Jump to content

tranced

LinkManiac
  • Posts

    746
  • Joined

  • Last visited

Posts posted by tranced

  1. Anual, accidentele care implica avioane reprezinta doar 2% din numarul total de accidente pentrecute anual, asta ma aduce la replica lui Sensini, ca avionul este cel mai sigur. Motocicleta este cel mai nesigur, cu 49% din accidente.

    asta pentru ca accidentele de genul asta cu victime sunt foarte putine raportat la nr. total de pasageri transportati , oricum statistica e doar un punct de vedere

    @on topic : interesant ca majoritatea incidentelor au legaturi cu tari africane

  2. TyreXelu Dark Lord 288(58) 732982874 32750 13500 32750 32000

    unde il vedeti voi full ?la fel si sadi,bai oameni bun cand oti fi voi full 32767 la toate...atunci sa vorbiti ca pe 97D asa era,si nu veniti cu replici ''esti invidios etc..'' ma doare fix in pix ca ai atatea rr..asta e adevarul :readthis:

    am 20k+ pe liber si toata lumea stie ca nu merge firescream peste 14k agil deci nu are rost sa bag

    comentariul tau chiar nu isi avea rostul

    @ot multumesc mult

  3. Microsoft ® Windows Debugger Version 6.11.0001.404 X86

    Copyright © Microsoft Corporation. All rights reserved.

    Loading Dump File [C:\Documents and Settings\Alex\Desktop\Mini123009-01.dmp]

    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: C:\WINDOWS\Symbols

    Executable search path is:

    Unable to load image ntoskrnl.exe, Win32 error 0n2

    *** WARNING: Unable to verify timestamp for ntoskrnl.exe

    Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible

    Product: WinNt, suite: TerminalServer SingleUserTS

    Machine Name:

    Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055a7a0

    Debug session time: Wed Dec 30 23:33:30.109 2009 (GMT+2)

    System Uptime: 0 days 1:54:08.686

    Unable to load image ntoskrnl.exe, Win32 error 0n2

    *** WARNING: Unable to verify timestamp for ntoskrnl.exe

    Loading Kernel Symbols

    ...............................................................

    ...........................................................

    Loading User Symbols

    Loading unloaded module list

    ............

    *******************************************************************************

    * *

    * Bugcheck Analysis *

    * *

    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 1000000A, {0, 2, 1, 8051cead}

    *** WARNING: Unable to verify timestamp for WMDrive.sys

    *** ERROR: Module load completed but symbols could not be loaded for WMDrive.sys

    Probably caused by : WMDrive.sys ( WMDrive+3aa9 )

    Followup: MachineOwner

    ---------

    kd> !analyze -v

    *******************************************************************************

    * *

    * Bugcheck Analysis *

    * *

    *******************************************************************************

    IRQL_NOT_LESS_OR_EQUAL (a)

    An attempt was made to access a pageable (or completely invalid) address at an

    interrupt request level (IRQL) that is too high. This is usually

    caused by drivers using improper addresses.

    If a kernel debugger is available get the stack backtrace.

    Arguments:

    Arg1: 00000000, memory referenced

    Arg2: 00000002, IRQL

    Arg3: 00000001, bitfield :

    bit 0 : value 0 = read operation, 1 = write operation

    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)

    Arg4: 8051cead, address which referenced memory

    Debugging Details:

    ------------------

    WRITE_ADDRESS: 00000000

    CURRENT_IRQL: 2

    FAULTING_IP:

    nt!KeUnstackDetachProcess+73

    8051cead 8910 mov dword ptr [eax],edx

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: DRIVER_FAULT

    BUGCHECK_STR: 0xA

    LAST_CONTROL_TRANSFER: from 804f12f7 to 8051cead

    STACK_TEXT:

    ed6a9a10 804f12f7 820f24d8 8202c2a0 8202c200 nt!KeUnstackDetachProcess+0x73

    ed6a9a18 8202c2a0 8202c200 820f2624 82249588 nt!IopUpdateReadOperationCount+0x11

    WARNING: Frame IP not in any known module. Following frames may be wrong.

    ed6a9a30 ed5f5aa9 8202c200 ed6a9a50 0035b5c8 0x8202c2a0

    ed6a9a90 ed5f70dd ed6a9ab8 ed6a9af0 ed5f7281 WMDrive+0x3aa9

    ed6a9a9c ed5f7281 ed6a9ab8 0035b5a8 81ff8ac8 WMDrive+0x50dd

    ed6a9af0 ed5f4420 8219f798 82249518 ed6a9b44 WMDrive+0x5281

    ed6a9b00 804e37f7 8219f798 82249518 82249518 WMDrive+0x2420

    ed6a9b08 82249518 82249518 8056aab0 81ff8ab0 nt!IopfCallDriver+0x31

    ed6a9b44 80566c81 81f5e020 8219f798 00100020 0x82249518

    ed6a9b48 81f5e020 8219f798 00100020 81ff8b0c nt!CmpLockRegistry+0x26

    ed6a9b74 80566e2b 81f5e020 81ff8ac8 823b6560 0x81f5e020

    ed6a9b9c 805847cf e166d260 81ff8ac8 00000290 nt!RtlpUnlockAtomTable+0x19

    ed6a9bbc 80584bcf e2dc7520 00000290 ed6a9c0c nt!MiCreateImageFileMap+0x1a6

    ed6a9bec 805844e8 e166d260 805847b0 ed6a9c0c nt!MiCreateImageFileMap+0x914

    ed6a9c18 80584aec 81f5e020 820f24d8 820f2720 nt!NtQueryDirectoryObject+0x3e

    ed6a9cc0 8057b8c6 00000000 820f24d8 00000000 nt!MiCreateImageFileMap+0x6a9

    ed6a9ce0 805849a8 820f24d8 00000000 0000077c nt!NtTerminateThread+0x4c

    ed6a9d0c 81b4c09d 00000000 00000000 ed6a9d64 nt!MiCreateImageFileMap+0x47e

    00000000 00000000 00000000 00000000 00000000 0x81b4c09d

    STACK_COMMAND: kb

    FOLLOWUP_IP:

    WMDrive+3aa9

    ed5f5aa9 ?? ???

    SYMBOL_STACK_INDEX: 3

    SYMBOL_NAME: WMDrive+3aa9

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: WMDrive

    IMAGE_NAME: WMDrive.sys

    DEBUG_FLR_IMAGE_TIMESTAMP: 4b26751b

    FAILURE_BUCKET_ID: 0xA_WMDrive+3aa9

    BUCKET_ID: 0xA_WMDrive+3aa9

    Followup: MachineOwner

    ---------

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...