Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\011711-17940-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e5b000 PsLoadedModuleList = 0xfffff800`03098e50
Debug session time: Mon Jan 17 12:15:58.942 2011 (UTC - 5:00)
System Uptime: 0 days 3:12:50.846
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff8800a4645d0, 1, fffff800031ba81d, 2}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!FsRtlTeardownPerStreamContexts+69 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8800a4645d0, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff800031ba81d, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800031030e0
fffff8800a4645d0
FAULTING_IP:
nt!FsRtlTeardownPerStreamContexts+69
fffff800`031ba81d 48894808 mov qword ptr [rax+8],rcx
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff88002f7e7c0 -- (.trap 0xfffff88002f7e7c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8800a4645c8 rbx=0000000000000000 rcx=fffff8a00a4645c8
rdx=fffff88002dd4180 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800031ba81d rsp=fffff88002f7e950 rbp=0000000000000130
r8=0000000000000003 r9=00000000000000b0 r10=fffff80002e5b000
r11=0000000000000019 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!FsRtlTeardownPerStreamContexts+0x69:
fffff800`031ba81d 48894808 mov qword ptr [rax+8],rcx ds:5350:fffff880`0a4645d0=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002f4a8f2 to fffff80002ecb740
STACK_TEXT:
fffff880`02f7e658 fffff800`02f4a8f2 : 00000000`00000050 fffff880`0a4645d0 00000000`00000001 fffff880`02f7e7c0 : nt!KeBugCheckEx
fffff880`02f7e660 fffff800`02ec982e : 00000000`00000001 00000000`00000001 00000000`00000700 00000000`000000c0 : nt! ?? ::FNODOBFM::`string'+0x40ec0
fffff880`02f7e7c0 fffff800`031ba81d : fffff8a0`0b057590 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`02f7e950 fffff880`012d0bcc : fffff8a0`0a464590 00000000`00000130 fffff880`02f7ea28 00000000`00000706 : nt!FsRtlTeardownPerStreamContexts+0x69
fffff880`02f7e9a0 fffff880`012d08d5 : 00000000`00000000 00000000`00000000 fffff800`03070500 00000000`00000001 : Ntfs!NtfsDeleteScb+0x108
fffff880`02f7e9e0 fffff880`01243cb4 : fffff8a0`0a464490 fffff8a0`0a464590 fffff800`03070500 fffff880`02f7eb52 : Ntfs!NtfsRemoveScb+0x61
fffff880`02f7ea20 fffff880`012ce2dc : fffff8a0`0a464460 fffff800`030705a0 fffff880`02f7eb52 fffffa80`04020a70 : Ntfs!NtfsPrepareFcbForRemoval+0x50
fffff880`02f7ea50 fffff880`0124c882 : fffffa80`04020a70 fffffa80`04020a70 fffff8a0`0a464460 00000000`00000000 : Ntfs!NtfsTeardownStructures+0xdc
fffff880`02f7ead0 fffff880`012e5813 : fffffa80`04020a70 fffff800`030705a0 fffff8a0`0a464460 00000000`00000009 : Ntfs!NtfsDecrementCloseCounts+0xa2
fffff880`02f7eb10 fffff880`012bf38f : fffffa80`04020a70 fffff8a0`0a464590 fffff8a0`0a464460 fffffa80`04994180 : Ntfs!NtfsCommonClose+0x353
fffff880`02f7ebe0 fffff800`02ed8961 : 00000000`00000000 fffff880`012bf200 fffffa80`03a03b00 000004f4`00000005 : Ntfs!NtfsFspClose+0x15f
fffff880`02f7ecb0 fffff800`0316fc06 : 000004f4`00000000 fffffa80`03a03b60 00000000`00000080 fffffa80`03973890 : nt!ExpWorkerThread+0x111
fffff880`02f7ed40 fffff800`02ea9c26 : fffff880`02d63180 fffffa80`03a03b60 fffff880`02d6dfc0 000004f4`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`02f7ed80 00000000`00000000 : fffff880`02f7f000 fffff880`02f79000 fffff880`02f7e9f0 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!FsRtlTeardownPerStreamContexts+69
fffff800`031ba81d 48894808 mov qword ptr [rax+8],rcx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!FsRtlTeardownPerStreamContexts+69
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x50_nt!FsRtlTeardownPerStreamContexts+69
BUCKET_ID: X64_0x50_nt!FsRtlTeardownPerStreamContexts+69
Followup: MachineOwner
---------