BSOD occured in tcpip.sys when calling FwpsCompleteClassify0 for redirecting tcp connection.

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80f4b99c4b7, ffff900e0b7c5b50, 0}

Probably caused by : NETIO.SYS ( NETIO!ProcessCallout+882 )

Followup: MachineOwner

1: kd> !sym noisy
noisy mode - symbol prompts on
1: kd> kb

RetAddr : Args to Child : Call Site

00 fffff80721c7b7e9 : 000000000000003b 00000000c0000005 fffff80f4b99c4b7 ffff900e`0b7c5b50 : nt!KeBugCheckEx

01 fffff80721c7ac3c : ffff900e0b7c6308 ffff900e0b7c5b50 ffff900e0b7c6308 00000000`00000000 : nt!KiBugCheckDispatch+0x69

02 fffff80721c72aef : fffff80721f90000 fffff80721ab2000 0005b3b000a6a000 00000000`0010001f : nt!KiSystemServiceHandler+0x7c

03 fffff80721b14010 : ffff900e0b7c59f0 0000000000000000 ffff900e0b7c5910 00000000`00000000 : nt!RtlpExecuteHandlerForException+0xf

04 fffff80721bb74d4 : ffff900e0b7c6308 ffff900e0b7c6050 ffff900e0b7c6308 ffff8001`cbed5010 : nt!RtlDispatchException+0x430

05 fffff80721c7b8c2 : 0000000000000000 ffff900e0b7c63b0 0000000000001000 00000000`00000050 : nt!KiDispatchException+0x144

06 fffff80721c77bae : ffff8001c0db7978 e312422700000003 0000000000001001 00000000`00000fff : nt!KiExceptionDispatch+0xc2

07 fffff80f4b99c4b7 : ffff900e0b7c6784 0000000000000000 ffff8001b76508a0 fffff80f`4ace5e39 : nt!KiPageFault+0x42e

08 fffff80f4ae49ed2 : 0000000000000000 ffff8001cbed5010 0000000000000177 00010010`00000001 : tcpip!AlePostProcessClassify+0x47

09 fffff80f4ae4c0d9 : 0000000000000042 ffff8001cbed5010 ffff8001cc97e2c8 ffff8001`c99f25c0 : NETIO!ProcessCallout+0x882

0a fffff80f4ae48971 : ffff8001c12e2760 ffff8001cbed5010 0000000000000000 ffff900e`0b7c6a80 : NETIO!ArbitrateAndEnforce+0xba9

0b fffff80f4b99c1d4 : ffff8001b6802100 0000000000000000 fffff80721ab2000 00000000`00000000 : NETIO!KfdClassify+0x561

0c fffff80f4ae8e0fd : 00013f620000aa71 fffff80f00000001 225a71bb97e3e4ea ffffc600`4b8e6430 : tcpip!AleInspectConnectRequestComplete+0x134

0d fffff80f4b3d6200 : ffff8001cb2b89a0 ffff900e0b7c7060 ffff8001cb2b89a0 ffff8001`bf61e020 : NETIO!FeCompleteClassify+0x19d

0e fffff8072b90f716 : 0000000000000000 fffff8072b916410 ffff900e00000000 ffffc600`4cec7000 : fwpkclnt!FwpsCompleteClassify0+0x10

0f fffff8072b9098e7 : ffff8001cb2b89a0 0000000000000001 ffffe9f4fa7d3000 ffffe980`00000000 : MyDriver!tcpctx_purgeRedirectInfo+0x46

10 fffff8072b90916f : ffff8001c418e6a0 ffff900e0b7c7060 ffffc6004cec7000 00000000`00000001 : MyDriver!devctrl_processTcpConnect+0x207

11 fffff8072b9071de : 0000000000000008 fffff80700000000 0000000000000000 00000000`00000000 : MyDriver!devctrl_processRequest+0x6f

12 (Inline Function) : ---------------- ---------------- ---------------- ---------------- : MyDriver!devctrl_write+0x46

13 fffff80721b2cd79 : ffff8001be61eea0 ffff8001c0e3ec50 0000000000000000 ffff8001`c0e73080 : MyDriver!devctrl_dispatch+0x63e

14 fffff807220d2971 : ffff8001be61eea0 0000000000000000 0000000000000000 ffff8001`c0e3ec50 : nt!IofCallDriver+0x59

15 fffff807220653ed : ffff900e0b7c7440 ffff8001be61eea0 ffff900e0b7c7400 ffff900e`0b7c7440 : nt!IopSynchronousServiceTail+0x1b1

16 fffff80721c7b205 : 0000000000000600 0000000000000784 0000000000000001 00000000`04c5fbd4 : nt!NtWriteFile+0x8bd

17 0000000076e81cbc : 0000000000000000 0000000000000000 0000000000000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25

18 0000000000000000 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : 0x76e81cbc 1: kd> r rax=ffff900e0b7c5320 rbx=ffff900e0b7c73c0 rcx=000000000000003b rdx=00000000c0000005 rsi=ffff900e0b7c59f0 rdi=0000000000000000 rip=fffff80721c69fe0 rsp=ffff900e0b7c5218 rbp=ffff900e0b7c5910 r8=fffff80f4b99c4b7 r9=ffff900e0b7c5b50 r10=0000000000000000 r11=0000000021ab2000 r12=fffff80721c7b205 r13=ffff900e0b7c5410 r14=0000000000000000 r15=ffff900e0b7c6308 iopl=0 nv up ei ng nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000282 nt!KeBugCheckEx: fffff80721c69fe0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff900e`0b7c5220=000000000000003b