Advertisement
Guest User

bsod#4

a guest
Sep 5th, 2013
69
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.07 KB | None | 0 0
  1. *******************************************************************************
  2. * *
  3. * Bugcheck Analysis *
  4. * *
  5. *******************************************************************************
  6.  
  7. Use !analyze -v to get detailed debugging information.
  8.  
  9. BugCheck D5, {fffff9800d8fad60, 0, fffff88005f7312e, 0}
  10.  
  11. Unable to load image \SystemRoot\system32\drivers\RTKVHD64.sys, Win32 error 0n2
  12. *** WARNING: Unable to verify timestamp for RTKVHD64.sys
  13. *** ERROR: Module load completed but symbols could not be loaded for RTKVHD64.sys
  14.  
  15. Could not read faulting driver name
  16. Probably caused by : RTKVHD64.sys ( RTKVHD64+ea12e )
  17.  
  18. Followup: MachineOwner
  19. ---------
  20.  
  21. 2: kd> !analyze -v
  22. *******************************************************************************
  23. * *
  24. * Bugcheck Analysis *
  25. * *
  26. *******************************************************************************
  27.  
  28. DRIVER_PAGE_FAULT_IN_FREED_SPECIAL_POOL (d5)
  29. Memory was referenced after it was freed.
  30. This cannot be protected by try-except.
  31. When possible, the guilty driver's name (Unicode string) is printed on
  32. the bugcheck screen and saved in KiBugCheckDriver.
  33. Arguments:
  34. Arg1: fffff9800d8fad60, memory referenced
  35. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation
  36. Arg3: fffff88005f7312e, if non-zero, the address which referenced memory.
  37. Arg4: 0000000000000000, (reserved)
  38.  
  39. Debugging Details:
  40. ------------------
  41.  
  42.  
  43. Could not read faulting driver name
  44.  
  45. READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003d02100
  46. fffff9800d8fad60
  47.  
  48. FAULTING_IP:
  49. RTKVHD64+ea12e
  50. fffff880`05f7312e 8b4630 mov eax,dword ptr [rsi+30h]
  51.  
  52. MM_INTERNAL_CODE: 0
  53.  
  54. CUSTOMER_CRASH_COUNT: 1
  55.  
  56. DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
  57.  
  58. BUGCHECK_STR: 0xD5
  59.  
  60. PROCESS_NAME: svchost.exe
  61.  
  62. CURRENT_IRQL: 0
  63.  
  64. TRAP_FRAME: fffff880027a72a0 -- (.trap 0xfffff880027a72a0)
  65. NOTE: The trap frame does not contain all registers.
  66. Some register values may be zeroed or incorrect.
  67. rax=0000000000000000 rbx=0000000000000000 rcx=fffff880027a74c8
  68. rdx=fffff880027a7430 rsi=0000000000000000 rdi=0000000000000000
  69. rip=fffff88005f7312e rsp=fffff880027a7430 rbp=0000000000000002
  70. r8=0000000000000000 r9=fffff88005f7312e r10=0000000000000100
  71. r11=fffff88003164180 r12=0000000000000000 r13=0000000000000000
  72. r14=0000000000000000 r15=0000000000000000
  73. iopl=0 nv up ei ng nz na po nc
  74. RTKVHD64+0xea12e:
  75. fffff880`05f7312e 8b4630 mov eax,dword ptr [rsi+30h] ds:4180:00000000`00000030=????????
  76. Resetting default scope
  77.  
  78. LAST_CONTROL_TRANSFER: from fffff80003a7ea0c to fffff80003ad2d00
  79.  
  80. STACK_TEXT:
  81. fffff880`027a7138 fffff800`03a7ea0c : 00000000`00000050 fffff980`0d8fad60 00000000`00000000 fffff880`027a72a0 : nt!KeBugCheckEx
  82. fffff880`027a7140 fffff800`03ad0e2e : 00000000`00000000 fffff980`0d8fad60 fffffa80`0718d500 fffff8a0`015ef10e : nt! ?? ::FNODOBFM::`string'+0x4621f
  83. fffff880`027a72a0 fffff880`05f7312e : fffff880`027a74c8 00000000`00000000 fffff8a0`015ef10e fffffa80`06a695d0 : nt!KiPageFault+0x16e
  84. fffff880`027a7430 fffff880`027a74c8 : 00000000`00000000 fffff8a0`015ef10e fffffa80`06a695d0 00000000`00000000 : RTKVHD64+0xea12e
  85. fffff880`027a7438 00000000`00000000 : fffff8a0`015ef10e fffffa80`06a695d0 00000000`00000000 fffff800`00000000 : 0xfffff880`027a74c8
  86.  
  87.  
  88. STACK_COMMAND: kb
  89.  
  90. FOLLOWUP_IP:
  91. RTKVHD64+ea12e
  92. fffff880`05f7312e 8b4630 mov eax,dword ptr [rsi+30h]
  93.  
  94. SYMBOL_STACK_INDEX: 3
  95.  
  96. SYMBOL_NAME: RTKVHD64+ea12e
  97.  
  98. FOLLOWUP_NAME: MachineOwner
  99.  
  100. MODULE_NAME: RTKVHD64
  101.  
  102. IMAGE_NAME: RTKVHD64.sys
  103.  
  104. DEBUG_FLR_IMAGE_TIMESTAMP: 4df745eb
  105.  
  106. FAILURE_BUCKET_ID: X64_0xD5_VRF_RTKVHD64+ea12e
  107.  
  108. BUCKET_ID: X64_0xD5_VRF_RTKVHD64+ea12e
  109.  
  110. Followup: MachineOwner
  111. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement