Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\030311-18468-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.x86fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0x8304f000 PsLoadedModuleList = 0x8318e570
Debug session time: Thu Mar 3 11:29:25.155 2011 (UTC - 5:00)
System Uptime: 0 days 2:08:30.030
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {430c002e, 2, 0, 830f29c3}
Probably caused by : ntkrnlmp.exe ( nt!IoBoostThreadIoPriority+c1 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 430c002e, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 830f29c3, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 831ae700
Unable to read MiSystemVaType memory at 8318e0c0
430c002e
CURRENT_IRQL: 2
FAULTING_IP:
nt!IoBoostThreadIoPriority+c1
830f29c3 8a4812 mov cl,byte ptr [eax+12h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: WINWORD.EXE
TRAP_FRAME: 9d5ad8fc -- (.trap 0xffffffff9d5ad8fc)
ErrCode = 00000000
eax=430c001c ebx=850972f8 ecx=9d5ad9c0 edx=831ab7dc esi=00000018 edi=00000020
eip=830f29c3 esp=9d5ad970 ebp=9d5ada20 iopl=0 ov up ei ng nz na pe cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010a87
nt!IoBoostThreadIoPriority+0xc1:
830f29c3 8a4812 mov cl,byte ptr [eax+12h] ds:0023:430c002e=??
Resetting default scope
LAST_CONTROL_TRANSFER: from 830f29c3 to 83087b3b
STACK_TEXT:
9d5ad8fc 830f29c3 badb0d00 831ab7dc 00000001 nt!KiTrap0E+0x2cf
9d5ada20 830e561b 00000000 00000002 00000000 nt!IoBoostThreadIoPriority+0xc1
9d5ada54 830fa0c6 00000002 83170d20 8509735c nt!ExpCheckForIoPriorityBoost+0x8e
9d5ada9c 830b2eb7 861fc3d0 00000000 a1475a30 nt!ExpWaitForResource+0x7b
9d5adae8 88132531 8509735c 85964b01 9d5adb1c nt!ExAcquireResourceExclusiveLite+0x1cf
9d5adaf8 8813257c 86893a20 a1475a30 85964b01 Ntfs!NtfsAcquireResourceExclusive+0x25
9d5adb1c 88138e88 86893a20 a1475a30 00000000 Ntfs!NtfsAcquireExclusiveFcb+0x42
9d5adb48 881b5dec 86893a01 a1475a30 00000000 Ntfs!NtfsAcquireFcbWithPaging+0x8d
9d5adba4 881b665b 86893a20 85964b48 85964240 Ntfs!NtfsFindPrefixHashEntry+0x454
9d5adc00 881b8c5c 86893a20 84b7b278 89985918 Ntfs!NtfsFindStartingNode+0x7b6
9d5adcdc 8813f210 86893a20 84b7b278 9d549544 Ntfs!NtfsCommonCreate+0x65f
9d5add1c 830abf96 9d5494dc 0000045c ffffffff Ntfs!NtfsCommonCreateCallout+0x20
9d5add1c 830ac08d 9d5494dc 0000045c ffffffff nt!KiSwapKernelStackAndExit+0x15a
9d549440 00000000 00000000 00000000 00000000 nt!KiSwitchKernelStackAndCallout+0x31
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!IoBoostThreadIoPriority+c1
830f29c3 8a4812 mov cl,byte ptr [eax+12h]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!IoBoostThreadIoPriority+c1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc78eb6
FAILURE_BUCKET_ID: 0xA_nt!IoBoostThreadIoPriority+c1
BUCKET_ID: 0xA_nt!IoBoostThreadIoPriority+c1
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\030211-16312-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.x86fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0x8300f000 PsLoadedModuleList = 0x8314e570
Debug session time: Wed Mar 2 08:15:58.125 2011 (UTC - 5:00)
System Uptime: 0 days 0:43:53.000
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
......
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 001904fb
Arg2: 80e33814
Arg3: 80e333f0
Arg4: 830a4c64
Debugging Details:
------------------
EXCEPTION_RECORD: 80e33814 -- (.exr 0xffffffff80e33814)
ExceptionAddress: 830a4c64 (nt!RtlDeleteNoSplay+0x0000005e)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000001
Parameter[1]: 00004000
Attempt to write to address 00004000
CONTEXT: 80e333f0 -- (.cxr 0xffffffff80e333f0)
eax=00004000 ebx=00000000 ecx=a0ff86ec edx=00000000 esi=a0ff86ec edi=86b35ed4
eip=830a4c64 esp=80e338dc ebp=80e338e8 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!RtlDeleteNoSplay+0x5e:
830a4c64 8900 mov dword ptr [eax],eax ds:0023:00004000=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 00000001
EXCEPTION_PARAMETER2: 00004000
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 8316e700
Unable to read MiSystemVaType memory at 8314e0c0
00004000
FOLLOWUP_IP:
Ntfs!NtfsDeleteScb+214
881adfb2 8b06 mov eax,dword ptr [esi]
FAULTING_IP:
nt!RtlDeleteNoSplay+5e
830a4c64 8900 mov dword ptr [eax],eax
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from 880c4839 to 830a4c64
STACK_TEXT:
80e338e8 880c4839 a0ff86ec 86b35ed4 a0ff86ec nt!RtlDeleteNoSplay+0x5e
80e338fc 880c4af4 a0ff86ec 86b35ed0 86b35ed0 fltmgr!TreeUnlinkNoBalance+0x13
80e33914 880ce5f5 86b35ed4 ffffffff ffffffff fltmgr!TreeUnlinkMulti+0x22
80e33930 880db793 86b35ed4 86b35ed0 ffffffff fltmgr!FltpDeleteContextList+0x2f
80e33950 880db9b4 86b35ea8 a2617d78 00000000 fltmgr!CleanupStreamListCtrl+0x1b
80e33964 83256681 86b35eac 9a8c53d2 00000000 fltmgr!DeleteStreamListCtrlCallback+0x5a
80e339a4 881adfb2 a2617d78 a2617c88 a2617d78 nt!FsRtlTeardownPerStreamContexts+0x13a
80e339c0 881a4b3b 00000705 a2617cb0 a2617c88 Ntfs!NtfsDeleteScb+0x214
80e339d8 8811471e 852a41d8 a2617d78 00000000 Ntfs!NtfsRemoveScb+0xc5
80e339f4 881950d2 852a41d8 a2617c88 00000000 Ntfs!NtfsPrepareFcbForRemoval+0x62
80e33a38 88111bec 852a41d8 a2617d78 00000000 Ntfs!NtfsTeardownStructures+0x68
80e33a60 8819155b 852a41d8 a2617d78 00000000 Ntfs!NtfsDecrementCloseCounts+0xaf
80e33ac0 881931a9 852a41d8 a2617d78 a2617c88 Ntfs!NtfsCommonClose+0x4f2
80e33b5c 8303df34 00000000 853a2008 853a2008 Ntfs!NtfsFsdClose+0x403
80e33b74 880c020c 8591ded8 853a2008 00000000 nt!IofCallDriver+0x63
80e33b98 880c03cb 80e33bb8 8591ded8 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa
80e33bd0 8303df34 8591ded8 853a2008 8591e024 fltmgr!FltpDispatch+0xc5
80e33be8 83227bd5 84aaa040 86eb7560 00000000 nt!IofCallDriver+0x63
80e33c2c 83257601 86eb7578 86eb7578 86eb7560 nt!IopDeleteFile+0x10c
80e33c44 830652ea 00000000 85275ea8 858c6c40 nt!ObpRemoveObjectRoutine+0x59
80e33c58 8306525a 86eb7578 8309873d 00000000 nt!ObfDereferenceObjectWithTag+0x88
80e33c60 8309873d 00000000 85275ea8 86eb7578 nt!ObfDereferenceObject+0xd
80e33c78 8309b937 00000001 00000000 85cae168 nt!CcDeleteSharedCacheMap+0x131
80e33ca8 830a2f33 80e33cc4 9a8c5776 84ab3118 nt!CcWriteBehind+0x715
80e33d00 83069fc3 84ab3118 00000000 84aa9a70 nt!CcWorkerThread+0x164
80e33d50 831f6e7c 00000000 9a8c57e6 00000000 nt!ExpWorkerThread+0x10d
80e33d90 830980d9 83069eb6 00000000 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: Ntfs!NtfsDeleteScb+214
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bbf45
STACK_COMMAND: .cxr 0xffffffff80e333f0 ; kb
FAILURE_BUCKET_ID: 0x24_Ntfs!NtfsDeleteScb+214
BUCKET_ID: 0x24_Ntfs!NtfsDeleteScb+214
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\030311-17640-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.x86fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0x83004000 PsLoadedModuleList = 0x83143570
Debug session time: Thu Mar 3 09:04:43.536 2011 (UTC - 5:00)
System Uptime: 0 days 0:52:28.411
Loading Kernel Symbols
...............................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
.......
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 00000099, A PTE or PFN is corrupt
Arg2: 00019404, page frame number
Arg3: 00000003, current page state
Arg4: ffffffff, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: wmpnetwk.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 830e6500 to 830d54d4
STACK_TEXT:
80e73928 830e6500 0000004e 00000099 00019404 nt!KeBugCheckEx+0x1e
80e73940 83077944 c0403200 8488baa8 c01b8988 nt!MiBadShareCount+0x24
80e73a98 8306cdd8 a0c3e8b0 80e73b48 a0c3e8b0 nt!MiFreeWsleList+0x5e0
80e73c10 83061d86 a0c3e8b0 00000001 00000001 nt!MiAgeWorkingSet+0x454
80e73c5c 83061a4b 00000002 00000001 00000000 nt!MiProcessWorkingSets+0x25b
80e73c88 83062213 00000000 84aae628 00000000 nt!MmWorkingSetManager+0xa4
80e73d50 831ebe7c 00000000 9a89881d 00000000 nt!KeBalanceSetManager+0x1af
80e73d90 8308d0d9 83062064 00000000 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+24
830e6500 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+24
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc78eb6
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0x4E_99_nt!MiBadShareCount+24
BUCKET_ID: 0x4E_99_nt!MiBadShareCount+24
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\030411-15421-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.x86fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0x83049000 PsLoadedModuleList = 0x83188570
Debug session time: Thu Mar 3 12:12:51.188 2011 (UTC - 5:00)
System Uptime: 0 days 0:43:04.047
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {c0415250, 0, 0, 830c1cbb}
Probably caused by : memory_corruption ( nt!MiLocateWsle+97 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: c0415250, memory referenced
Arg2: 00000000, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 830c1cbb, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 831a8700
Unable to read MiSystemVaType memory at 831880c0
c0415250
CURRENT_IRQL: 0
FAULTING_IP:
nt!MiLocateWsle+97
830c1cbb 8b049e mov eax,dword ptr [esi+ebx*4]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: a6ab5b88 -- (.trap 0xffffffffa6ab5b88)
ErrCode = 00000000
eax=c09d611c ebx=00004aea ecx=00000001 edx=c0402000 esi=c04026a8 edi=75447001
eip=830c1cbb esp=a6ab5bfc ebp=a6ab5c08 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
nt!MiLocateWsle+0x97:
830c1cbb 8b049e mov eax,dword ptr [esi+ebx*4] ds:0023:c0415250=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 830c1cbb to 83081b3b
STACK_TEXT:
a6ab5b88 830c1cbb badb0d00 c0402000 8695f520 nt!KiTrap0E+0x2cf
a6ab5c08 830cf9b9 c09d611c c01d511c 8623fdb8 nt!MiLocateWsle+0x97
a6ab5c24 830d346a a6ab5c98 86e696d8 8695f330 nt!MiGetPageProtection+0xd1
a6ab5c40 830d3218 75447000 07200002 8695f330 nt!MiQueryAddressState+0x1cc
a6ab5c78 8328741e 75447000 8623fdb8 bcc04871 nt!MiQueryAddressSpan+0x76
a6ab5d14 8307e75a 00000150 75441000 00000000 nt!NtQueryVirtualMemory+0x572
a6ab5d14 77466344 00000150 75441000 00000000 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
001ccdd4 00000000 00000000 00000000 00000000 0x77466344
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiLocateWsle+97
830c1cbb 8b049e mov eax,dword ptr [esi+ebx*4]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiLocateWsle+97
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc78eb6
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0xA_nt!MiLocateWsle+97
BUCKET_ID: 0xA_nt!MiLocateWsle+97
Followup: MachineOwner
---------