Good afternoon,
Im getting the following on our PDC server (2008SP1) after running minidump analyser any assistance appreciated:
Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )
followed by the
!analyze -v results below:
============================================================
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.23455.amd64fre.win7sp1_ldr.160516-0600
SYSTEM_MANUFACTURER: HP
SYSTEM_PRODUCT_NAME: ProLiant DL360 G7
SYSTEM_SKU: 579243-421
BIOS_VENDOR: HP
BIOS_VERSION: P68
BIOS_DATE: 12/01/2010
DUMP_TYPE: 2
BUGCHECK_P1: 0
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
CPU_COUNT: 4
CPU_MHZ: 855
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 1a
CPU_STEPPING: 5
CPU_MICROCODE: 6,1a,5,0 (F,M,S,R) SIG: 15'00000000 (cache) 15'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT_SERVER
BUGCHECK_STR: 0x1E
PROCESS_NAME: SavService.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: STA-IT-42921
ANALYSIS_SESSION_TIME: 06-29-2016 13:09:47.0050
ANALYSIS_VERSION: 10.0.10586.567 x86fre
EXCEPTION_RECORD: fffff8800dde3658 -- (.exr 0xfffff8800dde3658)
ExceptionAddress: fffff88009f387b6 (mrxsmb10!MRxSmbDeferredCreate+0x000000000000018a)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000058
Attempt to read from address 0000000000000058
TRAP_FRAME: fffff8800dde3700 -- (.trap 0xfffff8800dde3700)
Unable to read trap frame at fffff880`0dde3700
LAST_CONTROL_TRANSFER: from fffff80001867dfe to fffff800018703d0
STACK_TEXT:
fffff880`0dde2738 fffff800`01867dfe : 00000000`00000000 fffff880`09f1d2c0 fffff880`0dde2810 fffff800`018ca489 : nt!KeBugCheck
fffff880`0dde2740 fffff800`0189c43d : fffff800`01a81e9c fffff800`019c4b50 fffff800`01801000 fffff880`0dde3658 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`0dde2770 fffff800`0189b215 : fffff800`019c4b48 fffff880`0dde27e8 fffff880`0dde3658 fffff800`01801000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`0dde27a0 fffff800`018ac725 : fffff880`0dde3658 fffff880`0dde2eb0 fffff880`00000000 00000000`00000000 : nt!RtlDispatchException+0x415
fffff880`0dde2e80 fffff800`0186fa82 : fffff880`0dde3658 fffff8a0`1a3b4500 fffff880`0dde3700 fffff8a0`07683620 : nt!KiDispatchException+0x135
fffff880`0dde3520 fffff800`0186e5fa : 00000000`00000000 00000000`00000058 00000000`00000000 fffff8a0`1a3b4500 : nt!KiExceptionDispatch+0xc2
fffff880`0dde3700 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23a
STACK_COMMAND: kb
THREAD_SHA1_HASH_MOD_FUNC: 1969b11298e311f7ad22077b365437264406f280
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 352da74cadef5f48c6668b2bfb724f70820f94af
THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6
FOLLOWUP_IP:
nt!KiKernelCalloutExceptionHandler+e
fffff800`01867dfe 90 nop
FAULT_INSTR_CODE: cccccc90
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiKernelCalloutExceptionHandler+e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 573a38fc
IMAGE_VERSION: 6.1.7601.23455
FAILURE_BUCKET_ID: X64_0x1E_nt!KiKernelCalloutExceptionHandler+e
BUCKET_ID: X64_0x1E_nt!KiKernelCalloutExceptionHandler+e
PRIMARY_PROBLEM_CLASS: X64_0x1E_nt!KiKernelCalloutExceptionHandler+e
TARGET_TIME: 2016-06-29T08:51:25.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 2
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 LanManNt (Service Pack 1) TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2016-05-16 22:17:48
BUILDDATESTAMP_STR: 160516-0600
BUILDLAB_STR: win7sp1_ldr
BUILDOSVER_STR: 6.1.7601.23455.amd64fre.win7sp1_ldr.160516-0600
ANALYSIS_SESSION_ELAPSED_TIME: 8a8
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0x1e_nt!kikernelcalloutexceptionhandler+e
FAILURE_ID_HASH: {31b31670-23d4-78dd-b3a6-d5566ed846e6}
Followup: MachineOwner
====================================================================