************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 42
Microsoft (R) Windows Debugger Version 10.0.27725.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\20302\Desktop\120424-15984-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff804`0c600000 PsLoadedModuleList = 0xfffff804`0d2134f0
Debug session time: Wed Dec 4 23:57:21.472 2024 (UTC + 8:00)
System Uptime: 0 days 0:10:03.267
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
.............................................................
Loading User Symbols
Loading unloaded module list
...............
For analysis of this file, run !analyze -v
ndis!ndisNblTrackerTransferOwnershipInternal+0x7b:
fffff804`0f1b2fcb 488bbe68010000 mov rdi,qword ptr [rsi+168h] ds:002b:00450008`de1717f0=????????????????
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8040f1b2fcb, The address that the exception occurred at
Arg3: fffff00f627963b8, Exception Record Address
Arg4: ffffd70197f78900, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1468
Key : Analysis.Elapsed.mSec
Value: 1468
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 265
Key : Analysis.Init.Elapsed.mSec
Value: 12440
Key : Analysis.Memory.CommitPeak.Mb
Value: 129
Key : Analysis.Version.DbgEng
Value: 10.0.27725.1000
Key : Analysis.Version.Description
Value: 10.2408.27.01 amd64fre
Key : Analysis.Version.Ext
Value: 1.2408.27.1
Key : Bugcheck.Code.LegacyAPI
Value: 0x1000007e
Key : Bugcheck.Code.TargetModel
Value: 0x1000007e
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_nwifi!Pt6Receive
Key : Failure.Hash
Value: {e07094ba-a0e6-678e-8f7b-d42804d84aff}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1497cf94
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 1
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 0
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 0
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 4853999
Key : Hypervisor.Flags.ValueHex
Value: 4a10ef
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8040f1b2fcb
BUGCHECK_P3: fffff00f627963b8
BUGCHECK_P4: ffffd70197f78900
FILE_IN_CAB: 120424-15984-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
FAULTING_THREAD: ffff940e373b8540
EXCEPTION_RECORD: fffff00f627963b8 -- (.exr 0xfffff00f627963b8)
ExceptionAddress: fffff8040f1b2fcb (ndis!ndisNblTrackerTransferOwnershipInternal+0x000000000000007b)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffd70197f78900 -- (.cxr 0xffffd70197f78900)
rax=0000000000000020 rbx=0000000000000020 rcx=0000000000000020
rdx=ffff940e487dce21 rsi=00450008de171688 rdi=0000000000000001
rip=fffff8040f1b2fcb rsp=fffff00f627965f0 rbp=fffff00f62796650
r8=0000000000000020 r9=0000000000000088 r10=0000000000000088
r11=de86c68dc61cfb45 r12=00000000ffffff00 r13=ffff940e487dce21
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
ndis!ndisNblTrackerTransferOwnershipInternal+0x7b:
fffff804`0f1b2fcb 488bbe68010000 mov rdi,qword ptr [rsi+168h] ds:002b:00450008`de1717f0=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff8040d31d470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p 0x%p %s
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff00f`627965f0 fffff804`0f1dbfd8 : 00000000`00000001 00000000`00000001 00000000`00000000 00000000`00000001 : ndis!ndisNblTrackerTransferOwnershipInternal+0x7b
fffff00f`62796690 fffff804`0f1b20a4 : ffff940e`43751ba0 fffff00f`62790001 ffff940e`00000000 00000000`00000002 : ndis!ndisMIndicateNetBufferListsToOpen+0x29a18
fffff00f`62796770 fffff804`0f1d6dcc : ffff940e`4954b1a0 fffff804`00000000 00000000`00000000 ffff940e`4954b1a0 : ndis!ndisMTopReceiveNetBufferLists+0x1d4
fffff00f`62796850 fffff804`0f1d683b : 00000000`00000000 fffff00f`62796940 fffff804`0f1b1ed0 fffff804`0f1dfd02 : ndis!ndisCallReceiveHandler+0xb8
