
Image path: \SystemRoot\system32\drivers\npf.sys Image path: \WINDOWS\system32\ntoskrnl.exe This will let us see why this breakpoint isĪrg1: c0000005, The exception code that was not handledĪrg2: 80833de3, The address that the exception occurred atĮXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". If this happens, make sure a debugger gets connected, and the Hardcoded breakpoints in retail code, but. This is not supposed to happen as developers should never have This means a hardĬoded breakpoint or assertion was hit, but this system was booted Some common problems are exception code 0x80000003.

Always note this addressĪs well as the link date of the driver/image that contains this address. The driver/function that caused the problem. KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e) Probably caused by : hardware ( nt!CcSetDirtyInMask+2a2 ) Use !analyze -v to get detailed debugging information.īugCheck 1000008E,

Product: Server, suite: TerminalServer SingleUserTS

Windows Server 2003 Kernel Version 3790 (Service Pack 2) MP (4 procs) Free x86 compatible *** WARNING: Unable to verify timestamp for ntoskrnl.exe Unable to load image \WINDOWS\system32\ntoskrnl.exe, Win32 error 2 Symbol search path is: c:\WINDOWS\Symbols Mini Kernel Dump File: Only registers and stack trace are available If anyone could let me know how to do this, or point me to information, or point me to a better mailist list, I'd appreciate it.

Is there a tutorial somewhere that gives hints on how to interpret the information from a BSOD? I have included some information from WinDbg below, and from that it looks like a CLI exception that occurs inside NTOSKRNL, but I can't see how to figure out who called into NTOSKRNL, or if this was all initiated by an interrupt.
