Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Debugged my MEMORY.DMP


  • Please log in to reply
4 replies to this topic

#1 pocket1982

pocket1982

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:41 AM

Posted 27 February 2010 - 11:54 PM

Good day to all

I'm very new to this forum I would just like to thank you for your intelligence out there. :huh:
Please forgive for any mistake's I may make thanks :thumbup2:
Ok I'll introduce you to my issue

I have been having strange blue screen errors I've reinstalled windows three times. Did memtest found one faulty ram and got them replaced with brand new one's excatly the same brand etc. Also when doing serveral things at once notice a lag then blue screen.

I found instruction while surfing the net from usamsa

link : http://www.bleepingcomputer.com/forums/t/176011/how-to-receive-help-diagnosing-blue-screens-and-windows-crashes/

Thanks excellent instruction setting there. :huh:

Need more information happy to help here is my computer specs

Motherboard:Asus P6T Deluxe V2
GPU: GeForce 295 GTX Nividia asus
CPU: i7 core 950
RAM: DDR3 Corsair 6 Gig
HARD DRIVE: WD Raptor Drive 300 Gig
Hard Drive #2: WD Terrabyte 1001

Ok here is the Dump file That have been suggested to put into the bleepingcomputers forums


=========================================================================================================================================================
Loading Dump File [C:\Users\Bradley\Desktop\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available

WARNING: Whitespace at end of path element
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols

Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a11000 PsLoadedModuleList = 0xfffff800`02c4ee50
Debug session time: Sun Feb 28 13:36:19.642 2010 (GMT+10)
System Uptime: 0 days 1:07:12.750
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols

Loading unloaded module list
................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050033, 6f8, fffff80002a4b7a0}

*** ERROR: Module load completed but symbols could not be loaded for SYMTDIV.SYS
*** ERROR: Module load completed but symbols could not be loaded for yk62x64.sys
Probably caused by : NETIO.SYS ( NETIO!CompareSecurityContexts+6a )

Followup: MachineOwner
---------

6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000006f8
Arg4: fffff80002a4b7a0

Debugging Details:
------------------


BUGCHECK_STR: 0x7f_8

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 2

LAST_CONTROL_TRANSFER: from fffff80002a82469 to fffff80002a82f00

STACK_TEXT:
fffff880`030ffde8 fffff800`02a82469 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx
fffff880`030ffdf0 fffff800`02a80932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`030fff30 fffff800`02a4b7a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`0b8f6ff0 fffff880`01406c5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x60
fffff880`0b8f76e0 fffff880`0140494f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!CompareSecurityContexts+0x6a
fffff880`0b8f7750 fffff880`014069b5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!MatchValues+0xef
fffff880`0b8f77a0 fffff880`01406845 : fffffa80`09dddc10 fffffa80`0a6fd590 fffff880`0b8f79c8 fffff880`0b8f8100 : NETIO!FilterMatch+0x95
fffff880`0b8f77f0 fffff880`01407ccb : 00000000`00000000 00000000`00000000 fffff880`0b8f8100 fffff880`0b8f79b0 : NETIO!IndexListClassify+0x69
fffff880`0b8f7870 fffff880`0163f4d0 : fffff880`0b8f8100 fffff880`0b8f7d48 fffff880`0b8f8a80 fffffa80`0a1f1450 : NETIO!KfdClassify+0xa4e
fffff880`0b8f7be0 fffff880`0163877e : fffff880`01747690 00000000`00000000 fffffa80`09a6adb0 00000000`00000000 : tcpip!WfpAleClassify+0x50
fffff880`0b8f7c20 fffff880`01637c15 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e
fffff880`0b8f8330 fffff880`0163b956 : 00000000`00000000 00000000`00000000 00000000`00000011 00000000`00000000 : tcpip!WfpAleAuthorizeSend+0x325
fffff880`0b8f8600 fffff880`0163e6a4 : 00000000`00000000 fffff880`0b8f8a38 fffff880`0b8f8a40 00000000`00000000 : tcpip!WfpAleConnectAcceptIndicate+0x106
fffff880`0b8f86f0 fffff880`01636f59 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000008 : tcpip!ProcessALEForTransportPacket+0x664
fffff880`0b8f8960 fffff880`01663bf6 : 00000000`00000000 fffffa80`00000002 fffffa80`0a5b8900 fffffa80`08838900 : tcpip!WfpProcessOutTransportStackIndication+0x329
fffff880`0b8f8b30 fffff880`01668a7e : fffffa80`0a5ba190 fffff880`01402804 fffff880`0176d9a0 fffffa80`09a6adb0 : tcpip!IppSendDatagramsCommon+0x526
fffff880`0b8f8e00 fffff880`01635cf8 : fffffa80`09a6adb0 fffffa80`0a1f1450 fffffa80`0a1f1450 fffffa80`0a5ba190 : tcpip!IpNlpSendDatagrams+0x3e
fffff880`0b8f8e40 fffff880`0163626d : fffffa80`0a4fc380 fffffa80`09bc5680 fffff880`0b8f9790 00000000`00000000 : tcpip!UdpSendMessagesOnPathCreation+0x688
fffff880`0b8f91c0 fffff880`01635ef5 : fffff880`0b8f96f0 00000000`00008900 00000000`00000001 00000000`c0a801ff : tcpip!UdpSendMessages+0x35d
fffff880`0b8f95b0 fffff800`02a9264a : 00000000`00000001 00000000`00000004 00000000`00000002 00000000`00000089 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
fffff880`0b8f95e0 fffff880`016364b8 : fffff880`01635ee0 fffff880`0b8f96f0 fffffa80`0a6e1c02 fffff880`02d06c50 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`0b8f96c0 fffff880`013def45 : fffffa80`063cd270 fffffa80`0a545cb0 fffffa80`09a78cd0 fffffa80`071f16ee : tcpip!UdpTlProviderSendMessages+0x78
fffff880`0b8f9740 fffff880`013deff2 : fffffa80`0a6e1c02 00000000`00000000 fffffa80`05cc0e98 fffffa80`05cc0ee0 : tdx!TdxSendDatagramTransportAddress+0x2f5
fffff880`0b8f9820 fffff880`02ccaa48 : fffffa80`05529d40 00000000`000000c8 fffffa80`0abbc5e0 fffffa80`05cc0d80 : tdx!TdxTdiDispatchInternalDeviceControl+0x52
fffff880`0b8f9850 fffff880`02ce7c33 : fffffa80`09aeb964 fffffa80`0a6e1cc0 00000000`00000064 fffffa80`0a6e1cc0 : SYMTDIV+0x7a48
fffff880`0b8f98b0 fffff880`02ce8120 : fffffa80`0a6e1cc0 00000000`00000064 fffffa80`0a6e1cc0 fffffa80`0a6e1cc0 : SYMTDIV+0x24c33
fffff880`0b8f98f0 fffff880`02ce80b4 : fffffa80`0a6e1cc0 fffffa80`0a6e1cc0 00000000`00000000 00000000`00000065 : SYMTDIV+0x25120
fffff880`0b8f9940 fffff880`02ce80b4 : 00000000`00000000 fffffa80`0a6e1cc0 00000000`00000000 00000000`00000064 : SYMTDIV+0x250b4
fffff880`0b8f9990 fffff880`02ccae07 : 00000000`00000000 00000000`00000000 fffffa80`05529d40 fffff880`0b8f9ad8 : SYMTDIV+0x250b4
fffff880`0b8f99e0 fffff880`02ce0bba : fffffa80`05529d40 fffffa80`05cc0ee0 fffffa80`05cc0d80 00000000`c000009a : SYMTDIV+0x7e07
fffff880`0b8f9a80 fffff880`02c02542 : 00000000`00000000 fffffa80`00000001 fffffa80`05cc0d80 fffffa80`05cc0d80 : SYMTDIV+0x1dbba
fffff880`0b8f9ad0 fffff880`02c02f61 : fffffa80`071f16b8 fffffa80`071f16b8 fffffa80`08520e20 fffff880`0b8f9bd0 : netbt!TdiSendDatagram+0x187
fffff880`0b8f9b40 fffff880`02c0f329 : fffffa80`064b6cc0 fffffa80`071f1500 00000000`00000021 00000000`00000044 : netbt!UdpSendDatagram+0x1b1
fffff880`0b8f9bd0 fffff880`02c0f0e6 : 00000000`00000000 00000000`00000000 00000000`00000032 fffff880`02c20089 : netbt!UdpSendResponse+0x4e0
fffff880`0b8f9c50 fffff880`02c03be7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : netbt!QueryFromNet+0xb11
fffff880`0b8f9d80 fffff880`02c01b47 : 00000000`00000032 fffffa80`093444ca 00000000`00000032 fffffa80`09aeb902 : netbt!NameSrvHndlrNotOs+0xca
fffff880`0b8f9dc0 fffff880`02cca46c : fffff880`0b8fa080 fffffa80`09a78cd0 fffffa80`09aeb964 00000000`00000032 : netbt!TdiRcvNameSrvHandler+0x367
fffff880`0b8f9e60 fffff880`013dd325 : fffffa80`0a094340 fffffa80`09a60002 fffff880`0b8fa1d8 fffffa80`09a6f330 : SYMTDIV+0x746c
fffff880`0b8f9f70 fffff880`016413c5 : fffffa80`09a6f330 00000000`00000000 fffffa80`09a6f330 fffffa80`09a6f330 : tdx!TdxEventReceiveMessagesTransportAddress+0x315
fffff880`0b8fa160 fffff880`016418d4 : fffffa80`00000000 fffffa80`09a6f330 00000000`00000000 fffffa80`093444c2 : tcpip!UdpDeliverDatagrams+0x155
fffff880`0b8fa2f0 fffff880`0165d427 : fffffa80`0653fe30 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x324
fffff880`0b8fa3e0 fffff880`0165d499 : fffff880`0b8fa560 fffff880`0176d9a0 fffff880`0b8fa570 fffffa80`063831c0 : tcpip!IppDeliverListToProtocol+0xf7
fffff880`0b8fa4a0 fffff880`0165d990 : fffff880`0176d9a0 fffffa80`071ca2f0 00000000`00000011 fffff880`0b8fa560 : tcpip!IppProcessDeliverList+0x59
fffff880`0b8fa510 fffff880`0165c821 : 00000000`ff01a8c0 fffffa80`0654f138 fffff880`0176d9a0 00000000`0575d801 : tcpip!IppReceiveHeaderBatch+0x231
fffff880`0b8fa5f0 fffff880`01736592 : fffffa80`077b6bf0 00000000`00000000 fffffa80`0575d801 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`0b8fa7f0 fffff880`015abafa : fffffa80`0a9a7202 fffffa80`0a9a72a0 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
fffff880`0b8fa830 fffff880`02d0a568 : fffffa80`071ddfa0 00000000`00000002 fffff880`ffffff00 fffffa80`0ad19990 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
fffff880`0b8fa8e0 fffff880`02d08140 : fffffa80`0a418cc0 00000000`00000000 fffff880`0b8fad50 fffffa80`0a418cc0 : SYMTDIV+0x47568
fffff880`0b8fa970 fffff880`02d04c2f : fffffa80`0a418cc0 00000000`00000000 fffff880`0b8fad50 fffffa80`0a418cc0 : SYMTDIV+0x45140
fffff880`0b8fa9d0 fffff880`02d040f5 : fffffa80`0575d8b0 00000000`000000c8 00000000`00000000 fffff880`0b8fad50 : SYMTDIV+0x41c2f
fffff880`0b8faa00 fffff880`02cf60f0 : fffff880`0b8fad50 fffffa80`071e3550 fffffa80`063a6a40 fffff880`00000000 : SYMTDIV+0x410f5
fffff880`0b8faa50 fffff880`02d07dd1 : fffffa80`0ad19990 fffff880`02d0c7c3 00000000`00000002 00000000`00000000 : SYMTDIV+0x330f0
fffff880`0b8fab60 fffff880`02d0cb7b : 00000000`00000000 fffff880`0b8fad10 fffff880`0b8fad50 00000000`00000002 : SYMTDIV+0x44dd1
fffff880`0b8fabc0 fffff880`02d08818 : fffff880`0b8fb070 fffff880`0b8fb590 fffff880`0b8fb590 fffff880`02d20130 : SYMTDIV+0x49b7b
fffff880`0b8fac60 fffff880`0141d57f : 00000000`00000000 fffffa80`063ca520 fffffa80`063ca520 00000000`00000000 : SYMTDIV+0x45818
fffff880`0b8faf00 fffff880`01406619 : fffff880`0b8f000c fffff880`0b8fb590 fffffa80`0b147068 fffffa80`085eee20 : NETIO! ?? ::FNODOBFM::`string'+0x7267
fffff880`0b8fb020 fffff880`01407bb1 : fffff880`0b8f000c fffff880`0b8fb590 fffffa80`063ca520 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x2a9
fffff880`0b8fb0f0 fffff880`0162582e : 00000000`0000000c fffff880`0b8fb590 00000000`00000001 fffffa80`085eee20 : NETIO!KfdClassify+0x934
fffff880`0b8fb460 fffff880`0163fd8d : fffffa80`085eee20 fffffa80`063ca520 fffffa80`0b147010 fffffa80`063c8900 : tcpip!ProcessInboundTransportLayerClassify+0x21e
fffff880`0b8fb680 fffff880`0166e861 : fffffa80`00000011 fffffa80`09a80002 fffffa80`06548900 00000000`00008900 : tcpip!WfpProcessInTransportStackIndication+0x81d
fffff880`0b8fb9f0 fffff880`01640f93 : fffffa80`09a88ec0 fffffa80`06410820 00000000`00000000 fffffa80`0654f000 : tcpip!InetInspectReceiveDatagram+0x121
fffff880`0b8fba90 fffff880`01641345 : fffffa80`09a88ec0 00000000`00000000 00000000`00000001 00000000`00000000 : tcpip!UdpBeginMessageIndication+0x83
fffff880`0b8fbbe0 fffff880`016418d4 : fffffa80`00000000 fffffa80`09a88ec0 00000000`00000000 fffffa80`088e4aa2 : tcpip!UdpDeliverDatagrams+0xd5
fffff880`0b8fbd70 fffff880`0165d427 : fffffa80`0653fe30 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x324
fffff880`0b8fbe60 fffff880`0165d499 : fffff880`0b8fbfe0 fffff880`0176d9a0 fffff880`0b8fbff0 fffffa80`063831c0 : tcpip!IppDeliverListToProtocol+0xf7
fffff880`0b8fbf20 fffff880`0165d990 : fffff880`0176d9a0 fffffa80`085eef50 00000000`00000011 fffff880`0b8fbfe0 : tcpip!IppProcessDeliverList+0x59
fffff880`0b8fbf90 fffff880`0165c821 : fffffa80`ff01a8c0 fffffa80`0654f000 fffff880`0176d9a0 00000000`089b7b01 : tcpip!IppReceiveHeaderBatch+0x231
fffff880`0b8fc070 fffff880`0165b272 : fffffa80`089bee50 00000000`00000000 fffffa80`089b7b01 00000000`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`0b8fc270 fffff880`016746ba : fffffa80`089b7bb0 fffff880`0b8fc3a0 fffffa80`089b7bb0 fffff880`0b8f0000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`0b8fc350 fffff800`02a9264a : fffffa80`085eee20 fffff880`0b8f7000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`0b8fc3a0 fffff880`016740e2 : fffff880`016745e0 fffff880`0b8fc4b0 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`0b8fc480 fffff880`0156e0eb : fffffa80`089bc6c0 00000000`00000000 fffffa80`0849d1a0 fffff800`02bb526f : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`0b8fc4f0 fffff880`01537fc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`0b8fc560 fffff880`014b1ef1 : fffffa80`0849d1a0 00000000`00000002 00000000`00000001 fffff880`014b237a : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`0b8fc9e0 fffff880`0fe191a7 : fffffa80`0884b000 fffffa80`085eee20 fffffa80`085eee20 fffffa80`0884bce0 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1


STACK_COMMAND: kb

FOLLOWUP_IP:
NETIO!CompareSecurityContexts+6a
fffff880`01406c5a 448b442470 mov r8d,dword ptr [rsp+70h]

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: NETIO!CompareSecurityContexts+6a

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME: NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc18a

FAILURE_BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a

BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a

Followup: MachineOwner
---------

6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000006f8
Arg4: fffff80002a4b7a0

Debugging Details:
------------------


BUGCHECK_STR: 0x7f_8

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 2

LAST_CONTROL_TRANSFER: from fffff80002a82469 to fffff80002a82f00

STACK_TEXT:
fffff880`030ffde8 fffff800`02a82469 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx
fffff880`030ffdf0 fffff800`02a80932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`030fff30 fffff800`02a4b7a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`0b8f6ff0 fffff880`01406c5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x60
fffff880`0b8f76e0 fffff880`0140494f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!CompareSecurityContexts+0x6a
fffff880`0b8f7750 fffff880`014069b5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!MatchValues+0xef
fffff880`0b8f77a0 fffff880`01406845 : fffffa80`09dddc10 fffffa80`0a6fd590 fffff880`0b8f79c8 fffff880`0b8f8100 : NETIO!FilterMatch+0x95
fffff880`0b8f77f0 fffff880`01407ccb : 00000000`00000000 00000000`00000000 fffff880`0b8f8100 fffff880`0b8f79b0 : NETIO!IndexListClassify+0x69
fffff880`0b8f7870 fffff880`0163f4d0 : fffff880`0b8f8100 fffff880`0b8f7d48 fffff880`0b8f8a80 fffffa80`0a1f1450 : NETIO!KfdClassify+0xa4e
fffff880`0b8f7be0 fffff880`0163877e : fffff880`01747690 00000000`00000000 fffffa80`09a6adb0 00000000`00000000 : tcpip!WfpAleClassify+0x50
fffff880`0b8f7c20 fffff880`01637c15 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e
fffff880`0b8f8330 fffff880`0163b956 : 00000000`00000000 00000000`00000000 00000000`00000011 00000000`00000000 : tcpip!WfpAleAuthorizeSend+0x325
fffff880`0b8f8600 fffff880`0163e6a4 : 00000000`00000000 fffff880`0b8f8a38 fffff880`0b8f8a40 00000000`00000000 : tcpip!WfpAleConnectAcceptIndicate+0x106
fffff880`0b8f86f0 fffff880`01636f59 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000008 : tcpip!ProcessALEForTransportPacket+0x664
fffff880`0b8f8960 fffff880`01663bf6 : 00000000`00000000 fffffa80`00000002 fffffa80`0a5b8900 fffffa80`08838900 : tcpip!WfpProcessOutTransportStackIndication+0x329
fffff880`0b8f8b30 fffff880`01668a7e : fffffa80`0a5ba190 fffff880`01402804 fffff880`0176d9a0 fffffa80`09a6adb0 : tcpip!IppSendDatagramsCommon+0x526
fffff880`0b8f8e00 fffff880`01635cf8 : fffffa80`09a6adb0 fffffa80`0a1f1450 fffffa80`0a1f1450 fffffa80`0a5ba190 : tcpip!IpNlpSendDatagrams+0x3e
fffff880`0b8f8e40 fffff880`0163626d : fffffa80`0a4fc380 fffffa80`09bc5680 fffff880`0b8f9790 00000000`00000000 : tcpip!UdpSendMessagesOnPathCreation+0x688
fffff880`0b8f91c0 fffff880`01635ef5 : fffff880`0b8f96f0 00000000`00008900 00000000`00000001 00000000`c0a801ff : tcpip!UdpSendMessages+0x35d
fffff880`0b8f95b0 fffff800`02a9264a : 00000000`00000001 00000000`00000004 00000000`00000002 00000000`00000089 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
fffff880`0b8f95e0 fffff880`016364b8 : fffff880`01635ee0 fffff880`0b8f96f0 fffffa80`0a6e1c02 fffff880`02d06c50 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`0b8f96c0 fffff880`013def45 : fffffa80`063cd270 fffffa80`0a545cb0 fffffa80`09a78cd0 fffffa80`071f16ee : tcpip!UdpTlProviderSendMessages+0x78
fffff880`0b8f9740 fffff880`013deff2 : fffffa80`0a6e1c02 00000000`00000000 fffffa80`05cc0e98 fffffa80`05cc0ee0 : tdx!TdxSendDatagramTransportAddress+0x2f5
fffff880`0b8f9820 fffff880`02ccaa48 : fffffa80`05529d40 00000000`000000c8 fffffa80`0abbc5e0 fffffa80`05cc0d80 : tdx!TdxTdiDispatchInternalDeviceControl+0x52
fffff880`0b8f9850 fffff880`02ce7c33 : fffffa80`09aeb964 fffffa80`0a6e1cc0 00000000`00000064 fffffa80`0a6e1cc0 : SYMTDIV+0x7a48
fffff880`0b8f98b0 fffff880`02ce8120 : fffffa80`0a6e1cc0 00000000`00000064 fffffa80`0a6e1cc0 fffffa80`0a6e1cc0 : SYMTDIV+0x24c33
fffff880`0b8f98f0 fffff880`02ce80b4 : fffffa80`0a6e1cc0 fffffa80`0a6e1cc0 00000000`00000000 00000000`00000065 : SYMTDIV+0x25120
fffff880`0b8f9940 fffff880`02ce80b4 : 00000000`00000000 fffffa80`0a6e1cc0 00000000`00000000 00000000`00000064 : SYMTDIV+0x250b4
fffff880`0b8f9990 fffff880`02ccae07 : 00000000`00000000 00000000`00000000 fffffa80`05529d40 fffff880`0b8f9ad8 : SYMTDIV+0x250b4
fffff880`0b8f99e0 fffff880`02ce0bba : fffffa80`05529d40 fffffa80`05cc0ee0 fffffa80`05cc0d80 00000000`c000009a : SYMTDIV+0x7e07
fffff880`0b8f9a80 fffff880`02c02542 : 00000000`00000000 fffffa80`00000001 fffffa80`05cc0d80 fffffa80`05cc0d80 : SYMTDIV+0x1dbba
fffff880`0b8f9ad0 fffff880`02c02f61 : fffffa80`071f16b8 fffffa80`071f16b8 fffffa80`08520e20 fffff880`0b8f9bd0 : netbt!TdiSendDatagram+0x187
fffff880`0b8f9b40 fffff880`02c0f329 : fffffa80`064b6cc0 fffffa80`071f1500 00000000`00000021 00000000`00000044 : netbt!UdpSendDatagram+0x1b1
fffff880`0b8f9bd0 fffff880`02c0f0e6 : 00000000`00000000 00000000`00000000 00000000`00000032 fffff880`02c20089 : netbt!UdpSendResponse+0x4e0
fffff880`0b8f9c50 fffff880`02c03be7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : netbt!QueryFromNet+0xb11
fffff880`0b8f9d80 fffff880`02c01b47 : 00000000`00000032 fffffa80`093444ca 00000000`00000032 fffffa80`09aeb902 : netbt!NameSrvHndlrNotOs+0xca
fffff880`0b8f9dc0 fffff880`02cca46c : fffff880`0b8fa080 fffffa80`09a78cd0 fffffa80`09aeb964 00000000`00000032 : netbt!TdiRcvNameSrvHandler+0x367
fffff880`0b8f9e60 fffff880`013dd325 : fffffa80`0a094340 fffffa80`09a60002 fffff880`0b8fa1d8 fffffa80`09a6f330 : SYMTDIV+0x746c
fffff880`0b8f9f70 fffff880`016413c5 : fffffa80`09a6f330 00000000`00000000 fffffa80`09a6f330 fffffa80`09a6f330 : tdx!TdxEventReceiveMessagesTransportAddress+0x315
fffff880`0b8fa160 fffff880`016418d4 : fffffa80`00000000 fffffa80`09a6f330 00000000`00000000 fffffa80`093444c2 : tcpip!UdpDeliverDatagrams+0x155
fffff880`0b8fa2f0 fffff880`0165d427 : fffffa80`0653fe30 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x324
fffff880`0b8fa3e0 fffff880`0165d499 : fffff880`0b8fa560 fffff880`0176d9a0 fffff880`0b8fa570 fffffa80`063831c0 : tcpip!IppDeliverListToProtocol+0xf7
fffff880`0b8fa4a0 fffff880`0165d990 : fffff880`0176d9a0 fffffa80`071ca2f0 00000000`00000011 fffff880`0b8fa560 : tcpip!IppProcessDeliverList+0x59
fffff880`0b8fa510 fffff880`0165c821 : 00000000`ff01a8c0 fffffa80`0654f138 fffff880`0176d9a0 00000000`0575d801 : tcpip!IppReceiveHeaderBatch+0x231
fffff880`0b8fa5f0 fffff880`01736592 : fffffa80`077b6bf0 00000000`00000000 fffffa80`0575d801 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`0b8fa7f0 fffff880`015abafa : fffffa80`0a9a7202 fffffa80`0a9a72a0 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
fffff880`0b8fa830 fffff880`02d0a568 : fffffa80`071ddfa0 00000000`00000002 fffff880`ffffff00 fffffa80`0ad19990 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
fffff880`0b8fa8e0 fffff880`02d08140 : fffffa80`0a418cc0 00000000`00000000 fffff880`0b8fad50 fffffa80`0a418cc0 : SYMTDIV+0x47568
fffff880`0b8fa970 fffff880`02d04c2f : fffffa80`0a418cc0 00000000`00000000 fffff880`0b8fad50 fffffa80`0a418cc0 : SYMTDIV+0x45140
fffff880`0b8fa9d0 fffff880`02d040f5 : fffffa80`0575d8b0 00000000`000000c8 00000000`00000000 fffff880`0b8fad50 : SYMTDIV+0x41c2f
fffff880`0b8faa00 fffff880`02cf60f0 : fffff880`0b8fad50 fffffa80`071e3550 fffffa80`063a6a40 fffff880`00000000 : SYMTDIV+0x410f5
fffff880`0b8faa50 fffff880`02d07dd1 : fffffa80`0ad19990 fffff880`02d0c7c3 00000000`00000002 00000000`00000000 : SYMTDIV+0x330f0
fffff880`0b8fab60 fffff880`02d0cb7b : 00000000`00000000 fffff880`0b8fad10 fffff880`0b8fad50 00000000`00000002 : SYMTDIV+0x44dd1
fffff880`0b8fabc0 fffff880`02d08818 : fffff880`0b8fb070 fffff880`0b8fb590 fffff880`0b8fb590 fffff880`02d20130 : SYMTDIV+0x49b7b
fffff880`0b8fac60 fffff880`0141d57f : 00000000`00000000 fffffa80`063ca520 fffffa80`063ca520 00000000`00000000 : SYMTDIV+0x45818
fffff880`0b8faf00 fffff880`01406619 : fffff880`0b8f000c fffff880`0b8fb590 fffffa80`0b147068 fffffa80`085eee20 : NETIO! ?? ::FNODOBFM::`string'+0x7267
fffff880`0b8fb020 fffff880`01407bb1 : fffff880`0b8f000c fffff880`0b8fb590 fffffa80`063ca520 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x2a9
fffff880`0b8fb0f0 fffff880`0162582e : 00000000`0000000c fffff880`0b8fb590 00000000`00000001 fffffa80`085eee20 : NETIO!KfdClassify+0x934
fffff880`0b8fb460 fffff880`0163fd8d : fffffa80`085eee20 fffffa80`063ca520 fffffa80`0b147010 fffffa80`063c8900 : tcpip!ProcessInboundTransportLayerClassify+0x21e
fffff880`0b8fb680 fffff880`0166e861 : fffffa80`00000011 fffffa80`09a80002 fffffa80`06548900 00000000`00008900 : tcpip!WfpProcessInTransportStackIndication+0x81d
fffff880`0b8fb9f0 fffff880`01640f93 : fffffa80`09a88ec0 fffffa80`06410820 00000000`00000000 fffffa80`0654f000 : tcpip!InetInspectReceiveDatagram+0x121
fffff880`0b8fba90 fffff880`01641345 : fffffa80`09a88ec0 00000000`00000000 00000000`00000001 00000000`00000000 : tcpip!UdpBeginMessageIndication+0x83
fffff880`0b8fbbe0 fffff880`016418d4 : fffffa80`00000000 fffffa80`09a88ec0 00000000`00000000 fffffa80`088e4aa2 : tcpip!UdpDeliverDatagrams+0xd5
fffff880`0b8fbd70 fffff880`0165d427 : fffffa80`0653fe30 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x324
fffff880`0b8fbe60 fffff880`0165d499 : fffff880`0b8fbfe0 fffff880`0176d9a0 fffff880`0b8fbff0 fffffa80`063831c0 : tcpip!IppDeliverListToProtocol+0xf7
fffff880`0b8fbf20 fffff880`0165d990 : fffff880`0176d9a0 fffffa80`085eef50 00000000`00000011 fffff880`0b8fbfe0 : tcpip!IppProcessDeliverList+0x59
fffff880`0b8fbf90 fffff880`0165c821 : fffffa80`ff01a8c0 fffffa80`0654f000 fffff880`0176d9a0 00000000`089b7b01 : tcpip!IppReceiveHeaderBatch+0x231
fffff880`0b8fc070 fffff880`0165b272 : fffffa80`089bee50 00000000`00000000 fffffa80`089b7b01 00000000`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`0b8fc270 fffff880`016746ba : fffffa80`089b7bb0 fffff880`0b8fc3a0 fffffa80`089b7bb0 fffff880`0b8f0000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`0b8fc350 fffff800`02a9264a : fffffa80`085eee20 fffff880`0b8f7000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`0b8fc3a0 fffff880`016740e2 : fffff880`016745e0 fffff880`0b8fc4b0 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`0b8fc480 fffff880`0156e0eb : fffffa80`089bc6c0 00000000`00000000 fffffa80`0849d1a0 fffff800`02bb526f : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`0b8fc4f0 fffff880`01537fc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`0b8fc560 fffff880`014b1ef1 : fffffa80`0849d1a0 00000000`00000002 00000000`00000001 fffff880`014b237a : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`0b8fc9e0 fffff880`0fe191a7 : fffffa80`0884b000 fffffa80`085eee20 fffffa80`085eee20 fffffa80`0884bce0 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1


STACK_COMMAND: kb

FOLLOWUP_IP:
NETIO!CompareSecurityContexts+6a
fffff880`01406c5a 448b442470 mov r8d,dword ptr [rsp+70h]

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: NETIO!CompareSecurityContexts+6a

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME: NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc18a

FAILURE_BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a

BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a

Followup: MachineOwner
---------

6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000006f8
Arg4: fffff80002a4b7a0

Debugging Details:
------------------


BUGCHECK_STR: 0x7f_8

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 2

LAST_CONTROL_TRANSFER: from fffff80002a82469 to fffff80002a82f00

STACK_TEXT:
fffff880`030ffde8 fffff800`02a82469 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx
fffff880`030ffdf0 fffff800`02a80932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`030fff30 fffff800`02a4b7a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`0b8f6ff0 fffff880`01406c5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x60
fffff880`0b8f76e0 fffff880`0140494f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!CompareSecurityContexts+0x6a
fffff880`0b8f7750 fffff880`014069b5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!MatchValues+0xef
fffff880`0b8f77a0 fffff880`01406845 : fffffa80`09dddc10 fffffa80`0a6fd590 fffff880`0b8f79c8 fffff880`0b8f8100 : NETIO!FilterMatch+0x95
fffff880`0b8f77f0 fffff880`01407ccb : 00000000`00000000 00000000`00000000 fffff880`0b8f8100 fffff880`0b8f79b0 : NETIO!IndexListClassify+0x69
fffff880`0b8f7870 fffff880`0163f4d0 : fffff880`0b8f8100 fffff880`0b8f7d48 fffff880`0b8f8a80 fffffa80`0a1f1450 : NETIO!KfdClassify+0xa4e
fffff880`0b8f7be0 fffff880`0163877e : fffff880`01747690 00000000`00000000 fffffa80`09a6adb0 00000000`00000000 : tcpip!WfpAleClassify+0x50
fffff880`0b8f7c20 fffff880`01637c15 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e
fffff880`0b8f8330 fffff880`0163b956 : 00000000`00000000 00000000`00000000 00000000`00000011 00000000`00000000 : tcpip!WfpAleAuthorizeSend+0x325
fffff880`0b8f8600 fffff880`0163e6a4 : 00000000`00000000 fffff880`0b8f8a38 fffff880`0b8f8a40 00000000`00000000 : tcpip!WfpAleConnectAcceptIndicate+0x106
fffff880`0b8f86f0 fffff880`01636f59 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000008 : tcpip!ProcessALEForTransportPacket+0x664
fffff880`0b8f8960 fffff880`01663bf6 : 00000000`00000000 fffffa80`00000002 fffffa80`0a5b8900 fffffa80`08838900 : tcpip!WfpProcessOutTransportStackIndication+0x329
fffff880`0b8f8b30 fffff880`01668a7e : fffffa80`0a5ba190 fffff880`01402804 fffff880`0176d9a0 fffffa80`09a6adb0 : tcpip!IppSendDatagramsCommon+0x526
fffff880`0b8f8e00 fffff880`01635cf8 : fffffa80`09a6adb0 fffffa80`0a1f1450 fffffa80`0a1f1450 fffffa80`0a5ba190 : tcpip!IpNlpSendDatagrams+0x3e
fffff880`0b8f8e40 fffff880`0163626d : fffffa80`0a4fc380 fffffa80`09bc5680 fffff880`0b8f9790 00000000`00000000 : tcpip!UdpSendMessagesOnPathCreation+0x688
fffff880`0b8f91c0 fffff880`01635ef5 : fffff880`0b8f96f0 00000000`00008900 00000000`00000001 00000000`c0a801ff : tcpip!UdpSendMessages+0x35d
fffff880`0b8f95b0 fffff800`02a9264a : 00000000`00000001 00000000`00000004 00000000`00000002 00000000`00000089 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
fffff880`0b8f95e0 fffff880`016364b8 : fffff880`01635ee0 fffff880`0b8f96f0 fffffa80`0a6e1c02 fffff880`02d06c50 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`0b8f96c0 fffff880`013def45 : fffffa80`063cd270 fffffa80`0a545cb0 fffffa80`09a78cd0 fffffa80`071f16ee : tcpip!UdpTlProviderSendMessages+0x78
fffff880`0b8f9740 fffff880`013deff2 : fffffa80`0a6e1c02 00000000`00000000 fffffa80`05cc0e98 fffffa80`05cc0ee0 : tdx!TdxSendDatagramTransportAddress+0x2f5
fffff880`0b8f9820 fffff880`02ccaa48 : fffffa80`05529d40 00000000`000000c8 fffffa80`0abbc5e0 fffffa80`05cc0d80 : tdx!TdxTdiDispatchInternalDeviceControl+0x52
fffff880`0b8f9850 fffff880`02ce7c33 : fffffa80`09aeb964 fffffa80`0a6e1cc0 00000000`00000064 fffffa80`0a6e1cc0 : SYMTDIV+0x7a48
fffff880`0b8f98b0 fffff880`02ce8120 : fffffa80`0a6e1cc0 00000000`00000064 fffffa80`0a6e1cc0 fffffa80`0a6e1cc0 : SYMTDIV+0x24c33
fffff880`0b8f98f0 fffff880`02ce80b4 : fffffa80`0a6e1cc0 fffffa80`0a6e1cc0 00000000`00000000 00000000`00000065 : SYMTDIV+0x25120
fffff880`0b8f9940 fffff880`02ce80b4 : 00000000`00000000 fffffa80`0a6e1cc0 00000000`00000000 00000000`00000064 : SYMTDIV+0x250b4
fffff880`0b8f9990 fffff880`02ccae07 : 00000000`00000000 00000000`00000000 fffffa80`05529d40 fffff880`0b8f9ad8 : SYMTDIV+0x250b4
fffff880`0b8f99e0 fffff880`02ce0bba : fffffa80`05529d40 fffffa80`05cc0ee0 fffffa80`05cc0d80 00000000`c000009a : SYMTDIV+0x7e07
fffff880`0b8f9a80 fffff880`02c02542 : 00000000`00000000 fffffa80`00000001 fffffa80`05cc0d80 fffffa80`05cc0d80 : SYMTDIV+0x1dbba
fffff880`0b8f9ad0 fffff880`02c02f61 : fffffa80`071f16b8 fffffa80`071f16b8 fffffa80`08520e20 fffff880`0b8f9bd0 : netbt!TdiSendDatagram+0x187
fffff880`0b8f9b40 fffff880`02c0f329 : fffffa80`064b6cc0 fffffa80`071f1500 00000000`00000021 00000000`00000044 : netbt!UdpSendDatagram+0x1b1
fffff880`0b8f9bd0 fffff880`02c0f0e6 : 00000000`00000000 00000000`00000000 00000000`00000032 fffff880`02c20089 : netbt!UdpSendResponse+0x4e0
fffff880`0b8f9c50 fffff880`02c03be7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : netbt!QueryFromNet+0xb11
fffff880`0b8f9d80 fffff880`02c01b47 : 00000000`00000032 fffffa80`093444ca 00000000`00000032 fffffa80`09aeb902 : netbt!NameSrvHndlrNotOs+0xca
fffff880`0b8f9dc0 fffff880`02cca46c : fffff880`0b8fa080 fffffa80`09a78cd0 fffffa80`09aeb964 00000000`00000032 : netbt!TdiRcvNameSrvHandler+0x367
fffff880`0b8f9e60 fffff880`013dd325 : fffffa80`0a094340 fffffa80`09a60002 fffff880`0b8fa1d8 fffffa80`09a6f330 : SYMTDIV+0x746c
fffff880`0b8f9f70 fffff880`016413c5 : fffffa80`09a6f330 00000000`00000000 fffffa80`09a6f330 fffffa80`09a6f330 : tdx!TdxEventReceiveMessagesTransportAddress+0x315
fffff880`0b8fa160 fffff880`016418d4 : fffffa80`00000000 fffffa80`09a6f330 00000000`00000000 fffffa80`093444c2 : tcpip!UdpDeliverDatagrams+0x155
fffff880`0b8fa2f0 fffff880`0165d427 : fffffa80`0653fe30 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x324
fffff880`0b8fa3e0 fffff880`0165d499 : fffff880`0b8fa560 fffff880`0176d9a0 fffff880`0b8fa570 fffffa80`063831c0 : tcpip!IppDeliverListToProtocol+0xf7
fffff880`0b8fa4a0 fffff880`0165d990 : fffff880`0176d9a0 fffffa80`071ca2f0 00000000`00000011 fffff880`0b8fa560 : tcpip!IppProcessDeliverList+0x59
fffff880`0b8fa510 fffff880`0165c821 : 00000000`ff01a8c0 fffffa80`0654f138 fffff880`0176d9a0 00000000`0575d801 : tcpip!IppReceiveHeaderBatch+0x231
fffff880`0b8fa5f0 fffff880`01736592 : fffffa80`077b6bf0 00000000`00000000 fffffa80`0575d801 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`0b8fa7f0 fffff880`015abafa : fffffa80`0a9a7202 fffffa80`0a9a72a0 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
fffff880`0b8fa830 fffff880`02d0a568 : fffffa80`071ddfa0 00000000`00000002 fffff880`ffffff00 fffffa80`0ad19990 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
fffff880`0b8fa8e0 fffff880`02d08140 : fffffa80`0a418cc0 00000000`00000000 fffff880`0b8fad50 fffffa80`0a418cc0 : SYMTDIV+0x47568
fffff880`0b8fa970 fffff880`02d04c2f : fffffa80`0a418cc0 00000000`00000000 fffff880`0b8fad50 fffffa80`0a418cc0 : SYMTDIV+0x45140
fffff880`0b8fa9d0 fffff880`02d040f5 : fffffa80`0575d8b0 00000000`000000c8 00000000`00000000 fffff880`0b8fad50 : SYMTDIV+0x41c2f
fffff880`0b8faa00 fffff880`02cf60f0 : fffff880`0b8fad50 fffffa80`071e3550 fffffa80`063a6a40 fffff880`00000000 : SYMTDIV+0x410f5
fffff880`0b8faa50 fffff880`02d07dd1 : fffffa80`0ad19990 fffff880`02d0c7c3 00000000`00000002 00000000`00000000 : SYMTDIV+0x330f0
fffff880`0b8fab60 fffff880`02d0cb7b : 00000000`00000000 fffff880`0b8fad10 fffff880`0b8fad50 00000000`00000002 : SYMTDIV+0x44dd1
fffff880`0b8fabc0 fffff880`02d08818 : fffff880`0b8fb070 fffff880`0b8fb590 fffff880`0b8fb590 fffff880`02d20130 : SYMTDIV+0x49b7b
fffff880`0b8fac60 fffff880`0141d57f : 00000000`00000000 fffffa80`063ca520 fffffa80`063ca520 00000000`00000000 : SYMTDIV+0x45818
fffff880`0b8faf00 fffff880`01406619 : fffff880`0b8f000c fffff880`0b8fb590 fffffa80`0b147068 fffffa80`085eee20 : NETIO! ?? ::FNODOBFM::`string'+0x7267
fffff880`0b8fb020 fffff880`01407bb1 : fffff880`0b8f000c fffff880`0b8fb590 fffffa80`063ca520 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x2a9
fffff880`0b8fb0f0 fffff880`0162582e : 00000000`0000000c fffff880`0b8fb590 00000000`00000001 fffffa80`085eee20 : NETIO!KfdClassify+0x934
fffff880`0b8fb460 fffff880`0163fd8d : fffffa80`085eee20 fffffa80`063ca520 fffffa80`0b147010 fffffa80`063c8900 : tcpip!ProcessInboundTransportLayerClassify+0x21e
fffff880`0b8fb680 fffff880`0166e861 : fffffa80`00000011 fffffa80`09a80002 fffffa80`06548900 00000000`00008900 : tcpip!WfpProcessInTransportStackIndication+0x81d
fffff880`0b8fb9f0 fffff880`01640f93 : fffffa80`09a88ec0 fffffa80`06410820 00000000`00000000 fffffa80`0654f000 : tcpip!InetInspectReceiveDatagram+0x121
fffff880`0b8fba90 fffff880`01641345 : fffffa80`09a88ec0 00000000`00000000 00000000`00000001 00000000`00000000 : tcpip!UdpBeginMessageIndication+0x83
fffff880`0b8fbbe0 fffff880`016418d4 : fffffa80`00000000 fffffa80`09a88ec0 00000000`00000000 fffffa80`088e4aa2 : tcpip!UdpDeliverDatagrams+0xd5
fffff880`0b8fbd70 fffff880`0165d427 : fffffa80`0653fe30 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x324
fffff880`0b8fbe60 fffff880`0165d499 : fffff880`0b8fbfe0 fffff880`0176d9a0 fffff880`0b8fbff0 fffffa80`063831c0 : tcpip!IppDeliverListToProtocol+0xf7
fffff880`0b8fbf20 fffff880`0165d990 : fffff880`0176d9a0 fffffa80`085eef50 00000000`00000011 fffff880`0b8fbfe0 : tcpip!IppProcessDeliverList+0x59
fffff880`0b8fbf90 fffff880`0165c821 : fffffa80`ff01a8c0 fffffa80`0654f000 fffff880`0176d9a0 00000000`089b7b01 : tcpip!IppReceiveHeaderBatch+0x231
fffff880`0b8fc070 fffff880`0165b272 : fffffa80`089bee50 00000000`00000000 fffffa80`089b7b01 00000000`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`0b8fc270 fffff880`016746ba : fffffa80`089b7bb0 fffff880`0b8fc3a0 fffffa80`089b7bb0 fffff880`0b8f0000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`0b8fc350 fffff800`02a9264a : fffffa80`085eee20 fffff880`0b8f7000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`0b8fc3a0 fffff880`016740e2 : fffff880`016745e0 fffff880`0b8fc4b0 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`0b8fc480 fffff880`0156e0eb : fffffa80`089bc6c0 00000000`00000000 fffffa80`0849d1a0 fffff800`02bb526f : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`0b8fc4f0 fffff880`01537fc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`0b8fc560 fffff880`014b1ef1 : fffffa80`0849d1a0 00000000`00000002 00000000`00000001 fffff880`014b237a : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`0b8fc9e0 fffff880`0fe191a7 : fffffa80`0884b000 fffffa80`085eee20 fffffa80`085eee20 fffffa80`0884bce0 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1


STACK_COMMAND: kb

FOLLOWUP_IP:
NETIO!CompareSecurityContexts+6a
fffff880`01406c5a 448b442470 mov r8d,dword ptr [rsp+70h]

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: NETIO!CompareSecurityContexts+6a

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME: NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc18a

FAILURE_BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a

BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a

Followup: MachineOwner
---------

6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000006f8
Arg4: fffff80002a4b7a0

Debugging Details:
------------------


BUGCHECK_STR: 0x7f_8

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 2

LAST_CONTROL_TRANSFER: from fffff80002a82469 to fffff80002a82f00

STACK_TEXT:
fffff880`030ffde8 fffff800`02a82469 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx
fffff880`030ffdf0 fffff800`02a80932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`030fff30 fffff800`02a4b7a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`0b8f6ff0 fffff880`01406c5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x60
fffff880`0b8f76e0 fffff880`0140494f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!CompareSecurityContexts+0x6a
fffff880`0b8f7750 fffff880`014069b5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!MatchValues+0xef
fffff880`0b8f77a0 fffff880`01406845 : fffffa80`09dddc10 fffffa80`0a6fd590 fffff880`0b8f79c8 fffff880`0b8f8100 : NETIO!FilterMatch+0x95
fffff880`0b8f77f0 fffff880`01407ccb : 00000000`00000000 00000000`00000000 fffff880`0b8f8100 fffff880`0b8f79b0 : NETIO!IndexListClassify+0x69
fffff880`0b8f7870 fffff880`0163f4d0 : fffff880`0b8f8100 fffff880`0b8f7d48 fffff880`0b8f8a80 fffffa80`0a1f1450 : NETIO!KfdClassify+0xa4e
fffff880`0b8f7be0 fffff880`0163877e : fffff880`01747690 00000000`00000000 fffffa80`09a6adb0 00000000`00000000 : tcpip!WfpAleClassify+0x50
fffff880`0b8f7c20 fffff880`01637c15 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e
fffff880`0b8f8330 fffff880`0163b956 : 00000000`00000000 00000000`00000000 00000000`00000011 00000000`00000000 : tcpip!WfpAleAuthorizeSend+0x325
fffff880`0b8f8600 fffff880`0163e6a4 : 00000000`00000000 fffff880`0b8f8a38 fffff880`0b8f8a40 00000000`00000000 : tcpip!WfpAleConnectAcceptIndicate+0x106
fffff880`0b8f86f0 fffff880`01636f59 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000008 : tcpip!ProcessALEForTransportPacket+0x664
fffff880`0b8f8960 fffff880`01663bf6 : 00000000`00000000 fffffa80`00000002 fffffa80`0a5b8900 fffffa80`08838900 : tcpip!WfpProcessOutTransportStackIndication+0x329
fffff880`0b8f8b30 fffff880`01668a7e : fffffa80`0a5ba190 fffff880`01402804 fffff880`0176d9a0 fffffa80`09a6adb0 : tcpip!IppSendDatagramsCommon+0x526
fffff880`0b8f8e00 fffff880`01635cf8 : fffffa80`09a6adb0 fffffa80`0a1f1450 fffffa80`0a1f1450 fffffa80`0a5ba190 : tcpip!IpNlpSendDatagrams+0x3e
fffff880`0b8f8e40 fffff880`0163626d : fffffa80`0a4fc380 fffffa80`09bc5680 fffff880`0b8f9790 00000000`00000000 : tcpip!UdpSendMessagesOnPathCreation+0x688
fffff880`0b8f91c0 fffff880`01635ef5 : fffff880`0b8f96f0 00000000`00008900 00000000`00000001 00000000`c0a801ff : tcpip!UdpSendMessages+0x35d
fffff880`0b8f95b0 fffff800`02a9264a : 00000000`00000001 00000000`00000004 00000000`00000002 00000000`00000089 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
fffff880`0b8f95e0 fffff880`016364b8 : fffff880`01635ee0 fffff880`0b8f96f0 fffffa80`0a6e1c02 fffff880`02d06c50 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`0b8f96c0 fffff880`013def45 : fffffa80`063cd270 fffffa80`0a545cb0 fffffa80`09a78cd0 fffffa80`071f16ee : tcpip!UdpTlProviderSendMessages+0x78
fffff880`0b8f9740 fffff880`013deff2 : fffffa80`0a6e1c02 00000000`00000000 fffffa80`05cc0e98 fffffa80`05cc0ee0 : tdx!TdxSendDatagramTransportAddress+0x2f5
fffff880`0b8f9820 fffff880`02ccaa48 : fffffa80`05529d40 00000000`000000c8 fffffa80`0abbc5e0 fffffa80`05cc0d80 : tdx!TdxTdiDispatchInternalDeviceControl+0x52
fffff880`0b8f9850 fffff880`02ce7c33 : fffffa80`09aeb964 fffffa80`0a6e1cc0 00000000`00000064 fffffa80`0a6e1cc0 : SYMTDIV+0x7a48
fffff880`0b8f98b0 fffff880`02ce8120 : fffffa80`0a6e1cc0 00000000`00000064 fffffa80`0a6e1cc0 fffffa80`0a6e1cc0 : SYMTDIV+0x24c33
fffff880`0b8f98f0 fffff880`02ce80b4 : fffffa80`0a6e1cc0 fffffa80`0a6e1cc0 00000000`00000000 00000000`00000065 : SYMTDIV+0x25120
fffff880`0b8f9940 fffff880`02ce80b4 : 00000000`00000000 fffffa80`0a6e1cc0 00000000`00000000 00000000`00000064 : SYMTDIV+0x250b4
fffff880`0b8f9990 fffff880`02ccae07 : 00000000`00000000 00000000`00000000 fffffa80`05529d40 fffff880`0b8f9ad8 : SYMTDIV+0x250b4
fffff880`0b8f99e0 fffff880`02ce0bba : fffffa80`05529d40 fffffa80`05cc0ee0 fffffa80`05cc0d80 00000000`c000009a : SYMTDIV+0x7e07
fffff880`0b8f9a80 fffff880`02c02542 : 00000000`00000000 fffffa80`00000001 fffffa80`05cc0d80 fffffa80`05cc0d80 : SYMTDIV+0x1dbba
fffff880`0b8f9ad0 fffff880`02c02f61 : fffffa80`071f16b8 fffffa80`071f16b8 fffffa80`08520e20 fffff880`0b8f9bd0 : netbt!TdiSendDatagram+0x187
fffff880`0b8f9b40 fffff880`02c0f329 : fffffa80`064b6cc0 fffffa80`071f1500 00000000`00000021 00000000`00000044 : netbt!UdpSendDatagram+0x1b1
fffff880`0b8f9bd0 fffff880`02c0f0e6 : 00000000`00000000 00000000`00000000 00000000`00000032 fffff880`02c20089 : netbt!UdpSendResponse+0x4e0
fffff880`0b8f9c50 fffff880`02c03be7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : netbt!QueryFromNet+0xb11
fffff880`0b8f9d80 fffff880`02c01b47 : 00000000`00000032 fffffa80`093444ca 00000000`00000032 fffffa80`09aeb902 : netbt!NameSrvHndlrNotOs+0xca
fffff880`0b8f9dc0 fffff880`02cca46c : fffff880`0b8fa080 fffffa80`09a78cd0 fffffa80`09aeb964 00000000`00000032 : netbt!TdiRcvNameSrvHandler+0x367
fffff880`0b8f9e60 fffff880`013dd325 : fffffa80`0a094340 fffffa80`09a60002 fffff880`0b8fa1d8 fffffa80`09a6f330 : SYMTDIV+0x746c
fffff880`0b8f9f70 fffff880`016413c5 : fffffa80`09a6f330 00000000`00000000 fffffa80`09a6f330 fffffa80`09a6f330 : tdx!TdxEventReceiveMessagesTransportAddress+0x315
fffff880`0b8fa160 fffff880`016418d4 : fffffa80`00000000 fffffa80`09a6f330 00000000`00000000 fffffa80`093444c2 : tcpip!UdpDeliverDatagrams+0x155
fffff880`0b8fa2f0 fffff880`0165d427 : fffffa80`0653fe30 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x324
fffff880`0b8fa3e0 fffff880`0165d499 : fffff880`0b8fa560 fffff880`0176d9a0 fffff880`0b8fa570 fffffa80`063831c0 : tcpip!IppDeliverListToProtocol+0xf7
fffff880`0b8fa4a0 fffff880`0165d990 : fffff880`0176d9a0 fffffa80`071ca2f0 00000000`00000011 fffff880`0b8fa560 : tcpip!IppProcessDeliverList+0x59
fffff880`0b8fa510 fffff880`0165c821 : 00000000`ff01a8c0 fffffa80`0654f138 fffff880`0176d9a0 00000000`0575d801 : tcpip!IppReceiveHeaderBatch+0x231
fffff880`0b8fa5f0 fffff880`01736592 : fffffa80`077b6bf0 00000000`00000000 fffffa80`0575d801 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`0b8fa7f0 fffff880`015abafa : fffffa80`0a9a7202 fffffa80`0a9a72a0 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
fffff880`0b8fa830 fffff880`02d0a568 : fffffa80`071ddfa0 00000000`00000002 fffff880`ffffff00 fffffa80`0ad19990 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
fffff880`0b8fa8e0 fffff880`02d08140 : fffffa80`0a418cc0 00000000`00000000 fffff880`0b8fad50 fffffa80`0a418cc0 : SYMTDIV+0x47568
fffff880`0b8fa970 fffff880`02d04c2f : fffffa80`0a418cc0 00000000`00000000 fffff880`0b8fad50 fffffa80`0a418cc0 : SYMTDIV+0x45140
fffff880`0b8fa9d0 fffff880`02d040f5 : fffffa80`0575d8b0 00000000`000000c8 00000000`00000000 fffff880`0b8fad50 : SYMTDIV+0x41c2f
fffff880`0b8faa00 fffff880`02cf60f0 : fffff880`0b8fad50 fffffa80`071e3550 fffffa80`063a6a40 fffff880`00000000 : SYMTDIV+0x410f5
fffff880`0b8faa50 fffff880`02d07dd1 : fffffa80`0ad19990 fffff880`02d0c7c3 00000000`00000002 00000000`00000000 : SYMTDIV+0x330f0
fffff880`0b8fab60 fffff880`02d0cb7b : 00000000`00000000 fffff880`0b8fad10 fffff880`0b8fad50 00000000`00000002 : SYMTDIV+0x44dd1
fffff880`0b8fabc0 fffff880`02d08818 : fffff880`0b8fb070 fffff880`0b8fb590 fffff880`0b8fb590 fffff880`02d20130 : SYMTDIV+0x49b7b
fffff880`0b8fac60 fffff880`0141d57f : 00000000`00000000 fffffa80`063ca520 fffffa80`063ca520 00000000`00000000 : SYMTDIV+0x45818
fffff880`0b8faf00 fffff880`01406619 : fffff880`0b8f000c fffff880`0b8fb590 fffffa80`0b147068 fffffa80`085eee20 : NETIO! ?? ::FNODOBFM::`string'+0x7267
fffff880`0b8fb020 fffff880`01407bb1 : fffff880`0b8f000c fffff880`0b8fb590 fffffa80`063ca520 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x2a9
fffff880`0b8fb0f0 fffff880`0162582e : 00000000`0000000c fffff880`0b8fb590 00000000`00000001 fffffa80`085eee20 : NETIO!KfdClassify+0x934
fffff880`0b8fb460 fffff880`0163fd8d : fffffa80`085eee20 fffffa80`063ca520 fffffa80`0b147010 fffffa80`063c8900 : tcpip!ProcessInboundTransportLayerClassify+0x21e
fffff880`0b8fb680 fffff880`0166e861 : fffffa80`00000011 fffffa80`09a80002 fffffa80`06548900 00000000`00008900 : tcpip!WfpProcessInTransportStackIndication+0x81d
fffff880`0b8fb9f0 fffff880`01640f93 : fffffa80`09a88ec0 fffffa80`06410820 00000000`00000000 fffffa80`0654f000 : tcpip!InetInspectReceiveDatagram+0x121
fffff880`0b8fba90 fffff880`01641345 : fffffa80`09a88ec0 00000000`00000000 00000000`00000001 00000000`00000000 : tcpip!UdpBeginMessageIndication+0x83
fffff880`0b8fbbe0 fffff880`016418d4 : fffffa80`00000000 fffffa80`09a88ec0 00000000`00000000 fffffa80`088e4aa2 : tcpip!UdpDeliverDatagrams+0xd5
fffff880`0b8fbd70 fffff880`0165d427 : fffffa80`0653fe30 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x324
fffff880`0b8fbe60 fffff880`0165d499 : fffff880`0b8fbfe0 fffff880`0176d9a0 fffff880`0b8fbff0 fffffa80`063831c0 : tcpip!IppDeliverListToProtocol+0xf7
fffff880`0b8fbf20 fffff880`0165d990 : fffff880`0176d9a0 fffffa80`085eef50 00000000`00000011 fffff880`0b8fbfe0 : tcpip!IppProcessDeliverList+0x59
fffff880`0b8fbf90 fffff880`0165c821 : fffffa80`ff01a8c0 fffffa80`0654f000 fffff880`0176d9a0 00000000`089b7b01 : tcpip!IppReceiveHeaderBatch+0x231
fffff880`0b8fc070 fffff880`0165b272 : fffffa80`089bee50 00000000`00000000 fffffa80`089b7b01 00000000`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`0b8fc270 fffff880`016746ba : fffffa80`089b7bb0 fffff880`0b8fc3a0 fffffa80`089b7bb0 fffff880`0b8f0000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`0b8fc350 fffff800`02a9264a : fffffa80`085eee20 fffff880`0b8f7000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`0b8fc3a0 fffff880`016740e2 : fffff880`016745e0 fffff880`0b8fc4b0 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`0b8fc480 fffff880`0156e0eb : fffffa80`089bc6c0 00000000`00000000 fffffa80`0849d1a0 fffff800`02bb526f : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`0b8fc4f0 fffff880`01537fc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`0b8fc560 fffff880`014b1ef1 : fffffa80`0849d1a0 00000000`00000002 00000000`00000001 fffff880`014b237a : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`0b8fc9e0 fffff880`0fe191a7 : fffffa80`0884b000 fffffa80`085eee20 fffffa80`085eee20 fffffa80`0884bce0 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1


STACK_COMMAND: kb

FOLLOWUP_IP:
NETIO!CompareSecurityContexts+6a
fffff880`01406c5a 448b442470 mov r8d,dword ptr [rsp+70h]

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: NETIO!CompareSecurityContexts+6a

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME: NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc18a

FAILURE_BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a

BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a

Followup: MachineOwner
---------

6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000006f8
Arg4: fffff80002a4b7a0

