Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Opened \\.\com1
- Waiting to reconnect...
- Connected to Windows Server 2008/Windows Vista 6001 x86 compatible target at (Mon Nov 11 19:23:28.078 2019 (GMT+1)), ptr64 FALSE
- Kernel Debugger connection established.
- Symbol search path is: *** Invalid ***
- ****************************************************************************
- * Symbol loading may be unreliable without a symbol search path. *
- * Use .symfix to have the debugger choose a symbol path. *
- * After setting your symbol path, use .reload to refresh symbol locations. *
- ****************************************************************************
- Executable search path is:
- *********************************************************************
- * Symbols can not be loaded because symbol path is not initialized. *
- * *
- * The Symbol Path can be set by: *
- * using the _NT_SYMBOL_PATH environment variable. *
- * using the -y <symbol_path> argument when starting the debugger. *
- * using .sympath and .sympath+ *
- *********************************************************************
- *** ERROR: Symbol file could not be found. Defaulted to export symbols for ntkrpamp.exe -
- Windows Server 2008/Windows Vista Kernel Version 6001 MP (1 procs) Free x86 compatible
- Built by: 6001.16497.x86fre.longhorn_beta3.070330-1720
- Machine Name:
- Kernel base = 0x88c00000 PsLoadedModuleList = 0x88d0f1f0
- System Uptime: not available
- *** Fatal System Error: 0x0000007e
- (0xC0000005,0x88FBF1B4,0x86F44AD4,0x86F447D0)
- Break instruction exception - code 80000003 (first chance)
- A fatal system error has occurred.
- Debugger entered on first try; Bugcheck callbacks have not been invoked.
- A fatal system error has occurred.
- *********************************************************************
- * Symbols can not be loaded because symbol path is not initialized. *
- * *
- * The Symbol Path can be set by: *
- * using the _NT_SYMBOL_PATH environment variable. *
- * using the -y <symbol_path> argument when starting the debugger. *
- * using .sympath and .sympath+ *
- *********************************************************************
- *** ERROR: Symbol file could not be found. Defaulted to export symbols for ntkrpamp.exe -
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck 7E, {c0000005, 88fbf1b4, 86f44ad4, 86f447d0}
- ***** Kernel symbols are WRONG. Please fix symbols to do analysis.
- *** ERROR: Symbol file could not be found. Defaulted to export symbols for halmacpi.dll -
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: nt!_KPRCB ***
- *** ***
- *************************************************************************
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: nt!_KPRCB ***
- *** ***
- *************************************************************************
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: nt!_KPRCB ***
- *** ***
- *************************************************************************
- *********************************************************************
- * Symbols can not be loaded because symbol path is not initialized. *
- * *
- * The Symbol Path can be set by: *
- * using the _NT_SYMBOL_PATH environment variable. *
- * using the -y <symbol_path> argument when starting the debugger. *
- * using .sympath and .sympath+ *
- *********************************************************************
- *********************************************************************
- * Symbols can not be loaded because symbol path is not initialized. *
- * *
- * The Symbol Path can be set by: *
- * using the _NT_SYMBOL_PATH environment variable. *
- * using the -y <symbol_path> argument when starting the debugger. *
- * using .sympath and .sympath+ *
- *********************************************************************
- Probably caused by : ntkrpamp.exe ( nt!TmInitSystem+4bda )
- Followup: MachineOwner
- ---------
- nt!DbgBreakPointWithStatus+0x4:
- 88c459c8 cc int 3
- 0: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Arguments:
- Arg1: c0000005, The exception code that was not handled
- Arg2: 88fbf1b4, The address that the exception occurred at
- Arg3: 86f44ad4, Exception Record Address
- Arg4: 86f447d0, Context Record Address
- Debugging Details:
- ------------------
- ***** Kernel symbols are WRONG. Please fix symbols to do analysis.
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: nt!_KPRCB ***
- *** ***
- *************************************************************************
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: nt!_KPRCB ***
- *** ***
- *************************************************************************
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: nt!_KPRCB ***
- *** ***
- *************************************************************************
- *********************************************************************
- * Symbols can not be loaded because symbol path is not initialized. *
- * *
- * The Symbol Path can be set by: *
- * using the _NT_SYMBOL_PATH environment variable. *
- * using the -y <symbol_path> argument when starting the debugger. *
- * using .sympath and .sympath+ *
- *********************************************************************
- *********************************************************************
- * Symbols can not be loaded because symbol path is not initialized. *
- * *
- * The Symbol Path can be set by: *
- * using the _NT_SYMBOL_PATH environment variable. *
- * using the -y <symbol_path> argument when starting the debugger. *
- * using .sympath and .sympath+ *
- *********************************************************************
- ADDITIONAL_DEBUG_TEXT:
- Use '!findthebuild' command to search for the target build information.
- If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols.
- MODULE_NAME: nt
- FAULTING_MODULE: 88c00000 nt
- DEBUG_FLR_IMAGE_TIMESTAMP: 460dcf29
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
- FAULTING_IP:
- hal!WRITE_PORT_BUFFER_ULONG+28
- 88fbf1b4 0f30 wrmsr
- EXCEPTION_RECORD: 86f44ad4 -- (.exr 0xffffffff86f44ad4)
- ExceptionAddress: 88fbf1b4 (hal!WRITE_PORT_BUFFER_ULONG+0x00000028)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 0
- CONTEXT: 86f447d0 -- (.cxr 0xffffffff86f447d0)
- eax=40000000 ebx=00000000 ecx=00000288 edx=00000000 esi=00000288 edi=00000002
- eip=88fbf1b4 esp=86f44b9c ebp=86f44bb4 iopl=0 nv up ei ng nz ac po cy
- cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00210293
- hal!WRITE_PORT_BUFFER_ULONG+0x28:
- 88fbf1b4 0f30 wrmsr
- Resetting default scope
- DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
- BUGCHECK_STR: 0x7E
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from 88fb0c34 to 88fbf1b4
- STACK_TEXT:
- WARNING: Stack unwind information not available. Following frames may be wrong.
- 86f44bb4 88fb0c34 82034444 00000001 00000000 hal!WRITE_PORT_BUFFER_ULONG+0x28
- 86f44bcc 88fc7cf8 82034444 82034444 86f44bec hal!HalBugCheckSystem+0x5d0
- 86f44bdc 88fc7e78 00000000 82034444 86f44bfc hal!KdComPortInUse+0x4920
- 86f44bec 88fc7ecb 00000000 82034444 86f44c28 hal!KdComPortInUse+0x4aa0
- 86f44bfc 88f4d732 00000000 82034444 00000000 hal!KdComPortInUse+0x4af3
- 86f44c28 88f4d48a 82034238 00000000 885ea114 nt!TmInitSystem+0x4bda
- 86f44c8c 88f50d47 885e72a8 81e8f0a0 81e8fd78 nt!TmInitSystem+0x4932
- 86f44d74 88d51fd0 86f44dc0 88df131c 885e72a8 nt!TmInitSystem+0x81ef
- 86f44d7c 88df131c 885e72a8 68750c1d 00000000 nt!IoConnectInterruptEx+0x294
- 86f44dc0 88ca821e 88d51fc3 885e72a8 00000000 nt!IoFreeMiniCompletionPacket+0x14f7
- 00000000 00000000 00000000 00000000 00000000 nt!PsGetCurrentThreadTeb+0x3be
- FOLLOWUP_IP:
- nt!TmInitSystem+4bda
- 88f4d732 3bc3 cmp eax,ebx
- SYMBOL_STACK_INDEX: 5
- SYMBOL_NAME: nt!TmInitSystem+4bda
- FOLLOWUP_NAME: MachineOwner
- IMAGE_NAME: ntkrpamp.exe
- STACK_COMMAND: .cxr 0xffffffff86f447d0 ; kb
- BUCKET_ID: WRONG_SYMBOLS
- Followup: MachineOwner
- ---------
Add Comment
Please, Sign In to add comment