Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\hazar\AppData\Local\Temp\7zO0D51FF03\021821-7000-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`08800000 PsLoadedModuleList = 0xfffff801`0942a390
Debug session time: Thu Feb 18 13:21:52.172 2021 (UTC + 3:00)
System Uptime: 1 days 0:04:06.912
Loading Kernel Symbols
...............................................................
................................................................
....................................................
Loading User Symbols
Loading unloaded module list
.....................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`08bf5a80 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff880`6412a8d0=000000000000000a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffe700a791daf0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80108c5e366, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6936
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-5L92TCS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 12420
Key : Analysis.Memory.CommitPeak.Mb
Value: 96
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffe700a791daf0
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80108c5e366
WRITE_ADDRESS: fffff801094fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8010940f330: Unable to get Flags value from nt!KdVersionBlock
fffff8010940f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffe700a791daf0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Zoom.exe
TRAP_FRAME: fffff8806412aa10 -- (.trap 0xfffff8806412aa10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000000a0 rbx=0000000000000000 rcx=fffff8806412abe4
rdx=00000000000000a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80108c5e366 rsp=fffff8806412aba0 rbp=ffffe788a8baa050
r8=00000000000000e7 r9=0000000000000ec0 r10=000000000000006b
r11=ffffe788a8e36b80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!HalBuildScatterGatherListV2+0x176426:
fffff801`08c5e366 830f01 or dword ptr [rdi],1 ds:00000000`00000000=????????
Resetting default scope
STACK_TEXT:
fffff880`6412a8c8 fffff801`08c07a69 : 00000000`0000000a ffffe700`a791daf0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`6412a8d0 fffff801`08c03d69 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`6412aa10 fffff801`08c5e366 : ffffe788`a8baa1a0 ffffe788`b0aa2b60 ffffe788`a8b18f50 00000000`000000e7 : nt!KiPageFault+0x469
fffff880`6412aba0 fffff801`0acc4d1b : ffffe788`aaebc370 ffffe788`a8baa050 ffffe788`000000a0 ffffe788`b0aa2b60 : nt!HalBuildScatterGatherListV2+0x176426
fffff880`6412ac30 fffff801`0d571351 : 00000000`a8e54f0c ffffe788`0000000c ffffe788`a8e54fac ffffe788`a8baa1a0 : ndis!NdisMAllocateNetBufferSGList+0x11b
fffff880`6412acf0 fffff801`0d56f5e0 : ffffe788`a8854030 ffffe788`a8e54fac ffffe788`00000000 ffffe788`a8e550ac : athwnx!MpPerformScatterGather+0x1ed
fffff880`6412ad50 fffff801`0d5778bc : ffffe788`a8854030 ffffe788`a8e54fac ffffe788`ad6e11c0 ffffe788`b0aa2b9c : athwnx!Mp11PerformScatterGather+0x84
fffff880`6412ad90 fffff801`0d3ab0c4 : ffffe788`a8b36e60 ffffe788`a8e550ac 00000000`00000000 ffffe788`a8e55144 : athwnx!RtlStringCchCopyNA+0xa14
