Microsoft (R) Windows Debugger Version 6.8.0004.0 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\WINDOWS\Minidump\Mini042108-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv*c:\programfiler\Debugging Tools for Windows\symbols*http://msdl.microsoft.com/downloads/symbols Executable search path is: Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible Product: WinNt Built by: 2600.xpsp_sp2_gdr.070227-2254 Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055a620 Debug session time: Mon Apr 21 17:58:01.609 2008 (GMT+2) System Uptime: 1 days 1:14:09.661 Loading Kernel Symbols ........................................................................................................................................... Loading User Symbols Loading unloaded module list ................................. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 24, {1902fe, f89989e8, f89986e4, f84183df} Probably caused by : Ntfs.sys ( Ntfs!NtfsDeleteScb+153 ) Followup: MachineOwner --------- kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* NTFS_FILE_SYSTEM (24) If you see NtfsExceptionFilter on the stack then the 2nd and 3rd parameters are the exception record and context record. Do a .cxr on the 3rd parameter and then kb to obtain a more informative stack trace. Arguments: Arg1: 001902fe Arg2: f89989e8 Arg3: f89986e4 Arg4: f84183df Debugging Details: ------------------ EXCEPTION_RECORD: f89989e8 -- (.exr 0xfffffffff89989e8) ExceptionAddress: f84183df (Ntfs!NtfsDeleteScb+0x00000153) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000001 Parameter[1]: 00800040 Attempt to write to address 00800040 CONTEXT: f89986e4 -- (.cxr 0xfffffffff89986e4) eax=00800000 ebx=8054aa07 ecx=804f46b4 edx=e27d36e8 esi=f8998ae4 edi=00000000 eip=f84183df esp=f8998ab0 ebp=f8998ac0 iopl=0 nv up ei pl nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206 Ntfs!NtfsDeleteScb+0x153: f84183df 897840 mov dword ptr [eax+40h],edi ds:0023:00800040=???????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: DRIVER_FAULT ERROR_CODE: (NTSTATUS) 0xc0000005 - Instruksjonen i "0x%08lx" refererte til adresse "0x%08lx". Minnet kunne ikke v re "%s". WRITE_ADDRESS: 00800040 BUGCHECK_STR: 0x24 LAST_CONTROL_TRANSFER: from f83efc30 to f84183df STACK_TEXT: f8998ac0 f83efc30 8205ad40 f8990705 e2599658 Ntfs!NtfsDeleteScb+0x153 f8998ad8 f83ca800 8205ad40 e25996f0 00000000 Ntfs!NtfsRemoveScb+0x88 f8998af4 f83efa17 8205ad40 e2599628 00000000 Ntfs!NtfsPrepareFcbForRemoval+0x52 f8998b3c f83ca7b0 8205ad40 e25996f0 e2599888 Ntfs!NtfsTeardownStructures+0x5b f8998b68 f83ed4b5 8205ad40 005996f0 e2599888 Ntfs!NtfsDecrementCloseCounts+0x9e f8998bec f83ed254 8205ad40 e25996f0 e2599628 Ntfs!NtfsCommonClose+0x397 f8998c8c 804e37f7 82364020 8198e4a0 82345280 Ntfs!NtfsFsdClose+0x21f f8998c9c f846c459 f8998ce0 804e37f7 823e7cb8 nt!IopfCallDriver+0x31 f8998ca4 804e37f7 823e7cb8 8198e4a0 8198e4a0 sr!SrPassThrough+0x31 f8998cb4 f848209e 818422b0 823d7270 8198e4b0 nt!IopfCallDriver+0x31 f8998ce0 804e37f7 81a7d020 8198e4a0 8198e4a0 fltmgr!FltpDispatch+0x152 f8998cf0 8056a749 81842298 00000000 00000000 nt!IopfCallDriver+0x31 f8998d28 80563af7 008422b0 81842298 00000000 nt!IopDeleteFile+0x132 f8998d44 804e36d5 818422b0 00000000 806ee298 nt!ObpRemoveObjectRoutine+0xdf f8998d68 804f2da1 8055ecb4 8186fc60 00000000 nt!ObfDereferenceObject+0x5f f8998d8c 80515ba3 e18f2498 00000000 823c62c8 nt!MiSegmentDelete+0xdd f8998dac 8057d0f1 00000000 00000000 00000000 nt!MiDereferenceSegmentThread+0x9e f8998ddc 804f827a 80506905 00000000 00000000 nt!PspSystemThreadStartup+0x34 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16 FOLLOWUP_IP: Ntfs!NtfsDeleteScb+153 f84183df 897840 mov dword ptr [eax+40h],edi SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: Ntfs!NtfsDeleteScb+153 FOLLOWUP_NAME: MachineOwner MODULE_NAME: Ntfs IMAGE_NAME: Ntfs.sys DEBUG_FLR_IMAGE_TIMESTAMP: 45cc56a7 STACK_COMMAND: .cxr 0xfffffffff89986e4 ; kb FAILURE_BUCKET_ID: 0x24_Ntfs!NtfsDeleteScb+153 BUCKET_ID: 0x24_Ntfs!NtfsDeleteScb+153 Followup: MachineOwner ---------