New issue
Advanced search Search tips

Issue 245 attachment: tm_crash.txt (4.6 KB)

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED (8e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82edeb30, The address that the exception occurred at
Arg3: 8b963978, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP:
CLFS!CClfsBaseFilePersisted::PrivGetContainer+0
82edeb30 8b4158 mov eax,dword ptr [ecx+58h]

TRAP_FRAME: 8b963978 -- (.trap 0xffffffff8b963978)
ErrCode = 00000000
eax=006f0072 ebx=00000000 ecx=006f0072 edx=746c6644 esi=00000000 edi=c0000000
eip=82edeb30 esp=8b9639ec ebp=8b9639f0 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
CLFS!CClfsBaseFilePersisted::PrivGetContainer:
82edeb30 8b4158 mov eax,dword ptr [ecx+58h] ds:0023:006f00ca=????????
Resetting default scope

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0x8E

PROCESS_NAME: TransactionMan

CURRENT_IRQL: 2

ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) x86fre

LAST_CONTROL_TRANSFER: from 828f6f6f to 828928d8

STACK_TEXT:
8b962f2c 828f6f6f 00000003 abded18e 00000065 nt!RtlpBreakWithStatusInstruction
8b962f7c 828f7a6d 00000003 8b963380 00000000 nt!KiBugCheckDebugBreak+0x1c
8b963340 828f6e0c 0000008e c0000005 82edeb30 nt!KeBugCheck2+0x68b
8b963364 828cc56e 0000008e c0000005 82edeb30 nt!KeBugCheckEx+0x1e
8b963908 828564a6 8b963924 00000000 8b963978 nt!KiDispatchException+0x1ac
8b963970 8285645a 8b9639f0 82edeb30 badb0d00 nt!CommonDispatchException+0x4a
8b9639e8 82ed5cb1 8b963a28 829bf908 867209c0 nt!Kei386EoiHelper+0x192
8b9639f0 829bf908 867209c0 8b963a30 c0000000 CLFS!ClfsPrivGetBaseLogFileFromFileObjectPointer+0x21
8b963a28 829c1413 868853d8 8b963a99 abdec5ce nt!TmpIsClusteredTransactionManager+0x1f
8b963b3c 829b76b5 868853d8 abdec586 868853d8 nt!TmpCreateLogFile+0x199
8b963b74 829bf194 868853d8 00000000 868853d8 nt!TmpCreateOrOpenLogTransactionManager+0x24
8b963bb4 829c01d5 8b963bd4 00000000 abdec2e6 nt!TmInitializeTransactionManager+0x1d2
8b963c14 828558c6 0025f5c0 000f003f 0025f5c4 nt!NtCreateTransactionManager+0x155
8b963c14 77a570f4 0025f5c0 000f003f 0025f5c4 nt!KiSystemServicePostCall
0025f578 77a557b4 00b519ef 0025f5c0 000f003f ntdll!KiFastSystemCallRet
0025f57c 00b519ef 0025f5c0 000f003f 0025f5c4 ntdll!NtCreateTransactionManager+0xc
WARNING: Stack unwind information not available. Following frames may be wrong.
0025f808 00b52170 00000001 00462038 004620b0 TransactionManagerTest+0x19ef
0025f850 76dbee1c 7ffdb000 0025f89c 77a737eb TransactionManagerTest+0x2170
0025f85c 77a737eb 7ffdb000 778f12e7 00000000 kernel32!BaseThreadInitThunk+0xe
0025f89c 77a737be 00b521ed 7ffdb000 00000000 ntdll!__RtlUserThreadStart+0x70
0025f8b4 00000000 00b521ed 7ffdb000 00000000 ntdll!_RtlUserThreadStart+0x1b


STACK_COMMAND: kb

FOLLOWUP_IP:
CLFS!CClfsBaseFilePersisted::PrivGetContainer+0
82edeb30 8b4158 mov eax,dword ptr [ecx+58h]

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: CLFS!CClfsBaseFilePersisted::PrivGetContainer+0

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: CLFS

IMAGE_NAME: CLFS.SYS

DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bbf0e

FAILURE_BUCKET_ID: 0x8E_CLFS!CClfsBaseFilePersisted::PrivGetContainer+0

BUCKET_ID: 0x8E_CLFS!CClfsBaseFilePersisted::PrivGetContainer+0

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x8e_clfs!cclfsbasefilepersisted::privgetcontainer+0

FAILURE_ID_HASH: {cf47799f-5107-43f4-1e7f-57a5b542ead0}

Followup: MachineOwner
---------