- Thread Author
- #1
Geting crashes 2-3 times a day .. included all specs and the dump file .. if anybody can give a look.. thank you .. and sorry for the first post!
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
FAULTING_IP:
+0
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x1E
PROCESS_NAME: System
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff88002f1b4c8 -- (.exr 0xfffff88002f1b4c8)
ExceptionAddress: fffff88003da045a (wanarp!WanNdisSendComplete+0x000000000000007a)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff88002f1b570 -- (.trap 0xfffff88002f1b570)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa80070107a0 rbx=0000000000000000 rcx=00000000000005ad
rdx=fffffa80070106c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88003da045a rsp=fffff88002f1b700 rbp=0000000000000000
r8=000000000000d1b0 r9=0000000000000030 r10=fffff80002c12000
r11=000000000000053e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
wanarp!WanNdisSendComplete+0x7a:
fffff880`03da045a 488b4608 mov rax,qword ptr [rsi+8] ds:0590:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c88bbe to fffff80002c91190
STACK_TEXT:
fffff880`02f1a5a8 fffff800`02c88bbe : 00000000`00000028 00000000`00000008 fffff880`02f1ad20 fffff800`02cbc160 : nt!KeBugCheck
fffff880`02f1a5b0 fffff800`02cbbe2d : fffff800`02e97770 fffff800`02dd42f0 fffff800`02c12000 fffff880`02f1b4c8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02f1a5e0 fffff800`02cbac05 : fffff800`02dd7fac fffff880`02f1a658 fffff880`02f1b4c8 fffff800`02c12000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02f1a610 fffff800`02ccbb81 : fffff880`02f1b4c8 fffff880`02f1ad20 fffff880`00000000 00000000`00000007 : nt!RtlDispatchException+0x415
fffff880`02f1acf0 fffff800`02c90842 : fffff880`02f1b4c8 fffffa80`07010590 fffff880`02f1b570 69436d4d`021e0003 : nt!KiDispatchException+0x135
fffff880`02f1b390 fffff800`02c8f14a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`02f1b570 fffff880`03da045a : fffffa80`07010590 69436d4d`021e0003 00000000`00000000 fffff880`0f28a37d : nt!KiGeneralProtectionFault+0x10a
fffff880`02f1b700 fffff880`014cd36f : fffffa80`06f4f010 00000000`00000000 fffffa80`04d611a0 00000000`00000000 : wanarp!WanNdisSendComplete+0x7a
fffff880`02f1b730 fffff880`03d4f5f4 : fffffa80`00000000 fffffa80`07010590 fffff880`00000000 00000000`00000000 : ndis!ndisMSendCompleteNetBufferListsInternal+0x10f
fffff880`02f1b7d0 fffff880`014ce128 : fffffa80`04d611a0 00000000`00000000 00000000`00000000 fffffa80`03b013b0 : pacer! ?? ::FNODOBFM::`string'+0x144
fffff880`02f1b830 fffff880`0445cebc : fffff880`04458580 00000000`00000000 fffffa80`079e3010 fffff880`04458110 : ndis!ndisMSendCompleteX+0x188
fffff880`02f1b880 fffff880`0445d337 : fffffa80`00000000 fffffa80`043c02a0 00000000`00000000 fffffa80`0795fd30 : ndiswan!CompleteSendDesc+0x21c
fffff880`02f1b8e0 fffff880`01418aea : fffffa80`0795fd30 fffffa80`05281e00 fffffa80`049c8b80 fffffa80`07960810 : ndiswan!ProtoCoSendComplete+0x77
fffff880`02f1b930 fffff880`04484e9d : fffffa80`05281e00 fffffa80`0795fd30 00000000`00000000 fffff880`0447d2f0 : ndis!ndisMCoSendCompleteToNdisPacket+0x11a
fffff880`02f1b980 fffff880`04488f93 : 00000000`00000000 fffffa80`049c8b80 fffffa80`0795fd30 fffffa80`04c281a0 : raspppoe!DereferencePacket+0x191
fffff880`02f1b9b0 fffff880`014d264e : fffffa80`04bfae00 fffffa80`079ce6c0 fffffa80`079ce6c0 fffff880`014102f7 : raspppoe!PrSendComplete+0x6b
fffff880`02f1b9f0 fffff880`014d251d : 00000000`00000000 fffffa80`04bfae20 00000000`00000000 fffffa80`077cbe20 : ndis!ndisSendCompleteWithPause+0xde
fffff880`02f1ba40 fffff880`014cd36f : fffffa80`00000000 fffffa80`0795fd30 fffffa80`04c281a0 fffff880`0418ef5d : ndis!ndisMSendNetBufferListsCompleteToNdisPackets+0x9d
fffff880`02f1ba90 fffff880`014cd21d : fffffa80`00000000 fffffa80`07c08e20 00000000`00000001 fffffa80`00000000 : ndis!ndisMSendCompleteNetBufferListsInternal+0x10f
fffff880`02f1bb30 fffff880`0417cc38 : fffffa80`050a4000 fffff880`041b7400 fffff880`0488a000 fffff880`041b7400 : ndis!NdisMSendNetBufferListsComplete+0x6d
fffff880`02f1bb70 fffffa80`050a4000 : fffff880`041b7400 fffff880`0488a000 fffff880`041b7400 fffffa80`053b3310 : nvmf6264+0x5c38
fffff880`02f1bb78 fffff880`041b7400 : fffff880`0488a000 fffff880`041b7400 fffffa80`053b3310 fffff880`041a15be : 0xfffffa80`050a4000
fffff880`02f1bb80 fffff880`0488a000 : fffff880`041b7400 fffffa80`053b3310 fffff880`041a15be fffffa80`053b32f0 : nvmf6264+0x40400
fffff880`02f1bb88 fffff880`041b7400 : fffffa80`053b3310 fffff880`041a15be fffffa80`053b32f0 fffff880`041b7400 : 0xfffff880`0488a000
fffff880`02f1bb90 fffffa80`053b3310 : fffff880`041a15be fffffa80`053b32f0 fffff880`041b7400 fffff880`0488a000 : nvmf6264+0x40400
fffff880`02f1bb98 fffff880`041a15be : fffffa80`053b32f0 fffff880`041b7400 fffff880`0488a000 00000000`00000000 : 0xfffffa80`053b3310
fffff880`02f1bba0 fffffa80`053b32f0 : fffff880`041b7400 fffff880`0488a000 00000000`00000000 00000000`00000000 : nvmf6264+0x2a5be
fffff880`02f1bba8 fffff880`041b7400 : fffff880`0488a000 00000000`00000000 00000000`00000000 fffff880`041b7400 : 0xfffffa80`053b32f0
fffff880`02f1bbb0 fffff880`0488a000 : 00000000`00000000 00000000`00000000 fffff880`041b7400 00000000`00000000 : nvmf6264+0x40400
fffff880`02f1bbb8 00000000`00000000 : 00000000`00000000 fffff880`041b7400 00000000`00000000 00000000`00000000 : 0xfffff880`0488a000
STACK_COMMAND: kb
FOLLOWUP_IP:
wanarp!WanNdisSendComplete+7a
fffff880`03da045a 488b4608 mov rax,qword ptr [rsi+8]
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: wanarp!WanNdisSendComplete+7a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: wanarp
IMAGE_NAME: wanarp.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7a874
FAILURE_BUCKET_ID: X64_0x1E_wanarp!WanNdisSendComplete+7a
BUCKET_ID: X64_0x1E_wanarp!WanNdisSendComplete+7a
Followup: MachineOwner
Cause
This is a very common bug check. To interpret it, you must identify which exception was generated.
Common exception codes include:
- 0x80000002: STATUS_DATATYPE_MISALIGNMENTAn unaligned data reference was encountered.
- 0x80000003: STATUS_BREAKPOINTA breakpoint or ASSERT was encountered when no kernel debugger was attached to the system.
- 0xC0000005: STATUS_ACCESS_VIOLATIONA memory access violation occurred. (Parameter 4 of the bug check is the address that the driver attempted to access.)