Y
YongyuthJeenbanjob
Please help to analyze and find solution Windows Bluescreen and automatically Reboot "Module load completed but symbols could not be loaded for vmxnet3.sys Probably caused by : mrxsmb20.sys"
Thank you in advance.
VMware ESXi 6.5
OS: Windows Server 2012 R2 Datacenter
NIC: vmxnet3 Ethernet Adapter
The MEMORY.DMP as below details.
-----------------------------------------------------------------------------------------------
Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\2.Infra server\DC-DR\Issues\VM\26 Mar 19\MEMORY.DMP]
Kernel Bitmap Dump File: Only kernel address space is available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\SymCache*Symbol information
Symbol search path is: SRV*C:\SymCache*Symbol information
Executable search path is:
Windows 8 Kernel Version 9600 MP (2 procs) Free x64
Product: Server, suite: TerminalServer DataCenter SingleUserTS
Built by: 9600.17415.amd64fre.winblue_r4.141028-1500
Machine Name:
Kernel base = 0xfffff803`7e81d000 PsLoadedModuleList = 0xfffff803`7eaf6250
Debug session time: Tue Mar 26 16:08:14.900 2019 (UTC + 7:00)
System Uptime: 180 days 20:54:29.582
Loading Kernel Symbols
...............................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
..........................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffff80000003, fffff8002914394f, ffffd00024190018, ffffd0002418f820}
*** ERROR: Module load completed but symbols could not be loaded for vmxnet3.sys
Probably caused by : mrxsmb20.sys ( mrxsmb20!MRxSmb2ShouldRestartExchange+2cf )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffff80000003, The exception code that was not handled
Arg2: fffff8002914394f, The address that the exception occurred at
Arg3: ffffd00024190018, Parameter 0 of the exception
Arg4: ffffd0002418f820, Parameter 1 of the exception
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'VSApiNt' and 'VSApiNt.sys' overlap
EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more arguments are invalid
FAULTING_IP:
mrxsmb20!MRxSmb2ShouldRestartExchange+2cf
fffff800`2914394f cc int 3
EXCEPTION_PARAMETER1: ffffd00024190018
EXCEPTION_PARAMETER2: ffffd0002418f820
BUGCHECK_STR: 0x1E_80000003
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
DPC_STACK_BASE: FFFFD00024198FB0
EXCEPTION_RECORD: ffffd00024190008 -- (.exr 0xffffd00024190008)
ExceptionAddress: 0000000080000003
ExceptionCode: 00000000
ExceptionFlags: 00000000
NumberParameters: 0
TRAP_FRAME: ffffd0002418ff69 -- (.trap 0xffffd0002418ff69)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Unable to get program counter
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=4d00000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=e000000000000000 rsp=ff00001f8001704c rbp=e000000000000000
r8=1000000000000000 r9=83ffffe0000cdf1d r10=94ffff3c89c35f02
r11=10fffff80028706c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=1 vif ov dn ei pl nz ac po cy
1902:0000 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8037e9ffc6f to fffff8037e96d9a0
STACK_TEXT:
ffffd000`2418eff8 fffff803`7e9ffc6f : 00000000`0000001e ffffffff`80000003 fffff800`2914394f ffffd000`24190018 : nt!KeBugCheckEx
ffffd000`2418f000 fffff803`7e97df66 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFatalFilter+0x1f
ffffd000`2418f040 fffff803`7e95ca96 : ffffe000`0aa48760 00000000`00000001 ffffd000`2418f169 fffff803`7e871ef0 : nt! ?? ::FNODOBFM::`string'+0xb6
ffffd000`2418f080 fffff803`7e974eed : 00000000`00000000 ffffd000`2418f220 ffffd000`24190018 ffffd000`2418f220 : nt!_C_specific_handler+0x86
ffffd000`2418f0f0 fffff803`7e8f7125 : 00000000`00000001 fffff803`7e81d000 ffffd000`24190000 ffffe000`00000000 : nt!RtlpExecuteHandlerForException+0xd
ffffd000`2418f120 fffff803`7e8fb4de : ffffd000`24190018 ffffd000`2418fd20 ffffd000`24190018 00000000`c00000be : nt!RtlDispatchException+0x1a5
ffffd000`2418f7f0 fffff803`7e9795c2 : ffffd000`24190008 fffff800`2870428c ffffd000`2418ff69 fffff800`28003055 : nt!KiDispatchException+0x646
ffffd000`2418fee0 fffff803`7e977034 : 00000000`00000000 ffffd000`241902e0 00000000`00000001 ffffd000`241902e0 : nt!KiExceptionDispatch+0xc2
ffffd000`241900c0 fffff800`29143950 : ffffe000`0cdf1d10 ffffe000`0cdf1e68 00000000`00000000 fffff800`287063c0 : nt!KiBreakpointTrap+0xf4
ffffd000`24190250 fffff800`290d932f : 00000000`00000001 00000000`00000001 00000000`00000001 ffffe000`0fe7b030 : mrxsmb20!MRxSmb2ShouldRestartExchange+0x2d0
ffffd000`241902d0 fffff800`290d665a : ffffe000`0de25e20 00000000`00001001 00000000`00000000 00000000`00000000 : mrxsmb!SmbCepCompleteExchangeLiteEx+0x15f
ffffd000`24190330 fffff800`290d7fb9 : ffffe000`139d9d00 ffffe000`0de25ee0 ffffe000`00000001 ffffdff0`290e8100 : mrxsmb!SmbCeSendCompleteInd+0x20a
ffffd000`241903d0 fffff803`7e855bea : ffffe000`0dd60cf0 ffffd000`24190520 00000000`00000000 ffffe000`0dd60dc3 : mrxsmb!SmbWskSendComplete+0xc9
ffffd000`24190420 fffff800`28002dd2 : ffff3c89`c35ef80c ffff3c89`c35eff02 ffffe000`0f4e4000 00000000`00000000 : nt!IopfCompleteRequest+0x2ea
ffffd000`24190560 fffff800`287097fc : 00000000`00000000 ffffe000`0f4e41f0 ffffd000`241906c0 ffffd000`241908a8 : afd!WskProTLSendOrDisconnectComplete+0x72
ffffd000`241905c0 fffff800`2870a370 : fffff800`28889180 ffffd000`24190760 ffffe000`0dc30390 ffffe000`0b33a150 : tcpip!TcpTcbReceive+0x2bc
ffffd000`24190710 fffff800`28709123 : ffffdff0`3f35f822 00000000`00000000 00000000`00000000 ffffe000`0b455a18 : tcpip!TcpMatchReceive+0x1f0
ffffd000`241908a0 fffff800`2873ef9f : ffffe000`0b4b9210 ffffd000`2419bd01 ffffd000`2419bde5 00000000`0000bde5 : tcpip!TcpPreValidatedReceive+0x363
ffffd000`241909a0 fffff800`2873b143 : 00000000`00000000 ffffe000`00000001 00000000`00000001 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x4f
ffffd000`24190a60 fffff800`28739525 : 00000000`00000011 fffff800`28889100 ffffe000`0b9b2330 ffffd000`24190b68 : tcpip!IppProcessDeliverList+0x63
ffffd000`24190b00 fffff800`28737900 : 00000000`00000028 ffffe000`0fe7b030 fffff800`28889180 ffffe000`0b50d000 : tcpip!IppReceiveHeaderBatch+0x235
ffffd000`24190c30 fffff800`28735d22 : ffffe000`0b901850 00000000`00000000 ffffd000`24191001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x680
ffffd000`24190fb0 fffff800`28736745 : ffffe000`0b9b0002 00000000`00000000 fffff800`28736790 00000000`00000101 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x318
ffffd000`24191090 fffff803`7e85b873 : 00000000`00000000 00000000`00000000 ffffe000`0b574010 ffffd000`2418c000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x155
ffffd000`241911c0 fffff800`28736936 : fffff800`287365f0 ffffd000`241912e0 ffffe000`1377f110 fffff803`7e858e67 : nt!KeExpandKernelStackAndCalloutInternal+0xf3
ffffd000`241912b0 fffff800`27c4fa53 : 00000000`00000000 ffffd000`24191391 ffffe000`00000001 fffff800`28c02b47 : tcpip!FlReceiveNetBufferListChain+0xb6
ffffd000`24191330 fffff800`27c4fe7f : 00000000`00000001 fffff800`27d60008 00000000`00000000 00000000`00000001 : NDIS!ndisMIndicateNetBufferListsToOpen+0x123
ffffd000`241913f0 fffff800`27c50094 : ffffe000`0b6e61a0 ffffd000`24191501 00000000`3b9d0165 fffff800`287113e7 : NDIS!ndisMTopReceiveNetBufferLists+0x22f
ffffd000`24191480 fffff800`285df3d4 : 00000000`00100001 00000000`000001af ffffe000`00000003 00000000`00100000 : NDIS!NdisMIndicateReceiveNetBufferLists+0x114
ffffd000`24191670 fffff800`285e0afb : ffffe000`00000001 ffffd000`241917e0 ffffe000`0b85e000 00000000`00000000 : vmxnet3+0xc3d4
ffffd000`24191770 fffff800`27c51e02 : ffffe000`0b6e61a0 ffffd000`24191829 00000000`00000000 ffffe000`0b91d000 : vmxnet3+0xdafb
ffffd000`241917b0 fffff803`7e8e7cd0 : 00000000`00000000 ffffd000`24167180 ffffe000`0b733430 ffffd000`24191a20 : NDIS!ndisInterruptDpc+0x1a3
ffffd000`24191890 fffff803`7e8e6f87 : 00000000`00000006 00000000`0023b8ae ffffe000`0cc8ca20 ffffd000`00000002 : nt!KiExecuteAllDpcs+0x1b0
ffffd000`241919e0 fffff803`7e9714ea : ffffd000`24167180 ffffd000`24167180 ffffd000`241741c0 ffffe000`0d8fa540 : nt!KiRetireDpcList+0xd7
ffffd000`24191c60 00000000`00000000 : ffffd000`24192000 ffffd000`2418c000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
mrxsmb20!MRxSmb2ShouldRestartExchange+2cf
fffff800`2914394f cc int 3
SYMBOL_NAME: mrxsmb20!MRxSmb2ShouldRestartExchange+2cf
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: mrxsmb20
IMAGE_NAME: mrxsmb20.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 54264430
BUCKET_ID_FUNC_OFFSET: 2cf
FAILURE_BUCKET_ID: 0x1E_80000003_mrxsmb20!MRxSmb2ShouldRestartExchange
BUCKET_ID: 0x1E_80000003_mrxsmb20!MRxSmb2ShouldRestartExchange
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_80000003_mrxsmb20!mrxsmb2shouldrestartexchange
FAILURE_ID_HASH: {2b47424e-8d41-b3dd-c83b-7a72fda39b88}
Followup: MachineOwner
---------
1: kd> lmvm mrxsmb20
start end module name
fffff800`2913d000 fffff800`29175000 mrxsmb20 (pdb symbols) c:\symcache\mrxsmb20.pdb\A3921F64DB2443DBABDEEA2ADA3FEABE1\mrxsmb20.pdb
Loaded symbol image file: mrxsmb20.sys
Image path: \SystemRoot\system32\DRIVERS\mrxsmb20.sys
Image name: mrxsmb20.sys
Timestamp: Sat Sep 27 11:59:28 2014 (54264430)
CheckSum: 0003AB5C
ImageSize: 00038000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
------------------------------------------------------------------------------------------------------
Yongyuth.
Continue reading...
Thank you in advance.
VMware ESXi 6.5
OS: Windows Server 2012 R2 Datacenter
NIC: vmxnet3 Ethernet Adapter
The MEMORY.DMP as below details.
-----------------------------------------------------------------------------------------------
Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\2.Infra server\DC-DR\Issues\VM\26 Mar 19\MEMORY.DMP]
Kernel Bitmap Dump File: Only kernel address space is available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\SymCache*Symbol information
Symbol search path is: SRV*C:\SymCache*Symbol information
Executable search path is:
Windows 8 Kernel Version 9600 MP (2 procs) Free x64
Product: Server, suite: TerminalServer DataCenter SingleUserTS
Built by: 9600.17415.amd64fre.winblue_r4.141028-1500
Machine Name:
Kernel base = 0xfffff803`7e81d000 PsLoadedModuleList = 0xfffff803`7eaf6250
Debug session time: Tue Mar 26 16:08:14.900 2019 (UTC + 7:00)
System Uptime: 180 days 20:54:29.582
Loading Kernel Symbols
...............................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
..........................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffff80000003, fffff8002914394f, ffffd00024190018, ffffd0002418f820}
*** ERROR: Module load completed but symbols could not be loaded for vmxnet3.sys
Probably caused by : mrxsmb20.sys ( mrxsmb20!MRxSmb2ShouldRestartExchange+2cf )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffff80000003, The exception code that was not handled
Arg2: fffff8002914394f, The address that the exception occurred at
Arg3: ffffd00024190018, Parameter 0 of the exception
Arg4: ffffd0002418f820, Parameter 1 of the exception
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'VSApiNt' and 'VSApiNt.sys' overlap
EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more arguments are invalid
FAULTING_IP:
mrxsmb20!MRxSmb2ShouldRestartExchange+2cf
fffff800`2914394f cc int 3
EXCEPTION_PARAMETER1: ffffd00024190018
EXCEPTION_PARAMETER2: ffffd0002418f820
BUGCHECK_STR: 0x1E_80000003
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
DPC_STACK_BASE: FFFFD00024198FB0
EXCEPTION_RECORD: ffffd00024190008 -- (.exr 0xffffd00024190008)
ExceptionAddress: 0000000080000003
ExceptionCode: 00000000
ExceptionFlags: 00000000
NumberParameters: 0
TRAP_FRAME: ffffd0002418ff69 -- (.trap 0xffffd0002418ff69)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Unable to get program counter
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=4d00000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=e000000000000000 rsp=ff00001f8001704c rbp=e000000000000000
r8=1000000000000000 r9=83ffffe0000cdf1d r10=94ffff3c89c35f02
r11=10fffff80028706c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=1 vif ov dn ei pl nz ac po cy
1902:0000 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8037e9ffc6f to fffff8037e96d9a0
STACK_TEXT:
ffffd000`2418eff8 fffff803`7e9ffc6f : 00000000`0000001e ffffffff`80000003 fffff800`2914394f ffffd000`24190018 : nt!KeBugCheckEx
ffffd000`2418f000 fffff803`7e97df66 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFatalFilter+0x1f
ffffd000`2418f040 fffff803`7e95ca96 : ffffe000`0aa48760 00000000`00000001 ffffd000`2418f169 fffff803`7e871ef0 : nt! ?? ::FNODOBFM::`string'+0xb6
ffffd000`2418f080 fffff803`7e974eed : 00000000`00000000 ffffd000`2418f220 ffffd000`24190018 ffffd000`2418f220 : nt!_C_specific_handler+0x86
ffffd000`2418f0f0 fffff803`7e8f7125 : 00000000`00000001 fffff803`7e81d000 ffffd000`24190000 ffffe000`00000000 : nt!RtlpExecuteHandlerForException+0xd
ffffd000`2418f120 fffff803`7e8fb4de : ffffd000`24190018 ffffd000`2418fd20 ffffd000`24190018 00000000`c00000be : nt!RtlDispatchException+0x1a5
ffffd000`2418f7f0 fffff803`7e9795c2 : ffffd000`24190008 fffff800`2870428c ffffd000`2418ff69 fffff800`28003055 : nt!KiDispatchException+0x646
ffffd000`2418fee0 fffff803`7e977034 : 00000000`00000000 ffffd000`241902e0 00000000`00000001 ffffd000`241902e0 : nt!KiExceptionDispatch+0xc2
ffffd000`241900c0 fffff800`29143950 : ffffe000`0cdf1d10 ffffe000`0cdf1e68 00000000`00000000 fffff800`287063c0 : nt!KiBreakpointTrap+0xf4
ffffd000`24190250 fffff800`290d932f : 00000000`00000001 00000000`00000001 00000000`00000001 ffffe000`0fe7b030 : mrxsmb20!MRxSmb2ShouldRestartExchange+0x2d0
ffffd000`241902d0 fffff800`290d665a : ffffe000`0de25e20 00000000`00001001 00000000`00000000 00000000`00000000 : mrxsmb!SmbCepCompleteExchangeLiteEx+0x15f
ffffd000`24190330 fffff800`290d7fb9 : ffffe000`139d9d00 ffffe000`0de25ee0 ffffe000`00000001 ffffdff0`290e8100 : mrxsmb!SmbCeSendCompleteInd+0x20a
ffffd000`241903d0 fffff803`7e855bea : ffffe000`0dd60cf0 ffffd000`24190520 00000000`00000000 ffffe000`0dd60dc3 : mrxsmb!SmbWskSendComplete+0xc9
ffffd000`24190420 fffff800`28002dd2 : ffff3c89`c35ef80c ffff3c89`c35eff02 ffffe000`0f4e4000 00000000`00000000 : nt!IopfCompleteRequest+0x2ea
ffffd000`24190560 fffff800`287097fc : 00000000`00000000 ffffe000`0f4e41f0 ffffd000`241906c0 ffffd000`241908a8 : afd!WskProTLSendOrDisconnectComplete+0x72
ffffd000`241905c0 fffff800`2870a370 : fffff800`28889180 ffffd000`24190760 ffffe000`0dc30390 ffffe000`0b33a150 : tcpip!TcpTcbReceive+0x2bc
ffffd000`24190710 fffff800`28709123 : ffffdff0`3f35f822 00000000`00000000 00000000`00000000 ffffe000`0b455a18 : tcpip!TcpMatchReceive+0x1f0
ffffd000`241908a0 fffff800`2873ef9f : ffffe000`0b4b9210 ffffd000`2419bd01 ffffd000`2419bde5 00000000`0000bde5 : tcpip!TcpPreValidatedReceive+0x363
ffffd000`241909a0 fffff800`2873b143 : 00000000`00000000 ffffe000`00000001 00000000`00000001 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x4f
ffffd000`24190a60 fffff800`28739525 : 00000000`00000011 fffff800`28889100 ffffe000`0b9b2330 ffffd000`24190b68 : tcpip!IppProcessDeliverList+0x63
ffffd000`24190b00 fffff800`28737900 : 00000000`00000028 ffffe000`0fe7b030 fffff800`28889180 ffffe000`0b50d000 : tcpip!IppReceiveHeaderBatch+0x235
ffffd000`24190c30 fffff800`28735d22 : ffffe000`0b901850 00000000`00000000 ffffd000`24191001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x680
ffffd000`24190fb0 fffff800`28736745 : ffffe000`0b9b0002 00000000`00000000 fffff800`28736790 00000000`00000101 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x318
ffffd000`24191090 fffff803`7e85b873 : 00000000`00000000 00000000`00000000 ffffe000`0b574010 ffffd000`2418c000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x155
ffffd000`241911c0 fffff800`28736936 : fffff800`287365f0 ffffd000`241912e0 ffffe000`1377f110 fffff803`7e858e67 : nt!KeExpandKernelStackAndCalloutInternal+0xf3
ffffd000`241912b0 fffff800`27c4fa53 : 00000000`00000000 ffffd000`24191391 ffffe000`00000001 fffff800`28c02b47 : tcpip!FlReceiveNetBufferListChain+0xb6
ffffd000`24191330 fffff800`27c4fe7f : 00000000`00000001 fffff800`27d60008 00000000`00000000 00000000`00000001 : NDIS!ndisMIndicateNetBufferListsToOpen+0x123
ffffd000`241913f0 fffff800`27c50094 : ffffe000`0b6e61a0 ffffd000`24191501 00000000`3b9d0165 fffff800`287113e7 : NDIS!ndisMTopReceiveNetBufferLists+0x22f
ffffd000`24191480 fffff800`285df3d4 : 00000000`00100001 00000000`000001af ffffe000`00000003 00000000`00100000 : NDIS!NdisMIndicateReceiveNetBufferLists+0x114
ffffd000`24191670 fffff800`285e0afb : ffffe000`00000001 ffffd000`241917e0 ffffe000`0b85e000 00000000`00000000 : vmxnet3+0xc3d4
ffffd000`24191770 fffff800`27c51e02 : ffffe000`0b6e61a0 ffffd000`24191829 00000000`00000000 ffffe000`0b91d000 : vmxnet3+0xdafb
ffffd000`241917b0 fffff803`7e8e7cd0 : 00000000`00000000 ffffd000`24167180 ffffe000`0b733430 ffffd000`24191a20 : NDIS!ndisInterruptDpc+0x1a3
ffffd000`24191890 fffff803`7e8e6f87 : 00000000`00000006 00000000`0023b8ae ffffe000`0cc8ca20 ffffd000`00000002 : nt!KiExecuteAllDpcs+0x1b0
ffffd000`241919e0 fffff803`7e9714ea : ffffd000`24167180 ffffd000`24167180 ffffd000`241741c0 ffffe000`0d8fa540 : nt!KiRetireDpcList+0xd7
ffffd000`24191c60 00000000`00000000 : ffffd000`24192000 ffffd000`2418c000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
mrxsmb20!MRxSmb2ShouldRestartExchange+2cf
fffff800`2914394f cc int 3
SYMBOL_NAME: mrxsmb20!MRxSmb2ShouldRestartExchange+2cf
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: mrxsmb20
IMAGE_NAME: mrxsmb20.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 54264430
BUCKET_ID_FUNC_OFFSET: 2cf
FAILURE_BUCKET_ID: 0x1E_80000003_mrxsmb20!MRxSmb2ShouldRestartExchange
BUCKET_ID: 0x1E_80000003_mrxsmb20!MRxSmb2ShouldRestartExchange
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_80000003_mrxsmb20!mrxsmb2shouldrestartexchange
FAILURE_ID_HASH: {2b47424e-8d41-b3dd-c83b-7a72fda39b88}
Followup: MachineOwner
---------
1: kd> lmvm mrxsmb20
start end module name
fffff800`2913d000 fffff800`29175000 mrxsmb20 (pdb symbols) c:\symcache\mrxsmb20.pdb\A3921F64DB2443DBABDEEA2ADA3FEABE1\mrxsmb20.pdb
Loaded symbol image file: mrxsmb20.sys
Image path: \SystemRoot\system32\DRIVERS\mrxsmb20.sys
Image name: mrxsmb20.sys
Timestamp: Sat Sep 27 11:59:28 2014 (54264430)
CheckSum: 0003AB5C
ImageSize: 00038000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
------------------------------------------------------------------------------------------------------
Yongyuth.
Continue reading...