The errors you are seeing are due to a buggy device driver (or some other
kernel mode code). the IRQL less or equal can only happen in kernel mode code.
Based on what I see, the driver was trying to access paged memory while at an
elevated IRQL (a big no-no for driver code) About the best you can do is to try
to identify which driver caused the error. If you contact me off list, and make
arrangements to get the dump file(s) to me , I may be able to give you more
information.
-----Original Message-----
From: "Travis Rabe" <[EMAIL PROTECTED]>
Sent 10/11/2007 11:22:05 AM
To: [email protected]
Subject: RE: [IMail Forum] OT: Easy way to read a .dmp fileHere are the other
two – one is similar one is different. Any help would be greatly appreciated.
TR ********************************************************************************
** Bugcheck Analysis
**
******************************************************************************** SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M
(1000007e)This is a very common bugcheck. Usually the exception address
pinpointsthe driver/function that caused the problem. Always note this
addressas well as the link date of the driver/image that contains this
address.Some common problems are exception code 0x80000003. This means a
hardcoded breakpoint or assertion was hit, but this system was booted/NODEBUG.
This is not supposed to happen as developers should never havehardcoded
breakpoints in retail code, but ...If this happens, make sure a debugger gets
connected, and thesystem is booted /DEBUG. This will let us see why this
breakpoint ishappening.Arguments:Arg1: c0000005, The exception code that was
not handledArg2: f7b9b93c, The address that the exception occurred atArg3:
b63b8c30, Exception Record AddressArg4: b63b892c, Context Record
Address Debugging Details:------------------ EXCEPTION_CODE: (NTSTATUS)
0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The
memory could not be "%s". FAULTING_IP: Ntfs!LfsFindLastLsn+2e1f7b9b93c
83780801 cmp dword ptr [eax+8],1 EXCEPTION_RECORD: b63b8c30 --
(.exr 0xffffffffb63b8c30)ExceptionAddress: f7b9b93c
(Ntfs!LfsFindLastLsn+0x000002e1) ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000NumberParameters: 2 Parameter[0]: 00000000
Parameter[1]: 00181008Attempt to read from address 00181008 CONTEXT: b63b892c
-- (.cxr 0xffffffffb63b892c)eax=00181000 ebx=00000000 ecx=87b811f0 edx=b63b8d54
esi=e5e0ada0 edi=b63b8d54eip=f7b9b93c esp=b63b8cf8 ebp=b63b8d04 iopl=0
nv up ei pl zr na pe nccs=0008 ss=0010 ds=0023 es=0023 fs=0030
gs=0000 efl=00010246Ntfs!LfsFindLastLsn+0x2e1:f7b9b93c
83780801 cmp dword ptr [eax+8],1 ds:0023:00181008=????????Resetting
default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID:
DRIVER_FAULT_SERVER_MINIDUMP ERROR_CODE: (NTSTATUS) 0xc0000005 - The
instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not
be "%s". READ_ADDRESS: 00181008 BUGCHECK_STR: 0x7E EXCEPTION_STR:
0x0 LAST_CONTROL_TRANSFER: from 8080fb63 to f7b9b93c STACK_TEXT: b63b8d04
8080fb63 e5e0ada0 00000001 808a3ff0 Ntfs!LfsFindLastLsn+0x2e1b63b8d40 808127a2
882de238 808ae5c0 8a3911e0 nt!CcSetVacbLargeOffset+0x1a5b63b8d80 8088043d
8a3911e0 00000000 882de238 nt!FsRtlFastCheckLockForRead+0x3ab63b8dac 80949b7c
8a3911e0 00000000 00000000 nt!VerifierIrqlData+0x3db63b8ddc 8088e062 80880352
80000000 00000000 nt!CmpPrefetchHiveFile+0x4eb63b8e84 00000000 00000000
00000000 00000000 nt!IoReadPartitionTable+0x1f2 FOLLOWUP_IP:
Ntfs!LfsFindLastLsn+2e1f7b9b93c 83780801 cmp dword ptr
[eax+8],1 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME:
Ntfs!LfsFindLastLsn+2e1 FOLLOWUP_NAME: MachineOwner MODULE_NAME:
Ntfs IMAGE_NAME: Ntfs.sys DEBUG_FLR_IMAGE_TIMESTAMP: 45d6a04b STACK_COMMAND:
.cxr 0xffffffffb63b892c ; kb FAILURE_BUCKET_ID:
0x7E_Ntfs!LfsFindLastLsn+2e1 BUCKET_ID:
0x7E_Ntfs!LfsFindLastLsn+2e1 ********************************************************************************
** Bugcheck Analysis
**
******************************************************************************** IRQL_NOT_LESS_OR_EQUAL
(a)An attempt was made to access a pageable (or completely invalid) address at
aninterrupt request level (IRQL) that is too high. This is usuallycaused by
drivers using improper addresses.If a kernel debugger is available get the
stack backtrace.Arguments:Arg1: 00000005, memory referencedArg2: d0000002,
IRQLArg3: 00000000, bitfield : bit 0 : value 0 = read operation,
1 = write operation bit 3 : value 0 = not an execute operation,
1 = execute operation (only on chips which support this level of status)Arg4:
8080f5db, address which referenced memory Debugging
Details:------------------ READ_ADDRESS: 00000005 CURRENT_IRQL:
d0000002 FAULTING_IP: nt!CcGetVacbLargeOffset+1d8080f5db ??
??? CUSTOMER_CRASH_COUNT: 2 DEFAULT_BUCKET_ID:
DRIVER_FAULT_SERVER_MINIDUMP BUGCHECK_STR: 0xA LAST_CONTROL_TRANSFER: from
8080f5db to 8088c963 STACK_TEXT: f78d2c1c 8080f5db badb0d00 00000000 8a1bb7a0
nt!FsRtlNotifyCleanup+0x47f78d2cfc 8080fc56 899cee2c 00000000 00000001
nt!CcGetVacbLargeOffset+0x1df78d2d40 808127a2 8a394b40 808ae5c0 8a3911e0
nt!CcReferenceFileOffset+0x5cf78d2d80 8088043d 8a3911e0 00000000 8a394b40
nt!FsRtlFastCheckLockForRead+0x3af78d2dac 80949b7c 8a3911e0 00000000 00000000
nt!VerifierIrqlData+0x3df78d2ddc 8088e062 80880352 00000000 00000000
nt!CmpPrefetchHiveFile+0x4ef78d2e84 00000000 00000000 00000000 00000000
nt!IoReadPartitionTable+0x1f2 STACK_COMMAND: kb FOLLOWUP_IP:
nt!CcGetVacbLargeOffset+1d8080f5db ?? ??? SYMBOL_STACK_INDEX:
1 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME:
ntkrnlpa.exe DEBUG_FLR_IMAGE_TIMESTAMP: 45ec0a19 SYMBOL_NAME:
nt!CcGetVacbLargeOffset+1d FAILURE_BUCKET_ID:
0xA_nt!CcGetVacbLargeOffset+1d BUCKET_ID:
0xA_nt!CcGetVacbLargeOffset+1d Followup: MachineOwner--------- From: [EMAIL
PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Travis RabeSent: Thursday,
October 11, 2007 8:18 AMTo: [EMAIL PROTECTED]: RE: [IMail Forum] OT: Easy way
to read a .dmp file All, Starting a few weeks ago on my mail server I get
various mini dumps here and there. Is there a good way to read .dmp files? I
found a KB article at MS, but it took way too long to do and it didn’t; really
yield anything useful. Any ideas?[Travis Rabe] OK here is what I have form one
of the dump files – any ideas as to what is causing
this?********************************************************************************
** Bugcheck Analysis
**
******************************************************************************** IRQL_NOT_LESS_OR_EQUAL
(a)An attempt was made to access a pageable (or completely invalid) address at
aninterrupt request level (IRQL) that is too high. This is usuallycaused by
drivers using improper addresses.If a kernel debugger is available get the
stack backtrace.Arguments:Arg1: cc2c2b1c, memory referencedArg2: d0000002,
IRQLArg3: 00000000, bitfield : bit 0 : value 0 = read operation,
1 = write operation bit 3 : value 0 = not an execute operation,
1 = execute operation (only on chips which support this level of status)Arg4:
8080f5b6, address which referenced memory Debugging
Details:------------------ READ_ADDRESS: cc2c2b1c CURRENT_IRQL:
d0000002 FAULTING_IP: nt!CcGetBcbListHeadLargeOffset+13c8080f5b6
?? ??? CUSTOMER_CRASH_COUNT: 3 DEFAULT_BUCKET_ID:
DRIVER_FAULT_SERVER_MINIDUMP BUGCHECK_STR: 0xA LAST_CONTROL_TRANSFER: from
8080f5b6 to 8088c963 STACK_TEXT: f78dac1c 8080f5b6 badb0d00 00000000 87b58bf8
nt!FsRtlNotifyCleanup+0x47f78dacfc 8080fc56 8864a224 00000000 00000001
nt!CcGetBcbListHeadLargeOffset+0x13cf78dad40 808127a2 8a394660 808ae5c0
8a3880b0 nt!CcReferenceFileOffset+0x5cf78dad80 8088043d 8a3880b0 00000000
8a394660 nt!FsRtlFastCheckLockForRead+0x3af78dadac 80949b7c 8a3880b0 00000000
00000000 nt!VerifierIrqlData+0x3df78daddc 8088e062 80880352 00000000 00000000
nt!CmpPrefetchHiveFile+0x4ef78dae84 00000000 00000000 00000000 00000000
nt!IoReadPartitionTable+0x1f2 STACK_COMMAND: kb FOLLOWUP_IP:
nt!CcGetBcbListHeadLargeOffset+13c8080f5b6 ??
??? SYMBOL_STACK_INDEX: 1 FOLLOWUP_NAME: MachineOwner MODULE_NAME:
nt IMAGE_NAME: ntkrnlpa.exe DEBUG_FLR_IMAGE_TIMESTAMP: 45ec0a19 SYMBOL_NAME:
nt!CcGetBcbListHeadLargeOffset+13c FAILURE_BUCKET_ID:
0xA_nt!CcGetBcbListHeadLargeOffset+13c BUCKET_ID:
0xA_nt!CcGetBcbListHeadLargeOffset+13c Followup: MachineOwner
TR