Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

BSOD when synching iPods


  • Please log in to reply
No replies to this topic

#1 fordmantpw

fordmantpw

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:08:07 PM

Posted 27 May 2011 - 09:34 AM

Hello! I am getting a BSOD while synching iPods on my laptop. The machine is a Dell XPS running Windows 7 x64.

Here is a copy of the dump analysis:


Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [\\wilsonusa2\mel\BSOD\052711-23634-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
Machine Name:
Kernel base = 0xfffff800`0300c000 PsLoadedModuleList = 0xfffff800`03249e50
Debug session time: Fri May 27 09:00:51.689 2011 (UTC - 5:00)
System Uptime: 0 days 0:14:25.281
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 27, {baad0073, fffff880031bd2f8, fffff880031bcb60, fffff880094959c0}

Unable to load image \SystemRoot\system32\DRIVERS\MpFilter.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for MpFilter.sys
*** ERROR: Module load completed but symbols could not be loaded for MpFilter.sys
Probably caused by : mrxsmb20.sys ( mrxsmb20!MRxSmb2QueryFileInformation+164 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

RDR_FILE_SYSTEM (27)
    If you see RxExceptionFilter on the stack then the 2nd and 3rd parameters are the
    exception record and context record. Do a .cxr on the 3rd parameter and then kb to
    obtain a more informative stack trace.
    The high 16 bits of the first parameter is the RDBSS bugcheck code, which is defined
    as follows:
     RDBSS_BUG_CHECK_CACHESUP  = 0xca550000,
     RDBSS_BUG_CHECK_CLEANUP   = 0xc1ee0000,
     RDBSS_BUG_CHECK_CLOSE     = 0xc10e0000,
     RDBSS_BUG_CHECK_NTEXCEPT  = 0xbaad0000,
Arguments:
Arg1: 00000000baad0073
Arg2: fffff880031bd2f8
Arg3: fffff880031bcb60
Arg4: fffff880094959c0

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff880031bd2f8 -- (.exr 0xfffff880031bd2f8)
ExceptionAddress: fffff880094959c0 (mrxsmb20!MRxSmb2QueryFileInformation+0x0000000000000164)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000008
Attempt to read from address 0000000000000008

CONTEXT:  fffff880031bcb60 -- (.cxr 0xfffff880031bcb60)
rax=0000000000000000 rbx=fffffa8009d9b9c0 rcx=0000000000000000
rdx=0000000000000001 rsi=fffffa8009d9bb68 rdi=0000000000000018
rip=fffff880094959c0 rsp=fffff880031bd530 rbp=fffffa8007094ba0
 r8=0000000000000005  r9=fffff8a00fc14420 r10=fffffa80073d69f0
r11=0000000000000000 r12=0000000000000001 r13=fffffa8009d9b9c0
r14=0000000000000000 r15=fffff8a00fc14420
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
mrxsmb20!MRxSmb2QueryFileInformation+0x164:
fffff880`094959c0 45846308        test    byte ptr [r11+8],r12b ds:002b:00000000`00000008=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000008

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b40e0
 0000000000000008 

FOLLOWUP_IP: 
mrxsmb20!MRxSmb2QueryFileInformation+164
fffff880`094959c0 45846308        test    byte ptr [r11+8],r12b

FAULTING_IP: 
mrxsmb20!MRxSmb2QueryFileInformation+164
fffff880`094959c0 45846308        test    byte ptr [r11+8],r12b

BUGCHECK_STR:  0x27

DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE

LAST_CONTROL_TRANSFER:  from fffff88003f478cd to fffff880094959c0

STACK_TEXT:  
fffff880`031bd530 fffff880`03f478cd : 00000000`00000018 00000000`00000000 fffffa80`06b54cb0 fffff8a0`0f6c49cc : mrxsmb20!MRxSmb2QueryFileInformation+0x164
fffff880`031bd590 fffff880`02c06d29 : fffff880`00000000 fffff880`031bdc40 fffffa80`06b54cb0 fffffa80`09d9b9c0 : csc!CscQueryFileInformation+0x21d
fffff880`031bd6e0 fffff880`02c3056f : 0fc14420`0fc10000 fffff880`00000000 fffff880`02c20940 fffff880`031bdc40 : rdbss!RxpQueryInfoMiniRdr+0x65
fffff880`031bd710 fffff880`02c31e29 : 00000000`00000000 fffff8a0`0fc14401 fffffa80`00000002 fffff880`02c07880 : rdbss!RxQueryStandardInfo+0xc7
fffff880`031bd750 fffff880`02c03aa0 : fffffa80`09d9b9c0 fffffa80`08ee43a0 01cc1c76`7d112000 fffffa80`08ee44b8 : rdbss!RxCommonQueryInformation+0x379
fffff880`031bd7f0 fffff880`02c21614 : fffffa80`08ee43a0 fffffa80`09108005 00000000`c0000016 00000000`00000000 : rdbss!RxFsdCommonDispatch+0x870
fffff880`031bd8e0 fffff880`094202c4 : fffffa80`08ee43a0 00000000`c0000016 fffffa80`08ee44b8 fffffa80`09108040 : rdbss!RxFsdDispatch+0x224
fffff880`031bd950 fffff880`01208271 : fffffa80`09680b60 fffffa80`08ee43a0 fffffa80`08f44260 fffff8a0`00295af0 : mrxsmb!MRxSmbFsdDispatch+0xc0
fffff880`031bd990 fffff880`01206138 : fffff8a0`00295af0 fffffa80`09680b60 00000000`00000001 00000000`00000008 : mup!MupiCallUncProvider+0x161
fffff880`031bda00 fffff880`01206b0d : fffffa80`08ee43a0 fffff880`01204110 fffffa80`0663ca50 00000000`00000000 : mup!MupStateMachine+0x128
fffff880`031bda50 fffff880`010b323f : fffffa80`08ee4548 fffffa80`09680b60 fffff880`031bdae0 fffffa80`0a60f010 : mup!MupFsdIrpPassThrough+0x12d
fffff880`031bdaa0 fffff880`010b594a : 00000000`00000000 00000000`00000000 fffffa80`06a12800 fffffa80`0a60f010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`031bdb30 fffff880`010eb4e2 : fffffa80`06962960 00000000`0000001b fffffa80`06af8010 fffffa80`0a60f0c0 : fltmgr!FltPerformSynchronousIo+0x2ca
fffff880`031bdbd0 fffff880`01818cd4 : fffffa80`05f78c10 fffffa80`06a128b0 fffffa80`06a128b0 00000000`00000000 : fltmgr!FltQueryInformationFile+0x52
fffff880`031bdc10 fffffa80`05f78c10 : fffffa80`06a128b0 fffffa80`06a128b0 00000000`00000000 00000000`00000005 : MpFilter+0x18cd4
fffff880`031bdc18 fffffa80`06a128b0 : fffffa80`06a128b0 00000000`00000000 00000000`00000005 fffff880`031bdc80 : 0xfffffa80`05f78c10
fffff880`031bdc20 fffffa80`06a128b0 : 00000000`00000000 00000000`00000005 fffff880`031bdc80 00000000`001f3000 : 0xfffffa80`06a128b0
fffff880`031bdc28 00000000`00000000 : 00000000`00000005 fffff880`031bdc80 00000000`001f3000 00000000`001f2f0e : 0xfffffa80`06a128b0


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  mrxsmb20!MRxSmb2QueryFileInformation+164

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: mrxsmb20

IMAGE_NAME:  mrxsmb20.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d6497e1

STACK_COMMAND:  .cxr 0xfffff880031bcb60 ; kb

FAILURE_BUCKET_ID:  X64_0x27_mrxsmb20!MRxSmb2QueryFileInformation+164

BUCKET_ID:  X64_0x27_mrxsmb20!MRxSmb2QueryFileInformation+164

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

RDR_FILE_SYSTEM (27)
    If you see RxExceptionFilter on the stack then the 2nd and 3rd parameters are the
    exception record and context record. Do a .cxr on the 3rd parameter and then kb to
    obtain a more informative stack trace.
    The high 16 bits of the first parameter is the RDBSS bugcheck code, which is defined
    as follows:
     RDBSS_BUG_CHECK_CACHESUP  = 0xca550000,
     RDBSS_BUG_CHECK_CLEANUP   = 0xc1ee0000,
     RDBSS_BUG_CHECK_CLOSE     = 0xc10e0000,
     RDBSS_BUG_CHECK_NTEXCEPT  = 0xbaad0000,
Arguments:
Arg1: 00000000baad0073
Arg2: fffff880031bd2f8
Arg3: fffff880031bcb60
Arg4: fffff880094959c0

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff880031bd2f8 -- (.exr 0xfffff880031bd2f8)
ExceptionAddress: fffff880094959c0 (mrxsmb20!MRxSmb2QueryFileInformation+0x0000000000000164)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000008
Attempt to read from address 0000000000000008

CONTEXT:  fffff880031bcb60 -- (.cxr 0xfffff880031bcb60)
rax=0000000000000000 rbx=fffffa8009d9b9c0 rcx=0000000000000000
rdx=0000000000000001 rsi=fffffa8009d9bb68 rdi=0000000000000018
rip=fffff880094959c0 rsp=fffff880031bd530 rbp=fffffa8007094ba0
 r8=0000000000000005  r9=fffff8a00fc14420 r10=fffffa80073d69f0
r11=0000000000000000 r12=0000000000000001 r13=fffffa8009d9b9c0
r14=0000000000000000 r15=fffff8a00fc14420
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
mrxsmb20!MRxSmb2QueryFileInformation+0x164:
fffff880`094959c0 45846308        test    byte ptr [r11+8],r12b ds:002b:00000000`00000008=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000008

READ_ADDRESS:  0000000000000008 

FOLLOWUP_IP: 
mrxsmb20!MRxSmb2QueryFileInformation+164
fffff880`094959c0 45846308        test    byte ptr [r11+8],r12b

FAULTING_IP: 
mrxsmb20!MRxSmb2QueryFileInformation+164
fffff880`094959c0 45846308        test    byte ptr [r11+8],r12b

BUGCHECK_STR:  0x27

DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE

LAST_CONTROL_TRANSFER:  from fffff88003f478cd to fffff880094959c0

STACK_TEXT:  
fffff880`031bd530 fffff880`03f478cd : 00000000`00000018 00000000`00000000 fffffa80`06b54cb0 fffff8a0`0f6c49cc : mrxsmb20!MRxSmb2QueryFileInformation+0x164
fffff880`031bd590 fffff880`02c06d29 : fffff880`00000000 fffff880`031bdc40 fffffa80`06b54cb0 fffffa80`09d9b9c0 : csc!CscQueryFileInformation+0x21d
fffff880`031bd6e0 fffff880`02c3056f : 0fc14420`0fc10000 fffff880`00000000 fffff880`02c20940 fffff880`031bdc40 : rdbss!RxpQueryInfoMiniRdr+0x65
fffff880`031bd710 fffff880`02c31e29 : 00000000`00000000 fffff8a0`0fc14401 fffffa80`00000002 fffff880`02c07880 : rdbss!RxQueryStandardInfo+0xc7
fffff880`031bd750 fffff880`02c03aa0 : fffffa80`09d9b9c0 fffffa80`08ee43a0 01cc1c76`7d112000 fffffa80`08ee44b8 : rdbss!RxCommonQueryInformation+0x379
fffff880`031bd7f0 fffff880`02c21614 : fffffa80`08ee43a0 fffffa80`09108005 00000000`c0000016 00000000`00000000 : rdbss!RxFsdCommonDispatch+0x870
fffff880`031bd8e0 fffff880`094202c4 : fffffa80`08ee43a0 00000000`c0000016 fffffa80`08ee44b8 fffffa80`09108040 : rdbss!RxFsdDispatch+0x224
fffff880`031bd950 fffff880`01208271 : fffffa80`09680b60 fffffa80`08ee43a0 fffffa80`08f44260 fffff8a0`00295af0 : mrxsmb!MRxSmbFsdDispatch+0xc0
fffff880`031bd990 fffff880`01206138 : fffff8a0`00295af0 fffffa80`09680b60 00000000`00000001 00000000`00000008 : mup!MupiCallUncProvider+0x161
fffff880`031bda00 fffff880`01206b0d : fffffa80`08ee43a0 fffff880`01204110 fffffa80`0663ca50 00000000`00000000 : mup!MupStateMachine+0x128
fffff880`031bda50 fffff880`010b323f : fffffa80`08ee4548 fffffa80`09680b60 fffff880`031bdae0 fffffa80`0a60f010 : mup!MupFsdIrpPassThrough+0x12d
fffff880`031bdaa0 fffff880`010b594a : 00000000`00000000 00000000`00000000 fffffa80`06a12800 fffffa80`0a60f010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`031bdb30 fffff880`010eb4e2 : fffffa80`06962960 00000000`0000001b fffffa80`06af8010 fffffa80`0a60f0c0 : fltmgr!FltPerformSynchronousIo+0x2ca
fffff880`031bdbd0 fffff880`01818cd4 : fffffa80`05f78c10 fffffa80`06a128b0 fffffa80`06a128b0 00000000`00000000 : fltmgr!FltQueryInformationFile+0x52
fffff880`031bdc10 fffffa80`05f78c10 : fffffa80`06a128b0 fffffa80`06a128b0 00000000`00000000 00000000`00000005 : MpFilter+0x18cd4
fffff880`031bdc18 fffffa80`06a128b0 : fffffa80`06a128b0 00000000`00000000 00000000`00000005 fffff880`031bdc80 : 0xfffffa80`05f78c10
fffff880`031bdc20 fffffa80`06a128b0 : 00000000`00000000 00000000`00000005 fffff880`031bdc80 00000000`001f3000 : 0xfffffa80`06a128b0
fffff880`031bdc28 00000000`00000000 : 00000000`00000005 fffff880`031bdc80 00000000`001f3000 00000000`001f2f0e : 0xfffffa80`06a128b0


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  mrxsmb20!MRxSmb2QueryFileInformation+164

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: mrxsmb20

IMAGE_NAME:  mrxsmb20.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d6497e1

STACK_COMMAND:  .cxr 0xfffff880031bcb60 ; kb

FAILURE_BUCKET_ID:  X64_0x27_mrxsmb20!MRxSmb2QueryFileInformation+164

BUCKET_ID:  X64_0x27_mrxsmb20!MRxSmb2QueryFileInformation+164

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

RDR_FILE_SYSTEM (27)
    If you see RxExceptionFilter on the stack then the 2nd and 3rd parameters are the
    exception record and context record. Do a .cxr on the 3rd parameter and then kb to
    obtain a more informative stack trace.
    The high 16 bits of the first parameter is the RDBSS bugcheck code, which is defined
    as follows:
     RDBSS_BUG_CHECK_CACHESUP  = 0xca550000,
     RDBSS_BUG_CHECK_CLEANUP   = 0xc1ee0000,
     RDBSS_BUG_CHECK_CLOSE     = 0xc10e0000,
     RDBSS_BUG_CHECK_NTEXCEPT  = 0xbaad0000,
Arguments:
Arg1: 00000000baad0073
Arg2: fffff880031bd2f8
Arg3: fffff880031bcb60
Arg4: fffff880094959c0

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff880031bd2f8 -- (.exr 0xfffff880031bd2f8)
ExceptionAddress: fffff880094959c0 (mrxsmb20!MRxSmb2QueryFileInformation+0x0000000000000164)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000008
Attempt to read from address 0000000000000008

CONTEXT:  fffff880031bcb60 -- (.cxr 0xfffff880031bcb60)
rax=0000000000000000 rbx=fffffa8009d9b9c0 rcx=0000000000000000
rdx=0000000000000001 rsi=fffffa8009d9bb68 rdi=0000000000000018
rip=fffff880094959c0 rsp=fffff880031bd530 rbp=fffffa8007094ba0
 r8=0000000000000005  r9=fffff8a00fc14420 r10=fffffa80073d69f0
r11=0000000000000000 r12=0000000000000001 r13=fffffa8009d9b9c0
r14=0000000000000000 r15=fffff8a00fc14420
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
mrxsmb20!MRxSmb2QueryFileInformation+0x164:
fffff880`094959c0 45846308        test    byte ptr [r11+8],r12b ds:002b:00000000`00000008=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000008

READ_ADDRESS:  0000000000000008 

FOLLOWUP_IP: 
mrxsmb20!MRxSmb2QueryFileInformation+164
fffff880`094959c0 45846308        test    byte ptr [r11+8],r12b

FAULTING_IP: 
mrxsmb20!MRxSmb2QueryFileInformation+164
fffff880`094959c0 45846308        test    byte ptr [r11+8],r12b

BUGCHECK_STR:  0x27

DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE

LAST_CONTROL_TRANSFER:  from fffff88003f478cd to fffff880094959c0

STACK_TEXT:  
fffff880`031bd530 fffff880`03f478cd : 00000000`00000018 00000000`00000000 fffffa80`06b54cb0 fffff8a0`0f6c49cc : mrxsmb20!MRxSmb2QueryFileInformation+0x164
fffff880`031bd590 fffff880`02c06d29 : fffff880`00000000 fffff880`031bdc40 fffffa80`06b54cb0 fffffa80`09d9b9c0 : csc!CscQueryFileInformation+0x21d
fffff880`031bd6e0 fffff880`02c3056f : 0fc14420`0fc10000 fffff880`00000000 fffff880`02c20940 fffff880`031bdc40 : rdbss!RxpQueryInfoMiniRdr+0x65
fffff880`031bd710 fffff880`02c31e29 : 00000000`00000000 fffff8a0`0fc14401 fffffa80`00000002 fffff880`02c07880 : rdbss!RxQueryStandardInfo+0xc7
fffff880`031bd750 fffff880`02c03aa0 : fffffa80`09d9b9c0 fffffa80`08ee43a0 01cc1c76`7d112000 fffffa80`08ee44b8 : rdbss!RxCommonQueryInformation+0x379
fffff880`031bd7f0 fffff880`02c21614 : fffffa80`08ee43a0 fffffa80`09108005 00000000`c0000016 00000000`00000000 : rdbss!RxFsdCommonDispatch+0x870
fffff880`031bd8e0 fffff880`094202c4 : fffffa80`08ee43a0 00000000`c0000016 fffffa80`08ee44b8 fffffa80`09108040 : rdbss!RxFsdDispatch+0x224
fffff880`031bd950 fffff880`01208271 : fffffa80`09680b60 fffffa80`08ee43a0 fffffa80`08f44260 fffff8a0`00295af0 : mrxsmb!MRxSmbFsdDispatch+0xc0
fffff880`031bd990 fffff880`01206138 : fffff8a0`00295af0 fffffa80`09680b60 00000000`00000001 00000000`00000008 : mup!MupiCallUncProvider+0x161
fffff880`031bda00 fffff880`01206b0d : fffffa80`08ee43a0 fffff880`01204110 fffffa80`0663ca50 00000000`00000000 : mup!MupStateMachine+0x128
fffff880`031bda50 fffff880`010b323f : fffffa80`08ee4548 fffffa80`09680b60 fffff880`031bdae0 fffffa80`0a60f010 : mup!MupFsdIrpPassThrough+0x12d
fffff880`031bdaa0 fffff880`010b594a : 00000000`00000000 00000000`00000000 fffffa80`06a12800 fffffa80`0a60f010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`031bdb30 fffff880`010eb4e2 : fffffa80`06962960 00000000`0000001b fffffa80`06af8010 fffffa80`0a60f0c0 : fltmgr!FltPerformSynchronousIo+0x2ca
fffff880`031bdbd0 fffff880`01818cd4 : fffffa80`05f78c10 fffffa80`06a128b0 fffffa80`06a128b0 00000000`00000000 : fltmgr!FltQueryInformationFile+0x52
fffff880`031bdc10 fffffa80`05f78c10 : fffffa80`06a128b0 fffffa80`06a128b0 00000000`00000000 00000000`00000005 : MpFilter+0x18cd4
fffff880`031bdc18 fffffa80`06a128b0 : fffffa80`06a128b0 00000000`00000000 00000000`00000005 fffff880`031bdc80 : 0xfffffa80`05f78c10
fffff880`031bdc20 fffffa80`06a128b0 : 00000000`00000000 00000000`00000005 fffff880`031bdc80 00000000`001f3000 : 0xfffffa80`06a128b0
fffff880`031bdc28 00000000`00000000 : 00000000`00000005 fffff880`031bdc80 00000000`001f3000 00000000`001f2f0e : 0xfffffa80`06a128b0


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  mrxsmb20!MRxSmb2QueryFileInformation+164

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: mrxsmb20

IMAGE_NAME:  mrxsmb20.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d6497e1

STACK_COMMAND:  .cxr 0xfffff880031bcb60 ; kb

FAILURE_BUCKET_ID:  X64_0x27_mrxsmb20!MRxSmb2QueryFileInformation+164

BUCKET_ID:  X64_0x27_mrxsmb20!MRxSmb2QueryFileInformation+164

Followup: MachineOwner
---------

0: kd> lmvm mrxsmb20
start             end                 module name
fffff880`0948b000 fffff880`094ae000   mrxsmb20   (pdb symbols)          c:\symbols\mrxsmb20.pdb\E9634ED265C9468CA6F4489130B00AEF1\mrxsmb20.pdb
    Loaded symbol image file: mrxsmb20.sys
    Mapped memory image file: c:\symbols\mrxsmb20.sys\4D6497E123000\mrxsmb20.sys
    Image path: \SystemRoot\system32\DRIVERS\mrxsmb20.sys
    Image name: mrxsmb20.sys
    Timestamp:        Tue Feb 22 23:15:13 2011 (4D6497E1)
    CheckSum:         0001F03D
    ImageSize:        00023000
    File version:     6.1.7600.16765
    Product version:  6.1.7600.16765
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        3.7 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    CompanyName:      Microsoft Corporation
    ProductName:      Microsoft® Windows® Operating System
    InternalName:     MRxSmb20.sys
    OriginalFilename: MRXSMB20.Sys
    ProductVersion:   6.1.7600.16765
    FileVersion:      6.1.7600.16765 (win7_gdr.110222-1643)
    FileDescription:  Longhorn SMB 2.0 Redirector
    LegalCopyright:   © Microsoft Corporation. All rights reserved.


Any help is greatly appeciated!

Thank you very much!
fordmantpw

BC AdBot (Login to Remove)

 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users