BSOD Microsoft.Exch -> TcpGetAndWriteLockPartitionAtDpcLevel


hi!

i'm having problems randomly freezes of win server 2008 r2 sp1 (exch 2010 sp1 installed).

the server freezed totally: no rdp, no network, ping works. couldn't neithier logon directly on server.

 

now i've set can generate manually bluescreen:

- crashonctrlscroll didn't worked when server freezed.

- nmi button works (set on nmi kernel crash dump generated http://thesysadmin.spaces.live.com/blog/cns!cab4c4a1dd3a835!198.entry)

 

this time, server hung during shutdown.

now here windbg (analyzed on win 7 x64 pc) output of manually created (nmi button) bluescreen:

-----------------------------------------------


microsoft (r) windows debugger version 6.12.0002.633 amd64
copyright (c) microsoft corporation. rights reserved.


loading dump file [c:\crash dumps\memory.dmp]
kernel summary dump file: kernel address space available

symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols
executable search path is:
windows 7 kernel version 7601 (service pack 1) mp (4 procs) free x64
product: lanmannt, suite: enterprise terminalserver singleuserts
built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
machine name:
kernel base = 0xfffff800`01a4f000 psloadedmodulelist = 0xfffff800`01c94e90
debug session time: sun mar 27 11:56:18.866 2011 (utc + 2:00)
system uptime: 0 days 10:38:39.581
loading kernel symbols
...............................................................
................................................................
........................
loading user symbols
peb paged out (peb.ldr = 000007ff`fffd9018). type ".hh dbgerr001" details
loading unloaded module list
.....
*******************************************************************************
* *
* bugcheck analysis *
* *
*******************************************************************************

use !analyze -v detailed debugging information.

bugcheck 80, {4f4454, 0, 0, 0}

caused : tcpip.sys ( tcpip!tcpgetandwritelockpartitionatdpclevel+45 )

followup: machineowner
---------

0: kd> !analyze -v
*******************************************************************************
* *
* bugcheck analysis *
* *
*******************************************************************************

nmi_hardware_failure (80)
typically due hardware malfunction. hardware supplier should
called.
arguments:
arg1: 0000000000 pick it! pick it! pick it! 4f4454
arg2: 0000000000000000
arg3: 0000000000000000
arg4: 0000000000000000

debugging details:
------------------


default_bucket_id: vista_driver_fault

bugcheck_str: 0x80

process_name: microsoft.exch

current_irql: f

last_control_transfer: fffff80001a189b8 fffff80001acf640

stack_text:
fffff800`018e4bf8 fffff800`01a189b8 : 00000000`00000080 00000000`004f4454 00000000`00000000 00000000`00000000 : nt!kebugcheckex
fffff800`018e4c00 fffff800`01bdc7d3 : 00000000`00000001 fffff800`01a2f2b0 00000000`00000000 00000000`0000005c : hal!halbugchecksystem+0x160
fffff800`018e4c40 fffff800`01a127a1 : fffffa80`000006c0 fffff800`01a30430 fffff800`018e4d30 fffff800`01a2f2b0 : nt!wheareporthwerror+0x263
fffff800`018e4ca0 fffff800`01b7eb61 : fffff800`018e4e70 00000000`00000001 00000000`00000001 00000000`c0000120 : hal!halhandlenmi+0x149
fffff800`018e4cd0 fffff800`01acc982 : 00000000`0c7f2985 00000000`00000000 00000000`00000000 00000000`00000000 : nt!kiprocessnmi+0x131
fffff800`018e4d30 fffff800`01acc7e3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!kxnmiinterrupt+0x82
fffff800`018e4e70 fffff800`01b00e30 : fffffa80`10458080 00000000`00010008 00000000`00000000 00000000`00000002 : nt!kinmiinterruptstart+0x163
fffff880`093c94a0 fffff800`01ad97ae : fffffa80`0d0d6d40 fffffa80`17feb210 00000000`00000003 fffff880`016ba50f : nt!kxwaitforlockownership+0x34
fffff880`093c94d0 fffff880`0169f525 : 00000000`00000000 00000000`0000001f fffffa80`0d0c9880 00000000`c0000120 : nt!keacquireinstackqueuedspinlockatdpclevel+0x7e
fffff880`093c9520 fffff880`016ba95d : 00000000`00000002 fffffa80`17feb210 00000000`00000000 000003ec`00000003 : tcpip!tcpgetandwritelockpartitionatdpclevel+0x45
fffff880`093c9550 fffff880`0168cb02 : fffff880`093c9730 00000000`00000001 fffffa80`17feb210 000003ec`00000003 : tcpip!tcpshutdowntcb+0x1bd
fffff880`093c9690 fffff880`016cdafa : fffffa80`0d0df988 fffffa80`16dd24a0 fffffa80`0d93b9a0 fffffa80`0d0df988 : tcpip!tcpaborttcbdelivery+0x32
fffff880`093c96c0 fffff880`03b18f9a : fffffa80`1756fda0 00000000`c000013b 00000000`00000000 00000000`00000000 : tcpip!tcpcreateandconnecttcbcancelroutine+0xda
fffff880`093c9780 fffff880`03b0fd1a : 00000000`00000001 000003ec`00000003 00000000`ffffffff fffffa80`1756fda0 : afd! ?? ::gfjblgfe::`string'+0x4295
fffff880`093c9860 fffff880`03b0fe22 : 00000000`00000000 fffffa80`178e6070 fffffa80`17ed7010 fffff800`01ae4276 : afd!afdcleanupcore+0x62a
fffff880`093c99e0 fffff800`01dd6f0f : fffffa80`12669ba0 fffffa80`136d8060 00000000`00000000 fffffa80`178e6070 : afd!afddispatch+0x42
fffff880`093c9a30 fffff800`01dc66b4 : 00000000`00000000 fffffa80`136d8060 00000000`00000000 fffff800`01ad951c : nt!iopclosefile+0x11f
fffff880`093c9ac0 fffff800`01dc6471 : fffffa80`136d8060 fffffa80`00000001 fffff8a0`02257be0 00000000`00000002 : nt!obpdecrementhandlecount+0xb4
fffff880`093c9b40 fffff800`01dc6a34 : 00000000`00000eb0 fffffa80`136d8060 fffff8a0`02257be0 00000000`00000eb0 : nt!obpclosehandletableentry+0xb1
fffff880`093c9bd0 fffff800`01ace8d3 : fffffa80`13720240 fffff880`093c9ca0 00000000`00000000 00000000`03d34100 : nt!obpclosehandle+0x94
fffff880`093c9c20 00000000`7778140a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!kisystemservicecopyend+0x13
00000000`058cd2f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7778140a


stack_command: kb

followup_ip:
tcpip!tcpgetandwritelockpartitionatdpclevel+45
fffff880`0169f525 4533db xor r11d,r11d

symbol_stack_index: 9

symbol_name: tcpip!tcpgetandwritelockpartitionatdpclevel+45

followup_name: machineowner

module_name: tcpip

image_name: tcpip.sys

debug_flr_image_timestamp: 4ce79420

failure_bucket_id: x64_0x80_tcpip!tcpgetandwritelockpartitionatdpclevel+45

bucket_id: x64_0x80_tcpip!tcpgetandwritelockpartitionatdpclevel+45

followup: machineowner
---------

 

 

could me analyze problem?

it seems there problem tcp.

 

thanks




hi,

 

please uninstall , reinstall latest version of network card driver third party manufacturer’s website check result.

 

if suggestions cannot fix issue you, may contact microsoft customer service , support (css) via telephone dedicated support professional can assist request. troubleshoot kind of kernel crash issue, need debug crashed system dump. unfortunately, debugging beyond can in forum. please advised contacting phone support charged call.

 

to obtain phone numbers specific technology request please take @ web site listed below:

 

http://support.microsoft.com/default.aspx?scid=fh;en-us;offerprophone#faq607

 

regards,


please remember click “mark answer” on post helps you, , click “unmark answer” if marked post not answer question. can beneficial other community members reading thread.


Windows Server  >  Windows Server General Forum



Comments

Popular posts from this blog

Error: 0x80073701 when trying to add Print Services Role in Windows 2012 Standard

Disconnecting from a Windows Server 2012 R2 file sharing session on a Windows 7,8,10 machine

Windows 2016 RDS event 1306 Connection Broker Client failed to redirect the user... Error: NULL