Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\030711-16161-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02e07000 PsLoadedModuleList = 0xfffff800`03044e50
Debug session time: Mon Mar 7 14:28:25.841 2011 (UTC - 5:00)
System Uptime: 0 days 0:02:55.511
Loading Kernel Symbols
...............................................................
................................................................
...........................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Unable to load image \SystemRoot\system32\DRIVERS\athrxusb.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for athrxusb.sys
*** ERROR: Module load completed but symbols could not be loaded for athrxusb.sys
Probably caused by : nwifi.sys ( nwifi!Pt6RepackRecvNBL+fa )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
FAULTING_IP:
+3935326461656565
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
BUGCHECK_STR: 0x1E_0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff800043e7488 -- (.exr 0xfffff800043e7488)
ExceptionAddress: fffff8800643575e (nwifi!Pt6RepackRecvNBL+0x00000000000000fa)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff800043e7530 -- (.trap 0xfffff800043e7530)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8005ced9d0 rbx=0000000000000000 rcx=fffff8800646d6e0
rdx=0ebceddb4a387945 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800643575e rsp=fffff800043e76c0 rbp=0000000000000000
r8=0000000000000000 r9=0000000094f891fa r10=fffff8800646b110
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nwifi!Pt6RepackRecvNBL+0xfa:
fffff880`0643575e 4c034a18 add r9,qword ptr [rdx+18h] ds:ff08:0ebceddb`4a38795d=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e70c2e to fffff80002e78ed0
STACK_TEXT:
fffff800`043e6568 fffff800`02e70c2e : 00000000`00000000 fffff800`043e6778 fffff800`043e6ce0 fffff800`02ea5e28 : nt!KeBugCheck
fffff800`043e6570 fffff800`02e9ebed : fffff800`03085c24 fffff800`02fbea3c fffff800`02e07000 fffff800`043e7488 : nt!KiKernelCalloutExceptionHandler+0xe
fffff800`043e65a0 fffff800`02ea6250 : fffff800`02fc6b5c fffff800`043e6618 fffff800`043e7488 fffff800`02e07000 : nt!RtlpExecuteHandlerForException+0xd
fffff800`043e65d0 fffff800`02eb31b5 : fffff800`043e7488 fffff800`043e6ce0 fffff800`00000000 fffffa80`05cf0e50 : nt!RtlDispatchException+0x410
fffff800`043e6cb0 fffff800`02e78542 : fffff800`043e7488 00000000`00000000 fffff800`043e7530 fffffa80`061f6010 : nt!KiDispatchException+0x135
fffff800`043e7350 fffff800`02e76e4a : fffffa80`0578485b fffff880`06799f47 fffffa80`0636888e fffff880`067be516 : nt!KiExceptionDispatch+0xc2
fffff800`043e7530 fffff880`0643575e : 00000000`00000000 00000000`00000000 fffffa80`061f6010 fffff880`067994e6 : nt!KiGeneralProtectionFault+0x10a
fffff800`043e76c0 fffff880`064366c8 : fffffa80`0578485b fffff880`067bccc8 fffffa80`05ca9030 fffffa80`061f6010 : nwifi!Pt6RepackRecvNBL+0xfa
fffff800`043e77c0 fffff880`014fe2b7 : fffffa80`058631a0 fffffa80`05cf0e50 00000000`00000001 0000000f`0586e000 : nwifi!Pt6Receive+0x170
fffff800`043e7820 fffff880`0677abd0 : fffffa80`0578485b 00000000`00000000 00000000`00000000 fffffa80`04ec2a00 : ndis! ?? ::FNODOBFM::`string'+0xccef
fffff800`043e7870 fffffa80`0578485b : 00000000`00000000 00000000`00000000 fffffa80`04ec2a00 fffffa80`00000001 : athrxusb+0xebd0
fffff800`043e7878 00000000`00000000 : 00000000`00000000 fffffa80`04ec2a00 fffffa80`00000001 00000000`00000000 : 0xfffffa80`0578485b
STACK_COMMAND: kb
FOLLOWUP_IP:
nwifi!Pt6RepackRecvNBL+fa
fffff880`0643575e 4c034a18 add r9,qword ptr [rdx+18h]
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: nwifi!Pt6RepackRecvNBL+fa
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nwifi
IMAGE_NAME: nwifi.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc3b
FAILURE_BUCKET_ID: X64_0x1E_0_nwifi!Pt6RepackRecvNBL+fa
BUCKET_ID: X64_0x1E_0_nwifi!Pt6RepackRecvNBL+fa
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\030711-18205-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02e5a000 PsLoadedModuleList = 0xfffff800`03097e50
Debug session time: Mon Mar 7 14:30:56.393 2011 (UTC - 5:00)
System Uptime: 0 days 0:01:54.063
Loading Kernel Symbols
...............................................................
................................................................
...........................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Unable to load image \SystemRoot\system32\DRIVERS\athrxusb.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for athrxusb.sys
*** ERROR: Module load completed but symbols could not be loaded for athrxusb.sys
Probably caused by : nwifi.sys ( nwifi!Pt6RepackRecvNBL+103 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
FAULTING_IP:
+3264353832643034
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
BUGCHECK_STR: 0x1E_0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff88002f226f8 -- (.exr 0xfffff88002f226f8)
ExceptionAddress: fffff88006608767 (nwifi!Pt6RepackRecvNBL+0x0000000000000103)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff88002f227a0 -- (.trap 0xfffff88002f227a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8005dddf50 rbx=0000000000000000 rcx=fffff880066406e0
rdx=fffffa8005ddca00 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88006608767 rsp=fffff88002f22930 rbp=0000000000000000
r8=0000000000000000 r9=33ea818724b2082b r10=fffff8800663e110
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nwifi!Pt6RepackRecvNBL+0x103:
fffff880`06608767 450fb701 movzx r8d,word ptr [r9] ds:f318:33ea8187`24b2082b=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ec3c2e to fffff80002ecbed0
STACK_TEXT:
fffff880`02f217d8 fffff800`02ec3c2e : 00000000`00000000 00000000`00000000 fffff880`02f21f50 fffff800`02ef8e28 : nt!KeBugCheck
fffff880`02f217e0 fffff800`02ef1bed : fffff800`030d8c24 fffff800`03011a3c fffff800`02e5a000 fffff880`02f226f8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02f21810 fffff800`02ef9250 : fffff800`03019a88 fffff880`02f21888 fffff880`02f226f8 fffff800`02e5a000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02f21840 fffff800`02f061b5 : fffff880`02f226f8 fffff880`02f21f50 fffff880`00000000 fffffa80`05de1df0 : nt!RtlDispatchException+0x410
fffff880`02f21f20 fffff800`02ecb542 : fffff880`02f226f8 00000000`00000000 fffff880`02f227a0 fffffa80`0614d010 : nt!KiDispatchException+0x135
fffff880`02f225c0 fffff800`02ec9e4a : fffffa80`06606e5b fffff880`02093f47 fffffa80`06379cae fffff880`020b8516 : nt!KiExceptionDispatch+0xc2
fffff880`02f227a0 fffff880`06608767 : 00000000`00000000 00000000`00000000 fffffa80`0614d010 fffff880`020934e6 : nt!KiGeneralProtectionFault+0x10a
fffff880`02f22930 fffff880`066096c8 : fffffa80`06606e5b fffff880`020b6cc8 fffffa80`05d85030 fffffa80`0614d010 : nwifi!Pt6RepackRecvNBL+0x103
fffff880`02f22a30 fffff880`014aa2b7 : fffffa80`05ced1a0 fffffa80`05de1df0 00000000`00000001 0000000f`055dd4f8 : nwifi!Pt6Receive+0x170
fffff880`02f22a90 fffff880`02074bd0 : fffffa80`06606e5b 00000000`00000000 00000000`00000000 fffffa80`05606300 : ndis! ?? ::FNODOBFM::`string'+0xccef
fffff880`02f22ae0 fffffa80`06606e5b : 00000000`00000000 00000000`00000000 fffffa80`05606300 fffffa80`00000001 : athrxusb+0xebd0
fffff880`02f22ae8 00000000`00000000 : 00000000`00000000 fffffa80`05606300 fffffa80`00000001 00000000`00000000 : 0xfffffa80`06606e5b
STACK_COMMAND: kb
FOLLOWUP_IP:
nwifi!Pt6RepackRecvNBL+103
fffff880`06608767 450fb701 movzx r8d,word ptr [r9]
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: nwifi!Pt6RepackRecvNBL+103
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nwifi
IMAGE_NAME: nwifi.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc3b
FAILURE_BUCKET_ID: X64_0x1E_0_nwifi!Pt6RepackRecvNBL+103
BUCKET_ID: X64_0x1E_0_nwifi!Pt6RepackRecvNBL+103
Followup: MachineOwner
---------