Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\*\032212-19125-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: *** Invalid ***
- ****************************************************************************
- * Symbol loading may be unreliable without a symbol search path. *
- * Use .symfix to have the debugger choose a symbol path. *
- * After setting your symbol path, use .reload to refresh symbol locations. *
- ****************************************************************************
- Executable search path is:
- *********************************************************************
- * Symbols can not be loaded because symbol path is not initialized. *
- * *
- * The Symbol Path can be set by: *
- * using the _NT_SYMBOL_PATH environment variable. *
- * using the -y <symbol_path> argument when starting the debugger. *
- * using .sympath and .sympath+ *
- *********************************************************************
- Unable to load image \SystemRoot\system32\ntoskrnl.exe, Win32 error 0n2
- *** WARNING: Unable to verify timestamp for ntoskrnl.exe
- *** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe
- Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 7601.17727.amd64fre.win7sp1_gdr.111118-2330
- Machine Name:
- Kernel base = 0xfffff800`03000000 PsLoadedModuleList = 0xfffff800`03244650
- Debug session time: Thu Mar 22 00:24:52.663 2012 (UTC + 1:00)
- System Uptime: 0 days 0:40:56.036
- *********************************************************************
- * Symbols can not be loaded because symbol path is not initialized. *
- * *
- * The Symbol Path can be set by: *
- * using the _NT_SYMBOL_PATH environment variable. *
- * using the -y <symbol_path> argument when starting the debugger. *
- * using .sympath and .sympath+ *
- *********************************************************************
- Unable to load image \SystemRoot\system32\ntoskrnl.exe, Win32 error 0n2
- *** WARNING: Unable to verify timestamp for ntoskrnl.exe
- *** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ....................................................
- Loading User Symbols
- Loading unloaded module list
- ......
- Unable to load image \SystemRoot\system32\drivers\NETIO.SYS, Win32 error 0n2
- *** WARNING: Unable to verify timestamp for NETIO.SYS
- *** ERROR: Module load completed but symbols could not be loaded for NETIO.SYS
- ERROR: FindPlugIns 8007007b
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck 1000007E, {ffffffffc0000005, fffff880015377ba, fffff880031af6d8, fffff880031aef30}
- *** WARNING: Unable to verify timestamp for mssmbios.sys
- *** ERROR: Module load completed but symbols could not be loaded for mssmbios.sys
- ***** Kernel symbols are WRONG. Please fix symbols to do analysis.
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: nt!_KPRCB ***
- *** ***
- *************************************************************************
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: nt!_KPRCB ***
- *** ***
- *************************************************************************
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: nt!_KPRCB ***
- *** ***
- *************************************************************************
- Probably caused by : NETIO.SYS ( NETIO+117ba )
- Followup: MachineOwner
- ---------
- 0: kd> !analyze -v
- ERROR: FindPlugIns 8007007b
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Some common problems are exception code 0x80000003. This means a hard
- coded breakpoint or assertion was hit, but this system was booted
- /NODEBUG. This is not supposed to happen as developers should never have
- hardcoded breakpoints in retail code, but ...
- If this happens, make sure a debugger gets connected, and the
- system is booted /DEBUG. This will let us see why this breakpoint is
- happening.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff880015377ba, The address that the exception occurred at
- Arg3: fffff880031af6d8, Exception Record Address
- Arg4: fffff880031aef30, Context Record Address
- Debugging Details:
- ------------------
- ***** Kernel symbols are WRONG. Please fix symbols to do analysis.
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: nt!_KPRCB ***
- *** ***
- *************************************************************************
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: nt!_KPRCB ***
- *** ***
- *************************************************************************
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: nt!_KPRCB ***
- *** ***
- *************************************************************************
- ADDITIONAL_DEBUG_TEXT:
- Use '!findthebuild' command to search for the target build information.
- If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols.
- MODULE_NAME: NETIO
- FAULTING_MODULE: fffff80003000000 nt
- DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79381
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
- FAULTING_IP:
- NETIO+117ba
- fffff880`015377ba 488b01 mov rax,qword ptr [rcx]
- EXCEPTION_RECORD: fffff880031af6d8 -- (.exr 0xfffff880031af6d8)
- ExceptionAddress: fffff880015377ba (NETIO+0x00000000000117ba)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 2
- Parameter[0]: 0000000000000000
- Parameter[1]: 0000000000000000
- Attempt to read from address 0000000000000000
- CONTEXT: fffff880031aef30 -- (.cxr 0xfffff880031aef30)
- rax=fffffa800a457920 rbx=fffffa80074b7a90 rcx=0000000000000000
- rdx=0000000000001000 rsi=00000000ffffff87 rdi=fffff880031af900
- rip=fffff880015377ba rsp=fffff880031af910 rbp=fffffa8008a2b000
- r8=fffff78000000320 r9=0000000000000002 r10=fffff800031f2b80
- r11=fffffa800712e7a0 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz na po nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
- NETIO+0x117ba:
- fffff880`015377ba 488b01 mov rax,qword ptr [rcx] ds:002b:00000000`00000000=????????????????
- Resetting default scope
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
- BUGCHECK_STR: 0x7E
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff880015377ba
- STACK_TEXT:
- fffff880`031af910 00000000`00000000 : fffff880`0182a7c2 fffffa80`206c644d fffff880`01533e21 fffffa80`07b7b700 : NETIO+0x117ba
- FOLLOWUP_IP:
- NETIO+117ba
- fffff880`015377ba 488b01 mov rax,qword ptr [rcx]
- SYMBOL_STACK_INDEX: 0
- SYMBOL_NAME: NETIO+117ba
- FOLLOWUP_NAME: MachineOwner
- IMAGE_NAME: NETIO.SYS
- STACK_COMMAND: .cxr 0xfffff880031aef30 ; kb
- BUCKET_ID: WRONG_SYMBOLS
- Followup: MachineOwner
- ---------
- 0: kd> lmvm NETIO
- start end module name
- fffff880`01526000 fffff880`01586000 NETIO T (no symbols)
- Loaded symbol image file: NETIO.SYS
- Image path: \SystemRoot\system32\drivers\NETIO.SYS
- Image name: NETIO.SYS
- Timestamp: Sat Nov 20 10:23:13 2010 (4CE79381)
- CheckSum: 00066D17
- ImageSize: 00060000
- Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement