BSOD Fast help?!
UNEXPECTED_KERNEL_MODE_TRAP (7f) This means a trap occurred in kernel mode, and it's a trap of a kind that the kernel isn't allowed to have/catch (bound trap) or that is always instant death (double fault). The first number in the bugcheck params is the number of the trap (8 = double fault, etc) Consult an Intel x86 family manual to learn more about what these traps are. Here is a *portion* of those codes: If kv shows a taskGate use .tss on the part before the colon, then kv. Else if kv shows a trapframe use .trap on that value Else .trap on the appropriate frame will show where the trap was taken (on x86, this will be the ebp that goes with the procedure KiTrap) Endif kb will then show the corrected stack. Arguments: Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT Arg2: 0000000080050033 Arg3: 00000000000006f8 Arg4: fffff80003091ec0 Debugging Details: ------------------ BUGCHECK_STR: 0x7f_8 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from fffff800030c8ca9 to fffff800030c9740 STACK_TEXT: fffff880`03169ce8 fffff800`030c8ca9 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx fffff880`03169cf0 fffff800`030c7172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff880`03169e30 fffff800`03091ec0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2 fffff880`02d1ce40 fffff880`01915c5a : 0e506e9b`ecae37b4 d499fd96`051ac8fe abb30640`6a038841 3289d0cb`4a8817f0 : nt!SeAccessCheckFromState+0x58 fffff880`02d1d530 fffff880`0191394f : 77319ae9`021ab99a b7ac2b97`00264cc1 00000000`f2de869c 00000000`00000000 : NETIO!CompareSecurityContexts+0x6a fffff880`02d1d5a0 fffff880`019159b5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!MatchValues+0xef fffff880`02d1d5f0 fffff880`01915845 : fffffa80`08314110 fffffa80`095a1720 fffff880`02d1d818 fffff880`02d1df50 : NETIO!FilterMatch+0x95 fffff880`02d1d640 fffff880`01916ccb : 00000000`00000000 00000000`00000000 fffff880`02d1df50 fffff880`02d1d800 : NETIO!IndexListClassify+0x69 fffff880`02d1d6c0 fffff880`01a3f417 : fffff880`02d1db98 fffff880`02d1db98 fffff880`02d1e8d0 fffffa80`0704d030 : NETIO!KfdClassify+0xa4e fffff880`02d1da30 fffff880`01a3883e : fffff880`01b47690 00000000`00000000 fffffa80`082155c0 00000000`00000000 : tcpip!WfpAleClassify+0x57 fffff880`02d1da70 fffff880`01a37cd5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!WfpAlepAuthorizeSend+0x94e fffff880`02d1e180 fffff880`01a3b886 : 00000000`00000000 00000000`00000000 00000000`00000011 00000000`00000000 : tcpip!WfpAleAuthorizeSend+0x325 fffff880`02d1e450 fffff880`01a3e5e4 : 00000000`00000000 fffff880`02d1e888 fffff880`02d1e890 00000000`00000000 : tcpip!WfpAleConnectAcceptIndicate+0x106 fffff880`02d1e540 fffff880`01a37019 : 00000000`00000006 fffff800`0318cc2b 00000000`00000001 00000000`00000008 : tcpip!ProcessALEForTransportPacket+0x664 fffff880`02d1e7b0 fffff880`01a65ef6 : 00000000`00000000 fffffa80`00000002 fffffa80`08b98900 fffffa80`08b98900 : tcpip!WfpProcessOutTransportStackIndication+0x329 fffff880`02d1e980 fffff880`01a6b1ee : fffffa80`08b985d0 fffff880`01911804 fffff880`01b6d9a0 fffffa80`082155c0 : tcpip!IppSendDatagramsCommon+0x526 fffff880`02d1ec50 fffff880`01a35db8 : fffffa80`082155c0 fffffa80`0704d030 fffffa80`0704d030 fffffa80`08b985d0 : tcpip!IpNlpSendDatagrams+0x3e fffff880`02d1ec90 fffff880`01a3632d : fffffa80`04dfed80 fffffa80`0906b260 fffff880`02d1f5e0 00000000`00000000 : tcpip!UdpSendMessagesOnPathCreation+0x688 fffff880`02d1f010 fffff880`01a35fb5 : fffff880`02d1f540 fffffa80`08218900 fffffa80`00000001 fffffa80`09d1bad0 : tcpip!UdpSendMessages+0x35d fffff880`02d1f400 fffff800`030d8e5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15 fffff880`02d1f430 fffff880`01a36578 : fffff880`01a35fa0 fffff880`02d1f540 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda fffff880`02d1f510 fffff880`04350f45 : fffffa80`050727f0 fffffa80`081bd750 fffffa80`0820d4e0 fffffa80`09b3f65e : tcpip!UdpTlProviderSendMessages+0x78 fffff880`02d1f590 fffff880`04350ff2 : fffffa80`00000002 fffffa80`07671c20 fffffa80`06fb6dc0 fffff880`00000014 : tdx!TdxSendDatagramTransportAddress+0x2f5 fffff880`02d1f670 fffff880`0437d57f : fffffa80`06fb6c60 fffff800`030d93fb fffffa80`082163f0 fffffa80`09b3f470 : tdx!TdxTdiDispatchInternalDeviceControl+0x52 fffff880`02d1f6a0 fffff880`0437dc41 : 00000000`00000000 00000000`0000003e fffffa80`082163f0 fffffa80`04974170 : avgtdia+0x457f fffff880`02d1f6d0 fffff880`04002542 : fffffa80`09b3f470 fffffa80`082163f0 00000000`00000000 fffffa80`06fb6c60 : avgtdia+0x4c41 fffff880`02d1f700 fffff880`04002f61 : fffffa80`09b3f628 fffffa80`09b3f628 fffffa80`081073b0 fffff880`02d1f800 : netbt!TdiSendDatagram+0x187 fffff880`02d1f770 fffff880`0400f329 : fffffa80`07aa92d0 fffffa80`09b3f470 00000000`00000021 00000000`0000003e : netbt!UdpSendDatagram+0x1b1 fffff880`02d1f800 fffff880`0400f0e6 : 00000000`00000000 00000000`00000000 00000000`00000032 fffff880`04020089 : netbt!UdpSendResponse+0x4e0 fffff880`02d1f880 fffff880`04003be7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : netbt!QueryFromNet+0xb11 fffff880`02d1f9b0 fffff880`04001b47 : 00000000`00000032 fffff880`05e36044 00000000`00000032 fffffa80`0820d402 : netbt!NameSrvHndlrNotOs+0xca fffff880`02d1f9f0 fffff880`0434f325 : fffffa80`09070130 fffffa80`08200002 fffff880`02d1fcf8 fffffa80`09070130 : netbt!TdiRcvNameSrvHandler+0x367 fffff880`02d1fa90 fffff880`01a41395 : fffffa80`0820d390 00000000`00000000 fffffa80`0820d390 fffffa80`0820d390 : tdx!TdxEventReceiveMessagesTransportAddress+0x315 fffff880`02d1fc80 fffff880`01a418a4 : fffffa80`00000000 fffffa80`0820d390 00000000`00000000 fffff880`05e3603c : tcpip!UdpDeliverDatagrams+0x155 fffff880`02d1fe10 fffff880`01a5f727 : fffffa80`051d5e30 fffff880`00000000 fffffa80`08b9c670 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x324 fffff880`02d1ff00 fffff880`01a5f799 : fffff880`02d20080 fffff880`01b6d9a0 fffff880`02d20090 fffffa80`05043a10 : tcpip!IppDeliverListToProtocol+0xf7 fffff880`02d1ffc0 fffff880`01a5fc90 : fffff880`01b6d9a0 fffffa80`09f73f50 00000000`00000011 fffff880`02d20080 : tcpip!IppProcessDeliverList+0x59 fffff880`02d20030 fffff880`01a5eb21 : 00000000`ff01a8c0 fffffa80`051d1138 fffff880`01b6d9a0 00000000`078d0a01 : tcpip!IppReceiveHeaderBatch+0x231 fffff880`02d20110 fffff880`01b36542 : fffffa80`08b93cb0 00000000`00000000 fffffa80`078d0a01 fffff880`00000001 : tcpip!IpFlcReceivePackets+0x651 fffff880`02d20310 fffff880`019a3afa : fffffa80`0a15a602 fffffa80`0a15a600 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2 fffff880`02d20350 fffff880`02e4837f : fffffa80`08354170 fffffa80`078d0a00 00000000`00000000 00000000`00000000 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256 fffff880`02d20400 fffff880`02e4759c : fffffa80`078d0a00 fffffa80`07693b00 fffffa80`09b88148 fffffa80`09b88010 : vsdatant+0x1637f fffff880`02d20490 fffff880`02e40ca1 : fffffa80`078d0a00 fffffa80`078d0a00 fffff880`02d20d00 fffffa80`078d0af8 : vsdatant+0x1559c fffff880`02d20590 fffff880`0192c57f : fffff880`02d20c78 fffff880`02d20d90 fffffa80`047a2740 fffffa80`08dc0630 : vsdatant+0xeca1 fffff880`02d206c0 fffff880`01915619 : 00000000`00000018 fffff880`02d20c78 fffffa80`09d1bb28 fffffa80`047a2740 : NETIO! ?? ::FNODOBFM::`string'+0x7267 fffff880`02d207e0 fffff880`01916bb1 : 00000000`00000018 fffff880`02d20c78 fffff880`02d20d90 fffff880`00000000 : NETIO!ArbitrateAndEnforce+0x2a9 fffff880`02d208b0 fffff880`01b00fbb : fffff880`02d212c8 fffff880`02d20c78 fffff880`00000000 fffffa80`047a2740 : NETIO!KfdClassify+0x934 fffff880`02d20c20 fffff880`01a04d10 : 00000000`00000000 fffffa80`082155c0 fffffa80`09d1bc30 00000000`00000000 : tcpip!WFPDatagramDataShimV4+0x49b fffff880`02d20f80 fffff880`01a8073d : fffff880`02d213d8 fffff880`0181e28a fffffa80`05052f20 fffffa80`047a2740 : tcpip! ?? ::FNODOBFM::`string'+0x2b43f fffff880`02d211f0 fffff880`01a40050 : fffffa80`082155c0 00000000`00000000 00000000`00000002 00000000`00000000 : tcpip!ProcessAleForNonTcpIn+0x1ad fffff880`02d21310 fffff880`01a70fe1 : fffffa80`00000011 fffffa80`08200002 fffffa80`051d8900 00000000`00008900 : tcpip!WfpProcessInTransportStackIndication+0xb10 fffff880`02d21680 fffff880`01a40f63 : fffffa80`0820d390 fffffa80`051dc380 00000000`00000000 fffffa80`051d1000 : tcpip!InetInspectReceiveDatagram+0x121 fffff880`02d21720 fffff880`01a41315 : fffffa80`0820d390 00000000`00000000 00000000`00000000 fffffa80`07e59800 : tcpip!UdpBeginMessageIndication+0x83 fffff880`02d21870 fffff880`01a418a4 : fffffa80`00000000 fffffa80`0820d390 00000000`00000000 fffff880`05e3603c : tcpip!UdpDeliverDatagrams+0xd5 fffff880`02d21a00 fffff880`01a5f727 : fffffa80`051d5e30 fffff880`00000000 fffffa80`08b9c670 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x324 fffff880`02d21af0 fffff880`01a5f799 : fffff880`02d21c70 fffff880`01b6d9a0 fffff880`02d21c80 fffffa80`05043a10 : tcpip!IppDeliverListToProtocol+0xf7 fffff880`02d21bb0 fffff880`01a5fc90 : fffff880`01b6d9a0 fffffa80`08043500 00000000`00000011 fffff880`02d21c70 : tcpip!IppProcessDeliverList+0x59 fffff880`02d21c20 fffff880`01a5eb21 : 00000000`ff01a8c0 fffffa80`051d1000 fffff880`01b6d9a0 00000000`08b9b301 : tcpip!IppReceiveHeaderBatch+0x231 fffff880`02d21d00 fffff880`01a5d592 : fffffa80`08b93cb0 00000000`00000000 fffffa80`08b9b301 00000000`00000001 : tcpip!IpFlcReceivePackets+0x651 fffff880`02d21f00 fffff880`01a76e5a : fffffa80`08b9b320 fffff880`02d22030 fffffa80`08b9b320 fffff880`05e40000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2 fffff880`02d21fe0 fffff800`030d8e5a : fffffa80`047a2740 fffff880`02d1d000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda fffff880`02d22030 fffff880`01a76882 : fffff880`01a76d80 fffff880`02d22140 fffff880`efffff02 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda fffff880`02d22110 fffff880`018db0eb : fffffa80`07e598d0 00000000`00000000 fffffa80`079241a0 fffffa80`079241a0 : tcpip!FlReceiveNetBufferListChain+0xb2 fffff880`02d22180 fffff880`018a4fc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb fffff880`02d221f0 fffff880`01827a24 : fffffa80`079241a0 00000000`00000002 00000000`00000001 00000000`00000000 : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6 fffff880`02d22670 fffff880`018279e9 : 00000000`00000004 fffff880`0181efbf fffffa80`00000002 fffffa80`089404f0 : ndis!ndisMTopReceiveNetBufferLists+0x24 fffff880`02d226b0 fffff880`01827980 : fffff880`05e36012 fffffa80`08b91010 ffff0000`003b474f fffff880`06959355 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29 fffff880`02d226f0 fffff880`02e4bba5 : fffffa80`07e586b0 00000000`00000000 00000000`00000001 fffffa80`047a2740 : ndis!NdisFIndicateReceiveNetBufferLists+0x50 fffff880`02d22730 fffff880`018279e9 : fffffa80`07e586b0 fffffa80`047a2740 fffffa80`00000000 00000000`00000001 : vsdatant+0x19ba5 fffff880`02d227d0 fffff880`01827980 : fffff880`069935c0 fffffa80`08b91010 fffffa80`08b88810 00000000`00000001 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29 fffff880`02d22810 fffff880`0695c7ee : fffffa80`08b91010 00000000`00000000 fffffa80`047a2740 fffff880`069935c0 : ndis!NdisFIndicateReceiveNetBufferLists+0x50 fffff880`02d22850 fffff880`018279e9 : fffffa80`08065c90 00000000`00000000 00000000`00000001 fffff880`059080c7 : nwifi!Pt6Receive+0x296 fffff880`02d228b0 fffff880`01827980 : 00000000`00000001 fffff880`02f000bc fffffa80`080ab328 fffff880`05e36000 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29 fffff880`02d228f0 fffff880`02efc9c0 : fffff880`02f03110 00000000`00000001 00000000`00000001 fffffa80`080abd78 : ndis!NdisFIndicateReceiveNetBufferLists+0x50 fffff880`02d22930 fffff880`0183f2b7 : fffffa80`079241a0 fffffa80`0804e1f0 fffffa80`0804e1f0 00000000`00000001 : vwififlt!FilterReceiveNetBufferLists+0x158 STACK_COMMAND: kb FOLLOWUP_IP: NETIO!CompareSecurityContexts+6a fffff880`01915c5a 448b442470 mov r8d,dword ptr [rsp+70h] SYMBOL_STACK_INDEX: 4 SYMBOL_NAME: NETIO!CompareSecurityContexts+6a FOLLOWUP_NAME: MachineOwner MODULE_NAME: NETIO IMAGE_NAME: NETIO.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 4bbe946f FAILURE_BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a BUCKET_ID: X64_0x7f_8_NETIO!CompareSecurityContexts+6a Followup: MachineOwner --------- 2: kd> lmvm NETIO start end module name fffff880`0190f000 fffff880`0196f000 NETIO (pdb symbols) c:\users\simon\desktop\symboler\netio.pdb\8422557063CC44C8B9525A086FA98C032\netio.pdb Loaded symbol image file: NETIO.SYS Image path: \SystemRoot\system32\drivers\NETIO.SYS Image name: NETIO.SYS Timestamp: Fri Apr 09 04:43:59 2010 (4BBE946F) CheckSum: 0005CFA1 ImageSize: 00060000 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4 It seems to be NETIO.sys but i've read alot of threads where the netio gives the bsod when it's really caused by something else, so you guys, please help me.
December 20th, 2010 3:28am

Bug check code 0x7F:The UNEXPECTED_KERNEL_MODE_TRAP bug check has a value of 0x0000007F. This bug check indicates that the Intel CPU generated a trap and the kernel failed to catch this trap. This trap could be a bound trap (a trap the kernel is not permitted to catch) or a double fault (a fault that occurred while processing an earlier fault, which always results in a system failure). Have a look to this Microsoft article for resolution. This posting is provided "AS IS" with no warranties or guarantees , and confers no rights. Microsoft Student Partner Microsoft Certified Professional Microsoft Certified Systems Administrator: Security Microsoft Certified Systems Engineer: Security Microsoft Certified Technology Specialist: Windows Server 2008 Active Directory, Configuration Microsoft Certified Technology Specialist: Windows Server 2008 Network Infrastructure, Configuration
Free Windows Admin Tool Kit Click here and download it now
December 20th, 2010 4:22am

Bug Check 0x7F: UNEXPECTED_KERNEL_MODE_TRAP 0x00000008 , or Double Fault , indicates that an exception occurs during a call to the handler for a prior exception. Typically, the two exceptions are handled serially. However, there are several exceptions that cannot be handled serially, and in this situation the processor signals a double fault. There are two common causes of a double fault: * A kernel stack overflow. This overflow occurs when a guard page is hit, and the kernel tries to push a trap frame. Because there is no stack left, a stack overflow results, causing the double fault. * A hardware problem. It may caused by ZoneAlarm, which you have installed. Update the network drivers first . You can also try this Hotfix if updating the network driver doesn't fix it: Stop error message when you run an application that transfers data by using the UDP protocol in Windows Server 2008 R2 or in Windows 7: "STOP 0x0000007F" http://support.microsoft.com/kb/981180/en-us When this doesn't fix it, remove ZoneAlarm. best regards André"A programmer is just a tool which converts caffeine into code" CLIP- Stellvertreter http://www.winvistaside.de/
December 20th, 2010 11:58am

Thx alot to both of you, the bluescreens are quite rarely so i'll guess it'll be a while before i've runned trough all steps. When it's done i'll be posting here to tell you which one did stop the issue. Thanks!
Free Windows Admin Tool Kit Click here and download it now
December 20th, 2010 5:20pm

You have this driver vsdatant in the call stack and this is ZoneAlarm. So update the driver, install the hotfix and if this doesn't fix it, remove ZoneAlarm."A programmer is just a tool which converts caffeine into code" CLIP- Stellvertreter http://www.winvistaside.de/
December 20th, 2010 5:55pm

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics