Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\021811-28470-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a0c000 PsLoadedModuleList = 0xfffff800`02c49e50
Debug session time: Fri Feb 18 20:15:48.325 2011 (UTC - 5:00)
System Uptime: 0 days 0:08:39.463
Loading Kernel Symbols
...............................................................
.......................
Loading User Symbols
Missing image name, possible paged-out or corrupt data.
Loading unloaded module list
.Missing image name, possible paged-out or corrupt data.
Missing image name, possible paged-out or corrupt data.
Missing image name, possible paged-out or corrupt data.
.Missing image name, possible paged-out or corrupt data.
.Missing image name, possible paged-out or corrupt data.
.Missing image name, possible paged-out or corrupt data.
.Missing image name, possible paged-out or corrupt data.
..Missing image name, possible paged-out or corrupt data.
..Missing image name, possible paged-out or corrupt data.
..Missing image name, possible paged-out or corrupt data.
.Missing image name, possible paged-out or corrupt data.
Missing image name, possible paged-out or corrupt data.
.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00000001
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_00000000`00000001
Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
FAULTING_IP:
Unknown_Module_00000000`00000000>+0
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
BUGCHECK_STR: 0x1E_0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff800048122c8 -- (.exr 0xfffff800048122c8)
ExceptionAddress: fffff80002a89167 (nt!KiInsertTimerTable+0x0000000000000157)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff80004812370 -- (.trap 0xfffff80004812370)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000040310088 rbx=0000000000000000 rcx=fffff80002bf6e80
rdx=fffffa80042be460 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a89167 rsp=fffff80004812500 rbp=0000000000000001
r8=fffdfa80042be4a0 r9=0000000000000031 r10=fffff80002bf6e80
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KiInsertTimerTable+0x157:
fffff800`02a89167 410fb74002 movzx eax,word ptr [r8+2] ds:fd70:fffdfa80`042be4a2=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a7446e to fffff80002a7c710
STACK_TEXT:
fffff800`048113b8 fffff800`02a7446e : 00000000`1ba05302 00000000`00000000 fffff800`04811b30 fffff800`02aa9668 : nt!KeBugCheck
fffff800`048113c0 fffff800`02aa240d : fffff800`02c8ab7c fffff800`02bc4ea4 fffff800`02a0c000 fffff800`048122c8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff800`048113f0 fffff800`02aa9a90 : fffff800`02bcbb34 fffff800`04811468 fffff800`048122c8 fffff800`02a0c000 : nt!RtlpExecuteHandlerForException+0xd
fffff800`04811420 fffff800`02ab69ef : fffff800`048122c8 fffff800`04811b30 fffff800`00000000 fffff800`02a0c000 : nt!RtlDispatchException+0x410
fffff800`04811b00 fffff800`02a7bd82 : fffff800`048122c8 fffffa80`042be460 fffff800`04812370 fffdfa80`042be4a0 : nt!KiDispatchException+0x16f
fffff800`04812190 fffff800`02a7a68a : 00000000`00000000 fffffa80`04a8fdd0 00000000`00000000 00000000`00000002 : nt!KiExceptionDispatch+0xc2
fffff800`04812370 fffff800`02a89167 : fffffa80`04958020 fffff800`02b352cc fffff800`02c04c00 fffffa80`04a8fd70 : nt!KiGeneralProtectionFault+0x10a
fffff800`04812500 fffff800`02a8627a : ffffffff`ffb3b4c0 fffff800`02a8829e fffff800`04812618 00000000`00000002 : nt!KiInsertTimerTable+0x157
fffff800`04812560 fffff800`02a87d7d : fffffa80`042be460 fffffa80`03cfb168 00000000`00000000 00000000`00000000 : nt!KiTimerWaitTest+0x15a
fffff800`048125e0 fffff800`02a884be : 00000001`359fd64b fffff800`04812c58 00000000`00008212 fffff800`02bf94c8 : nt!KiProcessExpiredTimerList+0x6d
fffff800`04812c30 fffff800`02a87cb7 : 00000000`427bd9c6 00000000`00008212 00000000`427bd978 00000000`00000012 : nt!KiTimerExpiration+0x1be
fffff800`04812cd0 fffff800`02a84eea : fffff800`02bf6e80 fffff800`02c04c40 00000000`00000000 fffff880`01e19c50 : nt!KiRetireDpcList+0x277
fffff800`04812d80 00000000`00000000 : fffff800`04813000 fffff800`0480d000 fffff800`04812d40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiKernelCalloutExceptionHandler+e
fffff800`02a7446e 90 nop
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiKernelCalloutExceptionHandler+e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
FAILURE_BUCKET_ID: X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e
BUCKET_ID: X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e
Followup: MachineOwner
---------