Microsoft (R) Windows Debugger Version 6.9.0003.113 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available
Symbol search path is: SRV*C:\symbols*
Symbol information
Executable search path is:
Windows Server 2008 Kernel Version 6001 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6001.18063.amd64fre.vistasp1_gdr.080425-1930
Kernel base = 0xfffff800`0385b000 PsLoadedModuleList = 0xfffff800`03a20db0
Debug session time: Sat Sep 27 21:47:51.247 2008 (GMT+2)
System Uptime: 0 days 1:13:11.085
Loading Kernel Symbols
................................................................................................................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`7efdf018). Type ".hh dbgerr001" for details
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {78, c, 1, fffff800038b2ae2}
*** ERROR: Module load completed but symbols could not be loaded for klim6.sys
Page a743a not present in the dump file. Type ".hh dbgerr004" for details
PEB is paged out (Peb.Ldr = 00000000`7efdf018). Type ".hh dbgerr001" for details
PEB is paged out (Peb.Ldr = 00000000`7efdf018). Type ".hh dbgerr001" for details
Probably caused by : tdx.sys ( tdx!TdxMessageTlRequestComplete+a8 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000078, memory referenced
Arg2: 000000000000000c, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800038b2ae2, address which referenced memory
Debugging Details:
------------------
Page a743a not present in the dump file. Type ".hh dbgerr004" for details
PEB is paged out (Peb.Ldr = 00000000`7efdf018). Type ".hh dbgerr001" for details
PEB is paged out (Peb.Ldr = 00000000`7efdf018). Type ".hh dbgerr001" for details
WRITE_ADDRESS: 0000000000000078
CURRENT_IRQL: c
FAULTING_IP:
nt!IopfCompleteRequest+6f2
fffff800`038b2ae2 488711 xchg rdx,qword ptr [rcx]
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: iw3mp.exe
TRAP_FRAME: fffffa60019228f0 -- (.trap 0xfffffa60019228f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000030 rcx=0000000000000078
rdx=fffffa6001922ad0 rsi=0000000000000000 rdi=0000000000000002
rip=fffff800038b2ae2 rsp=fffffa6001922a80 rbp=0000000000000000
r8=500072c57735001e r9=fffff800038d84e0 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!IopfCompleteRequest+0x6f2:
fffff800`038b2ae2 488711 xchg rdx,qword ptr [rcx] ds:71a0:0078=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800038b012e to fffff800038b0390
STACK_TEXT:
fffffa60`019227a8 fffff800`038b012e : 00000000`0000000a 00000000`00000078 00000000`0000000c 00000000`00000001 : nt!KeBugCheckEx
fffffa60`019227b0 fffff800`038af00b : 00000000`00000001 fffffa60`031d3149 fffffa80`64747400 fffffa80`04587318 : nt!KiBugCheckDispatch+0x6e
fffffa60`019228f0 fffff800`038b2ae2 : 00000000`00000000 fffff800`0398ee96 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x20b
fffffa60`01922a80 fffffa60`0330b698 : fffffa80`06e24920 00000000`00000002 fffffa80`045872a0 fffffa80`656c6946 : nt!IopfCompleteRequest+0x6f2
fffffa60`01922b40 fffffa60`01056860 : 00000000`00000000 fffffa80`040ccf30 00000000`00000000 fffffa80`0412dec8 : tdx!TdxMessageTlRequestComplete+0xa8
fffffa60`01922b80 fffffa60`00cdb817 : fffffa80`06e56650 00000000`00000001 fffffa80`03ffba01 00000000`00000001 : tcpip!UdpSendMessagesDatagramsComplete+0xf0
fffffa60`01922be0 fffffa60`0107029c : fffffa80`040ccd80 fffffa80`0696b601 00000000`00000002 fffffa80`046b6350 : NETIO!NetioDereferenceNetBufferListChain+0xe7
fffffa60`01922c60 fffffa60`00fad0b2 : fffffa80`05ff8dd0 fffffa80`0696b610 fffffa80`068b5000 fffff800`038b65a1 : tcpip!FlSendNetBufferListChainComplete+0x1c
fffffa60`01922c90 fffffa60`074518ec : fffffa80`060031a0 00000000`00000000 fffffa80`06db43c0 fffff800`0383e738 : ndis!ndisMSendCompleteNetBufferListsInternal+0xa2
fffffa60`01922d00 fffffa60`0746b3b8 : fffffa80`040ccd80 fffffa60`00e61110 00000000`00000000 00000000`00000001 : pacer!PcFilterSendNetBufferListsComplete+0xf4
fffffa60`01922d70 fffffa60`00fad1ac : fffffa80`060031a0 fffffa60`00e61110 00000000`00000001 fffffa80`040ccd80 : klim6+0x23b8
fffffa60`01922dc0 fffffa60`00dca66d : fffffa80`060031a0 fffffa80`040ccd80 fffffa80`063de5c0 fffffa80`06046040 : ndis!NdisMSendNetBufferListsComplete+0x7c
fffffa60`01922e00 fffffa60`00dc5f5d : fffffa80`06249000 fffffa80`040ccd80 00000003`a9d18000 fffffa80`00000000 : Rtlh64!MpHandleSendInterrupt+0x261
fffffa60`01922e70 fffffa60`00e0a7dd : 00000000`00000f44 fffffa60`01922f70 00000000`0000040e fffff800`038235cb : Rtlh64!MPHandleInterrupt+0x2b1
fffffa60`01922ec0 fffff800`038b99d7 : fffffa80`06a31028 fffffa60`09ae2ca0 fffffa60`005e8580 00000000`00000000 : ndis!ndisInterruptDpc+0xbd
fffffa60`01922f40 fffff800`038b3865 : fffffa60`00e0a720 fffffa60`005e5180 fffffa60`09ae2ca0 fffffa80`0495e6c0 : nt!KiRetireDpcList+0x117
fffffa60`01922fb0 fffff800`038b3677 : 00000000`00000000 fffffa80`0495e6c0 fffffa60`00000001 00000000`00000000 : nt!KyRetireDpcList+0x5
fffffa60`09ae2be0 fffff800`038f6d63 : 00000000`7ef95000 fffff800`038b10e9 fffffa80`087a2a80 00000000`00000000 : nt!KiDispatchInterruptContinue
fffffa60`09ae2c10 fffff800`038b10e9 : fffffa80`087a2a80 00000000`00000000 00000000`00000000 fffffa80`08691c50 : nt!KiDpcInterruptBypass+0x13
fffffa60`09ae2c20 00000000`135d0629 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiChainedDispatch+0x179
00000000`1043fdf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x135d0629
STACK_COMMAND: kb
FOLLOWUP_IP:
tdx!TdxMessageTlRequestComplete+a8
fffffa60`0330b698 488d15f1fcffff lea rdx,[tdx! ?? ::FNODOBFM::`string' (fffffa60`0330b390)]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: tdx!TdxMessageTlRequestComplete+a8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tdx
IMAGE_NAME: tdx.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 47919a85
FAILURE_BUCKET_ID: X64_0xA_W_tdx!TdxMessageTlRequestComplete+a8
BUCKET_ID: X64_0xA_W_tdx!TdxMessageTlRequestComplete+a8
Followup: MachineOwner