Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: bsod help


08 Mar 2011   #1

Windows 7 Home Premium x64
 
 
bsod help

says driver_irql_not_less_or_equal only when i play games on my computer.


My System SpecsSystem Spec
.

08 Mar 2011   #2

Windows 7 x64
 
 

1. Two of your blue screens were caused by the XBox USB wireless controller driver, update it:
xusb21.sys Thu Aug 13 18:10:17 2009
Software Download


2. Update other old drivers too:

Razer Tarantula Keyboard
Lycosa.sys Fri Jan 18 03:51:42 2008

Razer Lachesis USB Optical Mouse
Lachesis.sys Fri Aug 17 03:48:44 2007

iZ3D LLC
S3DInjectionDriver.sys Fri Apr 24 15:37:38 2009







Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\030711-25937-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a64000 PsLoadedModuleList = 0xfffff800`02ca1e50
Debug session time: Mon Mar  7 23:35:07.757 2011 (UTC - 5:00)
System Uptime: 0 days 22:31:26.851
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
.............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {10, 2, 1, fffff88000f559a7}

Unable to load image \SystemRoot\system32\DRIVERS\xusb21.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for xusb21.sys
*** ERROR: Module load completed but symbols could not be loaded for xusb21.sys
Probably caused by : xusb21.sys ( xusb21+3c69 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88000f559a7, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0c0e0
 0000000000000010 

CURRENT_IRQL:  2

FAULTING_IP: 
Wdf01000!FxObject::DisposeChildrenWorker+7
fffff880`00f559a7 48896810        mov     qword ptr [rax+10h],rbp

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff88002f1b3e0 -- (.trap 0xfffff88002f1b3e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88002f1b578 rbx=0000000000000000 rcx=fffffa80045c0a80
rdx=0000000000000005 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000f559a7 rsp=fffff88002f1b578 rbp=0000000000000001
 r8=0000000000000002  r9=0000000000000001 r10=fffffa800630d801
r11=fffffa80066b3160 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
Wdf01000!FxObject::DisposeChildrenWorker+0x7:
fffff880`00f559a7 48896810        mov     qword ptr [rax+10h],rbp ds:a388:fffff880`02f1b588=0000000000000000
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ad3ca9 to fffff80002ad4740

STACK_TEXT:  
fffff880`02f1b298 fffff800`02ad3ca9 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`02f1b2a0 fffff800`02ad2920 : fffffa80`061e00b0 fffffa80`045c0a80 fffffa80`04491b40 00000000`0000000c : nt!KiBugCheckDispatch+0x69
fffff880`02f1b3e0 fffff880`00f559a7 : fffff880`00f555c8 fffffa80`045c0a80 00000000`00000000 fffffa80`044cfc50 : nt!KiPageFault+0x260
fffff880`02f1b578 fffff880`00f555c8 : fffffa80`045c0a80 00000000`00000000 fffffa80`044cfc50 fffffa80`06648430 : Wdf01000!FxObject::DisposeChildrenWorker+0x7
fffff880`02f1b580 fffff880`00f55789 : fffffa80`045c0a80 00000000`00000000 00000000`00000001 00000000`00000000 : Wdf01000!FxObject::PerformDisposingDisposeChildrenLocked+0xbc
fffff880`02f1b5f0 fffff880`00f554e4 : fffffa80`045c0a80 fffffa80`062b9f02 fffffa80`05568902 fffffa80`045c0a80 : Wdf01000!FxObject::PerformEarlyDisposeWorkerAndUnlock+0xf5
fffff880`02f1b660 fffff880`00f2468a : 00000000`00000000 fffffa80`05568990 00000000`00000001 00000000`00000000 : Wdf01000!FxObject::EarlyDispose+0x110
fffff880`02f1b6c0 fffff880`00f14dca : 0000057f`fa3df918 00000000`00000001 fffffa80`059f1d00 fffffa80`04634310 : Wdf01000!FxRequest::CompleteInternal+0x27e
fffff880`02f1b770 fffff880`06674c69 : fffffa80`045c0a80 fffffa80`045c0a80 0000057f`fba3f578 00000000`00000013 : Wdf01000!imp_WdfRequestComplete+0x196
fffff880`02f1b7e0 fffffa80`045c0a80 : fffffa80`045c0a80 0000057f`fba3f578 00000000`00000013 fffffa80`0630d801 : xusb21+0x3c69
fffff880`02f1b7e8 fffffa80`045c0a80 : 0000057f`fba3f578 00000000`00000013 fffffa80`0630d801 fffff880`066739e1 : 0xfffffa80`045c0a80
fffff880`02f1b7f0 0000057f`fba3f578 : 00000000`00000013 fffffa80`0630d801 fffff880`066739e1 fffffa80`042ecc70 : 0xfffffa80`045c0a80
fffff880`02f1b7f8 00000000`00000013 : fffffa80`0630d801 fffff880`066739e1 fffffa80`042ecc70 00000000`00000014 : 0x57f`fba3f578
fffff880`02f1b800 fffffa80`0630d801 : fffff880`066739e1 fffffa80`042ecc70 00000000`00000014 fffffa80`0630d800 : 0x13
fffff880`02f1b808 fffff880`066739e1 : fffffa80`042ecc70 00000000`00000014 fffffa80`0630d800 fffff880`0482a89a : 0xfffffa80`0630d801
fffff880`02f1b810 fffffa80`042ecc70 : 00000000`00000014 fffffa80`0630d800 fffff880`0482a89a 00000000`00000000 : xusb21+0x29e1
fffff880`02f1b818 00000000`00000014 : fffffa80`0630d800 fffff880`0482a89a 00000000`00000000 fffff880`06673c19 : 0xfffffa80`042ecc70
fffff880`02f1b820 fffffa80`0630d800 : fffff880`0482a89a 00000000`00000000 fffff880`06673c19 00000000`00000014 : 0x14
fffff880`02f1b828 fffff880`0482a89a : 00000000`00000000 fffff880`06673c19 00000000`00000014 fffff880`00f7a130 : 0xfffffa80`0630d800
fffff880`02f1b830 fffff880`0482ee02 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`059f1dc0 : usbehci!EHCI_sMode_Transfer+0x37e
fffff880`02f1b8c0 00000000`00000000 : 00000000`00000002 fffffa80`00000000 fffffa80`044a20a0 fffff880`00f0130f : usbehci!EHCI_SubmitTransfer+0x9a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
xusb21+3c69
fffff880`06674c69 ??              ???

SYMBOL_STACK_INDEX:  9

SYMBOL_NAME:  xusb21+3c69

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: xusb21

IMAGE_NAME:  xusb21.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a848f49

FAILURE_BUCKET_ID:  X64_0xD1_xusb21+3c69

BUCKET_ID:  X64_0xD1_xusb21+3c69

Followup: MachineOwner
---------






















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\030611-17578-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0281e000 PsLoadedModuleList = 0xfffff800`02a5be50
Debug session time: Sun Mar  6 19:01:56.390 2011 (UTC - 5:00)
System Uptime: 0 days 3:32:30.756
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {58, 2, 0, fffff80002897352}

Unable to load image \SystemRoot\system32\DRIVERS\xusb21.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for xusb21.sys
*** ERROR: Module load completed but symbols could not be loaded for xusb21.sys
Probably caused by : HIDCLASS.SYS ( HIDCLASS!HidpSetDeviceBusy+2c )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000058, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002897352, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ac60e0
 0000000000000058 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KeAcquireSpinLockRaiseToDpc+42
fffff800`02897352 4c8b642458      mov     r12,qword ptr [rsp+58h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  fffff88002f1b2d0 -- (.trap 0xfffff88002f1b2d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=fffffa8006693778
rdx=fffffa8006cf9b50 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002897352 rsp=fffff88002f1b460 rbp=fffffa8006693778
 r8=fffff88002f1b5f8  r9=0000000000000000 r10=0000000000000024
r11=fffffa800638997c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KeAcquireSpinLockRaiseToDpc+0x42:
fffff800`02897352 4c8b642458      mov     r12,qword ptr [rsp+58h] ss:0018:fffff880`02f1b4b8=fffff88005961aaa
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000288dca9 to fffff8000288e740

STACK_TEXT:  
fffff880`02f1b188 fffff800`0288dca9 : 00000000`0000000a 00000000`00000058 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f1b190 fffff800`0288c920 : 00000000`00000002 00000000`00000002 00000000`00000000 fffffa80`06b70c00 : nt!KiBugCheckDispatch+0x69
fffff880`02f1b2d0 fffff800`02897352 : 00000000`00000004 fffff880`059764a4 08740898`08980014 fffff880`02f1b4e8 : nt!KiPageFault+0x260
fffff880`02f1b460 fffff880`059680c8 : fffffa80`05d0b480 fffff880`05961aaa 00000000`0000000e fffffa80`066935f0 : nt!KeAcquireSpinLockRaiseToDpc+0x42
fffff880`02f1b4b0 fffff880`059615c2 : fffffa80`06cf9b50 fffffa80`066935f0 fffffa80`04e17e00 00000000`0000000e : HIDCLASS!HidpSetDeviceBusy+0x2c
fffff880`02f1b4f0 fffff880`05961e7d : fffffa80`06cf9b50 fffffa80`066935f0 00000000`00000000 00000000`0000000e : HIDCLASS!HidpSubmitInterruptRead+0x42
fffff880`02f1b550 fffff800`02890d26 : fffffa80`04e17f2b 00000000`00000000 fffffa80`06693401 fffffa80`04e17e00 : HIDCLASS!HidpInterruptReadComplete+0x37d
fffff880`02f1b5e0 fffff880`00ed5a52 : 00000000`00000000 fffffa80`04ec0c00 00000000`00000001 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
fffff880`02f1b6c0 fffff880`00ec5dca : fffffa80`04e17e10 00000000`00000001 fffffa80`06534300 fffffa80`04e17e10 : Wdf01000!FxRequest::CompleteInternal+0x646
fffff880`02f1b770 fffff880`090b4c69 : fffffa80`07463020 fffffa80`07463020 0000057f`f8b9cfd8 00000000`00000013 : Wdf01000!imp_WdfRequestComplete+0x196
fffff880`02f1b7e0 fffffa80`07463020 : fffffa80`07463020 0000057f`f8b9cfd8 00000000`00000013 fffffa80`05f460a1 : xusb21+0x3c69
fffff880`02f1b7e8 fffffa80`07463020 : 0000057f`f8b9cfd8 00000000`00000013 fffffa80`05f460a1 fffff880`090b39e1 : 0xfffffa80`07463020
fffff880`02f1b7f0 0000057f`f8b9cfd8 : 00000000`00000013 fffffa80`05f460a1 fffff880`090b39e1 fffffa80`06ec54b0 : 0xfffffa80`07463020
fffff880`02f1b7f8 00000000`00000013 : fffffa80`05f460a1 fffff880`090b39e1 fffffa80`06ec54b0 00000000`00000014 : 0x57f`f8b9cfd8
fffff880`02f1b800 fffffa80`05f460a1 : fffff880`090b39e1 fffffa80`06ec54b0 00000000`00000014 fffffa80`05f460a0 : 0x13
fffff880`02f1b808 fffff880`090b39e1 : fffffa80`06ec54b0 00000000`00000014 fffffa80`05f460a0 fffff880`0482a89a : 0xfffffa80`05f460a1
fffff880`02f1b810 fffffa80`06ec54b0 : 00000000`00000014 fffffa80`05f460a0 fffff880`0482a89a 00000000`00000000 : xusb21+0x29e1
fffff880`02f1b818 00000000`00000014 : fffffa80`05f460a0 fffff880`0482a89a 00000000`00000000 fffff880`090b3c19 : 0xfffffa80`06ec54b0
fffff880`02f1b820 fffffa80`05f460a0 : fffff880`0482a89a 00000000`00000000 fffff880`090b3c19 00000000`00000014 : 0x14
fffff880`02f1b828 fffff880`0482a89a : 00000000`00000000 fffff880`090b3c19 00000000`00000014 fffff880`00f2b130 : 0xfffffa80`05f460a0
fffff880`02f1b830 fffff880`0482ee02 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`065343e0 : usbehci!EHCI_sMode_Transfer+0x37e
fffff880`02f1b8c0 00000000`00000000 : 00000000`00000002 fffffa80`00000000 fffffa80`067b4c90 fffff880`00eb230f : usbehci!EHCI_SubmitTransfer+0x9a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
HIDCLASS!HidpSetDeviceBusy+2c
fffff880`059680c8 8b9378010000    mov     edx,dword ptr [rbx+178h]

