get paid to paste

ADDITIONAL_DEBUG_TEXT:  
Use '!findthebuild' command to search for the target build information.
If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols.

MODULE_NAME: RVFsSec

FAULTING_MODULE: 804d7000 nt

DEBUG_FLR_IMAGE_TIMESTAMP:  47ba6df1

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in "0x%08lx" verweist auf Speicher in "0x%08lx". Der Vorgang  "%s" konnte nicht auf dem Speicher durchgef hrt werden.

FAULTING_IP: 
nt+669c7
8053d9c7 8a27            mov     ah,byte ptr [edi]

TRAP_FRAME:  b6fc3a50 -- (.trap 0xffffffffb6fc3a50)
ErrCode = 00000000
eax=00000065 ebx=ba33be40 ecx=8a6cda40 edx=e121d800 esi=ba33b44b edi=00000000
eip=8053d9c7 esp=b6fc3ac4 ebp=b6fc3ad0 iopl=0         nv up ei ng nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010286
nt+0x669c7:
8053d9c7 8a27            mov     ah,byte ptr [edi]          ds:0023:00000000=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  2

DEFAULT_BUCKET_ID:  DRIVER_FAULT

BUGCHECK_STR:  0x8E

LAST_CONTROL_TRANSFER:  from ba33b56d to 8053d9c7

STACK_TEXT:  
WARNING: Stack unwind information not available. Following frames may be wrong.
b6fc3ad0 ba33b56d 00000000 ba33b44a b6fc3d64 nt+0x669c7
b6fc3af4 b6e130cf 025ad778 000f001f 00000000 RVFsSec+0x356d
b6fc3d40 8054162c 025ad778 000f001f 00000000 OADriver+0x150cf
b6fc3d64 7c91e4f4 badb0d00 025ad6d4 b6059d98 nt+0x6a62c
b6fc3d68 badb0d00 025ad6d4 b6059d98 b6059dcc 0x7c91e4f4
b6fc3d6c 025ad6d4 b6059d98 b6059dcc 00000000 0xbadb0d00
b6fc3d70 b6059d98 b6059dcc 00000000 00000000 0x25ad6d4
b6fc3d74 b6059dcc 00000000 00000000 00000000 0xb6059d98
b6fc3d78 00000000 00000000 00000000 00000000 0xb6059dcc


STACK_COMMAND:  kb

FOLLOWUP_IP: 
RVFsSec+356d
ba33b56d 85c0            test    eax,eax

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  RVFsSec+356d

FOLLOWUP_NAME:  MachineOwner

IMAGE_NAME:  RVFsSec.sys

BUCKET_ID:  WRONG_SYMBOLS

Followup: MachineOwner
---------

Pasted: Feb 25, 2009, 1:40:11 am
Views: 132