Debugging Details:
------------------


BUGCHECK_STR: 0x7f_8

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 2

LAST_CONTROL_TRANSFER: from fffff80002a82469 to fffff80002a82f00

STACK_TEXT:
fffff880`030ffde8 fffff800`02a82469 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx
fffff880`030ffdf0 fffff800`02a80932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`030fff30 fffff800`02a4b7a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`0b8f6ff0 fffff880`01406c5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x60
fffff880`0b8f76e0 fffff880`0140494f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!CompareSecurityContexts+0x6a
fffff880`0b8f7750 fffff880`014069b5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!MatchValues+0xef
fffff880`0b8f77a0 fffff880`01406845 : fffffa80`09dddc10 fffffa80`0a6fd590 fffff880`0b8f79c8 fffff880`0b8f8100 : NETIO!FilterMatch+0x95
fffff880`0b8f77f0 fffff880`01407ccb : 00000000`00000000 00000000`00000000 fffff880`0b8f8100 fffff880`0b8f79b0 : NETIO!IndexListClassify+0x69
fffff880`0b8f7870 fffff880`0163f4d0 : fffff880`0b8f8100 fffff880`0b8f7d48 fffff880`0b8f8a80 fffffa80`0a1f1450 : NETIO!KfdClassify+0xa4e
fffff880`0b8f7be0 fffff880`0163877e : fffff880`01747690 00000000`00000000 fffffa80`09a6adb0 00000000`00000000 : tcpip!WfpAleClassify+0x50
fffff880`0b8f7c20 fffff880`01637c15 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e
fffff880`0b8f8330 fffff880`0163b956 : 00000000`00000000 00000000`00000000 00000000`00000011 00000000`00000000 : tcpip!WfpAleAuthorizeSend+0x325
fffff880`0b8f8600 fffff880`0163e6a4 : 00000000`00000000 fffff880`0b8f8a38 fffff880`0b8f8a40 00000000`00000000 : tcpip!WfpAleConnectAcceptIndicate+0x106
fffff880`0b8f86f0 fffff880`01636f59 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000008 : tcpip!ProcessALEForTransportPacket+0x664
fffff880`0b8f8960 fffff880`01663bf6 : 00000000`00000000 fffffa80`00000002 fffffa80`0a5b8900 fffffa80`08838900 : tcpip!WfpProcessOutTransportStackIndication+0x329
fffff880`0b8f8b30 fffff880`01668a7e : fffffa80`0a5ba190 fffff880`01402804 fffff880`0176d9a0 fffffa80`09a6adb0 : tcpip!IppSendDatagramsCommon+0x526
fffff880`0b8f8e00 fffff880`01635cf8 : fffffa80`09a6adb0 fffffa80`0a1f1450 fffffa80`0a1f1450 fffffa80`0a5ba190 : tcpip!IpNlpSendDatagrams+0x3e
fffff880`0b8f8e40 fffff880`0163626d : fffffa80`0a4fc380 fffffa80`09bc5680 fffff880`0b8f9790 00000000`00000000 : tcpip!UdpSendMessagesOnPathCreation+0x688
fffff880`0b8f91c0 fffff880`01635ef5 : fffff880`0b8f96f0 00000000`00008900 00000000`00000001 00000000`c0a801ff : tcpip!UdpSendMessages+0x35d
fffff880`0b8f95b0 fffff800`02a9264a : 00000000`00000001 00000000`00000004 00000000`00000002 00000000`00000089 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
fffff880`0b8f95e0 fffff880`016364b8 : fffff880`01635ee0 fffff880`0b8f96f0 fffffa80`0a6e1c02 fffff880`02d06c50 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`0b8f96c0 fffff880`013def45 : fffffa80`063cd270 fffffa80`0a545cb0 fffffa80`09a78cd0 fffffa80`071f16ee : tcpip!UdpTlProviderSendMessages+0x78
fffff880`0b8f9740 fffff880`013deff2 : fffffa80`0a6e1c02 00000000`00000000 fffffa80`05cc0e98 fffffa80`05cc0ee0 : tdx!TdxSendDatagramTransportAddress+0x2f5
fffff880`0b8f9820 fffff880`02ccaa48 : fffffa80`05529d40 00000000`000000c8 fffffa80`0abbc5e0 fffffa80`05cc0d80 : tdx!TdxTdiDispatchInternalDeviceControl+0x52
fffff880`0b8f9850 fffff880`02ce7c33 : fffffa80`09aeb964 fffffa80`0a6e1cc0 00000000`00000064 fffffa80`0a6e1cc0 : SYMTDIV+0x7a48
fffff880`0b8f98b0 fffff880`02ce8120 : fffffa80`0a6e1cc0 00000000`00000064 fffffa80`0a6e1cc0 fffffa80`0a6e1cc0 : SYMTDIV+0x24c33
fffff880`0b8f98f0 fffff880`02ce80b4 : fffffa80`0a6e1cc0 fffffa80`0a6e1cc0 00000000`00000000 00000000`00000065 : SYMTDIV+0x25120
fffff880`0b8f9940 fffff880`02ce80b4 : 00000000`00000000 fffffa80`0a6e1cc0 00000000`00000000 00000000`00000064 : SYMTDIV+0x250b4
fffff880`0b8f9990 fffff880`02ccae07 : 00000000`00000000 00000000`00000000 fffffa80`05529d40 fffff880`0b8f9ad8 : SYMTDIV+0x250b4
fffff880`0b8f99e0 fffff880`02ce0bba : fffffa80`05529d40 fffffa80`05cc0ee0 fffffa80`05cc0d80 00000000`c000009a : SYMTDIV+0x7e07
fffff880`0b8f9a80 fffff880`02c02542 : 00000000`00000000 fffffa80`00000001 fffffa80`05cc0d80 fffffa80`05cc0d80 : SYMTDIV+0x1dbba
fffff880`0b8f9ad0 fffff880`02c02f61 : fffffa80`071f16b8 fffffa80`071f16b8 fffffa80`08520e20 fffff880`0b8f9bd0 : netbt!TdiSendDatagram+0x187
fffff880`0b8f9b40 fffff880`02c0f329 : fffffa80`064b6cc0 fffffa80`071f1500 00000000`00000021 00000000`00000044 : netbt!UdpSendDatagram+0x1b1
fffff880`0b8f9bd0 fffff880`02c0f0e6 : 00000000`00000000 00000000`00000000 00000000`00000032 fffff880`02c20089 : netbt!UdpSendResponse+0x4e0
fffff880`0b8f9c50 fffff880`02c03be7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : netbt!QueryFromNet+0xb11
fffff880`0b8f9d80 fffff880`02c01b47 : 00000000`00000032 fffffa80`093444ca 00000000`00000032 fffffa80`09aeb902 : netbt!NameSrvHndlrNotOs+0xca
fffff880`0b8f9dc0 fffff880`02cca46c : fffff880`0b8fa080 fffffa80`09a78cd0 fffffa80`09aeb964 00000000`00000032 : netbt!TdiRcvNameSrvHandler+0x367
fffff880`0b8f9e60 fffff880`013dd325 : fffffa80`0a094340 fffffa80`09a60002 fffff880`0b8fa1d8 fffffa80`09a6f330 : SYMTDIV+0x746c
fffff880`0b8f9f70 fffff880`016413c5 : fffffa80`09a6f330 00000000`00000000 fffffa80`09a6f330 fffffa80`09a6f330 : tdx!TdxEventReceiveMessagesTransportAddress+0x315
fffff880`0b8fa160 fffff880`016418d4 : fffffa80`00000000 fffffa80`09a6f330 00000000`00000000 fffffa80`093444c2 : tcpip!UdpDeliverDatagrams+0x155
fffff880`0b8fa2f0 fffff880`0165d427 : fffffa80`0653fe30 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x324
fffff880`0b8fa3e0 fffff880`0165d499 : fffff880`0b8fa560 fffff880`0176d9a0 fffff880`0b8fa570 fffffa80`063831c0 : tcpip!IppDeliverListToProtocol+0xf7
fffff880`0b8fa4a0 fffff880`0165d990 : fffff880`0176d9a0 fffffa80`071ca2f0 00000000`00000011 fffff880`0b8fa560 : tcpip!IppProcessDeliverList+0x59
fffff880`0b8fa510 fffff880`0165c821 : 00000000`ff01a8c0 fffffa80`0654f138 fffff880`0176d9a0 00000000`0575d801 : tcpip!IppReceiveHeaderBatch+0x231
fffff880`0b8fa5f0 fffff880`01736592 : fffffa80`077b6bf0 00000000`00000000 fffffa80`0575d801 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`0b8fa7f0 fffff880`015abafa : fffffa80`0a9a7202 fffffa80`0a9a72a0 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
fffff880`0b8fa830 fffff880`02d0a568 : fffffa80`071ddfa0 00000000`00000002 fffff880`ffffff00 fffffa80`0ad19990 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
fffff880`0b8fa8e0 fffff880`02d08140 : fffffa80`0a418cc0 00000000`00000000 fffff880`0b8fad50 fffffa80`0a418cc0 : SYMTDIV+0x47568
fffff880`0b8fa970 fffff880`02d04c2f : fffffa80`0a418cc0 00000000`00000000 fffff880`0b8fad50 fffffa80`0a418cc0 : SYMTDIV+0x45140
fffff880`0b8fa9d0 fffff880`02d040f5 : fffffa80`0575d8b0 00000000`000000c8 00000000`00000000 fffff880`0b8fad50 : SYMTDIV+0x41c2f
fffff880`0b8faa00 fffff880`02cf60f0 : fffff880`0b8fad50 fffffa80`071e3550 fffffa80`063a6a40 fffff880`00000000 : SYMTDIV+0x410f5
fffff880`0b8faa50 fffff880`02d07dd1 : fffffa80`0ad19990 fffff880`02d0c7c3 00000000`00000002 00000000`00000000 : SYMTDIV+0x330f0
fffff880`0b8fab60 fffff880`02d0cb7b : 00000000`00000000 fffff880`0b8fad10 fffff880`0b8fad50 00000000`00000002 : SYMTDIV+0x44dd1
fffff880`0b8fabc0 fffff880`02d08818 : fffff880`0b8fb070 fffff880`0b8fb590 fffff880`0b8fb590 fffff880`02d20130 : SYMTDIV+0x49b7b
fffff880`0b8fac60 fffff880`0141d57f : 00000000`00000000 fffffa80`063ca520 fffffa80`063ca520 00000000`00000000 : SYMTDIV+0x45818
fffff880`0b8faf00 fffff880`01406619 : fffff880`0b8f000c fffff880`0b8fb590 fffffa80`0b147068 fffffa80`085eee20 : NETIO! ?? ::FNODOBFM::`string'+0x7267
fffff880`0b8fb020 fffff880`01407bb1 : fffff880`0b8f000c fffff880`0b8fb590 fffffa80`063ca520 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x2a9
fffff880`0b8fb0f0 fffff880`0162582e : 00000000`0000000c fffff880`0b8fb590 00000000`00000001 fffffa80`085eee20 : NETIO!KfdClassify+0x934
fffff880`0b8fb460 fffff880`0163fd8d : fffffa80`085eee20 fffffa80`063ca520 fffffa80`0b147010 fffffa80`063c8900 : tcpip!ProcessInboundTransportLayerClassify+0x21e
fffff880`0b8fb680 fffff880`0166e861 : fffffa80`00000011 fffffa80`09a80002 fffffa80`06548900 00000000`00008900 : tcpip!WfpProcessInTransportStackIndication+0x81d
fffff880`0b8fb9f0 fffff880`01640f93 : fffffa80`09a88ec0 fffffa80`06410820 00000000`00000000 fffffa80`0654f000 : tcpip!InetInspectReceiveDatagram+0x121
fffff880`0b8fba90 fffff880`01641345 : fffffa80`09a88ec0 00000000`00000000 00000000`00000001 00000000`00000000 : tcpip!UdpBeginMessageIndication+0x83
fffff880`0b8fbbe0 fffff880`016418d4 : fffffa80`00000000 fffffa80`09a88ec0 00000000`00000000 fffffa80`088e4aa2 : tcpip!UdpDeliverDatagrams+0xd5
fffff880`0b8fbd70 fffff880`0165d427 : fffffa80`0653fe30 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x324
fffff880`0b8fbe60 fffff880`0165d499 : fffff880`0b8fbfe0 fffff880`0176d9a0 fffff880`0b8fbff0 fffffa80`063831c0 : tcpip!IppDeliverListToProtocol+0xf7
fffff880`0b8fbf20 fffff880`0165d990 : fffff880`0176d9a0 fffffa80`085eef50 00000000`00000011 fffff880`0b8fbfe0 : tcpip!IppProcessDeliverList+0x59
fffff880`0b8fbf90 fffff880`0165c821 : fffffa80`ff01a8c0 fffffa80`0654f000 fffff880`0176d9a0 00000000`089b7b01 : tcpip!IppReceiveHeaderBatch+0x231
fffff880`0b8fc070 fffff880`0165b272 : fffffa80`089bee50 00000000`00000000 fffffa80`089b7b01 00000000`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`0b8fc270 fffff880`016746ba : fffffa80`089b7bb0 fffff880`0b8fc3a0 fffffa80`089b7bb0 fffff880`0b8f0000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`0b8fc350 fffff800`02a9264a : fffffa80`085eee20 fffff880`0b8f7000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`0b8fc3a0 fffff880`016740e2 : fffff880`016745e0 fffff880`0b8fc4b0 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`0b8fc480 fffff880`0156e0eb : fffffa80`089bc6c0 00000000`00000000 fffffa80`0849d1a0 fffff800`02bb526f : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`0b8fc4f0 fffff880`01537fc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`0b8fc560 fffff880`014b1ef1 : fffffa80`0849d1a0 00000000`00000002 00000000`00000001 fffff880`014b237a : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`0b8fc9e0 fffff880`0fe191a7 : fffffa80`0884b000 fffffa80`085eee20 fffffa80`085eee20 fffffa80`0884bce0 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1


STACK_COMMAND: kb

FOLLOWUP_IP:
NETIO!CompareSecurityContexts+6a
fffff880`01406c5a 448b442470 mov r8d,dword ptr [rsp+70h]

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: NETIO!CompareSecurityContexts+6a

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME: NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc18a

FAILURE_BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a

BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a

Followup: MachineOwner
---------

6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000006f8
Arg4: fffff80002a4b7a0

