none
windows server 2012 r2 企业版蓝屏重启 RRS feed

  • 问题

  • Microsoft (R) Windows Debugger Version 10.0.18914.1001 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\leihf\Desktop\MEMORY.DMP]
    Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
    
    
    ************* Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       srv*
    Symbol search path is: srv*
    Executable search path is: 
    Windows 8.1 Kernel Version 9600 MP (8 procs) Free x64
    Product: LanManNt, suite: SmallBusiness TerminalServer SmallBusinessRestricted SingleUserTS
    Built by: 9600.17415.amd64fre.winblue_r4.141028-1500
    Machine Name:
    Kernel base = 0xfffff803`aec05000 PsLoadedModuleList = 0xfffff803`aeede250
    Debug session time: Sat Jul 27 09:28:32.141 2019 (UTC + 8:00)
    System Uptime: 0 days 2:55:04.370
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........
    Loading User Symbols
    
    Loading unloaded module list
    ....
    For analysis of this file, run !analyze -v
    nt!KeBugCheckEx:
    fffff803`aed559a0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffd000`5f5954a0=0000000000000050
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except.
    Typically the address is just plain bad or it is pointing at freed memory.
    Arguments:
    Arg1: ffffe000e7f46000, memory referenced.
    Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
    Arg3: fffff8008cbbb360, If non-zero, the instruction address which referenced the bad memory
    	address.
    Arg4: 0000000000000000, (reserved)
    
    Debugging Details:
    ------------------
    
    Page 89463 not present in the dump file. Type ".hh dbgerr004" for details
    
    KEY_VALUES_STRING: 1
    
        Key  : Analysis.CPU.Sec
        Value: 2
    
        Key  : Analysis.Elapsed.Sec
        Value: 144
    
        Key  : Analysis.Memory.CommitPeak.Mb
        Value: 58
    
    
    PROCESSES_ANALYSIS: 1
    
    SERVICE_ANALYSIS: 1
    
    STACKHASH_ANALYSIS: 1
    
    TIMELINE_ANALYSIS: 1
    
    
    DUMP_CLASS: 1
    
    DUMP_QUALIFIER: 401
    
    BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500
    
    SYSTEM_MANUFACTURER:  LENOVO
    
    SYSTEM_PRODUCT_NAME:  ThinkServer RD450
    
    SYSTEM_SKU:  LENOVO_MT_ND
    
    SYSTEM_VERSION:  FFFFFFFFFF          
    
    BIOS_VENDOR:  LENOVO
    
    BIOS_VERSION:  VB3TS440
    
    BIOS_DATE:  09/29/2017
    
    BASEBOARD_MANUFACTURER:  LENOVO
    
    BASEBOARD_PRODUCT:  ThinkServer RD450
    
    BASEBOARD_VERSION:  FFFFFFFFFF          
    
    DUMP_TYPE:  1
    
    BUGCHECK_P1: ffffe000e7f46000
    
    BUGCHECK_P2: 1
    
    BUGCHECK_P3: fffff8008cbbb360
    
    BUGCHECK_P4: 0
    
    WRITE_ADDRESS:  ffffe000e7f46000 Nonpaged pool
    
    FAULTING_IP: 
    srv!SrvOs2FeaToNt+48
    fffff800`8cbbb360 c60300          mov     byte ptr [rbx],0
    
    MM_INTERNAL_CODE:  0
    
    IMAGE_NAME:  srv.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  53d0f15f
    
    MODULE_NAME: srv
    
    FAULTING_MODULE: fffff8008cb69000 srv
    
    CPU_COUNT: 8
    
    CPU_MHZ: 6a3
    
    CPU_VENDOR:  GenuineIntel
    
    CPU_FAMILY: 6
    
    CPU_MODEL: 4f
    
    CPU_STEPPING: 1
    
    CPU_MICROCODE: 6,4f,1,0 (F,M,S,R)  SIG: B000022'00000000 (cache) B000022'00000000 (init)
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    BUGCHECK_STR:  AV
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    ANALYSIS_SESSION_HOST:  LNLR
    
    ANALYSIS_SESSION_TIME:  07-27-2019 10:50:13.0156
    
    ANALYSIS_VERSION: 10.0.18914.1001 amd64fre
    
    TRAP_FRAME:  ffffd0005f595700 -- (.trap 0xffffd0005f595700)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=ffffe000e7f46000
    rdx=ffffc0008fdab082 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8008cbbb360 rsp=ffffd0005f595890 rbp=ffffc0008fdab07d
     r8=0000000000000000  r9=0000000000000000 r10=0000000000000200
    r11=ffffe000e7f46000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    srv!SrvOs2FeaToNt+0x48:
    fffff800`8cbbb360 c60300          mov     byte ptr [rbx],0 ds:00000000`00000000=??
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff803aed83bd2 to fffff803aed559a0
    
    STACK_TEXT:  
    ffffd000`5f595498 fffff803`aed83bd2 : 00000000`00000050 ffffe000`e7f46000 00000000`00000001 ffffd000`5f595700 : nt!KeBugCheckEx
    ffffd000`5f5954a0 fffff803`aec5d2b9 : 00000000`00000001 ffffe000`e09ca900 ffffd000`5f595700 fffff803`aecf3bc2 : nt! ?? ::FNODOBFM::`string'+0x1dd22
    ffffd000`5f595540 fffff803`aed5fc2f : 00000000`00000001 ffffe000`e7f46000 00000000`00000200 fffff803`aeea94d3 : nt!MmAccessFault+0x769
    ffffd000`5f595700 fffff800`8cbbb360 : 00000000`00000000 00000000`00000011 ffffd000`5f5959b8 ffffd000`5f5959b0 : nt!KiPageFault+0x12f
    ffffd000`5f595890 fffff800`8cbbb2a5 : ffffc000`8fdab07d ffffe000`e7f45ff8 00000000`00000000 ffffc000`8fdb3138 : srv!SrvOs2FeaToNt+0x48
    ffffd000`5f5958c0 fffff800`8cbdc69b : ffffe000`e7e33010 00000000`00000000 ffffc000`8fda3010 ffffd000`5f940180 : srv!SrvOs2FeaListToNt+0x125
    ffffd000`5f595910 fffff800`8cbe58ba : 00000000`00000000 fffff800`00008fe8 ffffe000`e7f3d010 ffffe000`e7e33010 : srv!SrvSmbOpen2+0xc3
    ffffd000`5f5959b0 fffff800`8cbe8b2e : ffffe000`e384c240 ffffe000`e7e33010 ffffc000`8fda3010 00000000`00000002 : srv!ExecuteTransaction+0x2ca
    ffffd000`5f5959f0 fffff800`8cb7684f : 00000000`00000000 00000000`00000000 ffffe000`00000038 ffffc000`0000f149 : srv!SrvSmbTransactionSecondary+0x40b
    ffffd000`5f595a90 fffff800`8cb76a20 : ffffe000`e7e33010 00000000`00000000 ffffe000`e7e33a80 fffff800`8cb84010 : srv!SrvProcessSmb+0x237
    ffffd000`5f595b10 fffff800`8cbb5ac8 : ffffe000`e37cb340 ffffe000`e7e33010 00000000`00000000 ffffe000`e7e33020 : srv!SrvRestartReceive+0x114
    ffffd000`5f595b50 fffff803`af11dd92 : 00000000`00000000 ffffe000`e37cb340 00000000`00000080 ffffe000`e2c63770 : srv!WorkerThread+0x5248
    ffffd000`5f595bd0 fffff803`aed06c70 : ffffe000`e37de880 ffffe000`e37de880 ffffe000`e37bbec8 00000000`00000000 : nt!IopThreadStart+0x26
    ffffd000`5f595c00 fffff803`aed5bfc6 : ffffd000`5f940180 ffffe000`e37de880 ffffd000`5f94c3c0 ffffe000`e1f6a740 : nt!PspSystemThreadStartup+0x58
    ffffd000`5f595c60 00000000`00000000 : ffffd000`5f596000 ffffd000`5f590000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
    
    
    THREAD_SHA1_HASH_MOD_FUNC:  9fc67a809a80c1143874aa0b8e74457296ca0384
    
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  5338ea5633c7cc4256ea37dbe681dc446cb13b44
    
    THREAD_SHA1_HASH_MOD:  8f10e91895468b5b2a56df2106350f23f731e5ce
    
    FOLLOWUP_IP: 
    srv!SrvOs2FeaToNt+48
    fffff800`8cbbb360 c60300          mov     byte ptr [rbx],0
    
    FAULT_INSTR_CODE:  f0003c6
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  srv!SrvOs2FeaToNt+48
    
    FOLLOWUP_NAME:  MachineOwner
    
    STACK_COMMAND:  .thread ; .cxr ; kb
    
    BUCKET_ID_FUNC_OFFSET:  48
    
    FAILURE_BUCKET_ID:  AV_srv!SrvOs2FeaToNt
    
    BUCKET_ID:  AV_srv!SrvOs2FeaToNt
    
    PRIMARY_PROBLEM_CLASS:  AV_srv!SrvOs2FeaToNt
    
    TARGET_TIME:  2019-07-27T01:28:32.000Z
    
    OSBUILD:  9600
    
    OSSERVICEPACK:  0
    
    SERVICEPACK_NUMBER: 0
    
    OS_REVISION: 0
    
    SUITE_MASK:  305
    
    PRODUCT_TYPE:  2
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 8.1
    
    OSEDITION:  Windows 8.1 LanManNt SmallBusiness TerminalServer SmallBusinessRestricted SingleUserTS
    
    OS_LOCALE:  
    
    USER_LCID:  0
    
    OSBUILD_TIMESTAMP:  2014-10-29 08:38:48
    
    BUILDDATESTAMP_STR:  141028-1500
    
    BUILDLAB_STR:  winblue_r4
    
    BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500
    
    ANALYSIS_SESSION_ELAPSED_TIME:  235bf
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:av_srv!srvos2featont
    
    FAILURE_ID_HASH:  {d5f1a37d-2c94-f55b-5042-7a5dbaa092e1}
    
    Followup:     MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except.
    Typically the address is just plain bad or it is pointing at freed memory.
    Arguments:
    Arg1: ffffe000e7f46000, memory referenced.
    Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
    Arg3: fffff8008cbbb360, If non-zero, the instruction address which referenced the bad memory
    	address.
    Arg4: 0000000000000000, (reserved)
    
    Debugging Details:
    ------------------
    
    Page 89463 not present in the dump file. Type ".hh dbgerr004" for details
    
    KEY_VALUES_STRING: 1
    
        Key  : Analysis.CPU.Sec
        Value: 1
    
        Key  : Analysis.Elapsed.Sec
        Value: 1
    
        Key  : Analysis.Memory.CommitPeak.Mb
        Value: 60
    
    
    PROCESSES_ANALYSIS: 1
    
    SERVICE_ANALYSIS: 1
    
    STACKHASH_ANALYSIS: 1
    
    TIMELINE_ANALYSIS: 1
    
    
    DUMP_CLASS: 1
    
    DUMP_QUALIFIER: 401
    
    BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500
    
    SYSTEM_MANUFACTURER:  LENOVO
    
    SYSTEM_PRODUCT_NAME:  ThinkServer RD450
    
    SYSTEM_SKU:  LENOVO_MT_ND
    
    SYSTEM_VERSION:  FFFFFFFFFF          
    
    BIOS_VENDOR:  LENOVO
    
    BIOS_VERSION:  VB3TS440
    
    BIOS_DATE:  09/29/2017
    
    BASEBOARD_MANUFACTURER:  LENOVO
    
    BASEBOARD_PRODUCT:  ThinkServer RD450
    
    BASEBOARD_VERSION:  FFFFFFFFFF          
    
    DUMP_TYPE:  1
    
    BUGCHECK_P1: ffffe000e7f46000
    
    BUGCHECK_P2: 1
    
    BUGCHECK_P3: fffff8008cbbb360
    
    BUGCHECK_P4: 0
    
    WRITE_ADDRESS:  ffffe000e7f46000 Nonpaged pool
    
    FAULTING_IP: 
    srv!SrvOs2FeaToNt+48
    fffff800`8cbbb360 c60300          mov     byte ptr [rbx],0
    
    MM_INTERNAL_CODE:  0
    
    IMAGE_NAME:  srv.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  53d0f15f
    
    MODULE_NAME: srv
    
    FAULTING_MODULE: fffff8008cb69000 srv
    
    CPU_COUNT: 8
    
    CPU_MHZ: 6a3
    
    CPU_VENDOR:  GenuineIntel
    
    CPU_FAMILY: 6
    
    CPU_MODEL: 4f
    
    CPU_STEPPING: 1
    
    CPU_MICROCODE: 6,4f,1,0 (F,M,S,R)  SIG: B000022'00000000 (cache) B000022'00000000 (init)
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    BUGCHECK_STR:  AV
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    ANALYSIS_SESSION_HOST:  LNLR
    
    ANALYSIS_SESSION_TIME:  07-27-2019 10:54:04.0510
    
    ANALYSIS_VERSION: 10.0.18914.1001 amd64fre
    
    TRAP_FRAME:  ffffd0005f595700 -- (.trap 0xffffd0005f595700)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=ffffe000e7f46000
    rdx=ffffc0008fdab082 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8008cbbb360 rsp=ffffd0005f595890 rbp=ffffc0008fdab07d
     r8=0000000000000000  r9=0000000000000000 r10=0000000000000200
    r11=ffffe000e7f46000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    srv!SrvOs2FeaToNt+0x48:
    fffff800`8cbbb360 c60300          mov     byte ptr [rbx],0 ds:00000000`00000000=??
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff803aed83bd2 to fffff803aed559a0
    
    STACK_TEXT:  
    ffffd000`5f595498 fffff803`aed83bd2 : 00000000`00000050 ffffe000`e7f46000 00000000`00000001 ffffd000`5f595700 : nt!KeBugCheckEx
    ffffd000`5f5954a0 fffff803`aec5d2b9 : 00000000`00000001 ffffe000`e09ca900 ffffd000`5f595700 fffff803`aecf3bc2 : nt! ?? ::FNODOBFM::`string'+0x1dd22
    ffffd000`5f595540 fffff803`aed5fc2f : 00000000`00000001 ffffe000`e7f46000 00000000`00000200 fffff803`aeea94d3 : nt!MmAccessFault+0x769
    ffffd000`5f595700 fffff800`8cbbb360 : 00000000`00000000 00000000`00000011 ffffd000`5f5959b8 ffffd000`5f5959b0 : nt!KiPageFault+0x12f
    ffffd000`5f595890 fffff800`8cbbb2a5 : ffffc000`8fdab07d ffffe000`e7f45ff8 00000000`00000000 ffffc000`8fdb3138 : srv!SrvOs2FeaToNt+0x48
    ffffd000`5f5958c0 fffff800`8cbdc69b : ffffe000`e7e33010 00000000`00000000 ffffc000`8fda3010 ffffd000`5f940180 : srv!SrvOs2FeaListToNt+0x125
    ffffd000`5f595910 fffff800`8cbe58ba : 00000000`00000000 fffff800`00008fe8 ffffe000`e7f3d010 ffffe000`e7e33010 : srv!SrvSmbOpen2+0xc3
    ffffd000`5f5959b0 fffff800`8cbe8b2e : ffffe000`e384c240 ffffe000`e7e33010 ffffc000`8fda3010 00000000`00000002 : srv!ExecuteTransaction+0x2ca
    ffffd000`5f5959f0 fffff800`8cb7684f : 00000000`00000000 00000000`00000000 ffffe000`00000038 ffffc000`0000f149 : srv!SrvSmbTransactionSecondary+0x40b
    ffffd000`5f595a90 fffff800`8cb76a20 : ffffe000`e7e33010 00000000`00000000 ffffe000`e7e33a80 fffff800`8cb84010 : srv!SrvProcessSmb+0x237
    ffffd000`5f595b10 fffff800`8cbb5ac8 : ffffe000`e37cb340 ffffe000`e7e33010 00000000`00000000 ffffe000`e7e33020 : srv!SrvRestartReceive+0x114
    ffffd000`5f595b50 fffff803`af11dd92 : 00000000`00000000 ffffe000`e37cb340 00000000`00000080 ffffe000`e2c63770 : srv!WorkerThread+0x5248
    ffffd000`5f595bd0 fffff803`aed06c70 : ffffe000`e37de880 ffffe000`e37de880 ffffe000`e37bbec8 00000000`00000000 : nt!IopThreadStart+0x26
    ffffd000`5f595c00 fffff803`aed5bfc6 : ffffd000`5f940180 ffffe000`e37de880 ffffd000`5f94c3c0 ffffe000`e1f6a740 : nt!PspSystemThreadStartup+0x58
    ffffd000`5f595c60 00000000`00000000 : ffffd000`5f596000 ffffd000`5f590000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
    
    
    THREAD_SHA1_HASH_MOD_FUNC:  9fc67a809a80c1143874aa0b8e74457296ca0384
    
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  5338ea5633c7cc4256ea37dbe681dc446cb13b44
    
    THREAD_SHA1_HASH_MOD:  8f10e91895468b5b2a56df2106350f23f731e5ce
    
    FOLLOWUP_IP: 
    srv!SrvOs2FeaToNt+48
    fffff800`8cbbb360 c60300          mov     byte ptr [rbx],0
    
    FAULT_INSTR_CODE:  f0003c6
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  srv!SrvOs2FeaToNt+48
    
    FOLLOWUP_NAME:  MachineOwner
    
    STACK_COMMAND:  .thread ; .cxr ; kb
    
    BUCKET_ID_FUNC_OFFSET:  48
    
    FAILURE_BUCKET_ID:  AV_srv!SrvOs2FeaToNt
    
    BUCKET_ID:  AV_srv!SrvOs2FeaToNt
    
    PRIMARY_PROBLEM_CLASS:  AV_srv!SrvOs2FeaToNt
    
    TARGET_TIME:  2019-07-27T01:28:32.000Z
    
    OSBUILD:  9600
    
    OSSERVICEPACK:  0
    
    SERVICEPACK_NUMBER: 0
    
    OS_REVISION: 0
    
    SUITE_MASK:  305
    
    PRODUCT_TYPE:  2
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 8.1
    
    OSEDITION:  Windows 8.1 LanManNt SmallBusiness TerminalServer SmallBusinessRestricted SingleUserTS
    
    OS_LOCALE:  
    
    USER_LCID:  0
    
    OSBUILD_TIMESTAMP:  2014-10-29 08:38:48
    
    BUILDDATESTAMP_STR:  141028-1500
    
    BUILDLAB_STR:  winblue_r4
    
    BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500
    
    ANALYSIS_SESSION_ELAPSED_TIME:  70f
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:av_srv!srvos2featont
    
    FAILURE_ID_HASH:  {d5f1a37d-2c94-f55b-5042-7a5dbaa092e1}
    
    Followup:     MachineOwner
    ---------
    
    
    2019年7月27日 3:00

全部回复