Guest User

secure_boot_uefi_asus_debug.txt

a guest
Oct 20th, 2019
444
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1.  
  2. Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5. Opened \\.\com1
  6. Waiting to reconnect...
  7. Connected to Windows Server 2003 3790 x64 target at (Sun Oct 20 13:15:56.515 2019 (GMT+2)), ptr64 TRUE
  8. Kernel Debugger connection established.
  9. Symbol search path is: *** Invalid ***
  10. ****************************************************************************
  11. * Symbol loading may be unreliable without a symbol search path. *
  12. * Use .symfix to have the debugger choose a symbol path. *
  13. * After setting your symbol path, use .reload to refresh symbol locations. *
  14. ****************************************************************************
  15. Executable search path is:
  16. *********************************************************************
  17. * Symbols can not be loaded because symbol path is not initialized. *
  18. * *
  19. * The Symbol Path can be set by: *
  20. * using the _NT_SYMBOL_PATH environment variable. *
  21. * using the -y <symbol_path> argument when starting the debugger. *
  22. * using .sympath and .sympath+ *
  23. *********************************************************************
  24. *** ERROR: Symbol file could not be found. Defaulted to export symbols for ntkrnlmp.exe -
  25. Windows Server 2003 Kernel Version 3790 MP (1 procs) Free x64
  26. Built by: 3790.srv03_sp2_rtm.070216-1710
  27. Machine Name:
  28. Kernel base = 0xfffff800`01800000 PsLoadedModuleList = 0xfffff800`019d5100
  29. System Uptime: not available
  30.  
  31.  
  32. Intel Storage Driver Ver: 11.2.0.1006
  33.  
  34. KDTARGET: Refreshing KD connection
  35.  
  36. *** Fatal System Error: 0x00000050
  37. (0xFFFFF80000090000,0x0000000000000000,0xFFFFF80001CA664D,0x0000000000000000)
  38.  
  39. Break instruction exception - code 80000003 (first chance)
  40.  
  41. A fatal system error has occurred.
  42. Debugger entered on first try; Bugcheck callbacks have not been invoked.
  43.  
  44. A fatal system error has occurred.
  45.  
  46. *********************************************************************
  47. * Symbols can not be loaded because symbol path is not initialized. *
  48. * *
  49. * The Symbol Path can be set by: *
  50. * using the _NT_SYMBOL_PATH environment variable. *
  51. * using the -y <symbol_path> argument when starting the debugger. *
  52. * using .sympath and .sympath+ *
  53. *********************************************************************
  54. *** ERROR: Symbol file could not be found. Defaulted to export symbols for ntkrnlmp.exe -
  55. *******************************************************************************
  56. * *
  57. * Bugcheck Analysis *
  58. * *
  59. *******************************************************************************
  60.  
  61. Use !analyze -v to get detailed debugging information.
  62.  
  63. BugCheck 50, {fffff80000090000, 0, fffff80001ca664d, 0}
  64.  
  65. *** ERROR: Symbol file could not be found. Defaulted to export symbols for ntdll.dll -
  66. ***** Kernel symbols are WRONG. Please fix symbols to do analysis.
  67.  
  68. *** ERROR: Module load completed but symbols could not be loaded for mssmbios.sys
  69. *************************************************************************
  70. *** ***
  71. *** ***
  72. *** Your debugger is not using the correct symbols ***
  73. *** ***
  74. *** In order for this command to work properly, your symbol path ***
  75. *** must point to .pdb files that have full type information. ***
  76. *** ***
  77. *** Certain .pdb files (such as the public OS symbols) do not ***
  78. *** contain the required information. Contact the group that ***
  79. *** provided you with these symbols if you need this command to ***
  80. *** work. ***
  81. *** ***
  82. *** Type referenced: nt!_KPRCB ***
  83. *** ***
  84. *************************************************************************
  85. *** ERROR: Symbol file could not be found. Defaulted to export symbols for hal.dll -
  86. *** ERROR: Symbol file could not be found. Defaulted to export symbols for VIDEOPRT.SYS -
  87. *** ERROR: Module load completed but symbols could not be loaded for igxpmp64.sys
  88. *** ERROR: Symbol file could not be found. Defaulted to export symbols for win32k.sys -
  89. *** ERROR: Symbol file could not be found. Defaulted to export symbols for igxpdv64.DLL -
  90. *** ERROR: Symbol file could not be found. Defaulted to export symbols for igxpgd64.dll -
  91. *** ERROR: Module load completed but symbols could not be loaded for igxprd64.dll
  92. *************************************************************************
  93. *** ***
  94. *** ***
  95. *** Your debugger is not using the correct symbols ***
  96. *** ***
  97. *** In order for this command to work properly, your symbol path ***
  98. *** must point to .pdb files that have full type information. ***
  99. *** ***
  100. *** Certain .pdb files (such as the public OS symbols) do not ***
  101. *** contain the required information. Contact the group that ***
  102. *** provided you with these symbols if you need this command to ***
  103. *** work. ***
  104. *** ***
  105. *** Type referenced: nt!_KPRCB ***
  106. *** ***
  107. *************************************************************************
  108. *************************************************************************
  109. *** ***
  110. *** ***
  111. *** Your debugger is not using the correct symbols ***
  112. *** ***
  113. *** In order for this command to work properly, your symbol path ***
  114. *** must point to .pdb files that have full type information. ***
  115. *** ***
  116. *** Certain .pdb files (such as the public OS symbols) do not ***
  117. *** contain the required information. Contact the group that ***
  118. *** provided you with these symbols if you need this command to ***
  119. *** work. ***
  120. *** ***
  121. *** Type referenced: nt!_KPRCB ***
  122. *** ***
  123. *************************************************************************
  124. *********************************************************************
  125. * Symbols can not be loaded because symbol path is not initialized. *
  126. * *
  127. * The Symbol Path can be set by: *
  128. * using the _NT_SYMBOL_PATH environment variable. *
  129. * using the -y <symbol_path> argument when starting the debugger. *
  130. * using .sympath and .sympath+ *
  131. *********************************************************************
  132. *********************************************************************
  133. * Symbols can not be loaded because symbol path is not initialized. *
  134. * *
  135. * The Symbol Path can be set by: *
  136. * using the _NT_SYMBOL_PATH environment variable. *
  137. * using the -y <symbol_path> argument when starting the debugger. *
  138. * using .sympath and .sympath+ *
  139. *********************************************************************
  140. Probably caused by : igxpmp64.sys ( igxpmp64_fffffadfc93a4000+26a3e )
  141.  
  142. Followup: MachineOwner
  143. ---------
  144.  
  145. nt!DbgBreakPointWithStatus:
  146. fffff800`01826db0 cc int 3
  147. 0: kd> !analyze -v
  148. *******************************************************************************
  149. * *
  150. * Bugcheck Analysis *
  151. * *
  152. *******************************************************************************
  153.  
  154. PAGE_FAULT_IN_NONPAGED_AREA (50)
  155. Invalid system memory was referenced. This cannot be protected by try-except,
  156. it must be protected by a Probe. Typically the address is just plain bad or it
  157. is pointing at freed memory.
  158. Arguments:
  159. Arg1: fffff80000090000, memory referenced.
  160. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
  161. Arg3: fffff80001ca664d, If non-zero, the instruction address which referenced the bad memory
  162. address.
  163. Arg4: 0000000000000000, (reserved)
  164.  
  165. Debugging Details:
  166. ------------------
  167.  
  168. ***** Kernel symbols are WRONG. Please fix symbols to do analysis.
  169.  
  170. *************************************************************************
  171. *** ***
  172. *** ***
  173. *** Your debugger is not using the correct symbols ***
  174. *** ***
  175. *** In order for this command to work properly, your symbol path ***
  176. *** must point to .pdb files that have full type information. ***
  177. *** ***
  178. *** Certain .pdb files (such as the public OS symbols) do not ***
  179. *** contain the required information. Contact the group that ***
  180. *** provided you with these symbols if you need this command to ***
  181. *** work. ***
  182. *** ***
  183. *** Type referenced: nt!_KPRCB ***
  184. *** ***
  185. *************************************************************************
  186. *************************************************************************
  187. *** ***
  188. *** ***
  189. *** Your debugger is not using the correct symbols ***
  190. *** ***
  191. *** In order for this command to work properly, your symbol path ***
  192. *** must point to .pdb files that have full type information. ***
  193. *** ***
  194. *** Certain .pdb files (such as the public OS symbols) do not ***
  195. *** contain the required information. Contact the group that ***
  196. *** provided you with these symbols if you need this command to ***
  197. *** work. ***
  198. *** ***
  199. *** Type referenced: nt!_KPRCB ***
  200. *** ***
  201. *************************************************************************
  202. *************************************************************************
  203. *** ***
  204. *** ***
  205. *** Your debugger is not using the correct symbols ***
  206. *** ***
  207. *** In order for this command to work properly, your symbol path ***
  208. *** must point to .pdb files that have full type information. ***
  209. *** ***
  210. *** Certain .pdb files (such as the public OS symbols) do not ***
  211. *** contain the required information. Contact the group that ***
  212. *** provided you with these symbols if you need this command to ***
  213. *** work. ***
  214. *** ***
  215. *** Type referenced: nt!_KPRCB ***
  216. *** ***
  217. *************************************************************************
  218. *********************************************************************
  219. * Symbols can not be loaded because symbol path is not initialized. *
  220. * *
  221. * The Symbol Path can be set by: *
  222. * using the _NT_SYMBOL_PATH environment variable. *
  223. * using the -y <symbol_path> argument when starting the debugger. *
  224. * using .sympath and .sympath+ *
  225. *********************************************************************
  226. *********************************************************************
  227. * Symbols can not be loaded because symbol path is not initialized. *
  228. * *
  229. * The Symbol Path can be set by: *
  230. * using the _NT_SYMBOL_PATH environment variable. *
  231. * using the -y <symbol_path> argument when starting the debugger. *
  232. * using .sympath and .sympath+ *
  233. *********************************************************************
  234.  
  235. ADDITIONAL_DEBUG_TEXT:
  236. Use '!findthebuild' command to search for the target build information.
  237. If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols.
  238.  
  239. FAULTING_MODULE: fffff80001800000 nt
  240.  
  241. DEBUG_FLR_IMAGE_TIMESTAMP: 4fb0001a
  242.  
  243. READ_ADDRESS: unable to get nt!MmSpecialPoolStart
  244. unable to get nt!MmSpecialPoolEnd
  245. unable to get nt!MmPoolCodeStart
  246. unable to get nt!MmPoolCodeEnd
  247. fffff80000090000
  248.  
  249. FAULTING_IP:
  250. hal!x86BiosExecuteInterrupt+76d
  251. fffff800`01ca664d 0fb608 movzx ecx,byte ptr [rax]
  252.  
  253. MM_INTERNAL_CODE: 0
  254.  
  255. DEFAULT_BUCKET_ID: DRIVER_FAULT
  256.  
  257. BUGCHECK_STR: 0x50
  258.  
  259. CURRENT_IRQL: 0
  260.  
  261. LAST_CONTROL_TRANSFER: from fffff800018d673e to fffff80001826db0
  262.  
  263. STACK_TEXT:
  264. fffffadf`ca7887d8 fffff800`018d673e : 00000000`00000000 fffffadf`ca788f90 fffff800`00090000 fffff800`0185669e : nt!DbgBreakPointWithStatus
  265. fffffadf`ca7887e0 fffff800`018d7d0e : fffff800`00000003 00000000`00000050 fffff800`00090000 00000000`00000000 : nt!KeDisconnectInterrupt+0x48e
  266. fffffadf`ca788840 fffff800`0182ea54 : 00000000`00000100 00000000`00000000 fffffadf`ceb87490 fffffadf`cebf7010 : nt!KeDisconnectInterrupt+0x1a5e
  267. fffffadf`ca788e80 fffff800`018a58f2 : 00000000`00000050 fffff800`00090000 00000000`00000000 fffffadf`ca788f90 : nt!KeBugCheckEx+0x104
  268. fffffadf`ca788ec0 fffff800`0182d519 : 00000000`80000800 00000000`72270000 fffffadf`00000800 fffffadf`ca7890b0 : nt!FsRtlLegalAnsiCharacterArray+0x46a6a
  269. fffffadf`ca788f90 fffff800`01ca664d : fffffadf`d1677400 00000000`00000001 fffffadf`cebe1bc8 fffff800`01a83a47 : nt!ZwUnloadKey+0x11b9
  270. fffffadf`ca789120 fffff800`01c9e189 : fffff800`01cb8cd0 fffff800`01828090 00000000`00000000 fffffadf`ca789190 : hal!x86BiosExecuteInterrupt+0x76d
  271. fffffadf`ca789170 fffffadf`c938d0ac : 00000000`00000000 fffff800`00000000 fffffadf`ca789300 00000000`00000000 : hal!HalCallBios+0x119
  272. fffffadf`ca789200 fffffadf`c93caa3e : 00000000`00000007 fffffadf`c93e0c0a fffffadf`d1b40730 00000000`00000000 : VIDEOPRT!VideoPortInt10+0x9c
  273. fffffadf`ca789250 fffffadf`c9471f58 : fffffadf`cf1f75a8 fffffadf`ca789338 00000804`00000804 fffffadf`c967bc28 : igxpmp64_fffffadfc93a4000+0x26a3e
  274. fffffadf`ca789290 fffffadf`c957a268 : fffffadf`d1b27160 fffffadf`ca789338 00000000`00000000 00000000`00001000 : igxpmp64_fffffadfc93a4000+0xcdf58
  275. fffffadf`ca7892d0 fffffadf`c957a47e : fffffadf`ca789338 fffffadf`c93ca26a fffffadf`43544e49 fffffadf`c93b7b68 : igxpmp64_fffffadfc93a4000+0x1d6268
  276. fffffadf`ca789310 fffffadf`c94ac28c : fffffadf`d1b0d040 00000000`00800000 fffffadf`ceb87490 0000000f`00000000 : igxpmp64_fffffadfc93a4000+0x1d647e
  277. fffffadf`ca789370 fffffadf`c9475c43 : fffffadf`d1b0b000 fffffa01`00800000 00000001`00000000 fffffadf`ca789c98 : igxpmp64_fffffadfc93a4000+0x10828c
  278. fffffadf`ca7893a0 fffffadf`c947b5bc : fffffadf`cf1dac10 fffffadf`ca789768 fffffadf`c968e730 00000000`00000004 : igxpmp64_fffffadfc93a4000+0xd1c43
  279. fffffadf`ca7893d0 fffffadf`c93b3d47 : fffffadf`cf1f75a8 fffffadf`ca789768 00000000`00800000 00000000`00000004 : igxpmp64_fffffadfc93a4000+0xd75bc
  280. fffffadf`ca789410 fffffadf`c93acf34 : fffffadf`cf1f75a8 fffffadf`ca789cf8 fffffadf`d1b40860 00000000`00000000 : igxpmp64_fffffadfc93a4000+0xfd47
  281. fffffadf`ca789c10 fffffadf`c9397777 : fffffadf`cf1f75a8 fffffadf`ca789cf8 00000000`00000000 fffff97f`00000000 : igxpmp64_fffffadfc93a4000+0x8f34
  282. fffffadf`ca789c50 fffff97f`ff08676e : fffffadf`cf1f7070 fffffadf`d1b40700 00000000`c0000002 fffffadf`cf1f7070 : VIDEOPRT!VideoPortCreateEvent+0xe37
  283. fffffadf`ca789d70 fffff97f`ff086671 : 00000000`00000000 fffff97f`fe89372b fffffa80`0006ff00 fffffadf`d1b15000 : win32k!EngDeviceIoControl+0x12e
  284. fffffadf`ca789e30 fffff97f`fe89de39 : fffffadf`ca789e90 00000000`00010246 fffffadf`00001000 fffffa80`00000002 : win32k!EngDeviceIoControl+0x31
  285. fffffadf`ca789e80 fffff97f`fe894b4d : 00000000`00000002 fffff97f`fe89408e fffffa80`00cf8000 fffffadf`d1b15000 : igxpdv64!GmmCreateContext+0x8259
  286. fffffadf`ca789ed0 fffff97f`fe895770 : 00000000`00800000 00000000`00000000 00000000`00000000 00000000`00000000 : igxpdv64+0x6b4d
  287. fffffadf`ca789f20 fffff97f`fe8609f0 : 00000000`00000001 00000000`00000000 fffffa80`00cbc560 fffffadf`d1b150bc : igxpdv64!GmmGetFctTable+0xc10
  288. fffffadf`ca789f50 fffff97f`fe8627f2 : fffffadf`d1b15000 fffffadf`ca789fa0 fffffadf`cf1d8000 fffffadf`ca78a050 : igxpgd64!GetSemaphoreHookedFlags+0x1e30
  289. fffffadf`ca789f80 fffff97f`fe85a9aa : fffffa80`00cc3cd0 fffffadf`00000001 00000000`00000000 fffffadf`ca78a160 : igxpgd64!GetSemaphoreHookedFlags+0x3c32
  290. fffffadf`ca78a0b0 fffff97f`fe86b621 : fffffa80`00cc3cd0 00000000`0000000d 00000000`41200000 00000000`00000000 : igxpgd64!DrvEnableDriver+0x70a
  291. fffffadf`ca78a190 fffff97f`fe8310fe : fffffa80`00cc3cd0 fffff97f`fe83acc8 fffffadf`ceba8e80 fffff800`019b19c0 : igxpgd64!OsFreeMem+0x5621
  292. fffffadf`ca78a1d0 fffff97f`ff004ec9 : fffffa80`00cc3cd0 fffffadf`caaec34b fffffa80`00cbc560 fffffa80`00cc3cd0 : igxprd64+0x90fe
  293. fffffadf`ca78a260 fffff97f`ff0ac414 : fffffadf`ca78a2b0 fffffa80`00b559e0 fffffa80`00cf3000 fffffa80`00cf3000 : win32k!EngFreeModule+0x11d9
  294. fffffadf`ca78a2a0 fffff97f`ff007011 : fffffa80`00cf3000 fffffa80`00d1b4ac fffffa80`006e2f20 fffffa80`00b559e0 : win32k!EngCreateDeviceSurface+0x54
  295. fffffadf`ca78a2f0 fffff97f`ff006c30 : fffffa80`00b10780 fffffa80`00afc6f0 fffffa80`006e2f20 00000000`00000001 : win32k!EngFreeModule+0x3321
  296. fffffadf`ca78a3e0 fffff97f`ff00a7ac : 00000000`00000004 fffffadf`ca78a490 00000000`00000000 00000000`ffffffff : win32k!EngFreeModule+0x2f40
  297. fffffadf`ca78a740 fffff97f`ff008dcd : fffffadf`ffffffff 00000000`00000000 00000000`01bc8000 00000000`00000000 : win32k!EngFindImageProcAddress+0x26ac
  298. fffffadf`ca78a970 fffff97f`ff00bb28 : 00000000`01bc8000 00000000`00000000 00000000`00000003 00000000`00000000 : win32k!EngFindImageProcAddress+0xccd
  299. fffffadf`ca78a9e0 fffff97f`ff00b646 : 00000000`0000006c fffffadf`ca78acf0 00000000`00000003 00000000`00000068 : win32k!EngFindImageProcAddress+0x3a28
  300. fffffadf`ca78ac20 fffff800`0182e3fd : fffffadf`000001e0 00000000`00000001 fffffadf`ceb87490 00000000`00000020 : win32k!EngFindImageProcAddress+0x3546
  301. fffffadf`ca78ac70 000007ff`7c7de86a : 000007ff`7c7deaa9 00000000`001657f0 00000000`001657f0 00000000`00000003 : nt!ZwUnloadKey+0x209d
  302. 00000000`0015fbc8 000007ff`7c7deaa9 : 00000000`001657f0 00000000`001657f0 00000000`00000003 00000000`00000000 : 0x7ff`7c7de86a
  303. 00000000`0015fbd0 00000000`001657f0 : 00000000`001657f0 00000000`00000003 00000000`00000000 00000000`00000000 : 0x7ff`7c7deaa9
  304. 00000000`0015fbd8 00000000`001657f0 : 00000000`00000003 00000000`00000000 00000000`00000000 00000000`00000003 : 0x1657f0
  305. 00000000`0015fbe0 00000000`00000003 : 00000000`00000000 00000000`00000000 00000000`00000003 00000000`001657f0 : 0x1657f0
  306. 00000000`0015fbe8 00000000`00000000 : 00000000`00000000 00000000`00000003 00000000`001657f0 00000000`77efa1ee : 0x3
  307.  
  308.  
  309. STACK_COMMAND: kb
  310.  
  311. FOLLOWUP_IP:
  312. igxpmp64_fffffadfc93a4000+26a3e
  313. fffffadf`c93caa3e 89442420 mov dword ptr [rsp+20h],eax
  314.  
  315. SYMBOL_STACK_INDEX: 9
  316.  
  317. SYMBOL_NAME: igxpmp64_fffffadfc93a4000+26a3e
  318.  
  319. FOLLOWUP_NAME: MachineOwner
  320.  
  321. MODULE_NAME: igxpmp64_fffffadfc93a4000
  322.  
  323. IMAGE_NAME: igxpmp64.sys
  324.  
  325. BUCKET_ID: WRONG_SYMBOLS
  326.  
  327. Followup: MachineOwner
  328. ---------
RAW Paste Data