Solved Windows 8 restarting

Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007F, {8, 8113d000, 0, 0}

*** WARNING: Unable to verify timestamp for cnnctfy2.sys
*** ERROR: Module load completed but symbols could not be loaded for cnnctfy2.sys
[B]Probably caused by : NETIO.SYS[/B] ( NETIO!ProcessCallout+21 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
Arg2: 8113d000
Arg3: 00000000
Arg4: 00000000

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from 8850e3fc to 8850d9d1

STACK_TEXT:  
81137078 8850e3fc 0000003b 85e26b28 81137150 NETIO!ProcessCallout+0x21
81137100 829d4776 0000003b 85e26b28 81137150 NETIO!KfdDirectClassify+0xf5
8113731c 829d487a 0000003b 00000000 00000000 wfplwfs!L2pNativeLayerDirectClassify+0x220
811373a4 829d406a 0000003b 00000000 811373d8 wfplwfs!L2NativeIsNetBufferListPermitted+0x9a
811373e4 829d4e16 00000001 0000003b 8113742c wfplwfs!L2InspectNetBufferLists+0x65
81137420 88440ab4 85d81e60 86a4b2b0 00000000 wfplwfs!LwfLowerSendNetBufferLists+0x4d
811374b8 88440ed7 01d268d8 00000000 03000000 ndis!ndisInvokeNextSendHandler+0xda
81137530 8e39c7a4 878548b0 84d268d8 00000000 ndis!NdisSendNetBufferLists+0x1dc
81137554 8e39838d 86a0dea8 876c1950 00000000 raspppoe!PrSend+0x93
81137580 8e398175 876c1950 87375018 84ce7638 raspppoe!MpSendPacketOnCall+0x1d1
811375a0 8846d74a 876c1950 87375018 00000000 raspppoe!MpCoSendNetBufferListChain+0xd6
811375b8 8846d3c9 846440c0 87375018 00000000 ndis!ndisCoSendNetBufferListsToNetBufferLists+0x3c
811375cc 8d39135d 846440c0 87375018 00000000 ndis!NdisCoSendNetBufferLists+0x15
811375f4 8d37e6f2 811376dc 8d37e72c 877a3648 ndiswan!SendOnLink+0x220
811376dc 8d3906e0 8557a008 84d068b8 87375018 ndiswan!FramePacketFast+0x1a5
8113771c 8d3910a6 0157a008 84d068b8 877a3648 ndiswan!SendFromProtocol+0x120
81137764 8d37ede9 8557a008 87375018 877a3648 ndiswan!SendPacketOnBundle+0x1c6
811377a8 8d37bd6b 856c2e28 87375018 87375018 ndiswan!NdisWanQueueSend+0x422
811377d0 88440c67 856c2e28 87375018 00000000 ndiswan!MPSendNetBufferListChain+0x146
81137868 88440ed7 00000000 8d37bc2d 856410e8 ndis!ndisInvokeNextSendHandler+0x28e
811378e0 8d2b4820 856ce450 85c54018 00000000 ndis!NdisSendNetBufferLists+0x1dc
8113793c 828746f7 84ce6f18 00000000 00000000 wanarp!WanIpSendPackets+0x230
811379b0 828740d2 82945fc8 00000000 00000000 tcpip!IppFragmentPackets+0x222
81137a30 82873a2a 82945fc8 84de9444 84de9444 tcpip!IppDispatchSendPacketHelper+0x3eb
81137ae0 828728e4 00000000 829460a0 00000000 tcpip!IppPacketizeDatagrams+0x2b0
81137b8c 828799f0 00000007 82945fc8 85083330 tcpip!IppSendDatagramsCommon+0x66a
81137ba8 8285ebe9 84df6ed8 81137c40 00000000 tcpip!IpNlpSendDatagrams+0x42
81137d7c 82868046 00000002 00000000 0054071f tcpip!TcpTcbSend+0x6a4
81137dd0 8283a3bb 00000000 0054071f 84649890 tcpip!TcpFlushDelay+0x4e7
81137e28 8283a683 85584ad0 85584bc8 00000001 tcpip!TcpDeliverInput+0x16a
81137e8c 8283a6cb 85407ee0 81137ee0 8d5d2492 tcpip!TcpRequestReceive+0x1a7
81137e98 8d5d2492 85584ad0 81137ec0 855fec18 tcpip!TcpTlConnectionReceive+0x1a
81137ee0 8d5c7978 855fec18 85407ee0 85407f98 tdx!TdxReceiveConnection+0x239
81137fb0 82861992 855fec18 81137fec 85584b10 tdx!TdxEventReceiveConnection+0x330
81138068 82860204 85584bc8 81138154 811380a0 tcpip!TcpIndicateData+0x14a
81138134 82841072 81138174 00000000 0054071f tcpip!TcpDeliverDataToClient+0xa6
811381a4 828af27c 85584bc8 84760780 00000594 tcpip!TcpDeliverReceive+0x79
811381dc 828641c8 01584ad0 85584bc8 84760780 tcpip!TcpInspectReceive+0xba
81138364 8284f1d7 84dfddd8 811383d0 84dc6fd0 tcpip! ?? ::FNODOBFM::`string'+0x15635
81138418 82843984 85584ad0 811384a8 00000000 tcpip!TcpTcbReceive+0x2eb
8113849c 8284f73b 84dfddd8 84dee000 00000000 tcpip!TcpMatchReceive+0x1b6
81138524 8285fb1b 84dfddd8 84dee000 00000001 tcpip!TcpPreValidatedReceive+0x3d4
8113854c 82881462 8113855c 82945fc8 84dfddd8 tcpip!TcpNlClientReceiveDatagrams+0x3d
81138578 828810d0 00000006 00000000 82945fc8 tcpip!IppDeliverListToProtocol+0x3a
811385b4 82880bc9 82945fc8 81138614 8113860c tcpip!IppProcessDeliverList+0x53
81138640 8287fdc9 82945fc8 811386a0 84ce6f18 tcpip!IppReceiveHeaderBatch+0x1c1
81138738 8d2a8609 874b8748 84760780 00000001 tcpip!IpFlcReceivePackets+0x681
811387ac 8843ce6f 0cabb1e4 85cb8018 00000000 wanarp!WanNdisReceivePackets+0x459
811387f4 8848ff82 856ce450 85cb8018 00000000 ndis!ndisMIndicateNetBufferListsToOpen+0x262
8113884c 8843ca02 856410e8 85cb8018 00000000 ndis! ?? ::FNODOBFM::`string'+0xcdc0
811388cc 8848d1e5 85cb8018 00000000 00000001 ndis!ndisInvokeNextReceiveHandler+0x3fc
8113890c 8843c47d 856ce710 85cb8018 00000000 ndis! ?? ::FNODOBFM::`string'+0x7e0a
8113892c 8cf9abfa 856ce710 85cb8018 00000000 ndis!NdisFIndicateReceiveNetBufferLists+0x28
81138970 88473066 856bca08 85cb8018 00000000 pacer!PcFilterReceiveNetBufferLists+0xde
8113898c 88440058 8cf9ab1c 856bca08 85cb8018 ndis!ndisCallReceiveHandler+0x17
811389ac 81c29536 81138a60 b929fd9e 856ce710 ndis!ndisDataPathExpandStackCallback+0x24
81138a24 81c29195 88440034 81138a60 00001000 nt!KeExpandKernelStackAndCalloutInternal+0x38b
81138a44 8844b3dd 88440034 81138a60 00001000 nt!KeExpandKernelStackAndCalloutEx+0x1f
81138a80 8848e223 85cb8018 00000000 00000001 ndis!ndisExpandDataPathStack+0x47
81138b00 8848d1e5 85cb8018 00000000 00000001 ndis! ?? ::FNODOBFM::`string'+0x8ea2
81138b40 8843c47d 856c0800 85cb8018 00000000 ndis! ?? ::FNODOBFM::`string'+0x7e0a
81138b60 8d40ebba 856c0800 85cb8018 00000000 ndis!NdisFIndicateReceiveNetBufferLists+0x28
WARNING: Stack unwind information not available. Following frames may be wrong.
81138b88 8d40fa04 856bd780 00000000 85258a00 cnnctfy2+0x1bba
81138bb0 8d40e69e 856bd780 85258a00 00000001 cnnctfy2+0x2a04
81138bd4 8d40e769 006bd780 851b26d0 856c0800 cnnctfy2+0x169e
81138bfc 8843c707 856bd780 00000000 00000000 cnnctfy2+0x1769
81138c78 8843cba7 851b26d0 00000000 00000001 ndis!ndisInvokeNextReceiveHandler+0xf9
81138cc4 8d38e5f2 856410e8 851b26d0 00000000 ndis!NdisMIndicateReceiveNetBufferLists+0x155
81138d28 8d38e818 8557a008 847b9a50 854ab550 ndiswan!IndicateRecvPacket+0x493
81138d70 8d38f03d 8557a008 847b9a50 84ce7638 ndiswan!ProcessPPPFrame+0x13b
81138d90 8d37c395 84ce7638 847b9a50 847ff3d0 ndiswan!ReceivePPP+0xc7
81138dc4 8846d85a 86808eb0 854ab458 847b9a50 ndiswan!ProtoCoReceiveNetBufferListChain+0x366
81138df8 8846d38d 8615d360 854ab3a8 00000001 ndis!ndisMCoIndicateReceiveNetBufferListsToNetBufferLists+0xb1
81138e10 8e399191 8615d360 854ab3a8 00000001 ndis!NdisMCoIndicateReceiveNetBufferLists+0x18
81139434 8e39c491 8479ae28 00000000 878548b0 raspppoe!MpRecvPacket+0x228


STACK_COMMAND:  kb

FOLLOWUP_IP: 
NETIO!ProcessCallout+21
8850d9d1 56              push    esi

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  NETIO!ProcessCallout+21

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  505aa973

BUCKET_ID_FUNC_OFFSET:  21

FAILURE_BUCKET_ID:  0x7f_8_NETIO!ProcessCallout

BUCKET_ID:  0x7f_8_NETIO!ProcessCallout

Followup: MachineOwner
---------

I'm no BSOD expert but I have the tools installed, the dump is blaming NETIO.SYS (networking) so to start maybe try to find an updated network driver.
 

My Computers

System One System Two

  • OS
    Windows 10
    Computer type
    PC/Desktop
    System Manufacturer/Model
    me
    CPU
    i9
Back
Top