BugCheck 1000007E, {ffffffffc000001d, fffff880019f2f65, fffff88003994688, fffff88003993ee0}
[U][B]Probably caused by : memory_corruption[/B][/U] ([U][B]Could be memory, but just as likely still a driver which may need updating or removal[/B][/U].)
Followup:[U][B] memory_corruption[/B][/U]
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff880019f2f65, The address that the exception occurred at
Arg3: fffff88003994688, Exception Record Address
Arg4: fffff88003993ee0, Context Record Address
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
FAULTING_IP:
tdx!TdxNaAddressChangeEvent+55
fffff880`019f2f65 f30fef06 rep pxor mm0,mmword ptr [rsi]
EXCEPTION_RECORD: fffff88003994688 -- (.exr 0xfffff88003994688)
ExceptionAddress: fffff880019f2f65 (tdx!TdxNaAddressChangeEvent+0x0000000000000055)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0
CONTEXT: fffff88003993ee0 -- (.cxr 0xfffff88003993ee0)
rax=fffffa8003ec37b0 rbx=fffffa8003ec37b0 rcx=00000000000007ff
rdx=000000000000073a rsi=fffff88003994a30 rdi=0000000000000018
rip=fffff880019f2f65 rsp=fffff880039948c0 rbp=0000000000000000
r8=0000000000000801 r9=fffff80002e6ce40 r10=fffff80002e6c588
r11=fffff88003765180 r12=0000000000000029 r13=fffffa80038d4cc0
r14=fffffa80037bcb40 r15=fffffa80037bcb90
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
tdx!TdxNaAddressChangeEvent+0x55:
fffff880`019f2f65 f30fef06 rep pxor mm0,mmword ptr [rsi] ds:002b:fffff880`03994a30=03994a70
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x7E
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
LAST_CONTROL_TRANSFER: from fffff88001c11c2d to fffff880019f2f65
FAILED_INSTRUCTION_ADDRESS:
tdx!TdxNaAddressChangeEvent+55
fffff880`019f2f65 f30fef06 rep pxor mm0,mmword ptr [rsi]
STACK_TEXT:
fffff880`039948c0 fffff880`01c11c2d : fffff880`03994a20 fffff880`01f9d800 fffff880`03994a30 00000000`00000000 : tdx!TdxNaAddressChangeEvent+0x55
fffff880`039948f0 fffff880`01e41ba0 : fffff880`03994a20 00000000`00000000 fffffa80`036ba040 00000000`000007ff : NETIO!NsiParameterChange+0x8d
fffff880`039949d0 fffff880`01e636f5 : fffffa80`00000000 fffffa80`03ec3ed0 fffff800`02e822d8 00000000`00000000 : tcpip!IppNotifyAddressChangeAtPassive+0x190
fffff880`03994ac0 fffff880`01c0373b : 00000000`00000000 fffff800`02e822d8 fffffa80`03914b70 00000000`00000000 : tcpip!IppCompartmentNotificationWorker+0x15
fffff880`03994af0 fffff800`02fd764d : fffffa80`03755e40 fffffa80`036ba040 fffffa80`03ebbb50 fffffa80`036ba040 : NETIO!NetiopIoWorkItemRoutine+0x3b
fffff880`03994b40 fffff800`02cee841 : fffff800`02e822d8 fffff800`02fd7601 fffffa80`036ba000 00000000`00000000 : nt!IopProcessWorkItem+0x3d
fffff880`03994b70 fffff800`02f7be6a : 00000000`00000000 fffffa80`036ba040 00000000`00000080 fffffa80`0369f5f0 : nt!ExpWorkerThread+0x111
fffff880`03994c00 fffff800`02cd5ec6 : fffff880`009b3180 fffffa80`036ba040 fffff880`009be040 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03994c40 00000000`00000000 : fffff880`03995000 fffff880`0398f000 fffff880`039948a0 00000000`00000000 : nt!KxStartSystemThread+0x16
CHKIMG_EXTENSION: !chkimg -lo 50 -d !tdx
fffff880019f2f67 - tdx!TdxNaAddressChangeEvent+57
[ 6f:ef ]
1 error : !tdx (fffff880019f2f67)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .cxr 0xfffff88003993ee0 ; kb
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
Followup: memory_corruption