Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\MEMORY.DMP]
- Kernel Summary Dump File: Only kernel address space is available
- Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
- Executable search path is:
- Windows 7 Kernel Version 7600 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
- Machine Name:
- Kernel base = 0xfffff800`02c4b000 PsLoadedModuleList = 0xfffff800`02e88e50
- Debug session time: Thu Feb 18 08:37:33.500 2010 (GMT+1)
- System Uptime: 0 days 0:05:12.967
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ....................................
- Loading User Symbols
- Loading unloaded module list
- ....
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck 1E, {0, 0, 0, 0}
- Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )
- Followup: MachineOwner
- ---------
- 0: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- KMODE_EXCEPTION_NOT_HANDLED (1e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Arguments:
- Arg1: 0000000000000000, The exception code that was not handled
- Arg2: 0000000000000000, The address that the exception occurred at
- Arg3: 0000000000000000, Parameter 0 of the exception
- Arg4: 0000000000000000, Parameter 1 of the exception
- Debugging Details:
- ------------------
- EXCEPTION_CODE: (Win32) 0 (0) - Der Vorgang wurde erfolgreich beendet.
- FAULTING_IP:
- +6833952f04b5daa0
- 00000000`00000000 ?? ???
- EXCEPTION_PARAMETER1: 0000000000000000
- EXCEPTION_PARAMETER2: 0000000000000000
- DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
- BUGCHECK_STR: 0x1E
- PROCESS_NAME: System
- CURRENT_IRQL: 2
- EXCEPTION_RECORD: fffff80000ba25d8 -- (.exr 0xfffff80000ba25d8)
- ExceptionAddress: fffff80002cc8389 (nt!KiProcessExpiredTimerList+0x0000000000000129)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 2
- Parameter[0]: 0000000000000000
- Parameter[1]: ffffffffffffffff
- Attempt to read from address ffffffffffffffff
- TRAP_FRAME: fffff80000ba2680 -- (.trap 0xfffff80000ba2680)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=fffffa800692fef8 rbx=0000000000000000 rcx=bffffa800692fef8
- rdx=fffff880009ec700 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff80002cc8389 rsp=fffff80000ba2810 rbp=fffffa800692f010
- r8=fffffa80067fdc00 r9=0000000000000008 r10=fffff80002c4b000
- r11=fffff80000ba27e0 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- nt!KiProcessExpiredTimerList+0x129:
- fffff800`02cc8389 48894108 mov qword ptr [rcx+8],rax ds:bffffa80`0692ff00=????????????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff80002cb4c2e to fffff80002cbced0
- STACK_TEXT:
- fffff800`00ba16b8 fffff800`02cb4c2e : 00000000`00000000 00000000`00000000 fffff800`00ba1e30 fffff800`02ce9e28 : nt!KeBugCheck
- fffff800`00ba16c0 fffff800`02ce2bed : fffff800`02ec9c24 fffff800`02e02a3c fffff800`02c4b000 fffff800`00ba25d8 : nt!KiKernelCalloutExceptionHandler+0xe
- fffff800`00ba16f0 fffff800`02cea250 : fffff800`02e0aa88 fffff800`00ba1768 fffff800`00ba25d8 fffff800`02c4b000 : nt!RtlpExecuteHandlerForException+0xd
- fffff800`00ba1720 fffff800`02cf71b5 : fffff800`00ba25d8 fffff800`00ba1e30 fffff800`00000000 fffffa80`0692fef0 : nt!RtlDispatchException+0x410
- fffff800`00ba1e00 fffff800`02cbc542 : fffff800`00ba25d8 fffffa80`0692f7f0 fffff800`00ba2680 fffffa80`06263c00 : nt!KiDispatchException+0x135
- fffff800`00ba24a0 fffff800`02cbae4a : fffff880`01978002 fffff800`00ba26f8 fffff880`01978468 fffffa80`040b8720 : nt!KiExceptionDispatch+0xc2
- fffff800`00ba2680 fffff800`02cc8389 : fffffa80`06b7c4a0 fffffa80`069b5390 fffffa80`069b5390 fffffa80`060beb30 : nt!KiGeneralProtectionFault+0x10a
- fffff800`00ba2810 fffff800`02cc8e7e : 00000000`ba8b0150 fffff800`00ba2e88 00000000`00004e5c fffff800`02e38e08 : nt!KiProcessExpiredTimerList+0x129
- fffff800`00ba2e60 fffff800`02cc85dc : fffff800`02e35edd 00000000`00004e5c fffff880`01126fc0 00000000`0000005c : nt!KiTimerExpiration+0x1be
- fffff800`00ba2f00 fffff800`02cc3065 : 00000000`00000000 fffffa80`039fb680 00000000`00000000 fffff800`02de74e0 : nt!KiRetireDpcList+0x1bc
- fffff800`00ba2fb0 fffff800`02cc2e7c : fffffa80`03a240a8 fffff800`02c09ae7 00000065`00000003 00000000`00000000 : nt!KxRetireDpcList+0x5
- fffff880`033b64c0 fffff800`02d0865c : 00000000`00000046 fffff800`02ca779b fffff800`02e35e80 fffff800`02e38000 : nt!KiDispatchInterruptContinue
- fffff880`033b64f0 fffff800`02c9c739 : fffff880`033b6830 fffff800`02d6c44c fffff800`02efeee0 fffff880`033b66b0 : nt!KiDpcInterrupt+0xcc
- fffff880`033b6680 fffff800`02d7bf4f : 00000000`00000246 fffff800`02c038dd fffff880`00000001 fffff880`033b6830 : nt!KiExitDispatcher+0x195
- fffff880`033b66f0 fffff800`02eff7d1 : 00000000`00000000 00000000`00000003 00000000`00989680 fffff880`033b6840 : nt!KeSetSystemTime+0x49f
- fffff880`033b67d0 fffff800`02ef8f29 : 00000000`00989680 00000000`00989680 01cab06d`3bd1a7c0 00000000`00000002 : nt!ExpSetSystemTime+0x51
- fffff880`033b6820 fffff800`02f0b99c : 00000000`00000000 00000000`00000004 01cab075`9d960fc0 01cab06d`3bd1a7c0 : nt! ?? ::OKHAJAOM::`string'+0x1a9
- fffff880`033b6870 fffff800`02cbc153 : fffffa80`039fb680 fffff780`00000300 00000000`00000007 fffff800`02cb0900 : nt!NtSetSystemPowerState+0x8ac
- fffff880`033b69b0 fffff800`02cb86f0 : fffff800`0312aab0 00000000`00000000 fffff880`01444000 fffff880`01444000 : nt!KiSystemServiceCopyEnd+0x13
- fffff880`033b6b48 fffff800`0312aab0 : 00000000`00000000 fffff880`01444000 fffff880`01444000 00000000`00000000 : nt!KiServiceLinkage
- fffff880`033b6b50 fffff800`0312ac8c : 00000000`00000004 fffff880`01444000 00000000`00000002 fffff800`02cc7ac1 : nt!PopIssueActionRequest+0x280
- fffff880`033b6be0 fffff800`02c7bedd : 00000000`00000001 fffffa80`039fb600 00000000`00000001 fffff880`0149e2b8 : nt!PopPolicyWorkerAction+0x4c
- fffff880`033b6c40 fffff800`02cca161 : fffff880`00000002 fffff880`00000004 fffff800`02c7bde0 00000000`00000000 : nt!PopPolicyWorkerThread+0xfd
- fffff880`033b6cb0 fffff800`02f60166 : 83485710`245c8948 fffffa80`039fb680 00000000`00000080 fffffa80`039e6b30 : nt!ExpWorkerThread+0x111
- fffff880`033b6d40 fffff800`02c9b486 : fffff880`03163180 fffffa80`039fb680 fffff880`0316dfc0 2de80000`00034024 : nt!PspSystemThreadStartup+0x5a
- fffff880`033b6d80 00000000`00000000 : fffff880`033b7000 fffff880`033b1000 fffff880`033b5a50 00000000`00000000 : nt!KxStartSystemThread+0x16
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- nt!KiKernelCalloutExceptionHandler+e
- fffff800`02cb4c2e 90 nop
- SYMBOL_STACK_INDEX: 1
- SYMBOL_NAME: nt!KiKernelCalloutExceptionHandler+e
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
- FAILURE_BUCKET_ID: X64_0x1E_nt!KiKernelCalloutExceptionHandler+e
- BUCKET_ID: X64_0x1E_nt!KiKernelCalloutExceptionHandler+e
- Followup: MachineOwner
- ---------
- 0: kd> .reload
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ....................................
- Loading User Symbols
- Loading unloaded module list
- ....
Advertisement
Add Comment
Please, Sign In to add comment