Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Me\Desktop\Mini061910-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\temp\symbols\*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.100216-1514
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Sat Jun 19 10:36:10.546 2010 (GMT+1)
System Uptime: 0 days 0:59:52.252
Loading Kernel Symbols
...............................................................
................................................................
............................................
Loading User Symbols
Loading unloaded module list
.....................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, f7124c66, b496d0c4, 0}
Probably caused by : sr.sys ( sr!SrpExpandPathOfFileName+111 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: f7124c66, The address that the exception occurred at
Arg3: b496d0c4, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
Ntfs!NtfsCommonCreate+ac
f7124c66 89b8c8000000 mov dword ptr [eax+0C8h],edi
TRAP_FRAME: b496d0c4 -- (.trap 0xffffffffb496d0c4)
ErrCode = 00000002
eax=00000000 ebx=b496d270 ecx=b496d2ac edx=00000000 esi=85046b14 edi=00000000
eip=f7124c66 esp=b496d138 ebp=b496d274 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
Ntfs!NtfsCommonCreate+0xac:
f7124c66 89b8c8000000 mov dword ptr [eax+0C8h],edi ds:0023:000000c8=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: avgrsx.exe
LAST_CONTROL_TRANSFER: from f7126f2d to f7124c66
STACK_TEXT:
b496d274 f7126f2d 00000000 850469a8 b496d270 Ntfs!NtfsCommonCreate+0xac
b496d2fc 804ef19f 873326d8 00000001 850469a8 Ntfs!NtfsFsdCreate+0x1dc
b496d30c f71e2e9b 00000000 850469a8 85046b38 nt!IopfCallDriver+0x31
b496d330 f71ef754 b496d350 86755860 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x20b
b496d36c 804ef19f 86755860 850469a8 850469a8 fltmgr!FltpCreate+0x26a
b496d37c 805831fa 8729fc78 8515b454 b496d514 nt!IopfCallDriver+0x31
b496d45c 805bf434 8729fc90 00000000 8515b3b0 nt!IopParseDevice+0xa12
b496d4d4 805bb9c0 00000000 b496d514 00000240 nt!ObpLookupObjectName+0x53c
b496d528 80576033 00000000 00000000 96d7f800 nt!ObOpenObjectByName+0xea
b496d5a4 80576a20 b496d664 00100000 b496d644 nt!IopCreateFile+0x407
b496d5ec f71d6ea5 b496d664 00100000 b496d644 nt!IoCreateFileSpecifyDeviceObjectHint+0x52
b496d78c f71d76d1 873326d8 b496d878 b496d875 sr!SrpExpandPathOfFileName+0x111
b496d7ac f71d7713 873326d8 866f6db8 b496d878 sr!SrpGetFileNameFromFileObject+0xe7
b496d7c4 f71d77a0 873326d8 866f6db8 00140008 sr!SrpExpandFileName+0x35
b496d7ec f71d03e2 873326d8 866f6db8 00000000 sr!SrIsFileEligible+0x5a
b496d98c f71d282c 873326d8 866f6db8 00140008 sr!SrCreateContext+0x13e
b496d9ec 804ef19f 873326d8 00000005 86945008 sr!SrCreate+0x106
b496d9fc f71e2e9b 00000000 86945008 86945198 nt!IopfCallDriver+0x31
b496da20 f71ef754 b496da40 86755860 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x20b
b496da5c 804ef19f 86755860 86945008 86945008 fltmgr!FltpCreate+0x26a
b496da6c 805831fa 8729fc78 869224e4 b496dc04 nt!IopfCallDriver+0x31
b496db4c 805bf434 8729fc90 00000000 86922440 nt!IopParseDevice+0xa12
b496dbc4 805bb9c0 00000000 b496dc04 00000040 nt!ObpLookupObjectName+0x53c
b496dc18 80576033 00000000 00000000 00000001 nt!ObOpenObjectByName+0xea
b496dc94 805769aa 05b2f488 c0110080 05b2f428 nt!IopCreateFile+0x407
b496dcf0 805790b4 05b2f488 c0110080 05b2f428 nt!IoCreateFile+0x8e
b496dd30 8054163c 05b2f488 c0110080 05b2f428 nt!NtCreateFile+0x30
b496dd30 7c90e514 05b2f488 c0110080 05b2f428 nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
05b2f480 00000000 00000000 00000000 00000000 0x7c90e514
STACK_COMMAND: kb
FOLLOWUP_IP:
sr!SrpExpandPathOfFileName+111
f71d6ea5 3bc6 cmp eax,esi
SYMBOL_STACK_INDEX: b
SYMBOL_NAME: sr!SrpExpandPathOfFileName+111
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: sr
IMAGE_NAME: sr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 480252c2
FAILURE_BUCKET_ID: 0x8E_sr!SrpExpandPathOfFileName+111
BUCKET_ID: 0x8E_sr!SrpExpandPathOfFileName+111
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: f7124c66, The address that the exception occurred at
Arg3: b496d0c4, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
Ntfs!NtfsCommonCreate+ac
f7124c66 89b8c8000000 mov dword ptr [eax+0C8h],edi
TRAP_FRAME: b496d0c4 -- (.trap 0xffffffffb496d0c4)
ErrCode = 00000002
eax=00000000 ebx=b496d270 ecx=b496d2ac edx=00000000 esi=85046b14 edi=00000000
eip=f7124c66 esp=b496d138 ebp=b496d274 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
Ntfs!NtfsCommonCreate+0xac:
f7124c66 89b8c8000000 mov dword ptr [eax+0C8h],edi ds:0023:000000c8=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: avgrsx.exe
LAST_CONTROL_TRANSFER: from f7126f2d to f7124c66
STACK_TEXT:
b496d274 f7126f2d 00000000 850469a8 b496d270 Ntfs!NtfsCommonCreate+0xac
b496d2fc 804ef19f 873326d8 00000001 850469a8 Ntfs!NtfsFsdCreate+0x1dc
b496d30c f71e2e9b 00000000 850469a8 85046b38 nt!IopfCallDriver+0x31
b496d330 f71ef754 b496d350 86755860 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x20b
b496d36c 804ef19f 86755860 850469a8 850469a8 fltmgr!FltpCreate+0x26a
b496d37c 805831fa 8729fc78 8515b454 b496d514 nt!IopfCallDriver+0x31
b496d45c 805bf434 8729fc90 00000000 8515b3b0 nt!IopParseDevice+0xa12
b496d4d4 805bb9c0 00000000 b496d514 00000240 nt!ObpLookupObjectName+0x53c
b496d528 80576033 00000000 00000000 96d7f800 nt!ObOpenObjectByName+0xea
b496d5a4 80576a20 b496d664 00100000 b496d644 nt!IopCreateFile+0x407
b496d5ec f71d6ea5 b496d664 00100000 b496d644 nt!IoCreateFileSpecifyDeviceObjectHint+0x52
b496d78c f71d76d1 873326d8 b496d878 b496d875 sr!SrpExpandPathOfFileName+0x111
b496d7ac f71d7713 873326d8 866f6db8 b496d878 sr!SrpGetFileNameFromFileObject+0xe7
b496d7c4 f71d77a0 873326d8 866f6db8 00140008 sr!SrpExpandFileName+0x35
b496d7ec f71d03e2 873326d8 866f6db8 00000000 sr!SrIsFileEligible+0x5a
b496d98c f71d282c 873326d8 866f6db8 00140008 sr!SrCreateContext+0x13e
b496d9ec 804ef19f 873326d8 00000005 86945008 sr!SrCreate+0x106
b496d9fc f71e2e9b 00000000 86945008 86945198 nt!IopfCallDriver+0x31
b496da20 f71ef754 b496da40 86755860 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x20b
b496da5c 804ef19f 86755860 86945008 86945008 fltmgr!FltpCreate+0x26a
b496da6c 805831fa 8729fc78 869224e4 b496dc04 nt!IopfCallDriver+0x31
b496db4c 805bf434 8729fc90 00000000 86922440 nt!IopParseDevice+0xa12
b496dbc4 805bb9c0 00000000 b496dc04 00000040 nt!ObpLookupObjectName+0x53c
b496dc18 80576033 00000000 00000000 00000001 nt!ObOpenObjectByName+0xea
b496dc94 805769aa 05b2f488 c0110080 05b2f428 nt!IopCreateFile+0x407
b496dcf0 805790b4 05b2f488 c0110080 05b2f428 nt!IoCreateFile+0x8e
b496dd30 8054163c 05b2f488 c0110080 05b2f428 nt!NtCreateFile+0x30
b496dd30 7c90e514 05b2f488 c0110080 05b2f428 nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
05b2f480 00000000 00000000 00000000 00000000 0x7c90e514
STACK_COMMAND: kb
FOLLOWUP_IP:
sr!SrpExpandPathOfFileName+111
f71d6ea5 3bc6 cmp eax,esi
SYMBOL_STACK_INDEX: b
SYMBOL_NAME: sr!SrpExpandPathOfFileName+111
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: sr
IMAGE_NAME: sr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 480252c2
FAILURE_BUCKET_ID: 0x8E_sr!SrpExpandPathOfFileName+111
BUCKET_ID: 0x8E_sr!SrpExpandPathOfFileName+111
Followup: MachineOwner
---------