Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\051611-23571-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
Machine Name:
Kernel base = 0xfffff800`02a1c000 PsLoadedModuleList = 0xfffff800`02c59e50
Debug session time: Mon May 16 07:51:31.432 2011 (UTC - 4:00)
System Uptime: 0 days 0:01:22.508
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {5010, fffff780c0000000, 1c94, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+2c00f )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005010, The subtype of the bugcheck.
Arg2: fffff780c0000000
Arg3: 0000000000001c94
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_5010
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: uTorrent.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002a30316 to fffff80002a8c700
STACK_TEXT:
fffff880`0a5792a8 fffff800`02a30316 : 00000000`0000001a 00000000`00005010 fffff780`c0000000 00000000`00001c94 : nt!KeBugCheckEx
fffff880`0a5792b0 fffff800`02da1f0d : fffff980`0b866000 fffff8a0`021c7260 00000000`00000001 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x2c00f
fffff880`0a579590 fffff800`02aa5567 : 00000000`014c0000 fffffa80`039c6fc0 00000000`00000000 00000000`01600000 : nt!CcUnmapVacb+0x5d
fffff880`0a5795d0 fffff800`02aab3b5 : fffff980`00000001 00000000`00e00000 fffffa80`07f2ee10 00000000`00000001 : nt!CcUnmapVacbArray+0x1b7
fffff880`0a579660 fffff800`02da8692 : 00000000`00e00000 00000000`01600000 fffff880`0a579730 fffff880`0a5797c0 : nt!CcGetVirtualAddress+0x2c5
fffff880`0a5796f0 fffff880`012bcd28 : fffff880`00000000 00000000`00000005 fffffa80`0000ac00 fffffa80`00020001 : nt!CcCopyRead+0x132
fffff880`0a5797b0 fffff880`00c360c8 : fffffa80`07f90a20 fffffa80`07ebe258 fffffa80`00000000 fffffa80`07f90a01 : Ntfs!NtfsCopyReadA+0x1a8
fffff880`0a579980 fffff880`00c39c2a : fffff880`0a579a50 00000000`03750003 00000000`03750000 fffffa80`07f90a00 : fltmgr!FltpPerformFastIoCall+0x88
fffff880`0a5799e0 fffff880`00c575f0 : fffffa80`07f90a20 00000000`00000000 fffff880`0a579b40 00000000`00020000 : fltmgr!FltpPassThroughFastIo+0xda
fffff880`0a579a20 fffff800`02da8ff9 : fffffa80`07f90a20 fffffa80`00000001 fffffa80`039f4360 fffffa80`07f90a20 : fltmgr!FltpFastIoRead+0x1d0
fffff880`0a579ac0 fffff800`02a8b953 : 00000000`00000104 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x417
fffff880`0a579bb0 00000000`73712dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`006af0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x73712dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+2c00f
fffff800`02a30316 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+2c00f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fdd34
FAILURE_BUCKET_ID: X64_0x1a_5010_nt!_??_::FNODOBFM::_string_+2c00f
BUCKET_ID: X64_0x1a_5010_nt!_??_::FNODOBFM::_string_+2c00f
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\051611-23821-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
Machine Name:
Kernel base = 0xfffff800`02a18000 PsLoadedModuleList = 0xfffff800`02c55e50
Debug session time: Mon May 16 07:48:53.733 2011 (UTC - 4:00)
System Uptime: 0 days 7:28:24.793
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffff880030470a0, 2, 0, fffff80002ab5940}
Probably caused by : ntkrnlmp.exe ( nt!RtlDispatchException+240 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff880030470a0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ab5940, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc00e0
fffff880030470a0
CURRENT_IRQL: 2
FAULTING_IP:
nt!RtlDispatchException+240
fffff800`02ab5940 498b02 mov rax,qword ptr [r10]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: uTorrent.exe
TRAP_FRAME: fffff88003045c50 -- (.trap 0xfffff88003045c50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000024 rbx=0000000000000000 rcx=fffff80002ab5a67
rdx=00000000000001d8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ab5940 rsp=fffff88003045de0 rbp=000000000000022c
r8=0000000000000000 r9=000000000000083c r10=fffff880030470a0
r11=fffff88003045e28 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz ac pe nc
nt!RtlDispatchException+0x240:
fffff800`02ab5940 498b02 mov rax,qword ptr [r10] ds:6d78:fffff880`030470a0=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a87c69 to fffff80002a88700
STACK_TEXT:
fffff880`03045b08 fffff800`02a87c69 : 00000000`0000000a fffff880`030470a0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`03045b10 fffff800`02a868e0 : fffff880`02d52110 00000000`00000024 fffffa80`079811d0 fffff800`02bbd2dd : nt!KiBugCheckDispatch+0x69
fffff880`03045c50 fffff800`02ab5940 : fffff800`02a87eac fffff880`03045e28 00000000`00000001 fffff880`0837a3a0 : nt!KiPageFault+0x260
fffff880`03045de0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlDispatchException+0x240
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!RtlDispatchException+240
fffff800`02ab5940 498b02 mov rax,qword ptr [r10]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!RtlDispatchException+240
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fdd34
FAILURE_BUCKET_ID: X64_0xA_nt!RtlDispatchException+240
BUCKET_ID: X64_0xA_nt!RtlDispatchException+240
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\051611-16582-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
Machine Name:
Kernel base = 0xfffff800`02a12000 PsLoadedModuleList = 0xfffff800`02c4fe50
Debug session time: Mon May 16 09:09:05.301 2011 (UTC - 4:00)
System Uptime: 0 days 1:16:20.737
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff88006ad2b90, 0, 0}
Unable to load image Darusb_win7x.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Darusb_win7x.sys
*** ERROR: Module load completed but symbols could not be loaded for Darusb_win7x.sys
Probably caused by : nwifi.sys ( nwifi!Dot11SendCompletion+44 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88006ad2b90, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
+3661376264666230
fffff880`06ad2b90 a83a test al,3Ah
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cba0e0
0000000000000000
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff88006ad3aa8 -- (.exr 0xfffff88006ad3aa8)
ExceptionAddress: fffff8800604fc04 (nwifi!Dot11TXCompletion)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff88006ad3b50 -- (.trap 0xfffff88006ad3b50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800494b9b0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800604fc04 rsp=fffff88006ad3ce8 rbp=0000000000000000
r8=7d10b8c9631b835c r9=fffffa800799a010 r10=fffffa8005bafd80
r11=fffffa8004d24c30 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nwifi!Dot11TXCompletion:
fffff880`0604fc04 f0418380e0000000ff lock add dword ptr [r8+0E0h],0FFFFFFFFh ds:b280:7d10b8c9`631b843c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002b14aeb to fffff80002a82700
STACK_TEXT:
fffff880`06ad2ad8 fffff800`02b14aeb : 00000000`0000001e ffffffff`c0000005 fffff880`06ad2b90 00000000`00000000 : nt!KeBugCheckEx
fffff880`06ad2ae0 fffff800`02ad3e78 : fffff880`06ad2d10 00000000`00000000 00000000`00000000 ffffffff`00000000 : nt!KipFatalFilter+0x1b
fffff880`06ad2b20 fffff800`02ab0d9c : fffff880`06ad33d0 00000000`00000000 00000000`00000001 fffffa80`07849080 : nt! ?? ::FNODOBFM::`string'+0x95d
fffff880`06ad2b60 fffff800`02aa849d : fffff800`02bceb18 fffff880`06ad5360 00000000`00000000 fffff800`02a12000 : nt!_C_specific_handler+0x8c
fffff880`06ad2bd0 fffff800`02aafb10 : fffff800`02bceb18 fffff880`06ad2c48 fffff880`06ad3aa8 fffff800`02a12000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`06ad2c00 fffff800`02abca6f : fffff880`06ad3aa8 fffff880`06ad3310 fffff880`00000000 fffffa80`00000005 : nt!RtlDispatchException+0x410
fffff880`06ad32e0 fffff800`02a81d42 : fffff880`06ad3aa8 fffffa80`03f16968 fffff880`06ad3b50 fffffa80`0494b9b0 : nt!KiDispatchException+0x16f
fffff880`06ad3970 fffff800`02a8064a : fffffa80`04de01a0 fffff880`0849eb48 fffffa80`080f68e6 1b904488`e6e71800 : nt!KiExceptionDispatch+0xc2
fffff880`06ad3b50 fffff880`0604fc04 : fffff880`06050f58 00000000`00000000 fffffa80`04cff530 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a
fffff880`06ad3ce8 fffff880`06050f58 : 00000000`00000000 fffffa80`04cff530 00000000`00000000 fffffa80`04de01a0 : nwifi!Dot11TXCompletion
fffff880`06ad3cf0 fffff880`06054860 : 00000000`00000000 00000000`00000000 fffffa80`0494b9b0 00000000`00000010 : nwifi!Dot11SendCompletion+0x44
fffff880`06ad3d20 fffff880`041371bb : fffffa80`05bb2d78 00000000`00000000 00000000`00000000 fffffa80`04bdacf0 : nwifi!Pt6SendComplete+0x28
fffff880`06ad3d50 fffff880`015925ad : fffffa80`04de01a0 00000000`00000000 00000000`00000000 ffff0001`04de0000 : vwififlt!FilterSendNetBufferListsComplete+0x10b
fffff880`06ad3da0 fffff880`08499159 : fffffa80`04de01a0 fffffa80`03f16030 fffffa80`080f68e6 fffffa80`05d255f4 : ndis!NdisMSendNetBufferListsComplete+0x6d
fffff880`06ad3de0 fffffa80`04de01a0 : fffffa80`03f16030 fffffa80`080f68e6 fffffa80`05d255f4 00000000`00000000 : Darusb_win7x+0xb159
fffff880`06ad3de8 fffffa80`03f16030 : fffffa80`080f68e6 fffffa80`05d255f4 00000000`00000000 fffff880`014d6af4 : 0xfffffa80`04de01a0
fffff880`06ad3df0 fffffa80`080f68e6 : fffffa80`05d255f4 00000000`00000000 fffff880`014d6af4 fffffa80`04bf6b40 : 0xfffffa80`03f16030
fffff880`06ad3df8 fffffa80`05d255f4 : 00000000`00000000 fffff880`014d6af4 fffffa80`04bf6b40 00000000`00000000 : 0xfffffa80`080f68e6
fffff880`06ad3e00 00000000`00000000 : fffff880`014d6af4 fffffa80`04bf6b40 00000000`00000000 00000000`00000000 : 0xfffffa80`05d255f4
STACK_COMMAND: kb
FOLLOWUP_IP:
nwifi!Dot11SendCompletion+44
fffff880`06050f58 4883eb18 sub rbx,18h
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: nwifi!Dot11SendCompletion+44
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nwifi
IMAGE_NAME: nwifi.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc3b
FAILURE_BUCKET_ID: X64_0x1E_c0000005_nwifi!Dot11SendCompletion+44
BUCKET_ID: X64_0x1E_c0000005_nwifi!Dot11SendCompletion+44
Followup: MachineOwner
---------