Code:
-
Loading Dump File [D:\Kingston\BSODDmpFiles\anprrs\Dump files from minidump folder\030212-22526-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02e03000 PsLoadedModuleList = 0xfffff800`03040e50
Debug session time: Fri Mar 2 08:38:31.797 2012 (UTC - 7:00)
System Uptime: 0 days 0:04:11.108
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {5fff9, 2, 1, fffff880014b222e}
Unable to load image \SystemRoot\system32\DRIVERS\WN111x.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for WN111x.sys
*** ERROR: Module load completed but symbols could not be loaded for WN111x.sys
Probably caused by : WN111x.sys ( WN111x+1808 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000005fff9, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff880014b222e, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800030ab0e0
000000000005fff9
CURRENT_IRQL: 2
FAULTING_IP:
ndis!NdisAllocateNetBufferList+2ff
fffff880`014b222e 44896ef8 mov dword ptr [rsi-8],r13d
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: lsass.exe
TRAP_FRAME: fffff88002d93a30 -- (.trap 0xfffff88002d93a30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000060001 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000060002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880014b222e rsp=fffff88002d93bc0 rbp=fffffa8008a06680
r8=0000000000060001 r9=0000000000000000 r10=fffffa8008a06700
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
ndis!NdisAllocateNetBufferList+0x2ff:
fffff880`014b222e 44896ef8 mov dword ptr [rsi-8],r13d ds:3010:ffffffff`fffffff8=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e74469 to fffff80002e74f00
STACK_TEXT:
fffff880`02d938e8 fffff800`02e74469 : 00000000`0000000a 00000000`0005fff9 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`02d938f0 fffff800`02e730e0 : 00000000`00000000 fffffa80`08a06ad0 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02d93a30 fffff880`014b222e : 00000000`00000000 fffffa80`06ee2720 00000000`00000000 fffffa80`08a06ad0 : nt!KiPageFault+0x260
fffff880`02d93bc0 fffff880`02801808 : fffffa80`00000001 fffffa80`08d122f0 fffffa80`089e7000 00000000`00000001 : ndis!NdisAllocateNetBufferList+0x2ff
fffff880`02d93c10 fffffa80`00000001 : fffffa80`08d122f0 fffffa80`089e7000 00000000`00000001 00000000`00000001 : WN111x+0x1808
fffff880`02d93c18 fffffa80`08d122f0 : fffffa80`089e7000 00000000`00000001 00000000`00000001 fffff880`0281debc : 0xfffffa80`00000001
fffff880`02d93c20 fffffa80`089e7000 : 00000000`00000001 00000000`00000001 fffff880`0281debc 00000000`00300180 : 0xfffffa80`08d122f0
fffff880`02d93c28 00000000`00000001 : 00000000`00000001 fffff880`0281debc 00000000`00300180 00000985`00000000 : 0xfffffa80`089e7000
fffff880`02d93c30 00000000`00000001 : fffff880`0281debc 00000000`00300180 00000985`00000000 fffffa80`08ae92e2 : 0x1
fffff880`02d93c38 fffff880`0281debc : 00000000`00300180 00000985`00000000 fffffa80`08ae92e2 0000057f`f7516ca8 : 0x1
fffff880`02d93c40 00000000`00300180 : 00000985`00000000 fffffa80`08ae92e2 0000057f`f7516ca8 00000000`00000000 : WN111x+0x1debc
fffff880`02d93c48 00000985`00000000 : fffffa80`08ae92e2 0000057f`f7516ca8 00000000`00000000 fffff880`0281e6f1 : 0x300180
fffff880`02d93c50 fffffa80`08ae92e2 : 0000057f`f7516ca8 00000000`00000000 fffff880`0281e6f1 fffffa80`08a23000 : 0x985`00000000
fffff880`02d93c58 0000057f`f7516ca8 : 00000000`00000000 fffff880`0281e6f1 fffffa80`08a23000 00000000`00000040 : 0xfffffa80`08ae92e2
fffff880`02d93c60 00000000`00000000 : fffff880`0281e6f1 fffffa80`08a23000 00000000`00000040 fffffa80`08ae92e2 : 0x57f`f7516ca8
STACK_COMMAND: kb
FOLLOWUP_IP:
WN111x+1808
fffff880`02801808 ?? ???
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: WN111x+1808
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: WN111x
IMAGE_NAME: WN111x.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 472551f7
FAILURE_BUCKET_ID: X64_0xD1_WN111x+1808
BUCKET_ID: X64_0xD1_WN111x+1808
Followup: MachineOwner
---------
2: kd> lmvm WN111x
start end module name
fffff880`02800000 fffff880`02853200 WN111x T (no symbols)
Loaded symbol image file: WN111x.sys
Image path: \SystemRoot\system32\DRIVERS\WN111x.sys
Image name: WN111x.sys
Timestamp: Sun Oct 28 21:22:31 2007 (472551F7)
CheckSum: 00055C61
ImageSize: 00053200
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
-
Loading Dump File [D:\Kingston\BSODDmpFiles\anprrs\Dump files from minidump folder\030212-21075-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02e59000 PsLoadedModuleList = 0xfffff800`03096e50
Debug session time: Fri Mar 2 08:33:40.192 2012 (UTC - 7:00)
System Uptime: 0 days 17:07:43.893
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {a, 2, 0, fffff8800442dfcd}
Unable to load image \SystemRoot\system32\DRIVERS\EpfwLWF.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for EpfwLWF.sys
*** ERROR: Module load completed but symbols could not be loaded for EpfwLWF.sys
Probably caused by : nwifi.sys ( nwifi!Dot11PacketConverterReceivePacket+139 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000000a, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800442dfcd, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800031010e0
000000000000000a
CURRENT_IRQL: 2
FAULTING_IP:
nwifi!Dot11PacketConverterReceivePacket+139
fffff880`0442dfcd f6410a05 test byte ptr [rcx+0Ah],5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9af50 -- (.trap 0xfffff80000b9af50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8008ff29f0 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa80090b9010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800442dfcd rsp=fffff80000b9b0e0 rbp=0000000000000012
r8=fffffa8007427e50 r9=fffffa8008e42310 r10=fffffa8009015510
r11=fffff80000b9b1b8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nwifi!Dot11PacketConverterReceivePacket+0x139:
fffff880`0442dfcd f6410a05 test byte ptr [rcx+0Ah],5 ds:00000000`0000000a=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002eca469 to fffff80002ecaf00
STACK_TEXT:
fffff800`00b9ae08 fffff800`02eca469 : 00000000`0000000a 00000000`0000000a 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9ae10 fffff800`02ec90e0 : 00000000`000005b4 fffffa80`08e42310 00000000`0000b061 00000000`000005b4 : nt!KiBugCheckDispatch+0x69
fffff800`00b9af50 fffff880`0442dfcd : fffffa80`078b0fa0 fffffa80`07b81410 00000000`00000000 fffff800`00b9b418 : nt!KiPageFault+0x260
fffff800`00b9b0e0 fffff880`0442d643 : fffffa80`08e42310 fffffa80`0a9966f0 00000000`00000000 00000000`0000bed7 : nwifi!Dot11PacketConverterReceivePacket+0x139
fffff800`00b9b120 fffff880`03ca7c5d : fffffa80`089891a0 00000000`00000000 fffffa80`08fdddc0 fffffa80`09447880 : nwifi!MP6ReturnNBL+0x4b
fffff800`00b9b150 fffffa80`089891a0 : 00000000`00000000 fffffa80`08fdddc0 fffffa80`09447880 00000000`00000000 : EpfwLWF+0x3c5d
fffff800`00b9b158 00000000`00000000 : fffffa80`08fdddc0 fffffa80`09447880 00000000`00000000 fffffa80`08e42310 : 0xfffffa80`089891a0
STACK_COMMAND: kb
FOLLOWUP_IP:
nwifi!Dot11PacketConverterReceivePacket+139
fffff880`0442dfcd f6410a05 test byte ptr [rcx+0Ah],5
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nwifi!Dot11PacketConverterReceivePacket+139
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nwifi
IMAGE_NAME: nwifi.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc3b
FAILURE_BUCKET_ID: X64_0xD1_nwifi!Dot11PacketConverterReceivePacket+139
BUCKET_ID: X64_0xD1_nwifi!Dot11PacketConverterReceivePacket+139
Followup: MachineOwner
---------
You are using a wireless USB network adapter device that has drivers pre-Windows 7. We see these devices cause crashes on Windows 7 a lot. Please replace your device with a more up to date wireless network adapter, and preferably a wireless PCI card. Wireless USB network adapters often do not receive the proper power to run stable, so a wireless network adapter card is recommended. Yours also has the added instability of being outdated.