Error code 1E KMODE_EXCEPTION_NOT_HANDLED - Device driver, hardware, System service, compatibility, Remote control programs, memory, BIOS
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff88002f88850, 0, 0}
Probably caused by : nwifi.sys ( nwifi!Dot11AllocateSendPacket+58 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88002f88850, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
+575e952f007ad868
fffff880`02f88850 6897f80280 push 0FFFFFFFF8002F897h
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb40e0
0000000000000000
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x1E
PROCESS_NAME: System
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff88002f89768 -- (.exr 0xfffff88002f89768)
ExceptionAddress: fffff80002a7f905 (nt!ExpInterlockedPopEntrySListFault16)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff88002f89810 -- (.trap 0xfffff88002f89810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000002a81940007 rbx=0000000000000000 rcx=fffff88008b1c280
rdx=48dd6f4b988e70e1 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a7f905 rsp=fffff88002f899a0 rbp=fffff88002f89a30
r8=48dd6f4b988e70e0 r9=00000000646e5344 r10=fffff88008b1c280
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!ExpInterlockedPopEntrySListFault16:
fffff800`02a7f905 498b08 mov rcx,qword ptr [r8] ds:0001:48dd6f4b`988e70e0=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002b0ebdb to fffff80002a7c740
STACK_TEXT:
fffff880`02f88798 fffff800`02b0ebdb : 00000000`0000001e ffffffff`c0000005 fffff880`02f88850 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f887a0 fffff800`02acdd30 : fffffa80`0800e920 fffff800`02a44f7a fffffa80`0800e920 00000000`00000001 : nt!KipFatalFilter+0x1b
fffff880`02f887e0 fffff800`02aaad1c : 00000000`00000000 fffff880`02f88f30 fffff880`02f88a01 fffff880`02f88f58 : nt! ?? ::FNODOBFM::`string'+0x95d
fffff880`02f88820 fffff800`02aa240d : fffff800`02bc8bc4 fffff880`02f8aec0 00000000`00000000 fffff800`02a0c000 : nt!_C_specific_handler+0x8c
fffff880`02f88890 fffff800`02aa9a90 : fffff800`02bc8bc4 fffff880`02f88908 fffff880`02f89768 fffff800`02a0c000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02f888c0 fffff800`02ab69ef : fffff880`02f89768 fffff880`02f88fd0 fffff880`00000000 fffffa80`00000005 : nt!RtlDispatchException+0x410
fffff880`02f88fa0 fffff800`02a7bd82 : fffff880`02f89768 fffff880`08b1c280 fffff880`02f89810 fffffa80`06ad7790 : nt!KiDispatchException+0x16f
fffff880`02f89630 fffff800`02a7a68a : fffff880`02f89dd1 fffffa80`04c3ac60 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`02f89810 fffff800`02a7f905 : fffff880`08b1c280 fffff880`08ae21cc 00000000`00000001 00000000`00000001 : nt!KiGeneralProtectionFault+0x10a
fffff880`02f899a0 fffff880`08ae21cc : 00000000`00000001 00000000`00000001 fffff880`02f89a30 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault16
fffff880`02f899b0 fffff880`08ae6142 : 00000000`00000001 fffffa80`07c45f10 00000000`00000000 fffffa80`07427010 : nwifi!Dot11AllocateSendPacket+0x58
fffff880`02f899e0 fffff880`08ae651b : fffffa80`07427010 00000000`00000000 fffffa80`07427010 00000000`00000000 : nwifi!MP6SendOneNBL+0x262
fffff880`02f89b30 fffff880`08aebf67 : 00000000`00000302 fffffa80`07c45d30 00000000`00000000 00000000`00000000 : nwifi!MP6SendNBLInternal+0x67
fffff880`02f89b80 fffff880`016e7af4 : fffffa80`04fd7270 00000000`00000001 00000000`00000000 fffffa80`04c3ac60 : nwifi!FilterSendNetBufferLists+0x7f
fffff880`02f89bb0 fffff880`040de199 : fffffa80`07c45d30 fffffa80`05d871a0 00000000`00000000 fffff880`02f89ca0 : ndis!NdisFSendNetBufferLists+0x64
fffff880`02f89bf0 fffff880`016e7a39 : 00000000`00000001 00000000`00000000 fffffa80`079e8080 00000000`00000011 : pacer!PcFilterSendNetBufferLists+0x29
fffff880`02f89cf0 fffff880`017a3785 : fffff880`0681a625 00000000`00000000 fffffa80`05d871a0 fffff880`02f8a200 : ndis!ndisSendNBLToFilter+0x69
fffff880`02f89d50 fffff880`0186634e : 00000000`00000000 00000000`0000000e fffffa80`07419410 fffffa80`079e8080 : ndis!NdisSendNetBufferLists+0x85
fffff880`02f89db0 fffff880`01867a67 : fffff880`0196c9a0 00000000`00000000 fffffa80`077a0000 00000000`01960800 : tcpip!IppFragmentPackets+0x39e
fffff880`02f89ed0 fffff880`018637d5 : 00000000`00000000 00000000`00000000 00000054`00000320 00000000`0000000e : tcpip!IppDispatchSendPacketHelper+0x87
fffff880`02f89f90 fffff880`01865124 : fffffa80`081f9006 00000000`00009900 fffffa80`00000014 00000000`00000000 : tcpip!IppPacketizeDatagrams+0x2d5
fffff880`02f8a0b0 fffff880`0186a1ee : fffffa80`04bb0f00 fffffa80`0827b007 fffff880`0196c9a0 fffffa80`081f9010 : tcpip!IppSendDatagramsCommon+0x754
fffff880`02f8a380 fffff880`0185ce2a : fffffa80`0827b010 00000000`00000000 00000000`00000001 00000000`00000002 : tcpip!IpNlpSendDatagrams+0x3e
fffff880`02f8a3c0 fffff880`018791f7 : 00000000`0000c97b ffff0000`036ec5f5 fffffa80`00000002 fffffa80`0741d860 : tcpip!TcpTcbHeaderSend+0x5ea
fffff880`02f8a570 fffff880`01874a56 : 00000000`00000000 fffffa80`04ba7000 fffff880`01966128 fffff880`01840ac2 : tcpip!TcpTcbSend+0x807
fffff880`02f8a7f0 fffff880`0187c44c : fffff880`06968000 00000000`00000000 00000000`00000000 fffff880`0185f700 : tcpip!TcpFlushDelay+0x316
fffff880`02f8a8d0 fffff880`0185e6c7 : fffffa80`04ba998c fffffa80`04bcb9b0 fffffa80`04bb998c 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x20c
fffff880`02f8a980 fffff880`0185e799 : fffff880`02f8ab00 fffff880`0196c9a0 fffff880`02f8ab10 fffffa80`04a00ad0 : tcpip!IppDeliverListToProtocol+0x97
fffff880`02f8aa40 fffff880`0185ec90 : fffffa80`075c9cb0 fffffa80`081a6b00 00000000`00000011 fffff880`02f8ab00 : tcpip!IppProcessDeliverList+0x59
fffff880`02f8aab0 fffff880`0185db21 : 00000000`6401a8c0 fffffa80`04ba7000 fffff880`0196c9a0 00000000`07419401 : tcpip!IppReceiveHeaderBatch+0x231
fffff880`02f8ab90 fffff880`0185c592 : fffffa80`07415a30 00000000`00000000 fffffa80`07419401 00000000`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`02f8ad90 fffff880`01875e5a : fffffa80`07419410 fffff880`02f8aec0 fffffa80`07419410 fffff880`01960000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`02f8ae70 fffff800`02a8be5a : fffffa80`075c9cb0 fffff880`02f86000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`02f8aec0 fffff880`01875882 : fffff880`01875d80 fffff880`02f8afd0 fffffa80`07c45d02 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`02f8afa0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
STACK_COMMAND: kb
FOLLOWUP_IP:
nwifi!Dot11AllocateSendPacket+58
fffff880`08ae21cc 4885c0 test rax,rax
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: nwifi!Dot11AllocateSendPacket+58
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nwifi
IMAGE_NAME: nwifi.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc3b
FAILURE_BUCKET_ID: X64_0x1E_nwifi!Dot11AllocateSendPacket+58
BUCKET_ID: X64_0x1E_nwifi!Dot11AllocateSendPacket+58
Followup: MachineOwner
---------
The dumps blames nwifi.sys and points to memory corruption. This is a hardware/hardware related error. Usually this is related to a network adapter/driver problem.
I find the following out of date drivers on your system:
AnyDVD.sys Thu Apr 09 20:40:36 2009 - AnyDVD Filter Driver or Watch & copy any DVD! belongs to the software AnyDVD by SlySoft, Inc (www.slysoft.com). Update the driver or the software or uninstall it.
BCM42RLY.sys Tue Jul 07 20:34:55 2009 - Broadcom iLine10(tm) PCI Network Adapter Proxy Protocol Driver belongs to the software BCM42RLY or Broadcom iLine10(tm) PCI Network Adapter by Broadcom Corporation (www.broadcom.com). I suspect this driver had a lot to do with your crash. Update this driver
e1k62x64.sys Mon Jun 22 14:05:53 2009 - Intel 82577LM Gigabit LAN Driver. Update this driver.
ElbyCDIO.sys Tue Feb 17 12:11:23 2009 - ElbyCD Windows NT/2000/XP I/O driver or ElbyCD Windows NT/2000 I/O driver belongs to the software CDRTools or ElbyCDIO Driver or DVD Region Killer or VirtualCloneDrive by Elaborate Bytes AG (www.elby.ch). Update the driver or the software or uninstall the software.
rimspx64.sys Mon Mar 03 04:19:03 2008 - Ricoh Memory Card Reader driver OEM - none at http://www.ricoh.com This driver is very obsolete. If you cannot update the driver, upgrade your card reader to one that is certified Win 7 compatible.
rixdpx64.sys Fri Jul 27 06:45:50 2007 - See above.
Update these drivers from the manufacturers' websites. Win 7 does not like older drivers. They can and do cause memory corruption. Reboot and run your system and lets see if you have another crash. If you do, upload that BSOD file to us. And we will go from there. If your system runs smoothly, please let us know that, too. If you need help with the drivers, please post and ask.
By the way, we do prefer that you use zip instead of RAR.
What antivirus and firewall are you running?