*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff88007819b90, 0, 0}
Unable to load image \SystemRoot\system32\DRIVERS\
netw5v64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for netw5v64.sys
*** ERROR: Module load completed but symbols could not be loaded for netw5v64.sys
Probably caused by : netw5v64.sys ( netw5v64+5d3e )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88007819b90, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
+3439323031663235
fffff880`07819b90 b8aa810780 mov eax,800781AAh
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800034fa0e0
0000000000000000
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME:
msnmsgr.exe
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff8800781aab8 -- (.exr 0xfffff8800781aab8)
ExceptionAddress: fffff800032c7105 (nt!ExpInterlockedPopEntrySListFault16)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff8800781ab60 -- (.trap 0xfffff8800781ab60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000033c1b0001 rbx=0000000000000000 rcx=fffff80003446700
rdx=00590053005c0046 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032c7105 rsp=fffff8800781acf0 rbp=0000000000000008
r8=00590053005c0045 r9=0000000000000000 r10=fffff80003446700
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!ExpInterlockedPopEntrySListFault16:
fffff800`032c7105 498b08 mov rcx,qword ptr [r8] ds:0001:00590053`005c0045=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003354b2b to fffff800032c3f00
STACK_TEXT:
fffff880`07819ad8 fffff800`03354b2b : 00000000`0000001e ffffffff`c0000005 fffff880`07819b90 00000000`00000000 : nt!KeBugCheckEx
fffff880`07819ae0 fffff800`03317390 : fffffa80`02fdbab0 fffff880`04075515 fffffa80`02fdbab0 fffffa80`02fc4f58 : nt!KipFatalFilter+0x1b
fffff880`07819b20 fffff800`032f24dc : 00000000`00000000 fffffa80`02fc4f58 fffffa80`02fdbab0 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x95d
fffff880`07819b60 fffff800`032e9bed : fffff800`0340a470 fffff880`0781c360 00000000`00000000 fffff800`03252000 : nt!_C_specific_handler+0x8c
fffff880`07819bd0 fffff800`032f1250 : fffff800`0340a470 fffff880`07819c48 fffff880`0781aab8 fffff800`03252000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`07819c00 fffff800`032fe1b5 : fffff880`0781aab8 fffff880`0781a310 fffff880`00000000 fffff800`00000004 : nt!RtlDispatchException+0x410
fffff880`0781a2e0 fffff800`032c3542 : fffff880`0781aab8 00000000`00000000 fffff880`0781ab60 fffffa80`07b86ab0 : nt!KiDispatchException+0x135
fffff880`0781a980 fffff800`032c1e4a : fffffa80`0882a068 fffffa80`0882a038 00000000`00000018 00000000`00000124 : nt!KiExceptionDispatch+0xc2
fffff880`0781ab60 fffff800`032c7105 : 00000000`00000000 fffff800`032d3c63 fffff880`0781ad20 fffff880`0781ad1c : nt!KiGeneralProtectionFault+0x10a
fffff880`0781acf0 fffff800`032d3c63 : fffff880`0781ad20 fffff880`0781ad1c 00000001`00000001 00000001`00000013 : nt!ExpInterlockedPopEntrySListFault16
fffff880`0781ad00 fffff880`018375a0 : 00000000`00000000 fffffa80`09504eb0 fffffa80`00000000 00000000`00000000 : nt!IoAllocateMdl+0xf3
fffff880`0781ad50 fffff880`0406ed3e : 00000000`00000000 fffff880`01909bb1 fffff880`07810018 fffff880`0781b168 : ndis!NdisAllocateMdl+0x20
fffff880`0781ad90 00000000`00000000 : fffff880`01909bb1 fffff880`07810018 fffff880`0781b168 fffffa80`08b6d9a0 :
netw5v64+0x5d3e
STACK_COMMAND: kb
FOLLOWUP_IP:
netw5v64+5d3e
fffff880`0406ed3e ?? ???
SYMBOL_STACK_INDEX: c
SYMBOL_NAME:
netw5v64+5d3e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netw5v64
IMAGE_NAME:
netw5v64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a0c3e06
FAILURE_BUCKET_ID: X64_0x1E_c0000005_netw5v64+5d3e
BUCKET_ID: X64_0x1E_c0000005_netw5v64+5d3e
Followup: MachineOwner
---------