fffff880`6412add0 fffff801`0d3b3f39 : ffffe788`a8b36e60 ffffe788`a8e550ac 00000000`00000000 ffffe788`a8e55144 : athwnx!_ath_queue_txbuf+0xe38
fffff880`6412ae00 fffff801`0d3b0ad3 : ffffe788`a8b36e60 ffffe788`a8e550ac 00000000`00000000 ffffe788`a8e55144 : athwnx!ath_txto_tasklet+0x2d5
fffff880`6412ae30 fffff801`0d46d337 : ffffe788`a885b030 ffffe788`a8e550ac ffffe788`a8e55144 ffffe788`a8e55144 : athwnx!ath_tx_start+0x8f
fffff880`6412ae90 fffff801`0d58940b : ffffe788`a8e550ac fffff801`0acfd47c ffffe788`a8e54fac 00000000`00000000 : athwnx!ath_tx_send+0x32b
fffff880`6412af30 fffff801`0d57d295 : ffffe788`a8e550ac fffff801`0d530ec6 ffffe788`a8e550ac ffffe788`00000000 : athwnx!wbuf_xmit_queue+0x13
fffff880`6412af60 fffff801`0d533141 : ffffe788`a8e2c030 ffffe788`a8e550ac ffffe788`a8e34030 fffff801`0d443faa : athwnx!Port11ProcessSend+0x55
fffff880`6412afa0 fffff801`0d53401b : ffffe788`a8e34030 ffffe788`a8e550ac 00000000`00000000 ffffe788`b0aa2ba0 : athwnx!ieee80211_send_wbuf+0x285
fffff880`6412b010 fffff801`0d5726f0 : ffffe788`a8e34030 ffffe788`a8e550ac 00000000`00000246 fffff801`08af3fe4 : athwnx!wlan_vap_send+0x80f
fffff880`6412b0b0 fffff801`0d571aa9 : ffffe788`a8854030 ffffe788`a8e54fac 00000000`00000000 ffffe788`a8baa1a0 : athwnx!MpTransmitTxMSDU+0x5f0
fffff880`6412b140 fffff801`0d56e82f : ffffe788`a8854030 ffffe788`a8e54fac 00000000`00000000 ffffe788`a6ba8b00 : athwnx!MpSendPendingTxMSDUs+0x61
fffff880`6412b190 fffff801`0d56e088 : ffffe788`a8854030 ffffe788`b04d2e00 fffff880`00000000 00000000`00000001 : athwnx!MPSendNetBufferLists_1+0x683
fffff880`6412b230 fffff801`0acc50ae : ffffe788`a8854030 ffffe788`b04d2e00 00000000`00000000 00000000`00000001 : athwnx!MPSendNetBufferLists+0xa0
fffff880`6412b270 fffff801`0acc4f9e : fffff801`0b281000 ffffe788`b04d2e00 ffffe788`00000000 fffff801`0acc4f90 : ndis!ndisMSendNBLToMiniportInternal+0xfe
fffff880`6412b340 fffff801`0acc58e8 : ffffe788`b1703a01 ffffe788`b04d2e00 ffffe788`aaeeaa20 fffff801`0af4a954 : ndis!ndisMSendNBLToMiniport+0xe
fffff880`6412b380 fffff801`0acfe185 : 00000000`00000000 fffff880`6412b449 ffffe788`a8baa1a0 fffff801`00000000 : ndis!ndisCallSendHandler+0x58
fffff880`6412b3d0 fffff801`0acc25dd : 00000000`00000000 ffffe788`a8baa1a0 ffffe788`ac7fd3f0 00000001`00000000 : ndis!ndisInvokeNextSendHandler+0x191
fffff880`6412b4a0 fffff801`0af8fcbd : ffffe788`a6b8fc30 ffffe788`b1703a40 00000000`00000000 ffffe788`00000000 : ndis!NdisSendNetBufferLists+0x17d
fffff880`6412b5a0 fffff801`0af8f9e7 : ffffe788`acb18990 00000000`00000000 00000000`00000800 ffffe788`ac989d00 : tcpip!FlpSendPacketsHelper+0x2bd
fffff880`6412b650 fffff801`0af45bc5 : 00000000`00000000 fffff801`0b109230 ffffe788`a855b8e8 00000000`00000000 : tcpip!FlSendPackets+0x57
fffff880`6412b680 fffff801`0af450e3 : 0000d6dc`61220004 00000000`00000000 fffff801`0b109230 ffffe788`acf74040 : tcpip!IppFragmentPackets+0x2a5
fffff880`6412b760 fffff801`0af44d68 : ffffe788`a855b8e8 00000000`00000001 00000000`00000000 00000000`0000f8b3 : tcpip!IppDispatchSendPacketHelper+0xbf
fffff880`6412b830 fffff801`0af439b8 : ffffe788`a855b9c8 00000000`00000004 00000000`00000000 ffffe788`a855b8e8 : tcpip!IppPacketizeDatagrams+0x2e8
fffff880`6412b960 fffff801`0af43500 : 00000000`00000000 00000000`00000000 fffff801`0b109230 ffffe788`b0b7e3f0 : tcpip!IppSendDatagramsCommon+0x498
fffff880`6412bae0 fffff801`0af3240d : 00000000`00006122 ffffe788`a856d0a0 ffffe788`a8566122 ffffe788`a856d0a0 : tcpip!IpNlpSendDatagrams+0x40
fffff880`6412bb20 fffff801`0af315dc : 00000000`00000000 00000000`00000004 00000000`00000000 33333333`33333333 : tcpip!UdpSendMessagesOnPath+0x7ad
fffff880`6412bfc0 fffff801`0af31325 : ffffe788`aa07ef01 fffff801`0af31310 fffff880`6412c440 fffff880`6412c440 : tcpip!UdpSendMessages+0x29c
fffff880`6412c330 fffff801`08b54488 : fffff880`6412c590 ffffe788`adb1e890 3c5efe44`00000000 00000000`00000000 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
fffff880`6412c360 fffff801`08b543fd : fffff801`0af31310 fffff880`6412c440 00000000`00000000 00000000`00000170 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff880`6412c3d0 fffff801`0af82a2b : fffff880`6412c500 00000000`00000170 00000000`00000001 fffff801`0c0820c0 : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff880`6412c410 fffff801`0c09d898 : fffff880`6412c780 fffff880`6412ccc0 ffffe788`aa07ef40 fffff880`6412ccc0 : tcpip!UdpTlProviderSendMessages+0x7b
fffff880`6412c490 fffff801`0c081fb5 : 00000000`00000000 fffff801`00000000 00000000`00000000 00000000`20206f49 : afd!AfdFastDatagramSend+0x658
fffff880`6412c680 fffff801`08dfcee2 : 00000000`00000000 00000000`00012023 fffff880`6412ccc0 ffffe788`affdfab0 : afd!AfdFastIoDeviceControl+0x1825
fffff880`6412ca20 fffff801`08dfcb46 : 00000000`00000001 00000000`00000eac 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x382
fffff880`6412cb60 fffff801`08c074b8 : 00000000`00000000 fffff880`00000001 00000000`00000000 ffffe788`b0b2a660 : nt!NtDeviceIoControlFile+0x56
fffff880`6412cbd0 00000000`773b1cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`165bf1e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773b1cfc
SYMBOL_NAME: athwnx!MpPerformScatterGather+1ed
MODULE_NAME: athwnx
IMAGE_NAME: athwnx.sys
IMAGE_VERSION: 3.0.2.202
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1ed
FAILURE_BUCKET_ID: AV_athwnx!MpPerformScatterGather
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9a22d509-1ae3-3269-4008-592ac4ecbb06}
Followup: MachineOwner
---------
0: kd> lmvm athwnx
Browse full module list
start end module name
fffff801`0d2e0000 fffff801`0d707000 athwnx (pdb symbols) C:\ProgramData\Dbg\sym\athwnx.pdb\794BB0DFCC2C4D27AC0C1EBC39B2506D1\athwnx.pdb
Loaded symbol image file: athwnx.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\athwnx.sys\56D55527427000\athwnx.sys
Image path: \SystemRoot\System32\drivers\athwnx.sys
Image name: athwnx.sys
Browse all global symbols functions data
Timestamp: Tue Mar 1 11:39:03 2016 (56D55527)
CheckSum: 0040B4A8
ImageSize: 00427000
File version: 3.0.2.202
Product version: 3.0.2.202
File flags: 8 (Mask 3F) Private
File OS: 40004 NT Win32
File type: 3.6 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Qualcomm Atheros Communications, Inc.
ProductName: Driver for Qualcomm Atheros CB42/CB43/MB42/MB43 Network Adapter
InternalName: ATHR.SYS
OriginalFilename: ATHR.SYS
ProductVersion: 3.0.2.202
FileVersion: 3.0.2.202
FileDescription: Qualcomm Atheros Extensible Wireless LAN device driver
LegalCopyright: Copyright (C) 2001-2010 Qualcomm Atheros Communications, Inc.