询问者
2012 R2 不断无故重启

问题
-
Microsoft (R) Windows Debugger Version 6.2.9200.20512 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [E:\share\MEMORY.DMP]
Kernel Bitmap Dump File: Only kernel address space is available
Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9200 MP (4 procs) Free x64
Product: Server, suite: TerminalServer SingleUserTS
Built by: 9200.22086.amd64fre.win8_ldr.170209-0600
Machine Name:
Kernel base = 0xfffff801`28004000 PsLoadedModuleList = 0xfffff801`282cba60
Debug session time: Sat Apr 27 00:25:28.935 2019 (UTC + 8:00)
System Uptime: 0 days 2:46:18.359
Loading Kernel Symbols
...............................................................
................................................................
.
Loading User Symbols
PEB is paged out (Peb.Ldr = 000007f7`2135d018). Type ".hh dbgerr001" for details
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 133, {1, 1e00, 0, 0}
Probably caused by : NETIO.SYS ( NETIO!FsbpScavengeUsedPages+33 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x133
PROCESS_NAME: node.exe
CURRENT_IRQL: d
LAST_CONTROL_TRANSFER: from fffff801281d8977 to fffff8012807c840
STACK_TEXT:
fffff880`0668a898 fffff801`281d8977 : 00000000`00000133 00000000`00000001 00000000`00001e00 00000000`00000000 : nt!KeBugCheckEx
fffff880`0668a8a0 fffff801`280a87f1 : 00000000`00000002 fffff880`009e7180 fffff880`0668aa00 fffff780`00000320 : nt! ?? ::FNODOBFM::`string'+0x1376e
fffff880`0668a920 fffff801`28767e50 : ffffffff`ffd169a0 fffff801`28791902 fffffa80`e5d3a008 fffff801`28075cf0 : nt!KeUpdateRunTime+0x51
fffff880`0668a950 fffff801`28075c6e : 00000000`00000000 fffffa80`ef986008 fffff801`287919a0 fffff801`2828bc40 : hal!HalpTimerClockInterrupt+0x50
fffff880`0668a980 fffff880`00b2ede2 : ffff35c9`7b872058 fffff880`0668ac69 00000000`00000000 fffffa80`1c95f410 : nt!KiInterruptDispatchLBControl+0x1ce
fffff880`0668ab10 fffff880`00b2bd3d : fffffa80`192b3a58 fffff880`01dd3b90 fffffa80`19539440 fffff880`0668ac69 : NETIO!FsbpScavengeUsedPages+0x33
fffff880`0668ab40 fffff880`01c8d15a : fffff880`0668ac69 fffffa80`192b3a58 fffff880`01dd3b90 fffffa80`3b5dc4c0 : NETIO!FsbAllocate+0x16a
fffff880`0668ab80 fffff880`01ca1a4f : fffffa80`3b5dc4c0 6573752e`6e6f6974 00000000`000024a0 fffffa80`3b5dc4c0 : tcpip!IppCopyPacket+0x1a
fffff880`0668abb0 fffff880`01ca22c6 : fffff880`01dd3b90 00000000`00140001 00000000`00000000 00000000`00000000 : tcpip!IppDispatchSendPacketHelper+0x1c4
fffff880`0668acd0 fffff880`01cd07cb : fffffa80`194e7548 fffffa80`192b3b38 fffff880`0668b070 fffffa80`192b3a58 : tcpip!IppPacketizeDatagrams+0x2b6
fffff880`0668ade0 fffff880`01cd412b : fffffa80`1bde0707 fffff880`01dd3b90 fffffa80`1bde04f0 00000000`0000ffff : tcpip!IppSendDatagramsCommon+0x6eb
fffff880`0668afa0 fffff880`01cda901 : fffffa80`194e7178 00000000`001ad273 fffffa80`1c8b0940 fffffa80`1bde0780 : tcpip!TcpTcbSend+0x6fb
fffff880`0668b300 fffff880`01cce1c4 : 00000000`00000000 00000016`f4160d20 00000000`00000000 fffff801`280f92a2 : tcpip!TcpEnqueueTcbSendOlmNotifySendComplete+0xa1
fffff880`0668b330 fffff880`01cdbe54 : 00000000`0000010d 00000000`00000000 00000000`00000001 00000000`000007ff : tcpip!TcpEnqueueTcbSend+0x6b4
fffff880`0668b400 fffff801`280be335 : fffff6fb`00000000 fffff6fb`7dbed000 00000000`00000003 fffff801`280cf0b7 : tcpip!TcpTlConnectionSendCalloutRoutine+0x24
fffff880`0668b430 fffff801`280bf145 : fffff880`01cdbe30 fffff880`0668b5a0 00000000`00000000 00000000`0000afd2 : nt!KeExpandKernelStackAndCalloutInternal+0xe5
fffff880`0668b530 fffff880`01ccfdd8 : fffffa80`1d4d8003 fffff880`01b570c9 00000000`000001a8 fffff880`01b9d6f3 : nt!KeExpandKernelStackAndCalloutEx+0x25
fffff880`0668b570 fffff880`01badef3 : fffffa80`1cb2f250 fffffa80`1c1a9870 00000000`86fae00d 00000000`00000000 : tcpip!TcpTlConnectionSend+0x78
fffff880`0668b5e0 fffff880`01bbdaa5 : fffffa80`1b97f870 fffff880`0668b881 fffffa80`1c1a9a18 fffffa80`1c1a9870 : afd!AfdTLStartVcSend+0xbb
fffff880`0668b650 fffff801`28449628 : 00000000`00000002 00000000`00000000 00000000`00000002 fffffa80`1bde99c0 : afd!AfdSend+0x1bdf5
fffff880`0668b800 fffff801`28467333 : fffffa80`1bde9904 fffffa80`1964ce40 fffffa80`00000000 fffffa80`1bde99c0 : nt!IopSynchronousServiceTail+0x158
fffff880`0668b8d0 fffff801`284673d6 : fffffa80`1b955c70 00000000`00000000 00000000`00000000 00000002`274ad5c8 : nt!IopXxxControlFile+0xe10
fffff880`0668ba20 fffff801`2807b853 : 00000000`00000000 fffff801`280a87f1 fffff6fb`7dbed000 fffff6fb`7da00048 : nt!NtDeviceIoControlFile+0x56
fffff880`0668ba90 000007ff`8daf2c1a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000002`251fe4c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007ff`8daf2c1a
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!FsbpScavengeUsedPages+33
fffff880`00b2ede2 488d4b18 lea rcx,[rbx+18h]
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: NETIO!FsbpScavengeUsedPages+33
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 5010aa77
BUCKET_ID_FUNC_OFFSET: 33
FAILURE_BUCKET_ID: 0x133_ISR_NETIO!FsbpScavengeUsedPages
BUCKET_ID: 0x133_ISR_NETIO!FsbpScavengeUsedPages
Followup: MachineOwner
---------
全部回复
-
你好,
根据您提供的dump信息。
1.请进行一下干净启动。同时暂时关闭安全软件。
如何在 Windows 中执行干净启动
https://support.microsoft.com/zh-cn/help/929135/how-to-perform-a-clean-boot-in-windows
2.从厂商的官网下载网卡驱动进行安装更新。
希望对您有帮助,如果回答是有帮助的, 请将其标记为答案, 可以帮助其他有相同问题的社区成员, 并快速找到有用的答复
Please remember to mark the replies as answers if they help.
If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com.- 已建议为答案 Carl FanMicrosoft contingent staff 2019年4月30日 9:45
-
你好,
几天没收到你的留言了, 请问问题又什么进展吗?
我正在建议有帮助的答复为 "答案"。请随时尝试一下, 让我知道结果。如果回答是有帮助的, 请将其标记为答案, 可以帮助其他有相同问题的社区成员, 并快速找到有用的答复。Please remember to mark the replies as answers if they help.
If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com.