Kod: Zaznacz cały
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\Mini082311-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.100216-1514
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055b1c0
Debug session time: Tue Aug 23 20:55:42.531 2011 (GMT+2)
System Uptime: 0 days 0:06:19.125
Loading Kernel Symbols
...............................................................
.....................................................
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000000A, {166, 2, 0, 804e5443}
Unable to load image IdeChnDr.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for IdeChnDr.sys
*** ERROR: Module load completed but symbols could not be loaded for IdeChnDr.sys
Probably caused by : IdeChnDr.sys ( IdeChnDr+57a )
Followup: MachineOwner
---------
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000166, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 804e5443, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 00000166
CURRENT_IRQL: 2
FAULTING_IP:
nt!KeInsertQueueApc+22
804e5443 389e66010000 cmp byte ptr [esi+166h],bl
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: explorer.exe
LAST_CONTROL_TRANSFER: from 804ecad4 to 804e5443
STACK_TEXT:
f7ac8f88 804ecad4 819a5eb0 00000000 00000000 nt!KeInsertQueueApc+0x22
f7ac8fbc f75d357a 82b77d10 82b77f74 ffdff000 nt!IopfCompleteRequest+0x1d8
WARNING: Stack unwind information not available. Following frames may be wrong.
f7ac8fd0 804dbbd4 82be0428 00be00e0 819a5e70 IdeChnDr+0x57a
f7ac8ff4 804db89e f563f884 00000000 00000000 nt!KiRetireDpcList+0x46
f7ac8ff8 f563f884 00000000 00000000 00000000 nt!KiDispatchInterrupt+0x2a
804db89e 00000000 00000009 bb835675 00000128 0xf563f884
STACK_COMMAND: kb
FOLLOWUP_IP:
IdeChnDr+57a
f75d357a ?? ???
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: IdeChnDr+57a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: IdeChnDr
IMAGE_NAME: IdeChnDr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 3d99eac3
FAILURE_BUCKET_ID: 0xA_IdeChnDr+57a
BUCKET_ID: 0xA_IdeChnDr+57a
Followup: MachineOwner
---------
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000166, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 804e5443, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 00000166
CURRENT_IRQL: 2
FAULTING_IP:
nt!KeInsertQueueApc+22
804e5443 389e66010000 cmp byte ptr [esi+166h],bl
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: explorer.exe
LAST_CONTROL_TRANSFER: from 804ecad4 to 804e5443
STACK_TEXT:
f7ac8f88 804ecad4 819a5eb0 00000000 00000000 nt!KeInsertQueueApc+0x22
f7ac8fbc f75d357a 82b77d10 82b77f74 ffdff000 nt!IopfCompleteRequest+0x1d8
WARNING: Stack unwind information not available. Following frames may be wrong.
f7ac8fd0 804dbbd4 82be0428 00be00e0 819a5e70 IdeChnDr+0x57a
f7ac8ff4 804db89e f563f884 00000000 00000000 nt!KiRetireDpcList+0x46
f7ac8ff8 f563f884 00000000 00000000 00000000 nt!KiDispatchInterrupt+0x2a
804db89e 00000000 00000009 bb835675 00000128 0xf563f884
STACK_COMMAND: kb
FOLLOWUP_IP:
IdeChnDr+57a
f75d357a ?? ???
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: IdeChnDr+57a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: IdeChnDr
IMAGE_NAME: IdeChnDr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 3d99eac3
FAILURE_BUCKET_ID: 0xA_IdeChnDr+57a
BUCKET_ID: 0xA_IdeChnDr+57a
Followup: MachineOwner
---------
W czym problem
