BSOD of IRQL_NOT_LESS_OR_EQUAL and tdx.sys


  1. Posts : 1
    Windows 7 Professional 64bit
       #1

    BSOD of IRQL_NOT_LESS_OR_EQUAL and tdx.sys


    Hello Experts,

    I am new to this forum and would like to receive your assistance to resolve my problem.

    My HP ProBook 4540s running Windows 7 Professional 64bit started crashing and giving BSOD from time to time.

    The STOP info shows 0xA , i downloaded Windows debugger and decoded the dumped crash info. The "analyzed" crash file points to the following:

    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck A, {700000004, 2, 0, fffff800034c4e63}

    Probably caused by : tdx.sys ( tdx!TdxEventReceiveMessagesTransportAddress+315 )

    Followup: MachineOwner
    ---------

    1: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high. This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000700000004, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff800034c4e63, address which referenced memory

    Debugging Details:
    ------------------


    READ_ADDRESS: 0000000700000004

    CURRENT_IRQL: 2

    FAULTING_IP:
    nt!memcpy+223
    fffff800`034c4e63 8a040a mov al,byte ptr [rdx+rcx]

    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

    BUGCHECK_STR: 0xA

    PROCESS_NAME: System

    TRAP_FRAME: fffff88002f198b0 -- (.trap 0xfffff88002f198b0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000010 rbx=0000000000000000 rcx=fffffa8008f59bc8
    rdx=00000586f70a643c rsi=0000000000000000 rdi=0000000000000000
    rip=fffff800034c4e63 rsp=fffff88002f19a48 rbp=fffff88002f19a90
    r8=0000000000000005 r9=0000000700000000 r10=fffffa8007111210
    r11=fffffa8008f59bc4 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0 nv up ei ng nz na pe nc
    nt!memcpy+0x223:
    fffff800`034c4e63 8a040a mov al,byte ptr [rdx+rcx] ds:00000007`00000004=??
    Resetting default scope

    LAST_CONTROL_TRANSFER: from fffff800034cd469 to fffff800034cdf00

    STACK_TEXT:
    fffff880`02f19768 fffff800`034cd469 : 00000000`0000000a 00000007`00000004 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`02f19770 fffff800`034cc0e0 : fffff880`017b46e8 00000000`00000008 fffffa80`07b77780 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`02f198b0 fffff800`034c4e63 : fffff800`034a91ce fffff880`00010000 00000000`00000000 00000000`08f30001 : nt!KiPageFault+0x260
    fffff880`02f19a48 fffff800`034a91ce : fffff880`00010000 00000000`00000000 00000000`08f30001 fffff880`02f19af0 : nt!memcpy+0x223
    fffff880`02f19a50 fffff800`034b125e : fffffa80`07111210 fffff880`009f8f00 fffffa80`084aa580 fffffa80`00000000 : nt!EtwpEventWriteFull+0x3be
    fffff880`02f19cc0 fffff880`04291656 : 00000000`00000000 00000000`e0000001 00000000`00000007 00000000`00000000 : nt!EtwWrite+0xae
    fffff880`02f19d30 fffff880`0428c1ef : 00000000`00000000 00000000`00000001 fffffa80`08e85250 fffff880`009f8fc0 : afd!AFDETW_TRACEDATAADDR_CORE+0x2b6
    fffff880`02f19ee0 fffff880`042d1d30 : fffffa80`0822008b 00000000`00000000 00000000`00000002 00000000`00000000 : afd! ?? ::FNODOBFM::`string'+0x3e1f
    fffff880`02f19fd0 fffff880`042866fd : fffffa80`0ab41100 00000000`00002300 00000000`0000002f 00000000`00000000 : afd!AfdSetupReceiveDatagramIrp+0x170
    fffff880`02f1a0a0 fffff880`042e78a4 : 00000000`00000000 fffff880`02f1a298 fffffa80`0ab411e2 00000000`0000002f : afd!AfdReceiveDatagramEventCommonHandler+0x1cd
    fffff880`02f1a140 fffff880`03e12325 : fffffa80`0adab080 fffffa80`0a90e800 fffff880`02f1a498 fffffa80`0a90e800 : afd!AfdReceiveDatagramEventHandler+0x124
    fffff880`02f1a230 fffff880`018423c5 : fffffa80`0a90e800 00000000`00000000 fffffa80`0a90e800 fffffa80`0a90e800 : tdx!TdxEventReceiveMessagesTransportAddress+0x315
    fffff880`02f1a420 fffff880`0184279d : fffffa80`00000000 fffffa80`0a90e800 fffffa80`00000000 fffffa80`0ab411da : tcpip!UdpDeliverDatagrams+0x155
    fffff880`02f1a5b0 fffff880`0185e427 : fffffa80`08034430 fffff880`01675a47 00000000`00000002 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x1ed
    fffff880`02f1a6a0 fffff880`0185e499 : fffff880`02f1a820 fffff880`0196e9a0 fffff880`02f1a830 fffff880`01676a39 : tcpip!IppDeliverListToProtocol+0xf7
    fffff880`02f1a760 fffff880`0185e990 : fffff880`0196e9a0 fffffa80`0813d160 00000000`00000011 fffff880`02f1a820 : tcpip!IppProcessDeliverList+0x59
    fffff880`02f1a7d0 fffff880`0185d821 : 00000000`00000000 fffffa80`08022000 fffff880`0196e9a0 00000000`00000001 : tcpip!IppReceiveHeaderBatch+0x231
    fffff880`02f1a8b0 fffff880`0185c272 : fffffa80`0a5ff640 00000000`00000000 00000000`00000001 00000000`00000001 : tcpip!IpFlcReceivePackets+0x651
    fffff880`02f1aab0 fffff880`018cae9a : fffff880`0350f004 00000000`00000000 fffffa80`09965bb0 fffffa80`088ea640 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
    fffff880`02f1ab90 fffff800`034dd64a : fffffa80`08c867f8 fffffa80`08c847f0 00000000`00004800 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x4d592
    fffff880`02f1abe0 fffff880`018750e2 : fffff880`018755e0 fffff880`02f1acf0 00000000`00000002 fffffa80`09704250 : nt!KeExpandKernelStackAndCalloutEx+0xda
    fffff880`02f1acc0 fffff880`017320eb : fffffa80`08c808d0 00000000`00000000 fffffa80`095e41a0 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0xb2
    fffff880`02f1ad30 fffff880`01710f7c : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
    fffff880`02f1ada0 fffff880`01703544 : fffffa80`08c8a6f0 fffff880`02f1aef8 00000000`00000000 fffffa80`08f26000 : ndis!ndisIndicateAllNetBufferLists+0x6c
    fffff880`02f1ae00 fffff880`0167ea24 : fffffa80`095e41a0 00000000`00000001 00000000`00000001 00000000`00000000 : ndis! ?? :KGKHJNI::`string'+0x3dd0
    fffff880`02f1b280 fffff880`0167e9e9 : 00000000`00000002 fffffa80`087221c0 00000000`00000002 fffff880`043c3368 : ndis!ndisMTopReceiveNetBufferLists+0x24
    fffff880`02f1b2c0 fffff880`0167e980 : 00000000`00000002 fffff880`043b9c66 fffff880`009f8fc0 00000000`00000000 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
    fffff880`02f1b300 fffff880`043b77ce : fffffa80`09323170 00000000`00000002 00000000`00000000 fffffa80`0accb030 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
    fffff880`02f1b340 fffff880`043b72f2 : fffffa80`09323170 00000000`00000000 fffffa80`098ec650 fffffa80`0000004b : dnelwf64+0x37ce
    fffff880`02f1b3e0 fffff880`043b5cc1 : 00000000`00000000 fffffa80`098ec650 00000000`00000000 00000000`00000001 : dnelwf64+0x32f2
    fffff880`02f1b470 fffff880`017328d5 : 00000000`00000001 fffff800`00000000 fffffa80`095e41a0 00000000`00000000 : dnelwf64+0x1cc1
    fffff880`02f1b4b0 fffff880`05acc301 : fffffa80`08c6ea40 00000000`00000001 00000000`00000001 00000000`000003e7 : ndis!ndisMIndicatePacketsToNetBufferLists+0x105
    fffff880`02f1b550 fffff880`05acbfb9 : fffffa80`00000000 fffffa80`0ad67000 fffffa80`07ac8620 fffffa80`0821c4e0 : RNDISMPX!ReceivePacketMessage+0x2e9
    fffff880`02f1b710 fffff880`05ac0520 : 00000000`00000000 00000000`00000000 fffffa80`0821c4e0 fffffa80`0983b010 : RNDISMPX!RndisMIndicateReceive+0x385
    fffff880`02f1b7a0 fffff880`05abed79 : fffffa80`0821c4e0 00000000`00000000 00000000`00000000 00000000`00000000 : usb8023x!IndicateRndisMessage+0xb0
    fffff880`02f1b7e0 fffff800`034d0516 : fffffa80`07cf1e53 00000000`00000000 00000000`00000000 fffffa80`07cf1c60 : usb8023x!ReadPipeCompletion+0x95
    fffff880`02f1b810 fffff880`048640e7 : 00000000`00000002 00000000`00000000 fffffa80`08c00b50 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
    fffff880`02f1b8f0 fffff880`0485496e : fffffa80`07aba3f0 00000000`00000000 fffffa80`09309d00 fffffa80`08c324c0 : iusb3xhc+0x640e7
    fffff880`02f1b920 fffff880`0484c96a : fffffa80`08c00b50 fffff880`0487bef0 fffffa80`07aba3f0 00000000`00000000 : iusb3xhc+0x5496e
    fffff880`02f1b990 fffff880`04837d53 : fffffa80`07aba3f0 fffffa80`08f26000 fffffa80`08c84a50 fffffa80`084fdb10 : iusb3xhc+0x4c96a
    fffff880`02f1b9d0 fffff880`0482d8ab : fffffa80`08c84a50 fffffa80`08f26000 fffffa80`08f26000 00000000`00000001 : iusb3xhc+0x37d53
    fffff880`02f1ba30 fffff880`04816cac : fffffa80`08f26000 fffffa80`09702ab0 fffffa80`088eaa02 fffffa80`088dab01 : iusb3xhc+0x2d8ab
    fffff880`02f1bb60 fffff880`0481613f : 00000000`00000000 fffffa80`08f26000 fffffa80`088eafa0 00000000`00000010 : iusb3xhc+0x16cac
    fffff880`02f1bc60 fffff800`034d95dc : fffff880`009ee180 00000001`c39ac9f1 00000001`c39ac95a 00000000`00000000 : iusb3xhc+0x1613f
    fffff880`02f1bc90 fffff800`034d66fa : fffff880`009ee180 fffff880`009f8fc0 00000000`00000000 fffff880`04816034 : nt!KiRetireDpcList+0x1bc
    fffff880`02f1bd40 00000000`00000000 : fffff880`02f1c000 fffff880`02f16000 fffff880`02f1bd00 00000000`00000000 : nt!KiIdleLoop+0x5a



    STACK_COMMAND: kb

    FOLLOWUP_IP:
    tdx!TdxEventReceiveMessagesTransportAddress+315
    fffff880`03e12325 3d160000c0 cmp eax,0C0000016h

    SYMBOL_STACK_INDEX: b

    SYMBOL_NAME: tdx!TdxEventReceiveMessagesTransportAddress+315

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: tdx

    IMAGE_NAME: tdx.sys

    DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc16b

    FAILURE_BUCKET_ID: X64_0xA_tdx!TdxEventReceiveMessagesTransportAddress+315

    BUCKET_ID: X64_0xA_tdx!TdxEventReceiveMessagesTransportAddress+315

    Followup: MachineOwner
    ---------


    i am suspecting the network adapter of my USB 3G dongle as i can see some related words in the crash info (usb, ndis, dne, tcpip..)

    iusb3xhc+0x1613f
    ndis!ndisMIndicatePacketsToNetBufferLists
    dnelwf64+0x1cc1
    tcpip!IpFlcReceivePackets

    However, the debugger mainly tells about:
    tdx!TdxEventReceiveMessagesTransportAddress and tdx.sys

    what do you think about the cause of this crash ?
    am i correct in suspecting the USB dongle given it's the only network adapter ?
    what is "tdx" ?

    I hope that you assist me in determining the cause of this nasty BSOD.

    Thanks in advance,
    Mashal Alshboul
      My Computer


  2. Arc
    Posts : 35,373
    Microsoft Windows 10 Pro Insider Preview 64-bit
       #2
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 21:20.
Find Us