Here are the other two - one is similar one is different.  Any help would be
greatly appreciated.


TR

 

 

****************************************************************************
***

*
*

*                        Bugcheck Analysis
*

*
*

****************************************************************************
***

 

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)

This is a very common bugcheck.  Usually the exception address pinpoints

the driver/function that caused the problem.  Always note this address

as well as the link date of the driver/image that contains this address.

Some common problems are exception code 0x80000003.  This means a hard

coded breakpoint or assertion was hit, but this system was booted

/NODEBUG.  This is not supposed to happen as developers should never have

hardcoded breakpoints in retail code, but ...

If this happens, make sure a debugger gets connected, and the

system is booted /DEBUG.  This will let us see why this breakpoint is

happening.

Arguments:

Arg1: c0000005, The exception code that was not handled

Arg2: f7b9b93c, The address that the exception occurred at

Arg3: b63b8c30, Exception Record Address

Arg4: b63b892c, Context Record Address

 

Debugging Details:

------------------

 

 

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx"
referenced memory at "0x%08lx". The memory could not be "%s".

 

FAULTING_IP: 

Ntfs!LfsFindLastLsn+2e1

f7b9b93c 83780801        cmp     dword ptr [eax+8],1

 

EXCEPTION_RECORD:  b63b8c30 -- (.exr 0xffffffffb63b8c30)

ExceptionAddress: f7b9b93c (Ntfs!LfsFindLastLsn+0x000002e1)

   ExceptionCode: c0000005 (Access violation)

  ExceptionFlags: 00000000

NumberParameters: 2

   Parameter[0]: 00000000

   Parameter[1]: 00181008

Attempt to read from address 00181008

 

CONTEXT:  b63b892c -- (.cxr 0xffffffffb63b892c)

eax=00181000 ebx=00000000 ecx=87b811f0 edx=b63b8d54 esi=e5e0ada0
edi=b63b8d54

eip=f7b9b93c esp=b63b8cf8 ebp=b63b8d04 iopl=0         nv up ei pl zr na pe
nc

cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000
efl=00010246

Ntfs!LfsFindLastLsn+0x2e1:

f7b9b93c 83780801        cmp     dword ptr [eax+8],1
ds:0023:00181008=????????

Resetting default scope

 

CUSTOMER_CRASH_COUNT:  1

 

DEFAULT_BUCKET_ID:  DRIVER_FAULT_SERVER_MINIDUMP

 

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced
memory at "0x%08lx". The memory could not be "%s".

 

READ_ADDRESS:  00181008 

 

BUGCHECK_STR:  0x7E

 

EXCEPTION_STR:  0x0

 

LAST_CONTROL_TRANSFER:  from 8080fb63 to f7b9b93c

 

STACK_TEXT:  

b63b8d04 8080fb63 e5e0ada0 00000001 808a3ff0 Ntfs!LfsFindLastLsn+0x2e1

b63b8d40 808127a2 882de238 808ae5c0 8a3911e0 nt!CcSetVacbLargeOffset+0x1a5

b63b8d80 8088043d 8a3911e0 00000000 882de238
nt!FsRtlFastCheckLockForRead+0x3a

b63b8dac 80949b7c 8a3911e0 00000000 00000000 nt!VerifierIrqlData+0x3d

b63b8ddc 8088e062 80880352 80000000 00000000 nt!CmpPrefetchHiveFile+0x4e

b63b8e84 00000000 00000000 00000000 00000000 nt!IoReadPartitionTable+0x1f2

 

 

FOLLOWUP_IP: 

Ntfs!LfsFindLastLsn+2e1

f7b9b93c 83780801        cmp     dword ptr [eax+8],1

 

SYMBOL_STACK_INDEX:  0

 

SYMBOL_NAME:  Ntfs!LfsFindLastLsn+2e1

 

FOLLOWUP_NAME:  MachineOwner

 

MODULE_NAME: Ntfs

 

IMAGE_NAME:  Ntfs.sys

 

DEBUG_FLR_IMAGE_TIMESTAMP:  45d6a04b

 

STACK_COMMAND:  .cxr 0xffffffffb63b892c ; kb

 

FAILURE_BUCKET_ID:  0x7E_Ntfs!LfsFindLastLsn+2e1

 

BUCKET_ID:  0x7E_Ntfs!LfsFindLastLsn+2e1

 

 

****************************************************************************
***

*
*

*                        Bugcheck Analysis
*

*
*

****************************************************************************
***

 

IRQL_NOT_LESS_OR_EQUAL (a)

An attempt was made to access a pageable (or completely invalid) address at
an

interrupt request level (IRQL) that is too high.  This is usually

caused by drivers using improper addresses.

If a kernel debugger is available get the stack backtrace.

Arguments:

Arg1: 00000005, memory referenced

Arg2: d0000002, IRQL

Arg3: 00000000, bitfield :

                bit 0 : value 0 = read operation, 1 = write operation

                bit 3 : value 0 = not an execute operation, 1 = execute
operation (only on chips which support this level of status)

Arg4: 8080f5db, address which referenced memory

 

Debugging Details:

------------------

 

 

READ_ADDRESS:  00000005 

 

CURRENT_IRQL:  d0000002

 

FAULTING_IP: 

nt!CcGetVacbLargeOffset+1d

8080f5db ??              ???

 

CUSTOMER_CRASH_COUNT:  2

 

DEFAULT_BUCKET_ID:  DRIVER_FAULT_SERVER_MINIDUMP

 

BUGCHECK_STR:  0xA

 

LAST_CONTROL_TRANSFER:  from 8080f5db to 8088c963

 

STACK_TEXT:  

f78d2c1c 8080f5db badb0d00 00000000 8a1bb7a0 nt!FsRtlNotifyCleanup+0x47

f78d2cfc 8080fc56 899cee2c 00000000 00000001 nt!CcGetVacbLargeOffset+0x1d

f78d2d40 808127a2 8a394b40 808ae5c0 8a3911e0 nt!CcReferenceFileOffset+0x5c

f78d2d80 8088043d 8a3911e0 00000000 8a394b40
nt!FsRtlFastCheckLockForRead+0x3a

f78d2dac 80949b7c 8a3911e0 00000000 00000000 nt!VerifierIrqlData+0x3d

f78d2ddc 8088e062 80880352 00000000 00000000 nt!CmpPrefetchHiveFile+0x4e

f78d2e84 00000000 00000000 00000000 00000000 nt!IoReadPartitionTable+0x1f2

 

 

STACK_COMMAND:  kb

 

FOLLOWUP_IP: 

nt!CcGetVacbLargeOffset+1d

8080f5db ??              ???

 

SYMBOL_STACK_INDEX:  1

 

FOLLOWUP_NAME:  MachineOwner

 

MODULE_NAME: nt

 

IMAGE_NAME:  ntkrnlpa.exe

 

DEBUG_FLR_IMAGE_TIMESTAMP:  45ec0a19

 

SYMBOL_NAME:  nt!CcGetVacbLargeOffset+1d

 

FAILURE_BUCKET_ID:  0xA_nt!CcGetVacbLargeOffset+1d

 

BUCKET_ID:  0xA_nt!CcGetVacbLargeOffset+1d

 

Followup: MachineOwner

---------

 

From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Travis Rabe
Sent: Thursday, October 11, 2007 8:18 AM
To: [email protected]
Subject: RE: [IMail Forum] OT: Easy way to read a .dmp file

 

All,

 

 Starting a few weeks ago on my mail server I get various mini dumps here
and there.  Is there a good way to read .dmp files?  I found a KB article at
MS, but it took way too long to do and it didn't; really yield anything
useful.

 

Any ideas?

[Travis Rabe] 

OK  here is what I have form one of the dump files - any ideas as to what is
causing this?

****************************************************************************
***

*
*

*                        Bugcheck Analysis
*

*
*

****************************************************************************
***

 

IRQL_NOT_LESS_OR_EQUAL (a)

An attempt was made to access a pageable (or completely invalid) address at
an

interrupt request level (IRQL) that is too high.  This is usually

caused by drivers using improper addresses.

If a kernel debugger is available get the stack backtrace.

Arguments:

Arg1: cc2c2b1c, memory referenced

Arg2: d0000002, IRQL

Arg3: 00000000, bitfield :

                bit 0 : value 0 = read operation, 1 = write operation

                bit 3 : value 0 = not an execute operation, 1 = execute
operation (only on chips which support this level of status)

Arg4: 8080f5b6, address which referenced memory

 

Debugging Details:

------------------

 

 

READ_ADDRESS:  cc2c2b1c 

 

CURRENT_IRQL:  d0000002

 

FAULTING_IP: 

nt!CcGetBcbListHeadLargeOffset+13c

8080f5b6 ??              ???

 

CUSTOMER_CRASH_COUNT:  3

 

DEFAULT_BUCKET_ID:  DRIVER_FAULT_SERVER_MINIDUMP

 

BUGCHECK_STR:  0xA

 

LAST_CONTROL_TRANSFER:  from 8080f5b6 to 8088c963

 

STACK_TEXT:  

f78dac1c 8080f5b6 badb0d00 00000000 87b58bf8 nt!FsRtlNotifyCleanup+0x47

f78dacfc 8080fc56 8864a224 00000000 00000001
nt!CcGetBcbListHeadLargeOffset+0x13c

f78dad40 808127a2 8a394660 808ae5c0 8a3880b0 nt!CcReferenceFileOffset+0x5c

f78dad80 8088043d 8a3880b0 00000000 8a394660
nt!FsRtlFastCheckLockForRead+0x3a

f78dadac 80949b7c 8a3880b0 00000000 00000000 nt!VerifierIrqlData+0x3d

f78daddc 8088e062 80880352 00000000 00000000 nt!CmpPrefetchHiveFile+0x4e

f78dae84 00000000 00000000 00000000 00000000 nt!IoReadPartitionTable+0x1f2

 

 

STACK_COMMAND:  kb

 

FOLLOWUP_IP: 

nt!CcGetBcbListHeadLargeOffset+13c

8080f5b6 ??              ???

 

SYMBOL_STACK_INDEX:  1

 

FOLLOWUP_NAME:  MachineOwner

 

MODULE_NAME: nt

 

IMAGE_NAME:  ntkrnlpa.exe

 

DEBUG_FLR_IMAGE_TIMESTAMP:  45ec0a19

 

SYMBOL_NAME:  nt!CcGetBcbListHeadLargeOffset+13c

 

FAILURE_BUCKET_ID:  0xA_nt!CcGetBcbListHeadLargeOffset+13c

 

BUCKET_ID:  0xA_nt!CcGetBcbListHeadLargeOffset+13c

 

Followup: MachineOwner


TR

Reply via email to