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  HIDCLASS!HidpSetDeviceBusy+2c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: HIDCLASS

IMAGE_NAME:  HIDCLASS.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcbfd

FAILURE_BUCKET_ID:  X64_0xA_HIDCLASS!HidpSetDeviceBusy+2c

BUCKET_ID:  X64_0xA_HIDCLASS!HidpSetDeviceBusy+2c

Followup: MachineOwner
---------


















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\030711-21953-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02852000 PsLoadedModuleList = 0xfffff800`02a8fe50
Debug session time: Mon Mar  7 01:04:08.167 2011 (UTC - 5:00)
System Uptime: 0 days 2:58:43.167
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {40, 2, 0, fffff8800438ea43}

Probably caused by : USBPORT.SYS ( USBPORT!USBPORT_Xdpc_iBegin+33 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000040, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800438ea43, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002afa0e0
 0000000000000040 

CURRENT_IRQL:  2

FAULTING_IP: 
USBPORT!USBPORT_Xdpc_iBegin+33
fffff880`0438ea43 488b5640        mov     rdx,qword ptr [rsi+40h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff88002f1ba80 -- (.trap 0xfffff88002f1ba80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=00000000000a78ca
rdx=00000000000a790a rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800438ea43 rsp=fffff88002f1bc10 rbp=fffffa8005c3b050
 r8=fffffa8005c3b1a0  r9=00000000ffffffff r10=fffffa8005c3b1a0
r11=000000000002625a r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
USBPORT!USBPORT_Xdpc_iBegin+0x33:
fffff880`0438ea43 488b5640        mov     rdx,qword ptr [rsi+40h] ds:ba10:00000000`00000040=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800028c1ca9 to fffff800028c2740

STACK_TEXT:  
fffff880`02f1b938 fffff800`028c1ca9 : 00000000`0000000a 00000000`00000040 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f1b940 fffff800`028c0920 : fffffa80`05c3b1a0 00000000`00000002 fffff880`02f1ba88 fffff880`02f1ba98 : nt!KiBugCheckDispatch+0x69
fffff880`02f1ba80 fffff880`0438ea43 : 00000000`00000002 fffffa80`05c3b050 00000000`00000000 00000000`ffffffff : nt!KiPageFault+0x260
fffff880`02f1bc10 fffff880`0439df0b : fffffa80`05c3b050 fffffa80`05c3ba02 fffff880`02f1bca8 fffffa80`05c3b1a0 : USBPORT!USBPORT_Xdpc_iBegin+0x33
fffff880`02f1bc40 fffff880`0438ef89 : fffffa80`05c3b050 00000000`00000000 fffffa80`05c3ba02 fffffa80`05c3ba10 : USBPORT!USBPORT_Core_UsbHcIntDpc_Worker+0x77
fffff880`02f1bca0 fffff800`028cdbfc : fffff880`009e8180 fffffa80`05c3ba10 fffffa80`05c3ba28 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02f1bcd0 fffff800`028caeea : fffff880`009e8180 fffff880`009f30c0 00000000`00000000 fffff880`0438edb0 : nt!KiRetireDpcList+0x1bc
fffff880`02f1bd80 00000000`00000000 : fffff880`02f1c000 fffff880`02f16000 fffff880`02f1bd40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
USBPORT!USBPORT_Xdpc_iBegin+33
fffff880`0438ea43 488b5640        mov     rdx,qword ptr [rsi+40h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  USBPORT!USBPORT_Xdpc_iBegin+33

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: USBPORT

IMAGE_NAME:  USBPORT.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcc07

FAILURE_BUCKET_ID:  X64_0xD1_USBPORT!USBPORT_Xdpc_iBegin+33

BUCKET_ID:  X64_0xD1_USBPORT!USBPORT_Xdpc_iBegin+33

Followup: MachineOwner
---------














Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\030811-19031-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a65000 PsLoadedModuleList = 0xfffff800`02ca2e50
Debug session time: Tue Mar  8 02:23:16.188 2011 (UTC - 5:00)
System Uptime: 0 days 2:47:28.188
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {fffffffffffffff0, 2, 1, fffff80002ade316}

Probably caused by : Wdf01000.sys ( Wdf01000!FxIoTarget::RequestCompletionRoutine+9e )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffffffffffff0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ade316, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0d0e0
 fffffffffffffff0 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KeAcquireSpinLockRaiseToDpc+6
fffff800`02ade316 4154            push    r12

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  fffff88002f1b7d0 -- (.trap 0xfffff88002f1b7d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88000e2ac00 rbx=0000000000000000 rcx=fffffa80060a8940
rdx=fffff88000ea27c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ade316 rsp=fffff88002f1b960 rbp=fffffa80060a88f0
 r8=fffffa80060c3e70  r9=0000000000000050 r10=fffffa8005f62e70
r11=fffff88002f1bb18 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KeAcquireSpinLockRaiseToDpc+0x6:
fffff800`02ade316 4154            push    r12
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ad4ca9 to fffff80002ad5740

STACK_TEXT:  
fffff880`02f1b688 fffff800`02ad4ca9 : 00000000`0000000a ffffffff`fffffff0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`02f1b690 fffff800`02ad3920 : 00000000`00006000 fffffa80`060a88e0 00000000`00010011 fffffa80`05d186a0 : nt!KiBugCheckDispatch+0x69
fffff880`02f1b7d0 fffff800`02ade316 : fffffa80`060a88f0 fffff880`00e29b6e fffffa80`05d17050 fffff880`04812ba2 : nt!KiPageFault+0x260
fffff880`02f1b960 fffff880`00e29b6e : fffffa80`05d17050 fffff880`04812ba2 fffffa80`06adac00 fffffa80`060a88e0 : nt!KeAcquireSpinLockRaiseToDpc+0x6
fffff880`02f1b970 fffff880`00e29dc4 : fffffa80`05d17a10 fffff880`0482d0d8 00000000`00000000 fffff880`00000009 : Wdf01000!FxIoTarget::RequestCompletionRoutine+0x9e
fffff880`02f1b9e0 fffff800`02ac0105 : fffffa80`060a9c50 fffff880`0482dd70 fffffa80`060a9dc0 fffff880`0482d0d8 : Wdf01000!FxIoTarget::_RequestCompletionRoutine+0x3c
fffff880`02f1ba10 fffff800`02ad7d26 : fffffa80`060c3ca3 00000000`00000000 00000000`00000000 fffffa80`060c3ab0 : nt!IopUnloadSafeCompletion+0x55
fffff880`02f1ba40 fffff880`048135d9 : fffffa80`05d17050 fffffa80`060c3a00 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
fffff880`02f1bb20 fffff880`04813ab7 : fffffa80`06adac02 fffffa80`060c3ab0 00000000`ffffffff fffffa80`05d17ea8 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa15
fffff880`02f1bc00 fffff880`0481164f : fffffa80`05d17ea8 fffffa80`05d171a0 fffffa80`05d18040 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`02f1bc60 fffff880`04802f89 : fffffa80`05d17050 00000000`00000000 fffffa80`05d17e02 fffffa80`05d17ea8 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`02f1bca0 fffff800`02ae0bfc : fffff880`009e8180 fffffa80`05d17ea8 fffffa80`05d17ec0 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02f1bcd0 fffff800`02addeea : fffff880`009e8180 fffff880`009f30c0 00000000`00000000 fffff880`04802db0 : nt!KiRetireDpcList+0x1bc
fffff880`02f1bd80 00000000`00000000 : fffff880`02f1c000 fffff880`02f16000 fffff880`02f1bd40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
Wdf01000!FxIoTarget::RequestCompletionRoutine+9e
fffff880`00e29b6e 88442470        mov     byte ptr [rsp+70h],al

