BugCheck 7F, {8, 80050033, 406f8, fffff80002e8329e}
Unable to load image avgtdia.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for [COLOR=#ff0000][U][B]avgtdia.sys[/B][/U][/COLOR]
*** ERROR: Module load completed but symbols could not be loaded for [COLOR=#ff0000][U][B]avgtdia.sys[/B][/U][/COLOR]
Probably caused by : tcpip.sys ( tcpip!WfpAuditEventGeneral+1da )
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000406f8
Arg4: fffff80002e8329e
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002edfbe9 to fffff80002ee0640
STACK_TEXT:
fffff800`047d9d28 fffff800`02edfbe9 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000406f8 : nt!KeBugCheckEx
fffff800`047d9d30 fffff800`02ede0b2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`047d9e70 fffff800`02e8329e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`0757cf50 fffff880`01b1623a : 00000000`00000007 00000000`00000011 fffff880`0757e1a0 00000000`00000000 : nt!SeReportSecurityEventWithSubCategory+0x9e
fffff880`0757d3e0 fffff880`01b169a1 : 00000000`0000002c 00000000`00000000 00000000`00003900 00000000`00003912 : tcpip!WfpAuditEventGeneral+0x1da
fffff880`0757d860 fffff880`01b16c8c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!IndicateDropAudit+0x341
fffff880`0757dab0 fffff880`01b16e79 : 00000000`00000000 00000000`00000000 fffffa80`04514040 fffffa80`04514040 : tcpip!ShimIndicateDiscard+0xac
fffff880`0757dd20 fffff880`01b628af : fffff880`0757e508 fffffa80`09c0c7b0 fffff880`0757e1a0 fffff880`0757ded8 : tcpip!WfpShimIndicateDiscardGeneral+0x99
fffff880`0757dd90 fffff880`01b2a6f8 : fffffa80`09b9f010 fffff880`0757ec18 fffff880`01c287a0 fffff880`0757ecf0 : tcpip!WfpAleClassify+0xdf
fffff880`0757dde0 fffff880`01b29a88 : 00000000`00000000 00000000`00000000 fffffa80`09b9f010 00000000`00000000 : tcpip!WfpAlepAuthorizeReceive+0x818
fffff880`0757e410 fffff880`01b28a2c : 00000000`00000000 fffffa80`0000002c 00000000`0000000b fffffa80`073519a0 : tcpip!WfpAleAuthorizeReceive+0x2e8
fffff880`0757e6f0 fffff880`01b6245e : 00000000`00000000 fffff880`0757ebd0 fffff880`0757eb68 00000000`00000006 : tcpip!WfpAleConnectAcceptIndicate+0x29c
fffff880`0757e7e0 fffff880`01b63087 : 00000000`00000000 00000000`00000001 00000000`0000bd01 00000000`00000000 : tcpip!ProcessALEForTransportPacket+0x5fe
fffff880`0757ea50 fffff880`01b407d1 : 00000000`00000000 00000000`00000000 0000000b`00000000 00000000`00000010 : tcpip!WfpProcessInTransportStackIndication+0x7b7
fffff880`0757ef40 fffff880`01b15df9 : fffffa80`087e2440 fffffa80`0454e8d0 00000000`00000000 00000000`00000002 : tcpip!InetInspectReceiveDatagram+0x121
fffff880`0757f000 fffff880`01b15ac4 : fffffa80`07ace6e0 fffffa80`087e2440 fffffa80`07e6dd00 00000000`00000000 : tcpip!RawBeginMessageIndication+0x69
fffff880`0757f0d0 fffff880`01b1ddf2 : fffffa80`00000000 fffffa80`07ace6e0 fffffa80`00000006 fffff880`0757f398 : tcpip!RawDeliverDatagrams+0x124
fffff880`0757f290 fffff880`01b3b197 : 00000000`00000000 00000000`00000000 fffffa80`0454e820 fffffa80`0454e8d0 : tcpip!RawReceiveDatagrams+0x142
fffff880`0757f390 fffff880`01b3acaa : 00000000`00000000 fffff880`01c4f9a0 fffff880`0757f540 00000000`00000000 : tcpip!IppDeliverListToProtocol+0xf7
fffff880`0757f450 fffff880`01b3a4a4 : fffff880`018bd110 00000000`00000002 00000000`00000000 00000000`00000000 : tcpip!IppProcessDeliverList+0x5a
fffff880`0757f4f0 fffff880`01b1d17f : fffff880`01c4f9a0 fffff880`00000000 00000000`00000000 fffff880`0757f688 : tcpip!IppReceiveHeaderBatch+0x435
fffff880`0757f5d0 fffff880`01b1d7e4 : 00000000`00000001 fffffa80`087e2440 fffffa80`04540b48 00000000`00000000 : tcpip!IppLoopbackTransmit+0x38f
fffff880`0757f680 fffff880`01b3f5d6 : 00000000`00000000 fffffa80`073519a0 fffffa80`07253700 00000000`00000000 : tcpip!IppLoopbackEnqueue+0x1f5
fffff880`0757f720 fffff880`01b3c3b7 : fffff880`01c4f9a0 00000000`00000000 00000000`00000000 fffff800`01c40800 : tcpip!IppFragmentPackets+0x796
fffff880`0757f840 fffff880`01b3e805 : fffff880`0757fba0 00000000`00140005 00000000`00000000 00000001`00000002 : tcpip!IppDispatchSendPacketHelper+0x87
fffff880`0757f900 fffff880`01b3cf43 : fffffa80`0398bd06 00000000`0000bd00 fffffa80`00000014 fffff880`00000000 : tcpip!IppPacketizeDatagrams+0x2d5
fffff880`0757fa20 fffff880`01b403ae : fffff880`07580230 fffff880`01cee307 fffff880`01c4f9a0 fffffa80`0398bdb0 : tcpip!IppSendDatagramsCommon+0x753
fffff880`0757fcf0 fffff880`01b19d55 : 00000000`00000000 fffff880`075806f0 fffff880`075806f0 fffff880`07580858 : tcpip!IpNlpSendDatagrams+0x3e
fffff880`0757fd30 fffff880`01b422af : fffffa80`0735c010 6d61fea9`6bc00002 00000000`00000000 00000000`00000000 : tcpip!IppSlowSendDatagram+0x75
fffff880`0757fe30 fffff880`01b4804b : fffffa80`04560430 00000000`00000001 fffff880`07580b00 00000000`00003912 : tcpip!IpNlpFastSendDatagram+0xc3f
fffff880`075801e0 fffff880`01b491de : 00000000`00001c7f 00000000`00000000 00000000`00000002 00000000`00000000 : tcpip!TcpTcbHeaderSend+0x47b
fffff880`07580390 fffff880`01b697e6 : 00000000`00000000 00000000`00000000 fffff880`01c49128 00000000`00000000 : tcpip!TcpTcbSend+0x88e
fffff880`07580610 fffff880`01b3023d : 00000000`00000000 00000000`00000000 fffff880`03730000 00000000`00000001 : tcpip!TcpFlushDelay+0x316
fffff880`075806f0 fffff880`01b3003c : fffff880`075808f0 fffffa80`0398acf0 fffffa80`07c27350 fffffa80`03926b20 : tcpip!TcpDeliverInput+0x18d
fffff880`075807f0 fffff880`01815d15 : fffffa80`03926b20 00000000`00000002 fffffa80`03926b20 fffffa80`09d17bb8 : tcpip!TcpRequestReceive+0x18c
fffff880`075808b0 fffff880`0180cb8a : fffffa80`09d17bb8 00000000`00000002 fffffa80`03926b20 fffffa80`03d503e0 : tdx!TdxReceiveConnection+0x1f5
fffff880`07580950 fffff880`01602a06 : fffffa80`03d503e0 00000000`00000010 fffffa80`069c4860 fffffa80`09d17aa0 : tdx! ?? ::FNODOBFM::`string'+0x47cf
fffff880`075809d0 fffffa80`03d503e0 : 00000000`00000010 fffffa80`069c4860 fffffa80`09d17aa0 fffff880`063ee110 : [COLOR=#ff0000][U][B]avgtdia[/B][/U][/COLOR]+0x2a06
fffff880`075809d8 00000000`00000010 : fffffa80`069c4860 fffffa80`09d17aa0 fffff880`063ee110 fffff880`063d6dc7 : 0xfffffa80`03d503e0
fffff880`075809e0 fffffa80`069c4860 : fffffa80`09d17aa0 fffff880`063ee110 fffff880`063d6dc7 fffffa80`08fde4f0 : 0x10
fffff880`075809e8 fffffa80`09d17aa0 : fffff880`063ee110 fffff880`063d6dc7 fffffa80`08fde4f0 fffff880`07580c70 : 0xfffffa80`069c4860
fffff880`075809f0 fffff880`063ee110 : fffff880`063d6dc7 fffffa80`08fde4f0 fffff880`07580c70 00000000`00000000 : 0xfffffa80`09d17aa0
fffff880`075809f8 fffff880`063d6dc7 : fffffa80`08fde4f0 fffff880`07580c70 00000000`00000000 fffffa80`09c62a20 : mrxsmb!WPP_GLOBAL_Control
fffff880`07580a00 fffff880`01602d16 : fffffa80`09d17aa0 fffff800`0300b1de 00000000`c0000016 fffffa80`03936800 : mrxsmb!SmbCseDissociateMidFromBufferContextLite+0x207
fffff880`07580a50 fffffa80`09d17aa0 : fffff800`0300b1de 00000000`c0000016 fffffa80`03936800 fffff880`07580b30 : avgtdia+0x2d16
fffff880`07580a58 fffff800`0300b1de : 00000000`c0000016 fffffa80`03936800 fffff880`07580b30 fffff880`016035d5 : 0xfffffa80`09d17aa0
fffff880`07580a60 fffffa80`096f8f40 : fffffa80`00000000 00000000`00004000 00000000`00000000 fffffa80`09c62950 : nt!ExAllocatePoolWithTag+0xfe
fffff880`07580b50 fffffa80`00000000 : 00000000`00004000 00000000`00000000 fffffa80`09c62950 fffffa80`03a20cb0 : 0xfffffa80`096f8f40
fffff880`07580b58 00000000`00004000 : 00000000`00000000 fffffa80`09c62950 fffffa80`03a20cb0 fffff880`063df875 : 0xfffffa80`00000000
fffff880`07580b60 00000000`00000000 : fffffa80`09c62950 fffffa80`03a20cb0 fffff880`063df875 fffffa80`03a20cb0 : 0x4000
STACK_COMMAND: kb
FOLLOWUP_IP:
tcpip!WfpAuditEventGeneral+1da
fffff880`01b1623a 33c0 xor eax,eax
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: tcpip!WfpAuditEventGeneral+1da
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79420
FAILURE_BUCKET_ID: X64_0x7f_8_tcpip!WfpAuditEventGeneral+1da
BUCKET_ID: X64_0x7f_8_tcpip!WfpAuditEventGeneral+1da