All,
Starting a few weeks ago on my mail server I get various mini dumps here
and there. Is there a good way to read .dmp files? I found a KB article at
MS, but it took way too long to do and it didn't; really yield anything
useful.
Any ideas?
[Travis Rabe]
OK here is what I have form one of the dump files - any ideas as to what is
causing this?
****************************************************************************
***
*
*
* Bugcheck Analysis
*
*
*
****************************************************************************
***
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at
an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: cc2c2b1c, memory referenced
Arg2: d0000002, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute
operation (only on chips which support this level of status)
Arg4: 8080f5b6, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: cc2c2b1c
CURRENT_IRQL: d0000002
FAULTING_IP:
nt!CcGetBcbListHeadLargeOffset+13c
8080f5b6 ?? ???
CUSTOMER_CRASH_COUNT: 3
DEFAULT_BUCKET_ID: DRIVER_FAULT_SERVER_MINIDUMP
BUGCHECK_STR: 0xA
LAST_CONTROL_TRANSFER: from 8080f5b6 to 8088c963
STACK_TEXT:
f78dac1c 8080f5b6 badb0d00 00000000 87b58bf8 nt!FsRtlNotifyCleanup+0x47
f78dacfc 8080fc56 8864a224 00000000 00000001
nt!CcGetBcbListHeadLargeOffset+0x13c
f78dad40 808127a2 8a394660 808ae5c0 8a3880b0 nt!CcReferenceFileOffset+0x5c
f78dad80 8088043d 8a3880b0 00000000 8a394660
nt!FsRtlFastCheckLockForRead+0x3a
f78dadac 80949b7c 8a3880b0 00000000 00000000 nt!VerifierIrqlData+0x3d
f78daddc 8088e062 80880352 00000000 00000000 nt!CmpPrefetchHiveFile+0x4e
f78dae84 00000000 00000000 00000000 00000000 nt!IoReadPartitionTable+0x1f2
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!CcGetBcbListHeadLargeOffset+13c
8080f5b6 ?? ???
SYMBOL_STACK_INDEX: 1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlpa.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 45ec0a19
SYMBOL_NAME: nt!CcGetBcbListHeadLargeOffset+13c
FAILURE_BUCKET_ID: 0xA_nt!CcGetBcbListHeadLargeOffset+13c
BUCKET_ID: 0xA_nt!CcGetBcbListHeadLargeOffset+13c
Followup: MachineOwner
TR