1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

ntoskrnl.exe Blue screen

Discussion in 'Windows XP' started by Racman, 2005/05/12.

Thread Status:
Not open for further replies.
  1. 2005/05/12
    Racman

    Racman Inactive Thread Starter

    Joined:
    2005/05/12
    Messages:
    2
    Likes Received:
    0
    Hello Everyone,
    New to this board and I am having some difficulties. I am having problems with crashing due to ntoskrnl.exe. Downloaded Buggchecker however I am not sure what buttons should be on. I saw some post's by Joe Hobart that said he made a utility that is in his signature but I am unable to access that. Am I just missing this? could someone please direct me. Apologize for being a rookie to buggchecking. Any help would be greatly appreciated.


    Microsoft (R) Windows Debugger Version 6.4.0007.2
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\WINDOWS\Minidump\Mini061103-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*c:\local cache*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows XP Kernel Version 2600 (Service Pack 1) UP Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 2600.xpsp1.020828-1920
    Kernel base = 0x804d4000 PsLoadedModuleList = 0x8054be30
    Debug session time: Wed Jun 11 21:13:59.156 2003 (GMT-5)
    System Uptime: 0 days 0:00:33.734
    Loading Kernel Symbols
    ....................................................................................................
    Loading unloaded module list
    ..
    Loading User Symbols
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck A, {520072, 2, 0, 804eceea}

    Probably caused by : ntoskrnl.exe ( nt!KiWaitTest+31 )

    Followup: MachineOwner
    ---------

    kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high. This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 00520072, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000000, value 0 = read operation, 1 = write operation
    Arg4: 804eceea, address which referenced memory

    Debugging Details:
    ------------------


    READ_ADDRESS: 00520072

    CURRENT_IRQL: 2

    FAULTING_IP:
    nt!KiWaitTest+31
    804eceea 6683781601 cmp word ptr [eax+0x16],0x1

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: DRIVER_FAULT

    BUGCHECK_STR: 0xA

    LAST_CONTROL_TRANSFER: from 804ed696 to 804eceea

    IRP_ADDRESS: 8635d868

    TRAP_FRAME: f7c81294 -- (.trap fffffffff7c81294)
    ErrCode = 00000000
    eax=0052005c ebx=f7c81634 ecx=f7c81314 edx=00000000 esi=f7c8162c edi=00000000
    eip=804eceea esp=f7c81308 ebp=f7c81324 iopl=0 nv up ei pl nz na po cy
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010207
    nt!KiWaitTest+0x31:
    804eceea 6683781601 cmp word ptr [eax+0x16],0x1 ds:0023:00520072=????
    Resetting default scope

    STACK_TEXT:
    f7c81324 804ed696 00000000 00000000 8635d868 nt!KiWaitTest+0x31
    f7c81334 804e9381 f7c8162c 00000000 00000000 nt!KeSetEvent+0x56
    f7c8138c 804f49b4 8635d8a8 f7c813d8 f7c813cc nt!IopCompleteRequest+0x22f
    f7c813dc 804f87df 00000000 00000000 00000000 nt!KiDeliverApc+0xb1
    f7c813f4 804ec950 867cc3c8 80548de0 00000000 nt!KiSwapThread+0x63
    f7c8141c 804edf5d 00000000 00000000 00000000 nt!KeWaitForSingleObject+0x1c0
    f7c81450 804e73d6 f7c81680 865ec0ac 00000000 nt!ExpWaitForResource+0x2f
    f7c81468 80581ca6 80548de0 00000001 80581d1a nt!ExAcquireResourceSharedLite+0xb1
    f7c81474 80581d1a 865ec0ac e100c440 f7c81700 nt!CmpLockRegistry+0x27
    f7c8163c 00000000 e100c458 867c7888 865ec008 nt!CmpParseKey+0x9b


    FOLLOWUP_IP:
    nt!KiWaitTest+31
    804eceea 6683781601 cmp word ptr [eax+0x16],0x1

    SYMBOL_STACK_INDEX: 0

    FOLLOWUP_NAME: MachineOwner

    SYMBOL_NAME: nt!KiWaitTest+31

    MODULE_NAME: nt

    IMAGE_NAME: ntoskrnl.exe

    DEBUG_FLR_IMAGE_TIMESTAMP: 3d6de35c

    STACK_COMMAND: .trap fffffffff7c81294 ; kb

    FAILURE_BUCKET_ID: 0xA_nt!KiWaitTest+31

    BUCKET_ID: 0xA_nt!KiWaitTest+31

    Followup: MachineOwner
    ---------
    Thanks
    Racman
     
    Last edited: 2005/05/12
  2. 2005/05/13
    Racman

    Racman Inactive Thread Starter

    Joined:
    2005/05/12
    Messages:
    2
    Likes Received:
    0
    Here is another.

    Loading Dump File [C:\WINDOWS\Minidump\Mini061103-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*c:\local cache*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows XP Kernel Version 2600 (Service Pack 1) UP Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 2600.xpsp1.020828-1920
    Kernel base = 0x804d4000 PsLoadedModuleList = 0x8054be30
    Debug session time: Wed Jun 11 21:13:59.156 2003 (GMT-5)
    System Uptime: 0 days 0:00:33.734
    Loading Kernel Symbols
    ....................................................................................................
    Loading unloaded module list
    ..
    Loading User Symbols
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck A, {520072, 2, 0, 804eceea}

    Probably caused by : ntoskrnl.exe ( nt!KiWaitTest+31 )

    Followup: MachineOwner
    ---------

    kd> !analyze -v;r;kv;lmtn
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high. This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 00520072, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000000, value 0 = read operation, 1 = write operation
    Arg4: 804eceea, address which referenced memory

    Debugging Details:
    ------------------


    READ_ADDRESS: 00520072

    CURRENT_IRQL: 2

    FAULTING_IP:
    nt!KiWaitTest+31
    804eceea 6683781601 cmp word ptr [eax+0x16],0x1

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: DRIVER_FAULT

    BUGCHECK_STR: 0xA

    LAST_CONTROL_TRANSFER: from 804ed696 to 804eceea

    IRP_ADDRESS: 8635d868

    TRAP_FRAME: f7c81294 -- (.trap fffffffff7c81294)
    ErrCode = 00000000
    eax=0052005c ebx=f7c81634 ecx=f7c81314 edx=00000000 esi=f7c8162c edi=00000000
    eip=804eceea esp=f7c81308 ebp=f7c81324 iopl=0 nv up ei pl nz na po cy
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010207
    nt!KiWaitTest+0x31:
    804eceea 6683781601 cmp word ptr [eax+0x16],0x1 ds:0023:00520072=????
    Resetting default scope

    STACK_TEXT:
    f7c81324 804ed696 00000000 00000000 8635d868 nt!KiWaitTest+0x31
    f7c81334 804e9381 f7c8162c 00000000 00000000 nt!KeSetEvent+0x56
    f7c8138c 804f49b4 8635d8a8 f7c813d8 f7c813cc nt!IopCompleteRequest+0x22f
    f7c813dc 804f87df 00000000 00000000 00000000 nt!KiDeliverApc+0xb1
    f7c813f4 804ec950 867cc3c8 80548de0 00000000 nt!KiSwapThread+0x63
    f7c8141c 804edf5d 00000000 00000000 00000000 nt!KeWaitForSingleObject+0x1c0
    f7c81450 804e73d6 f7c81680 865ec0ac 00000000 nt!ExpWaitForResource+0x2f
    f7c81468 80581ca6 80548de0 00000001 80581d1a nt!ExAcquireResourceSharedLite+0xb1
    f7c81474 80581d1a 865ec0ac e100c440 f7c81700 nt!CmpLockRegistry+0x27
    f7c8163c 00000000 e100c458 867c7888 865ec008 nt!CmpParseKey+0x9b


    FOLLOWUP_IP:
    nt!KiWaitTest+31
    804eceea 6683781601 cmp word ptr [eax+0x16],0x1

    SYMBOL_STACK_INDEX: 0

    FOLLOWUP_NAME: MachineOwner

    SYMBOL_NAME: nt!KiWaitTest+31

    MODULE_NAME: nt

    IMAGE_NAME: ntoskrnl.exe

    DEBUG_FLR_IMAGE_TIMESTAMP: 3d6de35c

    STACK_COMMAND: .trap fffffffff7c81294 ; kb

    FAILURE_BUCKET_ID: 0xA_nt!KiWaitTest+31

    BUCKET_ID: 0xA_nt!KiWaitTest+31

    Followup: MachineOwner
    ---------

    eax=ffdff13c ebx=0000000a ecx=00000000 edx=40000000 esi=804eceea edi=00520072
    eip=805266db esp=f7c81260 ebp=f7c81278 iopl=0 nv up ei ng nz na po nc
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00000286
    nt!KeBugCheckEx+0x19:
    805266db 5d pop ebp
    ChildEBP RetAddr Args to Child
    f7c81278 804dce53 0000000a 00520072 00000002 nt!KeBugCheckEx+0x19 (FPO: [Non-Fpo])
    f7c81278 804eceea 0000000a 00520072 00000002 nt!KiTrap0E+0x2ad (FPO: [0,0] TrapFrame @ f7c81294)
    f7c81324 804ed696 00000000 00000000 8635d868 nt!KiWaitTest+0x31 (FPO: [Non-Fpo])
    f7c81334 804e9381 f7c8162c 00000000 00000000 nt!KeSetEvent+0x56 (FPO: [3,0,3])
    f7c8138c 804f49b4 8635d8a8 f7c813d8 f7c813cc nt!IopCompleteRequest+0x22f (FPO: [Non-Fpo])
    f7c813dc 804f87df 00000000 00000000 00000000 nt!KiDeliverApc+0xb1 (FPO: [Non-Fpo])
    f7c813f4 804ec950 867cc3c8 80548de0 00000000 nt!KiSwapThread+0x63 (FPO: [0,0,2])
    f7c8141c 804edf5d 00000000 00000000 00000000 nt!KeWaitForSingleObject+0x1c0 (FPO: [Non-Fpo])
    f7c81450 804e73d6 f7c81680 865ec0ac 00000000 nt!ExpWaitForResource+0x2f (FPO: [Non-Fpo])
    f7c81468 80581ca6 80548de0 00000001 80581d1a nt!ExAcquireResourceSharedLite+0xb1 (FPO: [Non-Fpo])
    f7c81474 80581d1a 865ec0ac e100c440 f7c81700 nt!CmpLockRegistry+0x27 (FPO: [0,0,0])
    f7c8163c 00000000 e100c458 867c7888 865ec008 nt!CmpParseKey+0x9b (FPO: [Non-Fpo])
    start end module name
    804d4000 806c6980 nt ntoskrnl.exe Thu Aug 29 04:03:24 2002 (3D6DE35C)
    806c7000 806e6380 hal halaacpi.dll Thu Aug 29 03:05:02 2002 (3D6DD5AE)
    ed75c000 ed771380 dump_atapi dump_atapi.sys Thu Aug 29 03:27:48 2002 (3D6DDB04)
    ed772000 ed798bc0 dpcnet5u dpcnet5u.sys Sat Apr 20 21:20:27 2002 (3CC221EB)
    ed839000 ed85c700 Fastfat Fastfat.SYS Thu Aug 29 04:12:45 2002 (3D6DE58D)
    ed8c9000 ed8cc780 usbscan usbscan.sys Thu Aug 29 03:48:51 2002 (3D6DDFF3)
    ed8cd000 ed8cf580 hidusb hidusb.sys Fri Aug 17 16:02:16 2001 (3B7D8658)
    ed8fd000 ed960800 mrxsmb mrxsmb.sys Thu Aug 29 03:59:51 2002 (3D6DE287)
    ed961000 ed988e00 rdbss rdbss.sys Thu Aug 29 03:58:48 2002 (3D6DE248)
    ed989000 ed9af580 netbt netbt.sys Thu Aug 29 04:01:56 2002 (3D6DE304)
    ed9b0000 eda01480 tcpip tcpip.sys Thu Aug 29 03:58:10 2002 (3D6DE222)
    f6e82000 f6ea3780 update update.sys Fri Aug 17 22:53:56 2001 (3B7DE6D4)
    f705c000 f706c200 psched psched.sys Thu Aug 29 03:35:54 2002 (3D6DDCEA)
    f706d000 f7082600 ndiswan ndiswan.sys Thu Aug 29 03:58:38 2002 (3D6DE23E)
    f7083000 f7095900 parport parport.sys Thu Aug 29 03:27:29 2002 (3D6DDAF1)
    f7096000 f7129a80 ctxs51 ctxs51.sys Fri Jun 28 14:30:21 2002 (3D1CB94D)
    f712a000 f714b180 USBPORT USBPORT.SYS Thu Aug 29 03:32:49 2002 (3D6DDC31)
    f714c000 f716cc80 portcls portcls.sys Thu Aug 29 04:00:58 2002 (3D6DE2CA)
    f716d000 f720c940 ALCXWDM ALCXWDM.SYS Fri Aug 30 18:54:17 2002 (3D7005A9)
    f720d000 f722d280 ks ks.sys Thu Aug 29 04:13:40 2002 (3D6DE5C4)
    f724d000 f725e500 VIDEOPRT VIDEOPRT.SYS Thu Aug 29 03:32:03 2002 (3D6DDC03)
    f725f000 f73472a0 nv4_mini nv4_mini.sys Tue Jul 30 18:30:37 2002 (3D47219D)
    f76ba000 f76d3680 Mup Mup.sys Thu Aug 29 04:12:53 2002 (3D6DE595)
    f76d4000 f76fce80 NDIS NDIS.sys Thu Aug 29 04:09:23 2002 (3D6DE4C3)
    f76fd000 f7786300 Ntfs Ntfs.sys Thu Aug 29 04:13:37 2002 (3D6DE5C1)
    f7787000 f779a780 KSecDD KSecDD.sys Fri Aug 17 15:50:01 2001 (3B7D8379)
    f779b000 f77abe80 sr sr.sys Thu Aug 29 03:17:56 2002 (3D6DD8B4)
    f77ac000 f77c1380 atapi atapi.sys Thu Aug 29 03:27:48 2002 (3D6DDB04)
    f77c2000 f77e0880 ftdisk ftdisk.sys Fri Aug 17 15:52:41 2001 (3B7D8419)
    f77e1000 f780cc80 ACPI ACPI.sys Thu Aug 29 03:09:03 2002 (3D6DD69F)
    f782e000 f783d600 pci pci.sys Thu Aug 29 03:09:10 2002 (3D6DD6A6)
    f783e000 f7846c00 isapnp isapnp.sys Fri Aug 17 15:58:01 2001 (3B7D8559)
    f784e000 f785b980 ohci1394 ohci1394.sys Thu Aug 29 03:33:19 2002 (3D6DDC4F)
    f785e000 f786a580 1394BUS 1394BUS.SYS Thu Aug 29 03:33:19 2002 (3D6DDC4F)
    f786e000 f7877280 MountMgr MountMgr.sys Fri Aug 17 15:47:36 2001 (3B7D82E8)
    f787e000 f788a000 VolSnap VolSnap.sys Fri Aug 17 15:53:19 2001 (3B7D843F)
    f788e000 f7896400 disk disk.sys Thu Aug 29 03:27:56 2002 (3D6DDB0C)
    f789e000 f78a9500 CLASSPNP CLASSPNP.SYS Thu Aug 29 04:08:42 2002 (3D6DE49A)
    f78fe000 f790c280 nic1394 nic1394.sys Thu Aug 29 03:33:29 2002 (3D6DDC59)
    f790e000 f7916700 HIDCLASS HIDCLASS.SYS Thu Aug 29 03:32:40 2002 (3D6DDC28)
    f791e000 f7927b80 imapi imapi.sys Thu Aug 29 03:28:05 2002 (3D6DDB15)
    f792e000 f7939980 cdrom cdrom.sys Thu Aug 29 03:27:55 2002 (3D6DDB0B)
    f793e000 f794bd00 redbook redbook.sys Thu Aug 29 03:27:45 2002 (3D6DDB01)
    f794e000 f795c200 drmk drmk.sys Thu Aug 29 03:32:30 2002 (3D6DDC1E)
    f795e000 f796d400 serial serial.sys Thu Aug 29 04:08:27 2002 (3D6DE48B)
    f796e000 f797a780 i8042prt i8042prt.sys Thu Aug 29 04:06:37 2002 (3D6DE41D)
    f797e000 f7989d00 rasl2tp rasl2tp.sys Thu Aug 29 04:06:36 2002 (3D6DE41C)
    f798e000 f7997800 raspppoe raspppoe.sys Fri Aug 17 15:55:33 2001 (3B7D84C5)
    f799e000 f79a9500 raspptp raspptp.sys Thu Aug 29 04:12:46 2002 (3D6DE58E)
    f79ae000 f79b6400 msgpc msgpc.sys Fri Aug 17 15:54:19 2001 (3B7D847B)
    f79be000 f79c7400 termdd termdd.sys Thu Aug 29 03:40:32 2002 (3D6DDE00)
    f7a1e000 f7a27480 NDProxy NDProxy.SYS Fri Aug 17 15:55:30 2001 (3B7D84C2)
    f7a2e000 f7a3ab00 usbhub usbhub.sys Thu Aug 29 03:32:49 2002 (3D6DDC31)
    f7a4e000 f7a5c280 ipsec ipsec.sys Thu Aug 29 04:07:19 2002 (3D6DE447)
    f7a5e000 f7a66180 netbios netbios.sys Thu Aug 29 03:35:45 2002 (3D6DDCE1)
    f7a6e000 f7a76880 Fips Fips.SYS Fri Aug 17 20:31:49 2001 (3B7DC585)
    f7a7e000 f7a86200 wanarp wanarp.sys Fri Aug 17 15:55:23 2001 (3B7D84BB)
    f7a8e000 f7a9c000 arp1394 arp1394.sys Thu Aug 29 03:33:29 2002 (3D6DDC59)
    f7aae000 f7ab3c80 PCIIDEX PCIIDEX.SYS Thu Aug 29 03:27:47 2002 (3D6DDB03)
    f7ab6000 f7aba900 PartMgr PartMgr.sys Fri Aug 17 20:32:23 2001 (3B7DC5A7)
    f7abe000 f7ac20e0 PxHelp20 PxHelp20.sys Wed Nov 27 14:17:12 2002 (3DE52848)
    f7ac6000 f7accb00 sisagp sisagp.sys Wed May 22 03:11:07 2002 (3CEB529B)
    f7b36000 f7b3d780 processr processr.sys Thu Aug 29 03:05:03 2002 (3D6DD5AF)
    f7b3e000 f7b42b80 usbehci usbehci.sys Thu Aug 29 03:32:47 2002 (3D6DDC2F)
    f7b46000 f7b4de00 sisnic sisnic.sys Mon Apr 15 19:52:02 2002 (3CBB75B2)
    f7b4e000 f7b55080 Modem Modem.SYS Fri Aug 17 15:57:35 2001 (3B7D853F)
    f7b56000 f7b5c680 fdc fdc.sys Fri Aug 17 15:51:22 2001 (3B7D83CA)
    f7b5e000 f7b63600 mouclass mouclass.sys Thu Aug 29 03:27:00 2002 (3D6DDAD4)
    f7b66000 f7b6bb80 kbdclass kbdclass.sys Thu Aug 29 03:26:59 2002 (3D6DDAD3)
    f7b6e000 f7b72580 ptilink ptilink.sys Fri Aug 17 15:49:53 2001 (3B7D8371)
    f7b76000 f7b7a080 raspti raspti.sys Fri Aug 17 15:55:32 2001 (3B7D84C4)
    f7b7e000 f7b85dc0 Pcouffin Pcouffin.sys Sat Mar 22 05:56:45 2003 (3E7C4F7D)
    f7bbe000 f7bc2d00 flpydisk flpydisk.sys Thu Aug 29 03:27:43 2002 (3D6DDAFF)
    f7bce000 f7bd2d00 vga vga.sys Thu Aug 29 03:32:03 2002 (3D6DDC03)
    f7bd6000 f7bda680 Msfs Msfs.SYS Fri Aug 17 15:50:02 2001 (3B7D837A)
    f7bde000 f7be5380 Npfs Npfs.SYS Fri Aug 17 15:50:03 2001 (3B7D837B)
    f7bee000 f7bf3500 USBSTOR USBSTOR.SYS Thu Aug 29 03:32:50 2002 (3D6DDC32)
    f7c1e000 f7c23c80 HIDPARSE HIDPARSE.SYS Fri Aug 17 16:02:04 2001 (3B7D864C)
    f7c3e000 f7c41000 BOOTVID BOOTVID.dll Fri Aug 17 15:49:09 2001 (3B7D8345)
    f7cd6000 f7cd8680 pfc pfc.sys Fri Sep 27 17:53:07 2002 (3D94E153)
    f7cda000 f7cdc440 GEARAspiWDM GEARAspiWDM.sys Wed Jun 19 15:42:58 2002 (3D10ECD2)
    f7ce6000 f7ce9d80 usbohci usbohci.sys Thu Aug 29 03:32:48 2002 (3D6DDC30)
    f7cea000 f7ceda80 serenum serenum.sys Fri Aug 17 15:50:13 2001 (3B7D8385)
    f7cee000 f7cf06c0 IPFilter IPFilter.sys Thu Aug 23 02:33:10 2001 (3B84B1B6)
    f7cf2000 f7cf4680 gameenum gameenum.sys Thu Aug 29 03:32:42 2002 (3D6DDC2A)
    f7cf6000 f7cf8580 ndistapi ndistapi.sys Fri Aug 17 15:55:29 2001 (3B7D84C1)
    f7cfa000 f7cfdf80 TDI TDI.SYS Fri Aug 17 15:57:25 2001 (3B7D8535)
    f7d06000 f7d08280 rasacd rasacd.sys Fri Aug 17 15:55:39 2001 (3B7D84CB)
    f7d2e000 f7d2fb80 kdcom kdcom.dll Fri Aug 17 15:49:10 2001 (3B7D8346)
    f7d30000 f7d31100 WMILIB WMILIB.SYS Fri Aug 17 16:07:23 2001 (3B7D878B)
    f7d76000 f7d77280 USBD USBD.SYS Fri Aug 17 16:02:58 2001 (3B7D8682)
    f7d82000 f7d83f00 Fs_Rec Fs_Rec.SYS Fri Aug 17 15:49:37 2001 (3B7D8361)
    f7d84000 f7d85080 Beep Beep.SYS Fri Aug 17 15:47:33 2001 (3B7D82E5)
    f7d86000 f7d87080 mnmdd mnmdd.SYS Fri Aug 17 15:57:28 2001 (3B7D8538)
    f7d88000 f7d89080 RDPCDD RDPCDD.sys Fri Aug 17 15:46:56 2001 (3B7D82C0)
    f7dc6000 f7dc7100 dump_WMILIB dump_WMILIB.SYS Fri Aug 17 16:07:23 2001 (3B7D878B)
    f7df6000 f7df6d00 pciide pciide.sys Fri Aug 17 15:51:49 2001 (3B7D83E5)
    f7e85000 f7e85b80 Null Null.SYS Fri Aug 17 15:47:39 2001 (3B7D82EB)
    f7ec1000 f7ec1b80 msmpu401 msmpu401.sys Fri Aug 17 15:59:59 2001 (3B7D85CF)
    f7ec2000 f7ec2c00 audstub audstub.sys Fri Aug 17 15:59:40 2001 (3B7D85BC)
    f7ee7000 f7ee7f00 swenum swenum.sys Fri Aug 17 15:48:47 2001 (3B7D832F)

    Unloaded modules:
    f7bc6000 f7bcb000 Cdaudio.SYS
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    f6f94000 f6f97000 Sfloppy.SYS
    Timestamp: unavailable (00000000)
    Checksum: 00000000
     

  3. to hide this advert.

  4. 2005/05/13
    Arie

    Arie Administrator Administrator Staff

    Joined:
    2001/12/27
    Messages:
    15,174
    Likes Received:
    412
    Probably the best thing to do is to go to Microsoft Support Services, and select an option to "open" a support request.

    You can use the log file (debuglog.txt) generated to supply the needed information to start your support request.

    Our "resident" debug troubleshooter will be unavailable for a while.
     
    Arie,
    #3
  5. 2005/07/15
    cpc2004

    cpc2004 Inactive

    Joined:
    2005/07/08
    Messages:
    366
    Likes Received:
    0
    Your problem is hardware problem. I've resolve one case at another problem and the stack trace has the footprint of nt!KiWaitTest. The culprit of that problem is faulty CPU

    STACK_TEXT:
    f771cba4 804fd326 81e9c2c0 81e9c2c8 00000100 nt!KiUnlinkThread+0x7
    f771cbb8 804fd50a 00000000 f771cbd4 00000000 nt!KiUnwaitThread+0x10
    f771cbe4 804f5a1e 81e72820 81e9c1a0 81e9c2d4 nt!KiWaitTest+0xac <---
    f771cbf4 8052f677 81e9c2c0 00000000 00000000 nt!KeSetEvent+0x58
    f771cc24 8050c3b2 ffb14ca0 00000000 00000000 nt!CcPfLogPageFault+0x153
    f771cc54 8050d19e 00000000 75970000 c01d65c0 nt!MiCompleteProtoPteFault+0x24e
    f771cc7c 8050d2db 00000000 75970000 c01d65c0 nt!MiResolveProtoPteFault+0x140
    f771ccf8 8051599e 00000000 75970000 c01d65c0 nt!MiDispatchFault+0xdb
    f771cd4c 80534584 00000000 75970000 00000001 nt!MmAccessFault+0xce0
    f771cd4c 77f7e31f 00000000 75970000 00000001 nt!KiTrap0E+0xbc
     
Thread Status:
Not open for further replies.

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.