none
服务器无故自动重启,使用WinDbg查看MEMORY.dmp说srvnet.sys错误(附上Bugcheck记录),请各位帮帮忙谢谢~ RRS feed

  • 问题

  • 服务器无故自动重启,使用WinDbg查看MEMORY.dmp说srvnet.sys错误(附上Bugcheck记录)

    请各位帮帮忙,谢谢~~~~

    服务器有做过集群。这是集群中的一台服务器,无故重启

    Loading Dump File [D:\杂\icc\Minidump\070314-33774-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: srv*d:\symbolslocal*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (24 procs) Free x64
    Product: Server, suite: Enterprise TerminalServer SingleUserTS
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`02a0a000 PsLoadedModuleList = 0xfffff800`02c47e50
    Debug session time: Thu Jul  3 12:30:12.604 2014 (UTC + 8:00)
    System Uptime: 23 days 20:56:02.064
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..............................
    Loading User Symbols
    Loading unloaded module list
    ..................................................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 50, {fffffa800e19d000, 0, fffff88005572feb, 0}
    
    
    Could not read faulting driver name
    Probably caused by : srvnet.sys ( srvnet!SrvAdminIsScopedName+43 )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: fffffa800e19d000, memory referenced.
    Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
    Arg3: fffff88005572feb, If non-zero, the instruction address which referenced the bad memory
    	address.
    Arg4: 0000000000000000, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb20e0
     fffffa800e19d000 
    
    FAULTING_IP: 
    srvnet!SrvAdminIsScopedName+43
    fffff880`05572feb 6641833c402e    cmp     word ptr [r8+rax*2],2Eh
    
    MM_INTERNAL_CODE:  0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  DRIVER_FAULT_SERVER_MINIDUMP
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff880072065b0 -- (.trap 0xfffff880072065b0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=00000000000025c0 rbx=0000000000000000 rcx=00000000000025c0
    rdx=0000000000007b80 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88005572feb rsp=fffff88007206740 rbp=fffffa800e198494
     r8=fffffa800e198480  r9=0000000000000000 r10=0000000000000001
    r11=fffff88007206a38 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po cy
    srvnet!SrvAdminIsScopedName+0x43:
    fffff880`05572feb 6641833c402e    cmp     word ptr [r8+rax*2],2Eh ds:6700:fffffa80`0e19d000=????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002afb1e4 to fffff80002a7bf00
    
    STACK_TEXT:  
    fffff880`07206448 fffff800`02afb1e4 : 00000000`00000050 fffffa80`0e19d000 00000000`00000000 fffff880`072065b0 : nt!KeBugCheckEx
    fffff880`07206450 fffff800`02a79fee : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`01a7389a : nt! ?? ::FNODOBFM::`string'+0x42907
    fffff880`072065b0 fffff880`05572feb : fffffa80`11221010 00000000`00000000 00000080`00000000 00000000`00000000 : nt!KiPageFault+0x16e
    fffff880`07206740 fffff880`06f9e30d : 00000000`00000002 fffffa80`0e2b3201 00000000`00000000 00000000`00000002 : srvnet!SrvAdminIsScopedName+0x43
    fffff880`07206780 fffff880`06f9e19e : 00000000`00000001 fffffa80`0e198480 fffffa80`0e198480 fffffa80`0e198470 : srv!SrvFindShare+0x9d
    fffff880`07206a40 fffff880`06f9e630 : fffffa80`0e198470 fffffa80`0e197010 fffff880`06f67110 00000000`00000000 : srv!SrvVerifyShare+0x1bf
    fffff880`07206ab0 fffff880`06f4c698 : fffff880`06f67100 00000000`00000000 fffff8a0`0a9bf101 fffff880`00000000 : srv!SrvSmbTreeConnectAndX+0x170
    fffff880`07206c30 fffff880`06f4c5b3 : fffffa80`0e197010 00000000`0000000c 00000000`0000000f fffffa80`0e197010 : srv!SrvProcessSmb+0xb8
    fffff880`07206cb0 fffff880`06f916a3 : fffffa80`0c3b4ca0 00000000`0000000b fffffa80`0e197010 fffffa80`0e197020 : srv!SrvRestartReceive+0xa3
    fffff880`07206cf0 fffff800`02d1f166 : fffffa80`0e197010 fffffa80`103d49a0 00000000`00000080 fffffa80`07d6db30 : srv!WorkerThread+0xed
    fffff880`07206d40 fffff800`02a5a486 : fffff880`024e2180 fffffa80`103d49a0 fffff880`024ed4c0 fffff880`01642a90 : nt!PspSystemThreadStartup+0x5a
    fffff880`07206d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    srvnet!SrvAdminIsScopedName+43
    fffff880`05572feb 6641833c402e    cmp     word ptr [r8+rax*2],2Eh
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  srvnet!SrvAdminIsScopedName+43
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: srvnet
    
    IMAGE_NAME:  srvnet.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc24a
    
    FAILURE_BUCKET_ID:  X64_0x50_srvnet!SrvAdminIsScopedName+43
    
    BUCKET_ID:  X64_0x50_srvnet!SrvAdminIsScopedName+43
    
    Followup: MachineOwner
    ---------
    
    2: kd> lmvm srvnet
    start             end                 module name
    fffff880`0556e000 fffff880`0559b000   srvnet     (pdb symbols)          d:\symbolslocal\srvnet.pdb\BA2B08B9C98642DE90EE20A52FEEB3152\srvnet.pdb
        Loaded symbol image file: srvnet.sys
        Mapped memory image file: d:\symbolslocal\srvnet.sys\4A5BC24A2d000\srvnet.sys
        Image path: \SystemRoot\System32\DRIVERS\srvnet.sys
        Image name: srvnet.sys
        Timestamp:        Tue Jul 14 07:24:58 2009 (4A5BC24A)
        CheckSum:         0002C32F
        ImageSize:        0002D000
        File version:     6.1.7600.16385
        Product version:  6.1.7600.16385
        File flags:       0 (Mask 3F)
        File OS:          40004 NT Win32
        File type:        3.6 Driver
        File date:        00000000.00000000
        Translations:     0409.04b0
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     SRVNET.SYS
        OriginalFilename: SRVNET.SYS
        ProductVersion:   6.1.7600.16385
        FileVersion:      6.1.7600.16385 (win7_rtm.090713-1255)
        FileDescription:  Server Network driver
        LegalCopyright:   © Microsoft Corporation. All rights reserved.
    2: kd> .trap 0xfffff880072065b0
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=00000000000025c0 rbx=0000000000000000 rcx=00000000000025c0
    rdx=0000000000007b80 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88005572feb rsp=fffff88007206740 rbp=fffffa800e198494
     r8=fffffa800e198480  r9=0000000000000000 r10=0000000000000001
    r11=fffff88007206a38 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po cy
    srvnet!SrvAdminIsScopedName+0x43:
    fffff880`05572feb 6641833c402e    cmp     word ptr [r8+rax*2],2Eh ds:6700:fffffa80`0e19d000=????
    


    2014年7月10日 3:50

答案