BugCheck 1000007E, {ffffffff80000003, fffff80020731633, ffffaf0d028744f8, ffffaf0d02873d30}
Probably caused by : rtwlanu.sys ( rtwlanu!phydm_ra_mask_watchdog+19f )
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.
Usually the exception address pinpoints the driver/function that caused the problem.
Always note this address as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.
This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG.
This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but...
If this happens, make sure a debugger gets connected, and the system is booted /DEBUG.
This will let us see why this breakpoint is happening.
Arguments:
Arg1: ffffffff80000003, The exception code that was not handled
Arg2: fffff80020731633, The address that the exception occurred at
Arg3: ffffaf0d028744f8, Exception Record Address
Arg4: ffffaf0d02873d30, Context Record Address
BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7C37
SYSTEM_VERSION: 3.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: H.20
BIOS_DATE: 07/03/2019
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
BASEBOARD_PRODUCT: X570-A PRO (MS-7C37)
BASEBOARD_VERSION: 3.0
EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more arguments are invalid
FAULTING_IP:
nt!KeCheckStackAndTargetAddress+53
fffff800`20731633 cc int 3
EXCEPTION_RECORD: ffffaf0d02875840 -- (.exr 0xffffaf0d02875840)
ExceptionAddress: 000000003effe98d
ExceptionCode: 00220003
ExceptionFlags: 00000000
NumberParameters: 0
CONTEXT: ffffaf0d02873d30 -- (.cxr 0xffffaf0d02873d30)
rax=ffffaf0d02874758 rbx=ffffaf0d02875958 rcx=0000000500000000
rdx=ffffaf0d02875958 rsi=ffffaf0d02874f50 rdi=0000000500000000
rip=fffff80020731633 rsp=ffffaf0d02874730 rbp=ffffaf0d02874d40
r8=ffffaf0d02874f50 r9=ffffaf0d02874d90 r10=0000fffff800207b
r11=ffffa07f09000000 r12=ffffaf0d02875c10 r13=ffffaf0d02875718
r14=ffffaf0d02874d90 r15=ffffaf0d02875718
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00040206
nt!KeCheckStackAndTargetAddress+0x53:
fffff800`20731633 cc int 3
Resetting default scope
CPU_COUNT: 10
CPU_MHZ: e10
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0x80000003 - {EXCEPTION} Breakpoint A breakpoint has been reached.
EXCEPTION_CODE_STR: 80000003
EXCEPTION_PARAMETER1: 0000000000000000
TRAP_FRAME: ffffaf0d028757c0 -- (.trap 0xffffaf0d028757c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000500000000 rbx=0000000000000000 rcx=ffffc30690ab89c0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000500000000 rsp=ffffaf0d02875958 rbp=000000000fff0000
r8=ffffc3069441de08 r9=000000000fff0000 r10=0000000000000000
r11=ffffaf0d02875940 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
00000005`00000000 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800207b90fb to fffff80020731633
STACK_TEXT:
ffffaf0d`02874730 fffff800`207b90fb : fffff800`20746715 fffff800`204dbe7c 00000000`00000000 00000000`00000000 : nt!KeCheckStackAndTargetAddress+0x53
ffffaf0d`02874760 fffff800`207e68e2 : fffff800`204dbe7c ffffaf0d`02874d40 fffff800`207b90c0 00000000`00000000 : nt!_C_specific_handler+0x3b
ffffaf0d`028747d0 fffff800`20632fb7 : ffffaf0d`02874d40 00000000`00000000 ffffaf0d`02875c10 fffff800`20746715 : nt!RtlpExecuteHandlerForException+0x12
ffffaf0d`02874800 fffff800`2067b226 : ffffaf0d`02875718 ffffaf0d`02875450 ffffaf0d`02875718 ffffc306`9441de08 : nt!RtlDispatchException+0x297
ffffaf0d`02874f20 fffff800`207efa6c : ffffaf0d`02875840 00000000`00001000 ffffaf0d`028757c0 ffff8000`00000000 : nt!KiDispatchException+0x186
ffffaf0d`028755e0 fffff800`207ebc03 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x12c
ffffaf0d`028757c0 00000005`00000000 : fffff800`346b524f ffffc306`90ab89c0 fffff800`34770a05 fffff800`347d0000 : nt!KiPageFault+0x443
ffffaf0d`02875958 fffff800`346b524f : ffffc306`90ab89c0 fffff800`34770a05 fffff800`347d0000 ffffc306`9441de08 : 0x00000005`00000000
ffffaf0d`02875960 fffff800`346b509e : ffffc306`90ab89c0 fffff800`34770a98 fffff800`347d0000 00000000`00000100 : rtwlanu!phydm_ra_mask_watchdog+0x19f
ffffaf0d`028759c0 fffff800`3469deb3 : ffffc306`00000000 ffffc306`90ab89c0 fffff800`34770a98 fffff800`347d0000 : rtwlanu!phydm_ra_info_watchdog+0x1e
ffffaf0d`028759f0 fffff800`344ae59c : 00000000`0000000c fffff800`34770a98 fffff800`347d0000 fffff800`34517e00 : rtwlanu!phydm_watchdog+0xab
ffffaf0d`02875a20 fffff800`3450eeec : ffffc306`93e00000 ffffc306`93e00000 ffffc306`93b6a050 00000000`00000000 : rtwlanu!HalDmWatchDog+0x1cc
ffffaf0d`02875a70 fffff800`3434ec3c : fffff800`3450ee70 ffffc306`a1a3e040 ffffc306`a1a3e180 ffff6a2a`f25b405e : rtwlanu!RtCheckForHangWorkItemCallback8192E+0x7c
ffffaf0d`02875aa0 fffff800`25ad9b41 : ffffc306`93afe730 00000000`00000100 fffff800`25ad9b30 ffffc306`8ab04a20 : rtwlanu!Ndis6WorkItemCallback+0x4c
ffffaf0d`02875ad0 fffff800`206da7a5 : 00000000`00000000 ffffc306`93afe730 ffffc306`93b6a050 fffff800`24fbc510 : ndis!ndisDispatchIoWorkItem+0x11
ffffaf0d`02875b00 fffff800`20633f25 : ffffc306`a1a3e040 ffffc306`a1a3e040 fffff800`206da670 fffff800`00000000 : nt!IopProcessWorkItem+0x135
ffffaf0d`02875b70 fffff800`20746715 : ffffc306`a1a3e040 00000000`00000080 ffffc306`8aaa3040 00000000`00000001 : nt!ExpWorkerThread+0x105
ffffaf0d`02875c10 fffff800`207e5078 : ffffb080`b2780180 ffffc306`a1a3e040 fffff800`207466c0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffaf0d`02875c60 00000000`00000000 : ffffaf0d`02876000 ffffaf0d`02870000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
THREAD_SHA1_HASH_MOD_FUNC: 0677f1f33d9a89af253e653d81f4270060c12b86
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 7d0172d9f9ff7b3837ac5dc37a7ec1f9a8cd7811
THREAD_SHA1_HASH_MOD: e991936040bdb5272dd121011050968922f9e102
FOLLOWUP_IP:
rtwlanu!phydm_ra_mask_watchdog+19f
fffff800`346b524f 837b5401 cmp dword ptr [rbx+54h],1
FAULT_INSTR_CODE: 1547b83
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: rtwlanu!phydm_ra_mask_watchdog+19f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: rtwlanu
IMAGE_NAME: rtwlanu.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5d3eb1cd
IMAGE_VERSION: 1030.38.712.2019
STACK_COMMAND: .cxr 0xffffaf0d02873d30 ; kb
BUCKET_ID_FUNC_OFFSET: 19f
FAILURE_BUCKET_ID: AV_rtwlanu!phydm_ra_mask_watchdog
BUCKET_ID: AV_rtwlanu!phydm_ra_mask_watchdog
PRIMARY_PROBLEM_CLASS: AV_rtwlanu!phydm_ra_mask_watchdog
TARGET_TIME: 2020-06-10T14:15:27.000Z
OSBUILD: 19041
OSSERVICEPACK: 264
BUILDDATESTAMP_STR: 191206-1406
BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406
FAILURE_ID_HASH_STRING: km:av_rtwlanu!phydm_ra_mask_watchdog
FAILURE_ID_HASH: {0c433e4a-a563-9509-b19f-88e0286b0bb5}
10: kd> lmvm rtwlanu
Browse full module list
start end module name
fffff800`34320000 fffff800`34caf000 rtwlanu (pdb symbols) d:\symbols\rtwlanu.pdb\9C10FF687684407483FA9D0613F6E91F2\rtwlanu.pdb
Loaded symbol image file: rtwlanu.sys
Mapped memory image file: d:\symbols\rtwlanu.sys\5D3EB1CD98f000\rtwlanu.sys
Image path: \SystemRoot\System32\drivers\rtwlanu.sys
Image name: rtwlanu.sys
Browse all global symbols functions data
Timestamp: Mon Jul 29 10:43:57 2019 (5D3EB1CD)
CheckSum: 00970F46
ImageSize: 0098F000
File version: 1030.38.712.2019
Product version: 1030.38.712.2019
File flags: 8 (Mask 3F) Private
File OS: 40004 NT Win32
File type: 3.6 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Realtek Semiconductor Corporation
ProductName: Realtek WLAN Wireless USB 2.0 Adapter
InternalName: rtwlanu.sys
OriginalFilename: rtwlanu.sys
ProductVersion: 1030.38.0712.2019
FileVersion: 1030.38.0712.2019
FileDescription: Realtek WLAN USB NDIS Driver 80816
LegalCopyright: Copyright (C) 2014 Realtek Semiconductor Corporation