*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED (8e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 81c51e94, The address that the exception occurred at
Arg3: c23cc914, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
Page bbe68 not present in the dump file. Type ".hh dbgerr004" for details
PEB is paged out (Peb.Ldr = 7ffd500c). Type ".hh dbgerr001" for details
PEB is paged out (Peb.Ldr = 7ffd500c). Type ".hh dbgerr001" for details
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!HvpGetCellMapped+8c
81c51e94 8b4f04 mov ecx,dword ptr [edi+4]
TRAP_FRAME: c23cc914 -- (.trap 0xffffffffc23cc914)
ErrCode = 00000000
eax=00000efb ebx=0000013c ecx=000003ff edx=8e4ee1bc esi=8e4ee008 edi=00002310
eip=81c51e94 esp=c23cc988 ebp=c23cc9c8 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
nt!HvpGetCellMapped+0x8c:
81c51e94 8b4f04 mov ecx,dword ptr [edi+4] ds:0023:00002314=????????
Resetting default scope
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: ieuser.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 81a7b5a0 to 81b12163
STACK_TEXT:
c23cc4d4 81a7b5a0 0000008e c0000005 81c51e94 nt!KeBugCheckEx+0x1e
c23cc8a4 81a9d63a c23cc8c0 00000000 c23cc914 nt!KiDispatchException+0x1a9
c23cc90c 81a9d5ee c23cc9c8 81c51e94 badb0d00 nt!CommonDispatchException+0x4a
c23cc9c8 81c22bff 8e4ee008 fffe5efb 00b135c0 nt!Kei386EoiHelper+0x186
c23cc9f4 81c2bb66 8e4ee008 8e4ee31c 00b135c0 nt!CmpAddInfoAfterParseFailure+0xcd
c23cca30 81afa215 0000000a 002c002c acdbdace nt!CmpFindSubKeyByName+0xae
c23cca7c 81a195b0 00000000 00000003 00000003 nt!EtwTraceContextSwap+0x14a
c23ccb78 81c8ae78 8b8f53f0 841102c8 84ae9008 hal!KfLowerIrql+0x64
c23ccc08 81c62fea 000003fc c23ccc60 00000040 nt!ObpLookupObjectName+0x11e
c23ccc68 81c59fa8 0381f234 841102c8 00000001 nt!ObOpenObjectByName+0x13c
c23ccd34 81c5a067 0381f318 00020019 0381f234 nt!CmOpenKey+0x1b1
c23ccd50 81a9ca7a 0381f318 00020019 0381f234 nt!NtOpenKey+0x16
c23ccd50 77819a94 0381f318 00020019 0381f234 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0381f270 00000000 00000000 00000000 00000000 0x77819a94
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!HvpGetCellMapped+8c
81c51e94 8b4f04 mov ecx,dword ptr [edi+4]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!HvpGetCellMapped+8c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 47918b12
FAILURE_BUCKET_ID: 0x8E_nt!HvpGetCellMapped+8c
BUCKET_ID: 0x8E_nt!HvpGetCellMapped+8c
Followup: MachineOwner
---------
Thursday, May 01, 2008
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment