BSOD on Azure VM with Win Server 2k8 R2

surr0und

New member
Joined
Oct 20, 2019
Posts
3
Hello, people.
Sorry for the inconvenience but I need the help of some experts hehe. So, it turns out that I have a VM in Azure with windows 2008 R2 3 since years ago and 2 days ago began to give me problems for no apparent reason.

The bsod is the typical "IRQL_NOT_LESS_OR_EQUAL" but until now I did not find a solution and i tried everything I saw in google, i've salso "re-implemented" the VM with azure portal thinking maybe it was his phsyical server with failires but no success.

VM started crashing 2 days ago after being almost 2 years (+600 days) without a reboot and I haven't made any changes to the PC.
It just started to crashing out of nowhere and does it constantly every 1 or 2 hours, until now I haven't been able to find a solution so I came here.

I left here the only dumps that generated the VM in its lifetime, which the first was yesterday with the first crash: MEGA

I also was able to take a screen from the azure panel and this is what the bsod shows:
hUaZI.png


And this is one of the open dumps with windbg:
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [D:\Desktop\dumps\101919-113734-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) UP Free x64
Product: Server, suite: TerminalServer DataCenter SingleUserTS
Built by: 7601.24384.amd64fre.win7sp1_ldr_escrow.190220-1800
Machine Name:
Kernel base = 0xfffff800`01406000 PsLoadedModuleList = 0xfffff800`0163fc90
Debug session time: Sat Oct 19 09:46:56.609 2019 (UTC - 3:00)
System Uptime: 0 days 2:35:58.375
Loading Kernel Symbols
...............................................................
................................................................
.....
Loading User Symbols
Loading unloaded module list
........
ERROR: FindPlugIns 8007007b
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {0, 2, 1, fffff80001424a5e}

Probably caused by : termdd.sys ( termdd!IcaDereferenceChannel+8c )

Followup: MachineOwner
---------

kd> !analyze -v
ERROR: FindPlugIns 8007007b
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80001424a5e, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800016a3100
0000000000000000

CURRENT_IRQL: 2

FAULTING_IP:
nt!ExDeleteResourceLite+ce
fffff800`01424a5e 488908 mov qword ptr [rax],rcx

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT_SERVER_MINIDUMP

BUGCHECK_STR: 0xA

PROCESS_NAME: svchost.exe

TRAP_FRAME: fffff880046d77c0 -- (.trap 0xfffff880046d77c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=000000000000000f rsi=0000000000000000 rdi=0000000000000000
rip=fffff80001424a5e rsp=fffff880046d7950 rbp=fffffa8c00ece6b0
r8=0000000000000000 r9=0000000000000000 r10=fffffa8c1065c450
r11=fffffa8c105a3730 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ExDeleteResourceLite+0xce:
fffff800`01424a5e 488908 mov qword ptr [rax],rcx ds:0002:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800014a7f69 to fffff80001499ba0

STACK_TEXT:
fffff880`046d7678 fffff800`014a7f69 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`046d7680 fffff800`014a5d88 : 00000000`00000001 00000000`00000000 00000000`00000000 fffffa8c`1045b648 : nt!KiBugCheckDispatch+0x69
fffff880`046d77c0 fffff800`01424a5e : fffffa8c`1045b648 00000000`00000005 00000000`00000020 fffffa8c`1045b630 : nt!KiPageFault+0x448
fffff880`046d7950 fffff880`0264a5ac : fffffa8c`00ece4a0 fffffa8c`00ece6b0 00000000`00000000 fffffa8c`1045b648 : nt!ExDeleteResourceLite+0xce
fffff880`046d79b0 fffff880`0264a3c3 : fffffa8c`00ece4a0 fffffa8c`00ece4a0 fffffa8c`1045b630 00000000`00000000 : termdd!IcaDereferenceChannel+0x8c
fffff880`046d79f0 fffff880`02649e01 : fffffa8c`0cb9abd0 fffff880`0264d18f 00000000`00000000 fffffa8c`106f4f3c : termdd!IcaChannelInputInternal+0x5af
fffff880`046d7ad0 fffff880`0458425e : fffff8a0`02a4a010 fffff8a0`02a4a010 00000000`00000001 fffff8a0`02a4a1e8 : termdd!IcaChannelInput+0xdd
fffff880`046d7b10 fffff880`045833fc : fffff880`046d7c30 fffff8a0`02187010 00000000`00000001 fffffa8c`105e4d98 : RDPWD!HandleDisconnectProviderUlt+0xe2
fffff880`046d7ba0 fffff880`04582fe4 : 00000000`00000009 00000000`00000000 00000000`00000000 fffff880`0455015d : RDPWD!RecognizeMCSFrame+0x50
fffff880`046d7be0 fffff880`0264d1f8 : fffff8a0`0049b000 fffffa8c`0cb9abd0 fffffa8c`0cb4b690 fffff880`0454ef00 : RDPWD!MCSIcaRawInputWorker+0x3d4
fffff880`046d7c80 fffff880`0454e900 : 00000000`00000000 fffff880`046d7db0 fffff880`046d7da8 ffc08370`ed030d00 : termdd!IcaRawInput+0x50
fffff880`046d7cb0 fffff880`0454ddde : fffffa8c`0000016b 00000000`00000000 00000000`00000000 fffffa8c`105e4d50 : tssecsrv!CRawInputDM::PassDataToServer+0x2c
fffff880`046d7ce0 fffff880`0454d7c2 : 00000000`00000003 fffff880`00000e27 fffffa8c`0000011e fffff880`00000e27 : tssecsrv!CFilter::FilterIncomingData+0x122
fffff880`046d7d90 fffff880`0264d1f8 : 00000000`00000000 fffffa8c`00610b80 00000000`00000000 00000000`00000000 : tssecsrv!ScrRawInput+0x82
fffff880`046d7e00 fffff880`045434bd : fffffa8c`012adf90 fffffa8c`105e4ba8 00000000`00000103 fffffa8c`012adf90 : termdd!IcaRawInput+0x50
fffff880`046d7e30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tdtcp!TdInputThread+0x465


STACK_COMMAND: kb

FOLLOWUP_IP:
termdd!IcaDereferenceChannel+8c
fffff880`0264a5ac 488d8f80000000 lea rcx,[rdi+80h]

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: termdd!IcaDereferenceChannel+8c

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: termdd

IMAGE_NAME: termdd.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7ab0c

FAILURE_BUCKET_ID: X64_0xA_termdd!IcaDereferenceChannel+8c

BUCKET_ID: X64_0xA_termdd!IcaDereferenceChannel+8c

Followup: MachineOwner
---------

kd> !analyze -v
ERROR: FindPlugIns 8007007b
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80001424a5e, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: 0000000000000000

CURRENT_IRQL: 2

FAULTING_IP:
nt!ExDeleteResourceLite+ce
fffff800`01424a5e 488908 mov qword ptr [rax],rcx

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT_SERVER_MINIDUMP

BUGCHECK_STR: 0xA

PROCESS_NAME: svchost.exe

TRAP_FRAME: fffff880046d77c0 -- (.trap 0xfffff880046d77c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=000000000000000f rsi=0000000000000000 rdi=0000000000000000
rip=fffff80001424a5e rsp=fffff880046d7950 rbp=fffffa8c00ece6b0
r8=0000000000000000 r9=0000000000000000 r10=fffffa8c1065c450
r11=fffffa8c105a3730 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ExDeleteResourceLite+0xce:
fffff800`01424a5e 488908 mov qword ptr [rax],rcx ds:0002:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800014a7f69 to fffff80001499ba0

STACK_TEXT:
fffff880`046d7678 fffff800`014a7f69 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`046d7680 fffff800`014a5d88 : 00000000`00000001 00000000`00000000 00000000`00000000 fffffa8c`1045b648 : nt!KiBugCheckDispatch+0x69
fffff880`046d77c0 fffff800`01424a5e : fffffa8c`1045b648 00000000`00000005 00000000`00000020 fffffa8c`1045b630 : nt!KiPageFault+0x448
fffff880`046d7950 fffff880`0264a5ac : fffffa8c`00ece4a0 fffffa8c`00ece6b0 00000000`00000000 fffffa8c`1045b648 : nt!ExDeleteResourceLite+0xce
fffff880`046d79b0 fffff880`0264a3c3 : fffffa8c`00ece4a0 fffffa8c`00ece4a0 fffffa8c`1045b630 00000000`00000000 : termdd!IcaDereferenceChannel+0x8c
fffff880`046d79f0 fffff880`02649e01 : fffffa8c`0cb9abd0 fffff880`0264d18f 00000000`00000000 fffffa8c`106f4f3c : termdd!IcaChannelInputInternal+0x5af
fffff880`046d7ad0 fffff880`0458425e : fffff8a0`02a4a010 fffff8a0`02a4a010 00000000`00000001 fffff8a0`02a4a1e8 : termdd!IcaChannelInput+0xdd
fffff880`046d7b10 fffff880`045833fc : fffff880`046d7c30 fffff8a0`02187010 00000000`00000001 fffffa8c`105e4d98 : RDPWD!HandleDisconnectProviderUlt+0xe2
fffff880`046d7ba0 fffff880`04582fe4 : 00000000`00000009 00000000`00000000 00000000`00000000 fffff880`0455015d : RDPWD!RecognizeMCSFrame+0x50
fffff880`046d7be0 fffff880`0264d1f8 : fffff8a0`0049b000 fffffa8c`0cb9abd0 fffffa8c`0cb4b690 fffff880`0454ef00 : RDPWD!MCSIcaRawInputWorker+0x3d4
fffff880`046d7c80 fffff880`0454e900 : 00000000`00000000 fffff880`046d7db0 fffff880`046d7da8 ffc08370`ed030d00 : termdd!IcaRawInput+0x50
fffff880`046d7cb0 fffff880`0454ddde : fffffa8c`0000016b 00000000`00000000 00000000`00000000 fffffa8c`105e4d50 : tssecsrv!CRawInputDM::PassDataToServer+0x2c
fffff880`046d7ce0 fffff880`0454d7c2 : 00000000`00000003 fffff880`00000e27 fffffa8c`0000011e fffff880`00000e27 : tssecsrv!CFilter::FilterIncomingData+0x122
fffff880`046d7d90 fffff880`0264d1f8 : 00000000`00000000 fffffa8c`00610b80 00000000`00000000 00000000`00000000 : tssecsrv!ScrRawInput+0x82
fffff880`046d7e00 fffff880`045434bd : fffffa8c`012adf90 fffffa8c`105e4ba8 00000000`00000103 fffffa8c`012adf90 : termdd!IcaRawInput+0x50
fffff880`046d7e30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tdtcp!TdInputThread+0x465


STACK_COMMAND: kb

FOLLOWUP_IP:
termdd!IcaDereferenceChannel+8c
fffff880`0264a5ac 488d8f80000000 lea rcx,[rdi+80h]

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: termdd!IcaDereferenceChannel+8c

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: termdd

IMAGE_NAME: termdd.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7ab0c

FAILURE_BUCKET_ID: X64_0xA_termdd!IcaDereferenceChannel+8c

BUCKET_ID: X64_0xA_termdd!IcaDereferenceChannel+8c

Followup: MachineOwner
---------

kd> !analyze -v
ERROR: FindPlugIns 8007007b
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80001424a5e, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: 0000000000000000

CURRENT_IRQL: 2

FAULTING_IP:
nt!ExDeleteResourceLite+ce
fffff800`01424a5e 488908 mov qword ptr [rax],rcx

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT_SERVER_MINIDUMP

BUGCHECK_STR: 0xA

PROCESS_NAME: svchost.exe

TRAP_FRAME: fffff880046d77c0 -- (.trap 0xfffff880046d77c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=000000000000000f rsi=0000000000000000 rdi=0000000000000000
rip=fffff80001424a5e rsp=fffff880046d7950 rbp=fffffa8c00ece6b0
r8=0000000000000000 r9=0000000000000000 r10=fffffa8c1065c450
r11=fffffa8c105a3730 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ExDeleteResourceLite+0xce:
fffff800`01424a5e 488908 mov qword ptr [rax],rcx ds:0002:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800014a7f69 to fffff80001499ba0

STACK_TEXT:
fffff880`046d7678 fffff800`014a7f69 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`046d7680 fffff800`014a5d88 : 00000000`00000001 00000000`00000000 00000000`00000000 fffffa8c`1045b648 : nt!KiBugCheckDispatch+0x69
fffff880`046d77c0 fffff800`01424a5e : fffffa8c`1045b648 00000000`00000005 00000000`00000020 fffffa8c`1045b630 : nt!KiPageFault+0x448
fffff880`046d7950 fffff880`0264a5ac : fffffa8c`00ece4a0 fffffa8c`00ece6b0 00000000`00000000 fffffa8c`1045b648 : nt!ExDeleteResourceLite+0xce
fffff880`046d79b0 fffff880`0264a3c3 : fffffa8c`00ece4a0 fffffa8c`00ece4a0 fffffa8c`1045b630 00000000`00000000 : termdd!IcaDereferenceChannel+0x8c
fffff880`046d79f0 fffff880`02649e01 : fffffa8c`0cb9abd0 fffff880`0264d18f 00000000`00000000 fffffa8c`106f4f3c : termdd!IcaChannelInputInternal+0x5af
fffff880`046d7ad0 fffff880`0458425e : fffff8a0`02a4a010 fffff8a0`02a4a010 00000000`00000001 fffff8a0`02a4a1e8 : termdd!IcaChannelInput+0xdd
fffff880`046d7b10 fffff880`045833fc : fffff880`046d7c30 fffff8a0`02187010 00000000`00000001 fffffa8c`105e4d98 : RDPWD!HandleDisconnectProviderUlt+0xe2
fffff880`046d7ba0 fffff880`04582fe4 : 00000000`00000009 00000000`00000000 00000000`00000000 fffff880`0455015d : RDPWD!RecognizeMCSFrame+0x50
fffff880`046d7be0 fffff880`0264d1f8 : fffff8a0`0049b000 fffffa8c`0cb9abd0 fffffa8c`0cb4b690 fffff880`0454ef00 : RDPWD!MCSIcaRawInputWorker+0x3d4
fffff880`046d7c80 fffff880`0454e900 : 00000000`00000000 fffff880`046d7db0 fffff880`046d7da8 ffc08370`ed030d00 : termdd!IcaRawInput+0x50
fffff880`046d7cb0 fffff880`0454ddde : fffffa8c`0000016b 00000000`00000000 00000000`00000000 fffffa8c`105e4d50 : tssecsrv!CRawInputDM::PassDataToServer+0x2c
fffff880`046d7ce0 fffff880`0454d7c2 : 00000000`00000003 fffff880`00000e27 fffffa8c`0000011e fffff880`00000e27 : tssecsrv!CFilter::FilterIncomingData+0x122
fffff880`046d7d90 fffff880`0264d1f8 : 00000000`00000000 fffffa8c`00610b80 00000000`00000000 00000000`00000000 : tssecsrv!ScrRawInput+0x82
fffff880`046d7e00 fffff880`045434bd : fffffa8c`012adf90 fffffa8c`105e4ba8 00000000`00000103 fffffa8c`012adf90 : termdd!IcaRawInput+0x50
fffff880`046d7e30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tdtcp!TdInputThread+0x465


STACK_COMMAND: kb

FOLLOWUP_IP:
termdd!IcaDereferenceChannel+8c
fffff880`0264a5ac 488d8f80000000 lea rcx,[rdi+80h]

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: termdd!IcaDereferenceChannel+8c

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: termdd

IMAGE_NAME: termdd.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7ab0c

FAILURE_BUCKET_ID: X64_0xA_termdd!IcaDereferenceChannel+8c

BUCKET_ID: X64_0xA_termdd!IcaDereferenceChannel+8c

Followup: MachineOwner
---------

Thank you very much in advance!
 
Hello and thanks.

I finally realized that the cause was the termdd.sys that is in charge of the RDP service.
Recently an exploit appeared for RDP and maybe that was the cause of my problem.

I noticed that by mistake I had left the RDP port exposed to public without VPN, so I blocked it and so far I have 61 hours without crashes.

If it's anything else I'll bother here again, thanks one more time.
 

Has Sysnative Forums helped you? Please consider donating to help us support the site!

Back
Top