Update the Broadcom 802.11g Network Adapter driver to its latest.
Code:
Unable to load image \SystemRoot\system32\DRIVERS\bcmwl6.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for bcmwl6.sys
*** ERROR: Module load completed but symbols could not be loaded for bcmwl6.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {c0000005, 8de5df39, a884bb1c, a884b700}
Probably caused by : bcmwl6.sys ( bcmwl6+3ef39 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 8de5df39, The address that the exception occurred at
Arg3: a884bb1c, Exception Record Address
Arg4: a884b700, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
bcmwl6+3ef39
8de5df39 8b08 mov ecx,dword ptr [eax]
EXCEPTION_RECORD: a884bb1c -- (.exr 0xffffffffa884bb1c)
ExceptionAddress: 8de5df39 (bcmwl6+0x0003ef39)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 00000000
Attempt to read from address 00000000
CONTEXT: a884b700 -- (.cxr 0xffffffffa884b700)
eax=00000000 ebx=00000005 ecx=85f76300 edx=8603cfa8 esi=85f2b0a8 edi=a884bc58
eip=8de5df39 esp=a884bbe4 ebp=a884bc30 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00210246
bcmwl6+0x3ef39:
8de5df39 8b08 mov ecx,dword ptr [eax] ds:0023:00000000=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: NULL_DEREFERENCE
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 00000000
READ_ADDRESS: GetPointerFromAddress: unable to read from 82b7d718
Unable to read MiSystemVaType memory at 82b5d1a0
00000000
FOLLOWUP_IP:
bcmwl6+3ef39
8de5df39 8b08 mov ecx,dword ptr [eax]
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from 8de885ca to 8de5df39
STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be wrong.
a884bc30 8de885ca 85f2b0a8 a884bc58 000009ce bcmwl6+0x3ef39
a884bc44 8de8a696 85f7e318 000009ce 85f2b0a8 bcmwl6+0x695ca
a884bc7c 8de8af70 ffffffff 85b1f000 85b1f000 bcmwl6+0x6b696
a884bca8 8de30729 85f2b0a8 00000000 85cc96a0 bcmwl6+0x6bf70
a884bcc4 8de3b2f8 85b1f000 85cc9658 85d4a028 bcmwl6+0x11729
a884bcdc 884312ca 85cc96a0 85cc9680 a884bd00 bcmwl6+0x1c2f8
a884bcec 82c28460 85d4a028 85cc9680 84b1b4e0 ndis!ndisDispatchIoWorkItem+0xf
a884bd00 82a90aab 85cc9658 00000000 84b1b4e0 nt!IopProcessWorkItem+0x23
a884bd50 82c1cf5e 80000000 b2c6c8d6 00000000 nt!ExpWorkerThread+0x10d
a884bd90 82ac4219 82a9099e 80000000 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: bcmwl6+3ef39
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: bcmwl6
IMAGE_NAME: bcmwl6.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d5a322c
STACK_COMMAND: .cxr 0xffffffffa884b700 ; kb
FAILURE_BUCKET_ID: 0x7E_bcmwl6+3ef39
BUCKET_ID: 0x7E_bcmwl6+3ef39
Followup: MachineOwner
---------
1: kd> lmvm bcmwl6
start end module name
8de1f000 8e230000 bcmwl6 T (no symbols)
Loaded symbol image file: bcmwl6.sys
Image path: \SystemRoot\system32\DRIVERS\bcmwl6.sys
Image name: bcmwl6.sys
Timestamp: Tue Feb 15 13:58:36 2011 (4D5A322C)
CheckSum: 0040E61B
ImageSize: 00411000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4