- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - Microsoft
- >
- Server 2016 bluescreen vmswitch.sys
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-07-2017 05:16 AM
01-07-2017 05:16 AM
Server 2016 bluescreen vmswitch.sys
I am facing a serious issue on two Hyper-V-hosts with Windows Server 2016 Datacenter.
Without external influence they crash and all guest VMs too. The STOP code is UNEXPECTED_KERNEL_MODE_TRAP 0x0000007f and it is caused by vmswitch.sys A simple reboot does not fix this, it always crashes 8 to 10 times in a row until it works properly again.
This problem occurs on two of our servers with completely different hardware. I tried several versions of the nic driver, but it did not resolve the issue. VMQ is already disabled on the nics and in the VM settings.
I updated all drivers und bios to the latest versions. In one server I changed the Ethernet adapter card, but the issue persisted.
Here you can download a recent minidump file: https://dl.dropboxusercontent.com/u/76615769/110416-20546-01.dmp
I analyzed a recent memory.dmp with WinDbg and the failure was caused by vmswitch!VmsPktParseIPv4Packet.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: fffff80288d24e70
Arg3: fffff80288d0efc0
Arg4: fffff801d4a0fa0a
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.14393.351 (rs1_release_inmarket.161014-1755)
SYSTEM_MANUFACTURER: HP
SYSTEM_PRODUCT_NAME: ProLiant MicroServer Gen8
SYSTEM_SKU: F9A40A
BIOS_VENDOR: HP
BIOS_VERSION: J06
BIOS_DATE: 11/09/2013
DUMP_TYPE: 2
BUGCHECK_P1: 8
BUGCHECK_P2: fffff80288d24e70
BUGCHECK_P3: fffff80288d0efc0
BUGCHECK_P4: fffff801d4a0fa0a
BUGCHECK_STR: 0x7f_8
TRAP_FRAME: fffff80288d24e70 -- (.trap 0xfffff80288d24e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff62658c80bfb8 rbx=0000000000000000 rcx=ffff918a74f14c30
rdx=0000000000000065 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801d4a0fa0a rsp=fffff80288d0efc0 rbp=0000000000000000
r8=0000000000000366 r9=fffff80288d12cb0 r10=0000000000000000
r11=fffff801d4a57343 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
vmswitch!VmsPktParseIPv4Packet+0x1a:
fffff801`d4a0fa0a 4c89442438 mov qword ptr [rsp+38h],r8 ss:0018:fffff802`88d0eff8=????????????????
Resetting default scope
CPU_COUNT: 4
CPU_MHZ: 8f7
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3a
CPU_STEPPING: 9
CPU_MICROCODE: 6,3a,9,0 (F,M,S,R) SIG: 1B'00000000 (cache) 1B'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT_SERVER
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: FELIX-WIN10
ANALYSIS_SESSION_TIME: 01-07-2017 14:10:13.0467
ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
STACK_OVERFLOW: Stack Limit: fffff80288d0f000. Use (kF) and (!stackusage) to investigate stack usage.
STACKUSAGE_FUNCTION: The function at address 0xFFFFF801D4A734DC was blamed for the stack overflow. It is using 15264 bytes of stack total in 106 instances (likely recursion).
FOLLOWUP_IP:
vmswitch!VmsPktParseIPv4Packet+63aec
fffff801`d4a734dc 90 nop
STACK_COMMAND: .trap 0xfffff80288d24e70 ; kb
THREAD_SHA1_HASH_MOD_FUNC: 93424311f65cbfa2e614c0eb88b95d5b29167b57
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: dce58a582219dea1d7e594f3df9698be645a23a9
THREAD_SHA1_HASH_MOD: cc4158ba2185e63d52742ed134310e999c22d8d5
FAULT_INSTR_CODE: c685e990
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: vmswitch!VmsPktParseIPv4Packet+63aec
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: vmswitch
IMAGE_NAME: vmswitch.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 57dacdf2
IMAGE_VERSION: 10.0.14393.206
BUCKET_ID_FUNC_OFFSET: 63aec
FAILURE_BUCKET_ID: 0x7f_8_STACK_USAGE_RECURSION_vmswitch!VmsPktParseIPv4Packet
BUCKET_ID: 0x7f_8_STACK_USAGE_RECURSION_vmswitch!VmsPktParseIPv4Packet
PRIMARY_PROBLEM_CLASS: 0x7f_8_STACK_USAGE_RECURSION_vmswitch!VmsPktParseIPv4Packet
TARGET_TIME: 2016-11-04T10:56:59.000Z
OSBUILD: 14393
OSSERVICEPACK: 351
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 400
PRODUCT_TYPE: 3
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 Server TerminalServer DataCenter SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2016-10-15 05:38:38
BUILDDATESTAMP_STR: 161014-1755
BUILDLAB_STR: rs1_release_inmarket
BUILDOSVER_STR: 10.0.14393.351
ANALYSIS_SESSION_ELAPSED_TIME: 10d0
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x7f_8_stack_usage_recursion_vmswitch!vmspktparseipv4packet
FAILURE_ID_HASH: {54616c76-71d3-7277-08ba-c2d2fa4a114c}Here is the call stack:
nt!KeBugCheckEx nt!KiBugCheckDispatch+0x69 nt!KiDoubleFaultAbort+0xb3 vmswitch!VmsPktParseIPv4Packet+0x1a vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParseIPv4Packet+0x63aec vmswitch!VmsPktParsePacket+0x156 vmswitch!VmsNblGenerateRssHash+0xd3 vmswitch!VmsVmNicPvtPacketForward+0x234 vmswitch!VmsRouterDeliverNetBufferLists+0x81a vmswitch!VmsExtPtReceiveNetBufferLists+0x193 NDIS!ndisMIndicateNetBufferListsToOpen+0x11e NDIS!ndisMTopReceiveNetBufferLists+0x265fc NDIS!ndisCallReceiveHandler+0x47 NDIS!NdisMIndicateReceiveNetBufferLists+0x735 vmswitch!VmsExtMpIndicatePackets+0x7b4 vmswitch!VmsExtMpSendNetBufferLists+0x5a8 NDIS!ndisMSendNBLToMiniportInternal+0xee NDIS!NdisSendNetBufferLists+0x36c vmswitch!VmsExtPtRouteNetBufferLists+0x3fe vmswitch!VmsPtNicReceiveNetBufferLists+0x8a0 NDIS!ndisMIndicateNetBufferListsToOpen+0x11e NDIS!NdisMIndicateReceiveNetBufferLists+0x26ca3 b57nd60a+0x48804
I already discussed this problem in the TechNet forum, but the tips there did not help. Maybe someone here can help me
Thanks for your efforts, FelR
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-14-2019 05:36 AM
11-14-2019 05:36 AM
Re: Server 2016 bluescreen vmswitch.sys
Hi,
Does anyone know how to fix this problem? I have exactly the same problem but I can`t find the solution.
I Updated firmware and driver for Broadcom/Qlogic Network adapter.
Any Idea?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-14-2019 05:55 AM
11-14-2019 05:55 AM
Re: Server 2016 bluescreen vmswitch.sys
Hi,
I ended up opening a call with MS. A temporary workaround was to disable TCP offloading using these commands
netsh int tcp set global rss=disabled
netsh int tcp set global autotuninglevel=disabled
netsh int tcp set global chimney=disabledFinally the problem was fixed by a new version of vmswitch.sys in the KB4013429 update.