New
#1
Stop error 3B or 1E crashdump help needed
Hi All,
I am experiencing numerous error's with my system, wich mostly results in a Stop 3B error and sometimes a 1E error.
System:
Asus P5QL pro
Intel Core 2 quad 8200
4 x 1 Gb RAM, A-data
400 W PSU
ATI HD 4650 graphics
1x 250 GB SATA, 2 x 2 TB SATA, all WD
1x TerraTec Cinergy C HD
1x TechniSat Cablestar 2 HD
1x Realtek NIC 1gbps
running Windows 7 Home Premium OEM x64 (installed again yesterday)
Hardware replaced so far/tested, but still getting the error's:
-Asus replaced with MSI P31 Neo V2
-400 W PSU is replacing a standard 300 W one
-Ech memory unit installed seperately and tested with Memtest86 (at least 6 passes per unit), no errors
-CPU tested with Prime95, no errors
The CrashDump file is about 300 MB, i analysed it, but i am unsure what the result's mean. If anybody can help me out?
This is the most recent crashdump (stop 1e)
And the 3b crashdump:Code:Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [G:\MEMORY.DMP] Kernel Summary Dump File: Only kernel address space is available Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850 Machine Name: Kernel base = 0xfffff800`02a1d000 PsLoadedModuleList = 0xfffff800`02c62e90 Debug session time: Sun Mar 20 18:38:10.978 2011 (UTC + 1:00) System Uptime: 0 days 0:02:14.804 Loading Kernel Symbols ............................................................... ................................................................ ...................... Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1E, {0, 0, 0, 0} Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: 0000000000000000, The exception code that was not handled Arg2: 0000000000000000, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: 0000000000000000, Parameter 1 of the exception Debugging Details: ------------------ EXCEPTION_CODE: (Win32) 0 (0) - De bewerking is voltooid. FAULTING_IP: +6137343861376362 00000000`00000000 ?? ??? EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: 0000000000000000 ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0 BUGCHECK_STR: 0x1E_0 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 2 EXCEPTION_RECORD: fffff88002f8b288 -- (.exr 0xfffff88002f8b288) ExceptionAddress: fffff80002aac9c9 (nt!KiTryUnwaitThread+0x0000000000000159) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff TRAP_FRAME: fffff88002f8b330 -- (.trap 0xfffff88002f8b330) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001 rdx=fffffa800859dcc8 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002aac9c9 rsp=fffff88002f8b4c0 rbp=fffff88002f63180 r8=0000000000000002 r9=0000000000000000 r10=00000000000000c1 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc nt!KiTryUnwaitThread+0x159: fffff800`02aac9c9 f0480fbaaf9044000000 lock bts qword ptr [rdi+4490h],0 ds:0950:4490=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002a94ffe to fffff80002a9d610 STACK_TEXT: fffff880`02f8a368 fffff800`02a94ffe : 00000000`00000000 ffff0000`037abefa fffff880`02f8aae0 fffff800`02ac92a0 : nt!KeBugCheck fffff880`02f8a370 fffff800`02ac8f6d : fffff800`02ca4a10 fffff800`02be0c78 fffff800`02a1d000 fffff880`02f8b288 : nt!KiKernelCalloutExceptionHandler+0xe fffff880`02f8a3a0 fffff800`02ac7d45 : fffff800`02be40fc fffff880`02f8a418 fffff880`02f8b288 fffff800`02a1d000 : nt!RtlpExecuteHandlerForException+0xd fffff880`02f8a3d0 fffff800`02ad8dc1 : fffff880`02f8b288 fffff880`02f8aae0 fffff880`00000000 effff880`009ea180 : nt!RtlDispatchException+0x415 fffff880`02f8aab0 fffff800`02a9ccc2 : fffff880`02f8b288 fffffa80`0859db60 fffff880`02f8b330 fffffa80`0859dcc8 : nt!KiDispatchException+0x135 fffff880`02f8b150 fffff800`02a9b5ca : fffffa80`078e2a60 fffff880`04805f99 fffffa80`06d30480 fffff800`02b47164 : nt!KiExceptionDispatch+0xc2 fffff880`02f8b330 fffff800`02aac9c9 : 00000000`00000000 00000000`000007ff fffffa80`078e2c08 fffffa80`07a1eca0 : nt!KiGeneralProtectionFault+0x10a fffff880`02f8b4c0 fffff800`02aa61d1 : fffffa80`078885a8 fffffa80`078885a8 00000000`00000000 fffffa80`078885a0 : nt!KiTryUnwaitThread+0x159 fffff880`02f8b520 fffff800`02aa8ead : fffffa80`078885a0 fffffa80`076c69a8 fffffa80`076c69a8 00000000`00000102 : nt!KiTimerWaitTest+0x2d1 fffff880`02f8b5a0 fffff800`02aa8dee : 00000000`50598641 fffff880`02f8bc18 00000000`000021c1 fffff880`02f66da8 : nt!KiProcessExpiredTimerList+0x6d fffff880`02f8bbf0 fffff800`02aa8bd7 : 00000000`1255d6c2 00000000`000021c1 00000000`1255d634 00000000`000000c0 : nt!KiTimerExpiration+0x1be fffff880`02f8bc90 fffff800`02a9536a : fffff880`02f63180 fffff880`02f6dfc0 00000000`00000001 fffff800`00000000 : nt!KiRetireDpcList+0x277 fffff880`02f8bd40 00000000`00000000 : fffff880`02f8c000 fffff880`02f86000 fffff880`02f8bd00 00000000`00000000 : nt!KiIdleLoop+0x5a STACK_COMMAND: kb FOLLOWUP_IP: nt!KiKernelCalloutExceptionHandler+e fffff800`02a94ffe 90 nop SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!KiKernelCalloutExceptionHandler+e FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a FAILURE_BUCKET_ID: X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e BUCKET_ID: X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e Followup: MachineOwner ---------
Code:Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [E:\MEMORY 3b.DMP] Kernel Summary Dump File: Only kernel address space is available Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850 Machine Name: Kernel base = 0xfffff800`02a14000 PsLoadedModuleList = 0xfffff800`02c59e90 Debug session time: Mon Mar 21 19:32:33.035 2011 (UTC + 1:00) System Uptime: 0 days 0:00:39.861 Loading Kernel Symbols ............................................................... ................................................................ ............ Loading User Symbols PEB is paged out (Peb.Ldr = 000007ff`fffdf018). Type ".hh dbgerr001" for details Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff80002a8a73e, fffff8800277c0d0, 0} Probably caused by : ntkrnlmp.exe ( nt!KiInsertQueue+fe ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80002a8a73e, Address of the instruction which caused the bugcheck Arg3: fffff8800277c0d0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - De instructie op 0x%08lx verwijst naar geheugen op 0x%08lx. Een lees- of schrijfbewerking op het geheugen is mislukt: %s. FAULTING_IP: nt!KiInsertQueue+fe fffff800`02a8a73e f0480fbaae9044000000 lock bts qword ptr [rsi+4490h],0 CONTEXT: fffff8800277c0d0 -- (.cxr 0xfffff8800277c0d0) rax=fffffa8007a7bab0 rbx=fffffa8007a7bab0 rcx=0000000000000001 rdx=fffffa80080fd950 rsi=effff88002fd3180 rdi=fffffa800810db60 rip=fffff80002a8a73e rsp=fffff8800277cab0 rbp=0000000000000000 r8=0000000000000000 r9=0000000000000000 r10=fffffa8003a39f30 r11=00000000000f00ff r12=fffff88002f63180 r13=fffffa8007a7bab8 r14=fffffa800810dc68 r15=fffffa800810d768 iopl=0 nv up ei ng nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282 nt!KiInsertQueue+0xfe: fffff800`02a8a73e f0480fbaae9044000000 lock bts qword ptr [rsi+4490h],0 ds:002b:effff880`02fd7610=???????????????? Resetting default scope DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from fffff80002d7ce64 to fffff80002a8a73e STACK_TEXT: fffff880`0277cab0 fffff800`02d7ce64 : 00000000`00000000 fffffa80`080fd950 00000000`01bf1b00 fffff880`00000000 : nt!KiInsertQueue+0xfe fffff880`0277cb30 fffff800`02a80c42 : 00000000`00000000 00000000`00000001 fffffa80`07af0bd0 fffffa80`07af0bd0 : nt!IoSetIoCompletionEx+0x58 fffff880`0277cb60 fffff800`02a938d3 : fffffa80`0811b660 fffffa80`07af0bd0 fffff880`0277cc60 00000000`01bf1b00 : nt!NtReleaseWorkerFactoryWorker+0x196 fffff880`0277cbe0 00000000`77cc26ca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0187f248 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77cc26ca FOLLOWUP_IP: nt!KiInsertQueue+fe fffff800`02a8a73e f0480fbaae9044000000 lock bts qword ptr [rsi+4490h],0 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!KiInsertQueue+fe FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a STACK_COMMAND: .cxr 0xfffff8800277c0d0 ; kb FAILURE_BUCKET_ID: X64_0x3B_nt!KiInsertQueue+fe BUCKET_ID: X64_0x3B_nt!KiInsertQueue+fe Followup: MachineOwner ---------
Thanx for any help in advance!
WBMK
Last edited by wbmk; 21 Mar 2011 at 14:26. Reason: Attached crashreport and 3b crashdump