All,

 

 Starting a few weeks ago on my mail server I get various mini dumps here
and there.  Is there a good way to read .dmp files?  I found a KB article at
MS, but it took way too long to do and it didn't; really yield anything
useful.

 

Any ideas?

[Travis Rabe] 

OK  here is what I have form one of the dump files - any ideas as to what is
causing this?

****************************************************************************
***

*
*

*                        Bugcheck Analysis
*

*
*

****************************************************************************
***

 

IRQL_NOT_LESS_OR_EQUAL (a)

An attempt was made to access a pageable (or completely invalid) address at
an

interrupt request level (IRQL) that is too high.  This is usually

caused by drivers using improper addresses.

If a kernel debugger is available get the stack backtrace.

Arguments:

Arg1: cc2c2b1c, memory referenced

Arg2: d0000002, IRQL

Arg3: 00000000, bitfield :

                bit 0 : value 0 = read operation, 1 = write operation

                bit 3 : value 0 = not an execute operation, 1 = execute
operation (only on chips which support this level of status)

Arg4: 8080f5b6, address which referenced memory

 

Debugging Details:

------------------

 

 

READ_ADDRESS:  cc2c2b1c 

 

CURRENT_IRQL:  d0000002

 

FAULTING_IP: 

nt!CcGetBcbListHeadLargeOffset+13c

8080f5b6 ??              ???

 

CUSTOMER_CRASH_COUNT:  3

 

DEFAULT_BUCKET_ID:  DRIVER_FAULT_SERVER_MINIDUMP

 

BUGCHECK_STR:  0xA

 

LAST_CONTROL_TRANSFER:  from 8080f5b6 to 8088c963

 

STACK_TEXT:  

f78dac1c 8080f5b6 badb0d00 00000000 87b58bf8 nt!FsRtlNotifyCleanup+0x47

f78dacfc 8080fc56 8864a224 00000000 00000001
nt!CcGetBcbListHeadLargeOffset+0x13c

f78dad40 808127a2 8a394660 808ae5c0 8a3880b0 nt!CcReferenceFileOffset+0x5c

f78dad80 8088043d 8a3880b0 00000000 8a394660
nt!FsRtlFastCheckLockForRead+0x3a

f78dadac 80949b7c 8a3880b0 00000000 00000000 nt!VerifierIrqlData+0x3d

f78daddc 8088e062 80880352 00000000 00000000 nt!CmpPrefetchHiveFile+0x4e

f78dae84 00000000 00000000 00000000 00000000 nt!IoReadPartitionTable+0x1f2

 

 

STACK_COMMAND:  kb

 

FOLLOWUP_IP: 

nt!CcGetBcbListHeadLargeOffset+13c

8080f5b6 ??              ???

 

SYMBOL_STACK_INDEX:  1

 

FOLLOWUP_NAME:  MachineOwner

 

MODULE_NAME: nt

 

IMAGE_NAME:  ntkrnlpa.exe

 

DEBUG_FLR_IMAGE_TIMESTAMP:  45ec0a19

 

SYMBOL_NAME:  nt!CcGetBcbListHeadLargeOffset+13c

 

FAILURE_BUCKET_ID:  0xA_nt!CcGetBcbListHeadLargeOffset+13c

 

BUCKET_ID:  0xA_nt!CcGetBcbListHeadLargeOffset+13c

 

Followup: MachineOwner


TR

Reply via email to