Hi,
You can try to update your computer first to see if it can solve the problem.
windows server2012R2 频繁蓝屏重启
查看dmp文件
Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\shterm\Downloads\042921-19843-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (2 procs) Free x64
Product: Server, suite: TerminalServer
Edition build lab: 9600.17415.amd64fre.winblue_r4.141028-1500
Machine Name:
Kernel base = 0xfffff802ad271000 PsLoadedModuleList = 0xfffff802
ad54a250
Debug session time: Thu Apr 29 14:03:13.999 2021 (UTC + 8:00)
System Uptime: 0 days 3:13:21.928
Loading Kernel Symbols
...............................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
.....
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802ad3c19a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd000
366ae5e0=0000000000000050
0: kd> !analyze -v
- *
- Bugcheck Analysis *
- *
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe001336cc000, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff8017ff9d360, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1936
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 21529
Key : Analysis.Init.CPU.mSec
Value: 593
Key : Analysis.Init.Elapsed.mSec
Value: 256101
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : WER.OS.Branch
Value: winblue_r4
Key : WER.OS.Timestamp
Value: 2014-10-28T15:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.17415
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffe001336cc000
BUGCHECK_P2: 1
BUGCHECK_P3: fffff8017ff9d360
BUGCHECK_P4: 0
WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff802ad5d4298
GetUlongPtrFromAddress: unable to read from fffff802ad5d4520
ffffe001336cc000 Nonpaged pool
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffd000366ae840 -- (.trap 0xffffd000366ae840)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe001336cc000
rdx=ffffc000ba6fe09a rsi=0000000000000000 rdi=0000000000000000
rip=fffff8017ff9d360 rsp=ffffd000366ae9d0 rbp=ffffc000ba6fe095
r8=0000000000000000 r9=0000000000000000 r10=0000000000000200
r11=ffffe001336cc000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
srv!SrvOs2FeaToNt+0x48:
fffff8017ff9d360 c60300 mov byte ptr [rbx],0 ds:00000000
00000000=??
Resetting default scope
STACK_TEXT:
ffffd000366ae5d8 fffff802
ad3efbd2 : 0000000000000050 ffffe001
336cc000 0000000000000001 ffffd000
366ae840 : nt!KeBugCheckEx
ffffd000366ae5e0 fffff802
ad2c92b9 : 0000000000000001 ffffe001
2f835900 ffffd000366ae840 fffff802
ad35fbc2 : nt! ?? ::FNODOBFM::string'+0x1dd22 ffffd000
366ae680 fffff802ad3cbc2f : 00000000
00000001 ffffe001336cc000 00000000
00000200 fffff802ad5154d3 : nt!MmAccessFault+0x769 ffffd000
366ae840 fffff8017ff9d360 : 00000000
00000000 fffff8017ff9d1fe ffffd000
366aeaf8 ffffd000366aeaf0 : nt!KiPageFault+0x12f ffffd000
366ae9d0 fffff8017ff9d2a5 : ffffc000
ba6fe095 ffffe001336cbff8 4f2f6643
6a77766e ffffc000ba6fe138 : srv!SrvOs2FeaToNt+0x48 ffffd000
366aea00 fffff8017ffbe69b : ffffe001
324af360 0000000000000000 ffffc000
ba6ee010 ffffd000377ee180 : srv!SrvOs2FeaListToNt+0x125 ffffd000
366aea50 fffff8017ffc78ba : 00000000
00000000 fffff80100010fe8 ffffe001
336bb010 ffffe001324af360 : srv!SrvSmbOpen2+0xc3 ffffd000
366aeaf0 fffff8017ffcab2e : ffffe001
3288edb0 ffffe001324af360 ffffc000
ba6ee010 0000000000000002 : srv!ExecuteTransaction+0x2ca ffffd000
366aeb30 fffff8017ff5884f : fffff801
00000000 0000000000000000 ffffe001
00000035 ffffe0010000f3d0 : srv!SrvSmbTransactionSecondary+0x40b ffffd000
366aebd0 fffff8017ff58a20 : ffffe001
324af360 0000000000000000 ffffe001
324afdd0 fffff8017ff66010 : srv!SrvProcessSmb+0x237 ffffd000
366aec50 fffff8017ff97ac8 : ffffe001
3059b9a0 ffffe001324af360 00000000
00000000 ffffe001324af370 : srv!SrvRestartReceive+0x114 ffffd000
366aec90 fffff802ad789d92 : 00000000
00000000 ffffe0013059b9a0 00000000
00000080 ffffe00132463a70 : srv!WorkerThread+0x5248 ffffd000
366aed10 fffff802ad372c70 : ffffe001
324a0880 ffffe001324a0880 00000000
00000000 0000000000000000 : nt!IopThreadStart+0x26 ffffd000
366aed40 fffff802ad3c7fc6 : fffff802
ad574180 ffffe001324a0880 fffff802
ad5cda00 0000000000000000 : nt!PspSystemThreadStartup+0x58 ffffd000
366aeda0 0000000000000000 : ffffd000
366af000 ffffd000366a9000 00000000
00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
SYMBOL_NAME: srv!SrvOs2FeaToNt+48
MODULE_NAME: srv
IMAGE_NAME: srv.sys
IMAGE_VERSION: 6.3.9600.17238
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 48
FAILURE_BUCKET_ID: AV_srv!SrvOs2FeaToNt
OS_VERSION: 8.1.9600.17415
BUILDLAB_STR: winblue_r4
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {d5f1a37d-2c94-f55b-5042-7a5dbaa092e1}
Followup: MachineOwner
1 answer
Sort by: Most helpful
-
Xing Huang (Shanghai Wicresoft Co,.Ltd.) 171 Reputation points
2021-04-30T10:05:54.4+00:00