The errors you are seeing are due to a buggy device driver (or some other 
kernel mode code). the IRQL less or equal can only happen in kernel mode code. 
Based on what I see, the driver was trying to access paged memory while at an 
elevated IRQL (a big no-no for driver code) About the best you can do is to try 
to identify which driver caused the error. If you contact me off list, and make 
arrangements to get the dump file(s) to me , I may be able to give you more 
information.
-----Original Message-----
From: "Travis Rabe" <[EMAIL PROTECTED]>
Sent 10/11/2007 11:22:05 AM
To: [email protected]
Subject: RE: [IMail Forum] OT: Easy way to read a .dmp fileHere are the other 
two – one is similar one is different.  Any help would be greatly appreciated.
TR  ********************************************************************************                                                                            
 **                        Bugcheck Analysis                                    
**                                                                             
******************************************************************************** SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M
 (1000007e)This is a very common bugcheck.  Usually the exception address 
pinpointsthe driver/function that caused the problem.  Always note this 
addressas well as the link date of the driver/image that contains this 
address.Some common problems are exception code 0x80000003.  This means a 
hardcoded breakpoint or assertion was hit, but this system was booted/NODEBUG.  
This is not supposed to happen as developers should never havehardcoded 
breakpoints in retail code, but ...If this happens, make sure a debugger gets 
connected, and thesystem is booted /DEBUG.  This will let us see why this 
breakpoint ishappening.Arguments:Arg1: c0000005, The exception code that was 
not handledArg2: f7b9b93c, The address that the exception occurred atArg3: 
b63b8c30, Exception Record AddressArg4: b63b892c, Context Record 
Address Debugging Details:------------------  EXCEPTION_CODE: (NTSTATUS) 
0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The 
memory could not be "%s". FAULTING_IP: Ntfs!LfsFindLastLsn+2e1f7b9b93c 
83780801        cmp     dword ptr [eax+8],1 EXCEPTION_RECORD:  b63b8c30 -- 
(.exr 0xffffffffb63b8c30)ExceptionAddress: f7b9b93c 
(Ntfs!LfsFindLastLsn+0x000002e1)   ExceptionCode: c0000005 (Access violation)  
ExceptionFlags: 00000000NumberParameters: 2   Parameter[0]: 00000000   
Parameter[1]: 00181008Attempt to read from address 00181008 CONTEXT:  b63b892c 
-- (.cxr 0xffffffffb63b892c)eax=00181000 ebx=00000000 ecx=87b811f0 edx=b63b8d54 
esi=e5e0ada0 edi=b63b8d54eip=f7b9b93c esp=b63b8cf8 ebp=b63b8d04 iopl=0         
nv up ei pl zr na pe nccs=0008  ss=0010  ds=0023  es=0023  fs=0030  
gs=0000             efl=00010246Ntfs!LfsFindLastLsn+0x2e1:f7b9b93c 
83780801        cmp     dword ptr [eax+8],1  ds:0023:00181008=????????Resetting 
default scope CUSTOMER_CRASH_COUNT:  1 DEFAULT_BUCKET_ID:  
DRIVER_FAULT_SERVER_MINIDUMP ERROR_CODE: (NTSTATUS) 0xc0000005 - The 
instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not 
be "%s". READ_ADDRESS:  00181008  BUGCHECK_STR:  0x7E EXCEPTION_STR:  
0x0 LAST_CONTROL_TRANSFER:  from 8080fb63 to f7b9b93c STACK_TEXT:  b63b8d04 
8080fb63 e5e0ada0 00000001 808a3ff0 Ntfs!LfsFindLastLsn+0x2e1b63b8d40 808127a2 
882de238 808ae5c0 8a3911e0 nt!CcSetVacbLargeOffset+0x1a5b63b8d80 8088043d 
8a3911e0 00000000 882de238 nt!FsRtlFastCheckLockForRead+0x3ab63b8dac 80949b7c 
8a3911e0 00000000 00000000 nt!VerifierIrqlData+0x3db63b8ddc 8088e062 80880352 
80000000 00000000 nt!CmpPrefetchHiveFile+0x4eb63b8e84 00000000 00000000 
00000000 00000000 nt!IoReadPartitionTable+0x1f2  FOLLOWUP_IP: 
Ntfs!LfsFindLastLsn+2e1f7b9b93c 83780801        cmp     dword ptr 
[eax+8],1 SYMBOL_STACK_INDEX:  0 SYMBOL_NAME:  
Ntfs!LfsFindLastLsn+2e1 FOLLOWUP_NAME:  MachineOwner MODULE_NAME: 
Ntfs IMAGE_NAME:  Ntfs.sys DEBUG_FLR_IMAGE_TIMESTAMP:  45d6a04b STACK_COMMAND:  
.cxr 0xffffffffb63b892c ; kb FAILURE_BUCKET_ID:  
0x7E_Ntfs!LfsFindLastLsn+2e1 BUCKET_ID:  
0x7E_Ntfs!LfsFindLastLsn+2e1  ********************************************************************************                                                                            
 **                        Bugcheck Analysis                                    
**                                                                             
******************************************************************************** IRQL_NOT_LESS_OR_EQUAL
 (a)An attempt was made to access a pageable (or completely invalid) address at 
aninterrupt request level (IRQL) that is too high.  This is usuallycaused by 
drivers using improper addresses.If a kernel debugger is available get the 
stack backtrace.Arguments:Arg1: 00000005, memory referencedArg2: d0000002, 
IRQLArg3: 00000000, bitfield :                bit 0 : value 0 = read operation, 
1 = write operation                bit 3 : value 0 = not an execute operation, 
1 = execute operation (only on chips which support this level of status)Arg4: 
8080f5db, address which referenced memory Debugging 
Details:------------------  READ_ADDRESS:  00000005  CURRENT_IRQL:  
d0000002 FAULTING_IP: nt!CcGetVacbLargeOffset+1d8080f5db ??              
??? CUSTOMER_CRASH_COUNT:  2 DEFAULT_BUCKET_ID:  
DRIVER_FAULT_SERVER_MINIDUMP BUGCHECK_STR:  0xA LAST_CONTROL_TRANSFER:  from 
8080f5db to 8088c963 STACK_TEXT:  f78d2c1c 8080f5db badb0d00 00000000 8a1bb7a0 
nt!FsRtlNotifyCleanup+0x47f78d2cfc 8080fc56 899cee2c 00000000 00000001 
nt!CcGetVacbLargeOffset+0x1df78d2d40 808127a2 8a394b40 808ae5c0 8a3911e0 
nt!CcReferenceFileOffset+0x5cf78d2d80 8088043d 8a3911e0 00000000 8a394b40 
nt!FsRtlFastCheckLockForRead+0x3af78d2dac 80949b7c 8a3911e0 00000000 00000000 
nt!VerifierIrqlData+0x3df78d2ddc 8088e062 80880352 00000000 00000000 
nt!CmpPrefetchHiveFile+0x4ef78d2e84 00000000 00000000 00000000 00000000 
nt!IoReadPartitionTable+0x1f2  STACK_COMMAND:  kb FOLLOWUP_IP: 
nt!CcGetVacbLargeOffset+1d8080f5db ??              ??? SYMBOL_STACK_INDEX:  
1 FOLLOWUP_NAME:  MachineOwner MODULE_NAME: nt IMAGE_NAME:  
ntkrnlpa.exe DEBUG_FLR_IMAGE_TIMESTAMP:  45ec0a19 SYMBOL_NAME:  
nt!CcGetVacbLargeOffset+1d FAILURE_BUCKET_ID:  
0xA_nt!CcGetVacbLargeOffset+1d BUCKET_ID:  
0xA_nt!CcGetVacbLargeOffset+1d Followup: MachineOwner--------- From: [EMAIL 
PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Travis RabeSent: Thursday, 
October 11, 2007 8:18 AMTo: [EMAIL PROTECTED]: RE: [IMail Forum] OT: Easy way 
to read a .dmp file All,  Starting a few weeks ago on my mail server I get 
various mini dumps here and there.  Is there a good way to read .dmp files?  I 
found a KB article at MS, but it took way too long to do and it didn’t; really 
yield anything useful. Any ideas?[Travis Rabe] OK  here is what I have form one 
of the dump files – any ideas as to what is causing 
this?********************************************************************************                                                                            
 **                        Bugcheck Analysis                                    
**                                                                             
******************************************************************************** IRQL_NOT_LESS_OR_EQUAL
 (a)An attempt was made to access a pageable (or completely invalid) address at 
aninterrupt request level (IRQL) that is too high.  This is usuallycaused by 
drivers using improper addresses.If a kernel debugger is available get the 
stack backtrace.Arguments:Arg1: cc2c2b1c, memory referencedArg2: d0000002, 
IRQLArg3: 00000000, bitfield :                bit 0 : value 0 = read operation, 
1 = write operation                bit 3 : value 0 = not an execute operation, 
1 = execute operation (only on chips which support this level of status)Arg4: 
8080f5b6, address which referenced memory Debugging 
Details:------------------  READ_ADDRESS:  cc2c2b1c  CURRENT_IRQL:  
d0000002 FAULTING_IP: nt!CcGetBcbListHeadLargeOffset+13c8080f5b6 
??              ??? CUSTOMER_CRASH_COUNT:  3 DEFAULT_BUCKET_ID:  
DRIVER_FAULT_SERVER_MINIDUMP BUGCHECK_STR:  0xA LAST_CONTROL_TRANSFER:  from 
8080f5b6 to 8088c963 STACK_TEXT:  f78dac1c 8080f5b6 badb0d00 00000000 87b58bf8 
nt!FsRtlNotifyCleanup+0x47f78dacfc 8080fc56 8864a224 00000000 00000001 
nt!CcGetBcbListHeadLargeOffset+0x13cf78dad40 808127a2 8a394660 808ae5c0 
8a3880b0 nt!CcReferenceFileOffset+0x5cf78dad80 8088043d 8a3880b0 00000000 
8a394660 nt!FsRtlFastCheckLockForRead+0x3af78dadac 80949b7c 8a3880b0 00000000 
00000000 nt!VerifierIrqlData+0x3df78daddc 8088e062 80880352 00000000 00000000 
nt!CmpPrefetchHiveFile+0x4ef78dae84 00000000 00000000 00000000 00000000 
nt!IoReadPartitionTable+0x1f2  STACK_COMMAND:  kb FOLLOWUP_IP: 
nt!CcGetBcbListHeadLargeOffset+13c8080f5b6 ??              
??? SYMBOL_STACK_INDEX:  1 FOLLOWUP_NAME:  MachineOwner MODULE_NAME: 
nt IMAGE_NAME:  ntkrnlpa.exe DEBUG_FLR_IMAGE_TIMESTAMP:  45ec0a19 SYMBOL_NAME:  
nt!CcGetBcbListHeadLargeOffset+13c FAILURE_BUCKET_ID:  
0xA_nt!CcGetBcbListHeadLargeOffset+13c BUCKET_ID:  
0xA_nt!CcGetBcbListHeadLargeOffset+13c Followup: MachineOwner
TR

Reply via email to