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  Wdf01000!FxIoTarget::RequestCompletionRoutine+9e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Wdf01000

IMAGE_NAME:  Wdf01000.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc19f

FAILURE_BUCKET_ID:  X64_0xA_Wdf01000!FxIoTarget::RequestCompletionRoutine+9e

BUCKET_ID:  X64_0xA_Wdf01000!FxIoTarget::RequestCompletionRoutine+9e

Followup: MachineOwner
---------



Drivers:

Code:
start             end                 module name
fffff880`06c00000 fffff880`06c3e000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00ece000 fffff880`00f25000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02c61000 fffff880`02ceb000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`051e7000 fffff880`051fd000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`00dda000 fffff880`00de5000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`06c71000 fffff880`06c7c000   asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)
fffff880`00da7000 fffff880`00db0000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00db0000 fffff880`00dda000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`0446f000 fffff880`0448f000   AtihdW76 AtihdW76.sys Wed Nov 17 07:02:04 2010 (4CE3C43C)
fffff880`04857000 fffff880`05153000   atikmdag atikmdag.sys Wed Jan 26 17:48:28 2011 (4D40A4BC)
fffff880`03c18000 fffff880`03c66000   atikmpag atikmpag.sys Wed Jan 26 17:13:33 2011 (4D409C8D)
fffff880`01998000 fffff880`0199f000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02c42000 fffff880`02c53000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`06167000 fffff880`06185000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00660000 fffff960`00687000   cdd      cdd.dll      unavailable (00000000)
fffff880`01934000 fffff880`0195e000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00ccd000 fffff880`00d8d000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`018ce000 fffff880`018fe000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c6f000 fffff880`00ccd000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`010f1000 fffff880`01164000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`051d7000 fffff880`051e7000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`056e9000 fffff880`056f7000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02c24000 fffff880`02c42000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02c15000 fffff880`02c24000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`018b8000 fffff880`018ce000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`044cc000 fffff880`044ee000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05703000 fffff880`0570c000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`056f7000 fffff880`05703000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0570c000 fffff880`0571f000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`057a9000 fffff880`057b5000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03c66000 fffff880`03d5a000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`05153000 fffff880`05199000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`0107f000 fffff880`01093000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01033000 fffff880`0107f000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013e8000 fffff880`013f2000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0187e000 fffff880`018b8000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`015b1000 fffff880`015fb000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02a1c000 fffff800`02a65000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`05199000 fffff880`051bd000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`0568d000 fffff880`056e9000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`05754000 fffff880`0576d000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`0576d000 fffff880`05775080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`05746000 fffff880`05754000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`0609f000 fffff880`06167000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`0141a000 fffff880`01423000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`01200000 fffff880`01216000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`04578000 fffff880`04587000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05783000 fffff880`05791000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00ba5000 fffff800`00baf000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04598000 fffff880`045db000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013bd000 fffff880`013d7000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01586000 fffff880`015b1000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`045ed000 fffff880`045f2200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`0573e000 fffff880`05745680   Lachesis Lachesis.sys Fri Aug 17 03:48:44 2007 (46C552DC)
fffff880`05621000 fffff880`05636000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`057c3000 fffff880`057e6000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`057a4000 fffff880`057a8980   Lycosa   Lycosa.sys   Fri Jan 18 03:51:42 2008 (4790689E)
fffff880`00c17000 fffff880`00c5b000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`057b5000 fffff880`057c3000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`04587000 fffff880`04596000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05776000 fffff880`05783000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00d8d000 fffff880`00da7000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`0195e000 fffff880`0198f000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`06d8b000 fffff880`06d9b000   MpNWMon  MpNWMon.sys  Tue Sep 14 20:19:30 2010 (4C901112)
fffff880`06185000 fffff880`0619d000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`0619d000 fffff880`061ca000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`06000000 fffff880`0604e000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`0604e000 fffff880`06071000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`01800000 fffff880`0180b000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f2e000 fffff880`00f38000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01093000 fffff880`010f1000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02c00000 fffff880`02c0b000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01408000 fffff880`0141a000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01434000 fffff880`01526000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03c00000 fffff880`03c0c000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`044f3000 fffff880`04522000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0445a000 fffff880`0446f000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d5f000 fffff880`02d6e000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02ceb000 fffff880`02d30000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01526000 fffff880`01586000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`06d9b000 fffff880`06db0000   NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
fffff880`0180b000 fffff880`0181c000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02dee000 fffff880`02dfa000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a65000 fffff800`03042000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`0121a000 fffff880`013bd000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`0198f000 fffff880`01998000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02d39000 fffff880`02d5f000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00f78000 fffff880`00f8d000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f38000 fffff880`00f6b000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e00000 fffff880`00e07000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00e07000 fffff880`00e17000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013d7000 fffff880`013e8000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`0683d000 fffff880`068e3000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`0448f000 fffff880`044cc000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c5b000 fffff880`00c6f000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`01000000 fffff880`01024000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04522000 fffff880`0453d000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0453d000 fffff880`0455e000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`0455e000 fffff880`04578000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02d9d000 fffff880`02dee000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`019e2000 fffff880`019eb000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019eb000 fffff880`019f4000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019f4000 fffff880`019fd000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`011b0000 fffff880`011ea000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`05636000 fffff880`0564e000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`02c0b000 fffff880`02c140a0   S3DInjectionDriver S3DInjectionDriver.sys Fri Apr 24 15:37:38 2009 (49F21502)
fffff880`068e3000 fffff880`068ee000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`01400000 fffff880`01408000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06cf5000 fffff880`06d8b000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`0692d000 fffff880`06994000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`068ee000 fffff880`0691b000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`04596000 fffff880`04597480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`0691b000 fffff880`0692d000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`0183a000 fffff880`01847000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`0181c000 fffff880`0183a000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02d89000 fffff880`02d9d000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00500000 fffff960`0050a000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`01847000 fffff880`0186d000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`045db000 fffff880`045ed000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`0571f000 fffff880`0573c000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`0573c000 fffff880`0573df00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`051bd000 fffff880`051ce000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04400000 fffff880`0445a000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`04800000 fffff880`04856000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00f6b000 fffff880`00f78000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`0199f000 fffff880`019ad000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`019ad000 fffff880`019d2000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00f8d000 fffff880`00fa2000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00fa2000 fffff880`00ffe000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01164000 fffff880`011b0000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02d6e000 fffff880`02d89000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`019d2000 fffff880`019e2000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e1b000 fffff880`00ebf000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ebf000 fffff880`00ece000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d30000 fffff880`02d39000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000c0000 fffff960`003d0000   win32k   win32k.sys   unavailable (00000000)
fffff880`051ce000 fffff880`051d7000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f25000 fffff880`00f2e000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`05600000 fffff880`05621000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
fffff880`05791000 fffff880`057a3100   xusb21   xusb21.sys   Thu Aug 13 18:10:17 2009 (4A848F49)
fffff880`03d5a000 fffff880`03dbd000   yk62x64  yk62x64.sys  Mon Feb 23 10:02:27 2009 (49A2BA83)

Unloaded modules:
fffff880`03dbd000 fffff880`03dfb000   1394ohci.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0003E000
fffff880`06db0000 fffff880`06dbc000   hiber_atapor
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`06dbc000 fffff880`06dc5000   hiber_atapi.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`06dc5000 fffff880`06dd8000   hiber_dumpfv
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
fffff880`06c7c000 fffff880`06ced000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`06c00000 fffff880`06c71000   spsys.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00071000
fffff880`018fe000 fffff880`0190c000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`0190c000 fffff880`01918000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`01918000 fffff880`01921000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01921000 fffff880`01934000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
My System SpecsSystem Spec
Reply

 bsod help




Thread Tools



Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 11:05 PM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33