Advertisement
Sayshal

Untitled

Nov 15th, 2011
114
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.60 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Users\Sayshal\Downloads\111411-20217-01.dmp]
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8.  
  9. Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
  10. Executable search path is:
  11. Windows 7 Kernel Version 7600 MP (8 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS
  13. Built by: 7600.20994.amd64fre.win7_ldr.110622-1505
  14. Machine Name:
  15. Kernel base = 0xfffff800`02c53000 PsLoadedModuleList = 0xfffff800`02e87ed0
  16. Debug session time: Mon Nov 14 17:10:10.496 2011 (UTC - 7:00)
  17. System Uptime: 2 days 16:56:39.403
  18. Loading Kernel Symbols
  19. ...............................................................
  20. ................................................................
  21. ..............
  22. Loading User Symbols
  23. Loading unloaded module list
  24. ......
  25. *******************************************************************************
  26. * *
  27. * Bugcheck Analysis *
  28. * *
  29. *******************************************************************************
  30.  
  31. Use !analyze -v to get detailed debugging information.
  32.  
  33. BugCheck D1, {158, 2, 0, fffff8800167023a}
  34.  
  35. Probably caused by : tcpip.sys ( tcpip!TcpGetIsn+ba )
  36.  
  37. Followup: MachineOwner
  38. ---------
  39.  
  40. 2: kd> !analyze -v
  41. *******************************************************************************
  42. * *
  43. * Bugcheck Analysis *
  44. * *
  45. *******************************************************************************
  46.  
  47. DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
  48. An attempt was made to access a pageable (or completely invalid) address at an
  49. interrupt request level (IRQL) that is too high. This is usually
  50. caused by drivers using improper addresses.
  51. If kernel debugger is available get stack backtrace.
  52. Arguments:
  53. Arg1: 0000000000000158, memory referenced
  54. Arg2: 0000000000000002, IRQL
  55. Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
  56. Arg4: fffff8800167023a, address which referenced memory
  57.  
  58. Debugging Details:
  59. ------------------
  60.  
  61.  
  62. READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ef20e0
  63. 0000000000000158
  64.  
  65. CURRENT_IRQL: 2
  66.  
  67. FAULTING_IP:
  68. tcpip!TcpGetIsn+ba
  69. fffff880`0167023a 410fb78658010000 movzx eax,word ptr [r14+158h]
  70.  
  71. CUSTOMER_CRASH_COUNT: 1
  72.  
  73. DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
  74.  
  75. BUGCHECK_STR: 0xD1
  76.  
  77. PROCESS_NAME: System
  78.  
  79. TRAP_FRAME: fffff88002f8b760 -- (.trap 0xfffff88002f8b760)
  80. NOTE: The trap frame does not contain all registers.
  81. Some register values may be zeroed or incorrect.
  82. rax=000000000000002c rbx=0000000000000000 rcx=0000000000000000
  83. rdx=00000000e0bc2a29 rsi=0000000000000000 rdi=0000000000000000
  84. rip=fffff8800167023a rsp=fffff88002f8b8f0 rbp=000000000164bed6
  85. r8=0000000000000006 r9=fffffa8007bd1fc8 r10=fffffa8007d262e0
  86. r11=000000000000000a r12=0000000000000000 r13=0000000000000000
  87. r14=0000000000000000 r15=0000000000000000
  88. iopl=0 nv up ei pl nz na pe nc
  89. tcpip!TcpGetIsn+0xba:
  90. fffff880`0167023a 410fb78658010000 movzx eax,word ptr [r14+158h] ds:00000000`00000158=????
  91. Resetting default scope
  92.  
  93. LAST_CONTROL_TRANSFER: from fffff80002cb8a29 to fffff80002cb94c0
  94.  
  95. STACK_TEXT:
  96. fffff880`02f8b618 fffff800`02cb8a29 : 00000000`0000000a 00000000`00000158 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
  97. fffff880`02f8b620 fffff800`02cb76a0 : 00000000`00000000 00000000`00000158 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
  98. fffff880`02f8b760 fffff880`0167023a : fffffa80`07d49e50 00000000`0164bed6 00000000`0164bed6 fffffa80`080be030 : nt!KiPageFault+0x260
  99. fffff880`02f8b8f0 fffff880`01674573 : 00000000`0164bed6 fffffa80`094d1108 fffffa80`078d3010 fffffa80`07d49f00 : tcpip!TcpGetIsn+0xba
  100. fffff880`02f8b950 fffff880`01674bd4 : fffffa80`07ac99a0 fffff880`05f29f22 fffffa80`078d3010 fffff880`01673e18 : tcpip!TcpCreateAndAcceptTcb+0x523
  101. fffff880`02f8bab0 fffff880`0167f278 : fffffa80`078d3010 00000000`fc73e39e 00000000`00000000 00000000`00000000 : tcpip!TcpListenerReceive+0x1c8
  102. fffff880`02f8bb30 fffff880`0167eb87 : fffff880`05f29f22 fffffa80`07d3b000 00000000`00000000 fffff880`01661200 : tcpip!TcpMatchReceive+0x438
  103. fffff880`02f8bc80 fffff880`01660227 : fffffa80`07d3b000 fffffa80`07d4ee30 fffffa80`07d42ce4 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x177
  104. fffff880`02f8bd30 fffff880`016602f9 : fffff880`02f8beb0 fffff880`0176e9a0 fffff880`02f8bec0 fffffa80`07ba6de0 : tcpip!IppDeliverListToProtocol+0x97
  105. fffff880`02f8bdf0 fffff880`016607f0 : fffffa80`08a819f0 fffffa80`08a7aa00 00000000`00000011 fffff880`02f8beb0 : tcpip!IppProcessDeliverList+0x59
  106. fffff880`02f8be60 fffff880`0165f681 : fffffa80`1d01000a fffffa80`07d3b000 fffff880`0176e9a0 00000000`08bd8b01 : tcpip!IppReceiveHeaderBatch+0x231
  107. fffff880`02f8bf40 fffff880`0165e0f2 : fffffa80`08c1a940 00000000`00000000 fffffa80`08bd8b01 00000000`00000001 : tcpip!IpFlcReceivePackets+0x651
  108. fffff880`02f8c140 fffff880`0167862a : fffffa80`08bd8bb0 fffff880`02f8c270 fffffa80`08bd8bb0 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
  109. fffff880`02f8c220 fffff800`02cc8c0a : fffffa80`08a892b0 fffff880`02f87000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
  110. fffff880`02f8c270 fffff880`01678052 : fffff880`01678550 fffff880`02f8c380 00000000`00000002 fffffa80`07bd4290 : nt!KeExpandKernelStackAndCalloutEx+0xda
  111. fffff880`02f8c350 fffff880`015660eb : fffffa80`08bd7680 00000000`00000000 fffffa80`0838d1a0 00000000`0164be2c : tcpip!FlReceiveNetBufferListChain+0xb2
  112. fffff880`02f8c3c0 fffff880`0152ffc6 : ffffffff`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
  113. fffff880`02f8c430 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
  114.  
  115.  
  116. STACK_COMMAND: kb
  117.  
  118. FOLLOWUP_IP:
  119. tcpip!TcpGetIsn+ba
  120. fffff880`0167023a 410fb78658010000 movzx eax,word ptr [r14+158h]
  121.  
  122. SYMBOL_STACK_INDEX: 3
  123.  
  124. SYMBOL_NAME: tcpip!TcpGetIsn+ba
  125.  
  126. FOLLOWUP_NAME: MachineOwner
  127.  
  128. MODULE_NAME: tcpip
  129.  
  130. IMAGE_NAME: tcpip.sys
  131.  
  132. DEBUG_FLR_IMAGE_TIMESTAMP: 4e83eb7f
  133.  
  134. FAILURE_BUCKET_ID: X64_0xD1_tcpip!TcpGetIsn+ba
  135.  
  136. BUCKET_ID: X64_0xD1_tcpip!TcpGetIsn+ba
  137.  
  138. Followup: MachineOwner
  139. ---------
  140.  
  141.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement