Michael Flynn
New Member
- Joined
- Feb 7, 2014
- Messages
- 8
- Thread Author
- #1
Can someone help me find what is causing my computer to crash every so often.
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 000000b500190637
Arg2: ffffd0002aecd958
Arg3: ffffd0002aecd160
Arg4: fffff8000095aa44
Debugging Details:
------------------
Page a6711 not present in the dump file. Type ".hh dbgerr004" for details
EXCEPTION_RECORD: ffffd0002aecd958 -- (.exr 0xffffd0002aecd958)
ExceptionAddress: fffff8000095aa44 (Ntfs!NtfsFindPrefix+0x00000000000000d4)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffd0002aecd160 -- (.cxr 0xffffd0002aecd160;r)
rax=ffffc0000326d0d8 rbx=ffffc000043e4420 rcx=000000000000004d
rdx=0000000000000056 rsi=fffbc0000a60f430 rdi=ffffc00008abd140
rip=fffff8000095aa44 rsp=ffffd0002aecdb90 rbp=ffffd0002aecdc21
r8=ffffd0002aecdbf0 r9=ffffc00021fd085e r10=ffffd0002aecdbe0
r11=ffffd0002aecdc00 r12=ffffc00008abd1a8 r13=ffffd0002d1fb430
r14=ffffd0002aecde60 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
Ntfs!NtfsFindPrefix+0xd4:
fffff800`0095aa44 4c8b4ef8 mov r9,qword ptr [rsi-8] ds:002b:fffbc000`0a60f428=????????????????
Last set context:
rax=ffffc0000326d0d8 rbx=ffffc000043e4420 rcx=000000000000004d
rdx=0000000000000056 rsi=fffbc0000a60f430 rdi=ffffc00008abd140
rip=fffff8000095aa44 rsp=ffffd0002aecdb90 rbp=ffffd0002aecdc21
r8=ffffd0002aecdbf0 r9=ffffc00021fd085e r10=ffffd0002aecdbe0
r11=ffffd0002aecdc00 r12=ffffc00008abd1a8 r13=ffffd0002d1fb430
r14=ffffd0002aecde60 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
Ntfs!NtfsFindPrefix+0xd4:
fffff800`0095aa44 4c8b4ef8 mov r9,qword ptr [rsi-8] ds:002b:fffbc000`0a60f428=????????????????
Resetting default scope
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: taskhost.exe
CURRENT_IRQL: 1
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: ffffffffffffffff
FOLLOWUP_IP:
Ntfs!NtfsFindPrefix+d4
fffff800`0095aa44 4c8b4ef8 mov r9,qword ptr [rsi-8]
FAULTING_IP:
Ntfs!NtfsFindPrefix+d4
fffff800`0095aa44 4c8b4ef8 mov r9,qword ptr [rsi-8]
BUGCHECK_STR: 0x24
ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre
LAST_CONTROL_TRANSFER: from fffff8000095538a to fffff8000095aa44
STACK_TEXT:
ffffd000`2aecdb90 fffff800`0095538a : ffffe000`097b16f8 ffffd000`2aecde18 ffffd000`2d1fb400 ffffd000`2aecde18 : Ntfs!NtfsFindPrefix+0xd4
ffffd000`2aecdc70 fffff800`0094cca2 : ffffe000`097b16f8 ffffe000`00605c60 ffffd000`2d1fb390 ffffd000`2aecde90 : Ntfs!NtfsFindStartingNode+0x38b
ffffd000`2aecdd30 fffff800`009567ed : ffffe000`097b16f8 ffffe000`00605c60 ffffd000`2d1fb390 ffffe000`00ca3401 : Ntfs!NtfsCommonCreate+0x402
ffffd000`2aecdf50 fffff800`9e5525f7 : ffffd000`2d1fb338 00000000`0085e3b8 00000000`fe38c000 00000000`0095f7c4 : Ntfs!NtfsCommonCreateCallout+0x1d
ffffd000`2aecdf80 fffff800`9e5525bd : 00000000`00000000 00000000`00000000 ffffd000`2d1f6000 fffff800`9e4b9539 : nt!KxSwitchKernelStackCallout+0x27
ffffd000`2d1fb170 fffff800`9e4b9539 : ffffe000`00000006 00000000`00000000 00000000`00000006 00000000`00000000 : nt!KiSwitchKernelStackContinue
ffffd000`2d1fb190 fffff800`00952065 : fffff800`009567d0 ffffd000`2d1fb338 ffffe000`097b1600 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x229
ffffd000`2d1fb2e0 fffff800`00602f3e : ffffe000`000a5030 ffffe000`00605c60 fffff800`00624000 ffffe000`00605fb8 : Ntfs!NtfsFsdCreate+0x1d5
ffffd000`2d1fb4c0 fffff800`0062b341 : ffffe000`01c05380 ffffe000`07988b00 ffffd000`2064f001 ffffe000`01c05380 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x25e
ffffd000`2d1fb540 fffff800`9e7ad533 : 00000000`00000000 00000000`00000085 00000000`00000000 00000000`000007ff : fltmgr!FltpCreate+0x342
ffffd000`2d1fb5f0 fffff800`9e7a90cf : ffffc000`00014188 ffffc000`00014188 ffffc000`0078df60 ffffe000`0193e5e0 : nt!IopParseDevice+0x7b3
ffffd000`2d1fb7f0 fffff800`9e7a6ad3 : 00000000`00000000 ffffd000`2d1fb9e8 ffffe000`00000040 ffffe000`001c6c60 : nt!ObpLookupObjectName+0x6ef
ffffd000`2d1fb970 fffff800`9e7a3ec2 : ffffe000`00000001 ffffe000`07988ba8 00000021`001fe520 00000000`00000020 : nt!ObOpenObjectByName+0x1e3
ffffd000`2d1fbaa0 fffff800`9e7a1c94 : 00000021`001fe508 ffffd000`80100080 00000021`001fe560 ffffc000`0de3e2b0 : nt!IopCreateFile+0x372
ffffd000`2d1fbb40 fffff800`9e55a4b3 : ffffd000`2d1fbbe8 00000000`00000000 00000000`00000000 ffffc000`00151cb0 : nt!NtCreateFile+0x78
ffffd000`2d1fbbd0 00007ff9`43d86aca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000021`001fe488 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`43d86aca
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: Ntfs!NtfsFindPrefix+d4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5215d042
IMAGE_VERSION: 6.3.9600.16384
STACK_COMMAND: .cxr 0xffffd0002aecd160 ; kb
BUCKET_ID_FUNC_OFFSET: d4
FAILURE_BUCKET_ID: 0x24_Ntfs!NtfsFindPrefix
BUCKET_ID: 0x24_Ntfs!NtfsFindPrefix
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x24_ntfs!ntfsfindprefix
FAILURE_ID_HASH: {ccddaf85-9dc9-84e5-c2c3-4e9e236dd1c3}
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 000000b500190637
Arg2: ffffd0002aecd958
Arg3: ffffd0002aecd160
Arg4: fffff8000095aa44
Debugging Details:
------------------
Page a6711 not present in the dump file. Type ".hh dbgerr004" for details
EXCEPTION_RECORD: ffffd0002aecd958 -- (.exr 0xffffd0002aecd958)
ExceptionAddress: fffff8000095aa44 (Ntfs!NtfsFindPrefix+0x00000000000000d4)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffd0002aecd160 -- (.cxr 0xffffd0002aecd160;r)
rax=ffffc0000326d0d8 rbx=ffffc000043e4420 rcx=000000000000004d
rdx=0000000000000056 rsi=fffbc0000a60f430 rdi=ffffc00008abd140
rip=fffff8000095aa44 rsp=ffffd0002aecdb90 rbp=ffffd0002aecdc21
r8=ffffd0002aecdbf0 r9=ffffc00021fd085e r10=ffffd0002aecdbe0
r11=ffffd0002aecdc00 r12=ffffc00008abd1a8 r13=ffffd0002d1fb430
r14=ffffd0002aecde60 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
Ntfs!NtfsFindPrefix+0xd4:
fffff800`0095aa44 4c8b4ef8 mov r9,qword ptr [rsi-8] ds:002b:fffbc000`0a60f428=????????????????
Last set context:
rax=ffffc0000326d0d8 rbx=ffffc000043e4420 rcx=000000000000004d
rdx=0000000000000056 rsi=fffbc0000a60f430 rdi=ffffc00008abd140
rip=fffff8000095aa44 rsp=ffffd0002aecdb90 rbp=ffffd0002aecdc21
r8=ffffd0002aecdbf0 r9=ffffc00021fd085e r10=ffffd0002aecdbe0
r11=ffffd0002aecdc00 r12=ffffc00008abd1a8 r13=ffffd0002d1fb430
r14=ffffd0002aecde60 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
Ntfs!NtfsFindPrefix+0xd4:
fffff800`0095aa44 4c8b4ef8 mov r9,qword ptr [rsi-8] ds:002b:fffbc000`0a60f428=????????????????
Resetting default scope
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: taskhost.exe
CURRENT_IRQL: 1
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: ffffffffffffffff
FOLLOWUP_IP:
Ntfs!NtfsFindPrefix+d4
fffff800`0095aa44 4c8b4ef8 mov r9,qword ptr [rsi-8]
FAULTING_IP:
Ntfs!NtfsFindPrefix+d4
fffff800`0095aa44 4c8b4ef8 mov r9,qword ptr [rsi-8]
BUGCHECK_STR: 0x24
ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre
LAST_CONTROL_TRANSFER: from fffff8000095538a to fffff8000095aa44
STACK_TEXT:
ffffd000`2aecdb90 fffff800`0095538a : ffffe000`097b16f8 ffffd000`2aecde18 ffffd000`2d1fb400 ffffd000`2aecde18 : Ntfs!NtfsFindPrefix+0xd4
ffffd000`2aecdc70 fffff800`0094cca2 : ffffe000`097b16f8 ffffe000`00605c60 ffffd000`2d1fb390 ffffd000`2aecde90 : Ntfs!NtfsFindStartingNode+0x38b
ffffd000`2aecdd30 fffff800`009567ed : ffffe000`097b16f8 ffffe000`00605c60 ffffd000`2d1fb390 ffffe000`00ca3401 : Ntfs!NtfsCommonCreate+0x402
ffffd000`2aecdf50 fffff800`9e5525f7 : ffffd000`2d1fb338 00000000`0085e3b8 00000000`fe38c000 00000000`0095f7c4 : Ntfs!NtfsCommonCreateCallout+0x1d
ffffd000`2aecdf80 fffff800`9e5525bd : 00000000`00000000 00000000`00000000 ffffd000`2d1f6000 fffff800`9e4b9539 : nt!KxSwitchKernelStackCallout+0x27
ffffd000`2d1fb170 fffff800`9e4b9539 : ffffe000`00000006 00000000`00000000 00000000`00000006 00000000`00000000 : nt!KiSwitchKernelStackContinue
ffffd000`2d1fb190 fffff800`00952065 : fffff800`009567d0 ffffd000`2d1fb338 ffffe000`097b1600 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x229
ffffd000`2d1fb2e0 fffff800`00602f3e : ffffe000`000a5030 ffffe000`00605c60 fffff800`00624000 ffffe000`00605fb8 : Ntfs!NtfsFsdCreate+0x1d5
ffffd000`2d1fb4c0 fffff800`0062b341 : ffffe000`01c05380 ffffe000`07988b00 ffffd000`2064f001 ffffe000`01c05380 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x25e
ffffd000`2d1fb540 fffff800`9e7ad533 : 00000000`00000000 00000000`00000085 00000000`00000000 00000000`000007ff : fltmgr!FltpCreate+0x342
ffffd000`2d1fb5f0 fffff800`9e7a90cf : ffffc000`00014188 ffffc000`00014188 ffffc000`0078df60 ffffe000`0193e5e0 : nt!IopParseDevice+0x7b3
ffffd000`2d1fb7f0 fffff800`9e7a6ad3 : 00000000`00000000 ffffd000`2d1fb9e8 ffffe000`00000040 ffffe000`001c6c60 : nt!ObpLookupObjectName+0x6ef
ffffd000`2d1fb970 fffff800`9e7a3ec2 : ffffe000`00000001 ffffe000`07988ba8 00000021`001fe520 00000000`00000020 : nt!ObOpenObjectByName+0x1e3
ffffd000`2d1fbaa0 fffff800`9e7a1c94 : 00000021`001fe508 ffffd000`80100080 00000021`001fe560 ffffc000`0de3e2b0 : nt!IopCreateFile+0x372
ffffd000`2d1fbb40 fffff800`9e55a4b3 : ffffd000`2d1fbbe8 00000000`00000000 00000000`00000000 ffffc000`00151cb0 : nt!NtCreateFile+0x78
ffffd000`2d1fbbd0 00007ff9`43d86aca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000021`001fe488 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`43d86aca
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: Ntfs!NtfsFindPrefix+d4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5215d042
IMAGE_VERSION: 6.3.9600.16384
STACK_COMMAND: .cxr 0xffffd0002aecd160 ; kb
BUCKET_ID_FUNC_OFFSET: d4
FAILURE_BUCKET_ID: 0x24_Ntfs!NtfsFindPrefix
BUCKET_ID: 0x24_Ntfs!NtfsFindPrefix
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x24_ntfs!ntfsfindprefix
FAILURE_ID_HASH: {ccddaf85-9dc9-84e5-c2c3-4e9e236dd1c3}
Followup: MachineOwner
---------