none
2012 R2 不断无故重启 RRS feed

  • 问题


  • Microsoft (R) Windows Debugger Version 6.2.9200.20512 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [E:\share\MEMORY.DMP]
    Kernel Bitmap Dump File: Only kernel address space is available

    Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 8 Kernel Version 9200 MP (4 procs) Free x64
    Product: Server, suite: TerminalServer SingleUserTS
    Built by: 9200.22086.amd64fre.win8_ldr.170209-0600
    Machine Name:
    Kernel base = 0xfffff801`28004000 PsLoadedModuleList = 0xfffff801`282cba60
    Debug session time: Sat Apr 27 00:25:28.935 2019 (UTC + 8:00)
    System Uptime: 0 days 2:46:18.359
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .
    Loading User Symbols
    PEB is paged out (Peb.Ldr = 000007f7`2135d018).  Type ".hh dbgerr001" for details
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 133, {1, 1e00, 0, 0}

    Probably caused by : NETIO.SYS ( NETIO!FsbpScavengeUsedPages+33 )

    Followup: MachineOwner
    ---------

    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    DPC_WATCHDOG_VIOLATION (133)
    The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
    or above.
    Arguments:
    Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
    Arg2: 0000000000001e00, The watchdog period.
    Arg3: 0000000000000000
    Arg4: 0000000000000000

    Debugging Details:
    ------------------


    DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

    BUGCHECK_STR:  0x133

    PROCESS_NAME:  node.exe

    CURRENT_IRQL:  d

    LAST_CONTROL_TRANSFER:  from fffff801281d8977 to fffff8012807c840

    STACK_TEXT:  
    fffff880`0668a898 fffff801`281d8977 : 00000000`00000133 00000000`00000001 00000000`00001e00 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0668a8a0 fffff801`280a87f1 : 00000000`00000002 fffff880`009e7180 fffff880`0668aa00 fffff780`00000320 : nt! ?? ::FNODOBFM::`string'+0x1376e
    fffff880`0668a920 fffff801`28767e50 : ffffffff`ffd169a0 fffff801`28791902 fffffa80`e5d3a008 fffff801`28075cf0 : nt!KeUpdateRunTime+0x51
    fffff880`0668a950 fffff801`28075c6e : 00000000`00000000 fffffa80`ef986008 fffff801`287919a0 fffff801`2828bc40 : hal!HalpTimerClockInterrupt+0x50
    fffff880`0668a980 fffff880`00b2ede2 : ffff35c9`7b872058 fffff880`0668ac69 00000000`00000000 fffffa80`1c95f410 : nt!KiInterruptDispatchLBControl+0x1ce
    fffff880`0668ab10 fffff880`00b2bd3d : fffffa80`192b3a58 fffff880`01dd3b90 fffffa80`19539440 fffff880`0668ac69 : NETIO!FsbpScavengeUsedPages+0x33
    fffff880`0668ab40 fffff880`01c8d15a : fffff880`0668ac69 fffffa80`192b3a58 fffff880`01dd3b90 fffffa80`3b5dc4c0 : NETIO!FsbAllocate+0x16a
    fffff880`0668ab80 fffff880`01ca1a4f : fffffa80`3b5dc4c0 6573752e`6e6f6974 00000000`000024a0 fffffa80`3b5dc4c0 : tcpip!IppCopyPacket+0x1a
    fffff880`0668abb0 fffff880`01ca22c6 : fffff880`01dd3b90 00000000`00140001 00000000`00000000 00000000`00000000 : tcpip!IppDispatchSendPacketHelper+0x1c4
    fffff880`0668acd0 fffff880`01cd07cb : fffffa80`194e7548 fffffa80`192b3b38 fffff880`0668b070 fffffa80`192b3a58 : tcpip!IppPacketizeDatagrams+0x2b6
    fffff880`0668ade0 fffff880`01cd412b : fffffa80`1bde0707 fffff880`01dd3b90 fffffa80`1bde04f0 00000000`0000ffff : tcpip!IppSendDatagramsCommon+0x6eb
    fffff880`0668afa0 fffff880`01cda901 : fffffa80`194e7178 00000000`001ad273 fffffa80`1c8b0940 fffffa80`1bde0780 : tcpip!TcpTcbSend+0x6fb
    fffff880`0668b300 fffff880`01cce1c4 : 00000000`00000000 00000016`f4160d20 00000000`00000000 fffff801`280f92a2 : tcpip!TcpEnqueueTcbSendOlmNotifySendComplete+0xa1
    fffff880`0668b330 fffff880`01cdbe54 : 00000000`0000010d 00000000`00000000 00000000`00000001 00000000`000007ff : tcpip!TcpEnqueueTcbSend+0x6b4
    fffff880`0668b400 fffff801`280be335 : fffff6fb`00000000 fffff6fb`7dbed000 00000000`00000003 fffff801`280cf0b7 : tcpip!TcpTlConnectionSendCalloutRoutine+0x24
    fffff880`0668b430 fffff801`280bf145 : fffff880`01cdbe30 fffff880`0668b5a0 00000000`00000000 00000000`0000afd2 : nt!KeExpandKernelStackAndCalloutInternal+0xe5
    fffff880`0668b530 fffff880`01ccfdd8 : fffffa80`1d4d8003 fffff880`01b570c9 00000000`000001a8 fffff880`01b9d6f3 : nt!KeExpandKernelStackAndCalloutEx+0x25
    fffff880`0668b570 fffff880`01badef3 : fffffa80`1cb2f250 fffffa80`1c1a9870 00000000`86fae00d 00000000`00000000 : tcpip!TcpTlConnectionSend+0x78
    fffff880`0668b5e0 fffff880`01bbdaa5 : fffffa80`1b97f870 fffff880`0668b881 fffffa80`1c1a9a18 fffffa80`1c1a9870 : afd!AfdTLStartVcSend+0xbb
    fffff880`0668b650 fffff801`28449628 : 00000000`00000002 00000000`00000000 00000000`00000002 fffffa80`1bde99c0 : afd!AfdSend+0x1bdf5
    fffff880`0668b800 fffff801`28467333 : fffffa80`1bde9904 fffffa80`1964ce40 fffffa80`00000000 fffffa80`1bde99c0 : nt!IopSynchronousServiceTail+0x158
    fffff880`0668b8d0 fffff801`284673d6 : fffffa80`1b955c70 00000000`00000000 00000000`00000000 00000002`274ad5c8 : nt!IopXxxControlFile+0xe10
    fffff880`0668ba20 fffff801`2807b853 : 00000000`00000000 fffff801`280a87f1 fffff6fb`7dbed000 fffff6fb`7da00048 : nt!NtDeviceIoControlFile+0x56
    fffff880`0668ba90 000007ff`8daf2c1a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000002`251fe4c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007ff`8daf2c1a


    STACK_COMMAND:  kb

    FOLLOWUP_IP: 
    NETIO!FsbpScavengeUsedPages+33
    fffff880`00b2ede2 488d4b18        lea     rcx,[rbx+18h]

    SYMBOL_STACK_INDEX:  5

    SYMBOL_NAME:  NETIO!FsbpScavengeUsedPages+33

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: NETIO

    IMAGE_NAME:  NETIO.SYS

    DEBUG_FLR_IMAGE_TIMESTAMP:  5010aa77

    BUCKET_ID_FUNC_OFFSET:  33

    FAILURE_BUCKET_ID:  0x133_ISR_NETIO!FsbpScavengeUsedPages

    BUCKET_ID:  0x133_ISR_NETIO!FsbpScavengeUsedPages

    Followup: MachineOwner
    ---------
    2019年4月28日 5:25

全部回复

  • 你好,

    根据您提供的dump信息。

    1.请进行一下干净启动。同时暂时关闭安全软件。

    如何在 Windows 中执行干净启动

    https://support.microsoft.com/zh-cn/help/929135/how-to-perform-a-clean-boot-in-windows

    2.从厂商的官网下载网卡驱动进行安装更新。

    希望对您有帮助,如果回答是有帮助的, 请将其标记为答案, 可以帮助其他有相同问题的社区成员, 并快速找到有用的答复


    Please remember to mark the replies as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com.

    2019年4月29日 8:27
  • 你好,
    几天没收到你的留言了, 请问问题又什么进展吗?
    我正在建议有帮助的答复为 "答案"。请随时尝试一下, 让我知道结果。如果回答是有帮助的, 请将其标记为答案, 可以帮助其他有相同问题的社区成员, 并快速找到有用的答复。

    Please remember to mark the replies as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com.

    2019年5月1日 8:34