simpel1970
Fleet Admiral
- Registriert
- Apr. 2009
- Beiträge
- 16.274
Gern geschehen
Folge dem Video um zu sehen, wie unsere Website als Web-App auf dem Startbildschirm installiert werden kann.
Anmerkung: Diese Funktion ist in einigen Browsern möglicherweise nicht verfügbar.
BugCheck 1E, {0, 0, 0, 0}
Probably caused by : USBPORT.SYS ( USBPORT!USBPORT_Core_iCompleteDoneTransfer+45f )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - Der Vorgang wurde erfolgreich beendet.
FAULTING_IP:
+3866633632613537
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
BUGCHECK_STR: 0x1E_0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff88002ffd888 -- (.exr 0xfffff88002ffd888)
ExceptionAddress: fffff80002e0b806 (hal!HalPutScatterGatherList+0x00000000000000b6)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff88002ffd930 -- (.trap 0xfffff88002ffd930)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000fff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002e0b806 rsp=fffff88002ffdac0 rbp=00000000000003a8
r8=0000000000000000 r9=0000000000000000 r10=ef59ef9df077f159
r11=00000000000003a8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
hal!HalPutScatterGatherList+0xb6:
fffff800`02e0b806 8b6f2c mov ebp,dword ptr [rdi+2Ch] ds:19b0:00000000`0000002c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ec76be to fffff80002ecfcd0
STACK_TEXT:
fffff880`02ffc968 fffff800`02ec76be : fffffa80`0449ea70 fffffa80`046258b0 fffff880`02ffd0e0 fffff800`02efb890 : nt!KeBugCheck
fffff880`02ffc970 fffff800`02efb55d : fffff800`030d6968 fffff800`03013cbc fffff800`02e50000 fffff880`02ffd888 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02ffc9a0 fffff800`02efa335 : fffff800`030170fc fffff880`02ffca18 fffff880`02ffd888 fffff800`02e50000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02ffc9d0 fffff800`02f0b3b1 : fffff880`02ffd888 fffff880`02ffd0e0 fffff880`00000000 00ff0000`00000000 : nt!RtlDispatchException+0x415
fffff880`02ffd0b0 fffff800`02ecf382 : fffff880`02ffd888 fffffa80`05fb5390 fffff880`02ffd930 00000000`00000000 : nt!KiDispatchException+0x135
fffff880`02ffd750 fffff800`02ecdc8a : fffff880`02d3c820 00000000`0000814e fffff880`02fd5100 fffff880`045bf88b : nt!KiExceptionDispatch+0xc2
fffff880`02ffd930 fffff800`02e0b806 : fffffa80`05fb5390 fffffa80`059c03a8 00000000`000002a8 fffffa80`04651760 : nt!KiGeneralProtectionFault+0x10a
fffff880`02ffdac0 fffff880`0519707b : fffffa80`0434c1a0 fffffa80`0465ad10 fffffa80`0434c050 fffffa80`0434c1a0 : hal!HalPutScatterGatherList+0xb6
fffff880`02ffdb20 fffff880`05197b0f : fffffa80`0465a902 fffffa80`03f835f0 00000000`ffffffff fffffa80`0434ceb0 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0x45f
fffff880`02ffdc00 fffff880`0519566f : fffffa80`0434ceb0 fffffa80`0434c1a0 fffffa80`0434d050 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`02ffdc60 fffff880`05186f89 : fffffa80`0434c050 00000000`00000000 fffffa80`0434ce02 fffffa80`0434ceb0 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`02ffdca0 fffff800`02edb10c : fffff880`02fd5180 fffffa80`0434ceb0 fffffa80`0434cec8 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02ffdcd0 fffff800`02ec7a2a : fffff880`02fd5180 fffff880`02fdffc0 00000000`00000000 fffff880`05186db0 : nt!KiRetireDpcList+0x1bc
fffff880`02ffdd80 00000000`00000000 : fffff880`02ffe000 fffff880`02ff8000 fffff880`02ffdd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
USBPORT!USBPORT_Core_iCompleteDoneTransfer+45f
fffff880`0519707b 4533c0 xor r8d,r8d
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: USBPORT!USBPORT_Core_iCompleteDoneTransfer+45f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: USBPORT
IMAGE_NAME: USBPORT.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4d8c0c08
FAILURE_BUCKET_ID: X64_0x1E_0_USBPORT!USBPORT_Core_iCompleteDoneTransfer+45f
BUCKET_ID: X64_0x1E_0_USBPORT!USBPORT_Core_iCompleteDoneTransfer+45f
Followup: MachineOwner
---------
BCCode: 1000007e
BCP1: FFFFFFFFC0000005
BCP2: FFFFF80002E63B12
BCP3: FFFFF880031A7FC8
BCP4: FFFFF880031A7820
BCCode: 1e
BCP1: 0000000000000000
BCP2: 0000000000000000
BCP3: 0000000000000000
BCP4: 0000000000000000