*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
FAULTING_IP:
+3162376165366565
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
BUGCHECK_STR: 0x1E_0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff880022f8268 -- (.exr 0xfffff880022f8268)
ExceptionAddress: fffff8000228a4f6 (nt!KiProcessExpiredTimerList+0x0000000000000126)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff880022f8310 -- (.trap 0xfffff880022f8310)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=f7fffa800a26bc28 rbx=0000000000000000 rcx=fffffa800a26bc28
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000228a4f6 rsp=fffff880022f84a0 rbp=fffffa800940d920
r8=fffff880022d2301 r9=0000000000000002 r10=000000000000004d
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiProcessExpiredTimerList+0x126:
fffff800`0228a4f6 488908 mov qword ptr [rax],rcx ds:8400:f7fffa80`0a26bc28=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800022765fe to fffff8000227ec10
STACK_TEXT:
fffff880`022f7348 fffff800`022765fe : bfe3da4b`54c6edd9 db7a1378`c6a0c915 fffff880`022f7ac0 fffff800`022aa830 : nt!KeBugCheck
fffff880`022f7350 fffff800`022aa4fd : fffff800`0248871c fffff800`023c5c30 fffff800`02202000 fffff880`022f8268 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`022f7380 fffff800`022a92d5 : fffff800`023c90fc fffff880`022f73f8 fffff880`022f8268 fffff800`02202000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`022f73b0 fffff800`022ba361 : fffff880`022f8268 fffff880`022f7ac0 fffff880`00000000 fffffa80`0a26bc20 : nt!RtlDispatchException+0x415
fffff880`022f7a90 fffff800`0227e2c2 : fffff880`022f8268 fffffa80`0940d920 fffff880`022f8310 00000000`00000000 : nt!KiDispatchException+0x135
fffff880`022f8130 fffff800`0227cbca : fffffa80`08a26f28 00000000`00001068 00000000`00000003 fffff880`01b51f60 : nt!KiExceptionDispatch+0xc2
fffff880`022f8310 fffff800`0228a4f6 : fffffa80`0a26a820 fffffa80`0a766768 fffffa80`0a766768 00000000`00000001 : nt!KiGeneralProtectionFault+0x10a
fffff880`022f84a0 fffff800`0228a37e : 00000000`18854b21 fffff880`022f8b18 00000000`00000a4d fffff880`022d2f28 : nt!KiProcessExpiredTimerList+0x126
fffff880`022f8af0 fffff800`0228a167 : fffffa80`072dfcc1 fffff800`00000a4d fffffa80`0aa39b60 00000000`0000004c : nt!KiTimerExpiration+0x1be
fffff880`022f8b90 fffff800`0227696a : fffff880`022d0180 fffff880`022dafc0 00000000`00000000 fffff800`02330760 : nt!KiRetireDpcList+0x277
fffff880`022f8c40 00000000`00000000 : fffff880`022f9000 fffff880`022f3000 fffff880`022f8c00 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiKernelCalloutExceptionHandler+e
fffff800`022765fe 90 nop
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiKernelCalloutExceptionHandler+e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
FAILURE_BUCKET_ID: X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e
BUCKET_ID: X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e
Followup: MachineOwner