Debugging Details:
------------------


BUGCHECK_STR: 0x7f_8

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 2

LAST_CONTROL_TRANSFER: from fffff80002a82469 to fffff80002a82f00

STACK_TEXT:
fffff880`030ffde8 fffff800`02a82469 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx
fffff880`030ffdf0 fffff800`02a80932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`030fff30 fffff800`02a4b7a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`0b8f6ff0 fffff880`01406c5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x60
fffff880`0b8f76e0 fffff880`0140494f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!CompareSecurityContexts+0x6a
fffff880`0b8f7750 fffff880`014069b5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!MatchValues+0xef
fffff880`0b8f77a0 fffff880`01406845 : fffffa80`09dddc10 fffffa80`0a6fd590 fffff880`0b8f79c8 fffff880`0b8f8100 : NETIO!FilterMatch+0x95
fffff880`0b8f77f0 fffff880`01407ccb : 00000000`00000000 00000000`00000000 fffff880`0b8f8100 fffff880`0b8f79b0 : NETIO!IndexListClassify+0x69
fffff880`0b8f7870 fffff880`0163f4d0 : fffff880`0b8f8100 fffff880`0b8f7d48 fffff880`0b8f8a80 fffffa80`0a1f1450 : NETIO!KfdClassify+0xa4e
fffff880`0b8f7be0 fffff880`0163877e : fffff880`01747690 00000000`00000000 fffffa80`09a6adb0 00000000`00000000 : tcpip!WfpAleClassify+0x50
fffff880`0b8f7c20 fffff880`01637c15 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e
fffff880`0b8f8330 fffff880`0163b956 : 00000000`00000000 00000000`00000000 00000000`00000011 00000000`00000000 : tcpip!WfpAleAuthorizeSend+0x325
fffff880`0b8f8600 fffff880`0163e6a4 : 00000000`00000000 fffff880`0b8f8a38 fffff880`0b8f8a40 00000000`00000000 : tcpip!WfpAleConnectAcceptIndicate+0x106
fffff880`0b8f86f0 fffff880`01636f59 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000008 : tcpip!ProcessALEForTransportPacket+0x664
fffff880`0b8f8960 fffff880`01663bf6 : 00000000`00000000 fffffa80`00000002 fffffa80`0a5b8900 fffffa80`08838900 : tcpip!WfpProcessOutTransportStackIndication+0x329
fffff880`0b8f8b30 fffff880`01668a7e : fffffa80`0a5ba190 fffff880`01402804 fffff880`0176d9a0 fffffa80`09a6adb0 : tcpip!IppSendDatagramsCommon+0x526
fffff880`0b8f8e00 fffff880`01635cf8 : fffffa80`09a6adb0 fffffa80`0a1f1450 fffffa80`0a1f1450 fffffa80`0a5ba190 : tcpip!IpNlpSendDatagrams+0x3e
fffff880`0b8f8e40 fffff880`0163626d : fffffa80`0a4fc380 fffffa80`09bc5680 fffff880`0b8f9790 00000000`00000000 : tcpip!UdpSendMessagesOnPathCreation+0x688
fffff880`0b8f91c0 fffff880`01635ef5 : fffff880`0b8f96f0 00000000`00008900 00000000`00000001 00000000`c0a801ff : tcpip!UdpSendMessages+0x35d
fffff880`0b8f95b0 fffff800`02a9264a : 00000000`00000001 00000000`00000004 00000000`00000002 00000000`00000089 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
fffff880`0b8f95e0 fffff880`016364b8 : fffff880`01635ee0 fffff880`0b8f96f0 fffffa80`0a6e1c02 fffff880`02d06c50 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`0b8f96c0 fffff880`013def45 : fffffa80`063cd270 fffffa80`0a545cb0 fffffa80`09a78cd0 fffffa80`071f16ee : tcpip!UdpTlProviderSendMessages+0x78
fffff880`0b8f9740 fffff880`013deff2 : fffffa80`0a6e1c02 00000000`00000000 fffffa80`05cc0e98 fffffa80`05cc0ee0 : tdx!TdxSendDatagramTransportAddress+0x2f5
fffff880`0b8f9820 fffff880`02ccaa48 : fffffa80`05529d40 00000000`000000c8 fffffa80`0abbc5e0 fffffa80`05cc0d80 : tdx!TdxTdiDispatchInternalDeviceControl+0x52
fffff880`0b8f9850 fffff880`02ce7c33 : fffffa80`09aeb964 fffffa80`0a6e1cc0 00000000`00000064 fffffa80`0a6e1cc0 : SYMTDIV+0x7a48
fffff880`0b8f98b0 fffff880`02ce8120 : fffffa80`0a6e1cc0 00000000`00000064 fffffa80`0a6e1cc0 fffffa80`0a6e1cc0 : SYMTDIV+0x24c33
fffff880`0b8f98f0 fffff880`02ce80b4 : fffffa80`0a6e1cc0 fffffa80`0a6e1cc0 00000000`00000000 00000000`00000065 : SYMTDIV+0x25120
fffff880`0b8f9940 fffff880`02ce80b4 : 00000000`00000000 fffffa80`0a6e1cc0 00000000`00000000 00000000`00000064 : SYMTDIV+0x250b4
fffff880`0b8f9990 fffff880`02ccae07 : 00000000`00000000 00000000`00000000 fffffa80`05529d40 fffff880`0b8f9ad8 : SYMTDIV+0x250b4
fffff880`0b8f99e0 fffff880`02ce0bba : fffffa80`05529d40 fffffa80`05cc0ee0 fffffa80`05cc0d80 00000000`c000009a : SYMTDIV+0x7e07
fffff880`0b8f9a80 fffff880`02c02542 : 00000000`00000000 fffffa80`00000001 fffffa80`05cc0d80 fffffa80`05cc0d80 : SYMTDIV+0x1dbba
fffff880`0b8f9ad0 fffff880`02c02f61 : fffffa80`071f16b8 fffffa80`071f16b8 fffffa80`08520e20 fffff880`0b8f9bd0 : netbt!TdiSendDatagram+0x187
fffff880`0b8f9b40 fffff880`02c0f329 : fffffa80`064b6cc0 fffffa80`071f1500 00000000`00000021 00000000`00000044 : netbt!UdpSendDatagram+0x1b1
fffff880`0b8f9bd0 fffff880`02c0f0e6 : 00000000`00000000 00000000`00000000 00000000`00000032 fffff880`02c20089 : netbt!UdpSendResponse+0x4e0
fffff880`0b8f9c50 fffff880`02c03be7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : netbt!QueryFromNet+0xb11
fffff880`0b8f9d80 fffff880`02c01b47 : 00000000`00000032 fffffa80`093444ca 00000000`00000032 fffffa80`09aeb902 : netbt!NameSrvHndlrNotOs+0xca
fffff880`0b8f9dc0 fffff880`02cca46c : fffff880`0b8fa080 fffffa80`09a78cd0 fffffa80`09aeb964 00000000`00000032 : netbt!TdiRcvNameSrvHandler+0x367
fffff880`0b8f9e60 fffff880`013dd325 : fffffa80`0a094340 fffffa80`09a60002 fffff880`0b8fa1d8 fffffa80`09a6f330 : SYMTDIV+0x746c
fffff880`0b8f9f70 fffff880`016413c5 : fffffa80`09a6f330 00000000`00000000 fffffa80`09a6f330 fffffa80`09a6f330 : tdx!TdxEventReceiveMessagesTransportAddress+0x315
fffff880`0b8fa160 fffff880`016418d4 : fffffa80`00000000 fffffa80`09a6f330 00000000`00000000 fffffa80`093444c2 : tcpip!UdpDeliverDatagrams+0x155
fffff880`0b8fa2f0 fffff880`0165d427 : fffffa80`0653fe30 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x324
fffff880`0b8fa3e0 fffff880`0165d499 : fffff880`0b8fa560 fffff880`0176d9a0 fffff880`0b8fa570 fffffa80`063831c0 : tcpip!IppDeliverListToProtocol+0xf7
fffff880`0b8fa4a0 fffff880`0165d990 : fffff880`0176d9a0 fffffa80`071ca2f0 00000000`00000011 fffff880`0b8fa560 : tcpip!IppProcessDeliverList+0x59
fffff880`0b8fa510 fffff880`0165c821 : 00000000`ff01a8c0 fffffa80`0654f138 fffff880`0176d9a0 00000000`0575d801 : tcpip!IppReceiveHeaderBatch+0x231
fffff880`0b8fa5f0 fffff880`01736592 : fffffa80`077b6bf0 00000000`00000000 fffffa80`0575d801 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`0b8fa7f0 fffff880`015abafa : fffffa80`0a9a7202 fffffa80`0a9a72a0 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
fffff880`0b8fa830 fffff880`02d0a568 : fffffa80`071ddfa0 00000000`00000002 fffff880`ffffff00 fffffa80`0ad19990 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
fffff880`0b8fa8e0 fffff880`02d08140 : fffffa80`0a418cc0 00000000`00000000 fffff880`0b8fad50 fffffa80`0a418cc0 : SYMTDIV+0x47568
fffff880`0b8fa970 fffff880`02d04c2f : fffffa80`0a418cc0 00000000`00000000 fffff880`0b8fad50 fffffa80`0a418cc0 : SYMTDIV+0x45140
fffff880`0b8fa9d0 fffff880`02d040f5 : fffffa80`0575d8b0 00000000`000000c8 00000000`00000000 fffff880`0b8fad50 : SYMTDIV+0x41c2f
fffff880`0b8faa00 fffff880`02cf60f0 : fffff880`0b8fad50 fffffa80`071e3550 fffffa80`063a6a40 fffff880`00000000 : SYMTDIV+0x410f5
fffff880`0b8faa50 fffff880`02d07dd1 : fffffa80`0ad19990 fffff880`02d0c7c3 00000000`00000002 00000000`00000000 : SYMTDIV+0x330f0
fffff880`0b8fab60 fffff880`02d0cb7b : 00000000`00000000 fffff880`0b8fad10 fffff880`0b8fad50 00000000`00000002 : SYMTDIV+0x44dd1
fffff880`0b8fabc0 fffff880`02d08818 : fffff880`0b8fb070 fffff880`0b8fb590 fffff880`0b8fb590 fffff880`02d20130 : SYMTDIV+0x49b7b
fffff880`0b8fac60 fffff880`0141d57f : 00000000`00000000 fffffa80`063ca520 fffffa80`063ca520 00000000`00000000 : SYMTDIV+0x45818
fffff880`0b8faf00 fffff880`01406619 : fffff880`0b8f000c fffff880`0b8fb590 fffffa80`0b147068 fffffa80`085eee20 : NETIO! ?? ::FNODOBFM::`string'+0x7267
fffff880`0b8fb020 fffff880`01407bb1 : fffff880`0b8f000c fffff880`0b8fb590 fffffa80`063ca520 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x2a9
fffff880`0b8fb0f0 fffff880`0162582e : 00000000`0000000c fffff880`0b8fb590 00000000`00000001 fffffa80`085eee20 : NETIO!KfdClassify+0x934
fffff880`0b8fb460 fffff880`0163fd8d : fffffa80`085eee20 fffffa80`063ca520 fffffa80`0b147010 fffffa80`063c8900 : tcpip!ProcessInboundTransportLayerClassify+0x21e
fffff880`0b8fb680 fffff880`0166e861 : fffffa80`00000011 fffffa80`09a80002 fffffa80`06548900 00000000`00008900 : tcpip!WfpProcessInTransportStackIndication+0x81d
fffff880`0b8fb9f0 fffff880`01640f93 : fffffa80`09a88ec0 fffffa80`06410820 00000000`00000000 fffffa80`0654f000 : tcpip!InetInspectReceiveDatagram+0x121
fffff880`0b8fba90 fffff880`01641345 : fffffa80`09a88ec0 00000000`00000000 00000000`00000001 00000000`00000000 : tcpip!UdpBeginMessageIndication+0x83
fffff880`0b8fbbe0 fffff880`016418d4 : fffffa80`00000000 fffffa80`09a88ec0 00000000`00000000 fffffa80`088e4aa2 : tcpip!UdpDeliverDatagrams+0xd5
fffff880`0b8fbd70 fffff880`0165d427 : fffffa80`0653fe30 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x324
fffff880`0b8fbe60 fffff880`0165d499 : fffff880`0b8fbfe0 fffff880`0176d9a0 fffff880`0b8fbff0 fffffa80`063831c0 : tcpip!IppDeliverListToProtocol+0xf7
fffff880`0b8fbf20 fffff880`0165d990 : fffff880`0176d9a0 fffffa80`085eef50 00000000`00000011 fffff880`0b8fbfe0 : tcpip!IppProcessDeliverList+0x59
fffff880`0b8fbf90 fffff880`0165c821 : fffffa80`ff01a8c0 fffffa80`0654f000 fffff880`0176d9a0 00000000`089b7b01 : tcpip!IppReceiveHeaderBatch+0x231
fffff880`0b8fc070 fffff880`0165b272 : fffffa80`089bee50 00000000`00000000 fffffa80`089b7b01 00000000`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`0b8fc270 fffff880`016746ba : fffffa80`089b7bb0 fffff880`0b8fc3a0 fffffa80`089b7bb0 fffff880`0b8f0000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`0b8fc350 fffff800`02a9264a : fffffa80`085eee20 fffff880`0b8f7000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`0b8fc3a0 fffff880`016740e2 : fffff880`016745e0 fffff880`0b8fc4b0 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`0b8fc480 fffff880`0156e0eb : fffffa80`089bc6c0 00000000`00000000 fffffa80`0849d1a0 fffff800`02bb526f : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`0b8fc4f0 fffff880`01537fc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`0b8fc560 fffff880`014b1ef1 : fffffa80`0849d1a0 00000000`00000002 00000000`00000001 fffff880`014b237a : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`0b8fc9e0 fffff880`0fe191a7 : fffffa80`0884b000 fffffa80`085eee20 fffffa80`085eee20 fffffa80`0884bce0 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1


STACK_COMMAND: kb

FOLLOWUP_IP:
NETIO!CompareSecurityContexts+6a
fffff880`01406c5a 448b442470 mov r8d,dword ptr [rsp+70h]

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: NETIO!CompareSecurityContexts+6a

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME: NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc18a

FAILURE_BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a

BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a

Followup: MachineOwner
---------

6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000006f8
Arg4: fffff80002a4b7a0

Debugging Details:
------------------


BUGCHECK_STR: 0x7f_8

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 2

LAST_CONTROL_TRANSFER: from fffff80002a82469 to fffff80002a82f00

STACK_TEXT:
fffff880`030ffde8 fffff800`02a82469 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx
fffff880`030ffdf0 fffff800`02a80932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`030fff30 fffff800`02a4b7a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`0b8f6ff0 fffff880`01406c5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x60
fffff880`0b8f76e0 fffff880`0140494f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!CompareSecurityContexts+0x6a
fffff880`0b8f7750 fffff880`014069b5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!MatchValues+0xef
fffff880`0b8f77a0 fffff880`01406845 : fffffa80`09dddc10 fffffa80`0a6fd590 fffff880`0b8f79c8 fffff880`0b8f8100 : NETIO!FilterMatch+0x95
fffff880`0b8f77f0 fffff880`01407ccb : 00000000`00000000 00000000`00000000 fffff880`0b8f8100 fffff880`0b8f79b0 : NETIO!IndexListClassify+0x69
fffff880`0b8f7870 fffff880`0163f4d0 : fffff880`0b8f8100 fffff880`0b8f7d48 fffff880`0b8f8a80 fffffa80`0a1f1450 : NETIO!KfdClassify+0xa4e
fffff880`0b8f7be0 fffff880`0163877e : fffff880`01747690 00000000`00000000 fffffa80`09a6adb0 00000000`00000000 : tcpip!WfpAleClassify+0x50
fffff880`0b8f7c20 fffff880`01637c15 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e
fffff880`0b8f8330 fffff880`0163b956 : 00000000`00000000 00000000`00000000 00000000`00000011 00000000`00000000 : tcpip!WfpAleAuthorizeSend+0x325
fffff880`0b8f8600 fffff880`0163e6a4 : 00000000`00000000 fffff880`0b8f8a38 fffff880`0b8f8a40 00000000`00000000 : tcpip!WfpAleConnectAcceptIndicate+0x106
fffff880`0b8f86f0 fffff880`01636f59 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000008 : tcpip!ProcessALEForTransportPacket+0x664
fffff880`0b8f8960 fffff880`01663bf6 : 00000000`00000000 fffffa80`00000002 fffffa80`0a5b8900 fffffa80`08838900 : tcpip!WfpProcessOutTransportStackIndication+0x329
fffff880`0b8f8b30 fffff880`01668a7e : fffffa80`0a5ba190 fffff880`01402804 fffff880`0176d9a0 fffffa80`09a6adb0 : tcpip!IppSendDatagramsCommon+0x526
fffff880`0b8f8e00 fffff880`01635cf8 : fffffa80`09a6adb0 fffffa80`0a1f1450 fffffa80`0a1f1450 fffffa80`0a5ba190 : tcpip!IpNlpSendDatagrams+0x3e
fffff880`0b8f8e40 fffff880`0163626d : fffffa80`0a4fc380 fffffa80`09bc5680 fffff880`0b8f9790 00000000`00000000 : tcpip!UdpSendMessagesOnPathCreation+0x688
fffff880`0b8f91c0 fffff880`01635ef5 : fffff880`0b8f96f0 00000000`00008900 00000000`00000001 00000000`c0a801ff : tcpip!UdpSendMessages+0x35d
fffff880`0b8f95b0 fffff800`02a9264a : 00000000`00000001 00000000`00000004 00000000`00000002 00000000`00000089 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
fffff880`0b8f95e0 fffff880`016364b8 : fffff880`01635ee0 fffff880`0b8f96f0 fffffa80`0a6e1c02 fffff880`02d06c50 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`0b8f96c0 fffff880`013def45 : fffffa80`063cd270 fffffa80`0a545cb0 fffffa80`09a78cd0 fffffa80`071f16ee : tcpip!UdpTlProviderSendMessages+0x78
fffff880`0b8f9740 fffff880`013deff2 : fffffa80`0a6e1c02 00000000`00000000 fffffa80`05cc0e98 fffffa80`05cc0ee0 : tdx!TdxSendDatagramTransportAddress+0x2f5
fffff880`0b8f9820 fffff880`02ccaa48 : fffffa80`05529d40 00000000`000000c8 fffffa80`0abbc5e0 fffffa80`05cc0d80 : tdx!TdxTdiDispatchInternalDeviceControl+0x52
fffff880`0b8f9850 fffff880`02ce7c33 : fffffa80`09aeb964 fffffa80`0a6e1cc0 00000000`00000064 fffffa80`0a6e1cc0 : SYMTDIV+0x7a48
fffff880`0b8f98b0 fffff880`02ce8120 : fffffa80`0a6e1cc0 00000000`00000064 fffffa80`0a6e1cc0 fffffa80`0a6e1cc0 : SYMTDIV+0x24c33
fffff880`0b8f98f0 fffff880`02ce80b4 : fffffa80`0a6e1cc0 fffffa80`0a6e1cc0 00000000`00000000 00000000`00000065 : SYMTDIV+0x25120
fffff880`0b8f9940 fffff880`02ce80b4 : 00000000`00000000 fffffa80`0a6e1cc0 00000000`00000000 00000000`00000064 : SYMTDIV+0x250b4
fffff880`0b8f9990 fffff880`02ccae07 : 00000000`00000000 00000000`00000000 fffffa80`05529d40 fffff880`0b8f9ad8 : SYMTDIV+0x250b4
fffff880`0b8f99e0 fffff880`02ce0bba : fffffa80`05529d40 fffffa80`05cc0ee0 fffffa80`05cc0d80 00000000`c000009a : SYMTDIV+0x7e07
fffff880`0b8f9a80 fffff880`02c02542 : 00000000`00000000 fffffa80`00000001 fffffa80`05cc0d80 fffffa80`05cc0d80 : SYMTDIV+0x1dbba
fffff880`0b8f9ad0 fffff880`02c02f61 : fffffa80`071f16b8 fffffa80`071f16b8 fffffa80`08520e20 fffff880`0b8f9bd0 : netbt!TdiSendDatagram+0x187
fffff880`0b8f9b40 fffff880`02c0f329 : fffffa80`064b6cc0 fffffa80`071f1500 00000000`00000021 00000000`00000044 : netbt!UdpSendDatagram+0x1b1
fffff880`0b8f9bd0 fffff880`02c0f0e6 : 00000000`00000000 00000000`00000000 00000000`00000032 fffff880`02c20089 : netbt!UdpSendResponse+0x4e0
fffff880`0b8f9c50 fffff880`02c03be7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : netbt!QueryFromNet+0xb11
fffff880`0b8f9d80 fffff880`02c01b47 : 00000000`00000032 fffffa80`093444ca 00000000`00000032 fffffa80`09aeb902 : netbt!NameSrvHndlrNotOs+0xca
fffff880`0b8f9dc0 fffff880`02cca46c : fffff880`0b8fa080 fffffa80`09a78cd0 fffffa80`09aeb964 00000000`00000032 : netbt!TdiRcvNameSrvHandler+0x367
fffff880`0b8f9e60 fffff880`013dd325 : fffffa80`0a094340 fffffa80`09a60002 fffff880`0b8fa1d8 fffffa80`09a6f330 : SYMTDIV+0x746c
fffff880`0b8f9f70 fffff880`016413c5 : fffffa80`09a6f330 00000000`00000000 fffffa80`09a6f330 fffffa80`09a6f330 : tdx!TdxEventReceiveMessagesTransportAddress+0x315
fffff880`0b8fa160 fffff880`016418d4 : fffffa80`00000000 fffffa80`09a6f330 00000000`00000000 fffffa80`093444c2 : tcpip!UdpDeliverDatagrams+0x155
fffff880`0b8fa2f0 fffff880`0165d427 : fffffa80`0653fe30 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x324
fffff880`0b8fa3e0 fffff880`0165d499 : fffff880`0b8fa560 fffff880`0176d9a0 fffff880`0b8fa570 fffffa80`063831c0 : tcpip!IppDeliverListToProtocol+0xf7
fffff880`0b8fa4a0 fffff880`0165d990 : fffff880`0176d9a0 fffffa80`071ca2f0 00000000`00000011 fffff880`0b8fa560 : tcpip!IppProcessDeliverList+0x59
fffff880`0b8fa510 fffff880`0165c821 : 00000000`ff01a8c0 fffffa80`0654f138 fffff880`0176d9a0 00000000`0575d801 : tcpip!IppReceiveHeaderBatch+0x231
fffff880`0b8fa5f0 fffff880`01736592 : fffffa80`077b6bf0 00000000`00000000 fffffa80`0575d801 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`0b8fa7f0 fffff880`015abafa : fffffa80`0a9a7202 fffffa80`0a9a72a0 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
fffff880`0b8fa830 fffff880`02d0a568 : fffffa80`071ddfa0 00000000`00000002 fffff880`ffffff00 fffffa80`0ad19990 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
fffff880`0b8fa8e0 fffff880`02d08140 : fffffa80`0a418cc0 00000000`00000000 fffff880`0b8fad50 fffffa80`0a418cc0 : SYMTDIV+0x47568
fffff880`0b8fa970 fffff880`02d04c2f : fffffa80`0a418cc0 00000000`00000000 fffff880`0b8fad50 fffffa80`0a418cc0 : SYMTDIV+0x45140
fffff880`0b8fa9d0 fffff880`02d040f5 : fffffa80`0575d8b0 00000000`000000c8 00000000`00000000 fffff880`0b8fad50 : SYMTDIV+0x41c2f
fffff880`0b8faa00 fffff880`02cf60f0 : fffff880`0b8fad50 fffffa80`071e3550 fffffa80`063a6a40 fffff880`00000000 : SYMTDIV+0x410f5
fffff880`0b8faa50 fffff880`02d07dd1 : fffffa80`0ad19990 fffff880`02d0c7c3 00000000`00000002 00000000`00000000 : SYMTDIV+0x330f0
fffff880`0b8fab60 fffff880`02d0cb7b : 00000000`00000000 fffff880`0b8fad10 fffff880`0b8fad50 00000000`00000002 : SYMTDIV+0x44dd1
fffff880`0b8fabc0 fffff880`02d08818 : fffff880`0b8fb070 fffff880`0b8fb590 fffff880`0b8fb590 fffff880`02d20130 : SYMTDIV+0x49b7b
fffff880`0b8fac60 fffff880`0141d57f : 00000000`00000000 fffffa80`063ca520 fffffa80`063ca520 00000000`00000000 : SYMTDIV+0x45818
fffff880`0b8faf00 fffff880`01406619 : fffff880`0b8f000c fffff880`0b8fb590 fffffa80`0b147068 fffffa80`085eee20 : NETIO! ?? ::FNODOBFM::`string'+0x7267
fffff880`0b8fb020 fffff880`01407bb1 : fffff880`0b8f000c fffff880`0b8fb590 fffffa80`063ca520 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x2a9
fffff880`0b8fb0f0 fffff880`0162582e : 00000000`0000000c fffff880`0b8fb590 00000000`00000001 fffffa80`085eee20 : NETIO!KfdClassify+0x934
fffff880`0b8fb460 fffff880`0163fd8d : fffffa80`085eee20 fffffa80`063ca520 fffffa80`0b147010 fffffa80`063c8900 : tcpip!ProcessInboundTransportLayerClassify+0x21e
fffff880`0b8fb680 fffff880`0166e861 : fffffa80`00000011 fffffa80`09a80002 fffffa80`06548900 00000000`00008900 : tcpip!WfpProcessInTransportStackIndication+0x81d
fffff880`0b8fb9f0 fffff880`01640f93 : fffffa80`09a88ec0 fffffa80`06410820 00000000`00000000 fffffa80`0654f000 : tcpip!InetInspectReceiveDatagram+0x121
fffff880`0b8fba90 fffff880`01641345 : fffffa80`09a88ec0 00000000`00000000 00000000`00000001 00000000`00000000 : tcpip!UdpBeginMessageIndication+0x83
fffff880`0b8fbbe0 fffff880`016418d4 : fffffa80`00000000 fffffa80`09a88ec0 00000000`00000000 fffffa80`088e4aa2 : tcpip!UdpDeliverDatagrams+0xd5
fffff880`0b8fbd70 fffff880`0165d427 : fffffa80`0653fe30 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x324
fffff880`0b8fbe60 fffff880`0165d499 : fffff880`0b8fbfe0 fffff880`0176d9a0 fffff880`0b8fbff0 fffffa80`063831c0 : tcpip!IppDeliverListToProtocol+0xf7
fffff880`0b8fbf20 fffff880`0165d990 : fffff880`0176d9a0 fffffa80`085eef50 00000000`00000011 fffff880`0b8fbfe0 : tcpip!IppProcessDeliverList+0x59
fffff880`0b8fbf90 fffff880`0165c821 : fffffa80`ff01a8c0 fffffa80`0654f000 fffff880`0176d9a0 00000000`089b7b01 : tcpip!IppReceiveHeaderBatch+0x231
fffff880`0b8fc070 fffff880`0165b272 : fffffa80`089bee50 00000000`00000000 fffffa80`089b7b01 00000000`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`0b8fc270 fffff880`016746ba : fffffa80`089b7bb0 fffff880`0b8fc3a0 fffffa80`089b7bb0 fffff880`0b8f0000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`0b8fc350 fffff800`02a9264a : fffffa80`085eee20 fffff880`0b8f7000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`0b8fc3a0 fffff880`016740e2 : fffff880`016745e0 fffff880`0b8fc4b0 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`0b8fc480 fffff880`0156e0eb : fffffa80`089bc6c0 00000000`00000000 fffffa80`0849d1a0 fffff800`02bb526f : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`0b8fc4f0 fffff880`01537fc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`0b8fc560 fffff880`014b1ef1 : fffffa80`0849d1a0 00000000`00000002 00000000`00000001 fffff880`014b237a : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`0b8fc9e0 fffff880`0fe191a7 : fffffa80`0884b000 fffffa80`085eee20 fffffa80`085eee20 fffffa80`0884bce0 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1


STACK_COMMAND: kb

FOLLOWUP_IP:
NETIO!CompareSecurityContexts+6a
fffff880`01406c5a 448b442470 mov r8d,dword ptr [rsp+70h]

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: NETIO!CompareSecurityContexts+6a

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME: NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc18a

FAILURE_BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a

BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a

Followup: MachineOwner
---------

6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000006f8
Arg4: fffff80002a4b7a0

Debugging Details:
------------------


BUGCHECK_STR: 0x7f_8

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 2

LAST_CONTROL_TRANSFER: from fffff80002a82469 to fffff80002a82f00

STACK_TEXT:
fffff880`030ffde8 fffff800`02a82469 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx
fffff880`030ffdf0 fffff800`02a80932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`030fff30 fffff800`02a4b7a0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`0b8f6ff0 fffff880`01406c5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SeAccessCheckFromState+0x60
fffff880`0b8f76e0 fffff880`0140494f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!CompareSecurityContexts+0x6a
fffff880`0b8f7750 fffff880`014069b5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!MatchValues+0xef
fffff880`0b8f77a0 fffff880`01406845 : fffffa80`09dddc10 fffffa80`0a6fd590 fffff880`0b8f79c8 fffff880`0b8f8100 : NETIO!FilterMatch+0x95
fffff880`0b8f77f0 fffff880`01407ccb : 00000000`00000000 00000000`00000000 fffff880`0b8f8100 fffff880`0b8f79b0 : NETIO!IndexListClassify+0x69
fffff880`0b8f7870 fffff880`0163f4d0 : fffff880`0b8f8100 fffff880`0b8f7d48 fffff880`0b8f8a80 fffffa80`0a1f1450 : NETIO!KfdClassify+0xa4e
fffff880`0b8f7be0 fffff880`0163877e : fffff880`01747690 00000000`00000000 fffffa80`09a6adb0 00000000`00000000 : tcpip!WfpAleClassify+0x50
fffff880`0b8f7c20 fffff880`01637c15 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e
fffff880`0b8f8330 fffff880`0163b956 : 00000000`00000000 00000000`00000000 00000000`00000011 00000000`00000000 : tcpip!WfpAleAuthorizeSend+0x325
fffff880`0b8f8600 fffff880`0163e6a4 : 00000000`00000000 fffff880`0b8f8a38 fffff880`0b8f8a40 00000000`00000000 : tcpip!WfpAleConnectAcceptIndicate+0x106
fffff880`0b8f86f0 fffff880`01636f59 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000008 : tcpip!ProcessALEForTransportPacket+0x664
fffff880`0b8f8960 fffff880`01663bf6 : 00000000`00000000 fffffa80`00000002 fffffa80`0a5b8900 fffffa80`08838900 : tcpip!WfpProcessOutTransportStackIndication+0x329
fffff880`0b8f8b30 fffff880`01668a7e : fffffa80`0a5ba190 fffff880`01402804 fffff880`0176d9a0 fffffa80`09a6adb0 : tcpip!IppSendDatagramsCommon+0x526
fffff880`0b8f8e00 fffff880`01635cf8 : fffffa80`09a6adb0 fffffa80`0a1f1450 fffffa80`0a1f1450 fffffa80`0a5ba190 : tcpip!IpNlpSendDatagrams+0x3e
fffff880`0b8f8e40 fffff880`0163626d : fffffa80`0a4fc380 fffffa80`09bc5680 fffff880`0b8f9790 00000000`00000000 : tcpip!UdpSendMessagesOnPathCreation+0x688
fffff880`0b8f91c0 fffff880`01635ef5 : fffff880`0b8f96f0 00000000`00008900 00000000`00000001 00000000`c0a801ff : tcpip!UdpSendMessages+0x35d
fffff880`0b8f95b0 fffff800`02a9264a : 00000000`00000001 00000000`00000004 00000000`00000002 00000000`00000089 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
fffff880`0b8f95e0 fffff880`016364b8 : fffff880`01635ee0 fffff880`0b8f96f0 fffffa80`0a6e1c02 fffff880`02d06c50 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`0b8f96c0 fffff880`013def45 : fffffa80`063cd270 fffffa80`0a545cb0 fffffa80`09a78cd0 fffffa80`071f16ee : tcpip!UdpTlProviderSendMessages+0x78
fffff880`0b8f9740 fffff880`013deff2 : fffffa80`0a6e1c02 00000000`00000000 fffffa80`05cc0e98 fffffa80`05cc0ee0 : tdx!TdxSendDatagramTransportAddress+0x2f5
fffff880`0b8f9820 fffff880`02ccaa48 : fffffa80`05529d40 00000000`000000c8 fffffa80`0abbc5e0 fffffa80`05cc0d80 : tdx!TdxTdiDispatchInternalDeviceControl+0x52
fffff880`0b8f9850 fffff880`02ce7c33 : fffffa80`09aeb964 fffffa80`0a6e1cc0 00000000`00000064 fffffa80`0a6e1cc0 : SYMTDIV+0x7a48
fffff880`0b8f98b0 fffff880`02ce8120 : fffffa80`0a6e1cc0 00000000`00000064 fffffa80`0a6e1cc0 fffffa80`0a6e1cc0 : SYMTDIV+0x24c33
fffff880`0b8f98f0 fffff880`02ce80b4 : fffffa80`0a6e1cc0 fffffa80`0a6e1cc0 00000000`00000000 00000000`00000065 : SYMTDIV+0x25120
fffff880`0b8f9940 fffff880`02ce80b4 : 00000000`00000000 fffffa80`0a6e1cc0 00000000`00000000 00000000`00000064 : SYMTDIV+0x250b4
fffff880`0b8f9990 fffff880`02ccae07 : 00000000`00000000 00000000`00000000 fffffa80`05529d40 fffff880`0b8f9ad8 : SYMTDIV+0x250b4
fffff880`0b8f99e0 fffff880`02ce0bba : fffffa80`05529d40 fffffa80`05cc0ee0 fffffa80`05cc0d80 00000000`c000009a : SYMTDIV+0x7e07
fffff880`0b8f9a80 fffff880`02c02542 : 00000000`00000000 fffffa80`00000001 fffffa80`05cc0d80 fffffa80`05cc0d80 : SYMTDIV+0x1dbba
fffff880`0b8f9ad0 fffff880`02c02f61 : fffffa80`071f16b8 fffffa80`071f16b8 fffffa80`08520e20 fffff880`0b8f9bd0 : netbt!TdiSendDatagram+0x187
fffff880`0b8f9b40 fffff880`02c0f329 : fffffa80`064b6cc0 fffffa80`071f1500 00000000`00000021 00000000`00000044 : netbt!UdpSendDatagram+0x1b1
fffff880`0b8f9bd0 fffff880`02c0f0e6 : 00000000`00000000 00000000`00000000 00000000`00000032 fffff880`02c20089 : netbt!UdpSendResponse+0x4e0
fffff880`0b8f9c50 fffff880`02c03be7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : netbt!QueryFromNet+0xb11
fffff880`0b8f9d80 fffff880`02c01b47 : 00000000`00000032 fffffa80`093444ca 00000000`00000032 fffffa80`09aeb902 : netbt!NameSrvHndlrNotOs+0xca
fffff880`0b8f9dc0 fffff880`02cca46c : fffff880`0b8fa080 fffffa80`09a78cd0 fffffa80`09aeb964 00000000`00000032 : netbt!TdiRcvNameSrvHandler+0x367
fffff880`0b8f9e60 fffff880`013dd325 : fffffa80`0a094340 fffffa80`09a60002 fffff880`0b8fa1d8 fffffa80`09a6f330 : SYMTDIV+0x746c
fffff880`0b8f9f70 fffff880`016413c5 : fffffa80`09a6f330 00000000`00000000 fffffa80`09a6f330 fffffa80`09a6f330 : tdx!TdxEventReceiveMessagesTransportAddress+0x315
fffff880`0b8fa160 fffff880`016418d4 : fffffa80`00000000 fffffa80`09a6f330 00000000`00000000 fffffa80`093444c2 : tcpip!UdpDeliverDatagrams+0x155
fffff880`0b8fa2f0 fffff880`0165d427 : fffffa80`0653fe30 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x324
fffff880`0b8fa3e0 fffff880`0165d499 : fffff880`0b8fa560 fffff880`0176d9a0 fffff880`0b8fa570 fffffa80`063831c0 : tcpip!IppDeliverListToProtocol+0xf7
fffff880`0b8fa4a0 fffff880`0165d990 : fffff880`0176d9a0 fffffa80`071ca2f0 00000000`00000011 fffff880`0b8fa560 : tcpip!IppProcessDeliverList+0x59
fffff880`0b8fa510 fffff880`0165c821 : 00000000`ff01a8c0 fffffa80`0654f138 fffff880`0176d9a0 00000000`0575d801 : tcpip!IppReceiveHeaderBatch+0x231
fffff880`0b8fa5f0 fffff880`01736592 : fffffa80`077b6bf0 00000000`00000000 fffffa80`0575d801 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`0b8fa7f0 fffff880`015abafa : fffffa80`0a9a7202 fffffa80`0a9a72a0 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
fffff880`0b8fa830 fffff880`02d0a568 : fffffa80`071ddfa0 00000000`00000002 fffff880`ffffff00 fffffa80`0ad19990 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
fffff880`0b8fa8e0 fffff880`02d08140 : fffffa80`0a418cc0 00000000`00000000 fffff880`0b8fad50 fffffa80`0a418cc0 : SYMTDIV+0x47568
fffff880`0b8fa970 fffff880`02d04c2f : fffffa80`0a418cc0 00000000`00000000 fffff880`0b8fad50 fffffa80`0a418cc0 : SYMTDIV+0x45140
fffff880`0b8fa9d0 fffff880`02d040f5 : fffffa80`0575d8b0 00000000`000000c8 00000000`00000000 fffff880`0b8fad50 : SYMTDIV+0x41c2f
fffff880`0b8faa00 fffff880`02cf60f0 : fffff880`0b8fad50 fffffa80`071e3550 fffffa80`063a6a40 fffff880`00000000 : SYMTDIV+0x410f5
fffff880`0b8faa50 fffff880`02d07dd1 : fffffa80`0ad19990 fffff880`02d0c7c3 00000000`00000002 00000000`00000000 : SYMTDIV+0x330f0
fffff880`0b8fab60 fffff880`02d0cb7b : 00000000`00000000 fffff880`0b8fad10 fffff880`0b8fad50 00000000`00000002 : SYMTDIV+0x44dd1
fffff880`0b8fabc0 fffff880`02d08818 : fffff880`0b8fb070 fffff880`0b8fb590 fffff880`0b8fb590 fffff880`02d20130 : SYMTDIV+0x49b7b
fffff880`0b8fac60 fffff880`0141d57f : 00000000`00000000 fffffa80`063ca520 fffffa80`063ca520 00000000`00000000 : SYMTDIV+0x45818
fffff880`0b8faf00 fffff880`01406619 : fffff880`0b8f000c fffff880`0b8fb590 fffffa80`0b147068 fffffa80`085eee20 : NETIO! ?? ::FNODOBFM::`string'+0x7267
fffff880`0b8fb020 fffff880`01407bb1 : fffff880`0b8f000c fffff880`0b8fb590 fffffa80`063ca520 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x2a9
fffff880`0b8fb0f0 fffff880`0162582e : 00000000`0000000c fffff880`0b8fb590 00000000`00000001 fffffa80`085eee20 : NETIO!KfdClassify+0x934
fffff880`0b8fb460 fffff880`0163fd8d : fffffa80`085eee20 fffffa80`063ca520 fffffa80`0b147010 fffffa80`063c8900 : tcpip!ProcessInboundTransportLayerClassify+0x21e
fffff880`0b8fb680 fffff880`0166e861 : fffffa80`00000011 fffffa80`09a80002 fffffa80`06548900 00000000`00008900 : tcpip!WfpProcessInTransportStackIndication+0x81d
fffff880`0b8fb9f0 fffff880`01640f93 : fffffa80`09a88ec0 fffffa80`06410820 00000000`00000000 fffffa80`0654f000 : tcpip!InetInspectReceiveDatagram+0x121
fffff880`0b8fba90 fffff880`01641345 : fffffa80`09a88ec0 00000000`00000000 00000000`00000001 00000000`00000000 : tcpip!UdpBeginMessageIndication+0x83
fffff880`0b8fbbe0 fffff880`016418d4 : fffffa80`00000000 fffffa80`09a88ec0 00000000`00000000 fffffa80`088e4aa2 : tcpip!UdpDeliverDatagrams+0xd5
fffff880`0b8fbd70 fffff880`0165d427 : fffffa80`0653fe30 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x324
fffff880`0b8fbe60 fffff880`0165d499 : fffff880`0b8fbfe0 fffff880`0176d9a0 fffff880`0b8fbff0 fffffa80`063831c0 : tcpip!IppDeliverListToProtocol+0xf7
fffff880`0b8fbf20 fffff880`0165d990 : fffff880`0176d9a0 fffffa80`085eef50 00000000`00000011 fffff880`0b8fbfe0 : tcpip!IppProcessDeliverList+0x59
fffff880`0b8fbf90 fffff880`0165c821 : fffffa80`ff01a8c0 fffffa80`0654f000 fffff880`0176d9a0 00000000`089b7b01 : tcpip!IppReceiveHeaderBatch+0x231
fffff880`0b8fc070 fffff880`0165b272 : fffffa80`089bee50 00000000`00000000 fffffa80`089b7b01 00000000`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`0b8fc270 fffff880`016746ba : fffffa80`089b7bb0 fffff880`0b8fc3a0 fffffa80`089b7bb0 fffff880`0b8f0000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`0b8fc350 fffff800`02a9264a : fffffa80`085eee20 fffff880`0b8f7000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`0b8fc3a0 fffff880`016740e2 : fffff880`016745e0 fffff880`0b8fc4b0 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`0b8fc480 fffff880`0156e0eb : fffffa80`089bc6c0 00000000`00000000 fffffa80`0849d1a0 fffff800`02bb526f : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`0b8fc4f0 fffff880`01537fc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`0b8fc560 fffff880`014b1ef1 : fffffa80`0849d1a0 00000000`00000002 00000000`00000001 fffff880`014b237a : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`0b8fc9e0 fffff880`0fe191a7 : fffffa80`0884b000 fffffa80`085eee20 fffffa80`085eee20 fffffa80`0884bce0 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1


STACK_COMMAND: kb

FOLLOWUP_IP:
NETIO!CompareSecurityContexts+6a
fffff880`01406c5a 448b442470 mov r8d,dword ptr [rsp+70h]

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: NETIO!CompareSecurityContexts+6a

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME: NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc18a

FAILURE_BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a

BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a

Followup: MachineOwner
---------

6: kd> lmvm NETIO
start end module name
fffff880`01400000 fffff880`01460000 NETIO (pdb symbols) c:\symbols\netio.pdb\4ACD68B3A9824AAAB3C53C0077FC611F2\netio.pdb
Loaded symbol image file: NETIO.SYS
Image path: \SystemRoot\system32\drivers\NETIO.SYS
Image name: NETIO.SYS
Timestamp: Tue Jul 14 09:21:46 2009 (4A5BC18A)
CheckSum: 0005F36C
ImageSize: 00060000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4

BC AdBot (Login to Remove)

 


#2 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:09:41 PM

Posted 28 February 2010 - 02:15 PM

Updated your network card drivers?

#3 keyboardNinja

keyboardNinja

    Bleepin' Ninja


  • Members
  • 4,815 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:teh interwebz
  • Local time:03:41 PM

Posted 28 February 2010 - 05:13 PM

I would recommend updating all of your drivers, actually. Things will not likely work correctly without proper, up to date drivers. Go to your manufacturer's website to download then install the latest drivers for your specific model and operating system.

Drivers are always the first thing to check when diagnosing BSOD's. :huh:

Edited by keyboardNinja, 28 February 2010 - 05:13 PM.

PICNIC - Problem In Chair, Not In Computer

Posted Image Posted Image

20 Things I Learned About Browsers and the Web

#4 pocket1982

pocket1982
  • Topic Starter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:41 AM

Posted 01 March 2010 - 04:11 AM

Thank- you

I updated all drivers I found it too be either Norton Internet Security or the Sound max x that come with the motherboard driver CD I believe that was the problem isn't that amazing I thought it was huge.
So I lost all my save games now and its a slowly painful way to reinstall steam etc oh god scorched earth I should have spoken to you guys earlier.

thanks anyway

Brad.

#5 keyboardNinja

keyboardNinja

    Bleepin' Ninja


  • Members
  • 4,815 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:teh interwebz
  • Local time:03:41 PM

Posted 01 March 2010 - 07:29 AM

Uhh...you're welcome.

Edited by keyboardNinja, 01 March 2010 - 07:30 AM.

PICNIC - Problem In Chair, Not In Computer

Posted Image Posted Image

20 Things I Learned About Browsers and the Web




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users