markuspeloquin

megasas2.sys dump analysis

Jul 23rd, 2016
290
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.04 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.10586.567 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Users\markus\Desktop\MEMORY.DMP]
  7. Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
  8.  
  9. Symbol search path is: srv*
  10. Executable search path is:
  11. Windows 10 Kernel Version 10586 MP (8 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS
  13. Built by: 10586.494.amd64fre.th2_release_sec.160630-1736
  14. Machine Name:
  15. Kernel base = 0xfffff802`cf201000 PsLoadedModuleList = 0xfffff802`cf4decf0
  16. Debug session time: Sat Jul 23 19:21:48.480 2016 (UTC - 7:00)
  17. System Uptime: 0 days 0:11:26.232
  18. Loading Kernel Symbols
  19. ...............................................................
  20. ................................................................
  21. ..........................................................
  22. Loading User Symbols
  23.  
  24. Loading unloaded module list
  25. ............
  26. *******************************************************************************
  27. * *
  28. * Bugcheck Analysis *
  29. * *
  30. *******************************************************************************
  31.  
  32. Use !analyze -v to get detailed debugging information.
  33.  
  34. BugCheck D1, {828, 2, 0, fffff801bb847e59}
  35.  
  36. *** ERROR: Module load completed but symbols could not be loaded for megasas2.sys
  37. Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
  38. Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
  39. Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
  40. Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
  41. Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
  42. Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
  43. Probably caused by : megasas2.sys ( megasas2+7e59 )
  44.  
  45. Followup: MachineOwner
  46. ---------
  47.  
  48. 6: kd> !analyze -v
  49. *******************************************************************************
  50. * *
  51. * Bugcheck Analysis *
  52. * *
  53. *******************************************************************************
  54.  
  55. DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
  56. An attempt was made to access a pageable (or completely invalid) address at an
  57. interrupt request level (IRQL) that is too high. This is usually
  58. caused by drivers using improper addresses.
  59. If kernel debugger is available get stack backtrace.
  60. Arguments:
  61. Arg1: 0000000000000828, memory referenced
  62. Arg2: 0000000000000002, IRQL
  63. Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
  64. Arg4: fffff801bb847e59, address which referenced memory
  65.  
  66. Debugging Details:
  67. ------------------
  68.  
  69. Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
  70. Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
  71. Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
  72. Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
  73. Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
  74. Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
  75.  
  76. DUMP_CLASS: 1
  77.  
  78. DUMP_QUALIFIER: 401
  79.  
  80. BUILD_VERSION_STRING: 10586.494.amd64fre.th2_release_sec.160630-1736
  81.  
  82. SYSTEM_MANUFACTURER: MSI
  83.  
  84. SYSTEM_PRODUCT_NAME: MS-7640
  85.  
  86. SYSTEM_SKU: To be filled by O.E.M.
  87.  
  88. SYSTEM_VERSION: 2.2
  89.  
  90. BIOS_VENDOR: American Megatrends Inc.
  91.  
  92. BIOS_VERSION: V11.13
  93.  
  94. BIOS_DATE: 10/09/2012
  95.  
  96. BASEBOARD_MANUFACTURER: MSI
  97.  
  98. BASEBOARD_PRODUCT: 990FXA-GD80 (MS-7640)
  99.  
  100. BASEBOARD_VERSION: 2.2
  101.  
  102. DUMP_TYPE: 1
  103.  
  104. BUGCHECK_P1: 828
  105.  
  106. BUGCHECK_P2: 2
  107.  
  108. BUGCHECK_P3: 0
  109.  
  110. BUGCHECK_P4: fffff801bb847e59
  111.  
  112. READ_ADDRESS: 0000000000000828
  113.  
  114. CURRENT_IRQL: 2
  115.  
  116. FAULTING_IP:
  117. megasas2+7e59
  118. fffff801`bb847e59 0fb6840828080000 movzx eax,byte ptr [rax+rcx+828h]
  119.  
  120. CPU_COUNT: 8
  121.  
  122. CPU_MHZ: e10
  123.  
  124. CPU_VENDOR: AuthenticAMD
  125.  
  126. CPU_FAMILY: 15
  127.  
  128. CPU_MODEL: 1
  129.  
  130. CPU_STEPPING: 2
  131.  
  132. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  133.  
  134. BUGCHECK_STR: AV
  135.  
  136. PROCESS_NAME: System
  137.  
  138. ANALYSIS_SESSION_HOST: GALADRIEL
  139.  
  140. ANALYSIS_SESSION_TIME: 07-23-2016 19:44:50.0378
  141.  
  142. ANALYSIS_VERSION: 10.0.10586.567 amd64fre
  143.  
  144. TRAP_FRAME: ffffd000fb07d360 -- (.trap 0xffffd000fb07d360)
  145. NOTE: The trap frame does not contain all registers.
  146. Some register values may be zeroed or incorrect.
  147. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
  148. rdx=ffffe0001b656c50 rsi=0000000000000000 rdi=0000000000000000
  149. rip=fffff801bb847e59 rsp=ffffd000fb07d4f0 rbp=ffffd000fb07d5c0
  150. r8=0000000000000000 r9=00000000fffffffc r10=ffffe000130d7100
  151. r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
  152. r14=0000000000000000 r15=0000000000000000
  153. iopl=0 nv up ei pl nz na pe nc
  154. megasas2+0x7e59:
  155. fffff801`bb847e59 0fb6840828080000 movzx eax,byte ptr [rax+rcx+828h] ds:00000000`00000828=??
  156. Resetting default scope
  157.  
  158. LAST_CONTROL_TRANSFER: from fffff802cf34e4e9 to fffff802cf343940
  159.  
  160. STACK_TEXT:
  161. ffffd000`fb07d218 fffff802`cf34e4e9 : 00000000`0000000a 00000000`00000828 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
  162. ffffd000`fb07d220 fffff802`cf34ccc7 : ffffb001`290edc98 ffffe000`12a009c1 ffffe000`1a3f2a00 ffffb001`26a19c00 : nt!KiBugCheckDispatch+0x69
  163. ffffd000`fb07d360 fffff801`bb847e59 : ffffe000`130dc010 ffffe000`1b656c50 ffffe000`12a419f0 fffff802`00000020 : nt!KiPageFault+0x247
  164. ffffd000`fb07d4f0 fffff801`bb865617 : ffffe000`130dc010 ffffe000`1b656c50 ffffe000`130d71a0 fffff802`cf2c7300 : megasas2+0x7e59
  165. ffffd000`fb07d570 fffff801`bb89305d : ffffe000`110771b0 ffffe000`130d71a0 ffffe000`173e1b70 ffffd000`f8504180 : storport!RaidAdapterPostScatterGatherExecute+0x2e7
  166. ffffd000`fb07d640 fffff801`bb895c96 : 00000000`00000000 fffff802`cf2c7300 fffff802`cf593340 00000000`00000000 : storport!RaUnitStartResetIo+0x229
  167. ffffd000`fb07d750 fffff801`bb863667 : ffffe000`173e1b70 fffff802`cf9cd5ac 00000000`00000000 ffffe000`1b656c50 : storport!RaidUnitSubmitResetRequest+0x256
  168. ffffd000`fb07d7f0 fffff801`bb86303a : ffffe000`1bd21c70 ffffe000`1bab2dc0 00000000`00000000 00000000`00000058 : storport!RaUnitScsiIrp+0x5e7
  169. ffffd000`fb07d890 fffff801`bb866ba5 : ffffe000`173e1b70 ffffd000`fb07da30 ffffe000`1b656c50 fffff801`bb8914e2 : storport!RaDriverScsiIrp+0x5a
  170. ffffd000`fb07d8d0 fffff801`bb89527b : 00000000`00000001 ffffd000`fb07da30 ffffe000`1b656c50 01d1e552`21a22397 : storport!RaSendIrpSynchronous+0x4d
  171. ffffd000`fb07d930 fffff801`bb89449a : ffffe000`110771b0 ffffe000`110771b0 ffffe000`1587c600 00000000`0000003c : storport!RaidUnitResetUnit+0x16f
  172. ffffd000`fb07da80 fffff801`bb893756 : ffffe000`1587c600 ffffe000`1587c600 ffffe000`1587c600 ffffe000`1198c840 : storport!RaidUnitHierarchicalReset+0x4a
  173. ffffd000`fb07dac0 fffff802`cf2ebc40 : ffffe000`1587c600 00000000`00000000 ffffe000`11077060 00000000`00000000 : storport!RaidHierarchicalResetWorkRoutine+0x66
  174. ffffd000`fb07db10 fffff802`cf2d3359 : fffff802`cf593200 ffffe000`1198c700 fffff802`cf2ebb50 fffff802`cf593340 : nt!IopProcessWorkItem+0xf0
  175. ffffd000`fb07db80 fffff802`cf247a45 : 00000204`acbb3dfe 00000000`00000080 ffffe000`110ab700 ffffe000`1198c700 : nt!ExpWorkerThread+0xe9
  176. ffffd000`fb07dc10 fffff802`cf348ae6 : ffffd000`f83a1180 ffffe000`1198c700 fffff802`cf247a04 656d796f`6c706544 : nt!PspSystemThreadStartup+0x41
  177. ffffd000`fb07dc60 00000000`00000000 : ffffd000`fb07e000 ffffd000`fb078000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
  178.  
  179.  
  180. STACK_COMMAND: kb
  181.  
  182. THREAD_SHA1_HASH_MOD_FUNC: b5c965833430d147d9ac8679160b8546a1f280bc
  183.  
  184. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 10904867dae0a1ee3d939249e32a207b82e3b042
  185.  
  186. THREAD_SHA1_HASH_MOD: 3fa70caa4f6358ed15c921954a54df49c1a58f21
  187.  
  188. FOLLOWUP_IP:
  189. megasas2+7e59
  190. fffff801`bb847e59 0fb6840828080000 movzx eax,byte ptr [rax+rcx+828h]
  191.  
  192. FAULT_INSTR_CODE: 884b60f
  193.  
  194. SYMBOL_STACK_INDEX: 3
  195.  
  196. SYMBOL_NAME: megasas2+7e59
  197.  
  198. FOLLOWUP_NAME: MachineOwner
  199.  
  200. MODULE_NAME: megasas2
  201.  
  202. IMAGE_NAME: megasas2.sys
  203.  
  204. DEBUG_FLR_IMAGE_TIMESTAMP: 5654587f
  205.  
  206. BUCKET_ID_FUNC_OFFSET: 7e59
  207.  
  208. FAILURE_BUCKET_ID: AV_megasas2!Unknown_Function
  209.  
  210. BUCKET_ID: AV_megasas2!Unknown_Function
  211.  
  212. PRIMARY_PROBLEM_CLASS: AV_megasas2!Unknown_Function
  213.  
  214. TARGET_TIME: 2016-07-24T02:21:48.000Z
  215.  
  216. OSBUILD: 10586
  217.  
  218. OSSERVICEPACK: 0
  219.  
  220. SERVICEPACK_NUMBER: 0
  221.  
  222. OS_REVISION: 0
  223.  
  224. SUITE_MASK: 272
  225.  
  226. PRODUCT_TYPE: 1
  227.  
  228. OSPLATFORM_TYPE: x64
  229.  
  230. OSNAME: Windows 10
  231.  
  232. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  233.  
  234. OS_LOCALE:
  235.  
  236. USER_LCID: 0
  237.  
  238. OSBUILD_TIMESTAMP: 2016-06-30 20:26:45
  239.  
  240. BUILDDATESTAMP_STR: 160630-1736
  241.  
  242. BUILDLAB_STR: th2_release_sec
  243.  
  244. BUILDOSVER_STR: 10.0.10586.494.amd64fre.th2_release_sec.160630-1736
  245.  
  246. ANALYSIS_SESSION_ELAPSED_TIME: 649
  247.  
  248. ANALYSIS_SOURCE: KM
  249.  
  250. FAILURE_ID_HASH_STRING: km:av_megasas2!unknown_function
  251.  
  252. FAILURE_ID_HASH: {7ad21202-9042-0960-fe2c-e4a26fd8982f}
  253.  
  254. Followup: MachineOwner
  255. ---------
Add Comment
Please, Sign In to add comment