Server getting restarted aburptly
Dear Sir We are using Windows 2008 std SP1 server with exchange 2007 SP1 installed on IBM x3650M2 with 4 GB RAM. The server got restarted with minidump. When analyzed the dump with windbg.exe in debugging tools I get> Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [D:\TempStorageDrive\it\Mini020911-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (4 procs) Free x64 Product: Server, suite: Enterprise TerminalServer SingleUserTS Built by: 6002.18005.amd64fre.lh_sp2rtm.090410-1830 Machine Name: Kernel base = 0xfffff800`01818000 PsLoadedModuleList = 0xfffff800`019dcdd0 Debug session time: Wed Feb 9 12:26:41.945 2011 (GMT+6) System Uptime: 6 days 19:02:11.080 Loading Kernel Symbols . Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. .............................................................. ................................................................ ................ Loading User Symbols Loading unloaded module list ............. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck D1, {817c5599, 2, 0, 817c5599} Unable to load image \SystemRoot\system32\DRIVERS\teefer2.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for teefer2.sys *** ERROR: Module load completed but symbols could not be loaded for teefer2.sys Probably caused by : teefer2.sys ( teefer2+602a ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 00000000817c5599, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: 00000000817c5599, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001a3f080 00000000817c5599 CURRENT_IRQL: 2 FAULTING_IP: +0 00000000`817c5599 ?? ??? PROCESS_NAME: System CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: DRIVER_FAULT_SERVER_MINIDUMP BUGCHECK_STR: 0xD1 TRAP_FRAME: fffffa6006b35c10 -- (.trap 0xfffffa6006b35c10) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000817c5599 rbx=0000000000000000 rcx=00000000000183d3 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=00000000817c5599 rsp=fffffa6006b35da8 rbp=fffffa6001155400 r8=00000000000025a8 r9=ffffffffffda8600 r10=00000000000000f1 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc 00000000`817c5599 ?? ??? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800018721ee to fffff80001872450 FAILED_INSTRUCTION_ADDRESS: +0 00000000`817c5599 ?? ??? STACK_TEXT: fffffa60`06b35ac8 fffff800`018721ee : 00000000`0000000a 00000000`817c5599 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffffa60`06b35ad0 fffff800`018710cb : 00000000`00000000 fffffa80`0935b5a0 00000000`00000014 fffffa80`0935b5a0 : nt!KiBugCheckDispatch+0x6e fffffa60`06b35c10 00000000`817c5599 : fffffa60`0106ec76 fffffa80`0935b5a0 fffffa60`01155400 00000000`00000000 : nt!KiPageFault+0x20b fffffa60`06b35da8 fffffa60`0106ec76 : fffffa80`0935b5a0 fffffa60`01155400 00000000`00000000 fffffa80`074364b0 : 0x817c5599 fffffa60`06b35db0 fffffa60`0106de0a : fffffa80`0935b5a0 fffffa80`04379000 fffffa80`0427fe40 fffffa60`06b35e90 : tcpip!TcpCleanupTcbWorkQueueRoutine+0xd6 fffffa60`06b35df0 fffffa60`01068d1a : fffffa80`04378f00 fffffa60`00a08801 fffffa80`04379000 00000000`00000000 : tcpip!TcpTcbReceive+0x6da fffffa60`06b35fa0 fffffa60`0106783f : fffffa80`04548312 00000000`00000000 fffffa80`0632e130 fffffa80`04371900 : tcpip!TcpMatchReceive+0x1ba fffffa60`06b360a0 fffffa60`01062b9d : fffffa80`04371900 00000000`00da7a64 fffffa80`0437dc92 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x2ef fffffa60`06b36130 fffffa60`0105877d : fffffa80`04382e30 fffffa80`05ac8080 fffffa60`06b362f0 fffffa60`010665aa : tcpip!TcpNlClientReceiveDatagrams+0x6d fffffa60`06b36160 fffffa60`01058829 : 00000000`00000000 00000000`00000001 00000000`00000002 fffffa60`06b36318 : tcpip!IppDeliverListToProtocol+0x4d fffffa60`06b36220 fffffa60`01057edb : fffffa60`01143050 fffffa80`0454830a 00000000`00000000 fffffa60`06b362e0 : tcpip!IppProcessDeliverList+0x59 fffffa60`06b36290 fffffa60`0105722c : fffffa80`06383bb0 00000000`00000020 fffffa80`05ac8080 fffffa80`045456fc : tcpip!IppReceiveHeaderBatch+0x22b fffffa60`06b36380 fffffa60`01056814 : fffffa80`0588c440 00000000`00000000 fffffa80`05ab8c01 fffffa60`00000001 : tcpip!IpFlcReceivePackets+0x8dc fffffa60`06b36580 fffffa60`01066503 : fffffa80`05ab8c40 fffffa60`06b366b8 fffffa80`05ab8c40 fffffa60`00970000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x264 fffffa60`06b36660 fffffa60`009a90bc : fffffa80`05ab94e0 fffffa80`0632e030 fffffa60`06b36800 fffffa80`045aa1a0 : tcpip!FlReceiveNetBufferListChain+0xd3 fffffa60`06b366b0 fffffa60`009718c9 : fffffa60`06b36810 00000000`00000000 fffffa80`05ab9a50 00000000`00000001 : NDIS!ndisMIndicateNetBufferListsToOpen+0xac fffffa60`06b36700 fffffa60`0080e5c4 : fffffa80`045aa1a0 00000000`00000002 00000000`00000001 00000000`00000001 : NDIS!ndisMDispatchReceiveNetBufferLists+0x1d9 fffffa60`06b36b80 fffffa60`009a98a6 : fffffa80`00000001 00000000`00000000 fffffa80`0632e030 fffffa60`06b36ce8 : NDIS!ndisMTopReceiveNetBufferLists+0x24 fffffa60`06b36bc0 fffffa60`036dc02a : fffffa80`03cbe110 fffffa60`036e3684 fffffa60`00000001 fffffa80`044ea000 : NDIS!ndisMIndicatePacketsToNetBufferLists+0x106 fffffa60`06b36c60 fffffa80`03cbe110 : fffffa60`036e3684 fffffa60`00000001 fffffa80`044ea000 fffffa80`044ea000 : teefer2+0x602a fffffa60`06b36c68 fffffa60`036e3684 : fffffa60`00000001 fffffa80`044ea000 fffffa80`044ea000 00000000`00000080 : 0xfffffa80`03cbe110 fffffa60`06b36c70 fffffa60`00000001 : fffffa80`044ea000 fffffa80`044ea000 00000000`00000080 00000000`00000000 : teefer2+0xd684 fffffa60`06b36c78 fffffa80`044ea000 : fffffa80`044ea000 00000000`00000080 00000000`00000000 fffffa60`0080d31f : 0xfffffa60`00000001 fffffa60`06b36c80 fffffa80`044ea000 : 00000000`00000080 00000000`00000000 fffffa60`0080d31f fffffa60`01966cc0 : 0xfffffa80`044ea000 fffffa60`06b36c88 00000000`00000080 : 00000000`00000000 fffffa60`0080d31f fffffa60`01966cc0 00000000`00000000 : 0xfffffa80`044ea000 fffffa60`06b36c90 00000000`00000000 : fffffa60`0080d31f fffffa60`01966cc0 00000000`00000000 fffffa60`036dc290 : 0x80 STACK_COMMAND: kb FOLLOWUP_IP: teefer2+602a fffffa60`036dc02a ?? ??? SYMBOL_STACK_INDEX: 13 SYMBOL_NAME: teefer2+602a FOLLOWUP_NAME: MachineOwner MODULE_NAME: teefer2 IMAGE_NAME: teefer2.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4b390a1d FAILURE_BUCKET_ID: X64_0xD1_CODE_AV_BAD_IP_teefer2+602a BUCKET_ID: X64_0xD1_CODE_AV_BAD_IP_teefer2+602a Followup: MachineOwner --------- What should I understand seems to be problem with teefer2.sys how to solve it. I think it is related to symantec Antivirus but not sure. Should I upgrade the version Symantec ?
February 9th, 2011 6:17am

the problem is from Symantec Endpoint please remove it comlpetely and monitor the server for some days or else contact symantec for more help on the presisting issue. See the same issue with windows 7 clients as well http://www.symantec.com/business/support/index?page=content&id=TECH93491&locale=en_UShttp://www.virmansec.com/blogs/skhairuddin
Free Windows Admin Tool Kit Click here and download it now
February 9th, 2011 6:30am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics