Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Users\Sayshal\Downloads\111411-20217-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
- Executable search path is:
- Windows 7 Kernel Version 7600 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 7600.20994.amd64fre.win7_ldr.110622-1505
- Machine Name:
- Kernel base = 0xfffff800`02c53000 PsLoadedModuleList = 0xfffff800`02e87ed0
- Debug session time: Mon Nov 14 17:10:10.496 2011 (UTC - 7:00)
- System Uptime: 2 days 16:56:39.403
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ..............
- Loading User Symbols
- Loading unloaded module list
- ......
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck D1, {158, 2, 0, fffff8800167023a}
- Probably caused by : tcpip.sys ( tcpip!TcpGetIsn+ba )
- Followup: MachineOwner
- ---------
- 2: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If kernel debugger is available get stack backtrace.
- Arguments:
- Arg1: 0000000000000158, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
- Arg4: fffff8800167023a, address which referenced memory
- Debugging Details:
- ------------------
- READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ef20e0
- 0000000000000158
- CURRENT_IRQL: 2
- FAULTING_IP:
- tcpip!TcpGetIsn+ba
- fffff880`0167023a 410fb78658010000 movzx eax,word ptr [r14+158h]
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
- BUGCHECK_STR: 0xD1
- PROCESS_NAME: System
- TRAP_FRAME: fffff88002f8b760 -- (.trap 0xfffff88002f8b760)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=000000000000002c rbx=0000000000000000 rcx=0000000000000000
- rdx=00000000e0bc2a29 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8800167023a rsp=fffff88002f8b8f0 rbp=000000000164bed6
- r8=0000000000000006 r9=fffffa8007bd1fc8 r10=fffffa8007d262e0
- r11=000000000000000a r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na pe nc
- tcpip!TcpGetIsn+0xba:
- fffff880`0167023a 410fb78658010000 movzx eax,word ptr [r14+158h] ds:00000000`00000158=????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff80002cb8a29 to fffff80002cb94c0
- STACK_TEXT:
- fffff880`02f8b618 fffff800`02cb8a29 : 00000000`0000000a 00000000`00000158 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
- fffff880`02f8b620 fffff800`02cb76a0 : 00000000`00000000 00000000`00000158 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
- fffff880`02f8b760 fffff880`0167023a : fffffa80`07d49e50 00000000`0164bed6 00000000`0164bed6 fffffa80`080be030 : nt!KiPageFault+0x260
- fffff880`02f8b8f0 fffff880`01674573 : 00000000`0164bed6 fffffa80`094d1108 fffffa80`078d3010 fffffa80`07d49f00 : tcpip!TcpGetIsn+0xba
- fffff880`02f8b950 fffff880`01674bd4 : fffffa80`07ac99a0 fffff880`05f29f22 fffffa80`078d3010 fffff880`01673e18 : tcpip!TcpCreateAndAcceptTcb+0x523
- fffff880`02f8bab0 fffff880`0167f278 : fffffa80`078d3010 00000000`fc73e39e 00000000`00000000 00000000`00000000 : tcpip!TcpListenerReceive+0x1c8
- fffff880`02f8bb30 fffff880`0167eb87 : fffff880`05f29f22 fffffa80`07d3b000 00000000`00000000 fffff880`01661200 : tcpip!TcpMatchReceive+0x438
- fffff880`02f8bc80 fffff880`01660227 : fffffa80`07d3b000 fffffa80`07d4ee30 fffffa80`07d42ce4 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x177
- fffff880`02f8bd30 fffff880`016602f9 : fffff880`02f8beb0 fffff880`0176e9a0 fffff880`02f8bec0 fffffa80`07ba6de0 : tcpip!IppDeliverListToProtocol+0x97
- fffff880`02f8bdf0 fffff880`016607f0 : fffffa80`08a819f0 fffffa80`08a7aa00 00000000`00000011 fffff880`02f8beb0 : tcpip!IppProcessDeliverList+0x59
- fffff880`02f8be60 fffff880`0165f681 : fffffa80`1d01000a fffffa80`07d3b000 fffff880`0176e9a0 00000000`08bd8b01 : tcpip!IppReceiveHeaderBatch+0x231
- fffff880`02f8bf40 fffff880`0165e0f2 : fffffa80`08c1a940 00000000`00000000 fffffa80`08bd8b01 00000000`00000001 : tcpip!IpFlcReceivePackets+0x651
- fffff880`02f8c140 fffff880`0167862a : fffffa80`08bd8bb0 fffff880`02f8c270 fffffa80`08bd8bb0 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
- fffff880`02f8c220 fffff800`02cc8c0a : fffffa80`08a892b0 fffff880`02f87000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
- fffff880`02f8c270 fffff880`01678052 : fffff880`01678550 fffff880`02f8c380 00000000`00000002 fffffa80`07bd4290 : nt!KeExpandKernelStackAndCalloutEx+0xda
- fffff880`02f8c350 fffff880`015660eb : fffffa80`08bd7680 00000000`00000000 fffffa80`0838d1a0 00000000`0164be2c : tcpip!FlReceiveNetBufferListChain+0xb2
- fffff880`02f8c3c0 fffff880`0152ffc6 : ffffffff`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
- fffff880`02f8c430 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- tcpip!TcpGetIsn+ba
- fffff880`0167023a 410fb78658010000 movzx eax,word ptr [r14+158h]
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: tcpip!TcpGetIsn+ba
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: tcpip
- IMAGE_NAME: tcpip.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 4e83eb7f
- FAILURE_BUCKET_ID: X64_0xD1_tcpip!TcpGetIsn+ba
- BUCKET_ID: X64_0xD1_tcpip!TcpGetIsn+ba
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement