Your MacDrive software is casuing the issues: MDFSYSNT.sys
Uninstall it:
Uninstall it:
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\Temp\Rar$DI00.498\102110-52556-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
WARNING: Whitespace at end of path element
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82c03000 PsLoadedModuleList = 0x82d4b810
Debug session time: Thu Oct 21 19:43:13.860 2010 (UTC - 4:00)
System Uptime: 0 days 0:08:41.734
Loading Kernel Symbols
...............................................................
................................................................
........................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007F, {8, 801df000, 0, 0}
*** WARNING: Unable to verify timestamp for MDFSYSNT.sys
*** ERROR: Module load completed but symbols could not be loaded for MDFSYSNT.sys
Probably caused by : 1394ohci.sys ( 1394ohci!AsyncTx::WdfEvtIoInternalDeviceControl+47 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
Arg2: 801df000
Arg3: 00000000
Arg4: 00000000
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 8339cb06 to 833a97d2
STACK_TEXT:
9ea9b010 8339cb06 9ea9b044 9ea9b05c 7992c178 Wdf01000!FxRequest::GetParameters+0x5d
9ea9b024 8fda8783 00000000 866d3e80 9ea9b044 Wdf01000!imp_WdfRequestGetParameters+0xc9
9ea9b05c 833b7072 79e11dd0 7992c178 86660610 1394ohci!AsyncTx::WdfEvtIoInternalDeviceControl+0x47
9ea9b080 833b8432 79e11dd0 7992c178 86660610 Wdf01000!FxIoQueueIoInternalDeviceControl::Invoke+0x30
9ea9b0b0 833ba9ac 7992c178 866d3e80 861ee228 Wdf01000!FxIoQueue::DispatchRequestToDriver+0x37f
9ea9b0cc 833bbb7f 861ee202 00000000 866d3e80 Wdf01000!FxIoQueue::DispatchEvents+0x3be
9ea9b0ec 833bc29b 866d3e80 86224c40 862268c0 Wdf01000!FxIoQueue::QueueRequestFromForward+0x139
9ea9b114 833bc70f 866d3e02 861ee228 7992c178 Wdf01000!FxIoQueue::ForwardRequestWorker+0xfe
9ea9b134 8339cedd 861ee228 866d3e80 86224e40 Wdf01000!FxIoQueue::ForwardRequest+0x144
9ea9b154 8fdac374 00000000 7992c178 861ee228 Wdf01000!imp_WdfRequestForwardToIoQueue+0x107
9ea9b174 8fdac5de 7992c178 86660610 86224d34 1394ohci!Dispatch::DispatchIrbRequest+0x76
9ea9b1a4 833b7072 79ddb3b8 7992c178 86660610 1394ohci!Dispatch::WdfEvtIoInternalDeviceControl+0xda
9ea9b1c8 833b8432 79ddb3b8 7992c178 86660610 Wdf01000!FxIoQueueIoInternalDeviceControl::Invoke+0x30
9ea9b1f8 833ba9ac 7992c178 866d3e80 86224c40 Wdf01000!FxIoQueue::DispatchRequestToDriver+0x37f
9ea9b214 833bba36 86224c02 00000000 86226cf8 Wdf01000!FxIoQueue::DispatchEvents+0x3be
9ea9b234 833bd824 866d3e80 79ad2be0 86023ba0 Wdf01000!FxIoQueue::QueueRequest+0x1ec
9ea9b258 833aca3f 86536008 9ea9b27c 82c3f4bc Wdf01000!FxPkgIo::Dispatch+0x27d
9ea9b264 82c3f4bc 86023ba0 86536008 9ea9b2b8 Wdf01000!FxDevice::Dispatch+0x7f
9ea9b27c 8339e0da 9ea9b2c8 79ad2be0 00000000 nt!IofCallDriver+0x63
9ea9b294 8fda90b7 865c55b0 864eadb8 8652d418 Wdf01000!imp_WdfRequestSend+0x254
9ea9b2c8 8fdaa4c4 79b15240 86660610 865c5778 1394ohci!ChildDevice::DispatchIrbRequest+0x55
9ea9b90c 8fdaa990 79b15240 86660610 8652be00 1394ohci!ChildDevice::DispatchAsyncWriteRequest+0x1be
9ea9b928 8fdaab0c 79b15240 86660610 8652bef4 1394ohci!ChildDevice::HandleIrbRequest+0x8c
9ea9b958 833b7072 79ad41f8 79b15240 86660610 1394ohci!ChildDevice::WdfEvtIoInternalDeviceControl+0xe8
9ea9b97c 833b8432 79ad41f8 79b15240 86660610 Wdf01000!FxIoQueueIoInternalDeviceControl::Invoke+0x30
9ea9b9ac 833ba9ac 79b15240 864eadb8 8652be00 Wdf01000!FxIoQueue::DispatchRequestToDriver+0x37f
9ea9b9c8 833bba36 8652be02 00000000 8652dbf0 Wdf01000!FxIoQueue::DispatchEvents+0x3be
9ea9b9e8 833bd824 864eadb8 8665f0e0 8652d6e0 Wdf01000!FxIoQueue::QueueRequest+0x1ec
9ea9ba0c 833aca3f 86536008 9ea9ba30 82c3f4bc Wdf01000!FxPkgIo::Dispatch+0x27d
9ea9ba18 82c3f4bc 8652d6e0 86536008 8657fa48 Wdf01000!FxDevice::Dispatch+0x7f
9ea9ba30 89456199 8665f188 8665f0e0 00000000 nt!IofCallDriver+0x63
9ea9ba54 894525b0 8665f0e0 0256b880 00000001 sbp2port!Sbp2SendRequest+0x13b
9ea9ba80 89452681 8665f0e0 8665f188 00000408 sbp2port!Sbp2AccessRegisterEx+0x2c8
9ea9ba98 89456de1 8665f0e0 8665f188 00000408 sbp2port!Sbp2AccessRegister+0x15
9ea9bae4 8945785b 0000003c 86528144 86206da8 sbp2port!Sbp2InsertTailList+0x155
9ea9bb08 8fda4daa 005365e0 862268c0 8643c9c8 sbp2port!Sbp2AllocComplete+0x24d
9ea9bb3c 8338d906 79bc3630 00000000 864c3090 1394ohci!AsyncRx::WdfEvtProgramAsyncRxDma+0x14a
9ea9bb64 83017a2e 86023ba0 00000000 864c3000 Wdf01000!FxDmaScatterGatherTransaction::_AdapterListControl+0x7e
9ea9bb90 8338d0d0 864c3000 86023ba0 87095080 hal!HalBuildScatterGatherList+0x1ba
9ea9bbc8 8338df6b 87095080 00000000 00008000 Wdf01000!FxDmaScatterGatherTransaction::BuildScatterGatherList+0x40
9ea9bc04 8338d38c 00000000 86664018 9ea9bc20 Wdf01000!FxDmaScatterGatherTransaction::StageTransfer+0xfd
9ea9bc14 8338b85f 86664018 9ea9bc44 8fda5198 Wdf01000!FxDmaTransactionBase::Execute+0x67
9ea9bc20 8fda5198 00000000 8643c9c8 86664018 Wdf01000!imp_WdfDmaTransactionExecute+0x5f
9ea9bc44 8fda5353 86660658 86664018 00000011 1394ohci!AsyncRx::AllocateScatterGather+0xdc
9ea9bc6c 8fda5621 00000000 01660610 8665f0e0 1394ohci!AsyncRx::HandleAllocateAddressRange+0x18b
9ea9bc84 8945777f 79df9450 86660610 86744eec 1394ohci!AsyncRx::HandleRequest_GetPhysAddrRoutine+0x39
9ea9bca8 89457884 015365e0 86744eec 865365e0 sbp2port!Sbp2AllocComplete+0x171
9ea9bcc0 89457b20 8665f0e0 865365e0 8665f0e0 sbp2port!Sbp2BusMapTransfer+0x1c
9ea9bce8 89457eb5 00000103 87095080 9ea9bd14 sbp2port!Create1394TransactionForSrb+0x222
9ea9bd0c 89455a37 865365e0 8665f4f4 86744f18 sbp2port!Sbp2StartIo+0x2c5
9ea9bd28 894584ee 0065f028 86560ab0 86744f18 sbp2port!Sbp2StartPacket+0x99
9ea9bd60 82c3f4bc 8665f028 86560ab0 86744e40 sbp2port!Sbp2ScsiRequests+0x2f4
9ea9bd78 895375a4 85590008 86744e40 9ea9bdc8 nt!IofCallDriver+0x63
9ea9bd88 89536fe8 8665f028 86662b80 86662b80 CLASSPNP!SubmitTransferPacket+0x103
9ea9bdc8 89538a59 00000000 00590008 86644008 CLASSPNP!ServiceTransferRequest+0x225
9ea9bddc 89538a14 86662b80 ba2bc0a2 01cb7179 CLASSPNP!ClasspServiceIdleRequest+0x21
9ea9be00 895372f8 00662ac8 85590008 86662868 CLASSPNP!ClasspEnqueueIdleRequest+0x15d
9ea9be28 895373bf 86662ac8 00000000 86662ac8 CLASSPNP!ClassReadWrite+0x167
9ea9be3c 82c3f4bc 86662ac8 85590008 8559016c CLASSPNP!ClassGlobalDispatch+0x20
9ea9be54 88dc7230 07856000 85590008 85590008 nt!IofCallDriver+0x63
9ea9be68 88dc72e5 86662868 85590150 866627b0 partmgr!PmReadWrite+0x112
9ea9be7c 82c3f4bc 866627b0 85590008 865c8dd8 partmgr!PmGlobalDispatch+0x1d
9ea9be94 88deb9ae 8672dd38 865c8d20 00000002 nt!IofCallDriver+0x63
9ea9beb0 82c3f4bc 865c8d20 85590008 85590008 volmgr!VmReadWrite+0x1a8
9ea9bec8 894f1475 85590008 9ea9bef0 894f1547 nt!IofCallDriver+0x63
9ea9bed4 894f1547 8672dd38 85590008 8672dc80 fvevol!FveRequestPassThrough+0x31
9ea9bef0 894f1759 8672dd38 85590000 86a38be0 fvevol!FveReadWrite+0x4d
9ea9bf20 82c3f4bc 8672dc80 85590008 00000000 fvevol!FveFilterRundownReadWrite+0x197
9ea9bf38 89407996 86741328 86a38be0 85590008 nt!IofCallDriver+0x63
9ea9bf4c 894099b1 867413e0 86741328 85590008 volsnap!VolSnapReadFilter+0x12e
9ea9bf60 82c3f4bc 86741328 85590008 85590198 volsnap!VolSnapRead+0x1b
9ea9bf78 894a27f9 9ea9bfa4 894d3a78 86a38be0 nt!IofCallDriver+0x63
WARNING: Stack unwind information not available. Following frames may be wrong.
9ea9bf80 894d3a78 86a38be0 86741328 85590008 MDFSYSNT+0x17f9
9ea9bfa4 894d3dc4 86a38be0 86b9c958 07856000 MDFSYSNT+0x32a78
9ea9bfd0 82c6910a 867dded8 9ea9c008 00000000 MDFSYSNT+0x32dc4
STACK_COMMAND: kb
FOLLOWUP_IP:
1394ohci!AsyncTx::WdfEvtIoInternalDeviceControl+47
8fda8783 8b45f0 mov eax,dword ptr [ebp-10h]
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: 1394ohci!AsyncTx::WdfEvtIoInternalDeviceControl+47
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: 1394ohci
IMAGE_NAME: 1394ohci.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc89f
FAILURE_BUCKET_ID: 0x7f_8_1394ohci!AsyncTx::WdfEvtIoInternalDeviceControl+47
BUCKET_ID: 0x7f_8_1394ohci!AsyncTx::WdfEvtIoInternalDeviceControl+47
Followup: MachineOwner
---------