Microsoft (R) Windows Debugger Version 6.8.0004.0 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\WINDOWS\Minidump\Mini042508-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv*c:\programfiler\Debugging Tools for Windows\symbols*http://msdl.microsoft.com/downloads/symbols Executable search path is: Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible Product: WinNt Built by: 2600.xpsp_sp2_gdr.070227-2254 Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055a620 Debug session time: Fri Apr 25 13:07:22.062 2008 (GMT+2) System Uptime: 0 days 1:04:32.631 Loading Kernel Symbols ........................................................................................................................................... Loading User Symbols Loading unloaded module list ........... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 24, {1902fe, f89989e8, f89986e4, f84053df} Probably caused by : Ntfs.sys ( Ntfs!NtfsDeleteScb+153 ) Followup: MachineOwner --------- kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* NTFS_FILE_SYSTEM (24) If you see NtfsExceptionFilter on the stack then the 2nd and 3rd parameters are the exception record and context record. Do a .cxr on the 3rd parameter and then kb to obtain a more informative stack trace. Arguments: Arg1: 001902fe Arg2: f89989e8 Arg3: f89986e4 Arg4: f84053df Debugging Details: ------------------ EXCEPTION_RECORD: f89989e8 -- (.exr 0xfffffffff89989e8) ExceptionAddress: f84053df (Ntfs!NtfsDeleteScb+0x00000153) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000001 Parameter[1]: 00a00040 Attempt to write to address 00a00040 CONTEXT: f89986e4 -- (.cxr 0xfffffffff89986e4) eax=00a00000 ebx=8054aa07 ecx=823f2074 edx=e1159648 esi=f8998ae4 edi=00000000 eip=f84053df esp=f8998ab0 ebp=f8998ac0 iopl=0 nv up ei pl nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206 Ntfs!NtfsDeleteScb+0x153: f84053df 897840 mov dword ptr [eax+40h],edi ds:0023:00a00040=???????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: DRIVER_FAULT ERROR_CODE: (NTSTATUS) 0xc0000005 - Instruksjonen i "0x%08lx" refererte til adresse "0x%08lx". Minnet kunne ikke v re "%s". WRITE_ADDRESS: 00a00040 BUGCHECK_STR: 0x24 LAST_CONTROL_TRANSFER: from f83dcc30 to f84053df STACK_TEXT: f8998ac0 f83dcc30 81885ef0 f8990703 e11dc038 Ntfs!NtfsDeleteScb+0x153 f8998ad8 f83b7800 81885ef0 e11dc0d0 00000000 Ntfs!NtfsRemoveScb+0x88 f8998af4 f83dca17 81885ef0 e11dc008 00000000 Ntfs!NtfsPrepareFcbForRemoval+0x52 f8998b3c f83b77b0 81885ef0 e11dc0d0 00000000 Ntfs!NtfsTeardownStructures+0x5b f8998b68 f83da4b5 81885ef0 001dc0d0 00000000 Ntfs!NtfsDecrementCloseCounts+0x9e f8998bec f83da254 81885ef0 e11dc0d0 e11dc008 Ntfs!NtfsCommonClose+0x397 f8998c8c 804e37f7 82353020 81736280 82390910 Ntfs!NtfsFsdClose+0x21f f8998c9c f846c459 f8998ce0 804e37f7 82349020 nt!IopfCallDriver+0x31 f8998ca4 804e37f7 82349020 81736280 81736280 sr!SrPassThrough+0x31 f8998cb4 f848209e 818c2918 82379268 81736290 nt!IopfCallDriver+0x31 f8998ce0 804e37f7 81a72d58 81736280 81736280 fltmgr!FltpDispatch+0x152 f8998cf0 8056a749 818c2900 00000000 00000000 nt!IopfCallDriver+0x31 f8998d28 80563af7 008c2918 818c2900 00000000 nt!IopDeleteFile+0x132 f8998d44 804e36d5 818c2918 00000000 806ee298 nt!ObpRemoveObjectRoutine+0xdf f8998d68 804f2da1 8055ecb4 81872480 00000000 nt!ObfDereferenceObject+0x5f f8998d8c 80515ba3 e196d5b8 00000000 823c62c8 nt!MiSegmentDelete+0xdd f8998dac 8057d0f1 00000000 00000000 00000000 nt!MiDereferenceSegmentThread+0x9e f8998ddc 804f827a 80506905 00000000 00000000 nt!PspSystemThreadStartup+0x34 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16 FOLLOWUP_IP: Ntfs!NtfsDeleteScb+153 f84053df 897840 mov dword ptr [eax+40h],edi SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: Ntfs!NtfsDeleteScb+153 FOLLOWUP_NAME: MachineOwner MODULE_NAME: Ntfs IMAGE_NAME: Ntfs.sys DEBUG_FLR_IMAGE_TIMESTAMP: 45cc56a7 STACK_COMMAND: .cxr 0xfffffffff89986e4 ; kb FAILURE_BUCKET_ID: 0x24_Ntfs!NtfsDeleteScb+153 BUCKET_ID: 0x24_Ntfs!NtfsDeleteScb+153 Followup: MachineOwner ---------