fffff00f`627968a0 fffff804`0f1d6bf3 : ffff940e`2c8a8500 fffff00f`62796938 00000000`00000008 00000000`00000000 : ndis!ndisCallNextDatapathHandler<2,void * __ptr64 & __ptr64,void (__cdecl*& __ptr64)(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long),void * __ptr64 & __ptr64,_NET_BUFFER_LIST * __ptr64 & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64>+0x3f
fffff00f`627968f0 fffff804`0f1d692a : ffff940e`4954b1a0 fffff804`0f1b1ed0 ffff940e`4954b1a0 00000000`00000001 : ndis!ndisIterativeDPInvokeHandlerOnTracker<2,void __cdecl(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long)>+0x8b
fffff00f`62796960 fffff804`0f1d6e92 : ffff940e`2eec9810 00000000`00000000 00000000`00000000 ffff940e`432e8820 : ndis!ndisInvokeIterativeDatapath<2,void __cdecl(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long)>+0xe2
fffff00f`627969d0 fffff804`0f1d94bb : 00000000`00000000 00000000`00000000 ffff940e`432e8820 fffff804`4dcd9040 : ndis!ndisInvokeNextReceiveHandler+0xa6
fffff00f`62796a30 fffff804`4dc41279 : ffff940e`485ea001 00000000`00000000 ffff940e`00000000 fffff00f`00000002 : ndis!NdisFIndicateReceiveNetBufferLists+0x34e3b
fffff00f`62796ae0 fffff804`0f1d6dcc : fffff804`00000001 00000000`00000000 00000000`00000000 00000000`00000002 : nwifi!Pt6Receive+0x159
fffff00f`62796ba0 fffff804`0f1d683b : 00000000`00005cd8 fffff00f`62796cc0 00000000`00000000 fffff804`0c867175 : ndis!ndisCallReceiveHandler+0xb8
fffff00f`62796bf0 fffff804`0f1dd48a : fffff00f`62796cd8 fffff804`0f1d6bf3 fffff00f`62796d30 fffff00f`62796d80 : ndis!ndisCallNextDatapathHandler<2,void * __ptr64 & __ptr64,void (__cdecl*& __ptr64)(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long),void * __ptr64 & __ptr64,_NET_BUFFER_LIST * __ptr64 & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64>+0x3f
fffff00f`62796c40 fffff804`0f1d6ec7 : ffff940e`3325bc60 ffffd701`00000000 00000000`00000002 00000000`00000000 : ndis!ndisExpandDataPathStack<2,void __cdecl(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long)>+0xae
fffff00f`62796ce0 fffff804`0f1d94bb : 00000000`00000000 00000000`00000000 ffff940e`3325bc60 00000000`00000000 : ndis!ndisInvokeNextReceiveHandler+0xdb
fffff00f`62796d40 fffff804`0f7f12dc : ffff940e`4977fb00 fffff00f`62796e51 00000000`00000000 00000000`00000002 : ndis!NdisFIndicateReceiveNetBufferLists+0x34e3b
fffff00f`62796df0 fffff804`0f1d6dcc : 00000000`00000002 ffff940e`3325bc60 ffff940e`3325bc60 00000000`00000001 : wfplwfs!LwfLowerRecvNetBufferLists+0x14c
fffff00f`62796eb0 fffff804`0f1d683b : 00000000`00005fe8 fffff00f`62796fd0 00000000`00000000 fffff804`0c867175 : ndis!ndisCallReceiveHandler+0xb8
fffff00f`62796f00 fffff804`0f1dd48a : fffff00f`62796fe8 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisCallNextDatapathHandler<2,void * __ptr64 & __ptr64,void (__cdecl*& __ptr64)(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long),void * __ptr64 & __ptr64,_NET_BUFFER_LIST * __ptr64 & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64>+0x3f
fffff00f`62796f50 fffff804`0f1d6ec7 : ffff940e`3325bc60 00000000`00000000 ffff940e`00000002 00000000`00000000 : ndis!ndisExpandDataPathStack<2,void __cdecl(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long)>+0xae
fffff00f`62796ff0 fffff804`0f1b3696 : 00000000`000096d1 00000000`00000000 00000000`00000000 fffff804`0f761409 : ndis!ndisInvokeNextReceiveHandler+0xdb
fffff00f`62797050 fffff804`4e3c32c2 : 00000000`00000002 ffff940e`2c859160 00000000`00000000 00000000`00000002 : ndis!NdisMIndicateReceiveNetBufferLists+0x116
fffff00f`627970e0 fffff804`36145ffa : ffff940e`36552ee0 00000000`00000000 00000000`00000000 fffff804`4e18275a : vwifimp!MpReceive+0x152
fffff00f`62797150 fffff804`0f1d6dcc : ffff940e`2edb2c20 fffff804`36145f20 ffff940e`419cf1a0 fffff00f`62797388 : vwififlt!FilterReceiveNetBufferLists+0xda
fffff00f`627971b0 fffff804`0f1d683b : 00000000`000062e8 fffff00f`627972d0 00000000`00000000 fffff804`0c867175 : ndis!ndisCallReceiveHandler+0xb8
fffff00f`62797200 fffff804`0f1dd48a : fffff00f`627972e8 00000000`00000000 fffff00f`62797340 fffff00f`62797390 : ndis!ndisCallNextDatapathHandler<2,void * __ptr64 & __ptr64,void (__cdecl*& __ptr64)(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long),void * __ptr64 & __ptr64,_NET_BUFFER_LIST * __ptr64 & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64>+0x3f
fffff00f`62797250 fffff804`0f1d6ec7 : ffff940e`3325bc60 00000000`00000002 00000000`00000002 00000000`00000000 : ndis!ndisExpandDataPathStack<2,void __cdecl(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long)>+0xae
fffff00f`627972f0 fffff804`0f1d94bb : 00000000`00000000 00000000`00000000 ffff940e`3325bc60 00000000`00000000 : ndis!ndisInvokeNextReceiveHandler+0xdb
fffff00f`62797350 fffff804`0f7f12dc : ffff940e`2c604800 fffff00f`62797461 fffff00f`00000002 fffff804`00000002 : ndis!NdisFIndicateReceiveNetBufferLists+0x34e3b
fffff00f`62797400 fffff804`0f1d6dcc : 00000000`00000002 ffff940e`3325bc60 ffff940e`3325bc60 00000000`00000001 : wfplwfs!LwfLowerRecvNetBufferLists+0x14c
fffff00f`627974c0 fffff804`0f1d683b : 00000000`000065f8 fffff00f`627975e0 00000000`00000000 fffff804`0c867175 : ndis!ndisCallReceiveHandler+0xb8
fffff00f`62797510 fffff804`0f1dd48a : fffff00f`627975f8 00000000`00000000 00000000`00000000 fffff804`0c81d6ff : ndis!ndisCallNextDatapathHandler<2,void * __ptr64 & __ptr64,void (__cdecl*& __ptr64)(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long),void * __ptr64 & __ptr64,_NET_BUFFER_LIST * __ptr64 & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64>+0x3f
fffff00f`62797560 fffff804`0f1d6ec7 : ffff940e`3325bc60 00000000`00000002 ffff940e`00000002 ffffd701`00000000 : ndis!ndisExpandDataPathStack<2,void __cdecl(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long)>+0xae
fffff00f`62797600 fffff804`0f1b3696 : 00000000`000096d1 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisInvokeNextReceiveHandler+0xdb
fffff00f`62797660 fffff804`371dc94d : 00000000`00000002 ffff940e`495a0b20 fffff00f`627977f0 00000000`00000002 : ndis!NdisMIndicateReceiveNetBufferLists+0x116
fffff00f`627976f0 fffff804`371dbf9e : ffff940e`373b8540 00000000`00000000 ffffd701`97f57180 fffff00f`627978e9 : wdiwifi!CPort::IndicateFrames+0xad
fffff00f`62797830 fffff804`371db417 : 00000000`00000000 00000000`0000001f fffff804`372bf040 fffff00f`62797a10 : wdiwifi!CRxMgr::RxProcessAndIndicateNblChain+0x41e
fffff00f`62797960 fffff804`371db268 : ffff940e`3325bc60 00000000`00000003 ffff940e`38010006 fffff804`36cd7900 : wdiwifi!CRxMgr::RxInOrderDataInd+0x127
fffff00f`62797a10 fffff804`369b9ed6 : ffff940e`38010000 00000000`00000001 fffff804`36e0d000 fffff804`36d20598 : wdiwifi!AdapterRxInorderDataInd+0x88
fffff00f`62797a60 ffff940e`38010000 : 00000000`00000001 fffff804`36e0d000 fffff804`36d20598 00000000`00000000 : rtwlane601+0x49ed6
fffff00f`62797a68 00000000`00000001 : fffff804`36e0d000 fffff804`36d20598 00000000`00000000 fffff00f`62797b40 : 0xffff940e`38010000
fffff00f`62797a70 fffff804`36e0d000 : fffff804`36d20598 00000000`00000000 fffff00f`62797b40 ffff940e`251f3040 : 0x1
fffff00f`62797a78 fffff804`36d20598 : 00000000`00000000 fffff00f`62797b40 ffff940e`251f3040 00000000`00000240 : rtwlane601+0x49d000
fffff00f`62797a80 00000000`00000000 : fffff00f`62797b40 ffff940e`251f3040 00000000`00000240 ffff940e`38010000 : rtwlane601+0x3b0598
SYMBOL_NAME: nwifi!Pt6Receive+159
MODULE_NAME: nwifi
IMAGE_NAME: nwifi.sys
IMAGE_VERSION: 10.0.22621.1409
STACK_COMMAND: .cxr 0xffffd70197f78900 ; kb
BUCKET_ID_FUNC_OFFSET: 159
FAILURE_BUCKET_ID: AV_nwifi!Pt6Receive
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e07094ba-a0e6-678e-8f7b-d42804d84aff}
Followup: MachineOwner
---------