Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Opened \\.\com1
- Waiting to reconnect...
- Connected to Windows Server 2003 3790 x64 target at (Sun Oct 20 13:09:13.578 2019 (GMT+2)), ptr64 TRUE
- Kernel Debugger connection established.
- Symbol search path is: *** Invalid ***
- ****************************************************************************
- * Symbol loading may be unreliable without a symbol search path. *
- * Use .symfix to have the debugger choose a symbol path. *
- * After setting your symbol path, use .reload to refresh symbol locations. *
- ****************************************************************************
- Executable search path is:
- *********************************************************************
- * Symbols can not be loaded because symbol path is not initialized. *
- * *
- * The Symbol Path can be set by: *
- * using the _NT_SYMBOL_PATH environment variable. *
- * using the -y <symbol_path> argument when starting the debugger. *
- * using .sympath and .sympath+ *
- *********************************************************************
- *** ERROR: Symbol file could not be found. Defaulted to export symbols for ntkrnlmp.exe -
- Windows Server 2003 Kernel Version 3790 MP (1 procs) Free x64
- Built by: 3790.srv03_sp2_rtm.070216-1710
- Machine Name:
- Kernel base = 0xfffff800`01800000 PsLoadedModuleList = 0xfffff800`019d5100
- System Uptime: not available
- Intel Storage Driver Ver: 11.2.0.1006
- KDTARGET: Refreshing KD connection
- *** Fatal System Error: 0x0000000a
- (0xFFFFFADFCB40202A,0x0000000000000002,0x0000000000000000,0xFFFFF800018E2CAE)
- Break instruction exception - code 80000003 (first chance)
- A fatal system error has occurred.
- Debugger entered on first try; Bugcheck callbacks have not been invoked.
- A fatal system error has occurred.
- *********************************************************************
- * Symbols can not be loaded because symbol path is not initialized. *
- * *
- * The Symbol Path can be set by: *
- * using the _NT_SYMBOL_PATH environment variable. *
- * using the -y <symbol_path> argument when starting the debugger. *
- * using .sympath and .sympath+ *
- *********************************************************************
- *** ERROR: Symbol file could not be found. Defaulted to export symbols for ntkrnlmp.exe -
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck A, {fffffadfcb40202a, 2, 0, fffff800018e2cae}
- *** ERROR: Symbol file could not be found. Defaulted to export symbols for ntdll.dll -
- ***** Kernel symbols are WRONG. Please fix symbols to do analysis.
- *** ERROR: Module load completed but symbols could not be loaded for mssmbios.sys
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: nt!_KPRCB ***
- *** ***
- *************************************************************************
- *** ERROR: Symbol file could not be found. Defaulted to export symbols for VIDEOPRT.SYS -
- *** ERROR: Symbol file could not be found. Defaulted to export symbols for win32k.sys -
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: nt!_KPRCB ***
- *** ***
- *************************************************************************
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: nt!_KPRCB ***
- *** ***
- *************************************************************************
- *********************************************************************
- * Symbols can not be loaded because symbol path is not initialized. *
- * *
- * The Symbol Path can be set by: *
- * using the _NT_SYMBOL_PATH environment variable. *
- * using the -y <symbol_path> argument when starting the debugger. *
- * using .sympath and .sympath+ *
- *********************************************************************
- *********************************************************************
- * Symbols can not be loaded because symbol path is not initialized. *
- * *
- * The Symbol Path can be set by: *
- * using the _NT_SYMBOL_PATH environment variable. *
- * using the -y <symbol_path> argument when starting the debugger. *
- * using .sympath and .sympath+ *
- *********************************************************************
- Probably caused by : VIDEOPRT.SYS ( VIDEOPRT!VideoPortSetTrappedEmulatorPorts+5e )
- Followup: MachineOwner
- ---------
- nt!DbgBreakPointWithStatus:
- fffff800`01826db0 cc int 3
- 0: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: fffffadfcb40202a, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000000, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff800018e2cae, address which referenced memory
- Debugging Details:
- ------------------
- ***** Kernel symbols are WRONG. Please fix symbols to do analysis.
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: nt!_KPRCB ***
- *** ***
- *************************************************************************
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: nt!_KPRCB ***
- *** ***
- *************************************************************************
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: nt!_KPRCB ***
- *** ***
- *************************************************************************
- *********************************************************************
- * Symbols can not be loaded because symbol path is not initialized. *
- * *
- * The Symbol Path can be set by: *
- * using the _NT_SYMBOL_PATH environment variable. *
- * using the -y <symbol_path> argument when starting the debugger. *
- * using .sympath and .sympath+ *
- *********************************************************************
- *********************************************************************
- * Symbols can not be loaded because symbol path is not initialized. *
- * *
- * The Symbol Path can be set by: *
- * using the _NT_SYMBOL_PATH environment variable. *
- * using the -y <symbol_path> argument when starting the debugger. *
- * using .sympath and .sympath+ *
- *********************************************************************
- ADDITIONAL_DEBUG_TEXT:
- Use '!findthebuild' command to search for the target build information.
- If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols.
- FAULTING_MODULE: fffff80001800000 nt
- DEBUG_FLR_IMAGE_TIMESTAMP: 45d69799
- READ_ADDRESS: unable to get nt!MmSpecialPoolStart
- unable to get nt!MmSpecialPoolEnd
- unable to get nt!MmPoolCodeStart
- unable to get nt!MmPoolCodeEnd
- fffffadfcb40202a
- CURRENT_IRQL: 0
- FAULTING_IP:
- nt!MmMapIoSpace+46e
- fffff800`018e2cae 668b4e1a mov cx,word ptr [rsi+1Ah]
- DEFAULT_BUCKET_ID: DRIVER_FAULT
- BUGCHECK_STR: 0xA
- LAST_CONTROL_TRANSFER: from fffff800018d673e to fffff80001826db0
- STACK_TEXT:
- fffffadf`ca789098 fffff800`018d673e : 00000000`00000000 00000000`00000000 fffffadf`cb40202a fffff800`0185669e : nt!DbgBreakPointWithStatus
- fffffadf`ca7890a0 fffff800`018d7d0e : fffff800`00000003 00000000`0000000a fffffadf`cb40202a 00000000`00000002 : nt!KeDisconnectInterrupt+0x48e
- fffffadf`ca789100 fffff800`0182ea54 : 00000000`00000300 fffffa80`000a8008 fffff980`00000002 00000000`00000002 : nt!KeDisconnectInterrupt+0x1a5e
- fffffadf`ca789740 fffff800`0182e674 : 00000000`0000000a fffffadf`cb40202a 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx+0x104
- fffffadf`ca789780 fffff800`0182d607 : 00000000`00000011 fffff800`01a9534b fffffadf`00000000 fffffadf`d1f13010 : nt!ZwUnloadKey+0x2314
- fffffadf`ca789900 fffff800`018e2cae : 00000000`0000087b 00000000`00000000 fffffadf`cb400000 00000000`00000000 : nt!ZwUnloadKey+0x12a7
- fffffadf`ca789a90 fffffadf`c938d13e : fffffadf`00000001 00000000`00100000 fffffadf`00000000 fffffa80`00cd7000 : nt!MmMapIoSpace+0x46e
- fffffadf`ca789b60 fffffadf`c93978b3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : VIDEOPRT!VideoPortSetTrappedEmulatorPorts+0x5e
- fffffadf`ca789ba0 fffff800`01a837c9 : fffffadf`cf36a070 fffffadf`d181c650 fffffadf`cf36a070 fffff800`01a83170 : VIDEOPRT!VideoPortCreateEvent+0xf73
- fffffadf`ca789cc0 fffff800`01a81164 : fffffadf`cf36a070 fffffadf`cf36a020 fffffadf`ca789ff0 00000000`00000000 : nt!ObDeleteCapturedInsertInfo+0x8c9
- fffffadf`ca789e70 fffff800`01a85887 : 00000000`00000000 fffffadf`ca789fe0 00000000`00000240 00000000`00000000 : nt!NtQuerySystemInformation+0x3b4
- fffffadf`ca789f80 fffff800`01a92e4d : 00000000`00000001 fffffadf`ca78a4e0 00000000`00000001 fffff800`018241ce : nt!ObOpenObjectByName+0x167
- fffffadf`ca78a170 fffff800`01a99ef7 : fffffa80`0082beb0 fffff800`0183c37e fffffa80`0082be80 00000000`000001e0 : nt!CcFastCopyRead+0x7ed
- fffffadf`ca78a300 fffff800`01a958f9 : 00000000`00000000 fffffa80`00000c40 fffffadf`cecf5c20 fffffadf`cecf4bf0 : nt!IoCreateFile+0xe7
- fffffadf`ca78a3e0 fffff800`0182e3fd : fffffadf`cecf4bf0 fffffadf`ca78a4e0 00000000`00000000 00000000`00000000 : nt!NtOpenFile+0x49
- fffffadf`ca78a460 fffff800`0182e8c0 : fffff800`01a7ec67 00000000`00000000 000007ff`7c5c9620 00000000`00000000 : nt!ZwUnloadKey+0x209d
- fffffadf`ca78a668 fffff800`01a7ec67 : 00000000`00000000 000007ff`7c5c9620 00000000`00000000 00000000`00000001 : nt!ZwUnloadKey+0x2560
- fffffadf`ca78a670 fffff97f`ff008587 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!IoGetDeviceObjectPointer+0x57
- fffffadf`ca78a700 fffff97f`ff00334d : 00000000`00000001 00000000`00000000 00000000`00000003 00000000`00000001 : win32k!EngFindImageProcAddress+0x487
- fffffadf`ca78a900 fffff97f`ff008d8c : fffffadf`ca78aa38 00000000`00000000 00000000`01bc8000 00000000`00000000 : win32k!EngDeleteSafeSemaphore+0x126d
- fffffadf`ca78a970 fffff97f`ff00bb28 : 00000000`01bc8000 00000000`00000000 00000000`00000003 00000000`00000000 : win32k!EngFindImageProcAddress+0xc8c
- fffffadf`ca78a9e0 fffff97f`ff00b646 : 00000000`0000006c fffffadf`ca78acf0 00000000`00000003 00000000`00000068 : win32k!EngFindImageProcAddress+0x3a28
- fffffadf`ca78ac20 fffff800`0182e3fd : fffffadf`000001e0 00000000`00000001 fffffadf`cecf4bf0 00000000`00000020 : win32k!EngFindImageProcAddress+0x3546
- fffffadf`ca78ac70 000007ff`7c7de86a : 000007ff`7c7deaa9 00000000`001657f0 00000000`001657f0 00000000`00000003 : nt!ZwUnloadKey+0x209d
- 00000000`0015fbc8 000007ff`7c7deaa9 : 00000000`001657f0 00000000`001657f0 00000000`00000003 00000000`00000000 : 0x7ff`7c7de86a
- 00000000`0015fbd0 00000000`001657f0 : 00000000`001657f0 00000000`00000003 00000000`00000000 00000000`00000000 : 0x7ff`7c7deaa9
- 00000000`0015fbd8 00000000`001657f0 : 00000000`00000003 00000000`00000000 00000000`00000000 00000000`00000003 : 0x1657f0
- 00000000`0015fbe0 00000000`00000003 : 00000000`00000000 00000000`00000000 00000000`00000003 00000000`001657f0 : 0x1657f0
- 00000000`0015fbe8 00000000`00000000 : 00000000`00000000 00000000`00000003 00000000`001657f0 00000000`77efa1ee : 0x3
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- VIDEOPRT!VideoPortSetTrappedEmulatorPorts+5e
- fffffadf`c938d13e 4c8bcb mov r9,rbx
- SYMBOL_STACK_INDEX: 7
- SYMBOL_NAME: VIDEOPRT!VideoPortSetTrappedEmulatorPorts+5e
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: VIDEOPRT
- IMAGE_NAME: VIDEOPRT.SYS
- BUCKET_ID: WRONG_SYMBOLS
- Followup: MachineOwner
- ---------
Add Comment
Please, Sign In to add comment