Code:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`03218000 PsLoadedModuleList = 0xfffff800`0345de90
Debug session time: Tue Mar 1 11:37:35.338 2011 (GMT-5)
System Uptime: 0 days 0:08:22.118
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C4, {91, 2, fffff88002fdffc0, 0}
Probably caused by : USBPORT.SYS ( USBPORT!USBPORT_Core_iCompleteDoneTransfer+45f )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
A device driver attempting to corrupt the system has been caught. This is
because the driver was specified in the registry as being suspect (by the
administrator) and the kernel has enabled substantial checking of this driver.
If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
be among the most commonly seen crashes.
Arguments:
Arg1: 0000000000000091, A driver switched stacks using a method that is not supported by
the operating system. The only supported way to extend a kernel
mode stack is by using KeExpandKernelStackAndCallout.
Arg2: 0000000000000002
Arg3: fffff88002fdffc0
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0xc4_91
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff800032ef53a to fffff80003298640
STACK_TEXT:
fffff880`02ffd8a8 fffff800`032ef53a : 00000000`000000c4 00000000`00000091 00000000`00000002 fffff880`02fdffc0 : nt!KeBugCheckEx
fffff880`02ffd8b0 fffff800`03333c05 : 00000000`00000000 fffff880`11311d86 fffffa80`00000003 fffff880`11310108 : nt! ?? ::FNODOBFM::`string'+0x4874
fffff880`02ffd8f0 fffff800`03351aad : fffff880`02ff8000 fffff880`02ffc000 00000000`00000030 00000000`00000001 : nt!RtlEnoughStackSpaceForStackCapture+0x15
fffff880`02ffd920 fffff800`0335294b : 00000000`00000003 fffffa80`044e5698 00000000`00000000 00000000`00000002 : nt!RtlWalkFrameChain+0x4d
fffff880`02ffd950 fffff800`0372c02c : fffffa80`044e5680 00000000`000000b0 00000000`00000002 fffff800`0337ec91 : nt!RtlCaptureStackBackTrace+0x4b
fffff880`02ffd980 fffff800`0372e09a : 00000000`00000002 fffffa80`04a9a450 00000000`00000000 fffffa80`05e1a298 : nt!IovpLogStackCallout+0x1c
fffff880`02ffd9b0 fffff800`0373093a : fffffa80`04a9a460 00000000`0000000b 00000000`00000000 00000000`00000002 : nt!ViPoolLogStackTrace+0x8a
fffff880`02ffd9e0 fffff800`033c2c57 : fffffa80`04a9a450 00000000`000000b0 00000000`00000002 00000000`00000000 : nt!VfFreePoolNotification+0x4a
fffff880`02ffda10 fffff800`03806865 : fffffa80`06082080 00000000`00000cb0 00000000`00000000 fffffa80`04b90180 : nt!ExDeferredFreePool+0x1283
fffff880`02ffdac0 fffff880`11d3e023 : fffffa80`05fea1a0 fffffa80`05c98fa0 fffffa80`05fea050 fffffa80`05fea1a0 : hal!HalPutScatterGatherList+0x115
fffff880`02ffdb20 fffff880`11d3eab7 : fffffa80`05c98c02 fffff980`03b6ed30 00000000`ffffffff fffffa80`05feaea8 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0x45f
fffff880`02ffdc00 fffff880`11d3c64f : fffffa80`05feaea8 fffffa80`05fea1a0 fffffa80`05feb040 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`02ffdc60 fffff880`11d2df89 : fffffa80`05fea050 00000000`00000000 fffffa80`05feae02 fffffa80`05feaea8 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`02ffdca0 fffff800`032a3b1c : fffff880`02fd5180 fffffa80`05feaea8 fffffa80`05feaec0 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02ffdcd0 fffff800`0329036a : fffff880`02fd5180 fffff880`02fdffc0 00000000`00000000 fffff880`11d2ddb0 : nt!KiRetireDpcList+0x1bc
fffff880`02ffdd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
USBPORT!USBPORT_Core_iCompleteDoneTransfer+45f
fffff880`11d3e023 4533c0 xor r8d,r8d
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: USBPORT!USBPORT_Core_iCompleteDoneTransfer+45f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: USBPORT
IMAGE_NAME: USBPORT.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc07
FAILURE_BUCKET_ID: X64_0xc4_91_VRF_USBPORT!USBPORT_Core_iCompleteDoneTransfer+45f
BUCKET_ID: X64_0xc4_91_VRF_USBPORT!USBPORT_Core_iCompleteDoneTransfer+45f
Followup: MachineOwner
---------
3: kd> lmtsmn
start end module name
fffff880`00ec5000 fffff880`00f1c000 ACPI ACPI.sys Sat Nov 20 04:19:16 2010 (4CE79294)
fffff880`04106000 fffff880`0418f000 afd afd.sys Sat Nov 20 04:23:27 2010 (4CE7938F)
fffff880`03e10000 fffff880`03e26000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`043af000 fffff880`043c4000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00c2a000 fffff880`00c35000 amdxata amdxata.sys Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`00de0000 fffff880`00de9000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c00000 fffff880`00c2a000 ataport ataport.SYS Sat Nov 20 04:19:15 2010 (4CE79293)
fffff960`00820000 fffff960`00881000 ATMFD ATMFD.DLL unavailable (00000000)
fffff880`0141f000 fffff880`01426000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`04378000 fffff880`04389000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`05dcb000 fffff880`05de9000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00780000 fffff960`007a7000 cdd cdd.dll unavailable (00000000)
fffff880`015d3000 fffff880`015fd000 cdrom cdrom.sys Sat Nov 20 04:19:20 2010 (4CE79298)
fffff880`07b53000 fffff880`07b60980 cfwids cfwids.sys Wed Oct 06 16:00:36 2010 (4CACD564)
fffff880`00cb6000 fffff880`00d76000 CI CI.dll Sat Nov 20 08:12:36 2010 (4CE7C944)
fffff880`019d0000 fffff880`01a00000 CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
fffff880`00c58000 fffff880`00cb6000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01000000 fffff880`01072000 cng cng.sys Sat Nov 20 05:08:45 2010 (4CE79E2D)
fffff880`03e00000 fffff880`03e10000 CompositeBus CompositeBus.sys Sat Nov 20 05:33:17 2010 (4CE7A3ED)
fffff880`05e00000 fffff880`05e0e000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`042d7000 fffff880`0435a000 csc csc.sys Sat Nov 20 04:27:12 2010 (4CE79470)
fffff880`06178000 fffff880`0618a000 dc3d dc3d.sys Tue Dec 14 06:09:28 2010 (4D075068)
fffff880`0435a000 fffff880`04378000 dfsc dfsc.sys Sat Nov 20 04:26:31 2010 (4CE79447)
fffff880`00de9000 fffff880`00df8000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`019ba000 fffff880`019d0000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`05d11000 fffff880`05d33000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05e1a000 fffff880`05e23000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05e0e000 fffff880`05e1a000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05d39000 fffff880`05d4c000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`06193000 fffff880`0619f000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03e44000 fffff880`03f38000 dxgkrnl dxgkrnl.sys Sat Nov 20 04:50:50 2010 (4CE799FA)
fffff880`03f38000 fffff880`03f7e000 dxgmms1 dxgmms1.sys Sat Nov 20 04:49:53 2010 (4CE799C1)
fffff880`010f4000 fffff880`01108000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010a8000 fffff880`010f4000 fltmgr fltmgr.sys Sat Nov 20 04:19:24 2010 (4CE7929C)
fffff880`013ed000 fffff880`013f7000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01980000 fffff880`019ba000 fvevol fvevol.sys Sat Nov 20 04:24:06 2010 (4CE793B6)
fffff880`0182c000 fffff880`01876000 fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
fffff800`03802000 fffff800`0384b000 hal hal.dll Sat Nov 20 08:00:25 2010 (4CE7C669)
fffff880`03f7e000 fffff880`03fa2000 HDAudBus HDAudBus.sys Sat Nov 20 05:43:42 2010 (4CE7A65E)
fffff880`061ad000 fffff880`061c6000 HIDCLASS HIDCLASS.SYS Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`0618a000 fffff880`06192080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`0619f000 fffff880`061ad000 hidusb hidusb.sys Sat Nov 20 05:43:49 2010 (4CE7A665)
fffff880`05c00000 fffff880`05cc9000 HTTP HTTP.sys Sat Nov 20 04:24:30 2010 (4CE793CE)
fffff880`01977000 fffff880`01980000 hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
fffff880`110a9000 fffff880`110b8000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`061c6000 fffff880`061d4000 kbdhid kbdhid.sys Sat Nov 20 05:33:25 2010 (4CE7A3F5)
fffff800`00bcb000 fffff800`00bd5000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04200000 fffff880`04243000 ks ks.sys Sat Nov 20 05:33:23 2010 (4CE7A3F3)
fffff880`013c1000 fffff880`013dc000 ksecdd ksecdd.sys Sat Nov 20 04:21:15 2010 (4CE7930B)
fffff880`01595000 fffff880`015c0000 ksecpkg ksecpkg.sys Sat Nov 20 05:10:34 2010 (4CE79E9A)
fffff880`05d33000 fffff880`05d38200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`05d9e000 fffff880`05db3000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05d5a000 fffff880`05d7d000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c37000 fffff880`00c44000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`07bd2000 fffff880`07bedc80 mfeapfk mfeapfk.sys Wed Oct 06 15:56:26 2010 (4CACD46A)
fffff880`060c4000 fffff880`060f0800 mfeavfk mfeavfk.sys Wed Oct 06 15:56:49 2010 (4CACD481)
fffff880`060f1000 fffff880`0615a780 mfefirek mfefirek.sys Wed Oct 06 15:59:47 2010 (4CACD533)
fffff880`01108000 fffff880`01186c80 mfehidk mfehidk.sys Wed Oct 06 15:55:49 2010 (4CACD445)
fffff880`041be000 fffff880`041ce900 mfenlfk mfenlfk.sys Wed Oct 06 15:56:13 2010 (4CACD45D)
fffff880`01876000 fffff880`018b9200 mfewfpk mfewfpk.sys Wed Oct 06 15:56:04 2010 (4CACD454)
fffff880`01400000 fffff880`01416000 MOBK MOBK.sys Thu Dec 31 22:20:07 2009 (4B3D69E7)
fffff880`05d4c000 fffff880`05d5a000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`110b8000 fffff880`110c7000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`061e0000 fffff880`061ed000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00d76000 fffff880`00d90000 mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`01600000 fffff880`01618000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`0665b000 fffff880`06688000 mrxsmb mrxsmb.sys Sat Nov 20 04:27:41 2010 (4CE7948D)
fffff880`06688000 fffff880`066d5000 mrxsmb10 mrxsmb10.sys Sat Nov 20 04:26:53 2010 (4CE7945D)
fffff880`066d5000 fffff880`066f9000 mrxsmb20 mrxsmb20.sys Sat Nov 20 04:26:47 2010 (4CE79457)
fffff880`01097000 fffff880`010a2000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f25000 fffff880`00f2f000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01187000 fffff880`011e5000 msrpc msrpc.sys Sat Nov 20 04:21:56 2010 (4CE79334)
fffff880`0408c000 fffff880`04097000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01965000 fffff880`01977000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01442000 fffff880`01535000 ndis ndis.sys Sat Nov 20 04:23:30 2010 (4CE79392)
fffff880`03e26000 fffff880`03e32000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`11024000 fffff880`11053000 ndiswan ndiswan.sys Sat Nov 20 05:52:32 2010 (4CE7A870)
fffff880`042b6000 fffff880`042cb000 NDProxy NDProxy.SYS Sat Nov 20 05:52:20 2010 (4CE7A864)
