Advertisement
Guest User

First BSOD dump

a guest
Jul 25th, 2012
48
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.33 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 6.2.8400.0 X86
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\WINDOWS\Minidump\Mini071612-01.dmp]
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8.  
  9. Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
  10. Executable search path is:
  11. Windows XP Kernel Version 2600 (Service Pack 2) MP (2 procs) Free x86 compatible
  12. Product: WinNt, suite: TerminalServer SingleUserTS
  13. Built by: 2600.xpsp_sp2_gdr.100216-1441
  14. Machine Name:
  15. Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700
  16. Debug session time: Mon Jul 16 03:14:11.687 2012 (UTC + 2:00)
  17. System Uptime: 0 days 3:45:09.416
  18. Loading Kernel Symbols
  19. ...............................................................
  20. ................................................................
  21. ........
  22. Loading User Symbols
  23. Loading unloaded module list
  24. ..........
  25. *******************************************************************************
  26. * *
  27. * Bugcheck Analysis *
  28. * *
  29. *******************************************************************************
  30.  
  31. Use !analyze -v to get detailed debugging information.
  32.  
  33. BugCheck 100000D1, {2, 9, 0, 8a59b000}
  34.  
  35. Probably caused by : ntkrpamp.exe ( nt!KiIdleLoop+10 )
  36.  
  37. Followup: MachineOwner
  38. ---------
  39.  
  40. 1: kd> !analyze -v
  41. *******************************************************************************
  42. * *
  43. * Bugcheck Analysis *
  44. * *
  45. *******************************************************************************
  46.  
  47. DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
  48. An attempt was made to access a pageable (or completely invalid) address at an
  49. interrupt request level (IRQL) that is too high. This is usually
  50. caused by drivers using improper addresses.
  51. If kernel debugger is available get stack backtrace.
  52. Arguments:
  53. Arg1: 00000002, memory referenced
  54. Arg2: 00000009, IRQL
  55. Arg3: 00000000, value 0 = read operation, 1 = write operation
  56. Arg4: 8a59b000, address which referenced memory
  57.  
  58. Debugging Details:
  59. ------------------
  60.  
  61.  
  62. READ_ADDRESS: GetUlongFromAddress: unable to read from 80560f30
  63. 00000002
  64.  
  65. CURRENT_IRQL: 9
  66.  
  67. FAULTING_IP:
  68. +0
  69. 8a59b000 0203 add al,byte ptr [ebx]
  70.  
  71. CUSTOMER_CRASH_COUNT: 1
  72.  
  73. DEFAULT_BUCKET_ID: DRIVER_FAULT
  74.  
  75. BUGCHECK_STR: 0xD1
  76.  
  77. PROCESS_NAME: Idle
  78.  
  79. LAST_CONTROL_TRANSFER: from 80544fdc to 8a59b000
  80.  
  81. STACK_TEXT:
  82. WARNING: Frame IP not in any known module. Following frames may be wrong.
  83. b84d3d50 80544fdc 00000000 0000000e 00000000 0x8a59b000
  84. b84d3d54 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x10
  85.  
  86.  
  87. STACK_COMMAND: kb
  88.  
  89. FOLLOWUP_IP:
  90. nt!KiIdleLoop+10
  91. 80544fdc f390 pause
  92.  
  93. SYMBOL_STACK_INDEX: 1
  94.  
  95. SYMBOL_NAME: nt!KiIdleLoop+10
  96.  
  97. FOLLOWUP_NAME: MachineOwner
  98.  
  99. MODULE_NAME: nt
  100.  
  101. IMAGE_NAME: ntkrpamp.exe
  102.  
  103. DEBUG_FLR_IMAGE_TIMESTAMP: 4b7a91dc
  104.  
  105. FAILURE_BUCKET_ID: 0xD1_nt!KiIdleLoop+10
  106.  
  107. BUCKET_ID: 0xD1_nt!KiIdleLoop+10
  108.  
  109. Followup: MachineOwner
  110. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement