服务器异常关机查看dmp文件,服务器无故自动重启,使用WinDbg查看MEMORY.dmp说srvnet.sys错误(附上Bugcheck记录),请各位帮帮忙谢谢~...

服务器无故自动重启,通过WinDbg分析MEMORY.dmp文件显示问题与srvnet.sys驱动有关,具体错误为PAGE_FAULT_IN_NONPAGED_AREA。错误发生在srvnet!SrvAdminIsScopedName函数中,可能由无效的系统内存引用引起。该服务器已配置为集群,可能需要检查集群设置和驱动更新。

服务器无故自动重启,使用WinDbg查看MEMORY.dmp说srvnet.sys错误(附上Bugcheck记录)

请各位帮帮忙,谢谢~~~~

服务器有做过集群。这是集群中的一台服务器,无故重启

Loading Dump File [D:\杂\icc\Minidump\070314-33774-01.dmp]

Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*d:\symbolslocal*http://msdl.microsoft.com/download/symbols

Executable search path is:

Windows 7 Kernel Version 7600 MP (24 procs) Free x64

Product: Server, suite: Enterprise TerminalServer SingleUserTS

Built by: 7600.16385.amd64fre.win7_rtm.090713-1255

Machine Name:

Kernel base = 0xfffff800`02a0a000 PsLoadedModuleList = 0xfffff800`02c47e50

Debug session time: Thu Jul 3 12:30:12.604 2014 (UTC + 8:00)

System Uptime: 23 days 20:56:02.064

Loading Kernel Symbols

...............................................................

................................................................

..............................

Loading User Symbols

Loading unloaded module list

..................................................

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffffa800e19d000, 0, fffff88005572feb, 0}

Could not read faulting driver name

Probably caused by : srvnet.sys ( srvnet!SrvAdminIsScopedName+43 )

Followup: MachineOwner

---------

2: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)

Invalid system memory was referenced. This cannot be protected by try-except,

it must be protected by a Probe. Typically the address is just plain bad or it

is pointing at freed memory.

Arguments:

Arg1: fffffa800e19d000, memory referenced.

Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.

Arg3: fffff88005572feb, If non-zero, the instruction address which referenced the bad memory

address.

Arg4: 0000000000000000, (reserved)

Debugging Details:

------------------

Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb20e0

fffffa800e19d000

FAULTING_IP:

srvnet!SrvAdminIsScopedName+43

fffff880`05572feb 6641833c402e cmp word ptr [r8+rax*2],2Eh

MM_INTERNAL_CODE: 0

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT_SERVER_MINIDUMP

BUGCHECK_STR: 0x50

PROCESS_NAME: System

CURRENT_IRQL: 0

TRAP_FRAME: fffff880072065b0 -- (.trap 0xfffff880072065b0)

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=00000000000025c0 rbx=0000000000000000 rcx=00000000000025c0

rdx=0000000000007b80 rsi=0000000000000000 rdi=0000000000000000

rip=fffff88005572feb rsp=fffff88007206740 rbp=fffffa800e198494

r8=fffffa800e198480 r9=0000000000000000 r10=0000000000000001

r11=fffff88007206a38 r12=0000000000000000 r13=0000000000000000

r14=0000000000000000 r15=0000000000000000

iopl=0 nv up ei ng nz na po cy

srvnet!SrvAdminIsScopedName+0x43:

fffff880`05572feb 6641833c402e cmp word ptr [r8+rax*2],2Eh ds:6700:fffffa80`0e19d000=????

Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80002afb1e4 to fffff80002a7bf00

STACK_TEXT:

fffff880`07206448 fffff800`02afb1e4 : 00000000`00000050 fffffa80`0e19d000 00000000`00000000 fffff880`072065b0 : nt!KeBugCheckEx

fffff880`07206450 fffff800`02a79fee : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`01a7389a : nt! ?? ::FNODOBFM::`string'+0x42907

fffff880`072065b0 fffff880`05572feb : fffffa80`11221010 00000000`00000000 00000080`00000000 00000000`00000000 : nt!KiPageFault+0x16e

fffff880`07206740 fffff880`06f9e30d : 00000000`00000002 fffffa80`0e2b3201 00000000`00000000 00000000`00000002 : srvnet!SrvAdminIsScopedName+0x43

fffff880`07206780 fffff880`06f9e19e : 00000000`00000001 fffffa80`0e198480 fffffa80`0e198480 fffffa80`0e198470 : srv!SrvFindShare+0x9d

fffff880`07206a40 fffff880`06f9e630 : fffffa80`0e198470 fffffa80`0e197010 fffff880`06f67110 00000000`00000000 : srv!SrvVerifyShare+0x1bf

fffff880`07206ab0 fffff880`06f4c698 : fffff880`06f67100 00000000`00000000 fffff8a0`0a9bf101 fffff880`00000000 : srv!SrvSmbTreeConnectAndX+0x170

fffff880`07206c30 fffff880`06f4c5b3 : fffffa80`0e197010 00000000`0000000c 00000000`0000000f fffffa80`0e197010 : srv!SrvProcessSmb+0xb8

fffff880`07206cb0 fffff880`06f916a3 : fffffa80`0c3b4ca0 00000000`0000000b fffffa80`0e197010 fffffa80`0e197020 : srv!SrvRestartReceive+0xa3

fffff880`07206cf0 fffff800`02d1f166 : fffffa80`0e197010 fffffa80`103d49a0 00000000`00000080 fffffa80`07d6db30 : srv!WorkerThread+0xed

fffff880`07206d40 fffff800`02a5a486 : fffff880`024e2180 fffffa80`103d49a0 fffff880`024ed4c0 fffff880`01642a90 : nt!PspSystemThreadStartup+0x5a

fffff880`07206d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16

STACK_COMMAND: kb

FOLLOWUP_IP:

srvnet!SrvAdminIsScopedName+43

fffff880`05572feb 6641833c402e cmp word ptr [r8+rax*2],2Eh

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: srvnet!SrvAdminIsScopedName+43

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: srvnet

IMAGE_NAME: srvnet.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc24a

FAILURE_BUCKET_ID: X64_0x50_srvnet!SrvAdminIsScopedName+43

BUCKET_ID: X64_0x50_srvnet!SrvAdminIsScopedName+43

Followup: MachineOwner

---------

2: kd> lmvm srvnet

start end module name

fffff880`0556e000 fffff880`0559b000 srvnet (pdb symbols) d:\symbolslocal\srvnet.pdb\BA2B08B9C98642DE90EE20A52FEEB3152\srvnet.pdb

Loaded symbol image file: srvnet.sys

Mapped memory image file: d:\symbolslocal\srvnet.sys\4A5BC24A2d000\srvnet.sys

Image path: \SystemRoot\System32\DRIVERS\srvnet.sys

Image name: srvnet.sys

Timestamp: Tue Jul 14 07:24:58 2009 (4A5BC24A)

CheckSum: 0002C32F

ImageSize: 0002D000

File version: 6.1.7600.16385

Product version: 6.1.7600.16385

File flags: 0 (Mask 3F)

File OS: 40004 NT Win32

File type: 3.6 Driver

File date: 00000000.00000000

Translations: 0409.04b0

CompanyName: Microsoft Corporation

ProductName: Microsoft® Windows® Operating System

InternalName: SRVNET.SYS

OriginalFilename: SRVNET.SYS

ProductVersion: 6.1.7600.16385

FileVersion: 6.1.7600.16385 (win7_rtm.090713-1255)

FileDescription: Server Network driver

LegalCopyright: © Microsoft Corporation. All rights reserved.

2: kd> .trap 0xfffff880072065b0

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=00000000000025c0 rbx=0000000000000000 rcx=00000000000025c0

rdx=0000000000007b80 rsi=0000000000000000 rdi=0000000000000000

rip=fffff88005572feb rsp=fffff88007206740 rbp=fffffa800e198494

r8=fffffa800e198480 r9=0000000000000000 r10=0000000000000001

r11=fffff88007206a38 r12=0000000000000000 r13=0000000000000000

r14=0000000000000000 r15=0000000000000000

iopl=0 nv up ei ng nz na po cy

srvnet!SrvAdminIsScopedName+0x43:

fffff880`05572feb 6641833c402e cmp word ptr [r8+rax*2],2Eh ds:6700:fffffa80`0e19d000=????

评论
成就一亿技术人!
拼手气红包6.0元
还能输入1000个字符  | 博主筛选后可见
 
红包 添加红包
表情包 插入表情
 条评论被折叠 查看
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值