toxot
Newbie | Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору Суть проблемы такова, началась буквально сразу после установки на HP ProLiant ML350 G5. Самопроизвольная перезагрузка в журнале ничего, нашел только 2 minidump, остальные дампы видимо сделаться не смогли т.к была включена система ASR (тоесть если iLO видит повисания сама ребутает систему.) Код: Critical ASR 12/24/2009 15:49 12/24/2009 15:49 1 ASR Detected by System ROM Critical ASR 12/21/2009 22:01 12/21/2009 22:01 1 ASR Detected by System ROM Critical ASR 12/21/2009 16:59 12/21/2009 16:59 1 ASR Detected by System ROM Critical OS 12/17/2009 22:20 12/17/2009 22:20 1 Abnormal Program Termination (BugCheck, STOP: 0x000000D1 (0x0000001C, 0xD0000002, 0x00000001, 0xF6DD22B1)) Critical OS 12/11/2009 10:39 12/11/2009 10:39 1 Abnormal Program Termination (BugCheck, STOP: 0x0000000A (0x0000F774, 0xD0000002, 0x00000001, 0x80A7E513)) Critical ASR 11/30/2009 14:12 11/30/2009 14:12 1 ASR Detected by System ROM Critical ASR 11/26/2009 14:09 11/26/2009 14:09 1 ASR Detected by System ROM Critical ASR 11/24/2009 14:09 11/24/2009 14:09 1 ASR Detected by System ROM Critical ASR 11/13/2009 14:59 11/13/2009 14:59 1 ASR Detected by System ROM | в момент подвисания подключившись к консоли вижу зависшую заставку виндовс. Расковыривание минидампов дало след результаты Код: #1 c:\Program Files\Windows Resource Kits>kdfe "C:\Program Files\Windows Resource K its\minidump\Mini121109-01.dmp" -v Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Program Files\Windows Resource Kits\Minidump\Mini121109-01 .dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: srv*c:\symbols*http://msdl.microsoft.com/download/sym bols Windows Server 2003 Kernel Version 3790 (Service Pack 2) MP (8 procs) Free x86 c ompatible Product: Server, suite: TerminalServer Built by: 3790.srv03_sp2_rtm.070216-1710 Machine Name: Kernel base = 0x80800000 PsLoadedModuleList = 0x808af9c8 Debug session time: Fri Dec 11 10:39:39.521 2009 (GMT+3) System Uptime: 1 days 2:08:03.322 Loading Kernel Symbols ............................................................... ........................................................ Loading User Symbols Loading unloaded module list ......... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {f774, d0000002, 1, 80a7e513} Probably caused by : netbt.sys ( netbt!ReturnIrp+11 ) Followup: MachineOwner --------- 6: kd> kd: Reading initial command '!analyze -v; q' ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000f774, memory referenced Arg2: d0000002, IRQL Arg3: 00000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 80a7e513, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: 0000f774 CURRENT_IRQL: 2 FAULTING_IP: hal!KeAcquireQueuedSpinLockRaiseToSynch+33 80a7e513 8902 mov dword ptr [edx],eax CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: DRIVER_FAULT_SERVER_MINIDUMP BUGCHECK_STR: 0xA PROCESS_NAME: System TRAP_FRAME: f5c51af8 -- (.trap 0xfffffffff5c51af8) ErrCode = 00000002 eax=f774f570 ebx=8884f030 ecx=808b9202 edx=0000f774 esi=87a4ddb8 edi=00000000 eip=80a7e513 esp=f5c51b6c ebp=f5c51b74 iopl=0 nv up ei ng nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286 hal!KeAcquireQueuedSpinLockRaiseToSynch+0x33: 80a7e513 8902 mov dword ptr [edx],eax ds:0023:0000f774=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 80a7e513 to 80836de5 STACK_TEXT: f5c51af8 80a7e513 badb0d00 0000f774 8884f000 nt!KiTrap0E+0x2a7 f5c51b6c 8084952c f5c51b88 f5963ea0 f5c51b84 hal!KeAcquireQueuedSpinLockRaiseToS ynch+0x33 f5c51b74 f5963ea0 f5c51b84 87a4ddb8 87a4de4c nt!IoAcquireCancelSpinLock+0xe f5c51b88 f5965a02 87a4ddb8 00000000 87a4ddb8 netbt!ReturnIrp+0x11 f5c51ba4 80840153 e084f030 87a4de4c 87a4ddb8 netbt!NbtDispatchInternalCtrl+0x2b8 f5c51bb8 f58e08a5 f5c51bf0 f58e1a1e 8884f030 nt!IofCallDriver+0x45 f5c51bc0 f58e1a1e 8884f030 87a4ddb8 f5c51be0 rdbss!RxCeSubmitTdiRequestNoWait+0x 28 f5c51bf0 f58e1ba9 8884f030 87a4ddb8 874a33f4 rdbss!RxCeSubmitTdiRequest+0x29 f5c51c0c f58f9d52 8975f0c4 8975f0ec 874a33ac rdbss!RxTdiDisconnect+0x60 f5c51c60 f5874040 874a33e4 00000000 8a38e478 rdbss!RxCeTearDownVC+0xac f5c51c78 f58769f4 874a3390 8a38e478 874a3390 mrxsmb!VctUninitialize+0x1b f5c51c8c f58489f5 874a3390 87375890 87375818 mrxsmb!VctTearDownServerTransport+0 x13 f5c51ca4 f5848abc 87375890 00000000 8a38e478 mrxsmb!SmbCepDereferenceServerTrans port+0x78 f5c51cc0 f5848b5c 87375818 00000000 8a38e478 mrxsmb!SmbCepTearDownServerTranspor t+0xcb f5c51ce8 f58740f7 87375818 00000000 00000000 mrxsmb!SmbCeUninitializeServerTrans port+0xf6 f5c51d00 f5848bc2 87375818 0000035f 87375818 mrxsmb!SmbCeTearDownServerEntry+0x7 e f5c51d18 f58737de 01000000 00000000 8684f208 mrxsmb!SmbCepDereferenceServerEntry +0x102 f5c51d34 f5873baa 8757c1e0 88a2d330 8684f208 mrxsmb!SmbCeDiscardAdminExchange+0x 152 f5c51d4c f58459d6 8684f208 f58ea760 f5c51d6c mrxsmb!SmbCeCompleteAdminExchange+0 xfc f5c51d5c f58727b1 8684f208 f5c51d77 f5c51d9c mrxsmb!SmbAdminExchangeFinalize+0x3 e f5c51d6c f58df1f2 0084f208 00000000 88843020 mrxsmb!SmbCeFinalizeExchangeWorkerT hreadRoutine+0x13 f5c51d9c f58f8506 008ea760 00000000 f5c51ddc rdbss!RxpWorkerThreadDispatcher+0x9 3 f5c51dac 80920833 f58ea760 00000000 00000000 rdbss!RxBootstrapWorkerThreadDispat cher+0xf f5c51ddc 8083fe9f f58f84f7 f58ea760 00000000 nt!PspSystemThreadStartup+0x2e 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16 STACK_COMMAND: kb FOLLOWUP_IP: netbt!ReturnIrp+11 f5963ea0 8b7508 mov esi,dword ptr [ebp+8] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: netbt!ReturnIrp+11 FOLLOWUP_NAME: MachineOwner MODULE_NAME: netbt IMAGE_NAME: netbt.sys DEBUG_FLR_IMAGE_TIMESTAMP: 45d6a0a9 FAILURE_BUCKET_ID: 0xA_netbt!ReturnIrp+11 BUCKET_ID: 0xA_netbt!ReturnIrp+11 Followup: MachineOwner --------- quit: #2 C:\Program Files\Windows Resource Kits>kdfe "C:\Program Files\Windows Resource K its\minidump\Mini121709-01.dmp" -v Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Program Files\Windows Resource Kits\Minidump\Mini121709-01 .dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: srv*c:\symbols*http://msdl.microsoft.com/download/sym bols Windows Server 2003 Kernel Version 3790 (Service Pack 2) MP (8 procs) Free x86 c ompatible Product: Server, suite: TerminalServer Built by: 3790.srv03_sp2_rtm.070216-1710 Machine Name: Kernel base = 0x80800000 PsLoadedModuleList = 0x808af9c8 Debug session time: Thu Dec 17 22:20:28.793 2009 (GMT+3) System Uptime: 3 days 13:47:45.821 Loading Kernel Symbols ............................................................... ..................................................... Loading User Symbols Loading unloaded module list ...................................... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck D1, {1c, d0000002, 1, f6dd22b1} Unable to load image \SystemRoot\system32\DRIVERS\ser2pl.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for ser2pl.sys *** ERROR: Module load completed but symbols could not be loaded for ser2pl.sys Probably caused by : ser2pl.sys ( ser2pl+42b1 ) Followup: MachineOwner --------- 0: kd> kd: Reading initial command '!analyze -v; q' ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000001c, memory referenced Arg2: d0000002, IRQL Arg3: 00000001, value 0 = read operation, 1 = write operation Arg4: f6dd22b1, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: 0000001c CURRENT_IRQL: 2 FAULTING_IP: ser2pl+42b1 f6dd22b1 ?? ??? CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: DRIVER_FAULT_SERVER_MINIDUMP BUGCHECK_STR: 0xD1 PROCESS_NAME: ups.exe TRAP_FRAME: f5259b48 -- (.trap 0xfffffffff5259b48) ErrCode = 00000002 eax=00000001 ebx=00000000 ecx=88a242dc edx=ffffffff esi=00000000 edi=80a7e440 eip=f6dd22b1 esp=f5259bbc ebp=f5259c14 iopl=0 nv up ei pl zr na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246 ser2pl+0x42b1: f6dd22b1 ?? ??? Resetting default scope LAST_CONTROL_TRANSFER: from f6dd22b1 to 80836de5 STACK_TEXT: f5259b48 f6dd22b1 badb0d00 ffffffff 886928a0 nt!KiTrap0E+0x2a7 WARNING: Stack unwind information not available. Following frames may be wrong. f5259bb8 88a242dc 88a240f8 f6dd25f3 88a240f8 ser2pl+0x42b1 f5259c14 f6dd318f 01a240f8 875249d0 00000000 0x88a242dc f5259c2c f6dd2b14 88a240f8 875249d0 88a2419c ser2pl+0x518f f5259c64 f6d3f5b7 875249d0 8974fc80 89679b08 ser2pl+0x4b14 f5259c78 80840153 88a82468 005249d0 875249d0 serenum!Serenum_DispatchPassThrough +0x65 f5259c8c 8092b50f 87524aac 875249d0 89679b08 nt!IofCallDriver+0x45 f5259ca0 8093910f 88a82468 875249d0 89679b08 nt!IopSynchronousServiceTail+0x10b f5259d38 80833bdf 000000d4 00000000 00000000 nt!NtReadFile+0x5d5 f5259d38 7c9385ec 000000d4 00000000 00000000 nt!KiFastCallEntry+0xfc 0081fcb4 00000000 00000000 00000000 00000000 0x7c9385ec STACK_COMMAND: kb FOLLOWUP_IP: ser2pl+42b1 f6dd22b1 ?? ??? SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: ser2pl+42b1 FOLLOWUP_NAME: MachineOwner MODULE_NAME: ser2pl IMAGE_NAME: ser2pl.sys DEBUG_FLR_IMAGE_TIMESTAMP: 3fc5b044 FAILURE_BUCKET_ID: 0xD1_ser2pl+42b1 BUCKET_ID: 0xD1_ser2pl+42b1 Followup: MachineOwner --------- quit: | Если кто поможет буду очень благодарен. На сервере стоит CitrixMFW, TS, TSLicense, DNS. |