none
Server 2016 ntkrnlmp.exe导致频繁蓝屏怎么解决 RRS feed

  • 问题

  • Server 2016 ntkrnlmp.exe导致频繁蓝屏怎么解决

    蓝屏文件内容如下


    Microsoft (R) Windows Debugger Version 10.0.19528.1000 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Users\admin\Desktop\新建文件夹\031420-17890-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available


    ************* Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*c:\Symbols*http://msdl.microsoft.com/download/symbols
    Symbol search path is: SRV*c:\Symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 10 Kernel Version 14393 MP (12 procs) Free x64
    Product: Server, suite: TerminalServer DataCenter SingleUserTS
    14393.3564.amd64fre.rs1_release.200303-1942
    Machine Name:
    Kernel base = 0xfffff802`f7285000 PsLoadedModuleList = 0xfffff802`f75890a0
    Debug session time: Sat Mar 14 02:02:54.463 2020 (UTC + 8:00)
    System Uptime: 0 days 15:05:31.388
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..........................
    Loading User Symbols
    Loading unloaded module list
    .......
    For analysis of this file, run !analyze -v
    nt!KeBugCheckEx:
    fffff802`f73e2590 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffff8a01`13b1f4e0=000000000000003b
    9: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff802f732ecef, Address of the instruction which caused the bugcheck
    Arg3: ffff8a0113b1fdc0, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.

    Debugging Details:
    ------------------


    KEY_VALUES_STRING: 1

        Key  : Analysis.CPU.Sec
        Value: 5

        Key  : Analysis.DebugAnalysisProvider.CPP
        Value: Create: 8007007e on DESKTOP-KG37OCV

        Key  : Analysis.DebugData
        Value: CreateObject

        Key  : Analysis.DebugModel
        Value: CreateObject

        Key  : Analysis.Elapsed.Sec
        Value: 7

        Key  : Analysis.Memory.CommitPeak.Mb
        Value: 64

        Key  : Analysis.System
        Value: CreateObject


    ADDITIONAL_XML: 1

    VIRTUAL_MACHINE:  VMware

    BUGCHECK_CODE:  3b

    BUGCHECK_P1: c0000005

    BUGCHECK_P2: fffff802f732ecef

    BUGCHECK_P3: ffff8a0113b1fdc0

    BUGCHECK_P4: 0

    CONTEXT:  ffff8a0113b1fdc0 -- (.cxr 0xffff8a0113b1fdc0)
    rax=00000000ffff8a01 rbx=ffff8a011051a9e8 rcx=ffff8a011051a9e8
    rdx=0000000000000000 rsi=0000000000000034 rdi=ffff8a011051ac10
    rip=fffff802f732ecef rsp=ffff8a0113b207b8 rbp=ffff8a0113b20860
     r8=00d7393900026210  r9=ffff8a011051aac0 r10=000000000000ac30
    r11=00003cff00016398 r12=ffff8a0110515180 r13=0000000000000000
    r14=ffff8a011051ac28 r15=fffff802f762d3c0
    iopl=0         nv up ei ng nz na po cy
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010287
    nt!KiComputeCpuSetAffinity+0x33:
    fffff802`f732ecef 4f8b04d0        mov     r8,qword ptr [r8+r10*8] ds:002b:00d73939`0007c390=????????????????
    Resetting default scope

    CUSTOMER_CRASH_COUNT:  1

    PROCESS_NAME:  LdTerm.exe

    STACK_TEXT:  
    ffff8a01`13b207b8 fffff802`f732eb7e : ffff8a01`1051a9e8 ffff8a01`1051ac10 ffff8a01`105dbc30 00000000`00000000 : nt!KiComputeCpuSetAffinity+0x33
    ffff8a01`13b207c0 fffff802`f72edf68 : ffff8a01`1051a9e8 00000000`00000001 ffff8a01`1051a901 00000000`02890113 : nt!KiComputeThreadAffinity+0x5e
    ffff8a01`13b20800 fffff802`f7404b47 : ffff8a01`10515180 00001f80`00000004 ffff8a01`13b20a84 00000000`00000000 : nt!KiDeferredReadyThread+0x8a8
    ffff8a01`13b208a0 fffff802`f72f1e62 : ffffd307`00000000 00000000`00000000 ffff8a01`10499300 ffff8a01`10489180 : nt!KiSearchForNewThread+0x112657
    ffff8a01`13b20900 fffff802`f72f198f : ffffd307`e2b9f080 ffffd307`e2b9f180 00000000`00000000 00000000`00000000 : nt!KiSwapThread+0xf2
    ffff8a01`13b209b0 fffff802`f72ac9d6 : ffffd307`00000000 ffffd307`00000000 ffff8a01`00000002 ffff8a01`13b20b10 : nt!KiCommitThreadWait+0x14f
    ffff8a01`13b20a50 fffff802`f767b1ee : 00000000`00229000 00000000`00000282 ffff8a01`13b20a00 00000000`00000018 : nt!KeDelayExecutionThread+0x106
    ffff8a01`13b20ad0 fffff802`f73f2103 : ffffd307`e2b9f080 00000000`76fbeb40 ffffffff`ffffd8f0 ffffd307`e2b1c470 : nt!NtDelayExecution+0x5e
    ffff8a01`13b20b00 00000000`6295223c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0567f368 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6295223c


    SYMBOL_NAME:  nt!KiComputeCpuSetAffinity+33

    MODULE_NAME: nt

    IMAGE_NAME:  ntkrnlmp.exe

    IMAGE_VERSION:  10.0.14393.3564

    STACK_COMMAND:  .cxr 0xffff8a0113b1fdc0 ; kb

    BUCKET_ID_FUNC_OFFSET:  33

    FAILURE_BUCKET_ID:  0x3B_c0000005_nt!KiComputeCpuSetAffinity

    OS_VERSION:  10.0.14393.3564

    BUILDLAB_STR:  rs1_release

    OSPLATFORM_TYPE:  x64

    OSNAME:  Windows 10

    FAILURE_ID_HASH:  {7ae6ff92-3cb1-f449-f6ac-8ba4ac087859}

    Followup:     MachineOwner
    ---------

    9: kd> PROCESS
           ^ No runnable debuggees error in 'PROCESS'
    9: kd> ! PROCESS
    PROCESS ffffd307e2b4c4c0
        SessionId: 2  Cid: 1678    Peb: 00206000  ParentCid: 09dc
        DirBase: 34817000  ObjectTable: ffffa8049b8ccc80  HandleCount: <Data Not Accessible>
        Image: LdTerm.exe
        VadRoot ffffd307e2bb9cf0 Vads 196 Clone 0 Private 2047. Modified 1091063. Locked 0.
        DeviceMap ffffa8049a5e51d0
        Token                             ffffa8049b8ce990
        ReadMemory error: Cannot get nt!KeMaximumIncrement value.
    fffff78000000000: Unable to get shared data
        ElapsedTime                       00:00:00.000
        UserTime                          00:00:00.000
        KernelTime                        00:00:00.000
        QuotaPoolUsage[PagedPool]         344576
        QuotaPoolUsage[NonPagedPool]      26888
        Working Set Sizes (now,min,max)  (6629, 50, 345) (26516KB, 200KB, 1380KB)
        PeakWorkingSetSize                6552
        VirtualSize                       201 Mb
        PeakVirtualSize                   204 Mb
        PageFaultCount                    32112
        MemoryPriority                    BACKGROUND
        BasePriority                      8
        CommitCharge                      2669

            *** Error in reading nt!_ETHREAD @ ffffd307e2b59080

    9: kd> lmvm nt
    Browse full module list
    start             end                 module name
    fffff802`f7285000 fffff802`f7aa2000   nt         (pdb symbols)          c:\symbols\ntkrnlmp.pdb\326B55BFB40D40CC9CB6363C45C904841\ntkrnlmp.pdb
        Loaded symbol image file: ntkrnlmp.exe
        Mapped memory image file: c:\symbols\ntoskrnl.exe\5E5F4D4A81d000\ntoskrnl.exe
        Image path: ntkrnlmp.exe
        Image name: ntkrnlmp.exe
        Browse all global symbols  functions  data
        Timestamp:        Wed Mar  4 14:40:10 2020 (5E5F4D4A)
        CheckSum:         00773A15
        ImageSize:        0081D000
        File version:     10.0.14393.3564
        Product version:  10.0.14393.3564
        File flags:       0 (Mask 3F)
        File OS:          40004 NT Win32
        File type:        1.0 App
        File date:        00000000.00000000
        Translations:     0409.04b0
        Information from resource tables:
            CompanyName:      Microsoft Corporation
            ProductName:      Microsoft® Windows® Operating System
            InternalName:     ntkrnlmp.exe
            OriginalFilename: ntkrnlmp.exe
            ProductVersion:   10.0.14393.3564
            FileVersion:      10.0.14393.3564 (rs1_release.200303-1942)
            FileDescription:  NT Kernel & System
            LegalCopyright:   © Microsoft Corporation. All rights reserved.

    2020年4月10日 3:24

全部回复

  • 您好,

     

    请理解,论坛是一个公共场合,根据论坛的安全政策以及您自身的信息安全,我们不再提供dump/log文件的分析。对于此类文件的分析诊断,您可能需要新开一个case,链接如下所示:

    https://support.microsoft.com/zh-cn/supportforbusiness/productselection

    希望能帮助到您!祝您生活愉快~

     

    最好的问候,

    Kiki


    如果认为回帖者的回答有所帮助,请将之标记为答复,这样可以帮助更多的用户获取有效信息。

     

    针对Windows 2008/2008R2的扩展支持将于2020年结束,之后微软将不再为其提供安全更新。点击此处或扫描二维码获取《在 Azure 上运行 Windows Server 的终极指南》,把握良机完成云迁移并实现业务现代化。


    2020年4月13日 7:23