please help me. my server is found BSOD.
Attached is the mini dump file, if anyone can point me in the right direction, I'd appreciate it.
and I'm used debuging tool for windows gen report is below;
Microsoft (R) Windows Debugger Version 6.6.0007.5
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\Mini090306-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: C:\symbols
Executable search path is:
Windows Server 2003 Kernel Version 3790 (Service Pack 1) MP (2 procs) Free x86 compatible
Product: LanManNt, suite: TerminalServer SingleUserTS
Built by: 3790.srv03_sp1_rtm.050324-1447
Kernel base = 0x80800000 PsLoadedModuleList = 0x808af988
Debug session time: Sun Sep 3 10:04:51.281 2006 (GMT+7)
System Uptime: 0 days 8:43:10.046
Loading Kernel Symbols
...........................................................................................................................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {71c106b2, 2, 0, 71c106b2}
Probably caused by : ntkrnlmp.exe ( nt!KiTrap0E+2a7 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 71c106b2, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 71c106b2, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 71c106b2
CURRENT_IRQL: 2
FAULTING_IP:
+71c106b2
71c106b2 ?? ???
PROCESS_NAME: iexplore.exe
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: DRIVER_FAULT_SERVER_MINIDUMP
BUGCHECK_STR: 0xD1
LAST_CONTROL_TRANSFER: from 71c106b2 to 80837ed5
FAILED_INSTRUCTION_ADDRESS:
+71c106b2
71c106b2 ?? ???
STACK_TEXT:
f5447d64 71c106b2 badb0d00 0051f8a4 00000000 nt!KiTrap0E+0x2a7
WARNING: Frame IP not in any known module. Following frames may be wrong.
0051f2a4 00000000 00000000 00000000 00000000 0x71c106b2
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiTrap0E+2a7
80837ed5 833d00ee8a8000 cmp dword ptr [nt!KiFreezeFlag (808aee00)],0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KiTrap0E+2a7
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 42435e60
FAILURE_BUCKET_ID: 0xD1_CODE_AV_BAD_IP_nt!KiTrap0E+2a7
BUCKET_ID: 0xD1_CODE_AV_BAD_IP_nt!KiTrap0E+2a7
Followup: MachineOwner
---------
Attached is the mini dump file, if anyone can point me in the right direction, I'd appreciate it.
and I'm used debuging tool for windows gen report is below;
Microsoft (R) Windows Debugger Version 6.6.0007.5
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\Mini090306-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: C:\symbols
Executable search path is:
Windows Server 2003 Kernel Version 3790 (Service Pack 1) MP (2 procs) Free x86 compatible
Product: LanManNt, suite: TerminalServer SingleUserTS
Built by: 3790.srv03_sp1_rtm.050324-1447
Kernel base = 0x80800000 PsLoadedModuleList = 0x808af988
Debug session time: Sun Sep 3 10:04:51.281 2006 (GMT+7)
System Uptime: 0 days 8:43:10.046
Loading Kernel Symbols
...........................................................................................................................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {71c106b2, 2, 0, 71c106b2}
Probably caused by : ntkrnlmp.exe ( nt!KiTrap0E+2a7 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 71c106b2, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 71c106b2, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 71c106b2
CURRENT_IRQL: 2
FAULTING_IP:
+71c106b2
71c106b2 ?? ???
PROCESS_NAME: iexplore.exe
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: DRIVER_FAULT_SERVER_MINIDUMP
BUGCHECK_STR: 0xD1
LAST_CONTROL_TRANSFER: from 71c106b2 to 80837ed5
FAILED_INSTRUCTION_ADDRESS:
+71c106b2
71c106b2 ?? ???
STACK_TEXT:
f5447d64 71c106b2 badb0d00 0051f8a4 00000000 nt!KiTrap0E+0x2a7
WARNING: Frame IP not in any known module. Following frames may be wrong.
0051f2a4 00000000 00000000 00000000 00000000 0x71c106b2
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiTrap0E+2a7
80837ed5 833d00ee8a8000 cmp dword ptr [nt!KiFreezeFlag (808aee00)],0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KiTrap0E+2a7
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 42435e60
FAILURE_BUCKET_ID: 0xD1_CODE_AV_BAD_IP_nt!KiTrap0E+2a7
BUCKET_ID: 0xD1_CODE_AV_BAD_IP_nt!KiTrap0E+2a7
Followup: MachineOwner
---------