Microsoft (R) Windows Debugger Version 6.9.0003.113 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Preben\Desktop\Feil med PC\Mini101208-02.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/downloads/symbols Executable search path is: Windows Server 2008 Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 6001.18063.amd64fre.vistasp1_gdr.080425-1930 Kernel base = 0xfffff800`01e63000 PsLoadedModuleList = 0xfffff800`02028db0 Debug session time: Sun Oct 12 21:51:43.273 2008 (GMT+2) System Uptime: 0 days 0:07:10.383 Loading Kernel Symbols ......................................................................................................................................... Loading User Symbols Loading unloaded module list .. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1E, {ffffffffc0000005, fffffa60012185d6, 0, ffffffffffffffff} Unable to load image \SystemRoot\system32\DRIVERS\iaStor.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for iaStor.sys *** ERROR: Module load completed but symbols could not be loaded for iaStor.sys Probably caused by : CLASSPNP.SYS ( CLASSPNP!TransferPktComplete+1a0 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffffa60012185d6, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: ffffffffffffffff, Parameter 1 of the exception Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instruksjonen i 0x%08lx refererte minne ved adressen 0x%08lx. Minnet kunne ikke v re %s. FAULTING_IP: Ntfs!NtfsMasterIrpAsyncCompletionRoutine+166 fffffa60`012185d6 415d pop r13 EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: ffffffffffffffff READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000208c080 ffffffffffffffff CUSTOMER_CRASH_COUNT: 2 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x1E PROCESS_NAME: System CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from fffff80001e91e77 to fffff80001eb8390 STACK_TEXT: fffff800`0310be48 fffff800`01e91e77 : 00000000`0000001e ffffffff`c0000005 fffffa60`012185d6 00000000`00000000 : nt!KeBugCheckEx fffff800`0310be50 fffff800`01eb81e9 : fffff800`0310c588 fffffa80`0454a010 fffff800`0310c630 fffffa80`0454a010 : nt! ?? ::FNODOBFM::`string'+0x29317 fffff800`0310c450 fffff800`01eb6dcd : fffffa80`03efd000 fffffa80`08924060 fffff800`0310c668 fffff800`0310c678 : nt!KiExceptionDispatch+0xa9 fffff800`0310c630 fffffa60`012185d6 : 00000000`00000000 00000000`00000000 fffffa80`0454a2db fffffa80`06a70000 : nt!KiGeneralProtectionFault+0xcd fffff800`0310c7c8 fffff800`01eba705 : fffffa80`0454a010 00000000`00000000 fffffa80`05973030 fffffa80`0454a1bb : Ntfs!NtfsMasterIrpAsyncCompletionRoutine+0x166 fffff800`0310c7f0 fffffa60`00dd1730 : fffffa80`045f5c60 00000000`00000001 fffffa80`06a70010 fffff800`01e2b5a0 : nt!IopfCompleteRequest+0x315 fffff800`0310c8b0 fffff800`01eba705 : 00000000`00000000 fffff800`0310ca40 00000000`00000002 fffff800`01fd7680 : CLASSPNP!TransferPktComplete+0x1a0 fffff800`0310c930 fffffa60`00c5af24 : fffffa80`087b7dc0 fffffa80`045f5c00 fffffa80`08d29670 fffffa80`04cb2000 : nt!IopfCompleteRequest+0x315 fffff800`0310c9f0 fffffa80`087b7dc0 : fffffa80`045f5c00 fffffa80`08d29670 fffffa80`04cb2000 00000000`00000002 : iaStor+0x4df24 fffff800`0310c9f8 fffffa80`045f5c00 : fffffa80`08d29670 fffffa80`04cb2000 00000000`00000002 fffffa80`04bd8e40 : 0xfffffa80`087b7dc0 fffff800`0310ca00 fffffa80`08d29670 : fffffa80`04cb2000 00000000`00000002 fffffa80`04bd8e40 fffffa80`043c3010 : 0xfffffa80`045f5c00 fffff800`0310ca08 fffffa80`04cb2000 : 00000000`00000002 fffffa80`04bd8e40 fffffa80`043c3010 fffff800`01fdcb80 : 0xfffffa80`08d29670 fffff800`0310ca10 00000000`00000002 : fffffa80`04bd8e40 fffffa80`043c3010 fffff800`01fdcb80 00000000`00000002 : 0xfffffa80`04cb2000 fffff800`0310ca18 fffffa80`04bd8e40 : fffffa80`043c3010 fffff800`01fdcb80 00000000`00000002 fffff800`01f7ab72 : 0x2 fffff800`0310ca20 fffffa80`043c3010 : fffff800`01fdcb80 00000000`00000002 fffff800`01f7ab72 fffffa80`03efd000 : 0xfffffa80`04bd8e40 fffff800`0310ca28 fffff800`01fdcb80 : 00000000`00000002 fffff800`01f7ab72 fffffa80`03efd000 00000000`00000024 : 0xfffffa80`043c3010 fffff800`0310ca30 00000000`00000002 : fffff800`01f7ab72 fffffa80`03efd000 00000000`00000024 fffff800`0310ca78 : nt!KiInitialThread fffff800`0310ca38 fffff800`01f7ab72 : fffffa80`03efd000 00000000`00000024 fffff800`0310ca78 fffff800`0310ca90 : 0x2 fffff800`0310ca40 fffff800`01f33bf9 : fffffa80`04cb6700 fffffa60`00c12032 fffff800`00000002 00000000`00000000 : nt!EtwpLogKernelEvent+0x202 fffff800`0310cae0 fffff800`01f33c5f : fffffa80`04bd8e48 fffff800`0310cc70 fffff800`0310ccc0 fffff800`01f33d2f : nt!EtwTraceTimedEvent+0xd9 fffff800`0310cb40 fffff800`01eb92f6 : fffffa80`04bd8e48 fffffa80`04aa51a0 fffff800`0000040e fffff800`0310cbc0 : nt!PerfInfoLogInterrupt+0x3f fffff800`0310cba0 fffff800`01eb9082 : fffffa80`043c3010 fffff800`01fdcb80 00000000`00000002 fffff800`01f7ab72 : nt!KiScanInterruptObjectList+0xe6 fffff800`0310cbf0 fffffa80`03c8e110 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0x112 fffffa80`090eaaa0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`03c8e110 STACK_COMMAND: kb FOLLOWUP_IP: CLASSPNP!TransferPktComplete+1a0 fffffa60`00dd1730 837c243002 cmp dword ptr [rsp+30h],2 SYMBOL_STACK_INDEX: 6 SYMBOL_NAME: CLASSPNP!TransferPktComplete+1a0 FOLLOWUP_NAME: MachineOwner MODULE_NAME: CLASSPNP IMAGE_NAME: CLASSPNP.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 479198a5 FAILURE_BUCKET_ID: X64_0x1E_CLASSPNP!TransferPktComplete+1a0 BUCKET_ID: X64_0x1E_CLASSPNP!TransferPktComplete+1a0 Followup: MachineOwner ---------