Code:
Loading Dump File [D:\Kingston\BSODDmpFiles\jbPanama\Windows_NT6_BSOD_jcgriff2\032812-41277-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17727.amd64fre.win7sp1_gdr.111118-2330
Machine Name:
Kernel base = 0xfffff800`0320c000 PsLoadedModuleList = 0xfffff800`03450650
Debug session time: Wed Mar 28 13:05:47.393 2012 (UTC - 6:00)
System Uptime: 0 days 0:00:48.626
Loading Kernel Symbols
...............................................................
................................................................
....................................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff880014117ba, fffff880031cb818, fffff880031cb070}
Unable to load image \SystemRoot\system32\DRIVERS\epfwwfp.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for epfwwfp.sys
*** ERROR: Module load completed but symbols could not be loaded for epfwwfp.sys
Probably caused by : NETIO.SYS ( NETIO!NetioCompleteCloneNetBufferListChain+9a )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff880014117ba, The address that the exception occurred at
Arg3: fffff880031cb818, Exception Record Address
Arg4: fffff880031cb070, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
NETIO!NetioCompleteCloneNetBufferListChain+9a
fffff880`014117ba 488b01 mov rax,qword ptr [rcx]
EXCEPTION_RECORD: fffff880031cb818 -- (.exr 0xfffff880031cb818)
ExceptionAddress: fffff880014117ba (NETIO!NetioCompleteCloneNetBufferListChain+0x000000000000009a)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000
CONTEXT: fffff880031cb070 -- (.cxr 0xfffff880031cb070)
rax=fffffa800b6f3490 rbx=fffffa800a830540 rcx=0000000000000000
rdx=0000000000001000 rsi=00000000fffffee0 rdi=fffff880031cba00
rip=fffff880014117ba rsp=fffff880031cba50 rbp=fffffa800ae10000
r8=fffff78000000320 r9=0000000000000002 r10=fffff8000320c000
r11=000000000000029d r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
NETIO!NetioCompleteCloneNetBufferListChain+0x9a:
fffff880`014117ba 488b01 mov rax,qword ptr [rcx] ds:002b:00000000`00000000=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: NULL_DEREFERENCE
ÍOCESS_NAME:
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800034ba100
0000000000000000
FOLLOWUP_IP:
NETIO!NetioCompleteCloneNetBufferListChain+9a
fffff880`014117ba 488b01 mov rax,qword ptr [rcx]
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff88001403336 to fffff880014117ba
STACK_TEXT:
fffff880`031cba50 fffff880`01403336 : 00000000`00000000 fffffa80`0a830410 00000000`00000000 fffff880`031cba00 : NETIO!NetioCompleteCloneNetBufferListChain+0x9a
fffff880`031cbac0 fffff880`01853256 : fffffa80`0a830410 fffffa80`0a788010 fffffa80`0a788010 fffffa80`0a830500 : NETIO!NetioDereferenceNetBufferList+0x86
fffff880`031cbaf0 fffff880`0189e978 : fffff880`018a4418 fffffa80`0a830540 00000000`00000000 00000000`00000000 : fwpkclnt!FwpsDereferenceNetBufferList0+0xaa
fffff880`031cbb40 fffff880`018a4418 : fffffa80`0a830540 00000000`00000000 00000000`00000000 fffff880`018a4418 : epfwwfp+0x8978
fffff880`031cbb48 fffffa80`0a830540 : 00000000`00000000 00000000`00000000 fffff880`018a4418 fffff880`0189e9ba : epfwwfp+0xe418
fffff880`031cbb50 00000000`00000000 : 00000000`00000000 fffff880`018a4418 fffff880`0189e9ba 00000000`00000000 : 0xfffffa80`0a830540
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: NETIO!NetioCompleteCloneNetBufferListChain+9a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79381
STACK_COMMAND: .cxr 0xfffff880031cb070 ; kb
FAILURE_BUCKET_ID: X64_0x7E_NETIO!NetioCompleteCloneNetBufferListChain+9a
BUCKET_ID: X64_0x7E_NETIO!NetioCompleteCloneNetBufferListChain+9a
Followup: MachineOwner
---------
Crash report points to your ESET firewall driver... Typically, when antivirus is blamed and not likely to be the culprit, the problem lies in the network adapter drivers or audio drivers. Install the latest updates to both drivers from Welcome to Dell Technical Support