Guest User

BSoD Crash Reports

a guest
Nov 9th, 2014
80
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.01 KB | None | 0 0
  1. *******************************************************************************
  2. * *
  3. * Bugcheck Analysis *
  4. * *
  5. *******************************************************************************
  6.  
  7. IRQL_NOT_LESS_OR_EQUAL (a)
  8. An attempt was made to access a pageable (or completely invalid) address at an
  9. interrupt request level (IRQL) that is too high. This is usually
  10. caused by drivers using improper addresses.
  11. If a kernel debugger is available get the stack backtrace.
  12. Arguments:
  13. Arg1: fffff2800cc0c1f8, memory referenced
  14. Arg2: 0000000000000002, IRQL
  15. Arg3: 0000000000000000, bitfield :
  16. bit 0 : value 0 = read operation, 1 = write operation
  17. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  18. Arg4: fffff80002e7e861, address which referenced memory
  19.  
  20. Debugging Details:
  21. ------------------
  22.  
  23.  
  24. READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030ae100
  25. GetUlongFromAddress: unable to read from fffff800030ae1c0
  26. fffff2800cc0c1f8 Nonpaged pool
  27.  
  28. CURRENT_IRQL: 2
  29.  
  30. FAULTING_IP:
  31. nt!KiTimerWaitTest+171
  32. fffff800`02e7e861 488b6d00 mov rbp,qword ptr [rbp]
  33.  
  34. CUSTOMER_CRASH_COUNT: 1
  35.  
  36. DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
  37.  
  38. BUGCHECK_STR: 0xA
  39.  
  40. PROCESS_NAME: System
  41.  
  42. ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
  43.  
  44. DPC_STACK_BASE: FFFFF80000BA2FB0
  45.  
  46. TRAP_FRAME: fffff80000b9c290 -- (.trap 0xfffff80000b9c290)
  47. NOTE: The trap frame does not contain all registers.
  48. Some register values may be zeroed or incorrect.
  49. rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000000
  50. rdx=fffffa800cc0c120 rsi=0000000000000000 rdi=0000000000000000
  51. rip=fffff80002e7e861 rsp=fffff80000b9c420 rbp=fffff2800cc0c1f8
  52. r8=fffff88000e5bc01 r9=00000000000000ca r10=fffff80002ff1e80
  53. r11=fffff88001786930 r12=0000000000000000 r13=0000000000000000
  54. r14=0000000000000000 r15=0000000000000000
  55. iopl=0 nv up ei ng nz na pe cy
  56. nt!KiTimerWaitTest+0x171:
  57. fffff800`02e7e861 488b6d00 mov rbp,qword ptr [rbp] ss:0018:fffff280`0cc0c1f8=????????????????
  58. Resetting default scope
  59.  
  60. LAST_CONTROL_TRANSFER: from fffff80002e76169 to fffff80002e76bc0
  61.  
  62. STACK_TEXT:
  63. fffff800`00b9c148 fffff800`02e76169 : 00000000`0000000a fffff280`0cc0c1f8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
  64. fffff800`00b9c150 fffff800`02e74de0 : 00000000`0000002a fffff800`02f303f9 fffff800`00b90001 fffffa80`0cc0c128 : nt!KiBugCheckDispatch+0x69
  65. fffff800`00b9c290 fffff800`02e7e861 : ffffffff`ffb3b4c0 fffff800`02e8185c 00000000`00000000 fffffa80`00000000 : nt!KiPageFault+0x260
  66. fffff800`00b9c420 fffff800`02e8169d : fffffa80`0cc0c120 fffffa80`0f430c58 fffffa80`0f430c58 00000000`00000000 : nt!KiTimerWaitTest+0x171
  67. fffff800`00b9c4a0 fffff800`02e815de : 00000060`839e3c17 fffff800`00b9cb18 00000000`00288baa fffff800`02ff57c8 : nt!KiProcessExpiredTimerList+0x6d
  68. fffff800`00b9caf0 fffff800`02e813c7 : 00000025`b3846ac7 00000025`00288baa 00000025`b3846a10 00000000`000000aa : nt!KiTimerExpiration+0x1be
  69. fffff800`00b9cb90 fffff800`02e6e8ca : fffff800`02ff1e80 fffff800`02fffcc0 00000000`00000001 fffff880`00000000 : nt!KiRetireDpcList+0x277
  70. fffff800`00b9cc40 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cc00 00000000`00000000 : nt!KiIdleLoop+0x5a
  71.  
  72.  
  73. STACK_COMMAND: kb
  74.  
  75. FOLLOWUP_IP:
  76. nt!KiTimerWaitTest+171
  77. fffff800`02e7e861 488b6d00 mov rbp,qword ptr [rbp]
  78.  
  79. SYMBOL_STACK_INDEX: 3
  80.  
  81. SYMBOL_NAME: nt!KiTimerWaitTest+171
  82.  
  83. FOLLOWUP_NAME: MachineOwner
  84.  
  85. MODULE_NAME: nt
  86.  
  87. IMAGE_NAME: ntkrnlmp.exe
  88.  
  89. DEBUG_FLR_IMAGE_TIMESTAMP: 531590fb
  90.  
  91. IMAGE_VERSION: 6.1.7601.18409
  92.  
  93. FAILURE_BUCKET_ID: X64_0xA_nt!KiTimerWaitTest+171
  94.  
  95. BUCKET_ID: X64_0xA_nt!KiTimerWaitTest+171
  96.  
  97. ANALYSIS_SOURCE: KM
  98.  
  99. FAILURE_ID_HASH_STRING: km:x64_0xa_nt!kitimerwaittest+171
  100.  
  101. FAILURE_ID_HASH: {559ce40c-5397-a3bb-41ed-4d8f46391f94}
  102.  
  103. Followup: MachineOwner
  104.  
  105.  
  106.  
  107. *******************************************************************************
  108. * *
  109. * Bugcheck Analysis *
  110. * *
  111. *******************************************************************************
  112.  
  113. IRQL_NOT_LESS_OR_EQUAL (a)
  114. An attempt was made to access a pageable (or completely invalid) address at an
  115. interrupt request level (IRQL) that is too high. This is usually
  116. caused by drivers using improper addresses.
  117. If a kernel debugger is available get the stack backtrace.
  118. Arguments:
  119. Arg1: ffffba8010055ef0, memory referenced
  120. Arg2: 0000000000000002, IRQL
  121. Arg3: 0000000000000001, bitfield :
  122. bit 0 : value 0 = read operation, 1 = write operation
  123. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  124. Arg4: fffff80002ee7740, address which referenced memory
  125.  
  126. Debugging Details:
  127. ------------------
  128.  
  129.  
  130. WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003114100
  131. GetUlongFromAddress: unable to read from fffff800031141c0
  132. ffffba8010055ef0 Nonpaged pool
  133.  
  134. CURRENT_IRQL: 2
  135.  
  136. FAULTING_IP:
  137. nt!KiProcessExpiredTimerList+110
  138. fffff800`02ee7740 f00fba2f07 lock bts dword ptr [rdi],7
  139.  
  140. CUSTOMER_CRASH_COUNT: 1
  141.  
  142. DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
  143.  
  144. BUGCHECK_STR: 0xA
  145.  
  146. PROCESS_NAME: System
  147.  
  148. ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
  149.  
  150. DPC_STACK_BASE: FFFFF80004405FB0
  151.  
  152. TRAP_FRAME: fffff800043ff310 -- (.trap 0xfffff800043ff310)
  153. NOTE: The trap frame does not contain all registers.
  154. Some register values may be zeroed or incorrect.
  155. rax=0000000000000002 rbx=0000000000000000 rcx=fffffa8010068fe8
  156. rdx=fffff880009b7700 rsi=0000000000000000 rdi=0000000000000000
  157. rip=fffff80002ee7740 rsp=fffff800043ff4a0 rbp=fffffa800d60c820
  158. r8=fffffa800f67a100 r9=0000000000000008 r10=fffff80002e67000
  159. r11=fffff800043ff470 r12=0000000000000000 r13=0000000000000000
  160. r14=0000000000000000 r15=0000000000000000
  161. iopl=0 nv up ei ng nz ac po cy
  162. nt!KiProcessExpiredTimerList+0x110:
  163. fffff800`02ee7740 f00fba2f07 lock bts dword ptr [rdi],7 ds:00000000`00000000=????????
  164. Resetting default scope
  165.  
  166. LAST_CONTROL_TRANSFER: from fffff80002edc169 to fffff80002edcbc0
  167.  
  168. STACK_TEXT:
  169. fffff800`043ff1c8 fffff800`02edc169 : 00000000`0000000a ffffba80`10055ef0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
  170. fffff800`043ff1d0 fffff800`02edade0 : fffffa80`0dd84830 00000007`00000007 00000000`00000007 fffffa80`0d60c8e0 : nt!KiBugCheckDispatch+0x69
  171. fffff800`043ff310 fffff800`02ee7740 : fffffa80`0f5305e0 fffffa80`0f67a168 fffffa80`0f67a168 fffffa80`0e921100 : nt!KiPageFault+0x260
  172. fffff800`043ff4a0 fffff800`02ee75de : 0000003a`7673287a fffff800`043ffb18 00000000`00188f67 fffff800`0305af68 : nt!KiProcessExpiredTimerList+0x110
  173. fffff800`043ffaf0 fffff800`02ee73c7 : 00000016`d66055c8 00000016`00188f67 00000016`d66055eb 00000000`00000067 : nt!KiTimerExpiration+0x1be
  174. fffff800`043ffb90 fffff800`02ed48ca : fffff800`03057e80 fffff800`03065cc0 00000000`00000001 fffff880`00000000 : nt!KiRetireDpcList+0x277
  175. fffff800`043ffc40 00000000`00000000 : fffff800`04400000 fffff800`043fa000 fffff800`043ffc00 00000000`00000000 : nt!KiIdleLoop+0x5a
  176.  
  177.  
  178. STACK_COMMAND: kb
  179.  
  180. FOLLOWUP_IP:
  181. nt!KiProcessExpiredTimerList+110
  182. fffff800`02ee7740 f00fba2f07 lock bts dword ptr [rdi],7
  183.  
  184. SYMBOL_STACK_INDEX: 3
  185.  
  186. SYMBOL_NAME: nt!KiProcessExpiredTimerList+110
  187.  
  188. FOLLOWUP_NAME: MachineOwner
  189.  
  190. MODULE_NAME: nt
  191.  
  192. IMAGE_NAME: ntkrnlmp.exe
  193.  
  194. DEBUG_FLR_IMAGE_TIMESTAMP: 531590fb
  195.  
  196. IMAGE_VERSION: 6.1.7601.18409
  197.  
  198. FAILURE_BUCKET_ID: X64_0xA_nt!KiProcessExpiredTimerList+110
  199.  
  200. BUCKET_ID: X64_0xA_nt!KiProcessExpiredTimerList+110
  201.  
  202. ANALYSIS_SOURCE: KM
  203.  
  204. FAILURE_ID_HASH_STRING: km:x64_0xa_nt!kiprocessexpiredtimerlist+110
  205.  
  206. FAILURE_ID_HASH: {c837adc2-adbc-6828-b546-67e7df3478b1}
  207.  
  208. Followup: MachineOwner
  209. ---------
Advertisement
Add Comment
Please, Sign In to add comment