Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: fffff2800cc0c1f8, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000000, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff80002e7e861, address which referenced memory
- Debugging Details:
- ------------------
- READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030ae100
- GetUlongFromAddress: unable to read from fffff800030ae1c0
- fffff2800cc0c1f8 Nonpaged pool
- CURRENT_IRQL: 2
- FAULTING_IP:
- nt!KiTimerWaitTest+171
- fffff800`02e7e861 488b6d00 mov rbp,qword ptr [rbp]
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
- BUGCHECK_STR: 0xA
- PROCESS_NAME: System
- ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
- DPC_STACK_BASE: FFFFF80000BA2FB0
- TRAP_FRAME: fffff80000b9c290 -- (.trap 0xfffff80000b9c290)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000000
- rdx=fffffa800cc0c120 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff80002e7e861 rsp=fffff80000b9c420 rbp=fffff2800cc0c1f8
- r8=fffff88000e5bc01 r9=00000000000000ca r10=fffff80002ff1e80
- r11=fffff88001786930 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz na pe cy
- nt!KiTimerWaitTest+0x171:
- fffff800`02e7e861 488b6d00 mov rbp,qword ptr [rbp] ss:0018:fffff280`0cc0c1f8=????????????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff80002e76169 to fffff80002e76bc0
- STACK_TEXT:
- fffff800`00b9c148 fffff800`02e76169 : 00000000`0000000a fffff280`0cc0c1f8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
- fffff800`00b9c150 fffff800`02e74de0 : 00000000`0000002a fffff800`02f303f9 fffff800`00b90001 fffffa80`0cc0c128 : nt!KiBugCheckDispatch+0x69
- fffff800`00b9c290 fffff800`02e7e861 : ffffffff`ffb3b4c0 fffff800`02e8185c 00000000`00000000 fffffa80`00000000 : nt!KiPageFault+0x260
- fffff800`00b9c420 fffff800`02e8169d : fffffa80`0cc0c120 fffffa80`0f430c58 fffffa80`0f430c58 00000000`00000000 : nt!KiTimerWaitTest+0x171
- fffff800`00b9c4a0 fffff800`02e815de : 00000060`839e3c17 fffff800`00b9cb18 00000000`00288baa fffff800`02ff57c8 : nt!KiProcessExpiredTimerList+0x6d
- fffff800`00b9caf0 fffff800`02e813c7 : 00000025`b3846ac7 00000025`00288baa 00000025`b3846a10 00000000`000000aa : nt!KiTimerExpiration+0x1be
- fffff800`00b9cb90 fffff800`02e6e8ca : fffff800`02ff1e80 fffff800`02fffcc0 00000000`00000001 fffff880`00000000 : nt!KiRetireDpcList+0x277
- fffff800`00b9cc40 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cc00 00000000`00000000 : nt!KiIdleLoop+0x5a
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- nt!KiTimerWaitTest+171
- fffff800`02e7e861 488b6d00 mov rbp,qword ptr [rbp]
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: nt!KiTimerWaitTest+171
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 531590fb
- IMAGE_VERSION: 6.1.7601.18409
- FAILURE_BUCKET_ID: X64_0xA_nt!KiTimerWaitTest+171
- BUCKET_ID: X64_0xA_nt!KiTimerWaitTest+171
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:x64_0xa_nt!kitimerwaittest+171
- FAILURE_ID_HASH: {559ce40c-5397-a3bb-41ed-4d8f46391f94}
- Followup: MachineOwner
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: ffffba8010055ef0, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000001, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff80002ee7740, address which referenced memory
- Debugging Details:
- ------------------
- WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003114100
- GetUlongFromAddress: unable to read from fffff800031141c0
- ffffba8010055ef0 Nonpaged pool
- CURRENT_IRQL: 2
- FAULTING_IP:
- nt!KiProcessExpiredTimerList+110
- fffff800`02ee7740 f00fba2f07 lock bts dword ptr [rdi],7
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
- BUGCHECK_STR: 0xA
- PROCESS_NAME: System
- ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
- DPC_STACK_BASE: FFFFF80004405FB0
- TRAP_FRAME: fffff800043ff310 -- (.trap 0xfffff800043ff310)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000002 rbx=0000000000000000 rcx=fffffa8010068fe8
- rdx=fffff880009b7700 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff80002ee7740 rsp=fffff800043ff4a0 rbp=fffffa800d60c820
- r8=fffffa800f67a100 r9=0000000000000008 r10=fffff80002e67000
- r11=fffff800043ff470 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz ac po cy
- nt!KiProcessExpiredTimerList+0x110:
- fffff800`02ee7740 f00fba2f07 lock bts dword ptr [rdi],7 ds:00000000`00000000=????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff80002edc169 to fffff80002edcbc0
- STACK_TEXT:
- fffff800`043ff1c8 fffff800`02edc169 : 00000000`0000000a ffffba80`10055ef0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
- fffff800`043ff1d0 fffff800`02edade0 : fffffa80`0dd84830 00000007`00000007 00000000`00000007 fffffa80`0d60c8e0 : nt!KiBugCheckDispatch+0x69
- fffff800`043ff310 fffff800`02ee7740 : fffffa80`0f5305e0 fffffa80`0f67a168 fffffa80`0f67a168 fffffa80`0e921100 : nt!KiPageFault+0x260
- fffff800`043ff4a0 fffff800`02ee75de : 0000003a`7673287a fffff800`043ffb18 00000000`00188f67 fffff800`0305af68 : nt!KiProcessExpiredTimerList+0x110
- fffff800`043ffaf0 fffff800`02ee73c7 : 00000016`d66055c8 00000016`00188f67 00000016`d66055eb 00000000`00000067 : nt!KiTimerExpiration+0x1be
- fffff800`043ffb90 fffff800`02ed48ca : fffff800`03057e80 fffff800`03065cc0 00000000`00000001 fffff880`00000000 : nt!KiRetireDpcList+0x277
- fffff800`043ffc40 00000000`00000000 : fffff800`04400000 fffff800`043fa000 fffff800`043ffc00 00000000`00000000 : nt!KiIdleLoop+0x5a
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- nt!KiProcessExpiredTimerList+110
- fffff800`02ee7740 f00fba2f07 lock bts dword ptr [rdi],7
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: nt!KiProcessExpiredTimerList+110
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 531590fb
- IMAGE_VERSION: 6.1.7601.18409
- FAILURE_BUCKET_ID: X64_0xA_nt!KiProcessExpiredTimerList+110
- BUCKET_ID: X64_0xA_nt!KiProcessExpiredTimerList+110
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:x64_0xa_nt!kiprocessexpiredtimerlist+110
- FAILURE_ID_HASH: {c837adc2-adbc-6828-b546-67e7df3478b1}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment