Hi all,
We have windows 2008 ent sp2 server hosting exchange 2010, this server is rebooting with below bugcheck error
Server model is ibm blade hs22, server drivers and bios firmware is updated to latest version however server is still rebooting with blue screen. This month it has rebooted 3 times.
Checked hardware and no hardware errors found, even ibm vendor is saying its not a hardware issue.
Below is the analysed dump file and we are not able to figure out whats causing this issue
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [\\server1\c$\Windows\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (24 procs) Free x64
Product: Server, suite: Enterprise TerminalServer SingleUserTS
Built by: 6002.18327.amd64fre.vistasp2_gdr.101014-0432
Machine Name:
Kernel base = 0xfffff800`03009000 PsLoadedModuleList = 0xfffff800`031cddd0
Debug session time: Thu Jun 21 20:54:41.820 2012 (UTC - 4:00)
System Uptime: 0 days 0:04:06.157
Loading Kernel Symbols
...............................................................
................................................................
.........
Loading User Symbols
PEB is paged out (Peb.Ldr = 000007ff`fffd4018). Type ".hh dbgerr001" for details
Loading unloaded module list
.....
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff800032ece8e, 0, ffffffffffffffff}
Page c5138a not present in the dump file. Type ".hh dbgerr004" for details
Page 72852 not present in the dump file. Type ".hh dbgerr004" for details
Probably caused by : ntkrnlmp.exe ( nt!PspGetSetContextInternal+396 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800032ece8e, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
Page c5138a not present in the dump file. Type ".hh dbgerr004" for details
Page 72852 not present in the dump file. Type ".hh dbgerr004" for details
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!PspGetSetContextInternal+396
fffff800`032ece8e 488b28 mov rbp,qword ptr [rax]
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
BUGCHECK_STR: 0x1E_c0000005
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: VSSVC.exe
CURRENT_IRQL: 1
LAST_CONTROL_TRANSFER: from fffff80003045ac7 to fffff80003063490
STACK_TEXT:
fffffa60`097894f8 fffff800`03045ac7 : 00000000`0000001e ffffffff`c0000005 fffff800`032ece8e 00000000`00000000 : nt!KeBugCheckEx
fffffa60`09789500 fffff800`030632e9 : fffffa60`09789c38 fffffa60`0c821570 fffffa60`09789ce0 fffffa60`0c821ac8 : nt! ?? ::FNODOBFM::`string'+0x29117
fffffa60`09789b00 fffff800`03061ecd : fffffa60`09789d40 fffffa60`09789d28 fffff880`0be9bbd0 00000000`00000000 : nt!KiExceptionDispatch+0xa9
fffffa60`09789ce0 fffff800`032ece8e : fffffa80`32113048 fffffa60`0c821570 fffff880`00000000 fffffa60`0c821ac8 : nt!KiGeneralProtectionFault+0xcd
fffffa60`09789e70 fffff800`0309093d : fffffa80`34b6d990 fffffa80`5409fbb0 fffffa60`0c821570 00000000`00000000 : nt!PspGetSetContextInternal+0x396
fffffa60`0978a3c0 fffff800`03084bbe : fffffa60`0978a7c0 fffff800`0305cd7a fffffa60`0978a7d0 fffff800`0305cd7a : nt!PspGetSetContextSpecialApc+0x9d
fffffa60`0978a4d0 fffff800`03088613 : fffffa60`0978a5f0 00000000`00000000 00000000`00000000 fffffa80`5409fbb0 : nt!KiDeliverApc+0x19e
fffffa60`0978a570 ffffffff`ffae3493 : ffffffff`ffae39ee fffffa60`0978a720 ffffffff`ffae3969 00000000`00000000 : nt!KiApcInterrupt+0x103
fffffa60`0978a708 ffffffff`ffae39ee : fffffa60`0978a720 ffffffff`ffae3969 00000000`00000000 fffffa60`0978a8d0 : 0xffffffff`ffae3493
fffffa60`0978a710 fffffa60`0978a720 : ffffffff`ffae3969 00000000`00000000 fffffa60`0978a8d0 ffffffff`ff6a2317 : 0xffffffff`ffae39ee
fffffa60`0978a718 ffffffff`ffae3969 : 00000000`00000000 fffffa60`0978a8d0 ffffffff`ff6a2317 ffffffff`ffaf5028 : 0xfffffa60`0978a720
fffffa60`0978a720 00000000`00000000 : fffffa60`0978a8d0 ffffffff`ff6a2317 ffffffff`ffaf5028 ffffffff`ff6a1048 : 0xffffffff`ffae3969
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!PspGetSetContextInternal+396
fffff800`032ece8e 488b28 mov rbp,qword ptr [rax]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!PspGetSetContextInternal+396
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cb7275f
FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!PspGetSetContextInternal+396
BUCKET_ID: X64_0x1E_c0000005_nt!PspGetSetContextInternal+396
Followup: MachineOwner
---------
0: kd> !vm
*** Virtual Memory Usage ***
Physical Memory: 12579636 ( 50318544 Kb)
Page File: \??\C:\pagefile.sys
Current: 50341888 Kb Free Space: 50341884 Kb
Minimum: 50341888 Kb Maximum: 50341888 Kb
Unimplemented error for MiSystemVaTypeCount
Available Pages: 9751186 ( 39004744 Kb)
ResAvail Pages: 11996939 ( 47987756 Kb)
Locked IO Pages: 0 ( 0 Kb)
Free System PTEs: 33558815 ( 134235260 Kb)
Modified Pages: 14903 ( 59612 Kb)
Modified PF Pages: 13885 ( 55540 Kb)
NonPagedPool 0 Used: 0 ( 0 Kb)
NonPagedPoolNx 0 Used: 44206 ( 176824 Kb)
NonPagedPool 1 Used: 0 ( 0 Kb)
NonPagedPoolNx 1 Used: 4343 ( 17372 Kb)
NonPagedPool Usage: 5679712 ( 22718848 Kb)
NonPagedPoolNx Usage: 59036 ( 236144 Kb)
NonPagedPool Max: 9407997 ( 37631988 Kb)
PagedPool 0 Usage: 37291 ( 149164 Kb)
PagedPool 1 Usage: 9138 ( 36552 Kb)
PagedPool 2 Usage: 3120 ( 12480 Kb)
PagedPool Usage: 49549 ( 198196 Kb)
PagedPool Maximum: 33554432 ( 134217728 Kb)
Session Commit: 3854 ( 15416 Kb)
Shared Commit: 222051 ( 888204 Kb)
Special Pool: 0 ( 0 Kb)
Shared Process: 18075 ( 72300 Kb)
PagedPool Commit: 49593 ( 198372 Kb)
Driver Commit: 2890 ( 11560 Kb)
Committed pages: 11291526 ( 45166104 Kb)
Commit limit: 24785804 ( 99143216 Kb)
Total Private: 10810088 ( 43240352 Kb)
1b74 store.exe 9421648 ( 37686592 Kb)
13a8 Microsoft.Excha 157830 ( 631320 Kb)
1308 msexchangerepl. 107311 ( 429244 Kb)
1b54 msftefd.exe 103618 ( 414472 Kb)
1dd8 msftefd.exe 101263 ( 405052 Kb)
0cdc java.exe 99926 ( 399704 Kb)
2584 msftefd.exe 95056 ( 380224 Kb)
14b0 MSExchangeTrans 52409 ( 209636 Kb)
142c MSExchangeThrot 49310 ( 197240 Kb)
048c SavService.exe 40900 ( 163600 Kb)
2218 kexmbstat.exe 40247 ( 160988 Kb)
1268 Microsoft.Excha 40022 ( 160088 Kb)
1ac8 msftefd.exe 31189 ( 124756 Kb)
0a54 kntcma.exe 28592 ( 114368 Kb)
1220 MSExchangeMailS 26735 ( 106940 Kb)
109c MSExchangeMailb 25410 ( 101640 Kb)
09f8 kexcma.exe 21676 ( 86704 Kb)
2074 WmiPrvSE.exe 17282 ( 69128 Kb)
2180 WmiPrvSE.exe 15239 ( 60956 Kb)
0344 lsass.exe 13865 ( 55460 Kb)
02a8 svchost.exe 13828 ( 55312 Kb)
1820 wmicpa.exe 13409 ( 53636 Kb)
1d38 mad.exe 12045 ( 48180 Kb)
05e4 svchost.exe 11998 ( 47992 Kb)
0b70 SMSvcHost.exe 10207 ( 40828 Kb)
0ad4 MSExchangeADTop 9701 ( 38804 Kb)
2ba4 powershell.exe 9215 ( 36860 Kb)
07b4 FSCEventing.exe 9040 ( 36160 Kb)
01e8 FSEMailPickup.e 8464 ( 33856 Kb)
2af4 dsmcsvc.exe 8055 ( 32220 Kb)
09e0 inetinfo.exe 7843 ( 31372 Kb)
0c20 srmagent.exe 7490 ( 29960 Kb)
0efc dsmcsvc.exe 7178 ( 28712 Kb)
2b8c zEventLogV2.exe 6938 ( 27752 Kb)
0ee8 dsmcad.exe 6034 ( 24136 Kb)
02d8 svchost.exe 5926 ( 23704 Kb)
07ec FSCConfiguratio 5376 ( 21504 Kb)
175c clussvc.exe 5077 ( 20308 Kb)
0f00 FSCController.e 4958 ( 19832 Kb)
0b0c msftesql.exe 4932 ( 19728 Kb)
1294 WmiPrvSE.exe 4795 ( 19180 Kb)
29d4 mod_detect.exe 4730 ( 18920 Kb)
2a58 vsacommd.exe 4309 ( 17236 Kb)
2a88 vsaoutd.exe 4256 ( 17024 Kb)
21c4 w3wp.exe 4223 ( 16892 Kb)
0c4c RemotelyAnywher 4086 ( 16344 Kb)
02bc LogonUI.exe 3884 ( 15536 Kb)
0f48 svchost.exe 3880 ( 15520 Kb)
0208 svchost.exe 3792 ( 15168 Kb)
0658 svchost.exe 3705 ( 14820 Kb)
1658 CcmExec.exe 3562 ( 14248 Kb)
0e4c ManagementAgent 3450 ( 13800 Kb)
0c54 swi_service.exe 3371 ( 13484 Kb)
040c SLsvc.exe 3290 ( 13160 Kb)
042c svchost.exe 3199 ( 12796 Kb)
0bc4 VSSVC.exe 3192 ( 12768 Kb)
0388 taskeng.exe 3017 ( 12068 Kb)
06f4 svchost.exe 2990 ( 11960 Kb)
07f8 fscvsswriter.ex 2893 ( 11572 Kb)
097c res_sv.exe 2869 ( 11476 Kb)
2aa8 vsamon_cli.exe 2868 ( 11472 Kb)
0348 svchost.exe 2826 ( 11304 Kb)
0ef8 VSASvc_Cli.exs 2728 ( 10912 Kb)
0330 services.exe 2702 ( 10808 Kb)
2734 WmiPrvSE.exe 2671 ( 10684 Kb)
0e30 snmp.exe 2665 ( 10660 Kb)
034c lsm.exe 2316 ( 9264 Kb)
161c wmicimsv.exe 2286 ( 9144 Kb)
03f4 svchost.exe 2210 ( 8840 Kb)
1fa0 svchost.exe 2200 ( 8800 Kb)
0e00 sddsrv.exe 2167 ( 8668 Kb)
0688 FSEOnDemandNav. 2073 ( 8292 Kb)
1cb4 rhs.exe 2030 ( 8120 Kb)
0f88 RouterNT.exe 2010 ( 8040 Kb)
0478 svchost.exe 1993 ( 7972 Kb)
1d30 msiexec.exe 1986 ( 7944 Kb)
1714 unsecapp.exe 1955 ( 7820 Kb)
2138 WmiPrvSE.exe 1895 ( 7580 Kb)
1f84 WmiApSrv.exe 1884 ( 7536 Kb)
0c14 ramaint.exe 1867 ( 7468 Kb)
0c64 snmp.exe 1836 ( 7344 Kb)
0d1c LMIGuardian.exe 1833 ( 7332 Kb)
02b4 csrss.exe 1756 ( 7024 Kb)
030c winlogon.exe 1599 ( 6396 Kb)
0f20 ALsvc.exe 1570 ( 6280 Kb)
0dd8 SAVAdminService 1545 ( 6180 Kb)
0db0 r_server.exe 1465 ( 5860 Kb)
0a70 svchost.exe 1432 ( 5728 Kb)
0718 cimlistener.exe 1417 ( 5668 Kb)
02e0 wininit.exe 1333 ( 5332 Kb)
07d4 FSCMonitor.exe 1330 ( 5320 Kb)
0d9c svchost.exe 1207 ( 4828 Kb)
1cd0 rhs.exe 1197 ( 4788 Kb)
0c10 svchost.exe 1092 ( 4368 Kb)
02ec csrss.exe 1070 ( 4280 Kb)
0a98 lcfd.exe 1014 ( 4056 Kb)
2b9c cmd.exe 1007 ( 4028 Kb)
0004 System 987 ( 3948 Kb)
0f9c swc_service.exe 937 ( 3748 Kb)
0a5c cmd.exe 861 ( 3444 Kb)
09c8 slp_srvreg.exe 837 ( 3348 Kb)
2a50 cmd.exe 784 ( 3136 Kb)
2a80 cmd.exe 783 ( 3132 Kb)
2b84 cmd.exe 778 ( 3112 Kb)
0cb4 tier1slp.exe 772 ( 3088 Kb)
094c sa_comm.exe 710 ( 2840 Kb)
09b4 IBMSA.exe 701 ( 2804 Kb)
095c hats_sa.exe 656 ( 2624 Kb)
09d0 nonstop_w32_ix8 622 ( 2488 Kb)
0fd0 srmservice.exe 503 ( 2012 Kb)
0270 smss.exe 387 ( 1548 Kb)
0d10 cmd.exe 0 ( 0 Kb)