Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\010711-19640-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0285f000 PsLoadedModuleList = 0xfffff800`02a9ce50
Debug session time: Fri Jan 7 04:51:49.518 2011 (UTC - 5:00)
System Uptime: 0 days 0:07:14.860
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Probably caused by : usbohci.sys ( usbohci!OHCI_IsoTransfer+b3 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
FAULTING_IP:
+3432393061303431
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
BUGCHECK_STR: 0x1E_0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff88002d22778 -- (.exr 0xfffff88002d22778)
ExceptionAddress: fffff8800404075f (usbohci!OHCI_IsoTransfer+0x00000000000000b3)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff88002d22820 -- (.trap 0xfffff88002d22820)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000240 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000240 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800404075f rsp=fffff88002d229b0 rbp=000000000000000a
r8=000000004f425355 r9=fffffa8007050f60 r10=fffffa800550ac20
r11=fffff88002d22a08 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
usbohci!OHCI_IsoTransfer+0xb3:
fffff880`0404075f ff15cb480000 call qword ptr [usbohci!_imp_ExAllocatePoolWithTag (fffff880`04045030)] ds:fffff880`04045030=0000000000009118
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800028c746e to fffff800028cf710
STACK_TEXT:
fffff880`02d21868 fffff800`028c746e : ffff0000`03a476f2 00000426`00000000 fffff880`02d21fe0 fffff800`028fc668 : nt!KeBugCheck
fffff880`02d21870 fffff800`028f540d : fffff800`02addb7c fffff800`02a17e84 fffff800`0285f000 fffff880`02d22778 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02d218a0 fffff800`028fca90 : fffff800`02a1ea40 fffff880`02d21918 fffff880`02d22778 fffff800`0285f000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02d218d0 fffff800`029099ef : fffff880`02d22778 fffff880`02d21fe0 fffff880`00000000 00000000`00000005 : nt!RtlDispatchException+0x410
fffff880`02d21fb0 fffff800`028ced82 : fffff880`02d22778 fffffa80`07050f60 fffff880`02d22820 00000000`00000001 : nt!KiDispatchException+0x16f
fffff880`02d22640 fffff800`028cd68a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`02d22820 fffff880`0404075f : fffffa80`07050f60 00000000`00000001 00000000`4f426edf 00000000`00000b40 : nt!KiGeneralProtectionFault+0x10a
fffff880`02d229b0 fffff880`04043a5c : fffffa80`057f06a0 fffffa80`07050f60 fffffa80`07050f60 fffffa80`07027140 : usbohci!OHCI_IsoTransfer+0xb3
fffff880`02d22a10 fffff880`0404bfef : 00000000`00000002 fffffa80`057ef1a0 00000000`00000005 00000000`00000040 : usbohci!OHCI_SubmitIsoTransfer+0x68
fffff880`02d22a50 fffff880`040509f1 : 00000000`00000040 00000000`00000004 fffffa80`07050d20 fffff880`0419f376 : USBPORT!MPf_SubmitIsochTransfer+0x7f
fffff880`02d22aa0 fffff880`0405e91d : fffffa80`057ef1a0 00000000`00000040 00000000`00000010 fffffa80`07027010 : USBPORT!USBPORT_iSetGlobalEndpointStateTx+0x801
fffff880`02d22b00 fffff880`0405e08e : fffffa80`057ef050 fffffa80`07027010 00000000`00000000 00000000`00000000 : USBPORT!USBPORT_Core_iSubmitTransferToMiniport+0x115
fffff880`02d22b90 fffff800`0281a9ce : fffffa80`071969d8 fffff800`02817fb9 00000000`00000002 00000000`c70bfff0 : USBPORT!USBPORT_Core_ProcessScatterGatherList+0x5b2
fffff880`02d22c40 fffff800`0281b13d : fffffa80`057ef050 fffffa80`04c8d040 fffffa80`07073c00 00000000`00000000 : hal!HalpAllocateAdapterCallback+0x146
fffff880`02d22ce0 fffff800`0281a71f : fffffa80`07196990 00000000`000003e8 fffffa80`04c8d040 fffffa80`07141010 : hal!HalAllocateAdapterChannel+0x101
fffff880`02d22d20 fffff800`0281a420 : fffffa80`057ef050 00000000`000003e8 fffffa80`000000a0 fffff880`0405fdd7 : hal!HalBuildScatterGatherList+0x2f3
fffff880`02d22d90 fffff880`0405e52e : fffffa80`057ef050 00000000`00000000 fffffa80`057efd20 fffffa80`07027010 : hal!HalGetScatterGatherList+0x44
fffff880`02d22df0 fffff880`0405be86 : fffffa80`07071000 fffffa80`057ef050 fffff800`0281a3dc fffffa80`057ef1a0 : USBPORT!USBPORT_Core_iMapTransfer+0x24a
fffff880`02d22e70 fffff880`0404cf89 : fffffa80`057ef050 00000000`00000000 fffffa80`057efd02 fffffa80`057efd20 : USBPORT!USBPORT_Core_UsbMapDpc_Worker+0x296
fffff880`02d22ed0 fffff800`028dabfc : fffff880`009e9180 fffffa80`057efd20 fffffa80`057efd38 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02d22f00 fffff800`028d5865 : 00000000`00000000 fffffa80`03b7f680 00000000`00000000 fffff880`0404cdb0 : nt!KiRetireDpcList+0x1bc
fffff880`02d22fb0 fffff800`028d567c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff880`02f4a280 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
STACK_COMMAND: kb
FOLLOWUP_IP:
usbohci!OHCI_IsoTransfer+b3
fffff880`0404075f ff15cb480000 call qword ptr [usbohci!_imp_ExAllocatePoolWithTag (fffff880`04045030)]
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: usbohci!OHCI_IsoTransfer+b3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: usbohci
IMAGE_NAME: usbohci.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc06
FAILURE_BUCKET_ID: X64_0x1E_0_usbohci!OHCI_IsoTransfer+b3
BUCKET_ID: X64_0x1E_0_usbohci!OHCI_IsoTransfer+b3
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\010711-21122-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02864000 PsLoadedModuleList = 0xfffff800`02aa1e50
Debug session time: Fri Jan 7 06:50:20.148 2011 (UTC - 5:00)
System Uptime: 0 days 0:01:16.506
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff880056c4036, fffff88003123298, fffff88003122b00}
Unable to load image \SystemRoot\system32\DRIVERS\usbfilter.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for usbfilter.sys
*** ERROR: Module load completed but symbols could not be loaded for usbfilter.sys
Probably caused by : usbfilter.sys ( usbfilter+1ab3 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff880056c4036, The address that the exception occurred at
Arg3: fffff88003123298, Exception Record Address
Arg4: fffff88003122b00, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
USBPORT!UsbAllocPool_Z+2e
fffff880`056c4036 41b875736270 mov r8d,70627375h
EXCEPTION_RECORD: fffff88003123298 -- (.exr 0xfffff88003123298)
ExceptionAddress: fffff880056c4036 (USBPORT!UsbAllocPool_Z+0x000000000000002e)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000001
Parameter[1]: 0000000070627375
Attempt to write to address 0000000070627375
CONTEXT: fffff88003122b00 -- (.cxr 0xfffff88003122b00)
rax=0000000000000000 rbx=fffff88003123530 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000650 rdi=0000000000000610
rip=fffff880056c4036 rsp=fffff880031234d0 rbp=0000000000000278
r8=0000000000000650 r9=fffffa800532d820 r10=fffffa80034b6050
r11=fffffa80034b61a0 r12=0000000000000001 r13=fffffa800530c718
r14=0000000000000018 r15=fffffa80034b61a0
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
USBPORT!UsbAllocPool_Z+0x2e:
fffff880`056c4036 41b875736270 mov r8d,70627375h
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: 0000000070627375
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b0c0e0
0000000070627375
FOLLOWUP_IP:
usbfilter+1ab3
fffff880`04801ab3 ?? ???
BUGCHECK_STR: 0x7E
EXCEPTION_DOESNOT_MATCH_CODE: This indicates a hardware error.
Instruction at fffff880056c4036 does not read/write to 0000000070627375
LAST_CONTROL_TRANSFER: from fffff880056d52cd to fffff880056c4036
STACK_TEXT:
fffff880`031234d0 fffff880`056d52cd : 00000000`00000001 fffffa80`0532ade0 00000000`00000000 fffffa80`034b7158 : USBPORT!UsbAllocPool_Z+0x2e
fffff880`03123500 fffff880`056e51c4 : fffffa80`034b6050 fffffa80`00000380 fffffa80`03321740 fffffa80`05324810 : USBPORT!USBPORT_Core_AllocTransferEx+0x17d
fffff880`03123590 fffff880`056edd44 : fffffa80`05324810 fffffa80`0356000a fffffa80`05324810 fffffa80`0532ade0 : USBPORT!USBPORT_ProcessURB+0x944
fffff880`03123640 fffff880`056c7ad4 : 00000000`00000000 fffffa80`03565050 fffffa80`052a7750 fffffa80`05324810 : USBPORT!USBPORT_PdoInternalDeviceControlIrp+0x138
fffff880`03123680 fffff880`04801ab3 : fffffa80`041db050 fffffa80`0434a060 fffffa80`05324810 fffffa80`041db1a0 : USBPORT!USBPORT_Dispatch+0x1dc
fffff880`031236c0 fffffa80`041db050 : fffffa80`0434a060 fffffa80`05324810 fffffa80`041db1a0 fffffa80`03566a50 : usbfilter+0x1ab3
fffff880`031236c8 fffffa80`0434a060 : fffffa80`05324810 fffffa80`041db1a0 fffffa80`03566a50 fffff880`04801501 : 0xfffffa80`041db050
fffff880`031236d0 fffffa80`05324810 : fffffa80`041db1a0 fffffa80`03566a50 fffff880`04801501 fffffa80`05324bb0 : 0xfffffa80`0434a060
fffff880`031236d8 fffffa80`041db1a0 : fffffa80`03566a50 fffff880`04801501 fffffa80`05324bb0 00000000`00000000 : 0xfffffa80`05324810
fffff880`031236e0 fffffa80`03566a50 : fffff880`04801501 fffffa80`05324bb0 00000000`00000000 fffffa80`034e0660 : 0xfffffa80`041db1a0
fffff880`031236e8 fffff880`04801501 : fffffa80`05324bb0 00000000`00000000 fffffa80`034e0660 ffffffff`fff0bdc0 : 0xfffffa80`03566a50
fffff880`031236f0 fffffa80`05324bb0 : 00000000`00000000 fffffa80`034e0660 ffffffff`fff0bdc0 fffffa80`00000000 : usbfilter+0x1501
fffff880`031236f8 00000000`00000000 : fffffa80`034e0660 ffffffff`fff0bdc0 fffffa80`00000000 fffffa80`0532ade0 : 0xfffffa80`05324bb0
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: usbfilter+1ab3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: usbfilter
IMAGE_NAME: usbfilter.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4b3082ae
STACK_COMMAND: .cxr 0xfffff88003122b00 ; kb
FAILURE_BUCKET_ID: X64_0x7E_CODE_ADDRESS_MISMATCH_usbfilter+1ab3
BUCKET_ID: X64_0x7E_CODE_ADDRESS_MISMATCH_usbfilter+1ab3
Followup: MachineOwner
---------