Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\030211-48313-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*[url]http://msdl.microsoft.com/download/symbols[/url]
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e67000 PsLoadedModuleList = 0xfffff800`030ace90
Debug session time: Thu Mar 3 00:45:50.006 2011 (UTC - 5:00)
System Uptime: 4 days 6:00:05.151
Loading Kernel Symbols
...............................................................
................................................................
..................................................
Loading User Symbols
Loading unloaded module list
...................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck FE, {5, fffffa800eb921a0, 80863b34, fffffa800f671af8}
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: usbport!_DEVICE_EXTENSION ***
*** ***
*************************************************************************
Probably caused by : usbehci.sys ( usbehci!EHCI_sMode_PollEndpointSlot+67 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BUGCODE_USB_DRIVER (fe)
USB Driver bugcheck, first parameter is USB bugcheck code.
Arguments:
Arg1: 0000000000000005, USBBUGCODE_INVALID_PHYSICAL_ADDRESS The host controller is
using a physical memory address that was not allocated by
the USBport driver.
Arg2: fffffa800eb921a0, Device extension pointer of the host controller
Arg3: 0000000080863b34, PCI Vendor,Product id for the controller
Arg4: fffffa800f671af8, Pointer to Endpoint data structure
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: usbport!_DEVICE_EXTENSION ***
*** ***
*************************************************************************
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xFE
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff8800462df3e to fffff80002ee7640
STACK_TEXT:
fffff880`03199a18 fffff880`0462df3e : 00000000`000000fe 00000000`00000005 fffffa80`0eb921a0 00000000`80863b34 : nt!KeBugCheckEx
fffff880`03199a20 fffff880`05292fdf : 00000000`dbd01100 fffffa80`0eb936a0 fffffa80`0f671c68 00000000`00000000 : USBPORT!USBPORTSVC_MapHwPhysicalToVirtual+0x18a
fffff880`03199a60 fffff880`05292ba4 : fffff880`03e85080 fffffa80`0f2ac000 fffffa80`0f671c68 fffff800`02f07100 : usbehci!EHCI_sMode_PollEndpointSlot+0x67
fffff880`03199af0 fffff880`05297c01 : fffffa80`0f671af8 fffffa80`0eb921a0 fffffa80`0c786040 00000000`00000000 : usbehci!EHCI_PollPerAsyEndpoint+0x84
fffff880`03199b70 fffff880`04601e8b : 00000000`00000002 fffffa80`0eb921a0 00000000`00000000 00000000`00000050 : usbehci!EHCI_PollEndpoint+0x41
fffff880`03199bb0 fffff880`046069d1 : 00000000`00000050 00000000`00000004 fffffa80`0f6718b0 fffffa80`0eb92050 : USBPORT!MPf_PollEndpoint+0x9b
fffff880`03199be0 fffff880`04612077 : fffffa80`0eb921a0 00000000`00000050 fffffa80`0000000e 00000000`00000000 : USBPORT!USBPORT_iSetGlobalEndpointStateTx+0x7c1
fffff880`03199c40 fffff880`04602f89 : fffffa80`0eb92050 00000000`00000000 fffffa80`0eb92a02 fffffa80`0eb92a18 : USBPORT!USBPORT_Core_UsbHcIntDpc_Worker+0x1c3
fffff880`03199ca0 fffff800`02ef2b1c : fffff880`03171180 fffffa80`0eb92a18 fffffa80`0eb92a30 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`03199cd0 fffff800`02edf36a : fffff880`03171180 fffff880`0317c0c0 00000000`00000000 fffff880`04602db0 : nt!KiRetireDpcList+0x1bc
fffff880`03199d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
usbehci!EHCI_sMode_PollEndpointSlot+67
fffff880`05292fdf 4533c9 xor r9d,r9d
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: usbehci!EHCI_sMode_PollEndpointSlot+67
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: usbehci
IMAGE_NAME: usbehci.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7a66a
FAILURE_BUCKET_ID: X64_0xFE_INVALID_PHYSICAL_ADDR_usbehci!EHCI_sMode_PollEndpointSlot+67
BUCKET_ID: X64_0xFE_INVALID_PHYSICAL_ADDR_usbehci!EHCI_sMode_PollEndpointSlot+67
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\030511-21684-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*[url]http://msdl.microsoft.com/download/symbols[/url]
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e4f000 PsLoadedModuleList = 0xfffff800`03094e90
Debug session time: Sat Mar 5 08:43:05.178 2011 (UTC - 5:00)
System Uptime: 0 days 20:08:39.144
Loading Kernel Symbols
...............................................................
................................................................
.................................................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck FE, {5, fffffa800eb1b1a0, 80863b34, fffffa800f3c8c48}
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: usbport!_DEVICE_EXTENSION ***
*** ***
*************************************************************************
Probably caused by : usbehci.sys ( usbehci!EHCI_sMode_PollEndpointSlot+67 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BUGCODE_USB_DRIVER (fe)
USB Driver bugcheck, first parameter is USB bugcheck code.
Arguments:
Arg1: 0000000000000005, USBBUGCODE_INVALID_PHYSICAL_ADDRESS The host controller is
using a physical memory address that was not allocated by
the USBport driver.
Arg2: fffffa800eb1b1a0, Device extension pointer of the host controller
Arg3: 0000000080863b34, PCI Vendor,Product id for the controller
Arg4: fffffa800f3c8c48, Pointer to Endpoint data structure
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: usbport!_DEVICE_EXTENSION ***
*** ***
*************************************************************************
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xFE
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff8800553ef3e to fffff80002ecf640
STACK_TEXT:
fffff880`03199a18 fffff880`0553ef3e : 00000000`000000fe 00000000`00000005 fffffa80`0eb1b1a0 00000000`80863b34 : nt!KeBugCheckEx
fffff880`03199a20 fffff880`04692fdf : 00000000`dbdbe180 fffffa80`0eb1c6a0 fffffa80`0f3c8db8 00000000`00000000 : USBPORT!USBPORTSVC_MapHwPhysicalToVirtual+0x18a
fffff880`03199a60 fffff880`04692ba4 : fffff880`05d5d100 ffffffff`ffffffff fffffa80`0f3c8db8 fffff800`02eef1e4 : usbehci!EHCI_sMode_PollEndpointSlot+0x67
fffff880`03199af0 fffff880`04697c01 : fffffa80`0f3c8c48 fffffa80`0eb1b1a0 fffffa80`0c787040 0000b837`08b768a4 : usbehci!EHCI_PollPerAsyEndpoint+0x84
fffff880`03199b70 fffff880`05512e8b : 00000000`00000002 fffffa80`0eb1b1a0 00000000`00000000 00000000`00000000 : usbehci!EHCI_PollEndpoint+0x41
fffff880`03199bb0 fffff880`055179d1 : 00000000`00000000 00000000`00000004 fffffa80`0f3c8a00 fffffa80`0eb1b050 : USBPORT!MPf_PollEndpoint+0x9b
fffff880`03199be0 fffff880`05523077 : fffffa80`0eb1b1a0 00000000`00000000 fffffa80`0000000e 00000000`00000000 : USBPORT!USBPORT_iSetGlobalEndpointStateTx+0x7c1
fffff880`03199c40 fffff880`05513f89 : fffffa80`0eb1b050 00000000`00000000 fffffa80`0eb1ba02 fffffa80`0eb1ba18 : USBPORT!USBPORT_Core_UsbHcIntDpc_Worker+0x1c3
fffff880`03199ca0 fffff800`02edab1c : fffff880`03171180 fffffa80`0eb1ba18 fffffa80`0eb1ba30 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`03199cd0 fffff800`02ec736a : fffff880`03171180 fffff880`0317c0c0 00000000`00000000 fffff880`05513db0 : nt!KiRetireDpcList+0x1bc
fffff880`03199d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
usbehci!EHCI_sMode_PollEndpointSlot+67
fffff880`04692fdf 4533c9 xor r9d,r9d
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: usbehci!EHCI_sMode_PollEndpointSlot+67
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: usbehci
IMAGE_NAME: usbehci.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7a66a
FAILURE_BUCKET_ID: X64_0xFE_INVALID_PHYSICAL_ADDR_usbehci!EHCI_sMode_PollEndpointSlot+67
BUCKET_ID: X64_0xFE_INVALID_PHYSICAL_ADDR_usbehci!EHCI_sMode_PollEndpointSlot+67
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\030311-21886-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*[url]http://msdl.microsoft.com/download/symbols[/url]
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e03000 PsLoadedModuleList = 0xfffff800`03048e90
Debug session time: Thu Mar 3 17:26:19.125 2011 (UTC - 5:00)
System Uptime: 0 days 0:24:40.015
Loading Kernel Symbols
...............................................................
................................................................
....................................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 19, {20, fffffa800f82aae0, fffffa800f82aca0, c1c0015}
Unable to load image \??\C:\Windows\system32\drivers\vmx86.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for vmx86.sys
*** ERROR: Module load completed but symbols could not be loaded for vmx86.sys
Probably caused by : vmx86.sys ( vmx86+1517 )
Followup: MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000020, a pool block header size is corrupt.
Arg2: fffffa800f82aae0, The pool entry we were looking for within the page.
Arg3: fffffa800f82aca0, The next pool entry.
Arg4: 000000000c1c0015, (reserved)
Debugging Details:
------------------
BUGCHECK_STR: 0x19_20
POOL_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b40e8
fffffa800f82aae0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: vmware-authd.e
CURRENT_IRQL: 1
IRP_ADDRESS: ffffffffffffff88
LAST_CONTROL_TRANSFER: from fffff80002fadcae to fffff80002e83640
STACK_TEXT:
fffff880`06406748 fffff800`02fadcae : 00000000`00000019 00000000`00000020 fffffa80`0f82aae0 fffffa80`0f82aca0 : nt!KeBugCheckEx
fffff880`06406750 fffff800`02e98afe : 00000000`a0000003 0000000a`00000009 0000002e`20206f49 0000014c`0000006e : nt!ExDeferredFreePool+0x12da
fffff880`06406800 fffff800`02e86dbf : 00000000`00000000 fffff880`04062b36 fffffa80`0f82ab01 fffff880`06406ca0 : nt!IopCompleteRequest+0x5ce
fffff880`064068d0 fffff880`04062517 : fffffa80`0d591b30 fffff800`02e97500 fffffa80`0fe10280 00000000`00000000 : nt!IopfCompleteRequest+0x6df
fffff880`064069b0 fffffa80`0d591b30 : fffff800`02e97500 fffffa80`0fe10280 00000000`00000000 fffffa80`00000004 : vmx86+0x1517
fffff880`064069b8 fffff800`02e97500 : fffffa80`0fe10280 00000000`00000000 fffffa80`00000004 fffffa80`0f82ab00 : 0xfffffa80`0d591b30
fffff880`064069c0 fffff800`0319df97 : fffffa80`0fe10280 fffff880`06406ca0 fffffa80`0fe10280 fffffa80`0d591b00 : nt!ExAllocatePoolWithQuotaTag+0x40
fffff880`06406a10 fffff800`0319e7f6 : fffff880`06406bf8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x607
fffff880`06406b40 fffff800`02e828d3 : fffff880`06406ca0 fffffa80`0fe0e060 fffff880`06406bf8 fffff880`06406c00 : nt!NtDeviceIoControlFile+0x56
fffff880`06406bb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
STACK_COMMAND: kb
FOLLOWUP_IP:
vmx86+1517
fffff880`04062517 ?? ???
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: vmx86+1517
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: vmx86
IMAGE_NAME: vmx86.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4b5a8e0d
FAILURE_BUCKET_ID: X64_0x19_20_vmx86+1517
BUCKET_ID: X64_0x19_20_vmx86+1517
Followup: MachineOwner
---------