Windows 10 BSOD "tdx.sys" error

  • Thread starter Thread starter 권오생
  • Start date Start date

권오생

BSOD는 특정 웹 페이지에 액세스 할 때 발생합니다.

MEMORY.DMP 분석 결과는 다음과 같습니다.



Windows 10 커널 버전 19041 MP (4 프로세서) 무료 x64

제품 : WinNt, 제품군 : TerminalServer SingleUserTS

구축 : 19041.1.amd64fre.vb_release.191206-1406

기계 이름 :

커널 기반 = 0xfffff801`6c400000 PsLoadedModuleList = 0xfffff801`6d02a2f0

디버그 세션 시간 : 2 월 2 일 화요일 15 : 49 : 11.617 2021 (UTC + 9:00)

시스템 가동 시간 : 0 일 1 : 21 : 31.359


이 파일을 분석하려면! analyze -v를 실행하십시오.

0 : kd>! analyze -v

************************************************** *****************************

* *

* 버그 체크 분석 *

* *

************************************************** *****************************


DPC_WATCHDOG_VIOLATION (133)  <<< === DeadLock

DPC 워치 독이 DISPATCH_LEVEL의 IRQL에서 연장 된 실행 시간을 감지했습니다.

이상.

인수 :

Arg1 : 0000000000000000, 단일 DPC 또는 ISR이 할당 된 시간을 초과했습니다. 불쾌한

구성 요소는 일반적으로 스택 추적으로 식별 할 수 있습니다.

Arg2 : 0000000000000501, DPC 시간 카운트 (틱 단위).

Arg3 : 0000000000000500, DPC 시간 할당 (틱 단위).

Arg4 : fffff8016d0fa320, 다음을 포함하는 nt! DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK으로 캐스트

이 단일 DPC 시간 제한에 대한 추가 정보


디버깅 세부 정보 :

------------------


BUGCHECK_CODE : 133


BUGCHECK_P1 : 0


BUGCHECK_P2 : 501


BUGCHECK_P3 : 500


BUGCHECK_P4 : fffff8016d0fa320


DPC_TIMEOUT_TYPE : SINGLE_DPC_TIMEOUT_EXCEEDED


PROCESS_NAME : 레지스트리


SYMBOL_NAME : tdx! TdxShutdownEndpointConnection + e1


MODULE_NAME : tdx


IMAGE_NAME : tdx.sys <<< ================ OS 모듈에 문제가 발생한 것 같습니다.


STACK_COMMAND : .thread; .cxr; KB


BUCKET_ID_FUNC_OFFSET : e1


FAILURE_BUCKET_ID : 0x133_DPC_tdx! TdxShutdownEndpointConnection


OS_VERSION : 10.0.19041.1


BUILDLAB_STR : vb_release


OSPLATFORM_TYPE : x64


OSNAME : Windows 10


FAILURE_ID_HASH : {30f682b0-0895-94a4-871d-12af715555f4}


후속 조치 : MachineOwner

---------


0 : kd>! 실행 중 -it


시스템 프로세서 : (000000000000000f)

유휴 프로세서 : (000000000000000e)


Prcbs 현재 (pri) 다음 (pri) 유휴

0 fffff8016858c180 ffffbf81c7acd080 (11) ffffbf81c7a7a040 (13) fffff8016d126600 ................


# Child-SP RetAddr 호출 사이트

00 fffff801`716afc88 fffff801`6c83a988 nt!KeBugCheckEx

01 fffff801`716afc90 fffff801`6c67541d nt!KeAccumulateTicks+0x1c8788

02 fffff801`716afcf0 fffff801`6c6759c1 nt!KiUpdateRunTime+0x5d

03 fffff801`716afd40 fffff801`6c66f833 nt!KiUpdateTime+0x4a1

04 fffff801`716afe80 fffff801`6c6781f2 nt!KeClockInterruptNotify+0x2e3

05 fffff801`716aff30 fffff801`6c727ef5 nt!HalpTimerClockInterrupt+0xe2

06 fffff801`716aff60 fffff801`6c7f722a nt!KiCallInterruptServiceRoutine+0xa5

07 fffff801`716affb0 fffff801`6c7f7797 nt!KiInterruptSubDispatchNoLockNoEtw+0xfa

08 fffff60c`0ed67c00 fffff801`6c6e47fc nt!KiInterruptDispatchNoLockNoEtw+0x37

09 fffff60c`0ed67d90 fffff801`6c6e47c8 nt!KxWaitForSpinLockAndAcquire+0x2c

0a fffff60c`0ed67dc0 fffff801`709ee304 nt!KeAcquireSpinLockRaiseToDpc+0x88

0b fffff60c`0ed67df0 fffff801`709ee2a5 tcpip!TcpCloseTcb+0x44

0c fffff60c`0ed67f50 fffff801`6c7f905e tcpip!TcpTlConnectionCloseEndpointCalloutRoutine+0x15

0d fffff60c`0ed67f80 fffff801`6c7f901c nt!KxSwitchKernelStackCallout+0x2e

0e fffff801`716a5cd0 fffff801`6c7547ed nt!KiSwitchKernelStackContinue

0f fffff801`716a5cf0 fffff801`6c7545e2 nt!KiExpandKernelStackAndCalloutOnStackSegment+0x19d

10 fffff801`716a5d90 fffff801`6c754443 nt!KiExpandKernelStackAndCalloutSwitchStack+0xf2

11 fffff801`716a5e00 fffff801`6c7543fd nt!KeExpandKernelStackAndCalloutInternal+0x33

12 fffff801`716a5e70 fffff801`70a05b1a nt!KeExpandKernelStackAndCalloutEx+0x1d

13 fffff801`716a5eb0 fffff801`7b5db871 tcpip!TcpTlConnectionCloseEndpoint+0x6a

14 fffff801`716a5f20 fffff801`7b5d4d25 tdx!TdxShutdownEndpointConnection+0xe1

15 fffff801`716a5f70 fffff801`7b5d9649 tdx!TdxDecrementTlEndpointReference+0x35

16 fffff801`716a5fa0 fffff801`70a80cdd tdx!TdxDisconnectConnectionTlRequestComplete+0x189

17 fffff801`716a5ff0 fffff801`708e8ea4 tcpip!InetInspectDisconnectComplete+0x1d

18 fffff801`716a6020 fffff801`708b5e08 NETIO!StreamRequestNetBufferListCompletionFn+0x1ceb4

19 fffff801`716a6060 fffff801`70c9448c NETIO!NetioDereferenceNetBufferList+0x88

1a fffff801`716a60b0 fffff801`70c955cb fwpkclnt!FwppDereferenceNetioNetBufferList+0x98

1b fffff801`716a6100 fffff801`70c95816 fwpkclnt!FwpsDereferenceNetBufferList0+0x2b

1c fffff801`716a6130 fffff801`70c9561b fwpkclnt!FwpsFreeCloneNetBufferList0+0x1d6

1d fffff801`716a6170 fffff801`7cd7bcf2 fwpkclnt!FwpsDiscardClonedStreamData0+0x1b

1e fffff801`716a61a0 fffff801`7cd7751a AMonCDW8!NirpMgrPendingNirpComplete+0x15a

1f fffff801`716a61f0 fffff801`7cd81054 AMonCDW8!IAnfdTDCompleteRequest+0x102

20 fffff801`716a6240 fffff801`7cd73d91 AMonCDW8!SessionMgrTeObjDestroy+0x3b0

21 fffff801`716a62d0 fffff801`7cd7239a AMonCDW8!ClassifyEndpointClosure+0x2cd

22 fffff801`716a6330 fffff801`708bca51 AMonCDW8!DispatcherClassify+0xa92

23 fffff801`716a63b0 fffff801`708b86cb NETIO!ProcessCallout+0x5d1

24 fffff801`716a6530 fffff801`70a5e31f NETIO!KfdClassify+0x8bb

25 fffff801`716a6920 fffff801`709efeb2 tcpip!AleNotifyEndpointDeactivate+0x6d677

26 fffff801`716a6ec0 fffff801`709a340e tcpip!TcpShutdownTcb+0x1232

27 fffff801`716a7340 fffff801`709a28d9 tcpip!TcpLeaveTcbDelivery+0x15e

28 fffff801`716a7370 fffff801`709a1f25 tcpip!TcpDeliverDataToClient+0x7c9

29 fffff801`716a74f0 fffff801`709a64bb tcpip!TcpDeliverReceive+0xb5

2a fffff801`716a75e0 fffff801`709a536f tcpip!TcpTcbFastDatagram+0xebb

2b fffff801`716a77b0 fffff801`709a470f tcpip!TcpTcbReceive+0x18f

2c fffff801`716a7a00 fffff801`709a3798 tcpip!TcpMatchReceive+0x51f

2d fffff801`716a7cb0 fffff801`709a1e5e tcpip!TcpReceive+0x358

2e fffff801`716a7da0 fffff801`709b40aa tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e

2f fffff801`716a7de0 fffff801`70a0ed1f tcpip!IpFlcReceivePreValidatedPackets+0x6ba

30 fffff801`716a8070 fffff801`6c754488 tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12f

31 fffff801`716a81c0 fffff801`6c7543fd nt!KeExpandKernelStackAndCalloutInternal+0x78

32 fffff801`716a8230 fffff801`70a01cdd nt!KeExpandKernelStackAndCalloutEx+0x1d

33 fffff801`716a8270 fffff801`70a013bd tcpip!NetioExpandKernelStackAndCallout+0x8d

34 fffff801`716a82d0 fffff801`70741eb1 tcpip!FlReceiveNetBufferListChain+0x46d

35 fffff801`716a8580 fffff801`70741ccb ndis!ndisMIndicateNetBufferListsToOpen+0x141

36 fffff801`716a8660 fffff801`70747ef1 ndis!ndisMTopReceiveNetBufferLists+0x22b

37 fffff801`716a86e0 fffff801`7077dee3 ndis!ndisCallReceiveHandler+0x61

38 fffff801`716a8730 fffff801`70744a94 ndis!ndisInvokeNextReceiveHandler+0x1df

39 fffff801`716a8800 fffff801`7d626a28 ndis!NdisMIndicateReceiveNetBufferLists+0x104

3a fffff801`716a8890 fffff801`7d625cbd rt640x64+0x26a28

3b fffff801`716a89f0 fffff801`7d60636c rt640x64+0x25cbd

3c fffff801`716a8a40 fffff801`7d602a23 rt640x64+0x636c

3d fffff801`716a8aa0 fffff801`70747887 rt640x64+0x2a23

3e fffff801`716a8ad0 fffff801`6c60781e ndis!ndisInterruptDpc+0x197

3f fffff801`716a8bb0 fffff801`6c606b04 nt!KiExecuteAllDpcs+0x30e

40 fffff801`716a8d20 fffff801`6c7fc7c5 nt!KiRetireDpcList+0x1f4

41 fffff801`716a8fb0 fffff801`6c7fc5b0 nt!KxRetireDpcList+0x5

42 fffff60c`153af150 fffff801`6c7fbe65 nt!KiDispatchInterruptContinue

43 fffff60c`153af180 fffff801`6c7f72f1 nt!KiDpcInterruptBypass+0x25

44 fffff60c`153af190 fffff801`6c650078 nt!KiInterruptDispatch+0xb1

45 fffff60c`153af320 fffff801`6cdb1094 nt!ExAllocateHeapPool+0x168

46 fffff60c`153af460 fffff801`6c65c5c9 nt!ExAllocatePoolWithTag+0x64

47 fffff60c`153af4b0 fffff801`6ca1dcb1 nt!CmpAllocatePoolWithTag+0x9

48 fffff60c`153af4e0 fffff801`6ca1db3e nt!CmpConstructNameFromKeyNodes+0xb1

49 fffff60c`153af560 fffff801`6ca1da3c nt!CmpConstructNameWithStatus+0xee

4a fffff60c`153af5c0 fffff801`6c65bfff nt!CmpConstructName+0x14

4b fffff60c`153af5f0 fffff801`6ca1acd3 nt!CmpDoQueryKeyName+0x1af

4c fffff60c`153af730 fffff801`6c9d9a03 nt!CmpQueryKeyName+0x13

4d fffff60c`153af780 fffff801`6c9d941e nt!ObQueryNameStringMode+0xd3

4e fffff60c`153af8a0 fffff801`6890371f nt!ObQueryNameString+0xe

4f fffff60c`153af8e0 fffff801`68902bd2 TKRgFtXp64+0x371f

50 fffff60c`153af950 fffff801`689029d9 TKRgFtXp64+0x2bd2

51 fffff60c`153af9c0 fffff801`6ca26808 TKRgFtXp64+0x29d9

52 fffff60c`153afa00 fffff801`6ca225ac nt!CmpCallCallBacksEx+0x1c8

53 fffff60c`153afb10 fffff801`6ca22767 nt!CmpCallCallBacks+0x28

54 fffff60c`153afb60 fffff801`6c9faef0 nt!CmpDeleteKeyObject+0xa7

55 fffff60c`153afbf0 fffff801`6c661277 nt!ObpRemoveObjectRoutine+0x80

56 fffff60c`153afc50 fffff801`6ca2887e nt!ObfDereferenceObjectWithTag+0xc7

57 fffff60c`153afc90 fffff801`6ca2c4fc nt!ObCloseHandleTableEntry+0x29e

58 fffff60c`153afdd0 fffff801`6c8071b5 nt!NtClose+0xec

59 fffff60c`153afe40 00000000`77ad1cfc nt!KiSystemServiceCopyEnd+0x25

5a 00000000`0629d938 00000000`00000000 0x77ad1cfc


1 ffffe40022e4e180 ffffe40022e59140 ( 0) ffffe40022e59140 ................


# Child-SP RetAddr Call Site

00 fffff60c`0ea2f5b8 fffff801`7d941424 intelppm!MWaitIdle+0x1f

01 fffff60c`0ea2f5c0 fffff801`6c671396 intelppm!AcpiCStateIdleExecute+0x24

02 fffff60c`0ea2f5f0 fffff801`6c670154 nt!PpmIdleExecuteTransition+0x10c6

03 fffff60c`0ea2f9f0 fffff801`6c7f92a4 nt!PoIdle+0x374

04 fffff60c`0ea2fb60 00000000`00000000 nt!KiIdleLoop+0x54


2 ffffe40023040180 ffffe4002304b140 ( 0) ffffe4002304b140 ................


# Child-SP RetAddr Call Site

00 fffff60c`0ea3f5b8 fffff801`7d941424 intelppm!MWaitIdle+0x1f

01 fffff60c`0ea3f5c0 fffff801`6c671396 intelppm!AcpiCStateIdleExecute+0x24

02 fffff60c`0ea3f5f0 fffff801`6c670154 nt!PpmIdleExecuteTransition+0x10c6

03 fffff60c`0ea3f9f0 fffff801`6c7f92a4 nt!PoIdle+0x374

04 fffff60c`0ea3fb60 00000000`00000000 nt!KiIdleLoop+0x54


3 ffffe40023100180 ffffe4002310b140 ( 0) ffffe4002310b140 ................


# Child-SP RetAddr Call Site

00 fffff60c`0ea4f5b8 fffff801`7d941424 intelppm!MWaitIdle+0x1f

01 fffff60c`0ea4f5c0 fffff801`6c671396 intelppm!AcpiCStateIdleExecute+0x24

02 fffff60c`0ea4f5f0 fffff801`6c670154 nt!PpmIdleExecuteTransition+0x10c6

03 fffff60c`0ea4f9f0 fffff801`6c7f92a4 nt!PoIdle+0x374

04 fffff60c`0ea4fb60 00000000`00000000 nt!KiIdleLoop+0x54


0: kd> lmvm tdx

Browse full module list

start end module name

fffff801`7b5d0000 fffff801`7b5f2000 tdx

Loaded symbol image file: tdx.sys

Image path: \SystemRoot\system32\DRIVERS\tdx.sys

Image name: tdx.sys

Browse all global symbols functions data

이미지는 / Brepro 플래그로 작성되었습니다.

타임 스탬프 : 28EC0E80 ( 타임 스탬프 가 아닌 재현 가능한 빌드 파일 해시)

체크섬 : 000273F3

이미지 크기 : 00022000

번역 : 0000.04b0 0000.04e4 0409.04b0 0409.04e4

리소스 테이블의 정보 :

Continue reading...
 

Similar threads

P
Replies
0
Views
31
Plebtkp
P
M
Replies
0
Views
34
Manjunath_bn
M
S
Replies
0
Views
132
Steve McAfee
S
M
Replies
0
Views
68
Manjunath_bn
M
Back
Top