Advertisement
Guest User

Untitled

a guest
Apr 26th, 2014
12
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.15 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 6.2.8400.0 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\Minidump\042614-6864-01.dmp]
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8.  
  9. Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
  10. Executable search path is:
  11. Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS
  13. Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
  14. Machine Name:
  15. Kernel base = 0xfffff800`0344a000 PsLoadedModuleList = 0xfffff800`0368d6d0
  16. Debug session time: Sat Apr 26 15:43:03.173 2014 (UTC + 2:00)
  17. System Uptime: 0 days 0:10:36.000
  18. Loading Kernel Symbols
  19. ...............................................................
  20. ................................................................
  21. ...........................
  22. Loading User Symbols
  23. Loading unloaded module list
  24. ......
  25. *******************************************************************************
  26. * *
  27. * Bugcheck Analysis *
  28. * *
  29. *******************************************************************************
  30.  
  31. Use !analyze -v to get detailed debugging information.
  32.  
  33. BugCheck A, {520000000028, 2, 1, fffff800034c438b}
  34.  
  35. Probably caused by : ntkrnlmp.exe ( nt!KeSetEvent+249 )
  36.  
  37. Followup: MachineOwner
  38. ---------
  39.  
  40. 1: kd> !analyze -v
  41. *******************************************************************************
  42. * *
  43. * Bugcheck Analysis *
  44. * *
  45. *******************************************************************************
  46.  
  47. IRQL_NOT_LESS_OR_EQUAL (a)
  48. An attempt was made to access a pageable (or completely invalid) address at an
  49. interrupt request level (IRQL) that is too high. This is usually
  50. caused by drivers using improper addresses.
  51. If a kernel debugger is available get the stack backtrace.
  52. Arguments:
  53. Arg1: 0000520000000028, memory referenced
  54. Arg2: 0000000000000002, IRQL
  55. Arg3: 0000000000000001, bitfield :
  56. bit 0 : value 0 = read operation, 1 = write operation
  57. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  58. Arg4: fffff800034c438b, address which referenced memory
  59.  
  60. Debugging Details:
  61. ------------------
  62.  
  63.  
  64. WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800036f7100
  65. GetUlongFromAddress: unable to read from fffff800036f71c0
  66. 0000520000000028 Nonpaged pool
  67.  
  68. CURRENT_IRQL: 2
  69.  
  70. FAULTING_IP:
  71. nt!KeSetEvent+249
  72. fffff800`034c438b f083402801 lock add dword ptr [rax+28h],1
  73.  
  74. CUSTOMER_CRASH_COUNT: 1
  75.  
  76. DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
  77.  
  78. BUGCHECK_STR: 0xA
  79.  
  80. PROCESS_NAME: SearchIndexer.
  81.  
  82. TRAP_FRAME: fffff880061e6880 -- (.trap 0xfffff880061e6880)
  83. NOTE: The trap frame does not contain all registers.
  84. Some register values may be zeroed or incorrect.
  85. rax=0000520000000000 rbx=0000000000000000 rcx=fffffa8007462598
  86. rdx=fffffa80073f9b50 rsi=0000000000000000 rdi=0000000000000000
  87. rip=fffff800034c438b rsp=fffff880061e6a10 rbp=0000000000000000
  88. r8=0000000000000001 r9=0000000000000001 r10=fffffa800a469ea0
  89. r11=00000000001f0003 r12=0000000000000000 r13=0000000000000000
  90. r14=0000000000000000 r15=0000000000000000
  91. iopl=0 nv up ei pl nz na po nc
  92. nt!KeSetEvent+0x249:
  93. fffff800`034c438b f083402801 lock add dword ptr [rax+28h],1 ds:00005200`00000028=????????
  94. Resetting default scope
  95.  
  96. LAST_CONTROL_TRANSFER: from fffff800034bf169 to fffff800034bfbc0
  97.  
  98. STACK_TEXT:
  99. fffff880`061e6738 fffff800`034bf169 : 00000000`0000000a 00005200`00000028 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
  100. fffff880`061e6740 fffff800`034bdde0 : fffff880`02f00180 fffffa80`0a95f600 fffffa80`07494420 fffffa80`07462590 : nt!KiBugCheckDispatch+0x69
  101. fffff880`061e6880 fffff800`034c438b : fffffa80`0a95f640 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
  102. fffff880`061e6a10 fffff800`037a7e44 : fffff880`00000000 fffff800`00000001 fffffa80`067a7600 fffffa80`073f9b50 : nt!KeSetEvent+0x249
  103. fffff880`061e6a80 fffff800`034bee53 : fffffa80`0a95f640 00000000`00000000 fffff880`00000000 fffffa80`07462590 : nt!NtSetEvent+0x90
  104. fffff880`061e6ae0 00000000`76d1139a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  105. 00000000`06d4d628 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76d1139a
  106.  
  107.  
  108. STACK_COMMAND: kb
  109.  
  110. FOLLOWUP_IP:
  111. nt!KeSetEvent+249
  112. fffff800`034c438b f083402801 lock add dword ptr [rax+28h],1
  113.  
  114. SYMBOL_STACK_INDEX: 3
  115.  
  116. SYMBOL_NAME: nt!KeSetEvent+249
  117.  
  118. FOLLOWUP_NAME: MachineOwner
  119.  
  120. MODULE_NAME: nt
  121.  
  122. IMAGE_NAME: ntkrnlmp.exe
  123.  
  124. DEBUG_FLR_IMAGE_TIMESTAMP: 521ea035
  125.  
  126. FAILURE_BUCKET_ID: X64_0xA_nt!KeSetEvent+249
  127.  
  128. BUCKET_ID: X64_0xA_nt!KeSetEvent+249
  129.  
  130. Followup: MachineOwner
  131. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement