Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041611-17706-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02866000 PsLoadedModuleList = 0xfffff800`02aa3e50
Debug session time: Sun Apr 17 02:43:00.404 2011 (UTC - 4:00)
System Uptime: 0 days 1:14:06.027
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1904fb, fffff880059c5338, fffff880059c4ba0, fffff800028ac1d6}
Probably caused by : Ntfs.sys ( Ntfs!NtfsExtendedCompleteRequestInternal+114 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff880059c5338
Arg3: fffff880059c4ba0
Arg4: fffff800028ac1d6
Debugging Details:
------------------
EXCEPTION_RECORD: fffff880059c5338 -- (.exr 0xfffff880059c5338)
ExceptionAddress: fffff800028ac1d6 (nt!ExfReleasePushLock+0x00000000000004ab)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff880059c4ba0 -- (.cxr 0xfffff880059c4ba0)
rax=485b5c2cb4cfb35f rbx=fffffa8003deee50 rcx=485b5c2cb4cfb350
rdx=fffffa80061f0950 rsi=fffffa80061f0950 rdi=0000000000000000
rip=fffff800028ac1d6 rsp=fffff880059c5570 rbp=fffffa8004602010
r8=fffffa80061f09b0 r9=0000000000000000 r10=fffff80002a52c00
r11=0000000000000000 r12=fffffa8004602580 r13=0000000000000000
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!ExfReleasePushLock+0x4ab:
fffff800`028ac1d6 488b5120 mov rdx,qword ptr [rcx+20h] ds:002b:485b5c2c`b4cfb370=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: ccSvcHst.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b0e0e0
ffffffffffffffff
FOLLOWUP_IP:
Ntfs!NtfsExtendedCompleteRequestInternal+114
fffff880`0145ecb4 488b5c2450 mov rbx,qword ptr [rsp+50h]
FAULTING_IP:
nt!ExfReleasePushLock+4ab
fffff800`028ac1d6 488b5120 mov rdx,qword ptr [rcx+20h]
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from fffff88001158a99 to fffff800028ac1d6
STACK_TEXT:
fffff880`059c5570 fffff880`01158a99 : ffffffff`ffffffff fffffa80`062ea830 00000000`00000000 00000000`00000000 : nt!ExfReleasePushLock+0x4ab
fffff880`059c55f0 fffff880`011622af : fffffa80`03deee50 fffffa80`061f0950 00000000`00000000 00000000`00000000 : fltmgr! ?? ::NNGAKEGL::`string'+0x9c3
fffff880`059c5630 fffff880`01159a30 : fffffa80`081a9890 fffffa80`04602010 00000000`00000000 fffffa80`07dc1f68 : fltmgr!FltpPurgeVolumeNameCache+0x7f
fffff880`059c5670 fffff880`01152d4b : fffffa80`04602010 00000000`00000000 fffffa80`0830b8e0 00000000`00000000 : fltmgr! ?? ::NNGAKEGL::`string'+0x1a04
fffff880`059c56b0 fffff880`0113506a : fffffa80`081e4620 fffffa80`045fbae0 fffff8a0`0828a670 fffff800`02a0b2dd : fltmgr!FltpReinstateNameCachingAllFrames+0x4b
fffff880`059c56e0 fffff800`028d8d26 : 00000000`00000000 fffff880`011340a2 fffffa80`081e46d0 00000000`00000000 : fltmgr!FltpPassThroughCompletion+0x8a
fffff880`059c5720 fffff880`0145ecb4 : fffffa80`07081ca0 00000000`00000001 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
fffff880`059c5800 fffff880`014e5eda : fffff8a0`0745bbc0 fffffa80`04603180 00000000`00000000 00000000`00000701 : Ntfs!NtfsExtendedCompleteRequestInternal+0x114
fffff880`059c5840 fffff880`01457ba0 : fffffa80`07081ca0 fffffa80`07dc1c10 fffff880`059c5901 fffff880`059c5900 : Ntfs!NtfsCommonSetInformation+0xef1
fffff880`059c5920 fffff880`0113223f : fffffa80`07dc1fb0 fffffa80`07dc1c10 fffffa80`07081ca0 fffff880`059c5948 : Ntfs!NtfsFsdSetInformation+0x11c
fffff880`059c59a0 fffff880`011306df : fffffa80`045fbae0 fffffa80`07dc1c10 fffffa80`045fba00 fffffa80`07dc1c10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`059c5a30 fffff800`02bb962d : 00000000`000000f2 fffff880`059c5ca0 00000000`00000000 fffffa80`06f3c210 : fltmgr!FltpDispatch+0xcf
fffff880`059c5a90 fffff800`028d5993 : 00000000`00002484 fffffa80`07367860 00000000`028be6b8 fffff800`000000f2 : nt!NtSetInformationFile+0x909
fffff880`059c5bb0 00000000`7711ffca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`028be698 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7711ffca
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: Ntfs!NtfsExtendedCompleteRequestInternal+114
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4bea1fc7
STACK_COMMAND: .cxr 0xfffff880059c4ba0 ; kb
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsExtendedCompleteRequestInternal+114
BUCKET_ID: X64_0x24_Ntfs!NtfsExtendedCompleteRequestInternal+114
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041611-27268-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02868000 PsLoadedModuleList = 0xfffff800`02aa5e50
Debug session time: Sun Apr 17 01:24:18.776 2011 (UTC - 4:00)
System Uptime: 0 days 0:28:17.493
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
...............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff880015769eb, fffff88002fd1618, fffff88002fd0e80}
Probably caused by : NETIO.SYS ( NETIO!KfdClassify+76e )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff880015769eb, The address that the exception occurred at
Arg3: fffff88002fd1618, Exception Record Address
Arg4: fffff88002fd0e80, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
NETIO!KfdClassify+76e
fffff880`015769eb 458b422c mov r8d,dword ptr [r10+2Ch]
EXCEPTION_RECORD: fffff88002fd1618 -- (.exr 0xfffff88002fd1618)
ExceptionAddress: fffff880015769eb (NETIO!KfdClassify+0x000000000000076e)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff88002fd0e80 -- (.cxr 0xfffff88002fd0e80)
rax=fffff88002fd1970 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa800608e030 rsi=fffff88002fd1c20 rdi=0000000000000000
rip=fffff880015769eb rsp=fffff88002fd1850 rbp=fffffa800450abf0
r8=0000000000000000 r9=0000000000000000 r10=0f7b9424981a9cec
r11=fffffa800608e010 r12=fffffa800366e780 r13=0000000000000010
r14=ffffffffffffffff r15=fffff88002fd1c10
iopl=0 nv up ei pl nz ac po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010217
NETIO!KfdClassify+0x76e:
fffff880`015769eb 458b422c mov r8d,dword ptr [r10+2Ch] ds:002b:0f7b9424`981a9d18=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b100e0
ffffffffffffffff
FOLLOWUP_IP:
NETIO!KfdClassify+76e
fffff880`015769eb 458b422c mov r8d,dword ptr [r10+2Ch]
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff88001622cc3 to fffff880015769eb
STACK_TEXT:
fffff880`02fd1850 fffff880`01622cc3 : fffffa80`0821f7c0 fffff880`02fd1c10 00000000`00000001 fffffa80`08381d30 : NETIO!KfdClassify+0x76e
fffff880`02fd1bc0 fffff880`016373f5 : fffffa80`0821f7c0 00000000`00000006 00000000`00000006 00000000`00000001 : tcpip!ProcessOutboundTransportLayerClassify+0x223
fffff880`02fd1d70 fffff880`01665ef6 : 00000000`00000000 fffff880`00000000 00000000`00006cec fffffa80`082152c4 : tcpip!WfpProcessOutTransportStackIndication+0x705
fffff880`02fd1f40 fffff880`0166b1ee : fffffa80`04551490 fffff880`01571807 fffff880`0176d9a0 fffffa80`0821f7c0 : tcpip!IppSendDatagramsCommon+0x526
fffff880`02fd2210 fffff880`0165de2a : fffffa80`084dacf0 00000000`00000000 00000000`00000002 00000000`00000000 : tcpip!IpNlpSendDatagrams+0x3e
fffff880`02fd2250 fffff880`01670059 : 00000000`000008fe 00000000`00000000 fffffa80`04525f02 00000000`00000000 : tcpip!TcpTcbHeaderSend+0x5ea
fffff880`02fd2400 fffff880`0167011c : fffffa80`0821f7c0 fffffa80`084dacf0 00000000`00000014 fffffa80`040c8500 : tcpip!TcpAcceptFin+0x89
fffff880`02fd2470 fffff880`01733081 : fffffa80`084dacf0 00000001`20000001 ffff0000`038b5522 fffff880`01678474 : tcpip!TcpAllowFin+0x5c
fffff880`02fd24a0 fffff880`016bcf8a : 00000000`f3401dd2 fffff880`02fd2760 00000000`f3401dd2 fffff880`01582eb9 : tcpip!TcpInspectFin+0x31
fffff880`02fd24d0 fffff880`01679334 : 00000000`00000006 fffffa80`08040002 fffffa80`082d6cec 00000000`000052c4 : tcpip! ?? ::FNODOBFM::`string'+0x3e345
fffff880`02fd2680 fffff880`0167d86a : fffffa80`04551490 00000000`00000007 fffffa80`04510158 fffffa80`0835d580 : tcpip!TcpTcbReceive+0x694
fffff880`02fd2830 fffff880`0167d4df : fffffa80`081f1fd0 fffffa80`082d3d00 fffffa80`0835d580 fffff880`01660700 : tcpip!TcpMatchReceive+0x1fa
fffff880`02fd2980 fffff880`0165f6c7 : fffffa80`082d51c4 fffffa80`04536cec fffffa80`045551c4 00000000`0000000e : tcpip!TcpPreValidatedReceive+0x29f
fffff880`02fd2a30 fffff880`0165f799 : fffff880`02fd2bb0 fffff880`0176d9a0 fffff880`02fd2bc0 fffffa80`036cc000 : tcpip!IppDeliverListToProtocol+0x97
fffff880`02fd2af0 fffff880`0165fc90 : 00000000`00000000 fffffa80`08660080 00000000`00000000 fffff880`02fd2bb0 : tcpip!IppProcessDeliverList+0x59
fffff880`02fd2b60 fffff880`016367c2 : fffffa80`036db680 fffff880`03a1501e 00000000`00000000 fffff880`01771f90 : tcpip!IppReceiveHeaderBatch+0x231
fffff880`02fd2c40 fffff800`02bd4c43 : fffffa80`044fec30 fffff800`02a7d5f8 fffffa80`036db680 fffffa80`0452bb80 : tcpip!IppLoopbackTransmit+0x72
fffff880`02fd2c80 fffff800`028e5961 : fffff800`02a7d500 fffff800`02bd4c20 fffffa80`036db680 fffff800`02a7d5f8 : nt!IopProcessWorkItem+0x23
fffff880`02fd2cb0 fffff800`02b7cc06 : 82220100`00053484 fffffa80`036db680 00000000`00000080 fffffa80`036c65f0 : nt!ExpWorkerThread+0x111
fffff880`02fd2d40 fffff800`028b6c26 : fffff880`009e9180 fffffa80`036db680 fffff880`009f3f40 18008005`018c4189 : nt!PspSystemThreadStartup+0x5a
fffff880`02fd2d80 00000000`00000000 : fffff880`02fd3000 fffff880`02fcd000 fffff880`02fd29f0 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: NETIO!KfdClassify+76e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc18a
STACK_COMMAND: .cxr 0xfffff88002fd0e80 ; kb
FAILURE_BUCKET_ID: X64_0x7E_NETIO!KfdClassify+76e
BUCKET_ID: X64_0x7E_NETIO!KfdClassify+76e
Followup: MachineOwner
---------