SHARE
TWEET

Untitled

a guest May 27th, 2015 381 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3.  
  4.  
  5. Loading Dump File [C:\Windows\MEMORY.DMP]
  6. Kernel Bitmap Dump File: Only kernel address space is available
  7.  
  8.  
  9. ************* Symbol Path validation summary **************
  10. Response                         Time (ms)     Location
  11. OK                                             c:\symbols\private
  12. Deferred                                       srv*c:\symbols\web*http://msdl.microsoft.com/download/symbols
  13.  
  14. ************* Symbol Path validation summary **************
  15. Response                         Time (ms)     Location
  16. OK                                             c:\symbols\private
  17. Deferred                                       srv*c:\symbols\web*http://msdl.microsoft.com/download/symbols
  18. Symbol search path is: c:\symbols\private;srv*c:\symbols\web*http://msdl.microsoft.com/download/symbols
  19. Executable search path is:
  20. Windows 8 Kernel Version 9600 MP (8 procs) Free x64
  21. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  22. Built by: 9600.17736.amd64fre.winblue_r9.150322-1500
  23. Machine Name:
  24. Kernel base = 0xfffff802`dc676000 PsLoadedModuleList = 0xfffff802`dc94f850
  25. Debug session time: Wed May 27 09:17:12.780 2015 (UTC + 8:00)
  26. System Uptime: 0 days 0:40:20.489
  27. Loading Kernel Symbols
  28. ...............................................................
  29. ................................................................
  30. .................................
  31. Loading User Symbols
  32.  
  33. Loading unloaded module list
  34. ........
  35. *******************************************************************************
  36. *                                                                             *
  37. *                        Bugcheck Analysis                                    *
  38. *                                                                             *
  39. *******************************************************************************
  40.  
  41. Use !analyze -v to get detailed debugging information.
  42.  
  43. BugCheck 133, {0, 501, 500, 0}
  44.  
  45. *** ERROR: Module load completed but symbols could not be loaded for HpCISSs3.sys
  46. Probably caused by : HpCISSs3.sys ( HpCISSs3+cebb )
  47.  
  48. Followup: MachineOwner
  49. ---------
  50.  
  51. 5: kd> !analyze -v
  52. *******************************************************************************
  53. *                                                                             *
  54. *                        Bugcheck Analysis                                    *
  55. *                                                                             *
  56. *******************************************************************************
  57.  
  58. DPC_WATCHDOG_VIOLATION (133)
  59. The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
  60. or above.
  61. Arguments:
  62. Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
  63.         component can usually be identified with a stack trace.
  64. Arg2: 0000000000000501, The DPC time count (in ticks).
  65. Arg3: 0000000000000500, The DPC time allotment (in ticks).
  66. Arg4: 0000000000000000
  67.  
  68. Debugging Details:
  69. ------------------
  70.  
  71.  
  72. DPC_TIMEOUT_TYPE:  SINGLE_DPC_TIMEOUT_EXCEEDED
  73.  
  74. DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
  75.  
  76. BUGCHECK_STR:  0x133
  77.  
  78. PROCESS_NAME:  System
  79.  
  80. CURRENT_IRQL:  d
  81.  
  82. ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
  83.  
  84. LAST_CONTROL_TRANSFER:  from fffff802dc7e1f28 to fffff802dc7c6ca0
  85.  
  86. STACK_TEXT:  
  87. ffffd000`206f1c88 fffff802`dc7e1f28 : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
  88. ffffd000`206f1c90 fffff802`dc6b2f67 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0xad68
  89. ffffd000`206f1d20 fffff802`dc60e67f : fffff802`dc62214c fffff802`dc74d12e ffffe000`962012b0 00000000`00000001 : nt!KeClockInterruptNotify+0x787
  90. ffffd000`206f1f40 fffff802`dc74d143 : ffffe000`96201200 00000000`00000000 ffffd000`206c6340 fffff802`dc676000 : hal!HalpTimerClockInterrupt+0x4f
  91. ffffd000`206f1f70 fffff802`dc7c812a : ffffe000`96201200 00000696`1badc61b 00000000`00000001 fffff969`e454898d : nt!KiCallInterruptServiceRoutine+0xa3
  92. ffffd000`206f1fb0 fffff802`dc7c850f : 00000000`00000000 00000000`00000000 00000028`00000000 00001fa0`007c061c : nt!KiInterruptSubDispatchNoLockNoEtw+0xea
  93. ffffd000`206bf290 fffff802`dc60b6b1 : 00000000`00000010 00000000`00000282 ffffd000`206bf440 00000000`00000018 : nt!KiInterruptDispatchLBControl+0x11f
  94. ffffd000`206bf420 fffff800`e5da1ebb : ffffe000`99dae010 ffffe000`99dae010 00000000`00000000 00000000`00000000 : hal!KeStallExecutionProcessor+0x123
  95. ffffd000`206bf4b0 fffff800`e5da0cb9 : ffffe000`99dae010 ffffe000`99dae010 00000000`00000005 ffffffff`ffffffff : HpCISSs3+0xcebb
  96. ffffd000`206bf510 fffff800`e5d9e468 : ffffe000`000b1000 00000000`00000000 00000000`00000000 ffffe000`9a566010 : HpCISSs3+0xbcb9
  97. ffffd000`206bf6a0 fffff800`e49221e2 : ffffe000`99da91a0 ffffe000`9a566010 ffffe000`9c745002 00000000`00000004 : HpCISSs3+0x9468
  98. ffffd000`206bf6f0 fffff800`e4923d34 : ffffe000`99da91a0 ffffe000`9c745010 ffffe000`99e63050 ffffe000`9bfe5128 : storport!RaCallMiniportAdapterControl+0x22
  99. ffffd000`206bf720 fffff800`e4923bc2 : ffffe000`99da91a0 ffffe000`9c745010 ffffe000`9bfe5010 ffffd000`206bf780 : storport!RaidAdapterRestartAdapter+0x44
  100. ffffd000`206bf750 fffff800`e491c9d3 : ffffe000`99da91a0 00000000`00000000 fffff802`dc7af1fc fffff802`dc71d662 : storport!RaidAdapterPowerUpDeviceCompletionLastStep+0x32
  101. ffffd000`206bf7b0 fffff802`dc71cc00 : ffffd000`206bf990 fffff802`dc966940 ffffd000`206bfba0 ffffe000`99da9118 : storport!RaidpAdapterDpcRoutine+0xf3
  102. ffffd000`206bf890 fffff802`dc71beb7 : 00000000`00000000 00000000`00000000 ffffd000`206c0180 00000000`00000000 : nt!KiExecuteAllDpcs+0x1b0
  103. ffffd000`206bf9e0 fffff802`dc7ca7ea : ffffd000`206c0180 ffffd000`206c0180 ffffd000`206cc3c0 ffffe000`9b65e080 : nt!KiRetireDpcList+0xd7
  104. ffffd000`206bfc60 00000000`00000000 : ffffd000`206c0000 ffffd000`206ba000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
  105.  
  106.  
  107. STACK_COMMAND:  kb
  108.  
  109. FOLLOWUP_IP:
  110. HpCISSs3+cebb
  111. fffff800`e5da1ebb ffc7            inc     edi
  112.  
  113. SYMBOL_STACK_INDEX:  8
  114.  
  115. SYMBOL_NAME:  HpCISSs3+cebb
  116.  
  117. FOLLOWUP_NAME:  MachineOwner
  118.  
  119. MODULE_NAME: HpCISSs3
  120.  
  121. IMAGE_NAME:  HpCISSs3.sys
  122.  
  123. DEBUG_FLR_IMAGE_TIMESTAMP:  546f6971
  124.  
  125. FAILURE_BUCKET_ID:  0x133_DPC_HpCISSs3+cebb
  126.  
  127. BUCKET_ID:  0x133_DPC_HpCISSs3+cebb
  128.  
  129. ANALYSIS_SOURCE:  KM
  130.  
  131. FAILURE_ID_HASH_STRING:  km:0x133_dpc_hpcisss3+cebb
  132.  
  133. FAILURE_ID_HASH:  {ce030135-c8cb-8d6f-1b50-3c5c1e821bd4}
  134.  
  135. Followup: MachineOwner
  136. ---------
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top