Kod: Zaznacz cały
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\Mini041612-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp2_rtm.040803-2158
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700
Debug session time: Mon Apr 16 15:16:17.031 2012 (GMT+2)
System Uptime: 0 days 0:52:43.040
Loading Kernel Symbols
...............................................................
...................................................
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000000A, {e9da01a0, 2, 0, 8051ace1}
*** WARNING: Unable to verify timestamp for eamon.sys
*** ERROR: Module load completed but symbols could not be loaded for eamon.sys
Probably caused by : eamon.sys ( eamon+25fb )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: e9da01a0, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 8051ace1, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: e9da01a0
CURRENT_IRQL: 2
FAULTING_IP:
nt!MmCopyToCachedPage+1b1
8051ace1 8b00 mov eax,dword ptr [eax]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: plugin-containe
LAST_CONTROL_TRANSFER: from 804e3973 to 8051ace1
STACK_TEXT:
b00768d4 804e3973 cc701000 0377e000 00000000 nt!MmCopyToCachedPage+0x1b1
b0076964 804e1520 8a03f838 0377e000 b00769a8 nt!CcMapAndCopy+0x1af
b00769f4 b7e4bb66 8a0237b8 b0076bc4 00004000 nt!CcCopyWrite+0x2a6
b0076be8 b7e48c97 8a07bc40 89dfda10 b1514cd0 Ntfs!NtfsCommonWrite+0x1d2a
b0076c4c 804eeeb1 8aec8020 89dfda10 89dfdbc4 Ntfs!NtfsFsdWrite+0xf3
b0076c5c b14c45fb 89f0efb8 8a7348d8 89dfda10 nt!IopfCallDriver+0x31
WARNING: Stack unwind information not available. Following frames may be wrong.
b0076c70 804eeeb1 8a2bbb98 89dfda10 806e4410 eamon+0x25fb
b0076c80 8057e688 89dfdba0 00000000 89dfda10 nt!IopfCallDriver+0x31
b0076c94 8057c259 8a2bbb98 89dfda10 8a0237b8 nt!IopSynchronousServiceTail+0x60
b0076d38 8054060c 00000904 00000000 00000000 nt!NtWriteFile+0x5d7
b0076d38 7c90eb94 00000904 00000000 00000000 nt!KiFastCallEntry+0xfc
071bfea0 00000000 00000000 00000000 00000000 0x7c90eb94
STACK_COMMAND: kb
FOLLOWUP_IP:
eamon+25fb
b14c45fb ?? ???
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: eamon+25fb
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: eamon
IMAGE_NAME: eamon.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4e37c45d
FAILURE_BUCKET_ID: 0xA_eamon+25fb
BUCKET_ID: 0xA_eamon+25fb
Followup: MachineOwner
---------