Now I know why we were seeing NETIO calls.
A lot of network stuff on the stack. Big tldr; Bigfoot Networks Bandwidth Control Wireless NDIS Light Weight Filter driver calls NDIS to do a lot of NBL stuff (net buffer list), and we hit an unhandled exception.
The exception occurred on this instruction, which is a compare instruction that's comparing 2 with rcx+14.
rcx's contains a noncanoncial virtual address (invalid), there an access violation occurred. In kernel-mode, that's a big no-no. This is ultimately why the 0x1E bug check was thrown.
Honestly, I've seen this before. It's always a pain because Atheros bought our Bigfoot networks (guys in charge of Killer drivers) and Atheros' drivers have a track record of absolutely horrible development.
The only thing I can really recommend is just making sure your Killer network drivers are up to date via MSI's site.
Code:
3: kd> .bugcheck
Bugcheck code 0000001E
Arguments ffffffff`c0000005 fffff880`009caba0 00000000`00000000 00000000`00000000
Code:
3: kd> knL
# Child-SP RetAddr Call Site
00 fffff880`009caae8 fffff800`02f2763b nt!KeBugCheckEx
01 fffff880`009caaf0 fffff800`02ee7b28 nt!KipFatalFilter+0x1b
02 fffff880`009cab30 fffff800`02ebf6bc nt! ?? ::FNODOBFM::`string'+0x83d
03 fffff880`009cab70 fffff800`02ebf13d nt!_C_specific_handler+0x8c
04 fffff880`009cabe0 fffff800`02ebdf15 nt!RtlpExecuteHandlerForException+0xd
05 fffff880`009cac10 fffff800`02ecee81 nt!RtlDispatchException+0x415
06 fffff880`009cb2f0 fffff800`02e92f42 nt!KiDispatchException+0x135
07 fffff880`009cb990 fffff800`02e9184a nt!KiExceptionDispatch+0xc2
08 fffff880`009cbb70 fffff880`0474c17b nt!KiGeneralProtectionFault+0x10a
09 fffff880`009cbd00 fffff880`01a72419 pacer!PcFilterSendNetBufferLists+0xb
0a fffff880`009cbe00 fffff880`01b2e5d5 ndis!ndisSendNBLToFilter+0x69
0b fffff880`009cbe60 fffff880`01c61eb6 ndis!NdisSendNetBufferLists+0x85
0c fffff880`009cbec0 fffff880`01c67afb tcpip!IpNlpFastSendDatagram+0x496
0d fffff880`009cc270 fffff880`01c886f4 tcpip!TcpTcbHeaderSend+0x47b
0e fffff880`009cc420 fffff880`01c63745 tcpip!TcpFlushDelay+0x204
0f fffff880`009cc500 fffff880`01c4667c tcpip!TcpPreValidatedReceive+0x3e5
10 fffff880`009cc5d0 fffff880`01c57712 tcpip!IpFlcReceivePreValidatedPackets+0x5bc
11 fffff880`009cc730 fffff800`02ea01f8 tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xa2
12 fffff880`009cc780 fffff880`01c57e42 nt!KeExpandKernelStackAndCalloutEx+0xd8
13 fffff880`009cc860 fffff880`01b2e0eb tcpip!FlReceiveNetBufferListChain+0xb2
14 fffff880`009cc8d0 fffff880`01af7ad6 ndis!ndisMIndicateNetBufferListsToOpen+0xdb
15 fffff880`009cc940 fffff880`01a7a5d4 ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
16 fffff880`009ccdc0 fffff880`01a7a549 ndis!ndisMTopReceiveNetBufferLists+0x24
17 fffff880`009cce00 fffff880`01a7a4e0 ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
18 fffff880`009cce40 fffff880`04cc64eb ndis!NdisFIndicateReceiveNetBufferLists+0x50
19 fffff880`009cce80 00000000`00000003 bflwfx64+0xf4eb
1a fffff880`009cce88 00000000`00000020 0x3
1b fffff880`009cce90 00000000`00000001 0x20
1c fffff880`009cce98 fffffa80`0dac19f0 0x1
1d fffff880`009ccea0 00000000`00000000 0xfffffa80`0dac19f0
A lot of network stuff on the stack. Big tldr; Bigfoot Networks Bandwidth Control Wireless NDIS Light Weight Filter driver calls NDIS to do a lot of NBL stuff (net buffer list), and we hit an unhandled exception.
Code:
3: kd> .trap fffff880`009cbb70
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=effbfa80108a0780
rdx=fffffa801270d830 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800474c17b rsp=fffff880009cbd00 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000001 r10=0000000000000000
r11=fffffa801270daae r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
pacer!PcFilterSendNetBufferLists+0xb:
fffff880`0474c17b 83791402 cmp dword ptr [rcx+14h],2 ds:effbfa80`108a0794=????????
The exception occurred on this instruction, which is a compare instruction that's comparing 2 with rcx+14.
Code:
3: kd> !pte effbfa80108a0780
VA effbfa80108a0780
PXE at FFFFF6FB7DBEDFA8 PPE at FFFFF6FB7DBF5000 PDE at FFFFF6FB7EA00420 PTE at FFFFF6FD40084500
Unable to get PXE FFFFF6FB7DBEDFA8
WARNING: noncanonical VA, accesses will fault !
rcx's contains a noncanoncial virtual address (invalid), there an access violation occurred. In kernel-mode, that's a big no-no. This is ultimately why the 0x1E bug check was thrown.
Honestly, I've seen this before. It's always a pain because Atheros bought our Bigfoot networks (guys in charge of Killer drivers) and Atheros' drivers have a track record of absolutely horrible development.
The only thing I can really recommend is just making sure your Killer network drivers are up to date via MSI's site.