*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
FAULTING_IP:
+0
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x1E
PROCESS_NAME: System
CURRENT_IRQL: 0
EXCEPTION_RECORD: fffff88002f8ca28 -- (.exr 0xfffff88002f8ca28)
ExceptionAddress: fffff800035f7f04 (hal!HalpHpetQueryCount+0x0000000000000036)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 000000000000010c
Attempt to read from address 000000000000010c
TRAP_FRAME: fffff88002f8cad0 -- (.trap 0xfffff88002f8cad0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000010c rbx=0000000000000000 rcx=000000900000002c
rdx=000000000000010c rsi=0000000000000000 rdi=0000000000000000
rip=fffff800035f7f04 rsp=fffff88002f8cc68 rbp=0000000000000000
r8=000000004c7c1442 r9=00000000017d7840 r10=00000000000249f9
r11=fffffa800a4e9601 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
hal!HalpHpetQueryCount+0x36:
fffff800`035f7f04 483bc2 cmp rax,rdx
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003078d6e to fffff80003081010
STACK_TEXT:
fffff880`02f8bb18 fffff800`03078d6e : 00000000`00000010 fffff880`01882d76 fffff880`02f8c290 fffff800`030ad9a8 : nt!KeBugCheck
fffff880`02f8bb20 fffff800`030a675d : fffff800`0328ee70 fffff800`031ccff4 fffff800`03011000 fffff880`02f8ca28 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02f8bb50 fffff800`030addd0 : fffff800`031cfa64 fffff880`02f8bbc8 fffff880`02f8ca28 fffff800`03011000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02f8bb80 fffff800`030badff : fffff880`02f8ca28 fffff880`02f8c290 fffff880`00000000 00000000`00000000 : nt!RtlDispatchException+0x410
fffff880`02f8c260 fffff800`03080682 : fffff880`02f8ca28 00000000`00000000 fffff880`02f8cad0 fffff880`02f64180 : nt!KiDispatchException+0x16f
fffff880`02f8c8f0 fffff800`0307f1fa : 00000000`00000000 00000000`00000000 00000000`00002700 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`02f8cad0 fffff800`035f7f04 : fffff800`035fc64c 00000090`0000002c 00000000`00000246 fffff880`02f8cc98 : nt!KiPageFault+0x23a
fffff880`02f8cc68 fffff800`035fc64c : 00000090`0000002c 00000000`00000246 fffff880`02f8cc98 00000000`00000018 : hal!HalpHpetQueryCount+0x36
fffff880`02f8cc70 fffff800`0308eb37 : 00000000`ffffffed 00000000`00000000 fffff880`02f6efc0 00000000`00000001 : hal!KeQueryPerformanceCounter+0x74
fffff880`02f8cca0 fffff800`0308974c : fffff880`02f64180 fffff880`00000000 00000000`00000000 fffff880`10018128 : nt!PoIdle+0x5b7
fffff880`02f8cd80 00000000`00000000 : fffff880`02f8d000 fffff880`02f87000 fffff880`02f8cd40 00000000`00000000 : nt!KiIdleLoop+0x2c
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiKernelCalloutExceptionHandler+e
fffff800`03078d6e 90 nop
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiKernelCalloutExceptionHandler+e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4fa38fe2
FAILURE_BUCKET_ID: X64_0x1E_nt!KiKernelCalloutExceptionHandler+e
BUCKET_ID: X64_0x1E_nt!KiKernelCalloutExceptionHandler+e
Followup: MachineOwner