Guest User

Jerra

a guest
Feb 18th, 2010
138
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.31 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\MEMORY.DMP]
  7. Kernel Summary Dump File: Only kernel address space is available
  8.  
  9. Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
  10. Executable search path is:
  11. Windows 7 Kernel Version 7600 MP (4 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  13. Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
  14. Machine Name:
  15. Kernel base = 0xfffff800`02c4b000 PsLoadedModuleList = 0xfffff800`02e88e50
  16. Debug session time: Thu Feb 18 08:37:33.500 2010 (GMT+1)
  17. System Uptime: 0 days 0:05:12.967
  18. Loading Kernel Symbols
  19. ...............................................................
  20. ................................................................
  21. ....................................
  22. Loading User Symbols
  23.  
  24. Loading unloaded module list
  25. ....
  26. *******************************************************************************
  27. * *
  28. * Bugcheck Analysis *
  29. * *
  30. *******************************************************************************
  31.  
  32. Use !analyze -v to get detailed debugging information.
  33.  
  34. BugCheck 1E, {0, 0, 0, 0}
  35.  
  36. Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )
  37.  
  38. Followup: MachineOwner
  39. ---------
  40.  
  41. 0: kd> !analyze -v
  42. *******************************************************************************
  43. * *
  44. * Bugcheck Analysis *
  45. * *
  46. *******************************************************************************
  47.  
  48. KMODE_EXCEPTION_NOT_HANDLED (1e)
  49. This is a very common bugcheck. Usually the exception address pinpoints
  50. the driver/function that caused the problem. Always note this address
  51. as well as the link date of the driver/image that contains this address.
  52. Arguments:
  53. Arg1: 0000000000000000, The exception code that was not handled
  54. Arg2: 0000000000000000, The address that the exception occurred at
  55. Arg3: 0000000000000000, Parameter 0 of the exception
  56. Arg4: 0000000000000000, Parameter 1 of the exception
  57.  
  58. Debugging Details:
  59. ------------------
  60.  
  61.  
  62. EXCEPTION_CODE: (Win32) 0 (0) - Der Vorgang wurde erfolgreich beendet.
  63.  
  64. FAULTING_IP:
  65. +6833952f04b5daa0
  66. 00000000`00000000 ?? ???
  67.  
  68. EXCEPTION_PARAMETER1: 0000000000000000
  69.  
  70. EXCEPTION_PARAMETER2: 0000000000000000
  71.  
  72. DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
  73.  
  74. BUGCHECK_STR: 0x1E
  75.  
  76. PROCESS_NAME: System
  77.  
  78. CURRENT_IRQL: 2
  79.  
  80. EXCEPTION_RECORD: fffff80000ba25d8 -- (.exr 0xfffff80000ba25d8)
  81. ExceptionAddress: fffff80002cc8389 (nt!KiProcessExpiredTimerList+0x0000000000000129)
  82. ExceptionCode: c0000005 (Access violation)
  83. ExceptionFlags: 00000000
  84. NumberParameters: 2
  85. Parameter[0]: 0000000000000000
  86. Parameter[1]: ffffffffffffffff
  87. Attempt to read from address ffffffffffffffff
  88.  
  89. TRAP_FRAME: fffff80000ba2680 -- (.trap 0xfffff80000ba2680)
  90. NOTE: The trap frame does not contain all registers.
  91. Some register values may be zeroed or incorrect.
  92. rax=fffffa800692fef8 rbx=0000000000000000 rcx=bffffa800692fef8
  93. rdx=fffff880009ec700 rsi=0000000000000000 rdi=0000000000000000
  94. rip=fffff80002cc8389 rsp=fffff80000ba2810 rbp=fffffa800692f010
  95. r8=fffffa80067fdc00 r9=0000000000000008 r10=fffff80002c4b000
  96. r11=fffff80000ba27e0 r12=0000000000000000 r13=0000000000000000
  97. r14=0000000000000000 r15=0000000000000000
  98. iopl=0 nv up ei pl zr na po nc
  99. nt!KiProcessExpiredTimerList+0x129:
  100. fffff800`02cc8389 48894108 mov qword ptr [rcx+8],rax ds:bffffa80`0692ff00=????????????????
  101. Resetting default scope
  102.  
  103. LAST_CONTROL_TRANSFER: from fffff80002cb4c2e to fffff80002cbced0
  104.  
  105. STACK_TEXT:
  106. fffff800`00ba16b8 fffff800`02cb4c2e : 00000000`00000000 00000000`00000000 fffff800`00ba1e30 fffff800`02ce9e28 : nt!KeBugCheck
  107. fffff800`00ba16c0 fffff800`02ce2bed : fffff800`02ec9c24 fffff800`02e02a3c fffff800`02c4b000 fffff800`00ba25d8 : nt!KiKernelCalloutExceptionHandler+0xe
  108. fffff800`00ba16f0 fffff800`02cea250 : fffff800`02e0aa88 fffff800`00ba1768 fffff800`00ba25d8 fffff800`02c4b000 : nt!RtlpExecuteHandlerForException+0xd
  109. fffff800`00ba1720 fffff800`02cf71b5 : fffff800`00ba25d8 fffff800`00ba1e30 fffff800`00000000 fffffa80`0692fef0 : nt!RtlDispatchException+0x410
  110. fffff800`00ba1e00 fffff800`02cbc542 : fffff800`00ba25d8 fffffa80`0692f7f0 fffff800`00ba2680 fffffa80`06263c00 : nt!KiDispatchException+0x135
  111. fffff800`00ba24a0 fffff800`02cbae4a : fffff880`01978002 fffff800`00ba26f8 fffff880`01978468 fffffa80`040b8720 : nt!KiExceptionDispatch+0xc2
  112. fffff800`00ba2680 fffff800`02cc8389 : fffffa80`06b7c4a0 fffffa80`069b5390 fffffa80`069b5390 fffffa80`060beb30 : nt!KiGeneralProtectionFault+0x10a
  113. fffff800`00ba2810 fffff800`02cc8e7e : 00000000`ba8b0150 fffff800`00ba2e88 00000000`00004e5c fffff800`02e38e08 : nt!KiProcessExpiredTimerList+0x129
  114. fffff800`00ba2e60 fffff800`02cc85dc : fffff800`02e35edd 00000000`00004e5c fffff880`01126fc0 00000000`0000005c : nt!KiTimerExpiration+0x1be
  115. fffff800`00ba2f00 fffff800`02cc3065 : 00000000`00000000 fffffa80`039fb680 00000000`00000000 fffff800`02de74e0 : nt!KiRetireDpcList+0x1bc
  116. fffff800`00ba2fb0 fffff800`02cc2e7c : fffffa80`03a240a8 fffff800`02c09ae7 00000065`00000003 00000000`00000000 : nt!KxRetireDpcList+0x5
  117. fffff880`033b64c0 fffff800`02d0865c : 00000000`00000046 fffff800`02ca779b fffff800`02e35e80 fffff800`02e38000 : nt!KiDispatchInterruptContinue
  118. fffff880`033b64f0 fffff800`02c9c739 : fffff880`033b6830 fffff800`02d6c44c fffff800`02efeee0 fffff880`033b66b0 : nt!KiDpcInterrupt+0xcc
  119. fffff880`033b6680 fffff800`02d7bf4f : 00000000`00000246 fffff800`02c038dd fffff880`00000001 fffff880`033b6830 : nt!KiExitDispatcher+0x195
  120. fffff880`033b66f0 fffff800`02eff7d1 : 00000000`00000000 00000000`00000003 00000000`00989680 fffff880`033b6840 : nt!KeSetSystemTime+0x49f
  121. fffff880`033b67d0 fffff800`02ef8f29 : 00000000`00989680 00000000`00989680 01cab06d`3bd1a7c0 00000000`00000002 : nt!ExpSetSystemTime+0x51
  122. fffff880`033b6820 fffff800`02f0b99c : 00000000`00000000 00000000`00000004 01cab075`9d960fc0 01cab06d`3bd1a7c0 : nt! ?? ::OKHAJAOM::`string'+0x1a9
  123. fffff880`033b6870 fffff800`02cbc153 : fffffa80`039fb680 fffff780`00000300 00000000`00000007 fffff800`02cb0900 : nt!NtSetSystemPowerState+0x8ac
  124. fffff880`033b69b0 fffff800`02cb86f0 : fffff800`0312aab0 00000000`00000000 fffff880`01444000 fffff880`01444000 : nt!KiSystemServiceCopyEnd+0x13
  125. fffff880`033b6b48 fffff800`0312aab0 : 00000000`00000000 fffff880`01444000 fffff880`01444000 00000000`00000000 : nt!KiServiceLinkage
  126. fffff880`033b6b50 fffff800`0312ac8c : 00000000`00000004 fffff880`01444000 00000000`00000002 fffff800`02cc7ac1 : nt!PopIssueActionRequest+0x280
  127. fffff880`033b6be0 fffff800`02c7bedd : 00000000`00000001 fffffa80`039fb600 00000000`00000001 fffff880`0149e2b8 : nt!PopPolicyWorkerAction+0x4c
  128. fffff880`033b6c40 fffff800`02cca161 : fffff880`00000002 fffff880`00000004 fffff800`02c7bde0 00000000`00000000 : nt!PopPolicyWorkerThread+0xfd
  129. fffff880`033b6cb0 fffff800`02f60166 : 83485710`245c8948 fffffa80`039fb680 00000000`00000080 fffffa80`039e6b30 : nt!ExpWorkerThread+0x111
  130. fffff880`033b6d40 fffff800`02c9b486 : fffff880`03163180 fffffa80`039fb680 fffff880`0316dfc0 2de80000`00034024 : nt!PspSystemThreadStartup+0x5a
  131. fffff880`033b6d80 00000000`00000000 : fffff880`033b7000 fffff880`033b1000 fffff880`033b5a50 00000000`00000000 : nt!KxStartSystemThread+0x16
  132.  
  133.  
  134. STACK_COMMAND: kb
  135.  
  136. FOLLOWUP_IP:
  137. nt!KiKernelCalloutExceptionHandler+e
  138. fffff800`02cb4c2e 90 nop
  139.  
  140. SYMBOL_STACK_INDEX: 1
  141.  
  142. SYMBOL_NAME: nt!KiKernelCalloutExceptionHandler+e
  143.  
  144. FOLLOWUP_NAME: MachineOwner
  145.  
  146. MODULE_NAME: nt
  147.  
  148. IMAGE_NAME: ntkrnlmp.exe
  149.  
  150. DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
  151.  
  152. FAILURE_BUCKET_ID: X64_0x1E_nt!KiKernelCalloutExceptionHandler+e
  153.  
  154. BUCKET_ID: X64_0x1E_nt!KiKernelCalloutExceptionHandler+e
  155.  
  156. Followup: MachineOwner
  157. ---------
  158.  
  159. 0: kd> .reload
  160. Loading Kernel Symbols
  161. ...............................................................
  162. ................................................................
  163. ....................................
  164. Loading User Symbols
  165.  
  166. Loading unloaded module list
  167. ....
  168.  
Advertisement
Add Comment
Please, Sign In to add comment