Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\010711-51090-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03c4f000 PsLoadedModuleList = 0xfffff800`03e8ce50
Debug session time: Thu Jan 6 11:17:38.526 2011 (UTC - 5:00)
System Uptime: 0 days 0:20:38.697
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffffa80389a6ee0, 2, 1, fffff80003ca445b}
Probably caused by : memory_corruption ( nt!MmPurgeSection+4eb )
Followup: MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa80389a6ee0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003ca445b, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ef70e0
fffffa80389a6ee0
CURRENT_IRQL: 2
FAULTING_IP:
nt!MmPurgeSection+4eb
fffff800`03ca445b f00fba6b1000 lock bts dword ptr [rbx+10h],0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff8800337e1f0 -- (.trap 0xfffff8800337e1f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8800337e2e8 rbx=0000000000000000 rcx=fffff8800337e2e8
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003ca445b rsp=fffff8800337e380 rbp=0000058000000000
r8=fffffa8000371520 r9=0000000000000000 r10=fffff80003ef9840
r11=fffff8800337e350 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!MmPurgeSection+0x4eb:
fffff800`03ca445b f00fba6b1000 lock bts dword ptr [rbx+10h],0 ds:00000000`00000010=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003cbeca9 to fffff80003cbf740
STACK_TEXT:
fffff880`0337e0a8 fffff800`03cbeca9 : 00000000`0000000a fffffa80`389a6ee0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0337e0b0 fffff800`03cbd920 : 00000000`000007ff fffffa80`389a6ed0 fffff8a0`11b23000 fffffa80`0d3e8a30 : nt!KiBugCheckDispatch+0x69
fffff880`0337e1f0 fffff800`03ca445b : 00000000`012de24f 00000000`00012346 fffffa80`00369d20 00000580`00000000 : nt!KiPageFault+0x260
fffff880`0337e380 fffff800`03ca4b82 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`01250500 : nt!MmPurgeSection+0x4eb
fffff880`0337e470 fffff880`012bcd21 : fffffa80`0dce63a8 00000000`00000000 00000000`00000000 fffffa80`00000000 : nt!CcPurgeCacheSection+0x172
fffff880`0337e4e0 fffff880`013bdf32 : fffffa80`13f6be40 fffffa80`0d27b180 00000000`00000000 fffffa80`0d27b101 : Ntfs!NtfsFlushVolume+0x601
fffff880`0337e610 fffff880`01314a7c : fffffa80`13fd23f8 fffffa80`0d27b180 fffffa80`0d27b180 00000000`00000000 : Ntfs!NtfsPerformSurpriseRemoval+0x32
fffff880`0337e660 fffff880`0132020c : fffffa80`13f6be40 fffff880`0337e7e8 fffff880`0337e7f0 00000000`00000001 : Ntfs!NtfsCommonPnp+0x7eb
fffff880`0337e740 fffff880`010af23f : fffffa80`13fd2440 00000000`00000000 fffff880`0337e801 fffffa80`13f6be40 : Ntfs!NtfsFsdPnp+0x1f0
fffff880`0337e7e0 fffff880`010ad6df : fffffa80`0c501060 fffff880`0337e988 fffffa80`0c501000 fffffa80`13fd2010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`0337e870 fffff800`03f2b519 : fffffa80`0c501060 00000000`c00000bb fffff880`0337e988 fffffa80`13fd2010 : fltmgr!FltpDispatch+0xcf
fffff880`0337e8d0 fffff800`040a9831 : fffffa80`0c27e060 fffffa80`0d27b030 fffffa80`0c3cb5b0 fffffa80`0c27e060 : nt!IopSynchronousCall+0xc5
fffff880`0337e940 fffff800`040a42a8 : fffff880`0337eb00 fffffa80`0c27e060 00000000`0000030a 00000000`00000308 : nt!IopRemoveDevice+0x101
fffff880`0337ea00 fffff800`040a9377 : fffffa80`0c3cb5b0 00000000`00000000 00000000`00000003 00000000`000007ff : nt!PnpSurpriseRemoveLockedDeviceNode+0x128
fffff880`0337ea40 fffff800`040a9490 : 00000000`00000000 fffff8a0`336de800 fffff8a0`3755bda0 fffff880`0337eb98 : nt!PnpDeleteLockedDeviceNode+0x37
fffff880`0337ea70 fffff800`0413941f : 00000000`00000002 00000000`00000000 fffffa80`0c3cb5b0 00000000`00000000 : nt!PnpDeleteLockedDeviceNodes+0xa0
fffff880`0337eae0 fffff800`04139fdc : fffff880`0337ecb8 00000000`00000000 fffff8a0`3180f200 fffffa80`00000000 : nt!PnpProcessQueryRemoveAndEject+0x6cf
fffff880`0337ec20 fffff800`040250dc : 00000000`00000000 fffffa80`0c4833c0 fffff8a0`336de810 00000000`00000001 : nt!PnpProcessTargetDeviceEvent+0x4c
fffff880`0337ec50 fffff800`03ccc961 : fffff800`03f2b008 fffff8a0`336de810 fffff800`03e645f8 fffff800`03e645f8 : nt! ?? ::NNGAKEGL::`string'+0x58ffb
fffff880`0337ecb0 fffff800`03f63c06 : 3026919a`89c0bda3 fffffa80`09d59b60 00000000`00000080 fffffa80`09d41040 : nt!ExpWorkerThread+0x111
fffff880`0337ed40 fffff800`03c9dc26 : fffff880`0316a180 fffffa80`09d59b60 fffff880`031750c0 ae9b538d`0140d416 : nt!PspSystemThreadStartup+0x5a
fffff880`0337ed80 00000000`00000000 : fffff880`0337f000 fffff880`03379000 fffff880`0337dcd0 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MmPurgeSection+4eb
fffff800`03ca445b f00fba6b1000 lock bts dword ptr [rbx+10h],0
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MmPurgeSection+4eb
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MmPurgeSection+4eb
BUCKET_ID: X64_0xA_nt!MmPurgeSection+4eb
Followup: MachineOwner
---------