Microsoft (R) Windows Debugger Version 6.2.8400.0 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Tom\AppData\Local\Temp\Temp1_noob1.zip\SF_13-09-2012\Mini091012-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6002.18607.x86fre.vistasp2_gdr.120402-0336
Machine Name:
Kernel base = 0x8903e000 PsLoadedModuleList = 0x89155c70
Debug session time: Mon Sep 10 22:18:44.341 2012 (UTC + 1:00)
System Uptime: 0 days 0:16:34.123
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, 89082996, cfd79934, 0}
*** WARNING: Unable to verify timestamp for klif.sys
*** ERROR: Module load completed but symbols could not be loaded for klif.sys
Probably caused by : klif.sys ( klif+2db44 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 89082996, The address that the exception occurred at
Arg3: cfd79934, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!IofCallDriver+5f
89082996 ff548838 call dword ptr [eax+ecx*4+38h]
TRAP_FRAME: cfd79934 -- (.trap 0xffffffffcfd79934)
ErrCode = 00000000
eax=00000000 ebx=8de8bbd8 ecx=0000000d edx=8de90008 esi=e740e21c edi=8de90008
eip=89082996 esp=cfd799a8 ebp=cfd799b8 iopl=0 nv up ei ng nz na po cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010283
nt!IofCallDriver+0x5f:
89082996 ff548838 call dword ptr [eax+ecx*4+38h] ds:0023:0000006c=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: avp.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 891dd42c to 89082996
STACK_TEXT:
cfd799b8 891dd42c 8ef7ea20 8900f030 8900f0c0 nt!IofCallDriver+0x5f
cfd79a1c 890f60c7 8ef7ea20 8dc5a701 00000000 nt!IopMountVolume+0x1ce
cfd79a4c 8927cf4a 8dc5a700 cfd79b70 cfd79b08 nt!IopCheckVpbMounted+0x60
cfd79b28 8926baec 8ef7ea20 00000000 8df59008 nt!IopParseDevice+0x7fe
cfd79bb8 89279084 00000000 cfd79c10 00000040 nt!ObpLookupObjectName+0x5a8
cfd79c1c 8927e7be 1e83f29c 00000000 89254601 nt!ObOpenObjectByName+0x13c
cfd79c90 8928036f 1e83f300 c0100080 1e83f29c nt!IopCreateFile+0x63b
cfd79cdc 986a4b44 1e83f300 c0100080 1e83f29c nt!NtCreateFile+0x34
WARNING: Stack unwind information not available. Following frames may be wrong.
cfd79d30 89088c3a 1e83f300 c0100080 1e83f29c klif+0x2db44
cfd79d30 77705cd4 1e83f300 c0100080 1e83f29c nt!KiFastCallEntry+0x12a
1e83f2f8 00000000 00000000 00000000 00000000 0x77705cd4
STACK_COMMAND: kb
FOLLOWUP_IP:
klif+2db44
986a4b44 ?? ???
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: klif+2db44
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: klif
IMAGE_NAME: klif.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ca58e03
FAILURE_BUCKET_ID: 0x8E_klif+2db44
BUCKET_ID: 0x8E_klif+2db44
Followup: MachineOwner
---------