BSOD (minidump)

Status
Not open for further replies.

freshhh

Posts: 7   +0
Hi there :)
Please help me to fix this error!
Thanks.
Freshhh

Minidump :
sharebee.com/5fc898fa

Minidump : sharebee.com/5fc898fa

NOTES :

- file "SCSIPORT.SYS" is not present anywhere in my HD other than in websymbols dir (needed for the Debugger Tool)...
- i don't have any scsi peripherical
- i don't have any scsi card plugged
- i don't use any virtual disk software like Daemon Tools...

Microsoft (R) Windows Debugger Version 6.9.0003.113 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\TEST\MINIDUMP\Mini102208-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*msdl.microsoft.com/download/symbols
Executable search path is:
*** WARNING: Unable to verify checksum for ntkrnlmp.exe
Windows Server 2003 Kernel Version 3790 (Service Pack 2) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 3790.srv03_sp2_gdr.080813-1204
Kernel base = 0xfffff800`01000000 PsLoadedModuleList = 0xfffff800`011d4140
Debug session time: Wed Oct 22 12:31:09.390 2008 (GMT+2)
System Uptime: 0 days 0:04:15.508
*** WARNING: Unable to verify checksum for ntkrnlmp.exe
Loading Kernel Symbols
..................................................................................................................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffffadf9c09aec4, 0, ffffffffffffffff}

*** WARNING: Unable to verify checksum for SCSIPORT.SYS
Probably caused by : SCSIPORT.SYS ( SCSIPORT!ScsiPortInterrupt+44 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffffadf9c09aec4, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

FAULTING_IP:
+fffffadf9c09aec4
fffffadf`9c09aec4 a217a5f39fc41352bc mov byte ptr [BC5213C49FF3A517h],al

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffffffffffffffff

READ_ADDRESS: ffffffffffffffff

CUSTOMER_CRASH_COUNT: 2

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0x1E

PROCESS_NAME: Idle

CURRENT_IRQL: 2

EXCEPTION_RECORD: fffff80000117630 -- (.exr 0xfffff80000117630)
ExceptionAddress: fffffadf9c09aec4
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME: fffff800001176c0 -- (.trap 0xfffff800001176c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000909e3379 rbx=0000000000000000 rcx=0000000000000202
rdx=000000000000082f rsi=0000000000000022 rdi=0000000000000000
rip=fffffadf9c09aec4 rsp=fffff80000117858 rbp=fffff80000117900
r8=000000000000082f r9=fffffadf9cc86bf0 r10=000000000000000f
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
fffffadf`9c09aec4 a217a5f39fc41352bc mov byte ptr [BC5213C49FF3A517h],al ds:0180:bc5213c4`9ff3a517=??
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80001080e86 to fffff8000102e890

STACK_TEXT:
fffff800`00116f38 fffff800`01080e86 : 00000000`0000001e ffffffff`c0000005 fffffadf`9c09aec4 00000000`00000000 : nt!KeBugCheckEx
fffff800`00116f40 fffff800`0102e6af : fffff800`00117630 00000000`00800000 fffff800`001176c0 fffff800`00808000 : nt!KiDispatchException+0x128
fffff800`00117540 fffff800`0102d30d : 00000000`00000000 fffff800`0102f557 00000000`00000000 00000000`00000000 : nt!KiExceptionExit
fffff800`001176c0 fffffadf`9c09aec4 : fffff800`00117860 fffffadf`9c099268 fffff800`00117800 00000000`00000022 : nt!KiGeneralProtectionFault+0xcd
fffff800`00117858 fffff800`00117860 : fffffadf`9c099268 fffff800`00117800 00000000`00000022 00000000`00000000 : 0xfffffadf`9c09aec4
fffff800`00117860 fffffadf`9c099268 : fffff800`00117800 00000000`00000022 00000000`00000000 fffffadf`911a7000 : 0xfffff800`00117860
fffff800`00117868 fffff800`00117800 : 00000000`00000022 00000000`00000000 fffffadf`911a7000 fffffadf`9c75c010 : 0xfffffadf`9c099268
fffff800`00117870 00000000`00000022 : 00000000`00000000 fffffadf`911a7000 fffffadf`9c75c010 00000000`00010000 : 0xfffff800`00117800
fffff800`00117878 00000000`00000000 : fffffadf`911a7000 fffffadf`9c75c010 00000000`00010000 fffff800`0102f700 : 0x22
fffff800`00117880 fffffadf`911a7000 : fffffadf`9c75c010 00000000`00010000 fffff800`0102f700 00000000`00010000 : 0x0
fffff800`00117888 fffffadf`9c75c010 : 00000000`00010000 fffff800`0102f700 00000000`00010000 fffffadf`8ebe0000 : 0xfffffadf`911a7000
fffff800`00117890 00000000`00010000 : fffff800`0102f700 00000000`00010000 fffffadf`8ebe0000 00000000`00000000 : 0xfffffadf`9c75c010
fffff800`00117898 fffff800`0102f700 : 00000000`00010000 fffffadf`8ebe0000 00000000`00000000 fffffadf`9c070000 : 0x10000
fffff800`001178a0 fffffadf`903bc38e : 00000000`00000000 fffffadf`9bfac780 fffffadf`9c099268 f8000011`79800130 : nt!KiScanInterruptObjectList+0x40
fffff800`001178f0 f8000011`00700fff : 00000000`0000ffff f8000011`0000006f fffffadf`9c07ffff 00000000`00000000 : SCSIPORT!ScsiPortInterrupt+0x44
fffff800`00117920 00000000`0000ffff : f8000011`0000006f fffffadf`9c07ffff 00000000`00000000 fffffadf`9bfac630 : 0xf8000011`00700fff
fffff800`00117928 f8000011`0000006f : fffffadf`9c07ffff 00000000`00000000 fffffadf`9bfac630 fffffadf`903bc38e : 0xffff
fffff800`00117930 fffffadf`9c07ffff : 00000000`00000000 fffffadf`9bfac630 fffffadf`903bc38e ffff02df`905159c1 : 0xf8000011`0000006f
fffff800`00117938 00000000`00000000 : fffffadf`9bfac630 fffffadf`903bc38e ffff02df`905159c1 fffffadf`9bfac780 : 0xfffffadf`9c07ffff
fffff800`00117940 fffffadf`9bfac630 : fffffadf`903bc38e ffff02df`905159c1 fffffadf`9bfac780 fffff800`00117a50 : 0x0
fffff800`00117948 fffffadf`903bc38e : ffff02df`905159c1 fffffadf`9bfac780 fffff800`00117a50 fffff800`00117c90 : 0xfffffadf`9bfac630
fffff800`00117950 fffff800`0102f749 : 00000000`00000000 00000000`00000000 9c098e00`001094c8 00000000`fffffadf : SCSIPORT!ScsiPortInterrupt+0x44
fffff800`00117980 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiScanInterruptObjectList+0x89


STACK_COMMAND: kb

FOLLOWUP_IP:
SCSIPORT!ScsiPortInterrupt+44
fffffadf`903bc38e 84c0 test al,al

SYMBOL_STACK_INDEX: e

SYMBOL_NAME: SCSIPORT!ScsiPortInterrupt+44

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: SCSIPORT

IMAGE_NAME: SCSIPORT.SYS

DEBUG_FLR_IMAGE_TIMESTAMP: 45d699d5

FAILURE_BUCKET_ID: X64_0x1E_SCSIPORT!ScsiPortInterrupt+44

BUCKET_ID: X64_0x1E_SCSIPORT!ScsiPortInterrupt+44

Followup: MachineOwner
---------
 
Status
Not open for further replies.
Back