none
Server2012R2 经常自动重启,Dump资料分析出来,看不懂,有人可以帮忙看下吗 RRS feed

  • 问题

  • IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000098, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff8011ab575cf, address which referenced memory

    Debugging Details:
    ------------------


    KEY_VALUES_STRING: 1


    PROCESSES_ANALYSIS: 1

    SERVICE_ANALYSIS: 1

    STACKHASH_ANALYSIS: 1

    TIMELINE_ANALYSIS: 1


    DUMP_CLASS: 1

    DUMP_QUALIFIER: 401

    BUILD_VERSION_STRING:  9600.19478.amd64fre.winblue_ltsb.190831-0600

    SYSTEM_MANUFACTURER:  VMware, Inc.

    VIRTUAL_MACHINE:  VMware

    SYSTEM_PRODUCT_NAME:  VMware Virtual Platform

    SYSTEM_VERSION:  None

    BIOS_VENDOR:  Phoenix Technologies LTD

    BIOS_VERSION:  6.00

    BIOS_DATE:  12/12/2018

    BASEBOARD_MANUFACTURER:  Intel Corporation

    BASEBOARD_PRODUCT:  440BX Desktop Reference Platform

    BASEBOARD_VERSION:  None

    DUMP_TYPE:  1

    BUGCHECK_P1: 98

    BUGCHECK_P2: 2

    BUGCHECK_P3: 0

    BUGCHECK_P4: fffff8011ab575cf

    READ_ADDRESS:  0000000000000098 

    CURRENT_IRQL:  2

    FAULTING_IP: 
    nt!CcChangeBackingFileObject+73
    fffff801`1ab575cf f7819800000000001000 test dword ptr [rcx+98h],100000h

    CPU_COUNT: 8

    CPU_MHZ: 9be

    CPU_VENDOR:  GenuineIntel

    CPU_FAMILY: 6

    CPU_MODEL: 3e

    CPU_STEPPING: 4

    CPU_MICROCODE: 6,3e,4,0 (F,M,S,R)  SIG: 42D'00000000 (cache) 42D'00000000 (init)

    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

    BUGCHECK_STR:  AV

    PROCESS_NAME:  iexplore.exe

    ANALYSIS_SESSION_HOST:  C1-8120401-PC01

    ANALYSIS_SESSION_TIME:  12-11-2019 13:49:22.0226

    ANALYSIS_VERSION: 10.0.18362.1 amd64fre

    TRAP_FRAME:  ffffd0017612a490 -- (.trap 0xffffd0017612a490)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=ffffe0001fb657c8 rbx=0000000000000000 rcx=0000000000000000
    rdx=ffffe0001fb657c8 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8011ab575cf rsp=ffffd0017612a620 rbp=ffffd0017612a700
     r8=ffffd0016f240840  r9=0000000000000000 r10=ffffe0001d735010
    r11=fffff8002a120243 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!CcChangeBackingFileObject+0x73:
    fffff801`1ab575cf f7819800000000001000 test dword ptr [rcx+98h],100000h ds:00000000`00000098=????????
    Resetting default scope

    LAST_CONTROL_TRANSFER:  from fffff8011abd8669 to fffff8011abc83a0

    STACK_TEXT:  
    ffffd001`7612a348 fffff801`1abd8669 : 00000000`0000000a 00000000`00000098 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    ffffd001`7612a350 fffff801`1abd5ba8 : 00000000`00000000 00000000`00001c08 ffffc001`73d52300 ffffd001`7612a6e8 : nt!KiBugCheckDispatch+0x69
    ffffd001`7612a490 fffff801`1ab575cf : ffffd001`7612a7d0 ffffc001`74405ef0 00000000`00000702 ffffe000`20bf25d0 : nt!KiPageFault+0x428
    ffffd001`7612a620 fffff800`2a017ebf : ffffe000`20bf25d0 ffffd001`7612a739 ffffe000`2096dcd8 ffffe000`2025ca40 : nt!CcChangeBackingFileObject+0x73
    ffffd001`7612a660 fffff800`2a1210ba : ffffe000`2096dc00 ffffe000`1e3bc530 ffffe000`2096dc00 ffffe000`1e3bc530 : luafv!LuafvPreReleaseForSectionSynchronization+0x83
    ffffd001`7612a690 fffff800`2a123edd : ffffd001`7612a7d0 00000000`000000fe ffffe000`1d735000 ffffd001`7612a700 : fltmgr!FltpPerformPreCallbacks+0x31a
    ffffd001`7612a7a0 fffff801`1aabe6ce : ffffe000`1d735df0 ffffd001`7612a948 00000000`00000000 fffff801`1aabe8a5 : fltmgr!FltpPreFsFilterOperation+0x2cd
    ffffd001`7612a850 fffff801`1ae22346 : 00000000`00000000 ffffd001`7612a9a0 fffff800`2a2c96a0 ffffe000`1d86b800 : nt!FsFilterPerformCallbacks+0x12a
    ffffd001`7612a8a0 fffff801`1ae23257 : 00000000`00000002 00000000`00000006 00000000`08000000 ffffe000`1ddf3d70 : nt!FsRtlReleaseFile+0xce
    ffffd001`7612ab50 fffff801`1ae22614 : ffffd001`7612ada0 00000000`00000000 ffffd001`00000006 ffffd001`7612ad98 : nt!MiCreateSection+0x4f3
    ffffd001`7612ad40 fffff801`1abd82e3 : ffffe000`20b37880 00000000`0557cab8 ffffd001`7612ade8 fffff6fb`7da00008 : nt!NtCreateSection+0x19c
    ffffd001`7612add0 00007fff`ede90bfa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0557ca98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`ede90bfa


    THREAD_SHA1_HASH_MOD_FUNC:  e79b6717092fff1289407c8fb3109421c109e67a

    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  57c743769e897f33e263651bac22933065ff4786

    THREAD_SHA1_HASH_MOD:  6850f397b42c82d351fcfeca90a304ccdcd92ad6

    FOLLOWUP_IP: 
    luafv!LuafvPreReleaseForSectionSynchronization+83
    fffff800`2a017ebf 488b4e10        mov     rcx,qword ptr [rsi+10h]

    FAULT_INSTR_CODE:  104e8b48

    SYMBOL_STACK_INDEX:  4

    SYMBOL_NAME:  luafv!LuafvPreReleaseForSectionSynchronization+83

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: luafv

    IMAGE_NAME:  luafv.sys

    DEBUG_FLR_IMAGE_TIMESTAMP:  5c9fd830

    STACK_COMMAND:  .thread ; .cxr ; kb

    BUCKET_ID_FUNC_OFFSET:  83

    FAILURE_BUCKET_ID:  AV_luafv!LuafvPreReleaseForSectionSynchronization

    BUCKET_ID:  AV_luafv!LuafvPreReleaseForSectionSynchronization

    PRIMARY_PROBLEM_CLASS:  AV_luafv!LuafvPreReleaseForSectionSynchronization

    TARGET_TIME:  2019-12-11T02:21:37.000Z

    OSBUILD:  9600

    OSSERVICEPACK:  19478

    SERVICEPACK_NUMBER: 0

    OS_REVISION: 0

    SUITE_MASK:  16

    PRODUCT_TYPE:  3

    OSPLATFORM_TYPE:  x64

    OSNAME:  Windows 8.1

    OSEDITION:  Windows 8.1 Server TerminalServer

    OS_LOCALE:  

    USER_LCID:  0

    OSBUILD_TIMESTAMP:  2019-08-31 23:06:47

    BUILDDATESTAMP_STR:  190831-0600

    BUILDLAB_STR:  winblue_ltsb

    BUILDOSVER_STR:  6.3.9600.19478.amd64fre.winblue_ltsb.190831-0600

    ANALYSIS_SESSION_ELAPSED_TIME:  32174

    ANALYSIS_SOURCE:  KM

    FAILURE_ID_HASH_STRING:  km:av_luafv!luafvprereleaseforsectionsynchronization

    FAILURE_ID_HASH:  {62009a2d-2075-0866-ea59-d4fc62e3782e}

    Followup:     MachineOwner
    ---------
    2019年12月11日 14:25

全部回复

  • MODULE_NAME: luafv

    IMAGE_NAME:  luafv.sys

    检测内存和网卡驱动

    另外,不要安装任何的的第三方的杀毒软件

    如果可行的话,最好将系统升级到最新版本


    如果认为回帖者的回答有所帮助,请将之标记为答复,这样可以帮助更多的用户获取有效信息。

    针对Windows 2008/2008R2的扩展支持将于2020年结束,之后微软将不再为其提供安全更新。点击此处或扫描二维码获取《在 Azure 上运行 Windows Server 的终极指南》,把握良机完成云迁移并实现业务现代化。

    2019年12月30日 9:31