Hmm back when i come on these boards it was zone alarm and i believe i installed that hotfix.. but i can try again. Just now got windbg running im looking over the dump now.
Thanks Fimble :-p
- Tony
UPDATE: I think you viewed an old dump, as i see no error 0x7F
the error im getting on this new dump (included in .rar)
HTML Code:
................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {50, 2, 0, fffff8800154ae10}
Unable to load image vsdatant.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for vsdatant.sys
*** ERROR: Module load completed but symbols could not be loaded for vsdatant.sys
Unable to load image Rt64win7.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Rt64win7.sys
*** ERROR: Module load completed but symbols could not be loaded for Rt64win7.sys
Probably caused by : NETIO.SYS ( NETIO!StreamInvokeCalloutAndNormalizeAction+1d0 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000050, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800154ae10, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800038f90e0
0000000000000050
CURRENT_IRQL: 2
FAULTING_IP:
NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
fffff880`0154ae10 41837b5003 cmp dword ptr [r11+50h],3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880097fa810 -- (.trap 0xfffff880097fa810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000001001
rdx=fffffa800925db60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800154ae10 rsp=fffff880097fa9a0 rbp=fffffa800925d840
r8=0000000000000120 r9=0000000000000014 r10=fffffa8005a54830
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
NETIO!StreamInvokeCalloutAndNormalizeAction+0x1d0:
fffff880`0154ae10 41837b5003 cmp dword ptr [r11+50h],3 ds:00000000`00000050=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800036c0ca9 to fffff800036c1740
STACK_TEXT:
fffff880`097fa6c8 fffff800`036c0ca9 : 00000000`0000000a 00000000`00000050 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`097fa6d0 fffff800`036bf920 : fffffa80`066d2730 fffff880`097fab80 fffffa80`05a54830 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`097fa810 fffff880`0154ae10 : fffff880`097fab80 fffffa80`0925d840 fffff880`097fad80 fffffa80`05e884e0 : nt!KiPageFault+0x260
fffff880`097fa9a0 fffff880`01556a68 : 00000000`00000000 fffff880`097fad80 fffff880`097fab30 fffff880`097fabb8 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x1d0
fffff880`097faa40 fffff880`01557a61 : fffffa80`0925d840 fffff880`097fad80 fffff880`097fab80 fffff880`097fb1e0 : NETIO!StreamCalloutProcessData+0x48
fffff880`097faa90 fffff880`01558ab8 : fffff880`097fab80 fffff880`097fb1e0 fffff880`097fad01 fffffa80`0925d840 : NETIO!StreamCalloutProcessingLoop+0xa1
fffff880`097fab20 fffff880`015394fa : fffff880`097fad80 fffff880`060988e8 fffff880`00000000 fffff880`097f0014 : NETIO!StreamProcessCallout+0x1e8
fffff880`097fac10 fffff880`01522619 : fffff880`097f0014 fffff880`097fb2e0 fffffa80`07551a48 fffff880`097fb1e0 : NETIO! ?? ::FNODOBFM::`string'+0x71e2
fffff880`097fad30 fffff880`01523bb1 : fffff880`097f0014 fffff880`097fb2e0 fffff880`097fb370 fffff880`00000000 : NETIO!ArbitrateAndEnforce+0x2a9
fffff880`097fae00 fffff880`0155bad4 : fffff880`097fb5b8 fffff880`097fb2e0 fffffa80`00000001 fffff880`097fb1e0 : NETIO!KfdClassify+0x934
fffff880`097fb170 fffff880`0155bf48 : fffffa80`075519f0 00000000`00000014 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x104
fffff880`097fb290 fffff880`0155c2f9 : fffffa80`07551900 fffffa80`06d3ea00 fffffa80`066d2700 00000000`00000000 : NETIO!StreamCommonInspect+0x228
fffff880`097fb570 fffff880`01709928 : fffffa80`075519f0 fffff880`097fb900 fffffa80`066d2730 fffffa80`04464fa0 : NETIO!WfpStreamInspectReceive+0xf9
fffff880`097fb5f0 fffff880`01738831 : fffffa80`067a7010 fffff880`097fb938 00000000`00000596 fffff880`097fb938 : tcpip!InetInspectReceive+0x48
fffff880`097fb630 fffff880`016c2743 : 00000000`cf360afb fffffa80`067a7010 fffffa80`066d2730 fffffa80`066d2730 : tcpip!TcpInspectReceive+0x71
fffff880`097fb680 fffff880`0167db78 : fffffa80`0732c470 fffffa80`0732c470 00000000`00000000 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x3dd15
fffff880`097fb840 fffff880`016829aa : fffffa80`045b7490 fffffa80`05a00100 fffffa80`04446a01 00000000`00000000 : tcpip!TcpTcbReceive+0x1e8
fffff880`097fba30 fffff880`016824f7 : fffff880`05145e22 fffffa80`0459e000 00000000`00000000 fffff880`01663800 : tcpip!TcpMatchReceive+0x1fa
fffff880`097fbb80 fffff880`016628f7 : fffffa80`0459e000 fffffa80`04475820 fffffa80`045b5000 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x177
fffff880`097fbc30 fffff880`016629b5 : 00000000`00000006 fffff880`097fbdb0 00000000`00000006 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x97
fffff880`097fbcf0 fffff880`01662ee9 : 00000000`00000006 00000000`00000000 fffff880`0176dd08 fffff880`0176d9a0 : tcpip!IppProcessDeliverList+0x45
fffff880`097fbd50 fffff880`01661d40 : 00000000`00000000 fffffa80`0459e000 fffff880`0176d9a0 00000000`059e9401 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`097fbe30 fffff880`01660642 : fffffa80`03a76af0 00000000`00000000 fffffa80`059e9401 00000000`00000001 : tcpip!IpFlcReceivePackets+0x650
fffff880`097fc030 fffff880`0167b04a : fffffa80`059e9410 fffff880`097fc160 fffffa80`059e9410 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`097fc110 fffff800`036d0e5a : fffffa80`05726e20 fffff880`097f7000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`097fc160 fffff880`0167a7f2 : fffff880`0167af70 fffff880`097fc270 00000000`00000002 fffff800`036bdcd9 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`097fc240 fffff880`014e80eb : fffffa80`059ea8d0 00000000`00000000 fffffa80`0534f1a0 00000000`00008000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`097fc2b0 fffff880`014b1fc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`097fc320 fffff880`01434a24 : fffffa80`0534f1a0 00000000`00000002 00000000`00000001 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`097fc7a0 fffff880`014349e9 : 00000000`00000246 fffff800`00000000 fffff800`038665f8 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x24
fffff880`097fc7e0 fffff880`01434980 : 00000000`00000000 00000000`00000000 ffff0000`0aa70679 fffff800`0360fae7 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
fffff880`097fc820 fffff880`03d41ba5 : fffffa80`059ea010 00000000`00000001 00000000`00000001 fffffa80`05726e20 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
fffff880`097fc860 fffffa80`059ea010 : 00000000`00000001 00000000`00000001 fffffa80`05726e20 fffffa80`00000001 : vsdatant+0x19ba5
fffff880`097fc868 00000000`00000001 : 00000000`00000001 fffffa80`05726e20 fffffa80`00000001 fffff880`01524219 : 0xfffffa80`059ea010
fffff880`097fc870 00000000`00000001 : fffffa80`05726e20 fffffa80`00000001 fffff880`01524219 00000000`041c0105 : 0x1
fffff880`097fc878 fffffa80`05726e20 : fffffa80`00000001 fffff880`01524219 00000000`041c0105 fffffa80`05726800 : 0x1
fffff880`097fc880 fffffa80`00000001 : fffff880`01524219 00000000`041c0105 fffffa80`05726800 ffff0000`0aa70be9 : 0xfffffa80`05726e20
fffff880`097fc888 fffff880`01524219 : 00000000`041c0105 fffffa80`05726800 ffff0000`0aa70be9 00000000`00000000 : 0xfffffa80`00000001
fffff880`097fc890 fffffa80`0534f1a0 : 00000000`00000008 fffffa80`05724e20 fffffa80`0534f1a0 fffff880`0144c2b7 : NETIO!MdpFree+0x79
fffff880`097fc8e0 00000000`00000008 : fffffa80`05724e20 fffffa80`0534f1a0 fffff880`0144c2b7 fffffa80`059ea010 : 0xfffffa80`0534f1a0
fffff880`097fc8e8 fffffa80`05724e20 : fffffa80`0534f1a0 fffff880`0144c2b7 fffffa80`059ea010 fffffa80`05724e20 : 0x8
fffff880`097fc8f0 fffffa80`0534f1a0 : fffff880`0144c2b7 fffffa80`059ea010 fffffa80`05724e20 fffffa80`00000000 : 0xfffffa80`05724e20
fffff880`097fc8f8 fffff880`0144c2b7 : fffffa80`059ea010 fffffa80`05724e20 fffffa80`00000000 00000000`00000008 : 0xfffffa80`0534f1a0
fffff880`097fc900 fffff880`046147d2 : fffffa80`0565b000 00000000`00000000 fffffa80`0565b5f0 fffff880`02cb31c0 : ndis! ?? ::FNODOBFM::`string'+0xccef
fffff880`097fc950 fffffa80`0565b000 : 00000000`00000000 fffffa80`0565b5f0 fffff880`02cb31c0 fffffa80`00000001 : Rt64win7+0x147d2
fffff880`097fc958 00000000`00000000 : fffffa80`0565b5f0 fffff880`02cb31c0 fffffa80`00000001 fffffa80`059e9410 : 0xfffffa80`0565b000
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
fffff880`0154ae10 41837b5003 cmp dword ptr [r11+50h],3
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4bbe946f
FAILURE_BUCKET_ID: X64_0xD1_NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
BUCKET_ID: X64_0xD1_NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000050, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800154ae10, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 0000000000000050
CURRENT_IRQL: 2
FAULTING_IP:
NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
fffff880`0154ae10 41837b5003 cmp dword ptr [r11+50h],3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880097fa810 -- (.trap 0xfffff880097fa810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000001001
rdx=fffffa800925db60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800154ae10 rsp=fffff880097fa9a0 rbp=fffffa800925d840
r8=0000000000000120 r9=0000000000000014 r10=fffffa8005a54830
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
NETIO!StreamInvokeCalloutAndNormalizeAction+0x1d0:
fffff880`0154ae10 41837b5003 cmp dword ptr [r11+50h],3 ds:00000000`00000050=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800036c0ca9 to fffff800036c1740
STACK_TEXT:
fffff880`097fa6c8 fffff800`036c0ca9 : 00000000`0000000a 00000000`00000050 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`097fa6d0 fffff800`036bf920 : fffffa80`066d2730 fffff880`097fab80 fffffa80`05a54830 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`097fa810 fffff880`0154ae10 : fffff880`097fab80 fffffa80`0925d840 fffff880`097fad80 fffffa80`05e884e0 : nt!KiPageFault+0x260
fffff880`097fa9a0 fffff880`01556a68 : 00000000`00000000 fffff880`097fad80 fffff880`097fab30 fffff880`097fabb8 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x1d0
fffff880`097faa40 fffff880`01557a61 : fffffa80`0925d840 fffff880`097fad80 fffff880`097fab80 fffff880`097fb1e0 : NETIO!StreamCalloutProcessData+0x48
fffff880`097faa90 fffff880`01558ab8 : fffff880`097fab80 fffff880`097fb1e0 fffff880`097fad01 fffffa80`0925d840 : NETIO!StreamCalloutProcessingLoop+0xa1
fffff880`097fab20 fffff880`015394fa : fffff880`097fad80 fffff880`060988e8 fffff880`00000000 fffff880`097f0014 : NETIO!StreamProcessCallout+0x1e8
fffff880`097fac10 fffff880`01522619 : fffff880`097f0014 fffff880`097fb2e0 fffffa80`07551a48 fffff880`097fb1e0 : NETIO! ?? ::FNODOBFM::`string'+0x71e2
fffff880`097fad30 fffff880`01523bb1 : fffff880`097f0014 fffff880`097fb2e0 fffff880`097fb370 fffff880`00000000 : NETIO!ArbitrateAndEnforce+0x2a9
fffff880`097fae00 fffff880`0155bad4 : fffff880`097fb5b8 fffff880`097fb2e0 fffffa80`00000001 fffff880`097fb1e0 : NETIO!KfdClassify+0x934
fffff880`097fb170 fffff880`0155bf48 : fffffa80`075519f0 00000000`00000014 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x104
fffff880`097fb290 fffff880`0155c2f9 : fffffa80`07551900 fffffa80`06d3ea00 fffffa80`066d2700 00000000`00000000 : NETIO!StreamCommonInspect+0x228
fffff880`097fb570 fffff880`01709928 : fffffa80`075519f0 fffff880`097fb900 fffffa80`066d2730 fffffa80`04464fa0 : NETIO!WfpStreamInspectReceive+0xf9
fffff880`097fb5f0 fffff880`01738831 : fffffa80`067a7010 fffff880`097fb938 00000000`00000596 fffff880`097fb938 : tcpip!InetInspectReceive+0x48
fffff880`097fb630 fffff880`016c2743 : 00000000`cf360afb fffffa80`067a7010 fffffa80`066d2730 fffffa80`066d2730 : tcpip!TcpInspectReceive+0x71
fffff880`097fb680 fffff880`0167db78 : fffffa80`0732c470 fffffa80`0732c470 00000000`00000000 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x3dd15
fffff880`097fb840 fffff880`016829aa : fffffa80`045b7490 fffffa80`05a00100 fffffa80`04446a01 00000000`00000000 : tcpip!TcpTcbReceive+0x1e8
fffff880`097fba30 fffff880`016824f7 : fffff880`05145e22 fffffa80`0459e000 00000000`00000000 fffff880`01663800 : tcpip!TcpMatchReceive+0x1fa
fffff880`097fbb80 fffff880`016628f7 : fffffa80`0459e000 fffffa80`04475820 fffffa80`045b5000 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x177
fffff880`097fbc30 fffff880`016629b5 : 00000000`00000006 fffff880`097fbdb0 00000000`00000006 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x97
fffff880`097fbcf0 fffff880`01662ee9 : 00000000`00000006 00000000`00000000 fffff880`0176dd08 fffff880`0176d9a0 : tcpip!IppProcessDeliverList+0x45
fffff880`097fbd50 fffff880`01661d40 : 00000000`00000000 fffffa80`0459e000 fffff880`0176d9a0 00000000`059e9401 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`097fbe30 fffff880`01660642 : fffffa80`03a76af0 00000000`00000000 fffffa80`059e9401 00000000`00000001 : tcpip!IpFlcReceivePackets+0x650
fffff880`097fc030 fffff880`0167b04a : fffffa80`059e9410 fffff880`097fc160 fffffa80`059e9410 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`097fc110 fffff800`036d0e5a : fffffa80`05726e20 fffff880`097f7000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`097fc160 fffff880`0167a7f2 : fffff880`0167af70 fffff880`097fc270 00000000`00000002 fffff800`036bdcd9 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`097fc240 fffff880`014e80eb : fffffa80`059ea8d0 00000000`00000000 fffffa80`0534f1a0 00000000`00008000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`097fc2b0 fffff880`014b1fc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`097fc320 fffff880`01434a24 : fffffa80`0534f1a0 00000000`00000002 00000000`00000001 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`097fc7a0 fffff880`014349e9 : 00000000`00000246 fffff800`00000000 fffff800`038665f8 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x24
fffff880`097fc7e0 fffff880`01434980 : 00000000`00000000 00000000`00000000 ffff0000`0aa70679 fffff800`0360fae7 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
fffff880`097fc820 fffff880`03d41ba5 : fffffa80`059ea010 00000000`00000001 00000000`00000001 fffffa80`05726e20 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
fffff880`097fc860 fffffa80`059ea010 : 00000000`00000001 00000000`00000001 fffffa80`05726e20 fffffa80`00000001 : vsdatant+0x19ba5
fffff880`097fc868 00000000`00000001 : 00000000`00000001 fffffa80`05726e20 fffffa80`00000001 fffff880`01524219 : 0xfffffa80`059ea010
fffff880`097fc870 00000000`00000001 : fffffa80`05726e20 fffffa80`00000001 fffff880`01524219 00000000`041c0105 : 0x1
fffff880`097fc878 fffffa80`05726e20 : fffffa80`00000001 fffff880`01524219 00000000`041c0105 fffffa80`05726800 : 0x1
fffff880`097fc880 fffffa80`00000001 : fffff880`01524219 00000000`041c0105 fffffa80`05726800 ffff0000`0aa70be9 : 0xfffffa80`05726e20
fffff880`097fc888 fffff880`01524219 : 00000000`041c0105 fffffa80`05726800 ffff0000`0aa70be9 00000000`00000000 : 0xfffffa80`00000001
fffff880`097fc890 fffffa80`0534f1a0 : 00000000`00000008 fffffa80`05724e20 fffffa80`0534f1a0 fffff880`0144c2b7 : NETIO!MdpFree+0x79
fffff880`097fc8e0 00000000`00000008 : fffffa80`05724e20 fffffa80`0534f1a0 fffff880`0144c2b7 fffffa80`059ea010 : 0xfffffa80`0534f1a0
fffff880`097fc8e8 fffffa80`05724e20 : fffffa80`0534f1a0 fffff880`0144c2b7 fffffa80`059ea010 fffffa80`05724e20 : 0x8
fffff880`097fc8f0 fffffa80`0534f1a0 : fffff880`0144c2b7 fffffa80`059ea010 fffffa80`05724e20 fffffa80`00000000 : 0xfffffa80`05724e20
fffff880`097fc8f8 fffff880`0144c2b7 : fffffa80`059ea010 fffffa80`05724e20 fffffa80`00000000 00000000`00000008 : 0xfffffa80`0534f1a0
fffff880`097fc900 fffff880`046147d2 : fffffa80`0565b000 00000000`00000000 fffffa80`0565b5f0 fffff880`02cb31c0 : ndis! ?? ::FNODOBFM::`string'+0xccef
fffff880`097fc950 fffffa80`0565b000 : 00000000`00000000 fffffa80`0565b5f0 fffff880`02cb31c0 fffffa80`00000001 : Rt64win7+0x147d2
fffff880`097fc958 00000000`00000000 : fffffa80`0565b5f0 fffff880`02cb31c0 fffffa80`00000001 fffffa80`059e9410 : 0xfffffa80`0565b000
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
fffff880`0154ae10 41837b5003 cmp dword ptr [r11+50h],3
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4bbe946f
FAILURE_BUCKET_ID: X64_0xD1_NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
BUCKET_ID: X64_0xD1_NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000050, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800154ae10, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 0000000000000050
CURRENT_IRQL: 2
FAULTING_IP:
NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
fffff880`0154ae10 41837b5003 cmp dword ptr [r11+50h],3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880097fa810 -- (.trap 0xfffff880097fa810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000001001
rdx=fffffa800925db60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800154ae10 rsp=fffff880097fa9a0 rbp=fffffa800925d840
r8=0000000000000120 r9=0000000000000014 r10=fffffa8005a54830
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
NETIO!StreamInvokeCalloutAndNormalizeAction+0x1d0:
fffff880`0154ae10 41837b5003 cmp dword ptr [r11+50h],3 ds:00000000`00000050=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800036c0ca9 to fffff800036c1740
STACK_TEXT:
fffff880`097fa6c8 fffff800`036c0ca9 : 00000000`0000000a 00000000`00000050 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`097fa6d0 fffff800`036bf920 : fffffa80`066d2730 fffff880`097fab80 fffffa80`05a54830 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`097fa810 fffff880`0154ae10 : fffff880`097fab80 fffffa80`0925d840 fffff880`097fad80 fffffa80`05e884e0 : nt!KiPageFault+0x260
fffff880`097fa9a0 fffff880`01556a68 : 00000000`00000000 fffff880`097fad80 fffff880`097fab30 fffff880`097fabb8 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x1d0
fffff880`097faa40 fffff880`01557a61 : fffffa80`0925d840 fffff880`097fad80 fffff880`097fab80 fffff880`097fb1e0 : NETIO!StreamCalloutProcessData+0x48
fffff880`097faa90 fffff880`01558ab8 : fffff880`097fab80 fffff880`097fb1e0 fffff880`097fad01 fffffa80`0925d840 : NETIO!StreamCalloutProcessingLoop+0xa1
fffff880`097fab20 fffff880`015394fa : fffff880`097fad80 fffff880`060988e8 fffff880`00000000 fffff880`097f0014 : NETIO!StreamProcessCallout+0x1e8
fffff880`097fac10 fffff880`01522619 : fffff880`097f0014 fffff880`097fb2e0 fffffa80`07551a48 fffff880`097fb1e0 : NETIO! ?? ::FNODOBFM::`string'+0x71e2
fffff880`097fad30 fffff880`01523bb1 : fffff880`097f0014 fffff880`097fb2e0 fffff880`097fb370 fffff880`00000000 : NETIO!ArbitrateAndEnforce+0x2a9
fffff880`097fae00 fffff880`0155bad4 : fffff880`097fb5b8 fffff880`097fb2e0 fffffa80`00000001 fffff880`097fb1e0 : NETIO!KfdClassify+0x934
fffff880`097fb170 fffff880`0155bf48 : fffffa80`075519f0 00000000`00000014 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x104
fffff880`097fb290 fffff880`0155c2f9 : fffffa80`07551900 fffffa80`06d3ea00 fffffa80`066d2700 00000000`00000000 : NETIO!StreamCommonInspect+0x228
fffff880`097fb570 fffff880`01709928 : fffffa80`075519f0 fffff880`097fb900 fffffa80`066d2730 fffffa80`04464fa0 : NETIO!WfpStreamInspectReceive+0xf9
fffff880`097fb5f0 fffff880`01738831 : fffffa80`067a7010 fffff880`097fb938 00000000`00000596 fffff880`097fb938 : tcpip!InetInspectReceive+0x48
fffff880`097fb630 fffff880`016c2743 : 00000000`cf360afb fffffa80`067a7010 fffffa80`066d2730 fffffa80`066d2730 : tcpip!TcpInspectReceive+0x71
fffff880`097fb680 fffff880`0167db78 : fffffa80`0732c470 fffffa80`0732c470 00000000`00000000 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x3dd15
fffff880`097fb840 fffff880`016829aa : fffffa80`045b7490 fffffa80`05a00100 fffffa80`04446a01 00000000`00000000 : tcpip!TcpTcbReceive+0x1e8
fffff880`097fba30 fffff880`016824f7 : fffff880`05145e22 fffffa80`0459e000 00000000`00000000 fffff880`01663800 : tcpip!TcpMatchReceive+0x1fa
fffff880`097fbb80 fffff880`016628f7 : fffffa80`0459e000 fffffa80`04475820 fffffa80`045b5000 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x177
fffff880`097fbc30 fffff880`016629b5 : 00000000`00000006 fffff880`097fbdb0 00000000`00000006 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x97
fffff880`097fbcf0 fffff880`01662ee9 : 00000000`00000006 00000000`00000000 fffff880`0176dd08 fffff880`0176d9a0 : tcpip!IppProcessDeliverList+0x45
fffff880`097fbd50 fffff880`01661d40 : 00000000`00000000 fffffa80`0459e000 fffff880`0176d9a0 00000000`059e9401 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`097fbe30 fffff880`01660642 : fffffa80`03a76af0 00000000`00000000 fffffa80`059e9401 00000000`00000001 : tcpip!IpFlcReceivePackets+0x650
fffff880`097fc030 fffff880`0167b04a : fffffa80`059e9410 fffff880`097fc160 fffffa80`059e9410 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`097fc110 fffff800`036d0e5a : fffffa80`05726e20 fffff880`097f7000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`097fc160 fffff880`0167a7f2 : fffff880`0167af70 fffff880`097fc270 00000000`00000002 fffff800`036bdcd9 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`097fc240 fffff880`014e80eb : fffffa80`059ea8d0 00000000`00000000 fffffa80`0534f1a0 00000000`00008000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`097fc2b0 fffff880`014b1fc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`097fc320 fffff880`01434a24 : fffffa80`0534f1a0 00000000`00000002 00000000`00000001 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`097fc7a0 fffff880`014349e9 : 00000000`00000246 fffff800`00000000 fffff800`038665f8 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x24
fffff880`097fc7e0 fffff880`01434980 : 00000000`00000000 00000000`00000000 ffff0000`0aa70679 fffff800`0360fae7 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
fffff880`097fc820 fffff880`03d41ba5 : fffffa80`059ea010 00000000`00000001 00000000`00000001 fffffa80`05726e20 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
fffff880`097fc860 fffffa80`059ea010 : 00000000`00000001 00000000`00000001 fffffa80`05726e20 fffffa80`00000001 : vsdatant+0x19ba5
fffff880`097fc868 00000000`00000001 : 00000000`00000001 fffffa80`05726e20 fffffa80`00000001 fffff880`01524219 : 0xfffffa80`059ea010
fffff880`097fc870 00000000`00000001 : fffffa80`05726e20 fffffa80`00000001 fffff880`01524219 00000000`041c0105 : 0x1
fffff880`097fc878 fffffa80`05726e20 : fffffa80`00000001 fffff880`01524219 00000000`041c0105 fffffa80`05726800 : 0x1
fffff880`097fc880 fffffa80`00000001 : fffff880`01524219 00000000`041c0105 fffffa80`05726800 ffff0000`0aa70be9 : 0xfffffa80`05726e20
fffff880`097fc888 fffff880`01524219 : 00000000`041c0105 fffffa80`05726800 ffff0000`0aa70be9 00000000`00000000 : 0xfffffa80`00000001
fffff880`097fc890 fffffa80`0534f1a0 : 00000000`00000008 fffffa80`05724e20 fffffa80`0534f1a0 fffff880`0144c2b7 : NETIO!MdpFree+0x79
fffff880`097fc8e0 00000000`00000008 : fffffa80`05724e20 fffffa80`0534f1a0 fffff880`0144c2b7 fffffa80`059ea010 : 0xfffffa80`0534f1a0
fffff880`097fc8e8 fffffa80`05724e20 : fffffa80`0534f1a0 fffff880`0144c2b7 fffffa80`059ea010 fffffa80`05724e20 : 0x8
fffff880`097fc8f0 fffffa80`0534f1a0 : fffff880`0144c2b7 fffffa80`059ea010 fffffa80`05724e20 fffffa80`00000000 : 0xfffffa80`05724e20
fffff880`097fc8f8 fffff880`0144c2b7 : fffffa80`059ea010 fffffa80`05724e20 fffffa80`00000000 00000000`00000008 : 0xfffffa80`0534f1a0
fffff880`097fc900 fffff880`046147d2 : fffffa80`0565b000 00000000`00000000 fffffa80`0565b5f0 fffff880`02cb31c0 : ndis! ?? ::FNODOBFM::`string'+0xccef
fffff880`097fc950 fffffa80`0565b000 : 00000000`00000000 fffffa80`0565b5f0 fffff880`02cb31c0 fffffa80`00000001 : Rt64win7+0x147d2
fffff880`097fc958 00000000`00000000 : fffffa80`0565b5f0 fffff880`02cb31c0 fffffa80`00000001 fffffa80`059e9410 : 0xfffffa80`0565b000
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
fffff880`0154ae10 41837b5003 cmp dword ptr [r11+50h],3
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4bbe946f
FAILURE_BUCKET_ID: X64_0xD1_NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
BUCKET_ID: X64_0xD1_NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000050, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800154ae10, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 0000000000000050
CURRENT_IRQL: 2
FAULTING_IP:
NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
fffff880`0154ae10 41837b5003 cmp dword ptr [r11+50h],3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880097fa810 -- (.trap 0xfffff880097fa810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000001001
rdx=fffffa800925db60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800154ae10 rsp=fffff880097fa9a0 rbp=fffffa800925d840
r8=0000000000000120 r9=0000000000000014 r10=fffffa8005a54830
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
NETIO!StreamInvokeCalloutAndNormalizeAction+0x1d0:
fffff880`0154ae10 41837b5003 cmp dword ptr [r11+50h],3 ds:00000000`00000050=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800036c0ca9 to fffff800036c1740
STACK_TEXT:
fffff880`097fa6c8 fffff800`036c0ca9 : 00000000`0000000a 00000000`00000050 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`097fa6d0 fffff800`036bf920 : fffffa80`066d2730 fffff880`097fab80 fffffa80`05a54830 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`097fa810 fffff880`0154ae10 : fffff880`097fab80 fffffa80`0925d840 fffff880`097fad80 fffffa80`05e884e0 : nt!KiPageFault+0x260
fffff880`097fa9a0 fffff880`01556a68 : 00000000`00000000 fffff880`097fad80 fffff880`097fab30 fffff880`097fabb8 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x1d0
fffff880`097faa40 fffff880`01557a61 : fffffa80`0925d840 fffff880`097fad80 fffff880`097fab80 fffff880`097fb1e0 : NETIO!StreamCalloutProcessData+0x48
fffff880`097faa90 fffff880`01558ab8 : fffff880`097fab80 fffff880`097fb1e0 fffff880`097fad01 fffffa80`0925d840 : NETIO!StreamCalloutProcessingLoop+0xa1
fffff880`097fab20 fffff880`015394fa : fffff880`097fad80 fffff880`060988e8 fffff880`00000000 fffff880`097f0014 : NETIO!StreamProcessCallout+0x1e8
fffff880`097fac10 fffff880`01522619 : fffff880`097f0014 fffff880`097fb2e0 fffffa80`07551a48 fffff880`097fb1e0 : NETIO! ?? ::FNODOBFM::`string'+0x71e2
fffff880`097fad30 fffff880`01523bb1 : fffff880`097f0014 fffff880`097fb2e0 fffff880`097fb370 fffff880`00000000 : NETIO!ArbitrateAndEnforce+0x2a9
fffff880`097fae00 fffff880`0155bad4 : fffff880`097fb5b8 fffff880`097fb2e0 fffffa80`00000001 fffff880`097fb1e0 : NETIO!KfdClassify+0x934
fffff880`097fb170 fffff880`0155bf48 : fffffa80`075519f0 00000000`00000014 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x104
fffff880`097fb290 fffff880`0155c2f9 : fffffa80`07551900 fffffa80`06d3ea00 fffffa80`066d2700 00000000`00000000 : NETIO!StreamCommonInspect+0x228
fffff880`097fb570 fffff880`01709928 : fffffa80`075519f0 fffff880`097fb900 fffffa80`066d2730 fffffa80`04464fa0 : NETIO!WfpStreamInspectReceive+0xf9
fffff880`097fb5f0 fffff880`01738831 : fffffa80`067a7010 fffff880`097fb938 00000000`00000596 fffff880`097fb938 : tcpip!InetInspectReceive+0x48
fffff880`097fb630 fffff880`016c2743 : 00000000`cf360afb fffffa80`067a7010 fffffa80`066d2730 fffffa80`066d2730 : tcpip!TcpInspectReceive+0x71
fffff880`097fb680 fffff880`0167db78 : fffffa80`0732c470 fffffa80`0732c470 00000000`00000000 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x3dd15
fffff880`097fb840 fffff880`016829aa : fffffa80`045b7490 fffffa80`05a00100 fffffa80`04446a01 00000000`00000000 : tcpip!TcpTcbReceive+0x1e8
fffff880`097fba30 fffff880`016824f7 : fffff880`05145e22 fffffa80`0459e000 00000000`00000000 fffff880`01663800 : tcpip!TcpMatchReceive+0x1fa
fffff880`097fbb80 fffff880`016628f7 : fffffa80`0459e000 fffffa80`04475820 fffffa80`045b5000 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x177
fffff880`097fbc30 fffff880`016629b5 : 00000000`00000006 fffff880`097fbdb0 00000000`00000006 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x97
fffff880`097fbcf0 fffff880`01662ee9 : 00000000`00000006 00000000`00000000 fffff880`0176dd08 fffff880`0176d9a0 : tcpip!IppProcessDeliverList+0x45
fffff880`097fbd50 fffff880`01661d40 : 00000000`00000000 fffffa80`0459e000 fffff880`0176d9a0 00000000`059e9401 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`097fbe30 fffff880`01660642 : fffffa80`03a76af0 00000000`00000000 fffffa80`059e9401 00000000`00000001 : tcpip!IpFlcReceivePackets+0x650
fffff880`097fc030 fffff880`0167b04a : fffffa80`059e9410 fffff880`097fc160 fffffa80`059e9410 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`097fc110 fffff800`036d0e5a : fffffa80`05726e20 fffff880`097f7000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`097fc160 fffff880`0167a7f2 : fffff880`0167af70 fffff880`097fc270 00000000`00000002 fffff800`036bdcd9 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`097fc240 fffff880`014e80eb : fffffa80`059ea8d0 00000000`00000000 fffffa80`0534f1a0 00000000`00008000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`097fc2b0 fffff880`014b1fc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`097fc320 fffff880`01434a24 : fffffa80`0534f1a0 00000000`00000002 00000000`00000001 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`097fc7a0 fffff880`014349e9 : 00000000`00000246 fffff800`00000000 fffff800`038665f8 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x24
fffff880`097fc7e0 fffff880`01434980 : 00000000`00000000 00000000`00000000 ffff0000`0aa70679 fffff800`0360fae7 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
fffff880`097fc820 fffff880`03d41ba5 : fffffa80`059ea010 00000000`00000001 00000000`00000001 fffffa80`05726e20 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
fffff880`097fc860 fffffa80`059ea010 : 00000000`00000001 00000000`00000001 fffffa80`05726e20 fffffa80`00000001 : vsdatant+0x19ba5
fffff880`097fc868 00000000`00000001 : 00000000`00000001 fffffa80`05726e20 fffffa80`00000001 fffff880`01524219 : 0xfffffa80`059ea010
fffff880`097fc870 00000000`00000001 : fffffa80`05726e20 fffffa80`00000001 fffff880`01524219 00000000`041c0105 : 0x1
fffff880`097fc878 fffffa80`05726e20 : fffffa80`00000001 fffff880`01524219 00000000`041c0105 fffffa80`05726800 : 0x1
fffff880`097fc880 fffffa80`00000001 : fffff880`01524219 00000000`041c0105 fffffa80`05726800 ffff0000`0aa70be9 : 0xfffffa80`05726e20
fffff880`097fc888 fffff880`01524219 : 00000000`041c0105 fffffa80`05726800 ffff0000`0aa70be9 00000000`00000000 : 0xfffffa80`00000001
fffff880`097fc890 fffffa80`0534f1a0 : 00000000`00000008 fffffa80`05724e20 fffffa80`0534f1a0 fffff880`0144c2b7 : NETIO!MdpFree+0x79
fffff880`097fc8e0 00000000`00000008 : fffffa80`05724e20 fffffa80`0534f1a0 fffff880`0144c2b7 fffffa80`059ea010 : 0xfffffa80`0534f1a0
fffff880`097fc8e8 fffffa80`05724e20 : fffffa80`0534f1a0 fffff880`0144c2b7 fffffa80`059ea010 fffffa80`05724e20 : 0x8
fffff880`097fc8f0 fffffa80`0534f1a0 : fffff880`0144c2b7 fffffa80`059ea010 fffffa80`05724e20 fffffa80`00000000 : 0xfffffa80`05724e20
fffff880`097fc8f8 fffff880`0144c2b7 : fffffa80`059ea010 fffffa80`05724e20 fffffa80`00000000 00000000`00000008 : 0xfffffa80`0534f1a0
fffff880`097fc900 fffff880`046147d2 : fffffa80`0565b000 00000000`00000000 fffffa80`0565b5f0 fffff880`02cb31c0 : ndis! ?? ::FNODOBFM::`string'+0xccef
fffff880`097fc950 fffffa80`0565b000 : 00000000`00000000 fffffa80`0565b5f0 fffff880`02cb31c0 fffffa80`00000001 : Rt64win7+0x147d2
fffff880`097fc958 00000000`00000000 : fffffa80`0565b5f0 fffff880`02cb31c0 fffffa80`00000001 fffffa80`059e9410 : 0xfffffa80`0565b000
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
fffff880`0154ae10 41837b5003 cmp dword ptr [r11+50h],3
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4bbe946f
FAILURE_BUCKET_ID: X64_0xD1_NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
BUCKET_ID: X64_0xD1_NETIO!StreamInvokeCalloutAndNormalizeAction+1d0
Followup: MachineOwner