fffff880`041cf000 fffff880`041de000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`040c1000 fffff880`04106000 netbt netbt.sys Sat Nov 20 04:23:18 2010 (4CE79386)
fffff880`01535000 fffff880`01595000 NETIO NETIO.SYS Sat Nov 20 04:23:13 2010 (4CE79381)
fffff880`011e5000 fffff880`011f6000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`04080000 fffff880`0408c000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`03218000 fffff800`03802000 nt ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
fffff880`0121e000 fffff880`013c1000 Ntfs Ntfs.sys Sat Nov 20 04:20:57 2010 (4CE792F9)
fffff880`061d4000 fffff880`061e0000 NuidFltr NuidFltr.sys Tue Jun 29 04:54:32 2010 (4C29B4C8)
fffff880`01416000 fffff880`0141f000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`04243000 fffff880`0425c000 nusb3hub nusb3hub.sys Thu Dec 09 23:50:35 2010 (4D01B19B)
fffff880`03fa2000 fffff880`03fd3000 nusb3xhc nusb3xhc.sys Thu Dec 09 23:50:35 2010 (4D01B19B)
fffff880`11d29000 fffff880`11d2a180 nvBridge nvBridge.kmd Fri Jan 07 20:57:22 2011 (4D27C482)
fffff880`043c4000 fffff880`043ed000 nvhda64v nvhda64v.sys Thu Nov 11 18:10:36 2010 (4CDC77EC)
fffff880`110ce000 fffff880`11d28d00 nvlddmkm nvlddmkm.sys Fri Jan 07 21:07:22 2011 (4D27C6DA)
fffff880`04198000 fffff880`041be000 pacer pacer.sys Sat Nov 20 05:52:18 2010 (4CE7A862)
fffff880`00f6f000 fffff880`00f84000 partmgr partmgr.sys Sat Nov 20 04:20:00 2010 (4CE792C0)
fffff880`00f2f000 fffff880`00f62000 pci pci.sys Sat Nov 20 04:19:11 2010 (4CE7928F)
fffff880`00ff5000 fffff880`00ffc000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00e00000 fffff880`00e10000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013dc000 fffff880`013ed000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`066f9000 fffff880`0679f000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`061ed000 fffff880`061fd000 point64 point64.sys Tue Dec 14 06:09:25 2010 (4D075065)
fffff880`05cd4000 fffff880`05d11000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c44000 fffff880`00c58000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`11000000 fffff880`11024000 rasl2tp rasl2tp.sys Sat Nov 20 05:52:34 2010 (4CE7A872)
fffff880`11053000 fffff880`1106e000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`1106e000 fffff880`1108f000 raspptp raspptp.sys Sat Nov 20 05:52:31 2010 (4CE7A86F)
fffff880`1108f000 fffff880`110a9000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`0402f000 fffff880`04080000 rdbss rdbss.sys Sat Nov 20 04:27:51 2010 (4CE79497)
fffff880`03e32000 fffff880`03e3d000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01434000 fffff880`0143d000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01210000 fffff880`01219000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`013f7000 fffff880`01400000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0192b000 fffff880`01965000 rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
fffff880`05db3000 fffff880`05dcb000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`11d81000 fffff880`11de8000 Rt64win7 Rt64win7.sys Wed Dec 29 06:44:36 2010 (4D1B1F24)
fffff880`05e2d000 fffff880`060c3400 RTKVHD64 RTKVHD64.sys Tue Jan 18 07:07:37 2011 (4D358289)
fffff880`0679f000 fffff880`067aa000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`03ff1000 fffff880`03ffd000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`041de000 fffff880`041fb000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01923000 fffff880`0192b000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`07b61000 fffff880`07bd2000 spsys spsys.sys Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`07a9e000 fffff880`07b37000 srv srv.sys Sat Nov 20 04:28:05 2010 (4CE794A5)
fffff880`07a06000 fffff880`07a71000 srv2 srv2.sys Sat Nov 20 04:27:43 2010 (4CE7948F)
fffff880`067aa000 fffff880`067db000 srvnet srvnet.sys Sat Nov 20 04:27:20 2010 (4CE79478)
fffff880`03e3d000 fffff880`03e3e480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01628000 fffff880`0182c000 tcpip tcpip.sys Sat Nov 20 04:25:52 2010 (4CE79420)
fffff880`067db000 fffff880`067ed000 tcpipreg tcpipreg.sys Sat Nov 20 05:51:48 2010 (4CE7A844)
fffff880`018ba000 fffff880`018c7000 TDI TDI.SYS Sat Nov 20 04:22:06 2010 (4CE7933E)
fffff880`0409f000 fffff880`040c1000 tdx tdx.sys Sat Nov 20 04:21:54 2010 (4CE79332)
fffff880`0401b000 fffff880`0402f000 termdd termdd.sys Sat Nov 20 06:03:40 2010 (4CE7AB0C)
fffff960`004e0000 fffff960`004ea000 TSDDD TSDDD.dll unavailable (00000000)
fffff880`04389000 fffff880`043af000 tunnel tunnel.sys Sat Nov 20 05:51:50 2010 (4CE7A846)
fffff880`11de8000 fffff880`11dfa000 umbus umbus.sys Sat Nov 20 05:44:37 2010 (4CE7A695)
fffff880`0615b000 fffff880`06178000 usbccgp usbccgp.sys Sat Nov 20 05:44:03 2010 (4CE7A673)
fffff880`03fd3000 fffff880`03fd4f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03fe0000 fffff880`03ff1000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`0425c000 fffff880`042b6000 usbhub usbhub.sys Sat Nov 20 05:44:30 2010 (4CE7A68E)
fffff880`03fd5000 fffff880`03fe0000 usbohci usbohci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`11d2b000 fffff880`11d81000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00f62000 fffff880`00f6f000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01426000 fffff880`01434000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01072000 fffff880`01097000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00d90000 fffff880`00dcc000 vmbus vmbus.sys Sat Nov 20 04:57:29 2010 (4CE79B89)
fffff880`018c7000 fffff880`018d7000 vmstorfl vmstorfl.sys Sat Nov 20 04:57:30 2010 (4CE79B8A)
fffff880`00f84000 fffff880`00f99000 volmgr volmgr.sys Sat Nov 20 04:19:28 2010 (4CE792A0)
fffff880`00f99000 fffff880`00ff5000 volmgrx volmgrx.sys Sat Nov 20 04:20:43 2010 (4CE792EB)
fffff880`018d7000 fffff880`01923000 volsnap volsnap.sys Sat Nov 20 04:20:08 2010 (4CE792C8)
fffff880`04000000 fffff880`0401b000 wanarp wanarp.sys Sat Nov 20 05:52:36 2010 (4CE7A874)
fffff880`01200000 fffff880`01210000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e12000 fffff880`00eb6000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00eb6000 fffff880`00ec5000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`0418f000 fffff880`04198000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00070000 fffff960`00381000 win32k win32k.sys unavailable (00000000)
fffff880`00dcc000 fffff880`00de0000 winhv winhv.sys Sat Nov 20 04:20:02 2010 (4CE792C2)
fffff880`00f1c000 fffff880`00f25000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`05d7d000 fffff880`05d9e000 WudfPf WudfPf.sys Sat Nov 20 05:42:44 2010 (4CE7A624)
Unloaded modules:
fffff880`07b37000 fffff880`07b53000 mfeapfk.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`07a71000 fffff880`07a9e000 mfeavfk01.sy
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01600000 fffff880`0160e000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`0160e000 fffff880`0161a000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`0161a000 fffff880`01623000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`015c0000 fffff880`015d3000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
Debug session time: Tue Mar 1 11:28:42.155 2011 (GMT-5)
System Uptime: 0 days 0:06:54.935
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {40, 2, 1, fffff800032f0898}
Probably caused by : ntkrnlmp.exe ( nt!KiTryUnwaitThread+28 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000040, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032f0898, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800035120e8
0000000000000040
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiTryUnwaitThread+28
fffff800`032f0898 f0480fba6b4000 lock bts qword ptr [rbx+40h],0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xA
PROCESS_NAME: plugin-contain
TRAP_FRAME: fffff8800a2ae6c0 -- (.trap 0xfffff8800a2ae6c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff88003164180
rdx=fffffa80054edb68 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032f0898 rsp=fffff8800a2ae850 rbp=0000004d004f004d
r8=0000000000000100 r9=0000000000000000 r10=0000000000000000
r11=fffff8800a2ae690 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiTryUnwaitThread+0x28:
fffff800`032f0898 f0480fba6b4000 lock bts qword ptr [rbx+40h],0 ds:00000000`00000040=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032e0be9 to fffff800032e1640
STACK_TEXT:
fffff880`0a2ae578 fffff800`032e0be9 : 00000000`0000000a 00000000`00000040 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0a2ae580 fffff800`032df860 : 00000000`00000003 fffffa80`068993a0 fffffa80`068994a8 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0a2ae6c0 fffff800`032f0898 : fffffa80`056a9790 fffff880`01019beb fffffa80`00000000 fffff8a0`028666a0 : nt!KiPageFault+0x260
fffff880`0a2ae850 fffff800`032c1842 : fffffa80`054efb60 0000004d`004f004d fffffa80`054efb68 00000000`00000000 : nt!KiTryUnwaitThread+0x28
fffff880`0a2ae8b0 fffff800`035b6f48 : 00000000`7ef2c000 fffff880`0a2aec20 fffff880`0a2aec20 fffffa80`054efb60 : nt!KeTerminateThread+0x32e
fffff880`0a2ae930 fffff800`0359c37d : 00000000`c0000005 00000000`00000000 00000000`7ef2c000 00000000`00000000 : nt!PspExitThread+0x418
fffff880`0a2aea30 fffff800`032d4dfa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PsExitSpecialApc+0x1d
fffff880`0a2aea60 fffff800`032d5140 : 00000000`00000246 fffff880`0a2aeae0 fffff800`0359c2f0 00000000`00000001 : nt!KiDeliverApc+0x2ca
fffff880`0a2aeae0 fffff800`032e0977 : 00000000`0da5cf54 fffff880`0a2aeca0 00000000`00000000 00000000`7ef2c000 : nt!KiInitiateUserApc+0x70
fffff880`0a2aec20 00000000`745f2e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`0790ea38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x745f2e09
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiTryUnwaitThread+28
fffff800`032f0898 f0480fba6b4000 lock bts qword ptr [rbx+40h],0
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiTryUnwaitThread+28
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
FAILURE_BUCKET_ID: X64_0xA_VRF_nt!KiTryUnwaitThread+28
BUCKET_ID: X64_0xA_VRF_nt!KiTryUnwaitThread+28
Followup: MachineOwner
---------
Debug session time: Tue Mar 1 11:39:10.431 2011 (GMT-5)
System Uptime: 0 days 0:00:34.852
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck BE, {fffff800032ab08a, 32ab121, fffff88006df9130, b}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+45d6e )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff800032ab08a, Virtual address for the attempted write.
Arg2: 00000000032ab121, PTE contents.
