server 2016 bosd MODULE_NAME: srvnet

J

jeffready2

we get this every so often but I dont see anything that really points out the issue except a memory fault maybe

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 000000000000009a,
Arg2: 00000000003fea65
Arg3: 0000000000000006
Arg4: 0000000000000002

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 401

BUILD_VERSION_STRING: 14393.3442.amd64fre.rs1_release.191219-1727

SYSTEM_MANUFACTURER: Dell Inc.

SYSTEM_PRODUCT_NAME: PowerEdge R440

SYSTEM_SKU: SKU=NotProvided;ModelName=PowerEdge R440

BIOS_VENDOR: Dell Inc.

BIOS_VERSION: 2.2.9

BIOS_DATE: 05/08/2019

BASEBOARD_MANUFACTURER: Dell Inc.

BASEBOARD_PRODUCT: 08CYF7

BASEBOARD_VERSION: A05

DUMP_TYPE: 1

BUGCHECK_P1: 9a

BUGCHECK_P2: 3fea65

BUGCHECK_P3: 6

BUGCHECK_P4: 2

BUGCHECK_STR: 0x4E_9a

CPU_COUNT: 20

CPU_MHZ: 82f

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 55

CPU_STEPPING: 4

CPU_MICROCODE: 6,55,4,0 (F,M,S,R) SIG: 200005E'00000000 (cache) 200005E'00000000 (init)

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST:

ANALYSIS_SESSION_TIME: 02-06-2020 08:17:42.0707

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER: from fffff80350d2b4db to fffff80350debe00

STACK_TEXT:
ffff9e01`ae669b78 fffff803`50d2b4db : 00000000`0000004e 00000000`0000009a 00000000`003fea65 00000000`00000006 : nt!KeBugCheckEx
ffff9e01`ae669b80 fffff803`50d2abfc : ffff37b5`00000002 ffff8988`f47494a0 00000000`00000002 00000000`0000004d : nt!MiInsertNonPagedPoolOnSlist+0x51b
ffff9e01`ae669c70 fffff803`50edf503 : ffff8988`f7465000 ffff9e01`ae669d80 00000000`00000000 fffff803`00000000 : nt!ExFreeLargePool+0x52c
ffff9e01`ae669d40 fffff806`a1b49816 : ffff8988`f7465000 ffff8988`f1fb5900 ffff8988`f2f948d0 00000000`000000ff : nt!ExFreePoolWithTag+0x503
ffff9e01`ae669e20 fffff806`a1d379ab : ffff8988`f2f946e0 ffff9181`8dcb0000 ffff8988`f1fb0000 fffff803`50d01e1c : srvnet!PplGenericFreeFunction+0x36
ffff9e01`ae669e50 fffff806`a1d722c2 : ffff8988`f1fb5888 ffff8988`f1fb5840 ffff8988`f2f946f0 00000000`00001363 : srv2!Srv2DereferenceWorkItem+0x2ab
ffff9e01`ae669f00 fffff803`50def237 : ffff9e01`ae660140 ffff9e01`ae66a000 ffffffff`ee1e5d00 ffff9e01`ae669fd1 : srv2!RfspThreadPoolNodeWorkerProcessWorkItems+0x132
ffff9e01`ae669f80 fffff803`50def1fd : 00000000`0000c001 00000000`00000000 00000000`00000003 fffff803`50d91df1 : nt!KxSwitchKernelStackCallout+0x27
ffff9e01`b3070330 fffff803`50d91df1 : 00000000`00000003 00000000`0000c001 00000000`00000000 00000000`00000012 : nt!KiSwitchKernelStackContinue
ffff9e01`b3070350 fffff803`50d91a56 : ffff9e01`b30703e0 00000000`0000c000 ffff9e01`00000001 00000000`00000000 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x241
ffff9e01`b30703e0 fffff803`50d9191f : 00000000`00000080 ffff8988`f398b580 00000000`000001f6 00000000`00000000 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xa6
ffff9e01`b3070440 fffff806`a1d72103 : ffff8988`f398b580 fffff803`511cacd4 00000000`00000088 ffff8988`ebea7040 : nt!KeExpandKernelStackAndCalloutInternal+0x2f
ffff9e01`b3070490 fffff803`511cad08 : ffffd90e`90292d30 ffff8988`fcdaf580 00000000`00000000 00000000`00000003 : srv2!RfspThreadPoolNodeWorkerRun+0xe3
ffff9e01`b30704f0 fffff803`50cb4365 : ffff8988`fcdaf580 fffff803`511cacd4 00000000`00000000 00000000`00000000 : nt!IopThreadStart+0x34
ffff9e01`b3070550 fffff803`50df3106 : ffff9e01`a67c0180 ffff8988`fcdaf580 fffff803`50cb4324 00000000`00000000 : nt!PspSystemThreadStartup+0x41
ffff9e01`b30705a0 00000000`00000000 : ffff9e01`b3071000 ffff9e01`b306a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


THREAD_SHA1_HASH_MOD_FUNC: 9405f1f26173da666ff99dabb6f9ab71a5f4b0ee

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d78144f205138b719c149c38b83ce7928cf6e98e

THREAD_SHA1_HASH_MOD: 57c2f40470e3b07ec411c056a6b039c43cb69701

FOLLOWUP_IP:
srvnet!PplGenericFreeFunction+36
fffff806`a1b49816 488b5c2430 mov rbx,qword ptr [rsp+30h]

FAULT_INSTR_CODE: 245c8b48

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: srvnet!PplGenericFreeFunction+36

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: srvnet

IMAGE_NAME: srvnet.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 5c7f6540

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 36

FAILURE_BUCKET_ID: 0x4E_9a_srvnet!PplGenericFreeFunction

BUCKET_ID: 0x4E_9a_srvnet!PplGenericFreeFunction

PRIMARY_PROBLEM_CLASS: 0x4E_9a_srvnet!PplGenericFreeFunction

TARGET_TIME: 2020-02-05T23:03:41.000Z

OSBUILD: 14393

OSSERVICEPACK: 0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 3

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 Server TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-12-19 22:20:44

BUILDDATESTAMP_STR: 191219-1727

BUILDLAB_STR: rs1_release

BUILDOSVER_STR: 10.0.14393.3442.amd64fre.rs1_release.191219-1727

ANALYSIS_SESSION_ELAPSED_TIME: 26de

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x4e_9a_srvnet!pplgenericfreefunction

FAILURE_ID_HASH: {d6c9c1c2-33b6-7530-c1c4-621167afa4ae}

Followup: MachineOwner
---------

14: kd> lmvm srvnet
Browse full module list
start end module name
fffff806`a1b40000 fffff806`a1b84000 srvnet (pdb symbols) C:\Program Files\Windows Kits\10\Debuggers\x64\sym\srvnet.pdb\13CECE09791E453A9DFEF5D6690E37781\srvnet.pdb
Loaded symbol image file: srvnet.sys
Image path: \SystemRoot\System32\DRIVERS\srvnet.sys
Image name: srvnet.sys
Browse all global symbols functions data
Timestamp: Tue Mar 5 22:14:24 2019 (5C7F6540)
CheckSum: 0003DB1B
ImageSize: 00044000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
14: kd> !analyze -v
\

Continue reading...
 
Back
Top Bottom