none
WHCK DF-PCI Root Port Surprise Remove Test Fails with filter 227 on Server 2012 and 2012r2. RRS feed

  • Question

  • Hi! I'm using HCK version 8.100.26905 to certify an external RAID array. We do not provide any drivers for our device. All other HCK tests pass, and Server 2008 passes 100%. I've debugged this test on Server 2012 and the results are below. I'm assuming I need to post my issue here in the forums in order to get assistance from WHCK CSS? Please help. Thanks!!

    ************* Symbol Path validation summary **************
    Response                         Time (ms)     Location
    OK                                             C:\
    Deferred                                       http://msdl.microsoft.com/download/symbols
    OK                                             C:\Symbols
    Driver Verifier: Enabled for Wdf01000.sys, flags 0x209bb, build 9200, key p7JA9JcrgfuMh1LgQx42FF
    Driver Verifier: Enabled for MSDMFilt.sys, flags 0x209bb, build 9200, key 4ZhY9XTY3CkyhYZ49G1cvF
    Driver Verifier: Enabled for partmgr.sys, flags 0x209bb, build 9200, key KmJVgOPq4ilGEMU9vvrn2E
    Driver Verifier: Enabled for EhStorClass.sys, flags 0x209bb, build 9200, key SuVhVduq6A4x5zBpo3oUgF
    Driver Verifier: Enabled for disk.sys, flags 0x209bb, build 9200, key IC65abphgyGBPjSvCDNbeF
    IOINIT: Built-in driver \Driver\sacdrv failed to initialize with status - 0xC0000037
    KDTARGET: Refreshing KD connection
    Driver Verifier: Enabled for button.sys, flags 0x209bb, build 9200, key j58Fw6T1nmDstT3Y0GsuaF
    Driver Verifier: Enabled for EhStorClass.sys, flags 0x209bb, build 9200, key SuVhVduq6A4x5zBpo3oUgF
    Driver Verifier: Enabled for EhStorClass.sys, flags 0x209bb, build 9200, key SuVhVduq6A4x5zBpo3oUgF

    *** Fatal System Error: 0x0000003b
                           (0x00000000C0000005,0xFFFFF8036F0D0D41,0xFFFFF8800A4CB490,0x0000000000000000)

    Break instruction exception - code 80000003 (first chance)

    A fatal system error has occurred.
    Debugger entered on first try; Bugcheck callbacks have not been invoked.

    A fatal system error has occurred.

    Connected to Windows 8 9200 x64 target at (Thu Mar 26 10:17:24.952 2015 (UTC - 7:00)), ptr64 TRUE
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ............
    Loading User Symbols
    ................................................................
    ............
    Loading unloaded module list
    ...........................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 3B, {c0000005, fffff8036f0d0d41, fffff8800a4cb490, 0}

    Probably caused by : ntkrnlmp.exe ( nt!CmpKcbCacheLookup+299 )

    Followup: MachineOwner
    ---------

    nt!DbgBreakPointWithStatus:
    fffff803`6ecc2d70 cc              int     3
    4: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff8036f0d0d41, Address of the instruction which caused the bugcheck
    Arg3: fffff8800a4cb490, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.

    Debugging Details:
    ------------------


    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

    FAULTING_IP:
    nt!CmpKcbCacheLookup+299
    fffff803`6f0d0d41 8b01            mov     eax,dword ptr [rcx]

    CONTEXT:  fffff8800a4cb490 -- (.cxr 0xfffff8800a4cb490;r)
    rax=00000000f5271cd7 rbx=0000000000000000 rcx=0000000000000100
    rdx=0000000000000000 rsi=0000000000000000 rdi=fffff8800a4cc0a8
    rip=fffff8036f0d0d41 rsp=fffff8800a4cbe90 rbp=0000000000000041
     r8=fffff8a001443de8  r9=0000000000000003 r10=000000000000ffff
    r11=0000000000000000 r12=fffff8a000f57258 r13=fffff8800a4cc0f8
    r14=fffff8a000273988 r15=fffff8a0016b38ad
    iopl=0         nv up ei pl zr na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
    nt!CmpKcbCacheLookup+0x299:
    fffff803`6f0d0d41 8b01            mov     eax,dword ptr [rcx] ds:002b:00000000`00000100=????????
    Last set context:
    rax=00000000f5271cd7 rbx=0000000000000000 rcx=0000000000000100
    rdx=0000000000000000 rsi=0000000000000000 rdi=fffff8800a4cc0a8
    rip=fffff8036f0d0d41 rsp=fffff8800a4cbe90 rbp=0000000000000041
     r8=fffff8a001443de8  r9=0000000000000003 r10=000000000000ffff
    r11=0000000000000000 r12=fffff8a000f57258 r13=fffff8800a4cc0f8
    r14=fffff8a000273988 r15=fffff8a0016b38ad
    iopl=0         nv up ei pl zr na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
    nt!CmpKcbCacheLookup+0x299:
    fffff803`6f0d0d41 8b01            mov     eax,dword ptr [rcx] ds:002b:00000000`00000100=????????
    Resetting default scope

    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

    BUGCHECK_STR:  0x3B

    PROCESS_NAME:  svchost.exe

    CURRENT_IRQL:  0

    ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre

    LAST_CONTROL_TRANSFER:  from fffff8036f0d335d to fffff8036f0d0d41

    STACK_TEXT: 
    fffff880`0a4cbe90 fffff803`6f0d335d : fffff880`0a4cc0a8 fffff8a0`00000006 fffff880`0a4cc4d0 fffff880`0a4cc4b0 : nt!CmpKcbCacheLookup+0x299
    fffff880`0a4cbf80 fffff803`6f0be7c9 : 00000000`00020019 fffff8a0`00025130 fffff880`0a4cc471 fffffa80`27666010 : nt!CmpBuildHashStackAndLookupCache+0x37d
    fffff880`0a4cc3f0 fffff803`6f09c305 : 00000000`00000001 fffffa80`276661d0 fffff6fc`01b78300 fffff880`0a4cc9e0 : nt!CmpParseKey+0x319
    fffff880`0a4cc770 fffff803`6f0ac598 : 00000000`00000a50 fffff880`0a4cc938 00000000`00000040 fffffa80`25d9e120 : nt!ObpLookupObjectName+0x806
    fffff880`0a4cc8c0 fffff803`6f06cdcc : 00000000`00000000 00000000`00000000 00000000`00000001 00000086`37c9e3b8 : nt!ObOpenObjectByName+0x258
    fffff880`0a4cc990 fffff803`6f06d03d : 00000000`00000000 fffff880`0a4cccc0 00000000`00000010 fffff803`6f06d014 : nt!CmCreateKey+0x42e
    fffff880`0a4ccb80 fffff803`6ecc7453 : 000007fc`32020000 00000000`00000000 00000000`00000000 00000086`37c9e288 : nt!NtCreateKey+0x29
    fffff880`0a4ccbd0 000007fc`35012d7a : 000007fc`3202ef54 00000086`37c9e278 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000086`37c9de18 000007fc`3202ef54 : 00000086`37c9e278 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!NtCreateKey+0xa
    00000086`37c9de20 000007fc`3202f1a8 : 00000086`37c9e3b8 00000000`c0000034 00000086`3790e200 00000086`37c9e278 : KERNELBASE!Wow64NtCreateKey+0xa0
    00000086`37c9df00 000007fc`3202f3c1 : 00000086`15b335c0 00000000`00000000 000007fc`2d4029d0 000007fc`2d3f1103 : KERNELBASE!LocalBaseRegCreateKey+0x1f8
    00000086`37c9e210 000007fc`3202f45f : 00000000`00000a50 00000086`78a9bc10 00000086`78a9bcce 00000086`37c9e320 : KERNELBASE!RegCreateKeyExInternalW+0x141
    00000086`37c9e2f0 000007fc`2d3fd04b : 00000000`00000000 00000000`00000000 000065ff`76f178e7 000007fc`2d3f179f : KERNELBASE!RegCreateKeyExW+0x4b
    00000086`37c9e350 000007fc`2d3fcf21 : 00000086`78a9bc10 00000086`37c9e748 000007fc`2d43c400 000007fc`2d43c400 : nlasvc!SetNlaValue+0x9e
    00000086`37c9e3e0 000007fc`2d3f9d85 : 00000000`00000001 00000000`00000001 00000086`37ee7400 00000086`37c9e6d8 : nlasvc!IntranetpUpdateLikelyhoodMac+0x267
    00000086`37c9e680 000007fc`2d3f9a1c : 00000000`00000000 000007fc`35025025 00000086`15b12a20 00000086`15b12a20 : nlasvc!IntranetpIfSendUpdates+0x7ac
    00000086`37c9fb50 000007fc`35024f54 : 00000086`15b12a20 00000000`00000000 00000000`00000000 00000086`37c9fd48 : nlasvc!IntranetpResolutionStart+0x89
    00000086`37c9fb90 000007fc`35024d32 : 00000086`1756fb00 00000086`37d311e0 00000086`37d31200 00000086`00000000 : ntdll!RtlpTpWaitCallback+0xf4
    00000086`37c9fbf0 000007fc`350177e6 : 00000086`1756fc60 00000000`00000000 00000086`15b07a50 00000086`15b806d0 : ntdll!TppExecuteWaitCallback+0x122
    00000086`37c9fc40 000007fc`33271842 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!TppWorkerThread+0x388
    00000086`37c9fee0 000007fc`3504f9d1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : KERNEL32!BaseThreadInitThunk+0x1a
    00000086`37c9ff10 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x1d


    FOLLOWUP_IP:
    nt!CmpKcbCacheLookup+299
    fffff803`6f0d0d41 8b01            mov     eax,dword ptr [rcx]

    SYMBOL_STACK_INDEX:  0

    SYMBOL_NAME:  nt!CmpKcbCacheLookup+299

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: nt

    IMAGE_NAME:  ntkrnlmp.exe

    DEBUG_FLR_IMAGE_TIMESTAMP:  54c9cc61

    IMAGE_VERSION:  6.2.9200.17251

    STACK_COMMAND:  .cxr 0xfffff8800a4cb490 ; kb

    BUCKET_ID_FUNC_OFFSET:  299

    FAILURE_BUCKET_ID:  0x3B_VRF_nt!CmpKcbCacheLookup

    BUCKET_ID:  0x3B_VRF_nt!CmpKcbCacheLookup

    ANALYSIS_SOURCE:  KM

    FAILURE_ID_HASH_STRING:  km:0x3b_vrf_nt!cmpkcbcachelookup

    FAILURE_ID_HASH:  {74bb5fcd-efd8-cb3d-b6e7-9a3b53dddf3f}

    Followup: MachineOwner
    ---------



    • Edited by dschase Monday, March 30, 2015 7:42 PM
    Friday, March 27, 2015 10:45 PM