none
windows server2008R2sp1蓝屏 RRS feed

  • 问题

  • 各位,我有一台vmware的虚拟机,运行的是windows2008r2sp1系统。最近总是出现蓝屏。以下为dump信息。我做过以下几种尝试:1,虚拟机的内存预留;2,更改虚拟机的网卡类型;3,用453129_intl_x64_zip这个热补丁去更新tdx.sys文件,提供改文件的KB中未找到该文件更新后的TDX.SYS版本。均不起作用。烦请各位帮忙看下以下DUMP。多谢!


    Microsoft (R) Windows Debugger Version 10.0.17134.12 X86
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [e:\Documents\wolf\Desktop\092118-17425-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available


    ************* Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
    Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
    Product: Server, suite: Enterprise TerminalServer SingleUserTS
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`01619000 PsLoadedModuleList = 0xfffff800`0185ee90
    Debug session time: Fri Sep 21 05:31:27.087 2018 (UTC + 8:00)
    System Uptime: 0 days 6:24:00.574
    Loading Kernel Symbols
    .

    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.

    ..............................................................
    ................................................................
    ............
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck D1, {158, 2, 0, fffff88001ee698a}

    *** WARNING: Unable to verify timestamp for kltdi.sys
    *** ERROR: Module load completed but symbols could not be loaded for kltdi.sys
    *** WARNING: Unable to verify timestamp for vsepflt.sys
    *** ERROR: Module load completed but symbols could not be loaded for vsepflt.sys
    *** WARNING: Unable to verify timestamp for vnetflt.sys
    *** ERROR: Module load completed but symbols could not be loaded for vnetflt.sys
    Probably caused by : tdx.sys ( tdx!TdxConnectConnection+4dd )

    Followup:     MachineOwner
    ---------

    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000158, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff88001ee698a, address which referenced memory

    Debugging Details:
    ------------------


    KEY_VALUES_STRING: 1


    TIMELINE_ANALYSIS: 1


    DUMP_CLASS: 1

    DUMP_QUALIFIER: 400

    BUILD_VERSION_STRING:  7601.17514.amd64fre.win7sp1_rtm.101119-1850

    SYSTEM_MANUFACTURER:  VMware, Inc.

    VIRTUAL_MACHINE:  VMware

    SYSTEM_PRODUCT_NAME:  VMware Virtual Platform

    SYSTEM_VERSION:  None

    BIOS_VENDOR:  Phoenix Technologies LTD

    BIOS_VERSION:  6.00

    BIOS_DATE:  09/21/2015

    BASEBOARD_MANUFACTURER:  Intel Corporation

    BASEBOARD_PRODUCT:  440BX Desktop Reference Platform

    BASEBOARD_VERSION:  None

    DUMP_TYPE:  2

    BUGCHECK_P1: 158

    BUGCHECK_P2: 2

    BUGCHECK_P3: 0

    BUGCHECK_P4: fffff88001ee698a

    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800018ca0e8
    Unable to get MmSystemRangeStart
    GetUlongPtrFromAddress: unable to read from fffff800018ca280
    GetUlongPtrFromAddress: unable to read from fffff800018ca408
    GetPointerFromAddress: unable to read from fffff800018ca0a8
     0000000000000158 

    CURRENT_IRQL:  2

    FAULTING_IP: 
    tcpip!TcpGetIsn+ba
    fffff880`01ee698a 410fb78658010000 movzx   eax,word ptr [r14+158h]

    CPU_COUNT: 8

    CPU_MHZ: 767

    CPU_VENDOR:  GenuineIntel

    CPU_FAMILY: 6

    CPU_MODEL: 25

    CPU_STEPPING: 1

    CPU_MICROCODE: 6,25,1,0 (F,M,S,R)  SIG: E'00000000 (cache) E'00000000 (init)

    CUSTOMER_CRASH_COUNT:  1

    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT_SERVER

    BUGCHECK_STR:  0xD1

    PROCESS_NAME:  java.exe

    ANALYSIS_SESSION_HOST:  DESKTOP-LT5RBPP

    ANALYSIS_SESSION_TIME:  09-21-2018 12:06:25.0286

    ANALYSIS_VERSION: 10.0.17134.12 x86fre

    TRAP_FRAME:  fffff8800ae66e40 -- (.trap 0xfffff8800ae66e40)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000300 rbx=0000000000000000 rcx=0000000000000003
    rdx=000000009f938253 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88001ee698a rsp=fffff8800ae66fd0 rbp=0000000000233874
     r8=000000000000012c  r9=fffffa80317878d4 r10=fffffa8031894178
    r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na po nc
    tcpip!TcpGetIsn+0xba:
    fffff880`01ee698a 410fb78658010000 movzx   eax,word ptr [r14+158h] ds:00000000`00000158=????
    Resetting default scope

    LAST_CONTROL_TRANSFER:  from fffff80001698be9 to fffff80001699640

    STACK_TEXT:  
    fffff880`0ae66cf8 fffff800`01698be9 : 00000000`0000000a 00000000`00000158 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0ae66d00 fffff800`01697860 : fffff880`0ae66e38 fffff880`01edd56a 00000000`0000009a 00000000`00000001 : nt!KiBugCheckDispatch+0x69
    fffff880`0ae66e40 fffff880`01ee698a : 00000000`00233874 00000000`fd3aa045 00000000`c58aa8c7 fffffa80`31768930 : nt!KiPageFault+0x260
    fffff880`0ae66fd0 fffff880`01ee8aa7 : 00000000`c58aa8c7 fffffa80`31de9108 00000000`00000008 fffffa80`3695f510 : tcpip!TcpGetIsn+0xba
    fffff880`0ae67030 fffff880`01ee8177 : fffffa80`31def080 00000000`00000000 00000000`00000000 00000000`00000002 : tcpip!TcpCreateAndConnectTcbRateLimitComplete+0x337
    fffff880`0ae67180 fffff880`01ee80c3 : 00000000`00000001 00000000`00000032 00000000`00001cc9 fffffa80`32c62270 : tcpip!TcpCreateAndConnectTcbInspectConnectComplete+0x47
    fffff880`0ae67220 fffff880`01eea37c : 00000000`00000000 00000000`00000000 fffffa80`3695f510 fffffa80`3695f510 : tcpip!TcpContinueCreateAndConnect+0x373
    fffff880`0ae67320 fffff880`01ee9d53 : fffffa80`32c62180 fffffa80`3695f510 00000000`00000002 fffffa80`3695f768 : tcpip!TcpCreateAndConnectTcbInspectConnectRequestComplete+0x5c
    fffff880`0ae67350 fffff880`01eea296 : 00000000`00000094 00000000`00000094 fffffa80`319c4a10 00000000`00000000 : tcpip!TcpCreateAndConnectTcbWorkQueueRoutine+0x273
    fffff880`0ae67420 fffff880`01a0542d : fffffa80`36a8d990 fffffa80`36a8d990 00000000`00000080 00000000`00000060 : tcpip!TcpCreateAndConnectTcb+0x4c6
    fffff880`0ae67510 fffff880`01a03c0d : fffffa80`319e4000 fffffa80`80000001 fffffa80`31b8ef28 fffffa80`319dc010 : tdx!TdxConnectConnection+0x4dd
    fffff880`0ae67630 fffff880`01a3159f : fffffa80`353ebf50 fffffa80`36a0c640 fffff880`0ae67738 fffff880`0ae676e8 : tdx!TdxTdiDispatchInternalDeviceControl+0x39d
    fffff880`0ae676b0 fffffa80`353ebf50 : fffffa80`36a0c640 fffff880`0ae67738 fffff880`0ae676e8 fffff880`01b16ffc : kltdi+0x259f
    fffff880`0ae676b8 fffffa80`36a0c640 : fffff880`0ae67738 fffff880`0ae676e8 fffff880`01b16ffc fffff880`01bec9f0 : 0xfffffa80`353ebf50
    fffff880`0ae676c0 fffff880`0ae67738 : fffff880`0ae676e8 fffff880`01b16ffc fffff880`01bec9f0 fffffa80`00000000 : 0xfffffa80`36a0c640
    fffff880`0ae676c8 fffff880`0ae676e8 : fffff880`01b16ffc fffff880`01bec9f0 fffffa80`00000000 fffffa80`3604e580 : 0xfffff880`0ae67738
    fffff880`0ae676d0 fffff880`01b16ffc : fffff880`01bec9f0 fffffa80`00000000 fffffa80`3604e580 00000000`00000000 : 0xfffff880`0ae676e8
    fffff880`0ae676d8 fffff880`01bec9f0 : fffffa80`00000000 fffffa80`3604e580 00000000`00000000 fffffa80`330a4501 : vsepflt+0x12ffc
    fffff880`0ae676e0 fffffa80`00000000 : fffffa80`3604e580 00000000`00000000 fffffa80`330a4501 00000000`00000000 : vnetflt+0x59f0
    fffff880`0ae676e8 fffffa80`3604e580 : 00000000`00000000 fffffa80`330a4501 00000000`00000000 00000000`0000afd2 : 0xfffffa80`00000000
    fffff880`0ae676f0 00000000`00000000 : fffffa80`330a4501 00000000`00000000 00000000`0000afd2 fffffa80`35b236f0 : 0xfffffa80`3604e580


    THREAD_SHA1_HASH_MOD_FUNC:  526947e04e0e84b69de9f5c05061fa8c70ed3456

    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  ab11fe0e45993567df6d7b0b5aebc949175b4fce

    THREAD_SHA1_HASH_MOD:  098b609cec3d69efa9950ad30032bf175bf4cfb5

    FOLLOWUP_IP: 
    tdx!TdxConnectConnection+4dd
    fffff880`01a0542d 498d8fd8000000  lea     rcx,[r15+0D8h]

    FAULT_INSTR_CODE:  d88f8d49

    SYMBOL_STACK_INDEX:  a

    SYMBOL_NAME:  tdx!TdxConnectConnection+4dd

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: tdx

    IMAGE_NAME:  tdx.sys

    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79332

    IMAGE_VERSION:  6.1.7601.17514

    STACK_COMMAND:  .thread ; .cxr ; kb

    FAILURE_BUCKET_ID:  X64_0xD1_tdx!TdxConnectConnection+4dd

    BUCKET_ID:  X64_0xD1_tdx!TdxConnectConnection+4dd

    PRIMARY_PROBLEM_CLASS:  X64_0xD1_tdx!TdxConnectConnection+4dd

    TARGET_TIME:  2018-09-20T21:31:27.000Z

    OSBUILD:  7601

    OSSERVICEPACK:  1000

    SERVICEPACK_NUMBER: 0

    OS_REVISION: 0

    SUITE_MASK:  274

    PRODUCT_TYPE:  3

    OSPLATFORM_TYPE:  x64

    OSNAME:  Windows 7

    OSEDITION:  Windows 7 Server (Service Pack 1) Enterprise TerminalServer SingleUserTS

    OS_LOCALE:  

    USER_LCID:  0

    OSBUILD_TIMESTAMP:  2010-11-20 17:30:02

    BUILDDATESTAMP_STR:  101119-1850

    BUILDLAB_STR:  win7sp1_rtm

    BUILDOSVER_STR:  6.1.7601.17514.amd64fre.win7sp1_rtm.101119-1850

    ANALYSIS_SESSION_ELAPSED_TIME:  97d

    ANALYSIS_SOURCE:  KM

    FAILURE_ID_HASH_STRING:  km:x64_0xd1_tdx!tdxconnectconnection+4dd

    FAILURE_ID_HASH:  {57d2aa16-2de2-2c33-cb66-86e6f714c918}

    Followup:     MachineOwner
    ---------

    2018年9月21日 4:07

全部回复