Quantcast
Channel: Windows Performance Toolkit forum
Viewing all articles
Browse latest Browse all 1161

PDC server 2008 SP1 BSOD

$
0
0

Good afternoon,

Im getting the following on our PDC server (2008SP1) after running minidump analyser any assistance appreciated:

Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )

followed by the 

!analyze -v results below: 

============================================================

DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  7601.23455.amd64fre.win7sp1_ldr.160516-0600

SYSTEM_MANUFACTURER:  HP

SYSTEM_PRODUCT_NAME:  ProLiant DL360 G7

SYSTEM_SKU:  579243-421      

BIOS_VENDOR:  HP

BIOS_VERSION:  P68

BIOS_DATE:  12/01/2010

DUMP_TYPE:  2

BUGCHECK_P1: 0

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

CPU_COUNT: 4

CPU_MHZ: 855

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 1a

CPU_STEPPING: 5

CPU_MICROCODE: 6,1a,5,0 (F,M,S,R)  SIG: 15'00000000 (cache) 15'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT_SERVER

BUGCHECK_STR:  0x1E

PROCESS_NAME:  SavService.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  STA-IT-42921

ANALYSIS_SESSION_TIME:  06-29-2016 13:09:47.0050

ANALYSIS_VERSION: 10.0.10586.567 x86fre

EXCEPTION_RECORD:  fffff8800dde3658 -- (.exr 0xfffff8800dde3658)
ExceptionAddress: fffff88009f387b6 (mrxsmb10!MRxSmbDeferredCreate+0x000000000000018a)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000058
Attempt to read from address 0000000000000058

TRAP_FRAME:  fffff8800dde3700 -- (.trap 0xfffff8800dde3700)
Unable to read trap frame at fffff880`0dde3700

LAST_CONTROL_TRANSFER:  from fffff80001867dfe to fffff800018703d0

STACK_TEXT:  
fffff880`0dde2738 fffff800`01867dfe : 00000000`00000000 fffff880`09f1d2c0 fffff880`0dde2810 fffff800`018ca489 : nt!KeBugCheck
fffff880`0dde2740 fffff800`0189c43d : fffff800`01a81e9c fffff800`019c4b50 fffff800`01801000 fffff880`0dde3658 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`0dde2770 fffff800`0189b215 : fffff800`019c4b48 fffff880`0dde27e8 fffff880`0dde3658 fffff800`01801000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`0dde27a0 fffff800`018ac725 : fffff880`0dde3658 fffff880`0dde2eb0 fffff880`00000000 00000000`00000000 : nt!RtlDispatchException+0x415
fffff880`0dde2e80 fffff800`0186fa82 : fffff880`0dde3658 fffff8a0`1a3b4500 fffff880`0dde3700 fffff8a0`07683620 : nt!KiDispatchException+0x135
fffff880`0dde3520 fffff800`0186e5fa : 00000000`00000000 00000000`00000058 00000000`00000000 fffff8a0`1a3b4500 : nt!KiExceptionDispatch+0xc2
fffff880`0dde3700 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23a


STACK_COMMAND:  kb

THREAD_SHA1_HASH_MOD_FUNC:  1969b11298e311f7ad22077b365437264406f280

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  352da74cadef5f48c6668b2bfb724f70820f94af

THREAD_SHA1_HASH_MOD:  30a3e915496deaace47137d5b90c3ecc03746bf6

FOLLOWUP_IP: 
nt!KiKernelCalloutExceptionHandler+e
fffff800`01867dfe 90              nop

FAULT_INSTR_CODE:  cccccc90

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  573a38fc

IMAGE_VERSION:  6.1.7601.23455

FAILURE_BUCKET_ID:  X64_0x1E_nt!KiKernelCalloutExceptionHandler+e

BUCKET_ID:  X64_0x1E_nt!KiKernelCalloutExceptionHandler+e

PRIMARY_PROBLEM_CLASS:  X64_0x1E_nt!KiKernelCalloutExceptionHandler+e

TARGET_TIME:  2016-06-29T08:51:25.000Z

OSBUILD:  7601

OSSERVICEPACK:  1000

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  2

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

OSEDITION:  Windows 7 LanManNt (Service Pack 1) TerminalServer SingleUserTS

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  2016-05-16 22:17:48

BUILDDATESTAMP_STR:  160516-0600

BUILDLAB_STR:  win7sp1_ldr

BUILDOSVER_STR:  6.1.7601.23455.amd64fre.win7sp1_ldr.160516-0600

ANALYSIS_SESSION_ELAPSED_TIME: 8a8

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x1e_nt!kikernelcalloutexceptionhandler+e

FAILURE_ID_HASH:  {31b31670-23d4-78dd-b3a6-d5566ed846e6}

Followup:     MachineOwner

====================================================================


Viewing all articles
Browse latest Browse all 1161

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>