询问者
windows server2008R2sp1蓝屏

问题
-
各位,我有一台vmware的虚拟机,运行的是windows2008r2sp1系统。最近总是出现蓝屏。以下为dump信息。我做过以下几种尝试:1,虚拟机的内存预留;2,更改虚拟机的网卡类型;3,用453129_intl_x64_zip这个热补丁去更新tdx.sys文件,提供改文件的KB中未找到该文件更新后的TDX.SYS版本。均不起作用。烦请各位帮忙看下以下DUMP。多谢!
Microsoft (R) Windows Debugger Version 10.0.17134.12 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [e:\Documents\wolf\Desktop\092118-17425-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: Server, suite: Enterprise TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`01619000 PsLoadedModuleList = 0xfffff800`0185ee90
Debug session time: Fri Sep 21 05:31:27.087 2018 (UTC + 8:00)
System Uptime: 0 days 6:24:00.574
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {158, 2, 0, fffff88001ee698a}
*** WARNING: Unable to verify timestamp for kltdi.sys
*** ERROR: Module load completed but symbols could not be loaded for kltdi.sys
*** WARNING: Unable to verify timestamp for vsepflt.sys
*** ERROR: Module load completed but symbols could not be loaded for vsepflt.sys
*** WARNING: Unable to verify timestamp for vnetflt.sys
*** ERROR: Module load completed but symbols could not be loaded for vnetflt.sys
Probably caused by : tdx.sys ( tdx!TdxConnectConnection+4dd )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000158, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001ee698a, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
SYSTEM_MANUFACTURER: VMware, Inc.
VIRTUAL_MACHINE: VMware
SYSTEM_PRODUCT_NAME: VMware Virtual Platform
SYSTEM_VERSION: None
BIOS_VENDOR: Phoenix Technologies LTD
BIOS_VERSION: 6.00
BIOS_DATE: 09/21/2015
BASEBOARD_MANUFACTURER: Intel Corporation
BASEBOARD_PRODUCT: 440BX Desktop Reference Platform
BASEBOARD_VERSION: None
DUMP_TYPE: 2
BUGCHECK_P1: 158
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff88001ee698a
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800018ca0e8
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800018ca280
GetUlongPtrFromAddress: unable to read from fffff800018ca408
GetPointerFromAddress: unable to read from fffff800018ca0a8
0000000000000158
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!TcpGetIsn+ba
fffff880`01ee698a 410fb78658010000 movzx eax,word ptr [r14+158h]
CPU_COUNT: 8
CPU_MHZ: 767
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 25
CPU_STEPPING: 1
CPU_MICROCODE: 6,25,1,0 (F,M,S,R) SIG: E'00000000 (cache) E'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT_SERVER
BUGCHECK_STR: 0xD1
PROCESS_NAME: java.exe
ANALYSIS_SESSION_HOST: DESKTOP-LT5RBPP
ANALYSIS_SESSION_TIME: 09-21-2018 12:06:25.0286
ANALYSIS_VERSION: 10.0.17134.12 x86fre
TRAP_FRAME: fffff8800ae66e40 -- (.trap 0xfffff8800ae66e40)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000300 rbx=0000000000000000 rcx=0000000000000003
rdx=000000009f938253 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001ee698a rsp=fffff8800ae66fd0 rbp=0000000000233874
r8=000000000000012c r9=fffffa80317878d4 r10=fffffa8031894178
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
tcpip!TcpGetIsn+0xba:
fffff880`01ee698a 410fb78658010000 movzx eax,word ptr [r14+158h] ds:00000000`00000158=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80001698be9 to fffff80001699640
STACK_TEXT:
fffff880`0ae66cf8 fffff800`01698be9 : 00000000`0000000a 00000000`00000158 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0ae66d00 fffff800`01697860 : fffff880`0ae66e38 fffff880`01edd56a 00000000`0000009a 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff880`0ae66e40 fffff880`01ee698a : 00000000`00233874 00000000`fd3aa045 00000000`c58aa8c7 fffffa80`31768930 : nt!KiPageFault+0x260
fffff880`0ae66fd0 fffff880`01ee8aa7 : 00000000`c58aa8c7 fffffa80`31de9108 00000000`00000008 fffffa80`3695f510 : tcpip!TcpGetIsn+0xba
fffff880`0ae67030 fffff880`01ee8177 : fffffa80`31def080 00000000`00000000 00000000`00000000 00000000`00000002 : tcpip!TcpCreateAndConnectTcbRateLimitComplete+0x337
fffff880`0ae67180 fffff880`01ee80c3 : 00000000`00000001 00000000`00000032 00000000`00001cc9 fffffa80`32c62270 : tcpip!TcpCreateAndConnectTcbInspectConnectComplete+0x47
fffff880`0ae67220 fffff880`01eea37c : 00000000`00000000 00000000`00000000 fffffa80`3695f510 fffffa80`3695f510 : tcpip!TcpContinueCreateAndConnect+0x373
fffff880`0ae67320 fffff880`01ee9d53 : fffffa80`32c62180 fffffa80`3695f510 00000000`00000002 fffffa80`3695f768 : tcpip!TcpCreateAndConnectTcbInspectConnectRequestComplete+0x5c
fffff880`0ae67350 fffff880`01eea296 : 00000000`00000094 00000000`00000094 fffffa80`319c4a10 00000000`00000000 : tcpip!TcpCreateAndConnectTcbWorkQueueRoutine+0x273
fffff880`0ae67420 fffff880`01a0542d : fffffa80`36a8d990 fffffa80`36a8d990 00000000`00000080 00000000`00000060 : tcpip!TcpCreateAndConnectTcb+0x4c6
fffff880`0ae67510 fffff880`01a03c0d : fffffa80`319e4000 fffffa80`80000001 fffffa80`31b8ef28 fffffa80`319dc010 : tdx!TdxConnectConnection+0x4dd
fffff880`0ae67630 fffff880`01a3159f : fffffa80`353ebf50 fffffa80`36a0c640 fffff880`0ae67738 fffff880`0ae676e8 : tdx!TdxTdiDispatchInternalDeviceControl+0x39d
fffff880`0ae676b0 fffffa80`353ebf50 : fffffa80`36a0c640 fffff880`0ae67738 fffff880`0ae676e8 fffff880`01b16ffc : kltdi+0x259f
fffff880`0ae676b8 fffffa80`36a0c640 : fffff880`0ae67738 fffff880`0ae676e8 fffff880`01b16ffc fffff880`01bec9f0 : 0xfffffa80`353ebf50
fffff880`0ae676c0 fffff880`0ae67738 : fffff880`0ae676e8 fffff880`01b16ffc fffff880`01bec9f0 fffffa80`00000000 : 0xfffffa80`36a0c640
fffff880`0ae676c8 fffff880`0ae676e8 : fffff880`01b16ffc fffff880`01bec9f0 fffffa80`00000000 fffffa80`3604e580 : 0xfffff880`0ae67738
fffff880`0ae676d0 fffff880`01b16ffc : fffff880`01bec9f0 fffffa80`00000000 fffffa80`3604e580 00000000`00000000 : 0xfffff880`0ae676e8
fffff880`0ae676d8 fffff880`01bec9f0 : fffffa80`00000000 fffffa80`3604e580 00000000`00000000 fffffa80`330a4501 : vsepflt+0x12ffc
fffff880`0ae676e0 fffffa80`00000000 : fffffa80`3604e580 00000000`00000000 fffffa80`330a4501 00000000`00000000 : vnetflt+0x59f0
fffff880`0ae676e8 fffffa80`3604e580 : 00000000`00000000 fffffa80`330a4501 00000000`00000000 00000000`0000afd2 : 0xfffffa80`00000000
fffff880`0ae676f0 00000000`00000000 : fffffa80`330a4501 00000000`00000000 00000000`0000afd2 fffffa80`35b236f0 : 0xfffffa80`3604e580
THREAD_SHA1_HASH_MOD_FUNC: 526947e04e0e84b69de9f5c05061fa8c70ed3456
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ab11fe0e45993567df6d7b0b5aebc949175b4fce
THREAD_SHA1_HASH_MOD: 098b609cec3d69efa9950ad30032bf175bf4cfb5
FOLLOWUP_IP:
tdx!TdxConnectConnection+4dd
fffff880`01a0542d 498d8fd8000000 lea rcx,[r15+0D8h]
FAULT_INSTR_CODE: d88f8d49
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: tdx!TdxConnectConnection+4dd
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tdx
IMAGE_NAME: tdx.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79332
IMAGE_VERSION: 6.1.7601.17514
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0xD1_tdx!TdxConnectConnection+4dd
BUCKET_ID: X64_0xD1_tdx!TdxConnectConnection+4dd
PRIMARY_PROBLEM_CLASS: X64_0xD1_tdx!TdxConnectConnection+4dd
TARGET_TIME: 2018-09-20T21:31:27.000Z
OSBUILD: 7601
OSSERVICEPACK: 1000
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 274
PRODUCT_TYPE: 3
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
OSEDITION: Windows 7 Server (Service Pack 1) Enterprise TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2010-11-20 17:30:02
BUILDDATESTAMP_STR: 101119-1850
BUILDLAB_STR: win7sp1_rtm
BUILDOSVER_STR: 6.1.7601.17514.amd64fre.win7sp1_rtm.101119-1850
ANALYSIS_SESSION_ELAPSED_TIME: 97d
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xd1_tdx!tdxconnectconnection+4dd
FAILURE_ID_HASH: {57d2aa16-2de2-2c33-cb66-86e6f714c918}
Followup: MachineOwner
---------
全部回复
-
您好:
请网盘分享您的dump 文件.
一般我们需要收集kernal dump 文件分析(和RAM 差不多大).
建议先将您系统更新到最新(KB4457139), 以避免known issue.
BEST REGARDS
Andy YOU
Please remember to mark the replies as answers if they help.
If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com.- 已编辑 Andy YOUMicrosoft contingent staff 2018年9月24日 8:54