It doesnt seem to be the lvr64.sys popping up.. Not sure if I should post all of the errors, as there are 49, earliest one being the 21 Dec 09. (I had clean-installed Vista again on the 20th)
I really have no idea what any of this means.. and googling can only get you so far.
Here is a few more of my latest crashes.
Debug session time: Fri Jan 1 19:01:29.377 2010 (GMT+8)
System Uptime: 0 days 0:00:19.064
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80001ce3582, Address of the exception record for the exception that caused the bugcheck
Arg3: fffffa6004e20280, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!NtAlpcOpenSenderThread+42
fffff800`01ce3582 448ab853010000 mov r15b,byte ptr [rax+153h]
CONTEXT: fffffa6004e20280 -- (.cxr 0xfffffa6004e20280)
rax=0000000009f22060 rbx=fffffa8009f22060 rcx=0000000000d8fc20
rdx=0000000000000080 rsi=0000000000d8fbc8 rdi=0000000000d8fce0
rip=fffff80001ce3582 rsp=fffffa6004e20ae0 rbp=fffffa6004e20ca0
r8=0000000000d8fce0 r9=0000000000000000 r10=0000000000000080
r11=fffff80001aa6e10 r12=0000000000000015 r13=0000000000d8fc20
r14=0000000000000000 r15=00000000004b4730
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!NtAlpcOpenSenderThread+0x42:
fffff800`01ce3582 448ab853010000 mov r15b,byte ptr [rax+153h] ds:002b:00000000`09f221b3=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 3
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80001aa6e33 to fffff80001ce3582
STACK_TEXT:
fffffa60`04e20ae0 fffff800`01aa6e33 : fffffa80`09f22060 fffffa60`04e20bc8 00000000`00000015 ffff4c1c`33d8bd48 : nt!NtAlpcOpenSenderThread+0x42
fffffa60`04e20bb0 00000000`775c628a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00d8fba8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775c628a
FOLLOWUP_IP:
nt!NtAlpcOpenSenderThread+42
fffff800`01ce3582 448ab853010000 mov r15b,byte ptr [rax+153h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!NtAlpcOpenSenderThread+42
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 479192b7
STACK_COMMAND: .cxr 0xfffffa6004e20280 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!NtAlpcOpenSenderThread+42
BUCKET_ID: X64_0x3B_nt!NtAlpcOpenSenderThread+42
Followup: MachineOwner
---------
Debug session time: Fri Jan 1 22:06:59.931 2010 (GMT+8)
System Uptime: 0 days 2:03:23.430
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffffa900a0575c8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffffa6002f2d1b0, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001c89080
fffffa900a0575c8
CURRENT_IRQL: 2
FAULTING_IP:
dxgkrnl!VidSchiSelectContextFromThisPriority+30
fffffa60`02f2d1b0 498bb4edd8050000 mov rsi,qword ptr [r13+rbp*8+5D8h]
CUSTOMER_CRASH_COUNT: 5
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffffa600531c990 -- (.trap 0xfffffa600531c990)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800a057000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffffa6002f2d1b0 rsp=fffffa600531cb20 rbp=00000001fffffffe
r8=0000000000000000 r9=0000000000000001 r10=0000000000000003
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
dxgkrnl!VidSchiSelectContextFromThisPriority+0x30:
fffffa60`02f2d1b0 498bb4edd8050000 mov rsi,qword ptr [r13+rbp*8+5D8h] ds:cbf0:00000010`000005c8=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80001ab512e to fffff80001ab5390
STACK_TEXT:
fffffa60`0531c848 fffff800`01ab512e : 00000000`0000000a fffffa90`0a0575c8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffa60`0531c850 fffff800`01ab400b : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`0a057000 : nt!KiBugCheckDispatch+0x6e
fffffa60`0531c990 fffffa60`02f2d1b0 : fffff880`059f2690 00000000`00000001 fffffa80`0a055000 fffffa60`02f295fb : nt!KiPageFault+0x20b
fffffa60`0531cb20 fffffa60`02f2d393 : fffffa80`0a057000 00000000`00000001 00000000`00000001 00000000`ffffffff : dxgkrnl!VidSchiSelectContextFromThisPriority+0x30
fffffa60`0531cb80 fffffa60`02f2ce1b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!VidSchiSelectContext+0xef
fffffa60`0531cbf0 fffffa60`02fe7c8d : 00000000`00000000 fffffa80`07e2f5b0 00000000`00000080 fffffa80`0a050010 : dxgkrnl!VidSchiScheduleCommandToRun+0xbb
fffffa60`0531cd10 fffff800`01cd8de3 : fffffa80`09f82a60 fffff800`01aaf677 00000000`00000000 00000000`00000001 : dxgkrnl!VidSchiWorkerThread+0x95
fffffa60`0531cd50 fffff800`01aef536 : fffff800`01bd4680 fffffa80`09f82a60 fffff800`01bd9b80 00000000`00000001 : nt!PspSystemThreadStartup+0x57
fffffa60`0531cd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgkrnl!VidSchiSelectContextFromThisPriority+30
fffffa60`02f2d1b0 498bb4edd8050000 mov rsi,qword ptr [r13+rbp*8+5D8h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: dxgkrnl!VidSchiSelectContextFromThisPriority+30
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 479193e6
FAILURE_BUCKET_ID: X64_0xD1_dxgkrnl!VidSchiSelectContextFromThisPriority+30
BUCKET_ID: X64_0xD1_dxgkrnl!VidSchiSelectContextFromThisPriority+30
Followup: MachineOwner
---------
Debug session time: Fri Jan 1 23:00:08.896 2010 (GMT+8)
System Uptime: 0 days 0:06:21.008
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffffa6002fdc740, The address that the exception occurred at
Arg3: fffffa6001b9a778, Exception Record Address
Arg4: fffffa6001b9a150, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
dxgkrnl!VIDMM_SEGMENT::TrimAllProcesses+1d8
fffffa60`02fdc740 483901 cmp qword ptr [rcx],rax
EXCEPTION_RECORD: fffffa6001b9a778 -- (.exr 0xfffffa6001b9a778)
ExceptionAddress: fffffa6002fdc740 (dxgkrnl!VIDMM_SEGMENT::TrimAllProcesses+0x00000000000001d8)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 000000000003c200
Attempt to read from address 000000000003c200
CONTEXT: fffffa6001b9a150 -- (.cxr 0xfffffa6001b9a150)
rax=0000000000010821 rbx=000000000000000c rcx=000000000003c200
rdx=fffffa8009eff910 rsi=fffff88009d4fb50 rdi=fffffa800acf83a0
rip=fffffa6002fdc740 rsp=fffffa6001b9a9b0 rbp=fffff88005a2c840
r8=0000000000000000 r9=0000000000000006 r10=fffff880081b8810
r11=0000000000000001 r12=fffff880081b8770 r13=00000000c01e0100
r14=fffff88009435220 r15=fffffa800a73e950
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
dxgkrnl!VIDMM_SEGMENT::TrimAllProcesses+0x1d8:
fffffa60`02fdc740 483901 cmp qword ptr [rcx],rax ds:002b:00000000`0003c200=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 6
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 000000000003c200
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001c89080
000000000003c200
FOLLOWUP_IP:
dxgkrnl!VIDMM_SEGMENT::TrimAllProcesses+1d8
fffffa60`02fdc740 483901 cmp qword ptr [rcx],rax
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffffa6002fdc8c3 to fffffa6002fdc740
STACK_TEXT:
fffffa60`01b9a9b0 fffffa60`02fdc8c3 : fffff880`05a2c840 00000000`c01e0100 00000000`00000000 fffffa80`fffff8d3 : dxgkrnl!VIDMM_SEGMENT::TrimAllProcesses+0x1d8
fffffa60`01b9aa60 fffffa60`02fc9c91 : 00000000`000000f9 fffffa60`01b9abb0 00000000`c01e0116 fffffa80`09efe000 : dxgkrnl!VIDMM_SEGMENT::MarkCandidateForEviction+0x7b
fffffa60`01b9aaa0 fffffa60`02fe51c8 : fffffa60`00000000 fffff880`098393d0 fffffa80`00000000 fffffa80`07e13f20 : dxgkrnl!VIDMM_GLOBAL:
repareDmaBuffer+0x539
fffffa60`01b9ab50 fffffa60`02fe4fa4 : fffffa60`017dbcc0 fffffa80`069c4c00 00000000`00000000 fffffa60`00000000 : dxgkrnl!VidSchiSubmitRenderCommand+0x1b0
fffffa60`01b9ace0 fffffa60`02fe4ca9 : 00000000`00000000 fffffa80`0746e750 00000000`00000080 fffffa80`09eb4540 : dxgkrnl!VidSchiSubmitQueueCommand+0x50
fffffa60`01b9ad10 fffff800`01cd8de3 : fffffa80`09e22060 fffff800`01aaf677 fffffa60`0221c850 00000000`00000001 : dxgkrnl!VidSchiWorkerThread+0xb1
fffffa60`01b9ad50 fffff800`01aef536 : fffffa60`017d8180 fffffa80`09e22060 fffffa60`017e1d40 00000000`00000001 : nt!PspSystemThreadStartup+0x57
fffffa60`01b9ad80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: dxgkrnl!VIDMM_SEGMENT::TrimAllProcesses+1d8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 479193e6
STACK_COMMAND: .cxr 0xfffffa6001b9a150 ; kb
FAILURE_BUCKET_ID: X64_0x7E_dxgkrnl!VIDMM_SEGMENT::TrimAllProcesses+1d8
BUCKET_ID: X64_0x7E_dxgkrnl!VIDMM_SEGMENT::TrimAllProcesses+1d8
Followup: MachineOwner
---------
Debug session time: Mon Jan 4 19:29:17.940 2010 (GMT+8)
System Uptime: 0 days 1:21:20.932
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904aa
Arg2: fffffa6009ba8098
Arg3: fffffa6009ba7a70
Arg4: fffffa60010eec03
Debugging Details:
------------------
EXCEPTION_RECORD: fffffa6009ba8098 -- (.exr 0xfffffa6009ba8098)
ExceptionAddress: fffffa60010eec03 (Ntfs!NtOfsSetLength+0x00000000000000c3)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000001
Parameter[1]: 0000000009ba8330
Attempt to write to address 0000000009ba8330
CONTEXT: fffffa6009ba7a70 -- (.cxr 0xfffffa6009ba7a70)
rax=0000000030810000 rbx=fffff8800064f710 rcx=0000000009ba8330
rdx=fffffa800b2b84c0 rsi=00000000307a5268 rdi=fffff8800064f5e0
rip=fffffa60010eec03 rsp=fffffa6009ba82d0 rbp=fffffa6009ba8880
r8=0000000000000000 r9=fffffa80093bb380 r10=0000000000000000
r11=fffffa6009ba82a0 r12=00000000307a5200 r13=fffffa8007673290
r14=0000000000000000 r15=fffffa80093891e0
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
Ntfs!NtOfsSetLength+0xc3:
fffffa60`010eec03 488901 mov qword ptr [rcx],rax ds:002b:00000000`09ba8330=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 4
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
PROCESS_NAME: GSvr.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: 0000000009ba8330
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80001c71080
0000000009ba8330
FOLLOWUP_IP:
Ntfs!NtOfsSetLength+c3
fffffa60`010eec03 488901 mov qword ptr [rcx],rax
FAULTING_IP:
Ntfs!NtOfsSetLength+c3
fffffa60`010eec03 488901 mov qword ptr [rcx],rax
BUGCHECK_STR: 0x24
DEVICE_OBJECT: fffffa800896fa58
LAST_CONTROL_TRANSFER: from fffffa60010efa47 to fffffa60010eec03
STACK_TEXT:
fffffa60`09ba82d0 fffffa60`010efa47 : fffffa80`07673290 fffffa80`0760f180 fffffa80`07673290 00000000`00000058 : Ntfs!NtOfsSetLength+0xc3
fffffa60`09ba83d0 fffffa60`010ee654 : fffffa80`07673290 00000000`00000001 00000000`307a5210 fffffa80`085bb000 : Ntfs!NtOfsPutData+0x57
fffffa60`09ba8510 fffffa60`010ef8ee : fffffa80`07673290 fffffa60`09ba8800 fffffa80`07673310 00000000`00000001 : Ntfs!NtfsWriteFcbUsnRecordToJournal+0xa4
fffffa60`09ba85d0 fffffa60`01018837 : 00000000`00000000 fffffa80`0760f180 fffff880`0648c010 fffff880`0648c140 : Ntfs!NtfsWriteUsnJournalChanges+0x15e
fffffa60`09ba8650 fffffa60`0101b118 : fffffa80`07673290 fffffa80`0896f670 fffffa60`09ba8800 fffffa60`09ba8800 : Ntfs!NtfsCommonWrite+0xdd7
fffffa60`09ba8850 fffffa60`00a06e17 : fffffa80`0896fa10 fffffa80`0896f670 fffffa80`09e7ade0 fffffa80`085bb010 : Ntfs!NtfsFsdWrite+0x208
fffffa60`09ba8910 fffffa60`00a060dd : fffffa80`0896f670 fffffa80`0881e590 fffffa80`09e7ad01 fffffa60`09ba8af8 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x227
fffffa60`09ba8980 fffffa60`00aa6dd4 : fffffa80`0896f670 00000000`025ff8bc fffffa80`0896f670 00000000`00000001 : fltmgr!FltpDispatch+0xcd
fffffa60`09ba89e0 fffffa80`0896f670 : 00000000`025ff8bc fffffa80`0896f670 00000000`00000001 fffffa60`09ba8b48 : mfehidk+0x47dd4
fffffa60`09ba89e8 00000000`025ff8bc : fffffa80`0896f670 00000000`00000001 fffffa60`09ba8b48 fffffa80`09e7ade0 : 0xfffffa80`0896f670
fffffa60`09ba89f0 fffffa80`0896f670 : 00000000`00000001 fffffa60`09ba8b48 fffffa80`09e7ade0 fffffa80`093a1580 : 0x25ff8bc
fffffa60`09ba89f8 00000000`00000001 : fffffa60`09ba8b48 fffffa80`09e7ade0 fffffa80`093a1580 fffffa80`09e7ade0 : 0xfffffa80`0896f670
fffffa60`09ba8a00 fffffa60`09ba8b48 : fffffa80`09e7ade0 fffffa80`093a1580 fffffa80`09e7ade0 fffffa80`0896f670 : 0x1
fffffa60`09ba8a08 fffffa80`09e7ade0 : fffffa80`093a1580 fffffa80`09e7ade0 fffffa80`0896f670 fffffa80`0896fa10 : 0xfffffa60`09ba8b48
fffffa60`09ba8a10 fffffa80`093a1580 : fffffa80`09e7ade0 fffffa80`0896f670 fffffa80`0896fa10 ff0b0101`55555555 : 0xfffffa80`09e7ade0
fffffa60`09ba8a18 fffffa80`09e7ade0 : fffffa80`0896f670 fffffa80`0896fa10 ff0b0101`55555555 fffffa80`09389350 : 0xfffffa80`093a1580
fffffa60`09ba8a20 fffffa80`0896f670 : fffffa80`0896fa10 ff0b0101`55555555 fffffa80`09389350 fffffa80`0896f670 : 0xfffffa80`09e7ade0
fffffa60`09ba8a28 fffffa80`0896fa10 : ff0b0101`55555555 fffffa80`09389350 fffffa80`0896f670 fffff800`01d2c32c : 0xfffffa80`0896f670
fffffa60`09ba8a30 ff0b0101`55555555 : fffffa80`09389350 fffffa80`0896f670 fffff800`01d2c32c 00000000`00000001 : 0xfffffa80`0896fa10
fffffa60`09ba8a38 fffffa80`09389350 : fffffa80`0896f670 fffff800`01d2c32c 00000000`00000001 00000000`00000000 : 0xff0b0101`55555555
fffffa60`09ba8a40 fffffa80`0896f670 : fffff800`01d2c32c 00000000`00000001 00000000`00000000 fffffa80`093a3bc0 : 0xfffffa80`09389350
fffffa60`09ba8a48 fffff800`01d2c32c : 00000000`00000001 00000000`00000000 fffffa80`093a3bc0 00000000`00000003 : 0xfffffa80`0896f670
fffffa60`09ba8a50 fffff800`01d2b37f : fffffa80`0896fa58 00000000`00000000 fffffa80`0881e590 fffffa60`09ba8ca0 : nt!IopSynchronousServiceTail+0x13c
fffffa60`09ba8ab0 fffff800`01a9ce33 : 00000000`00000201 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x7ee
fffffa60`09ba8bb0 00000000`75033917 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0022f0b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75033917
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: Ntfs!NtOfsSetLength+c3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 479190d1
STACK_COMMAND: .cxr 0xfffffa6009ba7a70 ; kb
FAILURE_BUCKET_ID: X64_0x24_INVALID_STACK_ACCESS_Ntfs!NtOfsSetLength+c3
BUCKET_ID: X64_0x24_INVALID_STACK_ACCESS_Ntfs!NtOfsSetLength+c3
Followup: MachineOwner
---------