Advertisement
Guest User

Untitled

a guest
May 26th, 2015
214
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.14 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\MEMORY.DMP]
  7. Kernel Bitmap Dump File: Only kernel address space is available
  8.  
  9.  
  10. ************* Symbol Path validation summary **************
  11. Response Time (ms) Location
  12. Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
  13. Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
  14. Executable search path is:
  15. Windows 8 Kernel Version 9600 MP (4 procs) Free x64
  16. Product: WinNt, suite: TerminalServer SingleUserTS
  17. Built by: 9600.17736.amd64fre.winblue_r9.150322-1500
  18. Machine Name:
  19. Kernel base = 0xfffff802`2d681000 PsLoadedModuleList = 0xfffff802`2d95a850
  20. Debug session time: Mon May 25 22:35:13.058 2015 (UTC + 3:00)
  21. System Uptime: 0 days 3:45:02.554
  22. Loading Kernel Symbols
  23. ...............................................................
  24. ................................................................
  25. .Page 10b331 not present in the dump file. Type ".hh dbgerr004" for details
  26. .....Page 121644 not present in the dump file. Type ".hh dbgerr004" for details
  27. ..Page 124ffe not present in the dump file. Type ".hh dbgerr004" for details
  28. ................................
  29. Loading User Symbols
  30. PEB is paged out (Peb.Ldr = 00007ff7`2fd1f018). Type ".hh dbgerr001" for details
  31. Loading unloaded module list
  32. ...............
  33. *******************************************************************************
  34. * *
  35. * Bugcheck Analysis *
  36. * *
  37. *******************************************************************************
  38.  
  39. Use !analyze -v to get detailed debugging information.
  40.  
  41. BugCheck 9F, {3, ffffe00144d52060, fffff8022ef9dcb0, ffffe00147be6780}
  42.  
  43. Page 10b331 not present in the dump file. Type ".hh dbgerr004" for details
  44. *** ERROR: Module load completed but symbols could not be loaded for atapi.sys
  45. Probably caused by : atapi.sys
  46.  
  47. Followup: MachineOwner
  48. ---------
  49.  
  50. 0: kd> !analyze -v
  51. *******************************************************************************
  52. * *
  53. * Bugcheck Analysis *
  54. * *
  55. *******************************************************************************
  56.  
  57. DRIVER_POWER_STATE_FAILURE (9f)
  58. A driver has failed to complete a power IRP within a specific time.
  59. Arguments:
  60. Arg1: 0000000000000003, A device object has been blocking an Irp for too long a time
  61. Arg2: ffffe00144d52060, Physical Device Object of the stack
  62. Arg3: fffff8022ef9dcb0, nt!TRIAGE_9F_POWER on Win7 and higher, otherwise the Functional Device Object of the stack
  63. Arg4: ffffe00147be6780, The blocked IRP
  64.  
  65. Debugging Details:
  66. ------------------
  67.  
  68. Page 10b331 not present in the dump file. Type ".hh dbgerr004" for details
  69.  
  70. DRVPOWERSTATE_SUBCODE: 3
  71.  
  72. DRIVER_OBJECT: ffffe00144cf1490
  73.  
  74. IMAGE_NAME: atapi.sys
  75.  
  76. DEBUG_FLR_IMAGE_TIMESTAMP: 5215f8b7
  77.  
  78. MODULE_NAME: atapi
  79.  
  80. FAULTING_MODULE: fffff800ce2f1000 atapi
  81.  
  82. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  83.  
  84. BUGCHECK_STR: 0x9F
  85.  
  86. PROCESS_NAME: taskhost.exe
  87.  
  88. CURRENT_IRQL: 2
  89.  
  90. ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
  91.  
  92. DPC_STACK_BASE: FFFFF8022EF9DFB0
  93.  
  94. STACK_TEXT:
  95. fffff802`2ef9dc78 fffff802`2d889782 : 00000000`0000009f 00000000`00000003 ffffe001`44d52060 fffff802`2ef9dcb0 : nt!KeBugCheckEx
  96. fffff802`2ef9dc80 fffff802`2d8896a2 : ffffe001`4508b510 00000000`00000008 fffff802`2ef9dda8 fffff802`2d725391 : nt!PopIrpWatchdogBugcheck+0xde
  97. fffff802`2ef9dce0 fffff802`2d7272d8 : 00000000`00000000 fffff802`2ef9de30 00000000`00000001 00000000`00000001 : nt!PopIrpWatchdog+0x32
  98. fffff802`2ef9dd30 fffff802`2d7d4dd5 : 00000000`00000000 fffff802`2d984180 fffff802`2d665900 00000000`00000026 : nt!KiRetireDpcList+0x4f8
  99. fffff802`2ef9dfb0 fffff802`2d7d4bd9 : 0000001d`00002058 00000000`00000026 00000001`00004001 00000000`00000000 : nt!KxRetireDpcList+0x5
  100. ffffd000`bb0bfc00 fffff802`2d7d6e45 : ffffd000`bb0bfcc0 fffff802`2d7d3b13 00000000`00000001 0000001d`ecd7b330 : nt!KiDispatchInterruptContinue
  101. ffffd000`bb0bfc30 fffff802`2d7d3b13 : 00000000`00000001 0000001d`ecd7b330 ffffffff`ffffffff 0000001d`ecd84838 : nt!KiDpcInterruptBypass+0x25
  102. ffffd000`bb0bfc40 00007ffe`335511e1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x173
  103. 0000001d`cf6eed48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`335511e1
  104.  
  105.  
  106. STACK_COMMAND: kb
  107.  
  108. FOLLOWUP_NAME: MachineOwner
  109.  
  110. FAILURE_BUCKET_ID: 0x9F_3_IMAGE_atapi.sys
  111.  
  112. BUCKET_ID: 0x9F_3_IMAGE_atapi.sys
  113.  
  114. ANALYSIS_SOURCE: KM
  115.  
  116. FAILURE_ID_HASH_STRING: km:0x9f_3_image_atapi.sys
  117.  
  118. FAILURE_ID_HASH: {2e0d03b3-946c-de11-316d-86bb51b53b4f}
  119.  
  120. Followup: MachineOwner
  121. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement