Hello, Can someone help me.. Our Server Shutdown and Rebboted twice in the last 36hrs...
Here is the contence of the Memory.dpm file from the second crash..
------------------------
WARNING: Whitespace at end of path element
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [\\PRDEFS01\C$\Windows\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available
WARNING: Whitespace at end of path element
Symbol search path is: C:\websymbols ;SRV*C:\websymbols *http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2003 Kernel Version 3790 (Service Pack 2) MP (4 procs) Free x86 compatible
Product: Server, suite: Enterprise TerminalServer SingleUserTS
Built by: 3790.srv03_sp2_gdr.080813-1204
Machine Name:
Kernel base = 0xe0600000 PsLoadedModuleList = 0xe06a6ea8
Debug session time: Thu Apr 9 12:26:18.968 2009 (GMT-7)
System Uptime: 0 days 12:34:32.218
Loading Kernel Symbols
...............................................................
..............................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 7ffff00c). Type ".hh dbgerr001" for details
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {4, d000001b, 1, e0632a3e}
Page 39c8f1 not present in the dump file. Type ".hh dbgerr004" for details
Page 39c9c5 not present in the dump file. Type ".hh dbgerr004" for details
PEB is paged out (Peb.Ldr = 7ffff00c). Type ".hh dbgerr001" for details
PEB is paged out (Peb.Ldr = 7ffff00c). Type ".hh dbgerr001" for details
Probably caused by : ntkrpamp.exe ( nt!KiFindReadyThread+6a )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000004, memory referenced
Arg2: d000001b, IRQL
Arg3: 00000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: e0632a3e, address which referenced memory
Debugging Details:
------------------
Page 39c8f1 not present in the dump file. Type ".hh dbgerr004" for details
Page 39c9c5 not present in the dump file. Type ".hh dbgerr004" for details
PEB is paged out (Peb.Ldr = 7ffff00c). Type ".hh dbgerr001" for details
PEB is paged out (Peb.Ldr = 7ffff00c). Type ".hh dbgerr001" for details
WRITE_ADDRESS: 00000004
CURRENT_IRQL: 1b
FAULTING_IP:
nt!KiFindReadyThread+6a
e0632a3e 895f04 mov dword ptr [edi+4],ebx
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: sddsrv.exe
TRAP_FRAME: ef55bb60 -- (.trap 0xffffffffef55bb60)
ErrCode = 00000002
eax=00000008 ebx=f1157b50 ecx=00000002 edx=f1157120 esi=feb376c8 edi=00000000
eip=e0632a3e esp=ef55bbd4 ebp=ef55bbec iopl=0 nv up ei pl nz na po cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010203
nt!KiFindReadyThread+0x6a:
e0632a3e 895f04 mov dword ptr [edi+4],ebx ds:0023:00000004=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from e0632a3e to e068c993
STACK_TEXT:
ef55bb60 e0632a3e badb0d00 f1157120 00000000 nt!KiTrap0E+0x2a7
ef55bbec e0633324 febec398 febec320 febec3c8 nt!KiFindReadyThread+0x6a
ef55bc1c e0629a82 febec47c febec320 e085e530 nt!KiSwapThread+0x184
ef55bc64 e0633198 febec4b0 00000005 00000000 nt!KeWaitForSingleObject+0x346
ef55bc7c e062e03f 00000000 00000000 00000000 nt!KiSuspendThread+0x18
ef55bcc4 e0860199 00000000 00000000 00000000 nt!KiDeliverApc+0x117
ef55bce4 e08603d9 00000001 00000000 00000000 hal!HalpDispatchSoftwareInterrupt+0x49
ef55bd00 e0860456 00000000 00000000 ef55bd50 hal!HalpCheckForSoftwareInterrupt+0x81
ef55bd10 e07499f0 00000000 00000000 00000000 hal!KfLowerIrql+0x62
ef55bd50 e068e092 00000000 77e617ec 00000001 nt!PspUserThreadStartup+0x14
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiFindReadyThread+6a
e0632a3e 895f04 mov dword ptr [edi+4],ebx
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiFindReadyThread+6a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 48a2ac75
FAILURE_BUCKET_ID: 0xA_nt!KiFindReadyThread+6a
BUCKET_ID: 0xA_nt!KiFindReadyThread+6a
Followup: MachineOwner
---------
1: kd> .trap 0xffffffffef55bb60
ErrCode = 00000002
eax=00000008 ebx=f1157b50 ecx=00000002 edx=f1157120 esi=feb376c8 edi=00000000
eip=e0632a3e esp=ef55bbd4 ebp=ef55bbec iopl=0 nv up ei pl nz na po cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010203
nt!KiFindReadyThread+0x6a:
e0632a3e 895f04 mov dword ptr [edi+4],ebx ds:0023:00000004=????????
1: kd> lmvm nt
start end module name
e0600000 e085a000 nt (pdb symbols) c:\websymbols\ntkrpamp.pdb\95CD524842DA459FB71F87FF5E1F69EA1\ntkrpamp.pdb
Loaded symbol image file: ntkrpamp.exe
Image path: ntkrpamp.exe
Image name: ntkrpamp.exe
Timestamp: Wed Aug 13 02:42:13 2008 (48A2AC75)
CheckSum: 00247DB0
ImageSize: 0025A000
File version: 5.2.3790.4354
Product version: 5.2.3790.4354
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrpamp.exe
OriginalFilename: ntkrpamp.exe
ProductVersion: 5.2.3790.4354
FileVersion: 5.2.3790.4354 (srv03_sp2_gdr.080813-1204)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.
---------------------------
Bookmarks