Arg3: fffff88006df9130, (reserved)
Arg4: 000000000000000b, (reserved)
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xBE
PROCESS_NAME: McSvHost.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88006df9130 -- (.trap 0xfffff88006df9130)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88006df9330 rbx=0000000000000000 rcx=fffff800032ab08a
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000328c0f0 rsp=fffff88006df92c0 rbp=fffff88006df93c0
r8=00000000532b740a r9=0000000000000000 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!NtSetInformationWorkerFactory+0x2fd:
fffff800`0328c0f0 f04c0fb119 lock cmpxchg qword ptr [rcx],r11 ds:0067:fffff800`032ab08a=18558b4c004d8b4c
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003247e82 to fffff8000329c640
STACK_TEXT:
fffff880`06df8fc8 fffff800`03247e82 : 00000000`000000be fffff800`032ab08a 00000000`032ab121 fffff880`06df9130 : nt!KeBugCheckEx
fffff880`06df8fd0 fffff800`0329a76e : 00000000`00000001 fffff800`032ab08a 00000009`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x45d6e
fffff880`06df9130 fffff800`0328c0f0 : fffff880`0359a500 00000000`0000001c 00000000`00000000 fffff800`03420b00 : nt!KiPageFault+0x16e
fffff880`06df92c0 fffff880`06df9440 : fffff6fc`5000c380 00000000`07dc42f0 ffff0800`00000011 00000000`00000000 : nt!NtSetInformationWorkerFactory+0x2fd
fffff880`06df9380 fffff6fc`5000c380 : 00000000`07dc42f0 ffff0800`00000011 00000000`00000000 fffff6fb`7dbf1400 : 0xfffff880`06df9440
fffff880`06df9388 00000000`07dc42f0 : ffff0800`00000011 00000000`00000000 fffff6fb`7dbf1400 fffff880`06df9470 : 0xfffff6fc`5000c380
fffff880`06df9390 ffff0800`00000011 : 00000000`00000000 fffff6fb`7dbf1400 fffff880`06df9470 82d00000`6c75e882 : 0x7dc42f0
fffff880`06df9398 00000000`00000000 : fffff6fb`7dbf1400 fffff880`06df9470 82d00000`6c75e882 fffff8a0`0187035e : 0xffff0800`00000011
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+45d6e
fffff800`03247e82 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+45d6e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
FAILURE_BUCKET_ID: X64_0xBE_VRF_nt!_??_::FNODOBFM::_string_+45d6e
BUCKET_ID: X64_0xBE_VRF_nt!_??_::FNODOBFM::_string_+45d6e
Followup: MachineOwner
---------
Debug session time: Sun Feb 27 03:43:27.902 2011 (GMT-5)
System Uptime: 0 days 0:13:02.681
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff800035cbbc1, fffff880057f9ab0, 0}
Probably caused by : ntkrnlmp.exe ( nt!ObpWaitForMultipleObjects+186 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800035cbbc1, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff880057f9ab0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ObpWaitForMultipleObjects+186
fffff800`035cbbc1 488b4a20 mov rcx,qword ptr [rdx+20h]
CONTEXT: fffff880057f9ab0 -- (.cxr 0xfffff880057f9ab0)
rax=0000000000000000 rbx=fffff8a007655c20 rcx=fffff80003255000
rdx=0000000000000000 rsi=0000000000000001 rdi=fffffa80047406d0
rip=fffff800035cbbc1 rsp=fffff880057fa490 rbp=fffff880057faca0
r8=0000000000000000 r9=fffff8a008a14000 r10=fffffa800727c660
r11=fffffffffffffd80 r12=fffff880057fa9a0 r13=fffff8a007642a10
r14=0000000000000000 r15=0000000000000003
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!ObpWaitForMultipleObjects+0x186:
fffff800`035cbbc1 488b4a20 mov rcx,qword ptr [rdx+20h] ds:002b:00000000`00000020=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0x3B
PROCESS_NAME: plugin-contain
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff800035cbbc1
STACK_TEXT:
fffff880`057fa490 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpWaitForMultipleObjects+0x186
FOLLOWUP_IP:
nt!ObpWaitForMultipleObjects+186
fffff800`035cbbc1 488b4a20 mov rcx,qword ptr [rdx+20h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ObpWaitForMultipleObjects+186
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
STACK_COMMAND: .cxr 0xfffff880057f9ab0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_VRF_nt!ObpWaitForMultipleObjects+186
BUCKET_ID: X64_0x3B_VRF_nt!ObpWaitForMultipleObjects+186
Followup: MachineOwner
---------