New
#91
It is blaming your usbfilter.sys again. Probably something plugged into your usb hub that Windows is not liking. Repair install time?Code:Loading Dump File [J:\BSODDmpFiles\justinbronze\Windows_NT6_BSOD_jcgriff2\012312-45989-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`02c19000 PsLoadedModuleList = 0xfffff800`02e5e670 Debug session time: Mon Jan 23 04:04:05.073 2012 (UTC - 7:00) System Uptime: 0 days 4:17:52.603 Loading Kernel Symbols ............................................................... ................................................................ ....................... Loading User Symbols Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {9, 2, 1, fffff80002cb0ce8} Unable to load image \SystemRoot\system32\DRIVERS\usbfilter.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for usbfilter.sys *** ERROR: Module load completed but symbols could not be loaded for usbfilter.sys Probably caused by : usbfilter.sys ( usbfilter+1bf5 ) Followup: MachineOwner --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000009, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80002cb0ce8, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec8100 0000000000000009 CURRENT_IRQL: 2 FAULTING_IP: nt!IoAllocateMdl+118 fffff800`02cb0ce8 48894108 mov qword ptr [rcx+8],rax CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System TRAP_FRAME: fffff88002ffb220 -- (.trap 0xfffff88002ffb220) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffffa80055c4e80 rbx=0000000000000000 rcx=0000000000000001 rdx=fffffa80055c4e81 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002cb0ce8 rsp=fffff88002ffb3b0 rbp=0000000000000008 r8=fffffa80055c4e80 r9=0000000000000000 r10=fffffa8003ba9470 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!IoAllocateMdl+0x118: fffff800`02cb0ce8 48894108 mov qword ptr [rcx+8],rax ds:7010:00000000`00000009=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002c951e9 to fffff80002c95c40 STACK_TEXT: fffff880`02ffb0d8 fffff800`02c951e9 : 00000000`0000000a 00000000`00000009 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff880`02ffb0e0 fffff800`02c93e60 : 00000000`00000000 fffff880`03f4056a 00000000`00000000 00000000`00000030 : nt!KiBugCheckDispatch+0x69 fffff880`02ffb220 fffff800`02cb0ce8 : fffffa80`04705300 fffff880`03f5363c 00000000`000003ed fffff880`03f35f5d : nt!KiPageFault+0x260 fffff880`02ffb3b0 fffff880`03f51252 : fffffa80`053b9750 00000000`c000000d fffffa80`047a4000 fffffa80`04705300 : nt!IoAllocateMdl+0x118 fffff880`02ffb400 fffff880`03f59e74 : fffffa80`04630c60 fffffa80`04c00009 fffffa80`04630c60 fffffa80`053b9750 : USBPORT!USBPORT_ProcessURB+0x8de fffff880`02ffb4b0 fffff880`03f33af4 : 00000000`00000000 fffffa80`04c08050 fffffa80`056431f0 fffffa80`04630c60 : USBPORT!USBPORT_PdoInternalDeviceControlIrp+0x138 fffff880`02ffb4f0 fffff880`03f86bf5 : fffffa80`04c0c050 fffffa80`03b60060 fffffa80`04630c60 fffffa80`04c0c1a0 : USBPORT!USBPORT_Dispatch+0x1dc fffff880`02ffb530 fffffa80`04c0c050 : fffffa80`03b60060 fffffa80`04630c60 fffffa80`04c0c1a0 fffffa80`04c09d40 : usbfilter+0x1bf5 fffff880`02ffb538 fffffa80`03b60060 : fffffa80`04630c60 fffffa80`04c0c1a0 fffffa80`04c09d40 fffff800`02dc4100 : 0xfffffa80`04c0c050 fffff880`02ffb540 fffffa80`04630c60 : fffffa80`04c0c1a0 fffffa80`04c09d40 fffff800`02dc4100 fffffa80`04630e98 : 0xfffffa80`03b60060 fffff880`02ffb548 fffffa80`04c0c1a0 : fffffa80`04c09d40 fffff800`02dc4100 fffffa80`04630e98 fffffa80`04c09d40 : 0xfffffa80`04630c60 fffff880`02ffb550 fffffa80`04c09d40 : fffff800`02dc4100 fffffa80`04630e98 fffffa80`04c09d40 fffffa80`04630c60 : 0xfffffa80`04c0c1a0 fffff880`02ffb558 fffff800`02dc4100 : fffffa80`04630e98 fffffa80`04c09d40 fffffa80`04630c60 fffffa80`047a2490 : 0xfffffa80`04c09d40 fffff880`02ffb560 fffff880`040fc2b2 : fffffa80`04c09d40 fffffa80`04630e98 fffffa80`00000000 00000000`000007ff : nt!ExAllocatePoolWithTag+0x20 fffff880`02ffb650 fffff880`040fcd8f : 00000000`00000000 00000000`00000000 fffffa80`03b60060 00000000`00000000 : usbhub!UsbhIncPdoIoCount+0xda fffff880`02ffb6b0 fffff880`040cafb7 : fffffa80`04630c60 fffffa80`048088b0 fffffa80`04808c88 fffffa80`053b9750 : usbhub!UsbhPdoInternalDeviceControl+0x373 fffff880`02ffb700 fffff880`03f86bf5 : fffffa80`046cbb00 00000000`00000000 fffffa80`03b60de0 fffff880`041b9e82 : usbhub!UsbhGenDispatch+0x57 fffff880`02ffb730 fffffa80`046cbb00 : 00000000`00000000 fffffa80`03b60de0 fffff880`041b9e82 fffffa80`046cbc50 : usbfilter+0x1bf5 fffff880`02ffb738 00000000`00000000 : fffffa80`03b60de0 fffff880`041b9e82 fffffa80`046cbc50 fffffa80`03bcc600 : 0xfffffa80`046cbb00 STACK_COMMAND: kb FOLLOWUP_IP: usbfilter+1bf5 fffff880`03f86bf5 ?? ??? SYMBOL_STACK_INDEX: 7 SYMBOL_NAME: usbfilter+1bf5 FOLLOWUP_NAME: MachineOwner MODULE_NAME: usbfilter IMAGE_NAME: usbfilter.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4d0899c9 FAILURE_BUCKET_ID: X64_0xA_usbfilter+1bf5 BUCKET_ID: X64_0xA_usbfilter+1bf5 Followup: MachineOwner ---------