Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Windows Storage Server 2008 BSOD


  • Please log in to reply
1 reply to this topic

#1 jhwofTN

jhwofTN

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:06:15 AM

Posted 18 June 2012 - 08:44 PM

I have a Buffalo Terrastation WSS that is rebooting. This happened today at 3:30PM after being up for only 11 days since the first occurence. I have downloaded the MS debugging tools and have analyzed the dump per Google's instructions. The contents of this debug are listed below and are confusing to me. I would really like some help troubleshooting this. I am sorry I didn't include any more info but I don't know where to begin.


Loading Dump File [J:\Employees\Jason Winchester\061812-318750-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols;http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: Server, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`01806000 PsLoadedModuleList = 0xfffff800`01a4b670
Debug session time: Mon Jun 18 15:32:03.311 2012 (UTC - 5:00)
System Uptime: 11 days 2:13:40.625
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {a0eea01, 2, 0, fffff800018ff61e}

Probably caused by : partmgr.sys ( partmgr!PmGlobalDispatch+9f )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000a0eea01, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800018ff61e, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001ab5100
GetUlongFromAddress: unable to read from fffff80001ab51c0
000000000a0eea01 Nonpaged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt! ?? ::FNODOBFM::`string'+4f2ce
fffff800`018ff61e 488b01 mov rax,qword ptr [rcx]

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT_SERVER

BUGCHECK_STR: 0xA

PROCESS_NAME: System

TRAP_FRAME: fffff880020fb380 -- (.trap 0xfffff880020fb380)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=000000000a0eea01
rdx=0000000000000004 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800018ff61e rsp=fffff880020fb510 rbp=fffff880020cc180
r8=0000000000000010 r9=0000000000000000 r10=fffffa8002d55f68
r11=fffff880020fb598 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt! ?? ::FNODOBFM::`string'+0x4f2ce:
fffff800`018ff61e 488b01 mov rax,qword ptr [rcx] ds:00000000`0a0eea01=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800018821e9 to fffff80001882c40

STACK_TEXT:
fffff880`020fb238 fffff800`018821e9 : 00000000`0000000a 00000000`0a0eea01 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`020fb240 fffff800`01880e60 : fffffa80`0731acf0 00000000`05b66ba3 05b66ba2`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`020fb380 fffff800`018ff61e : 00000000`00000001 fffffa80`02d55b80 fffffa80`01b901b0 fffffa80`0214edd0 : nt!KiPageFault+0x260
fffff880`020fb510 fffff800`018a4382 : 00000000`00000001 fffff880`00000000 fffffa80`01b904b0 00000000`00000050 : nt! ?? ::FNODOBFM::`string'+0x4f2ce
fffff880`020fb5a0 fffff880`0120a454 : fffffa80`06c7dd70 fffffa80`02d55b80 00000000`5dd29508 00000000`00000000 : nt!IoGetSfioStreamIdentifier+0x22
fffff880`020fb5e0 fffff880`0120b9fa : fffffa80`01b321a0 fffffa80`06c7dd70 00000000`00000103 fffff880`16a7a000 : ataport!IdeStartDeviceRequest+0xb0
fffff880`020fb6a0 fffff880`012074ee : 00000000`00000000 fffffa80`02d55b80 00000000`00000001 fffffa80`06c7dc50 : ataport!IdePortPdoDispatch+0xb6
fffff880`020fb6d0 fffff880`01b33445 : 00000000`00000000 00000000`00000001 fffffa80`06c7dc50 000000bb`a52a1000 : ataport!IdePortDispatch+0x16
fffff880`020fb700 fffff880`01b33975 : fffffa80`01da6010 fffffa80`01b90060 00000000`00020000 fffff800`00000000 : CLASSPNP!ServiceTransferRequest+0x355
fffff880`020fb7a0 fffff880`011c30af : fffffa80`02680410 00000000`00000000 fffffa80`02680570 00000000`00000000 : CLASSPNP!ClassReadWrite+0xd5
fffff880`020fb7f0 fffff880`012eb0f8 : fffffa80`07172870 fffffa80`026805b8 00000000`00000000 fffff880`020cc180 : partmgr!PmGlobalDispatch+0x9f
fffff880`020fb820 fffff880`012f57ad : 00000000`00000000 00000000`00000001 fffffa80`07172910 00000000`00000010 : volmgrx!VMX_IO_DISK_EXTENT::Transfer+0xe8
fffff880`020fb860 fffff880`012ec856 : fffffa80`02680410 00000001`00000000 fffffa80`07172870 fffff880`011c7f81 : volmgrx!VmxpRaid5UpdateParityCompletionRoutine+0x22d
fffff880`020fb8d0 fffff800`01886021 : 00000000`00000000 00000000`00000034 00000000`00000000 00000000`00000001 : volmgrx! ?? ::FNODOBFM::`string'+0x4dd
fffff880`020fb920 fffff880`01b33bce : fffffa80`018b3788 00000000`00000001 00000000`ffffffff 00000000`00000000 : nt!IopfCompleteRequest+0x341
fffff880`020fba10 fffff800`01886021 : 00000000`00000000 fffff880`00eca2f7 fffffa80`03536000 fffff880`00e66479 : CLASSPNP!TransferPktComplete+0x1ce
fffff880`020fba90 fffff880`0120941a : fffffa80`01fa2030 00000000`00000001 fffffa80`06054660 00000000`00000000 : nt!IopfCompleteRequest+0x341
fffff880`020fbb80 fffff880`01209242 : fffffa80`06054660 fffffa80`01fa2030 fffffa80`01fa2030 fffffa80`01fa2030 : ataport!IdeCompleteScsiIrp+0x62
fffff880`020fbbb0 fffff880`01203e32 : 00000000`00000002 00000000`00000000 fffffa80`01fa2030 fffff880`018673d7 : ataport!IdeCommonCrbCompletion+0x5a
fffff880`020fbbe0 fffff880`0120c805 : fffffa80`01b321a0 fffffa80`06054660 00000000`00000000 00000000`00000384 : ataport!IdeTranslateCompletedRequest+0x236
fffff880`020fbd10 fffff880`0120c104 : fffffa80`01b321a0 00000000`00000000 fffffa80`01b321a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
fffff880`020fbe40 fffff800`0188e0ac : fffff880`020cc180 00000000`00000000 fffffa80`01b32050 fffffa80`01b32118 : ataport!IdePortCompletionDpc+0x1a8
fffff880`020fbf00 fffff800`01885765 : 8f8d48ff`fffe84e9 fffffa80`05521b60 00000000`00000000 fffff880`0120bf5c : nt!KiRetireDpcList+0x1bc
fffff880`020fbfb0 fffff800`0188557c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff880`15333030 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue


STACK_COMMAND: kb

FOLLOWUP_IP:
partmgr!PmGlobalDispatch+9f
fffff880`011c30af 8bf0 mov esi,eax

SYMBOL_STACK_INDEX: a

SYMBOL_NAME: partmgr!PmGlobalDispatch+9f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: partmgr

IMAGE_NAME: partmgr.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 4ce792c0

FAILURE_BUCKET_ID: X64_0xA_partmgr!PmGlobalDispatch+9f

BUCKET_ID: X64_0xA_partmgr!PmGlobalDispatch+9f

Followup: MachineOwner
---------

BC AdBot (Login to Remove)

 


#2 dirtdog900

dirtdog900

  • Members
  • 86 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:12:15 PM

Posted 03 July 2012 - 02:27 PM

Is the server fully up to date with all MS patches etc? I would also check for any updated drivers and possibly run a disk check on your drives.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users