Advertisement
Guest User

Untitled

a guest
Nov 21st, 2013
38
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.41 KB | None | 0 0
  1. Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
  2. Online Crash Dump Analysis Service
  3. See http://www.osronline.com for more information
  4. Windows 8 Kernel Version 9600 MP (8 procs) Free x64
  5. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  6. Built by: 9600.16404.amd64fre.winblue_gdr.130913-2141
  7. Machine Name:
  8. Kernel base = 0xfffff803`4ce03000 PsLoadedModuleList = 0xfffff803`4d0c7990
  9. Debug session time: Wed Nov 20 18:09:36.582 2013 (UTC - 5:00)
  10. System Uptime: 0 days 0:01:13.302
  11. *******************************************************************************
  12. * *
  13. * Bugcheck Analysis *
  14. * *
  15. *******************************************************************************
  16.  
  17. CACHE_MANAGER (34)
  18. See the comment for FAT_FILE_SYSTEM (0x23)
  19. Arguments:
  20. Arg1: 0000000000051157
  21. Arg2: ffffd00020c575e8
  22. Arg3: ffffd00020c56df0
  23. Arg4: fffff8034d191945
  24.  
  25. Debugging Details:
  26. ------------------
  27.  
  28. TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
  29.  
  30. EXCEPTION_RECORD: ffffd00020c575e8 -- (.exr 0xffffd00020c575e8)
  31. ExceptionAddress: fffff8034d191945 (nt!CcMapAndCopyFromCache+0x0000000000000029)
  32. ExceptionCode: c0000005 (Access violation)
  33. ExceptionFlags: 00000000
  34. NumberParameters: 2
  35. Parameter[0]: 0000000000000000
  36. Parameter[1]: ffffffffffffffff
  37. Attempt to read from address ffffffffffffffff
  38.  
  39. CONTEXT: ffffd00020c56df0 -- (.cxr 0xffffd00020c56df0)
  40. rax=868b41001a452188 rbx=0000000000000005 rcx=ffffe000098909f0
  41. rdx=0000000000340000 rsi=0000000000000000 rdi=0000000000000000
  42. rip=fffff8034d191945 rsp=ffffd00020c57820 rbp=ffffd00020c57b50
  43. r8=00000000000c7000 r9=0000000000000701 r10=ffffe00000250000
  44. r11=0000000000000690 r12=0000000000000001 r13=0000000000000005
  45. r14=0000000000000000 r15=ffffe000098909f0
  46. iopl=0 nv up ei pl zr na po nc
  47. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
  48. nt!CcMapAndCopyFromCache+0x29:
  49. fffff803`4d191945 4c8b7008 mov r14,qword ptr [rax+8] ds:002b:868b4100`1a452190=????????????????
  50. Resetting default scope
  51.  
  52. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  53.  
  54. PROCESS_NAME: System
  55.  
  56. CURRENT_IRQL: 0
  57.  
  58. ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
  59.  
  60. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
  61.  
  62. EXCEPTION_PARAMETER1: 0000000000000000
  63.  
  64. EXCEPTION_PARAMETER2: ffffffffffffffff
  65.  
  66. READ_ADDRESS: fffff8034d0b5340: Unable to get special pool info
  67. fffff8034d0b5340: Unable to get special pool info
  68. GetUlongFromAddress: unable to read from fffff8034d150208
  69. ffffffffffffffff
  70.  
  71. FOLLOWUP_IP:
  72. nt!CcMapAndCopyFromCache+29
  73. fffff803`4d191945 4c8b7008 mov r14,qword ptr [rax+8]
  74.  
  75. FAULTING_IP:
  76. nt!CcMapAndCopyFromCache+29
  77. fffff803`4d191945 4c8b7008 mov r14,qword ptr [rax+8]
  78.  
  79. BUGCHECK_STR: 0x34
  80.  
  81. LAST_CONTROL_TRANSFER: from fffff8034ceb8ecb to fffff8034d191945
  82.  
  83. STACK_TEXT:
  84. ffffd000`20c57820 fffff803`4ceb8ecb : ffffe000`098909f0 00000000`00340000 00000000`00000000 00000000`00000005 : nt!CcMapAndCopyFromCache+0x29
  85. ffffd000`20c578b0 fffff803`4ce8ec45 : 01cee645`94ea2800 ffffe000`0431d160 01cee645`94ea2800 ffffe000`0431d160 : nt!CcPerformReadAhead+0x3a3
  86. ffffd000`20c57a20 fffff803`4ce3d65d : fffff803`4cedc700 00000000`00000000 ffffd000`20c57b00 fffff803`4d0d6c10 : nt!CcWorkerThread+0x25d
  87. ffffd000`20c57ad0 fffff803`4cee6c80 : 1851a337`4d5978a6 ffffe000`003c0880 ffffe000`003c0880 ffffe000`0030b900 : nt!ExpWorkerThread+0x2b5
  88. ffffd000`20c57b80 fffff803`4cf572c6 : ffffd000`20968180 ffffe000`003c0880 ffffd000`20974340 fe1a6d73`afc175c6 : nt!PspSystemThreadStartup+0x58
  89. ffffd000`20c57be0 00000000`00000000 : ffffd000`20c58000 ffffd000`20c51000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
  90.  
  91.  
  92. SYMBOL_STACK_INDEX: 0
  93.  
  94. SYMBOL_NAME: nt!CcMapAndCopyFromCache+29
  95.  
  96. FOLLOWUP_NAME: MachineOwner
  97.  
  98. MODULE_NAME: nt
  99.  
  100. IMAGE_NAME: ntkrnlmp.exe
  101.  
  102. DEBUG_FLR_IMAGE_TIMESTAMP: 52341cf4
  103.  
  104. STACK_COMMAND: .cxr 0xffffd00020c56df0 ; kb
  105.  
  106. FAILURE_BUCKET_ID: X64_0x34_nt!CcMapAndCopyFromCache+29
  107.  
  108. BUCKET_ID: X64_0x34_nt!CcMapAndCopyFromCache+29
  109.  
  110. Followup: MachineOwner
  111. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement