Quantcast
Viewing all articles
Browse latest Browse all 24879

Windows 2008 SP2 Enterprise - BugCheck KMODE_EXCEPTION_NOT_HANDLED (1e)

Hi all,

We have windows 2008 ent sp2 server hosting exchange 2010, this server is rebooting with below bugcheck error

Server model is ibm blade hs22, server drivers and bios firmware is updated to latest version however server is still rebooting with blue screen. This month it has rebooted 3 times.

Checked hardware and no hardware errors found, even ibm vendor is saying its not a hardware issue.

Below is the analysed dump file and we are not able to figure out whats causing this issue

Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [\\server1\c$\Windows\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (24 procs) Free x64
Product: Server, suite: Enterprise TerminalServer SingleUserTS
Built by: 6002.18327.amd64fre.vistasp2_gdr.101014-0432
Machine Name:
Kernel base = 0xfffff800`03009000 PsLoadedModuleList = 0xfffff800`031cddd0
Debug session time: Thu Jun 21 20:54:41.820 2012 (UTC - 4:00)
System Uptime: 0 days 0:04:06.157
Loading Kernel Symbols
...............................................................
................................................................
.........
Loading User Symbols
PEB is paged out (Peb.Ldr = 000007ff`fffd4018).  Type ".hh dbgerr001" for details
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff800032ece8e, 0, ffffffffffffffff}

Page c5138a not present in the dump file. Type ".hh dbgerr004" for details
Page 72852 not present in the dump file. Type ".hh dbgerr004" for details
Probably caused by : ntkrnlmp.exe ( nt!PspGetSetContextInternal+396 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800032ece8e, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------

Page c5138a not present in the dump file. Type ".hh dbgerr004" for details
Page 72852 not present in the dump file. Type ".hh dbgerr004" for details

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP:
nt!PspGetSetContextInternal+396
fffff800`032ece8e 488b28          mov     rbp,qword ptr [rax]

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS:  ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

BUGCHECK_STR:  0x1E_c0000005

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  VSSVC.exe

CURRENT_IRQL:  1

LAST_CONTROL_TRANSFER:  from fffff80003045ac7 to fffff80003063490

STACK_TEXT:  
fffffa60`097894f8 fffff800`03045ac7 : 00000000`0000001e ffffffff`c0000005 fffff800`032ece8e 00000000`00000000 : nt!KeBugCheckEx
fffffa60`09789500 fffff800`030632e9 : fffffa60`09789c38 fffffa60`0c821570 fffffa60`09789ce0 fffffa60`0c821ac8 : nt! ?? ::FNODOBFM::`string'+0x29117
fffffa60`09789b00 fffff800`03061ecd : fffffa60`09789d40 fffffa60`09789d28 fffff880`0be9bbd0 00000000`00000000 : nt!KiExceptionDispatch+0xa9
fffffa60`09789ce0 fffff800`032ece8e : fffffa80`32113048 fffffa60`0c821570 fffff880`00000000 fffffa60`0c821ac8 : nt!KiGeneralProtectionFault+0xcd
fffffa60`09789e70 fffff800`0309093d : fffffa80`34b6d990 fffffa80`5409fbb0 fffffa60`0c821570 00000000`00000000 : nt!PspGetSetContextInternal+0x396
fffffa60`0978a3c0 fffff800`03084bbe : fffffa60`0978a7c0 fffff800`0305cd7a fffffa60`0978a7d0 fffff800`0305cd7a : nt!PspGetSetContextSpecialApc+0x9d
fffffa60`0978a4d0 fffff800`03088613 : fffffa60`0978a5f0 00000000`00000000 00000000`00000000 fffffa80`5409fbb0 : nt!KiDeliverApc+0x19e
fffffa60`0978a570 ffffffff`ffae3493 : ffffffff`ffae39ee fffffa60`0978a720 ffffffff`ffae3969 00000000`00000000 : nt!KiApcInterrupt+0x103
fffffa60`0978a708 ffffffff`ffae39ee : fffffa60`0978a720 ffffffff`ffae3969 00000000`00000000 fffffa60`0978a8d0 : 0xffffffff`ffae3493
fffffa60`0978a710 fffffa60`0978a720 : ffffffff`ffae3969 00000000`00000000 fffffa60`0978a8d0 ffffffff`ff6a2317 : 0xffffffff`ffae39ee
fffffa60`0978a718 ffffffff`ffae3969 : 00000000`00000000 fffffa60`0978a8d0 ffffffff`ff6a2317 ffffffff`ffaf5028 : 0xfffffa60`0978a720
fffffa60`0978a720 00000000`00000000 : fffffa60`0978a8d0 ffffffff`ff6a2317 ffffffff`ffaf5028 ffffffff`ff6a1048 : 0xffffffff`ffae3969


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt!PspGetSetContextInternal+396
fffff800`032ece8e 488b28          mov     rbp,qword ptr [rax]

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  nt!PspGetSetContextInternal+396

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cb7275f

FAILURE_BUCKET_ID:  X64_0x1E_c0000005_nt!PspGetSetContextInternal+396

BUCKET_ID:  X64_0x1E_c0000005_nt!PspGetSetContextInternal+396

Followup: MachineOwner
---------

0: kd> !vm

*** Virtual Memory Usage ***
    Physical Memory:    12579636 (  50318544 Kb)
    Page File: \??\C:\pagefile.sys
      Current:  50341888 Kb  Free Space:  50341884 Kb
      Minimum:  50341888 Kb  Maximum:     50341888 Kb
Unimplemented error for MiSystemVaTypeCount
    Available Pages:     9751186 (  39004744 Kb)
    ResAvail Pages:     11996939 (  47987756 Kb)
    Locked IO Pages:           0 (         0 Kb)
    Free System PTEs:   33558815 ( 134235260 Kb)
    Modified Pages:        14903 (     59612 Kb)
    Modified PF Pages:     13885 (     55540 Kb)
    NonPagedPool 0 Used:       0 (         0 Kb)
    NonPagedPoolNx 0 Used: 44206 (    176824 Kb)
    NonPagedPool 1 Used:       0 (         0 Kb)
    NonPagedPoolNx 1 Used:  4343 (     17372 Kb)
    NonPagedPool Usage:  5679712 (  22718848 Kb)
    NonPagedPoolNx Usage:  59036 (    236144 Kb)
    NonPagedPool Max:    9407997 (  37631988 Kb)
    PagedPool 0 Usage:     37291 (    149164 Kb)
    PagedPool 1 Usage:      9138 (     36552 Kb)
    PagedPool 2 Usage:      3120 (     12480 Kb)
    PagedPool Usage:       49549 (    198196 Kb)
    PagedPool Maximum:  33554432 ( 134217728 Kb)
    Session Commit:         3854 (     15416 Kb)
    Shared Commit:        222051 (    888204 Kb)
    Special Pool:              0 (         0 Kb)
    Shared Process:        18075 (     72300 Kb)
    PagedPool Commit:      49593 (    198372 Kb)
    Driver Commit:          2890 (     11560 Kb)
    Committed pages:    11291526 (  45166104 Kb)
    Commit limit:       24785804 (  99143216 Kb)

    Total Private:      10810088 (  43240352 Kb)
         1b74 store.exe       9421648 (  37686592 Kb)
         13a8 Microsoft.Excha 157830 (    631320 Kb)
         1308 msexchangerepl. 107311 (    429244 Kb)
         1b54 msftefd.exe     103618 (    414472 Kb)
         1dd8 msftefd.exe     101263 (    405052 Kb)
         0cdc java.exe         99926 (    399704 Kb)
         2584 msftefd.exe      95056 (    380224 Kb)
         14b0 MSExchangeTrans  52409 (    209636 Kb)
         142c MSExchangeThrot  49310 (    197240 Kb)
         048c SavService.exe   40900 (    163600 Kb)
         2218 kexmbstat.exe    40247 (    160988 Kb)
         1268 Microsoft.Excha  40022 (    160088 Kb)
         1ac8 msftefd.exe      31189 (    124756 Kb)
         0a54 kntcma.exe       28592 (    114368 Kb)
         1220 MSExchangeMailS  26735 (    106940 Kb)
         109c MSExchangeMailb  25410 (    101640 Kb)
         09f8 kexcma.exe       21676 (     86704 Kb)
         2074 WmiPrvSE.exe     17282 (     69128 Kb)
         2180 WmiPrvSE.exe     15239 (     60956 Kb)
         0344 lsass.exe        13865 (     55460 Kb)
         02a8 svchost.exe      13828 (     55312 Kb)
         1820 wmicpa.exe       13409 (     53636 Kb)
         1d38 mad.exe          12045 (     48180 Kb)
         05e4 svchost.exe      11998 (     47992 Kb)
         0b70 SMSvcHost.exe    10207 (     40828 Kb)
         0ad4 MSExchangeADTop   9701 (     38804 Kb)
         2ba4 powershell.exe    9215 (     36860 Kb)
         07b4 FSCEventing.exe   9040 (     36160 Kb)
         01e8 FSEMailPickup.e   8464 (     33856 Kb)
         2af4 dsmcsvc.exe       8055 (     32220 Kb)
         09e0 inetinfo.exe      7843 (     31372 Kb)
         0c20 srmagent.exe      7490 (     29960 Kb)
         0efc dsmcsvc.exe       7178 (     28712 Kb)
         2b8c zEventLogV2.exe   6938 (     27752 Kb)
         0ee8 dsmcad.exe        6034 (     24136 Kb)
         02d8 svchost.exe       5926 (     23704 Kb)
         07ec FSCConfiguratio   5376 (     21504 Kb)
         175c clussvc.exe       5077 (     20308 Kb)
         0f00 FSCController.e   4958 (     19832 Kb)
         0b0c msftesql.exe      4932 (     19728 Kb)
         1294 WmiPrvSE.exe      4795 (     19180 Kb)
         29d4 mod_detect.exe    4730 (     18920 Kb)
         2a58 vsacommd.exe      4309 (     17236 Kb)
         2a88 vsaoutd.exe       4256 (     17024 Kb)
         21c4 w3wp.exe          4223 (     16892 Kb)
         0c4c RemotelyAnywher   4086 (     16344 Kb)
         02bc LogonUI.exe       3884 (     15536 Kb)
         0f48 svchost.exe       3880 (     15520 Kb)
         0208 svchost.exe       3792 (     15168 Kb)
         0658 svchost.exe       3705 (     14820 Kb)
         1658 CcmExec.exe       3562 (     14248 Kb)
         0e4c ManagementAgent   3450 (     13800 Kb)
         0c54 swi_service.exe   3371 (     13484 Kb)
         040c SLsvc.exe         3290 (     13160 Kb)
         042c svchost.exe       3199 (     12796 Kb)
         0bc4 VSSVC.exe         3192 (     12768 Kb)
         0388 taskeng.exe       3017 (     12068 Kb)
         06f4 svchost.exe       2990 (     11960 Kb)
         07f8 fscvsswriter.ex   2893 (     11572 Kb)
         097c res_sv.exe        2869 (     11476 Kb)
         2aa8 vsamon_cli.exe    2868 (     11472 Kb)
         0348 svchost.exe       2826 (     11304 Kb)
         0ef8 VSASvc_Cli.exs    2728 (     10912 Kb)
         0330 services.exe      2702 (     10808 Kb)
         2734 WmiPrvSE.exe      2671 (     10684 Kb)
         0e30 snmp.exe          2665 (     10660 Kb)
         034c lsm.exe           2316 (      9264 Kb)
         161c wmicimsv.exe      2286 (      9144 Kb)
         03f4 svchost.exe       2210 (      8840 Kb)
         1fa0 svchost.exe       2200 (      8800 Kb)
         0e00 sddsrv.exe        2167 (      8668 Kb)
         0688 FSEOnDemandNav.   2073 (      8292 Kb)
         1cb4 rhs.exe           2030 (      8120 Kb)
         0f88 RouterNT.exe      2010 (      8040 Kb)
         0478 svchost.exe       1993 (      7972 Kb)
         1d30 msiexec.exe       1986 (      7944 Kb)
         1714 unsecapp.exe      1955 (      7820 Kb)
         2138 WmiPrvSE.exe      1895 (      7580 Kb)
         1f84 WmiApSrv.exe      1884 (      7536 Kb)
         0c14 ramaint.exe       1867 (      7468 Kb)
         0c64 snmp.exe          1836 (      7344 Kb)
         0d1c LMIGuardian.exe   1833 (      7332 Kb)
         02b4 csrss.exe         1756 (      7024 Kb)
         030c winlogon.exe      1599 (      6396 Kb)
         0f20 ALsvc.exe         1570 (      6280 Kb)
         0dd8 SAVAdminService   1545 (      6180 Kb)
         0db0 r_server.exe      1465 (      5860 Kb)
         0a70 svchost.exe       1432 (      5728 Kb)
         0718 cimlistener.exe   1417 (      5668 Kb)
         02e0 wininit.exe       1333 (      5332 Kb)
         07d4 FSCMonitor.exe    1330 (      5320 Kb)
         0d9c svchost.exe       1207 (      4828 Kb)
         1cd0 rhs.exe           1197 (      4788 Kb)
         0c10 svchost.exe       1092 (      4368 Kb)
         02ec csrss.exe         1070 (      4280 Kb)
         0a98 lcfd.exe          1014 (      4056 Kb)
         2b9c cmd.exe           1007 (      4028 Kb)
         0004 System             987 (      3948 Kb)
         0f9c swc_service.exe    937 (      3748 Kb)
         0a5c cmd.exe            861 (      3444 Kb)
         09c8 slp_srvreg.exe     837 (      3348 Kb)
         2a50 cmd.exe            784 (      3136 Kb)
         2a80 cmd.exe            783 (      3132 Kb)
         2b84 cmd.exe            778 (      3112 Kb)
         0cb4 tier1slp.exe       772 (      3088 Kb)
         094c sa_comm.exe        710 (      2840 Kb)
         09b4 IBMSA.exe          701 (      2804 Kb)
         095c hats_sa.exe        656 (      2624 Kb)
         09d0 nonstop_w32_ix8    622 (      2488 Kb)
         0fd0 srmservice.exe     503 (      2012 Kb)
         0270 smss.exe           387 (      1548 Kb)
         0d10 cmd.exe              0 (         0 Kb)


Viewing all articles
Browse latest Browse all 24879

Trending Articles