Advertisement
Guest User

Untitled

a guest
Jan 27th, 2015
210
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.24 KB | None | 0 0
  1. Instant Online Crash Analysis, brought to you by OSR Open Systems Resources, Inc.
  2.  
  3. Show DivPrimary Analysis
  4.  
  5. Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
  6. Online Crash Dump Analysis Service
  7. See http://www.osronline.com for more information
  8. Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
  9. Product: WinNt, suite: TerminalServer SingleUserTS
  10. Built by: 7601.18409.amd64fre.win7sp1_gdr.140303-2144
  11. Machine Name:
  12. Kernel base = 0xfffff800`03454000 PsLoadedModuleList = 0xfffff800`03697890
  13. Debug session time: Tue Jan 27 17:52:53.817 2015 (UTC - 5:00)
  14. System Uptime: 1 days 11:38:44.122
  15. *******************************************************************************
  16. * *
  17. * Bugcheck Analysis *
  18. * *
  19. *******************************************************************************
  20.  
  21. DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
  22. An attempt was made to access a pageable (or completely invalid) address at an
  23. interrupt request level (IRQL) that is too high. This is usually
  24. caused by drivers using improper addresses.
  25. If kernel debugger is available get stack backtrace.
  26. Arguments:
  27. Arg1: 0000000000000010, memory referenced
  28. Arg2: 0000000000000002, IRQL
  29. Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
  30. Arg4: fffff880014ab566, address which referenced memory
  31.  
  32. Debugging Details:
  33. ------------------
  34.  
  35. TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
  36.  
  37. READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003701100
  38. GetUlongFromAddress: unable to read from fffff800037011c0
  39. 0000000000000010 Nonpaged pool
  40.  
  41. CURRENT_IRQL: 2
  42.  
  43. FAULTING_IP:
  44. ndis!NdisFreeTimerObject+16
  45. fffff880`014ab566 488b5310 mov rdx,qword ptr [rbx+10h]
  46.  
  47. CUSTOMER_CRASH_COUNT: 1
  48.  
  49. DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
  50.  
  51. BUGCHECK_STR: 0xD1
  52.  
  53. PROCESS_NAME: System
  54.  
  55. TRAP_FRAME: fffff8800318c770 -- (.trap 0xfffff8800318c770)
  56. NOTE: The trap frame does not contain all registers.
  57. Some register values may be zeroed or incorrect.
  58. rax=0000000000000000 rbx=0000000000000000 rcx=fffff880014e1ac8
  59. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
  60. rip=fffff880014ab566 rsp=fffff8800318c900 rbp=fffff8000366f280
  61. r8=0000000000011120 r9=0000000000000000 r10=fffff80003454000
  62. r11=fffffa800e563b60 r12=0000000000000000 r13=0000000000000000
  63. r14=0000000000000000 r15=0000000000000000
  64. iopl=0 nv up ei ng nz na pe nc
  65. ndis!NdisFreeTimerObject+0x16:
  66. fffff880`014ab566 488b5310 mov rdx,qword ptr [rbx+10h] ds:00000000`00000010=????????????????
  67. Resetting default scope
  68.  
  69. LAST_CONTROL_TRANSFER: from fffff800034c9169 to fffff800034c9bc0
  70.  
  71. STACK_TEXT:
  72. fffff880`0318c628 fffff800`034c9169 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
  73. fffff880`0318c630 fffff800`034c7de0 : fffffa80`09786b50 fffffa80`09786b50 fffffa80`0d546000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
  74. fffff880`0318c770 fffff880`014ab566 : fffffa80`09786b50 00000000`000007ff fffffa80`0e563ea8 00000000`00000000 : nt!KiPageFault+0x260
  75. fffff880`0318c900 fffff880`072e7677 : fffffa80`0e563ea8 fffff880`072e034f fffff880`073ce588 fffff880`073ce578 : ndis!NdisFreeTimerObject+0x16
  76. fffff880`0318c930 fffffa80`0e563ea8 : fffff880`072e034f fffff880`073ce588 fffff880`073ce578 00000000`00011120 : athrx+0x47677
  77. fffff880`0318c938 fffff880`072e034f : fffff880`073ce588 fffff880`073ce578 00000000`00011120 fffff880`072ccb83 : 0xfffffa80`0e563ea8
  78. fffff880`0318c940 fffff880`073ce588 : fffff880`073ce578 00000000`00011120 fffff880`072ccb83 fffffa80`0e563dd8 : athrx+0x4034f
  79. fffff880`0318c948 fffff880`073ce578 : 00000000`00011120 fffff880`072ccb83 fffffa80`0e563dd8 fffffa80`0fb90000 : athrx+0x12e588
  80. fffff880`0318c950 00000000`00011120 : fffff880`072ccb83 fffffa80`0e563dd8 fffffa80`0fb90000 fffffa80`0fb98050 : athrx+0x12e578
  81. fffff880`0318c958 fffff880`072ccb83 : fffffa80`0e563dd8 fffffa80`0fb90000 fffffa80`0fb98050 fffff880`072cfd88 : 0x11120
  82. fffff880`0318c960 fffffa80`0e563dd8 : fffffa80`0fb90000 fffffa80`0fb98050 fffff880`072cfd88 fffffa80`0fb90030 : athrx+0x2cb83
  83. fffff880`0318c968 fffffa80`0fb90000 : fffffa80`0fb98050 fffff880`072cfd88 fffffa80`0fb90030 fffff880`072cf5e9 : 0xfffffa80`0e563dd8
  84. fffff880`0318c970 fffffa80`0fb98050 : fffff880`072cfd88 fffffa80`0fb90030 fffff880`072cf5e9 fffffa80`0e563b60 : 0xfffffa80`0fb90000
  85. fffff880`0318c978 fffff880`072cfd88 : fffffa80`0fb90030 fffff880`072cf5e9 fffffa80`0e563b60 00000000`00000000 : 0xfffffa80`0fb98050
  86. fffff880`0318c980 fffffa80`0fb90030 : fffff880`072cf5e9 fffffa80`0e563b60 00000000`00000000 00000000`00000000 : athrx+0x2fd88
  87. fffff880`0318c988 fffff880`072cf5e9 : fffffa80`0e563b60 00000000`00000000 00000000`00000000 fffffa80`0e563b30 : 0xfffffa80`0fb90030
  88. fffff880`0318c990 fffffa80`0e563b60 : 00000000`00000000 00000000`00000000 fffffa80`0e563b30 fffffa80`0c8be300 : athrx+0x2f5e9
  89. fffff880`0318c998 00000000`00000000 : 00000000`00000000 fffffa80`0e563b30 fffffa80`0c8be300 fffff880`072cf589 : 0xfffffa80`0e563b60
  90.  
  91.  
  92. STACK_COMMAND: kb
  93.  
  94. FOLLOWUP_IP:
  95. athrx+47677
  96. fffff880`072e7677 ?? ???
  97.  
  98. SYMBOL_STACK_INDEX: 4
  99.  
  100. SYMBOL_NAME: athrx+47677
  101.  
  102. FOLLOWUP_NAME: MachineOwner
  103.  
  104. MODULE_NAME: athrx
  105.  
  106. IMAGE_NAME: athrx.sys
  107.  
  108. DEBUG_FLR_IMAGE_TIMESTAMP: 4a2ea4b9
  109.  
  110. FAILURE_BUCKET_ID: X64_0xD1_athrx+47677
  111.  
  112. BUCKET_ID: X64_0xD1_athrx+47677
  113.  
  114. Followup: MachineOwner
  115. ---------
  116.  
  117.  
  118. This free analysis is provided by OSR Open Systems Resources, Inc.
  119. Want a deeper understanding of crash dump analysis? Check out our Windows Kernel Debugging and Crash Dump Analysis Seminar (opens in new tab/window)
  120. Hide DivCrash Code Links
  121.  
  122. View the MSDN page for DRIVER_IRQL_NOT_LESS_OR_EQUAL
  123. Search Google for DRIVER_IRQL_NOT_LESS_OR_EQUAL
  124.  
  125. Hide DivInformation About Address 0x10
  126.  
  127. Address appears to be NULL!
  128. The specified bad address is zero plus a small amount. This is usually a NULL pointer deref (i.e. NULL+offset)
  129.  
  130. Supplied dump is a mini-dump. Memory analysis commands unavailable.
  131.  
  132. Show DivLoaded Module List
  133.  
  134. Show DivRaw Stack Contents
  135.  
  136. Show DivDump Header Information
  137.  
  138. Show DivStrings
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement