Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\richc46\AppData\Local\Temp\Temp19_Windows_NT6_BSOD_jcgriff2[1].zip\Windows_NT6_BSOD_jcgriff2\Mini021411-03.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Vista Kernel Version 6000 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6000.16830.amd64fre.vista_gdr.090302-1506
Machine Name:
Kernel base = 0xfffff800`01800000 PsLoadedModuleList = 0xfffff800`0199af70
Debug session time: Mon Feb 14 12:50:22.321 2011 (GMT-5)
System Uptime: 0 days 0:00:34.820
Loading Kernel Symbols
...............................................................
.............
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffffaa5f59f001a, 2, 0, fffff8000185dd11}
Probably caused by : storport.sys ( storport!RaidpAdapterContinueScatterGather+d8 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffaa5f59f001a, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000185dd11, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800019fa0b0
fffffaa5f59f001a
CURRENT_IRQL: 2
FAULTING_IP:
nt!MmMapLockedPagesSpecifyCache+3d8
fffff800`0185dd11 0fb64b1a movzx ecx,byte ptr [rbx+1Ah]
CUSTOMER_CRASH_COUNT: 3
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff980012d9f00 -- (.trap 0xfffff980012d9f00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000012e7c4963 rbx=0000000000000000 rcx=0000000000000001
rdx=000000000000286c rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000185dd11 rsp=fffff980012da090 rbp=000000000000096b
r8=00000000ca735000 r9=5000a02fb400000f r10=000000fffffff000
r11=0000000000000963 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!MmMapLockedPagesSpecifyCache+0x3d8:
fffff800`0185dd11 0fb64b1a movzx ecx,byte ptr [rbx+1Ah] ds:a300:00000000`0000001a=??
Resetting default scope
LOCK_ADDRESS: fffff800019d0a40 -- (!locks fffff800019d0a40)
Resource @ nt!PiEngineLock (0xfffff800019d0a40) Available
WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.
WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.
1 total locks
PNP_TRIAGE:
Lock address : 0xfffff800019d0a40
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff8000184db33 to fffff8000184dd90
STACK_TEXT:
fffff980`012d9db8 fffff800`0184db33 : 00000000`0000000a fffffaa5`f59f001a 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff980`012d9dc0 fffff800`0184ca0b : 00000000`00000000 fffff6fc`c000dfe0 ffffffff`80000200 00000000`00f8006a : nt!KiBugCheckDispatch+0x73
fffff980`012d9f00 fffff800`0185dd11 : fffffa80`05367f40 fffff800`01ce12ad fffffa80`049643b0 fffff980`012da160 : nt!KiPageFault+0x20b
fffff980`012da090 fffff980`004b729c : fffffa80`050a9660 fffffa80`00000000 fffff980`036e5010 fffffa80`05367f40 : nt!MmMapLockedPagesSpecifyCache+0x3d8
fffff980`012da120 fffff800`01ce085a : fffffa80`050a9660 fffff980`036e5100 00000000`00000018 00000000`00000000 : storport!RaidpAdapterContinueScatterGather+0xd8
fffff980`012da160 fffff800`01ce0ef1 : fffffa80`03a24060 fffffa80`04964b80 fffff980`0009e000 fffff6fc`00000000 : hal!HalpAllocateAdapterCallback+0x146
fffff980`012da200 fffff800`01ce05af : fffff980`036e50b8 00000000`00000008 fffffa80`04964b80 fffffa80`05367f40 : hal!HalAllocateAdapterChannel+0x101
fffff980`012da240 fffff980`004b73d5 : 00000000`00000008 fffffa80`03a241b0 fffffa80`000000a0 fffff980`03eaf000 : hal!HalBuildScatterGatherList+0x2f3
fffff980`012da2b0 fffff980`004c3b7a : fffffa80`0496b1b0 00000000`00000000 fffffa80`04b79fa0 fffffa80`0535ea80 : storport!RaidAdapterScatterGatherExecute+0x8d
fffff980`012da310 fffff980`004bc1cb : fffffa80`0535eaf8 fffffa80`0535eaf8 00000000`00000000 fffffa80`0496b1b0 : storport!RaUnitStartIo+0xe2
fffff980`012da370 fffff980`004c349f : fffffa80`04b79fa0 00000000`00000001 fffffa80`0496b1b0 fffffa80`0535ea80 : storport!RaidStartIoPacket+0x1fb
fffff980`012da3f0 fffff980`004c3112 : 00000000`00000000 00000000`80000000 00000000`63536353 00000000`00000000 : storport!RaidUnitSubmitRequest+0x97
fffff980`012da420 fffff980`004bb3ae : fffffa80`0535ea80 fffffa80`049683e0 00000000`000007ff fffffa80`0496b060 : storport!RaUnitScsiIrp+0xc6
fffff980`012da4a0 fffff980`00221b84 : fffffa80`0535ea80 fffffa80`0535ea80 fffffa80`0535ea80 fffff880`01fa7480 : storport!RaDriverScsiIrp+0x7e
fffff980`012da4e0 fffff980`002299e9 : fffff980`00249b60 00000000`00000004 fffff800`01969200 00000000`00010000 : acpi!ACPIDispatchForwardIrp+0x38
fffff980`012da510 fffff980`00221e1f : fffff980`00249b60 fffffa80`048d9360 00000000`00000000 00000000`00000000 : acpi!ACPIIrpDispatchDeviceControl+0x75
fffff980`012da540 fffff980`03e9dac3 : fffffa80`04c641b0 fffff980`03e9dbda fffffa80`04b79fa0 fffffa80`04c641b0 : acpi!ACPIDispatchIrp+0x12b
fffff980`012da5c0 fffff980`03e9e872 : fffffa80`04b79fa0 00000000`00000000 00000000`00000008 fffffa80`04c64670 : cdrom!ScratchBuffer_SendSynchronousSrb+0x87
fffff980`012da600 fffff980`03ea88e7 : fffffa80`00000000 00000000`00000000 fffffa80`04c64670 fffffa80`04c641b0 : cdrom!CdRompCacheDeviceInquiryData+0xa6
fffff980`012da670 fffff980`00b2456b : fffffa80`04c64100 fffff980`00b1f100 00000000`00000000 fffffa80`04c64000 : cdrom!CdRomInitDevice+0x213
fffff980`012da700 fffff980`00b23ad9 : 00000000`c00000bb fffffa80`00000010 00000000`00000000 00000000`00000000 : CLASSPNP!ClassPnpStartDevice+0x32f
fffff980`012da770 fffff800`01a1c291 : 00000000`00000000 fffffa80`04c69c88 fffffa80`04c69c70 fffffa80`0500d860 : CLASSPNP!ClassDispatchPnp+0x3f5
fffff980`012da800 fffff800`01803086 : 00000000`00000000 fffff800`018f7d90 00000000`00000000 00000000`00000000 : nt!PnpAsynchronousCall+0xd1
fffff980`012da840 fffff800`01a21dec : 00000000`ffffffff fffffa80`0496dde0 00000000`00000000 00000000`00000000 : nt!PnpStartDevice+0xf6
fffff980`012da8f0 fffff800`01a21af7 : fffffa80`0496dde0 00000000`0000003f 00000000`00000000 fffffa80`03962760 : nt!PnpStartDeviceNode+0x2dc
fffff980`012da980 fffff800`01a1b13b : fffffa80`0496dde0 00000000`00000000 fffffa80`03962760 00000000`00000002 : nt!PipProcessStartPhase1+0x77
fffff980`012da9b0 fffff800`01bfdda6 : fffffa80`053cde00 fffff800`018eda46 00000000`00000000 00000000`00000000 : nt!PipProcessDevNodeTree+0x26b
fffff980`012dac20 fffff800`0180348c : 00000001`00000003 fffff800`01b470c2 fffff800`01969200 00000000`32706e50 : nt!PiProcessStartSystemDevices+0x46
fffff980`012dac70 fffff800`01859ea3 : fffff800`019d0be0 fffffa80`039aab01 fffff800`019689d8 00000000`00000000 : nt!PnpDeviceActionWorker+0x1fc
fffff980`012dace0 fffff800`01ae1d5b : fffff800`019d0be0 00000000`00000000 fffffa80`039aabb0 00000000`00000001 : nt!ExpWorkerThread+0x12a
fffff980`012dad50 fffff800`01834686 : fffff980`00ccf180 fffffa80`039aabb0 fffff980`00cd8c40 fffffa80`039aa040 : nt!PspSystemThreadStartup+0x5b
fffff980`012dad80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16