Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031811-27549-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e56000 PsLoadedModuleList = 0xfffff800`03093e50
Debug session time: Fri Mar 18 09:07:31.047 2011 (UTC - 4:00)
System Uptime: 0 days 0:11:49.000
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 0, fffff88004d006b1}
Probably caused by : usbhub.sys ( usbhub!USBHUB_TriggerCallBacks+11 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88004d006b1, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030fe0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
usbhub!USBHUB_TriggerCallBacks+11
fffff880`04d006b1 813848554220 cmp dword ptr [rax],20425548h
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff800043ed170 -- (.trap 0xfffff800043ed170)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800ab9e050
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004d006b1 rsp=fffff800043ed300 rbp=0000000000000004
r8=0000000000000000 r9=0000000000000000 r10=fffff80002e56000
r11=fffff800043ed3f0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
usbhub!USBHUB_TriggerCallBacks+0x11:
fffff880`04d006b1 813848554220 cmp dword ptr [rax],20425548h ds:c1a0:00000000`00000000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ec5ca9 to fffff80002ec6740
STACK_TEXT:
fffff800`043ed028 fffff800`02ec5ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`043ed030 fffff800`02ec4920 : 00000000`00000000 fffffa80`0ab9e050 00000000`00000000 fffffa80`0000cf00 : nt!KiBugCheckDispatch+0x69
fffff800`043ed170 fffff880`04d006b1 : 00000000`77485353 fffff880`04cdf9be fffffa80`06f34e10 fffffa80`06f34e10 : nt!KiPageFault+0x260
fffff800`043ed300 fffff880`04cdaa67 : fffff800`030cb0c0 00000000`00000000 00000000`00000000 00000000`00000002 : usbhub!USBHUB_TriggerCallBacks+0x11
fffff800`043ed330 fffff880`04cdaac1 : fffffa80`0a97cef8 fffffa80`00000001 fffffa80`0a97c1a0 fffffa80`0a97c050 : usbhub!UsbhTrapFatal_Dbg+0x13
fffff800`043ed370 fffff880`04cf2fd4 : fffffa80`0a97c050 fffff880`042e6f79 fffffa80`0a97ce18 fffffa80`0a97d030 : usbhub!FdoExt+0x35
fffff800`043ed3b0 fffff800`02eb15bf : 00000000`00000000 00000000`00000004 00000000`00000001 fffffa80`07762288 : usbhub!UsbhDmTimer+0x24
fffff800`043ed420 fffff800`02ed229e : 00000000`00000002 fffff800`043ed620 00000000`00000000 fffffa80`00100101 : nt!IopTimerDispatch+0x132
fffff800`043ed530 fffff800`02ed1dd6 : fffffa80`0ad2e450 00000000`0000b188 00000000`00000000 fffff800`02ffb2dd : nt!KiProcessTimerDpcTable+0x66
fffff800`043ed5a0 fffff800`02ed24be : 00000001`a698d531 fffff800`043edc18 00000000`0000b188 fffff800`03044388 : nt!KiProcessExpiredTimerList+0xc6
fffff800`043edbf0 fffff800`02ed1cb7 : 00000000`88c06fc8 00000000`0000b188 00000000`88c06fb6 00000000`00000088 : nt!KiTimerExpiration+0x1be
fffff800`043edc90 fffff800`02eceeea : fffff800`03040e80 fffff800`0304ec40 00000000`00000002 fffff880`00000000 : nt!KiRetireDpcList+0x277
fffff800`043edd40 00000000`00000000 : fffff800`043ee000 fffff800`043e8000 fffff800`043edd00 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
usbhub!USBHUB_TriggerCallBacks+11
fffff880`04d006b1 813848554220 cmp dword ptr [rax],20425548h
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: usbhub!USBHUB_TriggerCallBacks+11
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: usbhub
IMAGE_NAME: usbhub.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc2d
FAILURE_BUCKET_ID: X64_0xD1_usbhub!USBHUB_TriggerCallBacks+11
BUCKET_ID: X64_0xD1_usbhub!USBHUB_TriggerCallBacks+11
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031311-31231-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e50000 PsLoadedModuleList = 0xfffff800`0308de50
Debug session time: Sun Mar 13 08:00:41.519 2011 (UTC - 4:00)
System Uptime: 0 days 0:06:25.471
Loading Kernel Symbols
...............................................................
................................................................
..........................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002f72b1f, fffff88007171c70, 0}
Probably caused by : memory_corruption ( nt!MiIdentifyPfn+26f )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002f72b1f, Address of the instruction which caused the bugcheck
Arg3: fffff88007171c70, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiIdentifyPfn+26f
fffff800`02f72b1f f0410fba6e481f lock bts dword ptr [r14+48h],1Fh
CONTEXT: fffff88007171c70 -- (.cxr 0xfffff88007171c70)
rax=0000000000000001 rbx=02000000001c982c rcx=0200000000000020
rdx=00000000001bd5b4 rsi=0000000000000000 rdi=fffffa800709c558
rip=fffff80002f72b1f rsp=fffff88007172640 rbp=fffffa800a7c3b20
r8=00000000001bd4b3 r9=0000000000000001 r10=0000000000000042
r11=0000058000000000 r12=fffff88002f64180 r13=0000000000000000
r14=f8ff1c028496f896 r15=0000000000000000
iopl=0 nv up ei pl nz ac po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010216
nt!MiIdentifyPfn+0x26f:
fffff800`02f72b1f f0410fba6e481f lock bts dword ptr [r14+48h],1Fh ds:002b:f8ff1c02`8496f8de=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002f72b1f
STACK_TEXT:
fffff880`07172640 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiIdentifyPfn+0x26f
FOLLOWUP_IP:
nt!MiIdentifyPfn+26f
fffff800`02f72b1f f0410fba6e481f lock bts dword ptr [r14+48h],1Fh
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiIdentifyPfn+26f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
STACK_COMMAND: .cxr 0xfffff88007171c70 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MiIdentifyPfn+26f
BUCKET_ID: X64_0x3B_nt!MiIdentifyPfn+26f
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031411-31808-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e10000 PsLoadedModuleList = 0xfffff800`0304de50
Debug session time: Mon Mar 14 11:52:01.084 2011 (UTC - 4:00)
System Uptime: 0 days 0:31:15.036
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {48, 2, 1, fffff80002f32b1f}
Probably caused by : memory_corruption ( nt!MiIdentifyPfn+26f )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000048, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002f32b1f, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b80e0
0000000000000048
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiIdentifyPfn+26f
fffff800`02f32b1f f0410fba6e481f lock bts dword ptr [r14+48h],1Fh
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff88007a274b0 -- (.trap 0xfffff88007a274b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0400000000000020
rdx=000000000001fa06 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002f32b1f rsp=fffff88007a27640 rbp=fffffa800aafdb20
r8=0000000000022a07 r9=0000000000000001 r10=0000000000000042
r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!MiIdentifyPfn+0x26f:
fffff800`02f32b1f f0410fba6e481f lock bts dword ptr [r14+48h],1Fh ds:00000000`00000048=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e7fca9 to fffff80002e80740
STACK_TEXT:
fffff880`07a27368 fffff800`02e7fca9 : 00000000`0000000a 00000000`00000048 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`07a27370 fffff800`02e7e920 : 00000000`42506650 02000000`0015171d 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`07a274b0 fffff800`02f32b1f : 00000000`00000000 02000000`000a01fa 00000000`000018c0 fffff800`0314504b : nt!KiPageFault+0x260
fffff880`07a27640 fffff800`02f337cb : 00000000`00000000 00000000`00000004 fffffa80`09920fe8 fffffa80`09920000 : nt!MiIdentifyPfn+0x26f
fffff880`07a276e0 fffff800`03292ed5 : fffffa80`09920000 fffff880`07a27c60 fffff880`07a277b8 00000000`00000000 : nt!MmQueryPfnList+0xbb
fffff880`07a27720 fffff800`031d81f8 : 00000000`00000006 00000000`00000000 fffffa80`09920000 fffff800`02e10001 : nt!PfpPfnPrioRequest+0x115
fffff880`07a27770 fffff800`0317c0c3 : 00000000`00000000 fffff800`02e10000 fffffa80`09947000 00000000`00000001 : nt! ?? ::NNGAKEGL::`string'+0x46ddd
fffff880`07a27800 fffff800`0317cee5 : 00000000`0106b688 fffff800`02e8d618 00000000`0106b6e0 00000000`0106b6a8 : nt!ExpQuerySystemInformation+0x11c2
fffff880`07a27ba0 fffff800`02e7f993 : 00000000`00000002 fffff880`07a27c60 00000000`08e72628 00000000`02c9bf20 : nt!NtQuerySystemInformation+0x4d
fffff880`07a27be0 00000000`776bfa1a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0106b5a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x776bfa1a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiIdentifyPfn+26f
fffff800`02f32b1f f0410fba6e481f lock bts dword ptr [r14+48h],1Fh
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiIdentifyPfn+26f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiIdentifyPfn+26f
BUCKET_ID: X64_0xA_nt!MiIdentifyPfn+26f
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032011-32557-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e09000 PsLoadedModuleList = 0xfffff800`03046e50
Debug session time: Sun Mar 20 10:45:19.675 2011 (UTC - 4:00)
System Uptime: 0 days 0:08:52.002
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff8000318d2e1, fffff880089af130, 0}
Probably caused by : ntkrnlmp.exe ( nt!ObpCloseHandleTableEntry+51 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8000318d2e1, Address of the instruction which caused the bugcheck
Arg3: fffff880089af130, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ObpCloseHandleTableEntry+51
fffff800`0318d2e1 4883bba800000000 cmp qword ptr [rbx+0A8h],0
CONTEXT: fffff880089af130 -- (.cxr 0xfffff880089af130)
rax=0000000000000000 rbx=0000000000000000 rcx=fffff8a008396a10
rdx=fffff8a008bf4530 rsi=fffffa800723a6d0 rdi=fffff8a008bf4530
rip=fffff8000318d2e1 rsp=fffff880089afb00 rbp=fffffa8007241060
r8=fffffa8007241060 r9=000000000000014c r10=000000000000014c
r11=0000000000313160 r12=fffffa800b0d2e20 r13=fffffa8007241060
r14=8000000000004000 r15=fffff8a008396a10
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!ObpCloseHandleTableEntry+0x51:
fffff800`0318d2e1 4883bba800000000 cmp qword ptr [rbx+0A8h],0 ds:002b:00000000`000000a8=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: SearchProtocol
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff8000318d254 to fffff8000318d2e1
STACK_TEXT:
fffff880`089afb00 fffff800`0318d254 : 00000000`0000014c fffffa80`07241060 fffff8a0`08396a10 00000000`0000014c : nt!ObpCloseHandleTableEntry+0x51
fffff880`089afb90 fffff800`02e78993 : fffffa80`0723a6d0 fffff880`089afc60 00000000`0018b0b0 fffffa80`0cd826e0 : nt!ObpCloseHandle+0x94
fffff880`089afbe0 00000000`776bf7aa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00186708 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x776bf7aa
FOLLOWUP_IP:
nt!ObpCloseHandleTableEntry+51
fffff800`0318d2e1 4883bba800000000 cmp qword ptr [rbx+0A8h],0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ObpCloseHandleTableEntry+51
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
STACK_COMMAND: .cxr 0xfffff880089af130 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!ObpCloseHandleTableEntry+51
BUCKET_ID: X64_0x3B_nt!ObpCloseHandleTableEntry+51
Followup: MachineOwner
---------