here is an example of what i mean by "posting the text i get back from debugging the file using windbg." This is my first crash file of 8, if this is enough to know what the problem was, i can make 7 more posts with one dump in each of them
Loading Dump File [C:\Windows\Minidump\Mini110407-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is:
SRV*c:\symbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Vista Kernel Version 6000 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6000.16514.x86fre.vista_gdr.070627-1500
Kernel base = 0x81c00000 PsLoadedModuleList = 0x81d11db0
Debug session time: Sun Nov 4 18:51:06.800 2007 (GMT-8)
System Uptime: 1 days 3:56:14.636
Loading Kernel Symbols
..................................................................................................................................................................
Loading User Symbols
Loading unloaded module list
.....................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, 81ce752b, b36346a4, 0}
*** WARNING: Unable to verify timestamp for mfehidk.sys
*** ERROR: Module load completed but symbols could not be loaded for mfehidk.sys
Probably caused by : fileinfo.sys ( fileinfo!FIStreamGetInfo+108 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 81ce752b, The address that the exception occurred at
Arg3: b36346a4, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ExAllocatePoolWithTag+520
81ce752b 894804 mov dword ptr [eax+4],ecx
TRAP_FRAME: b36346a4 -- (.trap 0xffffffffb36346a4)
ErrCode = 00000002
eax=7c659668 ebx=8363c184 ecx=8363b3cc edx=00000001 esi=8363b0d0 edi=b55950d0
eip=81ce752b esp=b3634718 ebp=b3634760 iopl=0 nv up ei pl nz ac po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010212
nt!ExAllocatePoolWithTag+0x520:
81ce752b 894804 mov dword ptr [eax+4],ecx ds:0023:7c65966c=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 806aeba6 to 81ce752b
STACK_TEXT:
b3634760 806aeba6 00000001 0000010c 6e664d46 nt!ExAllocatePoolWithTag+0x520
b3634780 806af52b 83f743c0 00000000 83f743c0 fltmgr!FltpAllocateFileNameInformation+0x22
b3634798 8069af13 83f743c0 00000000 00000000 fltmgr!FltpCreateFileNameInformation+0x8d
b36347c8 8069b37c 8520b46c 00000000 b3634860 fltmgr!FltpGetFileNameInformation+0x31b
b36347f0 8068aace 00d22c18 00000401 b3634824 fltmgr!FltGetFileNameInformation+0x120
b3634840 8068ace7 83d22c18 b3634860 0026c97e fileinfo!FIStreamGetInfo+0x108
b3634878 8069512d 83d22c18 b363489c 32106827 fileinfo!FIPostCreateCallback+0x133
b36348dc 80697fa8 00d22bb8 00000000 83d22bb8 fltmgr!FltpPerformPostCallbacks+0x1f1
b36348f0 806984de 83d22bb8 853a9b00 b3634930 fltmgr!FltpProcessIoCompletion+0x10
b3634900 80698aec 8590b460 853a9b00 83d22bb8 fltmgr!FltpPassThroughCompletion+0x94
b3634930 806aaa91 b3634950 00000000 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2ba
b363497c 81c27fae 8590b460 858e9008 853a9cfc fltmgr!FltpCreate+0x2a1
b3634994 9f9acdf4 84036bdc 84036b80 00000002 nt!IofCallDriver+0x63
WARNING: Stack unwind information not available. Following frames may be wrong.
b36349bc 9f99df1b 853a9b00 b3634a70 853a9b00 mfehidk+0x15df4
b36349e0 9f99e58c 853a9b00 853a9cd8 8424aa10 mfehidk+0x6f1b
b3634a78 9f9ac049 8424aa10 853a9b00 b3634ab0 mfehidk+0x758c
b3634a88 9f9ac099 b3634a98 9fa3ea88 9fa3ea88 mfehidk+0x15049
b3634ab0 81c27fae 9fa3ea88 853a9b00 8424aa6c mfehidk+0x15099
b3634ac8 81d96f3c b363f0c0 83e9a61c 85746e08 nt!IofCallDriver+0x63
b3634b80 81deeebf 85746e20 00000000 83e9a578 nt!IopParseDevice+0xcff
b3634c10 81dec66f 00000000 b3634c68 00000040 nt!ObpLookupObjectName+0x615
b3634c70 81d839c4 0559e3f8 00000000 81c77501 nt!ObOpenObjectByName+0x13c
b3634ce4 81d8ec72 0559e444 c0140080 0559e3f8 nt!IopCreateFile+0x5ec
b3634d30 81c8c92a 0559e444 c0140080 0559e3f8 nt!NtCreateFile+0x34
b3634d30 77120f34 0559e444 c0140080 0559e3f8 nt!KiFastCallEntry+0x12a
0559e438 00000000 00000000 00000000 00000000 0x77120f34
STACK_COMMAND: kb
FOLLOWUP_IP:
fileinfo!FIStreamGetInfo+108
8068aace 85c0 test eax,eax
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: fileinfo!FIStreamGetInfo+108
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: fileinfo
IMAGE_NAME: fileinfo.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4549ae1f
FAILURE_BUCKET_ID: 0x8E_fileinfo!FIStreamGetInfo+108
BUCKET_ID: 0x8E_fileinfo!FIStreamGetInfo+108
Followup: MachineOwner
---------