Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 6.2.8400.0 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\Minidump\042614-6864-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
- Executable search path is:
- Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
- Machine Name:
- Kernel base = 0xfffff800`0344a000 PsLoadedModuleList = 0xfffff800`0368d6d0
- Debug session time: Sat Apr 26 15:43:03.173 2014 (UTC + 2:00)
- System Uptime: 0 days 0:10:36.000
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ...........................
- Loading User Symbols
- Loading unloaded module list
- ......
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck A, {520000000028, 2, 1, fffff800034c438b}
- Probably caused by : ntkrnlmp.exe ( nt!KeSetEvent+249 )
- Followup: MachineOwner
- ---------
- 1: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: 0000520000000028, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000001, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff800034c438b, address which referenced memory
- Debugging Details:
- ------------------
- WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800036f7100
- GetUlongFromAddress: unable to read from fffff800036f71c0
- 0000520000000028 Nonpaged pool
- CURRENT_IRQL: 2
- FAULTING_IP:
- nt!KeSetEvent+249
- fffff800`034c438b f083402801 lock add dword ptr [rax+28h],1
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
- BUGCHECK_STR: 0xA
- PROCESS_NAME: SearchIndexer.
- TRAP_FRAME: fffff880061e6880 -- (.trap 0xfffff880061e6880)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000520000000000 rbx=0000000000000000 rcx=fffffa8007462598
- rdx=fffffa80073f9b50 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff800034c438b rsp=fffff880061e6a10 rbp=0000000000000000
- r8=0000000000000001 r9=0000000000000001 r10=fffffa800a469ea0
- r11=00000000001f0003 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na po nc
- nt!KeSetEvent+0x249:
- fffff800`034c438b f083402801 lock add dword ptr [rax+28h],1 ds:00005200`00000028=????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff800034bf169 to fffff800034bfbc0
- STACK_TEXT:
- fffff880`061e6738 fffff800`034bf169 : 00000000`0000000a 00005200`00000028 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
- fffff880`061e6740 fffff800`034bdde0 : fffff880`02f00180 fffffa80`0a95f600 fffffa80`07494420 fffffa80`07462590 : nt!KiBugCheckDispatch+0x69
- fffff880`061e6880 fffff800`034c438b : fffffa80`0a95f640 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
- fffff880`061e6a10 fffff800`037a7e44 : fffff880`00000000 fffff800`00000001 fffffa80`067a7600 fffffa80`073f9b50 : nt!KeSetEvent+0x249
- fffff880`061e6a80 fffff800`034bee53 : fffffa80`0a95f640 00000000`00000000 fffff880`00000000 fffffa80`07462590 : nt!NtSetEvent+0x90
- fffff880`061e6ae0 00000000`76d1139a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000000`06d4d628 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76d1139a
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- nt!KeSetEvent+249
- fffff800`034c438b f083402801 lock add dword ptr [rax+28h],1
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: nt!KeSetEvent+249
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 521ea035
- FAILURE_BUCKET_ID: X64_0xA_nt!KeSetEvent+249
- BUCKET_ID: X64_0xA_nt!KeSetEvent+249
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement