以下是dmp文件
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\042516-38765-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
WARNING: Whitespace at start of path element
Symbol search path is: SRV*C:\mysymbol*http://msdl.microsoft.com/download/symbols; SRV*c:\mysymbol* http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 10586 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 10586.212.amd64fre.th2_release_sec.160328-1908
Machine Name:
Kernel base = 0xfffff8005ca06000 PsLoadedModuleList = 0xfffff800
5cce4cd0
Debug session time: Mon Apr 25 14:00:16.636 2016 (UTC + 8:00)
System Uptime: 0 days 0:09:38.532
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
.......................................................
Loading User Symbols
Loading unloaded module list
........................................
- *
- Bugcheck Analysis *
- * *******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 139, {3, ffffd0020017a280, ffffd0020017a1d8, 0}
Unable to load image \??\C:\WINDOWS\sysWOW64\drivers\topsecpf.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for topsecpf.sys
*** ERROR: Module load completed but symbols could not be loaded for topsecpf.sys
Probably caused by : topsecpf.sys ( topsecpf+7370 )
Followup: MachineOwner
3: kd> !analyze -v
- *
- Bugcheck Analysis *
- * *******************************************************************************
Unknown bugcheck code (139)
Unknown bugcheck description
Arguments:
Arg1: 0000000000000003
Arg2: ffffd0020017a280
Arg3: ffffd0020017a1d8
Arg4: 0000000000000000
Debugging Details:
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x139
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff8005cb532e9 to fffff8005cb48760
SYMBOL_ON_RAW_STACK: 1
STACK_ADDR_RAW_STACK_SYMBOL: ffffd0020017a070
STACK_COMMAND: dds FFFFD0020017A070-0x20 ; kb
STACK_TEXT:
ffffd0020017a050 00000000
0017a054 ffffe001
ffffd002
ffffd0020017a058 c565637b
0017a05c fffff801
ffffd002
ffffd0020017a060 3ddb1490
0017a064 ffffe001
ffffd002
ffffd0020017a068 c6d57370
0017a06c fffff801
ffffd002
ffffd0020017a070 c6d57348
0017a074 fffff801
ffffd002
ffffd0020017a078 00000000
0017a07c 00000000
ffffd002
ffffd0020017a080 00000000
0017a084 00000000
ffffd002
ffffd0020017a088 00000000
0017a08c 00000000
ffffd002
ffffd0020017a090 c6d19700
0017a094 fffff801
ffffd002
ffffd0020017a098 5cb53610
0017a09c fffff800
ffffd002
ffffd0020017a0a0 00000002
0017a0a4 00000000
ffffd002
ffffd0020017a0a8 0017a4b0
0017a0ac ffffd002
ffffd002
ffffd0020017a0b0 0000ad13
0017a0b4 00000000
ffffd002
ffffd0020017a0b8 00000000
0017a0bc 00000000
ffffd002
ffffd0020017a0c0 3dfe7b70
0017a0c4 ffffe001
ffffd002
ffffd0020017a0c8 c624f303
0017a0cc fffff801
ffffd002
FOLLOWUP_IP:
topsecpf+7370
fffff801`c6d57370 90 nop
SYMBOL_NAME: topsecpf+7370
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: topsecpf
IMAGE_NAME: topsecpf.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d6da0f2
FAILURE_BUCKET_ID: X64_0x139_topsecpf+7370
BUCKET_ID: X64_0x139_topsecpf+7370
Followup: MachineOwner
3: kd> !analyze -v
- *
- Bugcheck Analysis *
- * *******************************************************************************
Unknown bugcheck code (139)
Unknown bugcheck description
Arguments:
Arg1: 0000000000000003
Arg2: ffffd0020017a280
Arg3: ffffd0020017a1d8
Arg4: 0000000000000000
Debugging Details:
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x139
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff8005cb532e9 to fffff8005cb48760
SYMBOL_ON_RAW_STACK: 1
STACK_ADDR_RAW_STACK_SYMBOL: ffffd0020017a070
STACK_COMMAND: dds FFFFD0020017A070-0x20 ; kb
STACK_TEXT:
ffffd0020017a050 00000000
0017a054 ffffe001
ffffd002
ffffd0020017a058 c565637b
0017a05c fffff801
ffffd002
ffffd0020017a060 3ddb1490
0017a064 ffffe001
ffffd002
ffffd0020017a068 c6d57370
0017a06c fffff801
ffffd002
ffffd0020017a070 c6d57348
0017a074 fffff801
ffffd002
ffffd0020017a078 00000000
0017a07c 00000000
ffffd002
ffffd0020017a080 00000000
0017a084 00000000
ffffd002
ffffd0020017a088 00000000
0017a08c 00000000
ffffd002
ffffd0020017a090 c6d19700
0017a094 fffff801
ffffd002
ffffd0020017a098 5cb53610
0017a09c fffff800
ffffd002
ffffd0020017a0a0 00000002
0017a0a4 00000000
ffffd002
ffffd0020017a0a8 0017a4b0
0017a0ac ffffd002
ffffd002
ffffd0020017a0b0 0000ad13
0017a0b4 00000000
ffffd002
ffffd0020017a0b8 00000000
0017a0bc 00000000
ffffd002
ffffd0020017a0c0 3dfe7b70
0017a0c4 ffffe001
ffffd002
ffffd0020017a0c8 c624f303
0017a0cc fffff801
ffffd002
FOLLOWUP_IP:
topsecpf+7370
fffff801`c6d57370 90 nop
SYMBOL_NAME: topsecpf+7370
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: topsecpf
IMAGE_NAME: topsecpf.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d6da0f2
FAILURE_BUCKET_ID: X64_0x139_topsecpf+7370
BUCKET_ID: X64_0x139_topsecpf+7370
Followup: MachineOwner
3: kd> !analyze -v
- *
- Bugcheck Analysis *
- * *******************************************************************************
Unknown bugcheck code (139)
Unknown bugcheck description
Arguments:
Arg1: 0000000000000003
Arg2: ffffd0020017a280
Arg3: ffffd0020017a1d8
Arg4: 0000000000000000