Advertisement
josacar

petada hase P2V

Aug 11th, 2011
290
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.36 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5. Opened \\.\com1
  6. Waiting to reconnect...
  7. Connected to Windows Server 2003 3790 x86 compatible target at (Thu Aug 11 08:48:40.280 2011 (GMT-7)), ptr64 FALSE
  8. Kernel Debugger connection established.
  9. WARNING: Inaccessible path: 'c:\symbols\local_symbols'
  10. WARNING: Whitespace at end of path element
  11. Symbol search path is: c:\symbols\local_symbols;SRV*c:\symbols\websymbols*http://msdl.microsoft.com/download/symbols
  12.  
  13. Executable search path is:
  14. Windows Server 2003 Kernel Version 3790 MP (1 procs) Free x86 compatible
  15. Built by: 3790.srv03_sp2_qfe.101019-0340
  16. Machine Name:
  17. Kernel base = 0x80800000 PsLoadedModuleList = 0x808a8ee8
  18. System Uptime: not available
  19.  
  20. *** Fatal System Error: 0x0000007b
  21. (0xF78A6A94,0xC0000034,0x00000000,0x00000000)
  22.  
  23. Break instruction exception - code 80000003 (first chance)
  24.  
  25. A fatal system error has occurred.
  26. Debugger entered on first try; Bugcheck callbacks have not been invoked.
  27.  
  28. A fatal system error has occurred.
  29.  
  30. Connected to Windows Server 2003 3790 x86 compatible target at (Thu Aug 11 08:51:58.478 2011 (GMT-7)), ptr64 FALSE
  31. Loading Kernel Symbols
  32. .........
  33.  
  34. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
  35. Run !sym noisy before .reload to track down problems loading symbols.
  36.  
  37. .......................
  38. Loading User Symbols
  39.  
  40. *******************************************************************************
  41. * *
  42. * Bugcheck Analysis *
  43. * *
  44. *******************************************************************************
  45.  
  46. Use !analyze -v to get detailed debugging information.
  47.  
  48. BugCheck 7B, {f78a6a94, c0000034, 0, 0}
  49.  
  50. Probably caused by : ntkrpamp.exe ( nt!IopMarkBootPartition+f7 )
  51.  
  52. Followup: MachineOwner
  53. ---------
  54.  
  55. nt!RtlpBreakWithStatusInstruction:
  56. 80873588 cc int 3
  57. kd> !analyze -v
  58. *******************************************************************************
  59. * *
  60. * Bugcheck Analysis *
  61. * *
  62. *******************************************************************************
  63.  
  64. INACCESSIBLE_BOOT_DEVICE (7b)
  65. During the initialization of the I/O system, it is possible that the driver
  66. for the boot device failed to initialize the device that the system is
  67. attempting to boot from, or it is possible for the file system that is
  68. supposed to read that device to either fail its initialization or to simply
  69. not recognize the data on the boot device as a file system structure that
  70. it recognizes. In the former case, the argument (#1) is the address of a
  71. Unicode string data structure that is the ARC name of the device from which
  72. the boot was being attempted. In the latter case, the argument (#1) is the
  73. address of the device object that could not be mounted.
  74. If this is the initial setup of the system, then this error can occur if
  75. the system was installed on an unsupported disk or SCSI controller. Note
  76. that some controllers are supported only by drivers which are in the Windows
  77. Driver Library (WDL) which requires the user to do a custom install. See
  78. the Windows Driver Library for more information.
  79. This error can also be caused by the installation of a new SCSI adapter or
  80. disk controller or repartitioning the disk with the system partition. If
  81. this is the case, on x86 systems the boot.ini file must be edited or on ARC
  82. systems setup must be run. See the "Advanced Server System Administrator's
  83. User Guide" for information on changing boot.ini.
  84. If the argument is a pointer to an ARC name string, then the format of the
  85. first two (and in this case only) longwords will be:
  86. USHORT Length;
  87. USHORT MaximumLength;
  88. PWSTR Buffer;
  89. That is, the first longword will contain something like 00800020 where 20
  90. is the actual length of the Unicode string, and the next longword will
  91. contain the address of buffer. This address will be in system space, so
  92. the high order bit will be set.
  93. If the argument is a pointer to a device object, then the format of the first
  94. word will be:
  95. USHORT Type;
  96. That is, the first word will contain a 0003, where the Type code will ALWAYS
  97. be 0003.
  98. Note that this makes it immediately obvious whether the argument is a pointer
  99. to an ARC name string or a device object, since a Unicode string can never
  100. have an odd number of bytes, and a device object will always have a Type
  101. code of 3.
  102. Arguments:
  103. Arg1: f78a6a94, Pointer to the device object or Unicode string of ARC name
  104. Arg2: c0000034
  105. Arg3: 00000000
  106. Arg4: 00000000
  107.  
  108. Debugging Details:
  109. ------------------
  110.  
  111.  
  112. DEFAULT_BUCKET_ID: INTEL_CPU_MICROCODE_ZERO
  113.  
  114. BUGCHECK_STR: 0x7B
  115.  
  116. PROCESS_NAME: System
  117.  
  118. CURRENT_IRQL: 0
  119.  
  120. LAST_CONTROL_TRANSFER: from 80826afb to 80873588
  121.  
  122. STACK_TEXT:
  123. f78a6644 80826afb 00000003 00000000 00000000 nt!RtlpBreakWithStatusInstruction
  124. f78a6690 80827a08 00000003 00000000 80087000 nt!KiBugCheckDebugBreak+0x19
  125. f78a6a28 80827e01 0000007b f78a6a94 c0000034 nt!KeBugCheck2+0x5ea
  126. f78a6a48 80a0981d 0000007b f78a6a94 c0000034 nt!KeBugCheckEx+0x1b
  127. f78a6bb0 80a0bcf3 80087000 00000000 80087000 nt!IopMarkBootPartition+0xf7
  128. f78a6c00 80a085b1 80087000 f78a6c44 00000000 nt!IopInitializeBootDrivers+0x4bb
  129. f78a6c70 80a0672a 80087000 00000000 86ba13d8 nt!IoInitSystem+0x641
  130. f78a6da0 808eab33 80087000 f78a6ddc 8094c0ac nt!Phase1InitializationDiscard+0xad0
  131. f78a6dac 8094c0ac 80087000 00000000 00000000 nt!Phase1Initialization+0xd
  132. f78a6ddc 8088fd5e 808eab26 80087000 00000000 nt!PspSystemThreadStartup+0x2e
  133. 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
  134.  
  135.  
  136. STACK_COMMAND: kb
  137.  
  138. FOLLOWUP_IP:
  139. nt!IopMarkBootPartition+f7
  140. 80a0981d 8d85e0feffff lea eax,[ebp-120h]
  141.  
  142. SYMBOL_STACK_INDEX: 4
  143.  
  144. SYMBOL_NAME: nt!IopMarkBootPartition+f7
  145.  
  146. FOLLOWUP_NAME: MachineOwner
  147.  
  148. MODULE_NAME: nt
  149.  
  150. IMAGE_NAME: ntkrpamp.exe
  151.  
  152. DEBUG_FLR_IMAGE_TIMESTAMP: 4cbd93bc
  153.  
  154. FAILURE_BUCKET_ID: 0x7B_nt!IopMarkBootPartition+f7
  155.  
  156. BUCKET_ID: 0x7B_nt!IopMarkBootPartition+f7
  157.  
  158. Followup: MachineOwner
  159. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement