Instant Online Crash Analysis, brought to you by OSR Open Systems Resources, Inc.
Primary Analysis
Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (
[ برای مشاهده لینک ، با نام کاربری خود وارد شوید یا ثبت نام کنید ]
)
Online Crash Dump Analysis Service
See
[ برای مشاهده لینک ، با نام کاربری خود وارد شوید یا ثبت نام کنید ]
for more information
Windows 8 Kernel Version 9600 MP (4 procs) Free x64
Product: Server, suite: TerminalServer DataCenter SingleUserTS
Built by: 9600.16452.amd64fre.winblue_gdr.131030-1505
Machine Name:
Kernel base = 0xfffff800`44a08000 PsLoadedModuleList = 0xfffff800`44ccc990
Debug session time: Sat Feb 20 22:53:52.918 2016 (UTC - 5:00)
System Uptime: 0 days 0
33.650
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800008fb8ed, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
OVERLAPPED_MODULE: Address regions for 'tunnel' and 'WUDFRd.sys' overlap
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
FAULTING_IP:
storport!TranslateScsiRequestBlockToIoInfoSrbExDat a+6d
fffff800`008fb8ed 8b4150 mov eax,dword ptr [rcx+50h]
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: fffff80044cba340: Unable to get special pool info
fffff80044cba340: Unable to get special pool info
GetUlongFromAddress: unable to read from fffff80044d55208
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
BUGCHECK_STR: 0x1e_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT_SERVER
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 2
EXCEPTION_RECORD: 0000000000010031 -- (.exr 0x10031)
Cannot read Exception record @ 0000000000010031
TRAP_FRAME: fffff8000098edd3 -- (.trap 0xfffff8000098edd3)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=4870555350b84110 rsp=144315ff20247c89 rbp=0000040000055086
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=2 ov dn di ng nz na pe cy
ce8b:48705553`50b84110 ?? ???
Resetting default scope
UNALIGNED_STACK_POINTER: 144315ff20247c89
LAST_CONTROL_TRANSFER: from fffff80044bdbe9e to fffff80044b55ca0
CONTEXT: 80005041f704084b -- (.cxr 0x80005041f704084b)
Unable to read context, Win32 error 0n30
STACK_TEXT:
ffffd000`208b0668 fffff800`44bdbe9e : 00000000`0000001e ffffffff`c0000005 fffff800`008fb8ed 00000000`00000000 : nt!KeBugCheckEx
ffffd000`208b0670 fffff800`44b5d1ed : fffff800`44d0b000 fffff800`44a08000 0003ece8`00781000 00000000`00000000 : nt!KiFatalExceptionHandler+0x22
ffffd000`208b06b0 fffff800`44ae3595 : 00000000`00000000 ffffd000`208b07e0 ffffd000`208b1608 00000000`00000000 : nt!RtlpExecuteHandlerForException+0xd
ffffd000`208b06e0 fffff800`44ae445b : ffffd000`208b1608 ffffd000`208b1310 ffffd000`208b1608 ffffe000`027f9290 : nt!RtlDispatchException+0x455
ffffd000`208b0de0 fffff800`44b618c2 : 00000000`00010031 00000000`00000000 fffff800`0098edd3 00000000`00000000 : nt!KiDispatchException+0x61f
ffffd000`208b14d0 fffff800`44b5fdfe : ffffe000`002c6d01 ffffd000`20d71100 00000000`00000005 00000000`00000006 : nt!KiExceptionDispatch+0xc2
ffffd000`208b16b0 fffff800`008fb8ed : 00000000`00000000 00000000`00000000 00000000`00000001 ffffd000`20d83b98 : nt!KiGeneralProtectionFault+0xfe
ffffd000`208b1840 fffff800`008fbc6b : 00000000`e4ec0c81 00000000`00000000 00000000`00000000 ffffe000`00895100 : storport!TranslateScsiRequestBlockToIoInfoSrbExDat a+0x6d
ffffd000`208b1870 fffff800`008e924f : 00000000`002231f1 ffffd000`20d83010 00000000`00000000 ffffe000`015df390 : storport!TranslateToExtendedSrb+0x157
ffffd000`208b18d0 fffff800`008d5ba9 : 00000000`00000320 ffffd000`20d83b98 00000000`40200382 ffffe000`02daa000 : storport!RaidUnitClaimIrp+0x13c4f
ffffd000`208b19d0 fffff800`008d49e9 : ffffe000`00000000 00000000`00000000 ffffd000`208b1b30 ffffe000`00882800 : storport!RaUnitStartIo+0xb9
ffffd000`208b1a60 fffff800`008d94eb : ffffd000`20882f80 00000000`00000000 00000000`00000000 ffffd000`20d83010 : storport!RaidUnitCompleteRequest+0x719
ffffd000`208b1c50 fffff800`44a62d10 : ffffd000`20882f00 ffffd000`208b1e80 00000000`00000000 ffffe000`00304180 : storport!RaidpAdapterRedirectDpcRoutine+0x7b
ffffd000`208b1cf0 fffff800`44a629f0 : ffffe000`007cf040 ffffd000`20880180 00000000`00000008 00000003`c598d5e9 : nt!KiExecuteAllDpcs+0x1b0
ffffd000`208b1e40 fffff800`44b58dd5 : 00000000`00000000 ffffd000`20880180 ffffd000`22086b80 00000000`00000000 : nt!KiRetireDpcList+0xd0
ffffd000`208b1fb0 fffff800`44b58bd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
ffffd000`22086ad0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
FOLLOWUP_IP:
storport!TranslateScsiRequestBlockToIoInfoSrbExDat a+6d
fffff800`008fb8ed 8b4150 mov eax,dword ptr [rcx+50h]
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: storport!TranslateScsiRequestBlockToIoInfoSrbExDat a+6d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: storport
IMAGE_NAME: storport.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5215f857
STACK_COMMAND: .cxr 0x80005041f704084b ; kb
FAILURE_BUCKET_ID: X64_0x1e_c0000005_storport!TranslateScsiRequestBlo ckToIoInfoSrbExData+6d
BUCKET_ID: X64_0x1e_c0000005_storport!TranslateScsiRequestBlo ckToIoInfoSrbExData+6d
Followup: MachineOwner
---------