BSOD na novom kompu(ispis cijelog dumpa)

poruka: 2
|
čitano: 1.008
|
moderatori: DrNasty, pirat, XXX-Man, vincimus
1
+/- sve poruke
ravni prikaz
starije poruke gore
15 godina
neaktivan
offline
BSOD na novom kompu(ispis cijelog dumpa)


Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\030111-19375-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\WINDOWS\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03211000 PsLoadedModuleList = 0xfffff800`0344ee50
Debug session time: Tue Mar  1 16:45:11.634 2011 (UTC + 1:00)
System Uptime: 0 days 4:21:54.304
Loading Kernel Symbols
...............................................................
................................................................
.................................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {0, 0, 0, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.

FAULTING_IP:
+3039623165666439
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0

BUGCHECK_STR:  0x1E_0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff88002ffd3a8 -- (.exr 0xfffff88002ffd3a8)
ExceptionAddress: fffff8000328ce39 (nt!KiProcessExpiredTimerList+0x0000000000000129)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff88002ffd450 -- (.trap 0xfffff88002ffd450)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8007169fe8 rbx=0000000000000000 rcx=f7fffa8007169fe8
rdx=0000000000000102 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000328ce39 rsp=fffff88002ffd5e0 rbp=fffffa8007751168
 r8=fffff88002fd7301  r9=0000000000000004 r10=00000000000000d8
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiProcessExpiredTimerList+0x129:
fffff800`0328ce39 48894108        mov     qword ptr [rcx+8],rax ds:0002:f7fffa80`07169ff0=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000327946e to fffff80003281710

STACK_TEXT: 
fffff880`02ffc498 fffff800`0327946e : fffffa80`09fbea78 fffffa80`09fbea78 fffff880`02ffcc10 fffff800`032ae668 : nt!KeBugCheck
fffff880`02ffc4a0 fffff800`032a740d : fffff800`0348fb7c fffff800`033c9ea4 fffff800`03211000 fffff880`02ffd3a8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02ffc4d0 fffff800`032aea90 : fffff800`033d0b34 fffff880`02ffc548 fffff880`02ffd3a8 fffff800`03211000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02ffc500 fffff800`032bb9ef : fffff880`02ffd3a8 fffff880`02ffcc10 fffff880`00000000 fffffa80`07169fe0 : nt!RtlDispatchException+0x410
fffff880`02ffcbe0 fffff800`03280d82 : fffff880`02ffd3a8 fffffa80`07751168 fffff880`02ffd450 fffffa80`0a10ac00 : nt!KiDispatchException+0x16f
fffff880`02ffd270 fffff800`0327f68a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`02ffd450 fffff800`0328ce39 : fffffa80`07751120 fffffa80`09faa010 fffffa80`09faa010 00000000`00000102 : nt!KiGeneralProtectionFault+0x10a
fffff880`02ffd5e0 fffff800`0328d4be : 00000024`9674a565 fffff880`02ffdc58 00000000`000f5ed8 fffff880`02fd9088 : nt!KiProcessExpiredTimerList+0x129
fffff880`02ffdc30 fffff800`0328ccb7 : 0000000c`33d746c3 0000000c`000f5ed8 0000000c`33d746ab 00000000`000000d8 : nt!KiTimerExpiration+0x1be
fffff880`02ffdcd0 fffff800`03289eea : fffff880`02fd5180 fffff880`02fdffc0 00000000`00000000 fffff880`06e6d588 : nt!KiRetireDpcList+0x277
fffff880`02ffdd80 00000000`00000000 : fffff880`02ffe000 fffff880`02ff8000 fffff880`02ffdd40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt!KiKernelCalloutExceptionHandler+e
fffff800`0327946e 90              nop

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.

FAULTING_IP:
+3039623165666439
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0

BUGCHECK_STR:  0x1E_0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff88002ffd3a8 -- (.exr 0xfffff88002ffd3a8)
ExceptionAddress: fffff8000328ce39 (nt!KiProcessExpiredTimerList+0x0000000000000129)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff88002ffd450 -- (.trap 0xfffff88002ffd450)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8007169fe8 rbx=0000000000000000 rcx=f7fffa8007169fe8
rdx=0000000000000102 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000328ce39 rsp=fffff88002ffd5e0 rbp=fffffa8007751168
 r8=fffff88002fd7301  r9=0000000000000004 r10=00000000000000d8
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiProcessExpiredTimerList+0x129:
fffff800`0328ce39 48894108        mov     qword ptr [rcx+8],rax ds:0002:f7fffa80`07169ff0=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000327946e to fffff80003281710

STACK_TEXT: 
fffff880`02ffc498 fffff800`0327946e : fffffa80`09fbea78 fffffa80`09fbea78 fffff880`02ffcc10 fffff800`032ae668 : nt!KeBugCheck
fffff880`02ffc4a0 fffff800`032a740d : fffff800`0348fb7c fffff800`033c9ea4 fffff800`03211000 fffff880`02ffd3a8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02ffc4d0 fffff800`032aea90 : fffff800`033d0b34 fffff880`02ffc548 fffff880`02ffd3a8 fffff800`03211000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02ffc500 fffff800`032bb9ef : fffff880`02ffd3a8 fffff880`02ffcc10 fffff880`00000000 fffffa80`07169fe0 : nt!RtlDispatchException+0x410
fffff880`02ffcbe0 fffff800`03280d82 : fffff880`02ffd3a8 fffffa80`07751168 fffff880`02ffd450 fffffa80`0a10ac00 : nt!KiDispatchException+0x16f
fffff880`02ffd270 fffff800`0327f68a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`02ffd450 fffff800`0328ce39 : fffffa80`07751120 fffffa80`09faa010 fffffa80`09faa010 00000000`00000102 : nt!KiGeneralProtectionFault+0x10a
fffff880`02ffd5e0 fffff800`0328d4be : 00000024`9674a565 fffff880`02ffdc58 00000000`000f5ed8 fffff880`02fd9088 : nt!KiProcessExpiredTimerList+0x129
fffff880`02ffdc30 fffff800`0328ccb7 : 0000000c`33d746c3 0000000c`000f5ed8 0000000c`33d746ab 00000000`000000d8 : nt!KiTimerExpiration+0x1be
fffff880`02ffdcd0 fffff800`03289eea : fffff880`02fd5180 fffff880`02fdffc0 00000000`00000000 fffff880`06e6d588 : nt!KiRetireDpcList+0x277
fffff880`02ffdd80 00000000`00000000 : fffff880`02ffe000 fffff880`02ff8000 fffff880`02ffdd40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt!KiKernelCalloutExceptionHandler+e
fffff800`0327946e 90              nop

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.

FAULTING_IP:
+3039623165666439
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0

BUGCHECK_STR:  0x1E_0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff88002ffd3a8 -- (.exr 0xfffff88002ffd3a8)
ExceptionAddress: fffff8000328ce39 (nt!KiProcessExpiredTimerList+0x0000000000000129)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff88002ffd450 -- (.trap 0xfffff88002ffd450)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8007169fe8 rbx=0000000000000000 rcx=f7fffa8007169fe8
rdx=0000000000000102 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000328ce39 rsp=fffff88002ffd5e0 rbp=fffffa8007751168
 r8=fffff88002fd7301  r9=0000000000000004 r10=00000000000000d8
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiProcessExpiredTimerList+0x129:
fffff800`0328ce39 48894108        mov     qword ptr [rcx+8],rax ds:0002:f7fffa80`07169ff0=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000327946e to fffff80003281710

STACK_TEXT: 
fffff880`02ffc498 fffff800`0327946e : fffffa80`09fbea78 fffffa80`09fbea78 fffff880`02ffcc10 fffff800`032ae668 : nt!KeBugCheck
fffff880`02ffc4a0 fffff800`032a740d : fffff800`0348fb7c fffff800`033c9ea4 fffff800`03211000 fffff880`02ffd3a8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02ffc4d0 fffff800`032aea90 : fffff800`033d0b34 fffff880`02ffc548 fffff880`02ffd3a8 fffff800`03211000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02ffc500 fffff800`032bb9ef : fffff880`02ffd3a8 fffff880`02ffcc10 fffff880`00000000 fffffa80`07169fe0 : nt!RtlDispatchException+0x410
fffff880`02ffcbe0 fffff800`03280d82 : fffff880`02ffd3a8 fffffa80`07751168 fffff880`02ffd450 fffffa80`0a10ac00 : nt!KiDispatchException+0x16f
fffff880`02ffd270 fffff800`0327f68a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`02ffd450 fffff800`0328ce39 : fffffa80`07751120 fffffa80`09faa010 fffffa80`09faa010 00000000`00000102 : nt!KiGeneralProtectionFault+0x10a
fffff880`02ffd5e0 fffff800`0328d4be : 00000024`9674a565 fffff880`02ffdc58 00000000`000f5ed8 fffff880`02fd9088 : nt!KiProcessExpiredTimerList+0x129
fffff880`02ffdc30 fffff800`0328ccb7 : 0000000c`33d746c3 0000000c`000f5ed8 0000000c`33d746ab 00000000`000000d8 : nt!KiTimerExpiration+0x1be
fffff880`02ffdcd0 fffff800`03289eea : fffff880`02fd5180 fffff880`02fdffc0 00000000`00000000 fffff880`06e6d588 : nt!KiRetireDpcList+0x277
fffff880`02ffdd80 00000000`00000000 : fffff880`02ffe000 fffff880`02ff8000 fffff880`02ffdd40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt!KiKernelCalloutExceptionHandler+e
fffff800`0327946e 90              nop

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.

FAULTING_IP:
+3039623165666439
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0

BUGCHECK_STR:  0x1E_0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff88002ffd3a8 -- (.exr 0xfffff88002ffd3a8)
ExceptionAddress: fffff8000328ce39 (nt!KiProcessExpiredTimerList+0x0000000000000129)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff88002ffd450 -- (.trap 0xfffff88002ffd450)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8007169fe8 rbx=0000000000000000 rcx=f7fffa8007169fe8
rdx=0000000000000102 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000328ce39 rsp=fffff88002ffd5e0 rbp=fffffa8007751168
 r8=fffff88002fd7301  r9=0000000000000004 r10=00000000000000d8
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiProcessExpiredTimerList+0x129:
fffff800`0328ce39 48894108        mov     qword ptr [rcx+8],rax ds:0002:f7fffa80`07169ff0=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000327946e to fffff80003281710

STACK_TEXT: 
fffff880`02ffc498 fffff800`0327946e : fffffa80`09fbea78 fffffa80`09fbea78 fffff880`02ffcc10 fffff800`032ae668 : nt!KeBugCheck
fffff880`02ffc4a0 fffff800`032a740d : fffff800`0348fb7c fffff800`033c9ea4 fffff800`03211000 fffff880`02ffd3a8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02ffc4d0 fffff800`032aea90 : fffff800`033d0b34 fffff880`02ffc548 fffff880`02ffd3a8 fffff800`03211000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02ffc500 fffff800`032bb9ef : fffff880`02ffd3a8 fffff880`02ffcc10 fffff880`00000000 fffffa80`07169fe0 : nt!RtlDispatchException+0x410
fffff880`02ffcbe0 fffff800`03280d82 : fffff880`02ffd3a8 fffffa80`07751168 fffff880`02ffd450 fffffa80`0a10ac00 : nt!KiDispatchException+0x16f
fffff880`02ffd270 fffff800`0327f68a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`02ffd450 fffff800`0328ce39 : fffffa80`07751120 fffffa80`09faa010 fffffa80`09faa010 00000000`00000102 : nt!KiGeneralProtectionFault+0x10a
fffff880`02ffd5e0 fffff800`0328d4be : 00000024`9674a565 fffff880`02ffdc58 00000000`000f5ed8 fffff880`02fd9088 : nt!KiProcessExpiredTimerList+0x129
fffff880`02ffdc30 fffff800`0328ccb7 : 0000000c`33d746c3 0000000c`000f5ed8 0000000c`33d746ab 00000000`000000d8 : nt!KiTimerExpiration+0x1be
fffff880`02ffdcd0 fffff800`03289eea : fffff880`02fd5180 fffff880`02fdffc0 00000000`00000000 fffff880`06e6d588 : nt!KiRetireDpcList+0x277
fffff880`02ffdd80 00000000`00000000 : fffff880`02ffe000 fffff880`02ff8000 fffff880`02ffdd40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt!KiKernelCalloutExceptionHandler+e
fffff800`0327946e 90              nop

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.

FAULTING_IP:
+3039623165666439
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0

BUGCHECK_STR:  0x1E_0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff88002ffd3a8 -- (.exr 0xfffff88002ffd3a8)
ExceptionAddress: fffff8000328ce39 (nt!KiProcessExpiredTimerList+0x0000000000000129)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff88002ffd450 -- (.trap 0xfffff88002ffd450)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8007169fe8 rbx=0000000000000000 rcx=f7fffa8007169fe8
rdx=0000000000000102 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000328ce39 rsp=fffff88002ffd5e0 rbp=fffffa8007751168
 r8=fffff88002fd7301  r9=0000000000000004 r10=00000000000000d8
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiProcessExpiredTimerList+0x129:
fffff800`0328ce39 48894108        mov     qword ptr [rcx+8],rax ds:0002:f7fffa80`07169ff0=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000327946e to fffff80003281710

STACK_TEXT: 
fffff880`02ffc498 fffff800`0327946e : fffffa80`09fbea78 fffffa80`09fbea78 fffff880`02ffcc10 fffff800`032ae668 : nt!KeBugCheck
fffff880`02ffc4a0 fffff800`032a740d : fffff800`0348fb7c fffff800`033c9ea4 fffff800`03211000 fffff880`02ffd3a8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02ffc4d0 fffff800`032aea90 : fffff800`033d0b34 fffff880`02ffc548 fffff880`02ffd3a8 fffff800`03211000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02ffc500 fffff800`032bb9ef : fffff880`02ffd3a8 fffff880`02ffcc10 fffff880`00000000 fffffa80`07169fe0 : nt!RtlDispatchException+0x410
fffff880`02ffcbe0 fffff800`03280d82 : fffff880`02ffd3a8 fffffa80`07751168 fffff880`02ffd450 fffffa80`0a10ac00 : nt!KiDispatchException+0x16f
fffff880`02ffd270 fffff800`0327f68a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`02ffd450 fffff800`0328ce39 : fffffa80`07751120 fffffa80`09faa010 fffffa80`09faa010 00000000`00000102 : nt!KiGeneralProtectionFault+0x10a
fffff880`02ffd5e0 fffff800`0328d4be : 00000024`9674a565 fffff880`02ffdc58 00000000`000f5ed8 fffff880`02fd9088 : nt!KiProcessExpiredTimerList+0x129
fffff880`02ffdc30 fffff800`0328ccb7 : 0000000c`33d746c3 0000000c`000f5ed8 0000000c`33d746ab 00000000`000000d8 : nt!KiTimerExpiration+0x1be
fffff880`02ffdcd0 fffff800`03289eea : fffff880`02fd5180 fffff880`02fdffc0 00000000`00000000 fffff880`06e6d588 : nt!KiRetireDpcList+0x277
fffff880`02ffdd80 00000000`00000000 : fffff880`02ffe000 fffff880`02ff8000 fffff880`02ffdd40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt!KiKernelCalloutExceptionHandler+e
fffff800`0327946e 90              nop

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.

FAULTING_IP:
+3039623165666439
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0

BUGCHECK_STR:  0x1E_0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff88002ffd3a8 -- (.exr 0xfffff88002ffd3a8)
ExceptionAddress: fffff8000328ce39 (nt!KiProcessExpiredTimerList+0x0000000000000129)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff88002ffd450 -- (.trap 0xfffff88002ffd450)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8007169fe8 rbx=0000000000000000 rcx=f7fffa8007169fe8
rdx=0000000000000102 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000328ce39 rsp=fffff88002ffd5e0 rbp=fffffa8007751168
 r8=fffff88002fd7301  r9=0000000000000004 r10=00000000000000d8
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiProcessExpiredTimerList+0x129:
fffff800`0328ce39 48894108        mov     qword ptr [rcx+8],rax ds:0002:f7fffa80`07169ff0=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000327946e to fffff80003281710

STACK_TEXT: 
fffff880`02ffc498 fffff800`0327946e : fffffa80`09fbea78 fffffa80`09fbea78 fffff880`02ffcc10 fffff800`032ae668 : nt!KeBugCheck
fffff880`02ffc4a0 fffff800`032a740d : fffff800`0348fb7c fffff800`033c9ea4 fffff800`03211000 fffff880`02ffd3a8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02ffc4d0 fffff800`032aea90 : fffff800`033d0b34 fffff880`02ffc548 fffff880`02ffd3a8 fffff800`03211000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02ffc500 fffff800`032bb9ef : fffff880`02ffd3a8 fffff880`02ffcc10 fffff880`00000000 fffffa80`07169fe0 : nt!RtlDispatchException+0x410
fffff880`02ffcbe0 fffff800`03280d82 : fffff880`02ffd3a8 fffffa80`07751168 fffff880`02ffd450 fffffa80`0a10ac00 : nt!KiDispatchException+0x16f
fffff880`02ffd270 fffff800`0327f68a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`02ffd450 fffff800`0328ce39 : fffffa80`07751120 fffffa80`09faa010 fffffa80`09faa010 00000000`00000102 : nt!KiGeneralProtectionFault+0x10a
fffff880`02ffd5e0 fffff800`0328d4be : 00000024`9674a565 fffff880`02ffdc58 00000000`000f5ed8 fffff880`02fd9088 : nt!KiProcessExpiredTimerList+0x129
fffff880`02ffdc30 fffff800`0328ccb7 : 0000000c`33d746c3 0000000c`000f5ed8 0000000c`33d746ab 00000000`000000d8 : nt!KiTimerExpiration+0x1be
fffff880`02ffdcd0 fffff800`03289eea : fffff880`02fd5180 fffff880`02fdffc0 00000000`00000000 fffff880`06e6d588 : nt!KiRetireDpcList+0x277
fffff880`02ffdd80 00000000`00000000 : fffff880`02ffe000 fffff880`02ff8000 fffff880`02ffdd40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt!KiKernelCalloutExceptionHandler+e
fffff800`0327946e 90              nop

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

Followup: MachineOwner
---------

 

 

Oprostite za otvaranje nove teme,ali nisam mogao postati u onu svoju staru.

Ako znate zaključiti u čemu je problem,molim pomozite!

 
0 0 hvala 0
16 godina
offline
BSOD na novom kompu(ispis cijelog dumpa)

Probaj ovo skinut i pokrenut na tom kompu

Moj PC  
0 0 hvala 0
1
Nova poruka
E-mail:
Lozinka:
 
vrh stranice