none
Fix BSOD Windows 7 Debug Results Included

    Вопрос

  • Can anyone let me know what driver is causing this

    Windows 7 Ult.  ASUS mb, AMD

    *******************************************************************************
    *                                       *
    *            Bugcheck Analysis                  *
    *                                       *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck. Usually the exception address pinpoints
    the driver/function that caused the problem. Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff800027962ed, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: 000000000000201a, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!ObOpenObjectByName+69d
    fffff800`027962ed 410fb6451a   movzx  eax,byte ptr [r13+1Ah]
    
    EXCEPTION_PARAMETER1: 0000000000000000
    
    EXCEPTION_PARAMETER2: 000000000000201a
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800026cb0e8
     000000000000201a 
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    BUGCHECK_STR: 0x1E_c0000005
    
    CUSTOMER_CRASH_COUNT: 1
    
    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
    
    PROCESS_NAME: svchost.exe
    
    CURRENT_IRQL: 0
    
    TRAP_FRAME: fffff8800cd78ae0 -- (.trap 0xfffff8800cd78ae0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=ffffffff80003cd0 rbx=0000000000000000 rcx=fffff8800cd78d90
    rdx=00000000001000a1 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff800027962ed rsp=fffff8800cd78c70 rbp=0000000000000000
     r8=fffff8a000ef0000 r9=0000000000000078 r10=fffffa80071e3bd0
    r11=fffffa80071e3ba0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0     nv up ei pl nz na po nc
    nt!ObOpenObjectByName+0x69d:
    fffff800`027962ed 410fb6451a   movzx  eax,byte ptr [r13+1Ah] ds:001e:00000000`0000001a=??
    Resetting default scope
    
    LAST_CONTROL_TRANSFER: from fffff800024e6028 to fffff8000249a640
    
    STACK_TEXT: 
    fffff880`0cd78258 fffff800`024e6028 : 00000000`0000001e ffffffff`c0000005 fffff800`027962ed 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0cd78260 fffff800`02499cc2 : fffff880`0cd78a38 fffffa80`07f80b10 fffff880`0cd78ae0 fffff800`0241a000 : nt! ?? ::FNODOBFM::`string'+0x4987d
    fffff880`0cd78900 fffff800`0249883a : 00000000`00000000 00000000`0000201a 00000000`00000000 fffffa80`07f80b10 : nt!KiExceptionDispatch+0xc2
    fffff880`0cd78ae0 fffff800`027962ed : 00000000`00000000 fffffa80`071e3c00 fffffa80`00000000 fffffa80`06703800 : nt!KiPageFault+0x23a
    fffff880`0cd78c70 fffff800`0279785c : fffffa80`072cd660 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByName+0x69d
    fffff880`0cd78d40 fffff800`02783134 : fffff880`0cd79780 00000000`001000a1 fffff880`0cd79168 fffff880`0cd79198 : nt!IopCreateFile+0x2bc
    fffff880`0cd78de0 fffff800`024998d3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtOpenFile+0x58
    fffff880`0cd78e70 fffff800`02495e70 : fffff800`0274578c 00000000`00000001 fffff880`01135e01 fffffa80`00000000 : nt!KiSystemServiceCopyEnd+0x13
    fffff880`0cd79078 fffff800`0274578c : 00000000`00000001 fffff880`01135e01 fffffa80`00000000 fffff880`00000000 : nt!KiServiceLinkage
    fffff880`0cd79080 fffff800`024998d3 : fffffa80`071d4b30 00000000`00000001 fffffa80`072cd660 fffff800`02791a34 : nt!NtCreateUserProcess+0x2eb
    fffff880`0cd79bb0 00000000`773a1dea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0078d608 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773a1dea
    
    
    STACK_COMMAND: kb
    
    FOLLOWUP_IP: 
    nt!ObOpenObjectByName+69d
    fffff800`027962ed 410fb6451a   movzx  eax,byte ptr [r13+1Ah]
    
    SYMBOL_STACK_INDEX: 4
    
    SYMBOL_NAME: nt!ObOpenObjectByName+69d
    
    FOLLOWUP_NAME: MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME: ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
    
    FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!ObOpenObjectByName+69d
    
    BUCKET_ID: X64_0x1E_c0000005_nt!ObOpenObjectByName+69d
    
    Followup: MachineOwner
    


    Zach
    21 апреля 2011 г. 1:24

Ответы

Все ответы