064 : !du "disk\Device\"
0xffffd0002a5bc020 : 0x007600650044005c : !du "\Device\"
0xffffd0002a5bc088 : 0xfffff800deb8af08 : luafv!LuafvEcpType
0xffffd0002a5bc0a8 : 0xfffff800deb9bee4 : luafv!LuafvCleanUpEcp
0xffffd0002a5bc0b8 : 0xfffff8038a274767 : nt!FsRtlAllocateExtraCreateParameter+0x53
0xffffd0002a5bc0c8 : 0xfffff800deb8af08 : luafv!LuafvEcpType
0xffffd0002a5bc0e8 : 0xfffff8038a0a748e : nt!ExAllocatePoolWithTag+0x89e
0xffffd0002a5bc1b8 : 0xfffff800deb9d13b : luafv!LuafvReparse+0xb3
0xffffd0002a5bc1e8 : 0x004d00500048002e : !du ".HPManifest"
0xffffd0002a5bc1f0 : 0x00660069006e0061 : !du "anifest"
0xffffd0002a5bc258 : 0xfffff800dd203ab7 : fltmgr!FltpPerformPostCallbacks+0x2d7
0xffffd0002a5bc288 : 0xfffff800dd20488e : fltmgr!FltpLinkCompletionNodeToInstance+0x10e
0xffffd0002a5bc328 : 0xfffff800dd20441d : fltmgr!FltpPassThroughCompletionWorker+0x7d
0xffffd0002a5bc398 : 0xfffff800dd203504 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x684
0xffffd0002a5bc3d0 : 0xfffff800dd224010 : fltmgr!WPP_GLOBAL_Control
0xffffd0002a5bc408 : 0xfffff800dd202d0c : fltmgr!FltpPassThroughInternal+0x8c
0xffffd0002a5bc418 : 0xfffff800dd224010 : fltmgr!WPP_GLOBAL_Control
0xffffd0002a5bc438 : 0xfffff800dd22b349 : fltmgr!FltpCreate+0x339
0xffffd0002a5bc478 : 0xfffff800dd203f22 : !du "$Volume"
0xffffd0002a5bc4e8 : 0xfffff8038a1fd689 : nt!IopParseDevice+0x6c9
0xffffd0002a5bc5e8 : 0xfffff80389e7f61e : nt!SeAccessCheck+0x5e
0xffffd0002a5bc628 : 0xfffff8038a1f1762 : nt!ObpLookupDirectoryUsingHash+0x272
0xffffd0002a5bc6d0 : 0xfffff8038a1fcfc0 : nt!IopParseDevice
0xffffd0002a5bc6d8 : 0xfffff8038a2a5d0e : nt!ObpLookupObjectName+0x7be
0xffffd0002a5bc778 : 0xfffff8038a1fa955 : nt!ObpCaptureObjectCreateInformation+0x1c5
0xffffd0002a5bc818 : 0xfffff8038a1fa093 : nt!ObOpenObjectByName+0x1e3
0xffffd0002a5bc878 : 0xfffff80389e823da : nt!MiLockProtoPoolPage+0x22a
0xffffd0002a5bc8c8 : 0xffffd0002a5bca88 : 0xfffff80389f693e3 : nt!KiSystemServiceCopyEnd+0x13
0xffffd0002a5bc948 : 0xfffff8038a29e5d5 : nt!IopCreateFile+0x825
0xffffd0002a5bc9c8 : 0xfffff80389e79510 : nt!UNLOCK_WORKING_SET+0x30
0xffffd0002a5bc9f8 : 0xfffff8038a1a09c4 : nt!NtCreateFile+0x78
0xffffd0002a5bca88 : 0xfffff80389f693e3 : nt!KiSystemServiceCopyEnd+0x13
0xffffd0002a5bcaf8 : 0xfffff80389f66cc5 : nt!KiPageFault+0x445
0xffffd0002a5bcb00 : 0x0000000075795030 : Trap @ ffffd0002a5bcb00
1: kd> .trap ffffd0002a5bcb00;knL
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=00007ffcde330c5a rsp=0000000000a3e1e8 rbp=0000000000b3fbe8
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
0033:00007ffc`de330c5a ?? ???
*** Stack trace for last set context - .thread/.cxr resets it
# Child-SP RetAddr Call Site
00 00000000`00a3e1e8 00000000`00000000 0x00007ffc`de330c5a
1: kd> !thread
THREAD ffffe0004dada080 Cid 0864.1fb0 Teb: 000000007ec1c000 Win32Thread: fffff901441a2b50 RUNNING on processor 1
IRP List:
Unable to read nt!_IRP @ ffffe0004c5fd710
Not impersonating
GetUlongFromAddress: unable to read from fffff8038a0b4b70
Owning Process ffffe0004dbe3900 Image: loadsapr.exe
Attached Process N/A Image: N/A
fffff78000000000: Unable to get shared data
Wait Start TickCount 3435498
Context Switch Count 15 IdealProcessor: 0
ReadMemory error: Cannot get nt!KeMaximumIncrement value.
UserTime 00:00:00.000
KernelTime 00:00:00.000
Win32 Start Address 0x00000000008fe48e
Stack Init ffffd0002a5bcc90 Current ffffd00029e93840
Base ffffd0002a5bd000 Limit ffffd0002a5b7000 Call 0000000000000000
Priority 9 BasePriority 8 PriorityDecrement 0 IoPriority 2 PagePriority 5
Child-SP RetAddr : Args to Child : Call Site
ffffd000`2a5bae58 fffff803`89f69769 : 00000000`0000003b 00000000`c0000005 fffff800`dd9b3587 ffffd000`2a5bb710 : nt!KeBugCheckEx
ffffd000`2a5bae60 fffff803`89f68e7c : ffffd000`2a5bbef8 ffffd000`2a5bb710 ffffd000`2a5bcb00 fffff803`8a29e5d5 : nt!KiBugCheckDispatch+0x69
ffffd000`2a5bafa0 fffff803`89f6206d : ffffd000`2a5bb710 00000000`00000000 ffffd000`2a5bbef8 ffffd000`2a5bb110 : nt!KiSystemServiceHandler+0x7c
ffffd000`2a5bafe0 fffff803`89e9f515 : 00000000`00000001 fffff803`89e19000 ffffd000`2a5bbe01 fffff800`00000000 : nt!RtlpExecuteHandlerForException+0xd
ffffd000`2a5bb010 fffff803`89ef2cc9 : ffffd000`2a5bbef8 ffffd000`2a5bbc10 ffffd000`2a5bbef8 ffffd000`2a5bc190 : nt!RtlDispatchException+0x1a5
ffffd000`2a5bb6e0 fffff803`89f69842 : 00000000`00000000 ffffd000`2a5bbe58 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x18d
ffffd000`2a5bbdc0 fffff803`89f66c82 : fffff800`dd9b8c58 ffffe000`4dada000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
ffffd000`2a5bbfa0 fffff800`dd9b3587 : 00000000`00000001 00000000`00000003 00000000`00000000 ffffd000`22a11230 : nt!KiPageFault+0x402 (TrapFrame @ ffffd000`2a5bbfa0)
ffffd000`2a5bc130 00000000`00000001 : 00000000`00000003 00000000`00000000 ffffd000`22a11230 ffffe000`6d4e6f49 : HPEDpHsmX64+0x2587
ffffd000`2a5bc138 00000000`00000003 : 00000000`00000000 ffffd000`22a11230 ffffe000`6d4e6f49 00000000`00000009 : 0x1
ffffd000`2a5bc140 00000000`00000000 : ffffd000`22a11230 ffffe000`6d4e6f49 00000000`00000009 ffffc000`00000000 : 0x3
I see following error with !analyze -v
need some help on how to dig deeper into the issue and find out what is happening
: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800dd9b3587, Address of the instruction which caused the bugcheck
Arg3: ffffd0002a5bb710, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for HPEDpHsmX64.sys
fffff8038a0abe58: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff8038a168308
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on IN-5CG0355GRV
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 8
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : Analysis.System
Value: CreateObject
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff800dd9b3587
BUGCHECK_P3: ffffd0002a5bb710
BUGCHECK_P4: 0
CONTEXT: ffffd0002a5bb710 -- (.cxr 0xffffd0002a5bb710)
rax=0000000000000000 rbx=ffffe0004d9fbd58 rcx=0000000000000000
rdx=ffffd0002a5bc2a8 rsi=fffff800dd9b8c58 rdi=ffffd0002a5bc190
rip=fffff800dd9b3587 rsp=ffffd0002a5bc130 rbp=ffffe0004892f0c0
r8=0000000000000000 r9=0000000000000000 r10=fffff800dd200000
r11=0000000000000000 r12=0000000000000000 r13=ffffe0004c5fd710
r14=0000000000000000 r15=ffffe0004892f2e0
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
HPEDpHsmX64+0x2587:
fffff800`dd9b3587 833846 cmp dword ptr [rax],46h ds:002b:00000000`00000000=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: loadsapr.exe
STACK_TEXT:
ffffd000`2a5bc130 00000000`00000001 : 00000000`00000003 00000000`00000000 ffffd000`22a11230 ffffe000`6d4e6f49 : HPEDpHsmX64+0x2587
ffffd000`2a5bc138 00000000`00000003 : 00000000`00000000 ffffd000`22a11230 ffffe000`6d4e6f49 00000000`00000009 : 0x1
ffffd000`2a5bc140 00000000`00000000 : ffffd000`22a11230 ffffe000`6d4e6f49 00000000`00000009 ffffc000`00000000 : 0x3
SYMBOL_NAME: HPEDpHsmX64+2587
MODULE_NAME: HPEDpHsmX64
IMAGE_NAME: HPEDpHsmX64.sys
STACK_COMMAND: .cxr 0xffffd0002a5bb710 ; kb
BUCKET_ID_FUNC_OFFSET: 2587
FAILURE_BUCKET_ID: 0x3B_c0000005_HPEDpHsmX64!unknown_function
OS_VERSION: 8.1.9600.19846
BUILDLAB_STR: winblue_ltsb_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {3238b1ad-c7a8-9dd2-2a88-e7b2caf24391}
Followup: MachineOwner
---------
1: kd> !dpx
No export dpx found
1: kd> .load C:\Users\mbn4\OneDrive - DXC Production\old laptop\temp\Symbols\EXT\PDE v11.3\x64\winext\pdel.dll
The call to LoadLibrary(C:\Users\mbn4\OneDrive - DXC Production\old laptop\temp\Symbols\EXT\PDE v11.3\x64\winext\pdel.dll) failed, Win32 error 0n126
"The specified module could not be found."
Please check your debugger configuration and/or network access.
1: kd> .load C:\Users\mbn4\OneDrive - DXC Production\old laptop\temp\Symbols\EXT\PDE v11.3\x64\winext\pde.dll
=========================================================================================
PDE v11.3 - Copyright 2017 Andrew Richards
=========================================================================================
1: kd> k
# Child-SP RetAddr Call Site
00 ffffd000`2a5bae58 fffff803`89f69769 nt!KeBugCheckEx
01 ffffd000`2a5bae60 fffff803`89f68e7c nt!KiBugCheckDispatch+0x69
02 ffffd000`2a5bafa0 fffff803`89f6206d nt!KiSystemServiceHandler+0x7c
03 ffffd000`2a5bafe0 fffff803`89e9f515 nt!RtlpExecuteHandlerForException+0xd
04 ffffd000`2a5bb010 fffff803`89ef2cc9 nt!RtlDispatchException+0x1a5
05 ffffd000`2a5bb6e0 fffff803`89f69842 nt!KiDispatchException+0x18d
06 ffffd000`2a5bbdc0 fffff803`89f66c82 nt!KiExceptionDispatch+0xc2
07 ffffd000`2a5bbfa0 fffff800`dd9b3587 nt!KiPageFault+0x402
*** WARNING: Unable to verify timestamp for HPEDpHsmX64.sys
08 ffffd000`2a5bc130 00000000`00000001 HPEDpHsmX64+0x2587
09 ffffd000`2a5bc138 00000000`00000003 0x1
0a ffffd000`2a5bc140 00000000`00000000 0x3
1: kd> !dpx
Start memory scan : 0xffffd0002a5bae58 ($csp)
End memory scan : 0xffffd0002a5bd000 (Kernel Stack Base)
rsp : 0xffffd0002a5bae58 : 0xfffff80389f69769 : nt!KiBugCheckDispatch+0x69
0xffffd0002a5bae58 : 0xfffff80389f69769 : nt!KiBugCheckDispatch+0x69
0xffffd0002a5bae88 : 0xfffff80389ede36f : nt!EtwpTraceFileName+0xb7
0xffffd0002a5baf58 : 0xfffff800dd206db5 : fltmgr!FltpGetFileNameInformation+0x4a5
0xffffd0002a5baf88 : 0xfffff80389f693e3 : nt!KiSystemServiceCopyEnd+0x13
0xffffd0002a5baf98 : 0xfffff80389f68e7c : nt!KiSystemServiceHandler+0x7c
0xffffd0002a5bafb8 : 0xfffff8038a29e5d5 : nt!IopCreateFile+0x825
0xffffd0002a5bafd0 : 0xfffff80389f693e3 : nt!KiSystemServiceCopyEnd+0x13
0xffffd0002a5bafd8 : 0xfffff80389f6206d : nt!RtlpExecuteHandlerForException+0xd
0xffffd0002a5bb000 : 0xffffd0002a5bb090 : 0xfffff80389f693e3 : nt!KiSystemServiceCopyEnd+0x13
0xffffd0002a5bb008 : 0xfffff80389e9f515 : nt!RtlDispatchException+0x1a5
0xffffd0002a5bb018 : 0xfffff80389e19000 : "nt!_guard_check_icall_fptr <PERF> (nt+0x0)"
0xffffd0002a5bb060 : 0xfffff80389e19000 : "nt!_guard_check_icall_fptr <PERF> (nt+0x0)"
0xffffd0002a5bb088 : 0xfffff800df164a03 : fileinfo!FIStreamGetInfo+0xe3
0xffffd0002a5bb090 : 0xfffff80389f693e3 : nt!KiSystemServiceCopyEnd+0x13
0xffffd0002a5bb098 : 0xfffff80389e19000 : "nt!_guard_check_icall_fptr <PERF> (nt+0x0)"
0xffffd0002a5bb0a0 : 0xfffff8038a12c428 : "nt!BcpCursor <PERF> (nt+0x313428)"
0xffffd0002a5bb0c0 : 0xfffff80389f68e00 : nt!KiSystemServiceHandler
0xffffd0002a5bb288 : 0xfffff80389e4bb7d : nt!EtwpReserveTraceBuffer+0xd9
0xffffd0002a5bb2b8 : 0xfffff80389e854e1 : nt!RtlCopyUnicodeString+0x45
0xffffd0002a5bb3a0 : 0xffffd0002a5bb5e8 : 0xfffff800dd200000 : "fltmgr!FltpProcessIrpCtrlStackProfiler <PERF> (fltmgr+0x0)"
0xffffd0002a5bb3a8 : 0xffffd0002a5bb648 : 0xfffff80389e19000 : "nt!_guard_check_icall_fptr <PERF> (nt+0x0)"
0xffffd0002a5bb3d8 : 0xfffff80389e8039d : nt!SepAccessCheck+0x2ed
0xffffd0002a5bb3f8 : 0xfffff800dd6a6b00 : Ntfs!NtfsCleanupIrpContext+0x140
0xffffd0002a5bb408 : 0xffffd0002a5bb610 : 0xfffff800dd2283f8 : "fltmgr!FltpVerifierFlags <PERF> (fltmgr+0x283f8)"
0xffffd0002a5bb440 : 0xffffd0002a5bb648 : 0xfffff80389e19000 : "nt!_guard_check_icall_fptr <PERF> (nt+0x0)"
0xffffd0002a5bb468 : 0xffffd0002a5bb610 : 0xfffff800dd2283f8 : "fltmgr!FltpVerifierFlags <PERF> (fltmgr+0x283f8)"
0xffffd0002a5bb490 : 0xffffd0002a5bb648 : 0xfffff80389e19000 : "nt!_guard_check_icall_fptr <PERF> (nt+0x0)"
0xffffd0002a5bb4a8 : 0xfffff80389e4bb7d : nt!EtwpReserveTraceBuffer+0xd9
0xffffd0002a5bb528 : 0xffffd0002a5bb660 : 0xfffff8038a139598 : "nt!BcpCursor <PERF> (nt+0x320598)"
0xffffd0002a5bb538 : 0xfffff80389e7fa30 : nt!SeAccessCheckWithHint+0x400
0xffffd0002a5bb578 : 0xfffff8038a46bee0 : nt!IopFileMapping
0xffffd0002a5bb588 : 0xfffff80389e46801 : nt!IopfCompleteRequest+0xc71
0xffffd0002a5bb5a8 : 0xfffff80389ee7510 : nt!KiOpFetchBytes+0x30
0xffffd0002a5bb5b8 : 0xfffff800dd202e80 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted
0xffffd0002a5bb5c0 : 0xfffff8038a2a6119 : nt!ObpLookupObjectName+0xbc9
0xffffd0002a5bb5c8 : 0xfffff800dd9b1000 : HPEDpHsmX64
0xffffd0002a5bb5d8 : 0xfffff800dd200000 : "fltmgr!FltpProcessIrpCtrlStackProfiler <PERF> (fltmgr+0x0)"
0xffffd0002a5bb5e0 : 0xfffff800dd2270d8 : "fltmgr!FltpVerifierFlags <PERF> (fltmgr+0x270d8)"
0xffffd0002a5bb5e8 : 0xfffff800dd200000 : "fltmgr!FltpProcessIrpCtrlStackProfiler <PERF> (fltmgr+0x0)"
0xffffd0002a5bb5f0 : 0xfffff800dd227138 : "fltmgr!FltpVerifierFlags <PERF> (fltmgr+0x27138)"
0xffffd0002a5bb5f8 : 0xfffff800dd200000 : "fltmgr!FltpProcessIrpCtrlStackProfiler <PERF> (fltmgr+0x0)"
0xffffd0002a5bb600 : 0xfffff800dd2270b4 : "fltmgr!FltpVerifierFlags <PERF> (fltmgr+0x270b4)"
0xffffd0002a5bb608 : 0xfffff800dd200000 : "fltmgr!FltpProcessIrpCtrlStackProfiler <PERF> (fltmgr+0x0)"
0xffffd0002a5bb610 : 0xfffff800dd2283f8 : "fltmgr!FltpVerifierFlags <PERF> (fltmgr+0x283f8)"
0xffffd0002a5bb618 : 0xfffff80389e19000 : "nt!_guard_check_icall_fptr <PERF> (nt+0x0)"
0xffffd0002a5bb620 : 0xfffff8038a13c1b4 : "nt!BcpCursor <PERF> (nt+0x3231b4)"
0xffffd0002a5bb628 : 0xfffff80389e19000 : "nt!_guard_check_icall_fptr <PERF> (nt+0x0)"
0xffffd0002a5bb630 : 0xfffff8038a141aa0 : "nt!BcpCursor <PERF> (nt+0x328aa0)"
0xffffd0002a5bb638 : 0xfffff80389e19000 : "nt!_guard_check_icall_fptr <PERF> (nt+0x0)"
0xffffd0002a5bb640 : 0xfffff8038a13c0b8 : "nt!BcpCursor <PERF> (nt+0x3230b8)"
0xffffd0002a5bb648 : 0xfffff80389e19000 : "nt!_guard_check_icall_fptr <PERF> (nt+0x0)"
0xffffd0002a5bb650 : 0xfffff8038a141914 : "nt!BcpCursor <PERF> (nt+0x328914)"
0xffffd0002a5bb658 : 0xfffff80389e19000 : "nt!_guard_check_icall_fptr <PERF> (nt+0x0)"
0xffffd0002a5bb660 : 0xfffff8038a139598 : "nt!BcpCursor <PERF> (nt+0x320598)"
0xffffd0002a5bb668 : 0xfffff80389e19000 : "nt!_guard_check_icall_fptr <PERF> (nt+0x0)"
0xffffd0002a5bb670 : 0xfffff8038a12c428 : "nt!BcpCursor <PERF> (nt+0x313428)"
0xffffd0002a5bb6d8 : 0xfffff80389ef2cc9 : nt!KiDispatchException+0x18d
0xffffd0002a5bb708 : 0xfffff8038a46be00 : nt!GUID_MOF_RESOURCE_ADDED_NOTIFICATION
0xffffd0002a5bb728 : 0xfffff80389e52ab0 : nt!SepTokenFromAccessInformation+0x120
0xffffd0002a5bb768 : 0xfffff800deb8af08 : luafv!LuafvEcpType
0xffffd0002a5bb7d8 : 0xfffff800dd200000 : "fltmgr!FltpProcessIrpCtrlStackProfiler <PERF> (fltmgr+0x0)"
0xffffd0002a5bb8b0 : 0x0064007200610048 : !du "Harddisk\Device\"
0xffffd0002a5bb8b8 : 0x006b007300690064 : !du "disk\Device\"
0xffffd0002a5bb8c0 : 0x007600650044005c : !du "\Device\"
0xffffd0002a5bbb48 : 0xfffff80389e84fa5 : nt!MiGetPteFromCopyList+0x3a5
0xffffd0002a5bbb78 : 0xfffff80389e84940 : nt!MiGetPteMappingPair+0x58
0xffffd0002a5bbba8 : 0xfffff80389e685f3 : nt!RtlGetExtendedContextLength+0x1f
0xffffd0002a5bbc98 : 0xfffff80389effbfc : nt!MiIsFaultPteIntact+0x20
0xffffd0002a5bbcb8 : 0xfffff80389e81f3d : nt!MiAddLockedPageChargeForModifiedPage+0x35
0xffffd0002a5bbce8 : 0xfffff800deb9d000 : luafv!LuafvQueryShortNameFromGlobal+0x118
0xffffd0002a5bbcf8 : 0xfffff8038a160ec0 : nt!MmSystemPtesWs
0xffffd0002a5bbd18 : 0xfffff80389e8946e : nt!MiAllocateWsle+0x1fe
0xffffd0002a5bbd48 : 0xfffff80389e8516c : nt!MiFreeInPageSupportBlock+0x84
0xffffd0002a5bbdb0 : 0xffffd0002a5bc020 : !du "\Device\"
0xffffd0002a5bbdb8 : 0xfffff80389f69842 : nt!KiExceptionDispatch+0xc2
0xffffd0002a5bbde8 : 0xfffff80389ffe5a4 : nt!MiResolvePageTablePage+0x180
0xffffd0002a5bbe98 : 0xfffff80389e644be : nt!MmAccessFault+0x71e
0xffffd0002a5bbf90 : 0xffffd0002a5bc020 : !du "\Device\"
0xffffd0002a5bbf98 : 0xfffff80389f66c82 : nt!KiPageFault+0x402
0xffffd0002a5bbfa0 : 0xfffff800dd9b8c58 : Trap @ ffffd0002a5bbfa0
0xffffd0002a5bbfc0 : 0xfffff8038a160ec0 : nt!MmSystemPtesWs
0xffffd0002a5bbff8 : 0xfffff800dd200000 : "fltmgr!FltpProcessIrpCtrlStackProfiler <PERF> (fltmgr+0x0)"
0xffffd0002a5bc010 : 0x0064007200610048 : !du "Harddisk\Device\"
0xffffd0002a5bc018 : 0x006b007300690064 : !du "disk\Device\"
0xffffd0002a5bc020 : 0x007600650044005c : !du "\Device\"
0xffffd0002a5bc088 : 0xfffff800deb8af08 : luafv!LuafvEcpType
0xffffd0002a5bc0a8 : 0xfffff800deb9bee4 : luafv!LuafvCleanUpEcp
0xffffd0002a5bc0b8 : 0xfffff8038a274767 : nt!FsRtlAllocateExtraCreateParameter+0x53
0xffffd0002a5bc0c8 : 0xfffff800deb8af08 : luafv!LuafvEcpType
0xffffd0002a5bc0e8 : 0xfffff8038a0a748e : nt!ExAllocatePoolWithTag+0x89e
0xffffd0002a5bc1b8 : 0xfffff800deb9d13b : luafv!LuafvReparse+0xb3
0xffffd0002a5bc1e8 : 0x004d00500048002e : !du ".HPManifest"
0xffffd0002a5bc1f0 : 0x00660069006e0061 : !du "anifest"
0xffffd0002a5bc258 : 0xfffff800dd203ab7 : fltmgr!FltpPerformPostCallbacks+0x2d7
0xffffd0002a5bc288 : 0xfffff800dd20488e : fltmgr!FltpLinkCompletionNodeToInstance+0x10e
0xffffd0002a5bc328 : 0xfffff800dd20441d : fltmgr!FltpPassThroughCompletionWorker+0x7d
0xffffd0002a5bc398 : 0xfffff800dd203504 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x684
0xffffd0002a5bc3d0 : 0xfffff800dd224010 : fltmgr!WPP_GLOBAL_Control
0xffffd0002a5bc408 : 0xfffff800dd202d0c : fltmgr!FltpPassThroughInternal+0x8c
0xffffd0002a5bc418 : 0xfffff800dd224010 : fltmgr!WPP_GLOBAL_Control
0xffffd0002a5bc438 : 0xfffff800dd22b349 : fltmgr!FltpCreate+0x339
0xffffd0002a5bc478 : 0xfffff800dd203f22 : !du "$Volume"
0xffffd0002a5bc4e8 : 0xfffff8038a1fd689 : nt!IopParseDevice+0x6c9
0xffffd0002a5bc5e8 : 0xfffff80389e7f61e : nt!SeAccessCheck+0x5e
0xffffd0002a5bc628 : 0xfffff8038a1f1762 : nt!ObpLookupDirectoryUsingHash+0x272
0xffffd0002a5bc6d0 : 0xfffff8038a1fcfc0 : nt!IopParseDevice
0xffffd0002a5bc6d8 : 0xfffff8038a2a5d0e : nt!ObpLookupObjectName+0x7be
0xffffd0002a5bc778 : 0xfffff8038a1fa955 : nt!ObpCaptureObjectCreateInformation+0x1c5
0xffffd0002a5bc818 : 0xfffff8038a1fa093 : nt!ObOpenObjectByName+0x1e3
0xffffd0002a5bc878 : 0xfffff80389e823da : nt!MiLockProtoPoolPage+0x22a
0xffffd0002a5bc8c8 : 0xffffd0002a5bca88 : 0xfffff80389f693e3 : nt!KiSystemServiceCopyEnd+0x13
0xffffd0002a5bc948 : 0xfffff8038a29e5d5 : nt!IopCreateFile+0x825
0xffffd0002a5bc9c8 : 0xfffff80389e79510 : nt!UNLOCK_WORKING_SET+0x30
0xffffd0002a5bc9f8 : 0xfffff8038a1a09c4 : nt!NtCreateFile+0x78
0xffffd0002a5bca88 : 0xfffff80389f693e3 : nt!KiSystemServiceCopyEnd+0x13
0xffffd0002a5bcaf8 : 0xfffff80389f66cc5 : nt!KiPageFault+0x445
0xffffd0002a5bcb00 : 0x0000000075795030 : Trap @ ffffd0002a5bcb00
1: kd> .trap ffffd0002a5bcb00;knL
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=00007ffcde330c5a rsp=0000000000a3e1e8 rbp=0000000000b3fbe8
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
0033:00007ffc`de330c5a ?? ???
*** Stack trace for last set context - .thread/.cxr resets it
# Child-SP RetAddr Call Site
00 00000000`00a3e1e8 00000000`00000000 0x00007ffc`de330c5a
1: kd> !thread
THREAD ffffe0004dada080 Cid 0864.1fb0 Teb: 000000007ec1c000 Win32Thread: fffff901441a2b50 RUNNING on processor 1
IRP List:
Unable to read nt!_IRP @ ffffe0004c5fd710
Not impersonating
GetUlongFromAddress: unable to read from fffff8038a0b4b70
Owning Process ffffe0004dbe3900 Image: loadsapr.exe
Attached Process N/A Image: N/A
fffff78000000000: Unable to get shared data
Wait Start TickCount 3435498
Context Switch Count 15 IdealProcessor: 0
ReadMemory error: Cannot get nt!KeMaximumIncrement value.
UserTime 00:00:00.000
KernelTime 00:00:00.000
Win32 Start Address 0x00000000008fe48e
Stack Init ffffd0002a5bcc90 Current ffffd00029e93840
Base ffffd0002a5bd000 Limit ffffd0002a5b7000 Call 0000000000000000
Priority 9 BasePriority 8 PriorityDecrement 0 IoPriority 2 PagePriority 5
Child-SP RetAddr : Args to Child : Call Site
ffffd000`2a5bae58 fffff803`89f69769 : 00000000`0000003b 00000000`c0000005 fffff800`dd9b3587 ffffd000`2a5bb710 : nt!KeBugCheckEx
ffffd000`2a5bae60 fffff803`89f68e7c : ffffd000`2a5bbef8 ffffd000`2a5bb710 ffffd000`2a5bcb00 fffff803`8a29e5d5 : nt!KiBugCheckDispatch+0x69
ffffd000`2a5bafa0 fffff803`89f6206d : ffffd000`2a5bb710 00000000`00000000 ffffd000`2a5bbef8 ffffd000`2a5bb110 : nt!KiSystemServiceHandler+0x7c
ffffd000`2a5bafe0 fffff803`89e9f515 : 00000000`00000001 fffff803`89e19000 ffffd000`2a5bbe01 fffff800`00000000 : nt!RtlpExecuteHandlerForException+0xd
ffffd000`2a5bb010 fffff803`89ef2cc9 : ffffd000`2a5bbef8 ffffd000`2a5bbc10 ffffd000`2a5bbef8 ffffd000`2a5bc190 : nt!RtlDispatchException+0x1a5
ffffd000`2a5bb6e0 fffff803`89f69842 : 00000000`00000000 ffffd000`2a5bbe58 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x18d
ffffd000`2a5bbdc0 fffff803`89f66c82 : fffff800`dd9b8c58 ffffe000`4dada000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
ffffd000`2a5bbfa0 fffff800`dd9b3587 : 00000000`00000001 00000000`00000003 00000000`00000000 ffffd000`22a11230 : nt!KiPageFault+0x402 (TrapFrame @ ffffd000`2a5bbfa0)
ffffd000`2a5bc130 00000000`00000001 : 00000000`00000003 00000000`00000000 ffffd000`22a11230 ffffe000`6d4e6f49 : HPEDpHsmX64+0x2587
ffffd000`2a5bc138 00000000`00000003 : 00000000`00000000 ffffd000`22a11230 ffffe000`6d4e6f49 00000000`00000009 : 0x1
ffffd000`2a5bc140 00000000`00000000 : ffffd000`22a11230 ffffe000`6d4e6f49 00000000`00000009 ffffc000`00000000 : 0x3