Jump to content

Alejandro

Members
  • Posts

    1
  • Joined

  • Last visited

Posts posted by Alejandro

  1. Had a BSOD related to ntfs.sys while saving a Word document in a drivepool drive.

    Downloading the beta right now!

    Edit: similar minidump that the one @akiller posted 

    Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
    Online Crash Dump Analysis Service
    See http://www.osronline.com for more information
    Windows 8 Kernel Version 16299 MP (16 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 16299.15.amd64fre.rs3_release.170928-1534
    Machine Name:
    Kernel base = 0xfffff800`d0a1f000 PsLoadedModuleList = 0xfffff800`d0d80fb0
    Debug session time: Fri Nov 17 16:14:49.785 2017 (UTC - 5:00)
    System Uptime: 0 days 21:55:58.649
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff80292029215, Address of the instruction which caused the bugcheck
    Arg3: ffffa98713eec4a0, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
    
    FAULTING_IP: 
    NTFS!NtfsDecodeFileObject+49
    fffff802`92029215 8b4804          mov     ecx,dword ptr [rax+4]
    
    CONTEXT:  ffffa98713eec4a0 -- (.cxr 0xffffa98713eec4a0)
    rax=0000000000000000 rbx=ffffab8e83f19360 rcx=0000000000000000
    rdx=ffffa98713eed118 rsi=ffff8080f4b31150 rdi=ffffab8e828c07f8
    rip=fffff80292029215 rsp=ffffa98713eece90 rbp=0000000000000000
     r8=ffffa98713eecf48  r9=ffffa98713eecf10 r10=ffffa98713eed0b8
    r11=ffffab8e828c07f8 r12=0000000000000005 r13=ffff8080f9f6b400
    r14=ffffa98713eed118 r15=ffffab8e83f19360
    iopl=0         nv up ei pl nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
    NTFS!NtfsDecodeFileObject+0x49:
    fffff802`92029215 8b4804          mov     ecx,dword ptr [rax+4] ds:002b:00000000`00000004=00000000
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  WINWORD.EXE
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff8029212994c to fffff80292029215
    
    STACK_TEXT:  
    ffffa987`13eece90 fffff802`9212994c : ffffab8e`994694e0 ffffab8e`99469360 ffffab8e`99469440 fffff802`908169da : NTFS!NtfsDecodeFileObject+0x49
    ffffa987`13eeced0 fffff802`92127091 : 00000000`00000000 00000000`00000000 ffffab8e`84ed0df0 ffffab8e`84e75010 : NTFS!NtfsFindTargetElements+0x48
    ffffa987`13eecf40 fffff802`92142cef : ffffab8e`828c0701 ffffab8e`828c07f8 ffff8081`00000000 ffffab8e`00000000 : NTFS!NtfsSetRenameInfo+0x2d5
    ffffa987`13eed340 fffff802`92142488 : ffffab8e`828c07f8 ffffab8e`82c2c730 ffffab8e`82c2c700 ffffab8e`8ae58200 : NTFS!NtfsCommonSetInformation+0x76f
    ffffa987`13eed420 fffff800`d0a578d9 : ffffab8e`81c38190 ffffab8e`82c2c730 ffffab8e`828c07f8 ffffa987`13eed460 : NTFS!NtfsFsdSetInformation+0xd8
    ffffa987`13eed4c0 fffff802`92a85473 : ffffab8e`81c38190 ffffab8e`8a73bcb0 00000000`00000000 ffffab8e`8a73bcb0 : nt!IofCallDriver+0x59
    ffffa987`13eed500 ffffab8e`81c38190 : ffffab8e`8a73bcb0 00000000`00000000 ffffab8e`8a73bcb0 ffffab8e`00000078 : covefs+0x55473
    ffffa987`13eed508 ffffab8e`8a73bcb0 : 00000000`00000000 ffffab8e`8a73bcb0 ffffab8e`00000078 fffff802`92a63c10 : 0xffffab8e`81c38190
    ffffa987`13eed510 00000000`00000000 : ffffab8e`8a73bcb0 ffffab8e`00000078 fffff802`92a63c10 00000000`00000000 : 0xffffab8e`8a73bcb0
    
    
    FOLLOWUP_IP: 
    covefs+55473
    fffff802`92a85473 898424e8000000  mov     dword ptr [rsp+0E8h],eax
    
    SYMBOL_STACK_INDEX:  6
    
    SYMBOL_NAME:  covefs+55473
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: covefs
    
    IMAGE_NAME:  covefs.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  59bb1a02
    
    STACK_COMMAND:  .cxr 0xffffa98713eec4a0 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_covefs+55473
    
    BUCKET_ID:  X64_0x3B_covefs+55473
    
    Followup: MachineOwner
    ---------

     

×
×
  • Create New...