Guest User

Untitled

a guest
May 12th, 2016
73
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.76 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\MEMORY.DMP]
  7. Kernel Summary Dump File: Only kernel address space is available
  8.  
  9. Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols;srv*c:\symbols*https://msdl.microsoft.com/download/symbols
  10. Executable search path is:
  11. Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS
  13. Built by: 7601.23392.amd64fre.win7sp1_ldr.160317-0600
  14. Machine Name:
  15. Kernel base = 0xfffff800`02c61000 PsLoadedModuleList = 0xfffff800`02ea3730
  16. Debug session time: Wed May 11 06:02:04.048 2016 (UTC + 2:00)
  17. System Uptime: 0 days 4:51:14.577
  18. Loading Kernel Symbols
  19. ...............................................................
  20. ................................................................
  21. ........................
  22. Loading User Symbols
  23.  
  24. Loading unloaded module list
  25. .....
  26. *******************************************************************************
  27. * *
  28. * Bugcheck Analysis *
  29. * *
  30. *******************************************************************************
  31.  
  32. Use !analyze -v to get detailed debugging information.
  33.  
  34. BugCheck 1E, {0, 0, 0, 0}
  35.  
  36. Probably caused by : usbehci.sys ( usbehci!EHCI_RemoveQueueHeadFromHWAsyncList+3a )
  37.  
  38. Followup: MachineOwner
  39. ---------
  40.  
  41. 1: kd> !analyze -v
  42. *******************************************************************************
  43. * *
  44. * Bugcheck Analysis *
  45. * *
  46. *******************************************************************************
  47.  
  48. KMODE_EXCEPTION_NOT_HANDLED (1e)
  49. This is a very common bugcheck. Usually the exception address pinpoints
  50. the driver/function that caused the problem. Always note this address
  51. as well as the link date of the driver/image that contains this address.
  52. Arguments:
  53. Arg1: 0000000000000000, The exception code that was not handled
  54. Arg2: 0000000000000000, The address that the exception occurred at
  55. Arg3: 0000000000000000, Parameter 0 of the exception
  56. Arg4: 0000000000000000, Parameter 1 of the exception
  57.  
  58. Debugging Details:
  59. ------------------
  60.  
  61.  
  62. EXCEPTION_CODE: (Win32) 0 (0) - Der Vorgang wurde erfolgreich beendet.
  63.  
  64. FAULTING_IP:
  65. +3466346238333762
  66. 00000000`00000000 ?? ???
  67.  
  68. EXCEPTION_PARAMETER1: 0000000000000000
  69.  
  70. EXCEPTION_PARAMETER2: 0000000000000000
  71.  
  72. ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
  73.  
  74. BUGCHECK_STR: 0x1E_0
  75.  
  76. DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
  77.  
  78. PROCESS_NAME: System
  79.  
  80. CURRENT_IRQL: 2
  81.  
  82. EXCEPTION_RECORD: fffff8800331b7c8 -- (.exr 0xfffff8800331b7c8)
  83. ExceptionAddress: fffff880101e9786 (usbehci!EHCI_RemoveQueueHeadFromHWAsyncList+0x000000000000003a)
  84. ExceptionCode: c0000005 (Access violation)
  85. ExceptionFlags: 00000000
  86. NumberParameters: 2
  87. Parameter[0]: 0000000000000000
  88. Parameter[1]: ffffffffffffffff
  89. Attempt to read from address ffffffffffffffff
  90.  
  91. TRAP_FRAME: fffff8800331b870 -- (.trap 0xfffff8800331b870)
  92. NOTE: The trap frame does not contain all registers.
  93. Some register values may be zeroed or incorrect.
  94. rax=00000000cf008080 rbx=0000000000000000 rcx=fffffa800683d6e0
  95. rdx=fffff880032c0080 rsi=0000000000000000 rdi=0000000000000000
  96. rip=fffff880101e9786 rsp=fffff8800331ba08 rbp=fffffa800683d6e0
  97. r8=fffff8800561a080 r9=ff00f880031a2000 r10=fffff880031a2080
  98. r11=fffffa800683d6e0 r12=0000000000000000 r13=0000000000000000
  99. r14=0000000000000000 r15=0000000000000000
  100. iopl=0 nv up ei pl zr na po nc
  101. usbehci!EHCI_RemoveQueueHeadFromHWAsyncList+0x3a:
  102. fffff880`101e9786 4d894160 mov qword ptr [r9+60h],r8 ds:0c00:2060=????????????????
  103. Resetting default scope
  104.  
  105. LAST_CONTROL_TRANSFER: from fffff80002cc8d7e to fffff80002cd1350
  106.  
  107. STACK_TEXT:
  108. fffff880`0331a8a8 fffff800`02cc8d7e : 00000000`00000001 fffffa80`0655b9d0 fffff880`0331b020 fffff800`02cfca60 : nt!KeBugCheck
  109. fffff880`0331a8b0 fffff800`02cfc72d : fffff800`02ee3d98 fffff800`02e1ddec fffff800`02c61000 fffff880`0331b7c8 : nt!KiKernelCalloutExceptionHandler+0xe
  110. fffff880`0331a8e0 fffff800`02cfb505 : fffff800`02e24acc fffff880`0331a958 fffff880`0331b7c8 fffff800`02c61000 : nt!RtlpExecuteHandlerForException+0xd
  111. fffff880`0331a910 fffff800`02d0ca31 : fffff880`0331b7c8 fffff880`0331b020 fffff880`00000000 fffffa80`06cf6c20 : nt!RtlDispatchException+0x415
  112. fffff880`0331aff0 fffff800`02cd0a02 : fffff880`0331b7c8 fffffa80`07785f98 fffff880`0331b870 fffff880`032c0080 : nt!KiDispatchException+0x135
  113. fffff880`0331b690 fffff800`02ccf30a : fffffa80`06d8fad0 00000000`00000000 fffff880`05754030 fffff880`00e8f5c8 : nt!KiExceptionDispatch+0xc2
  114. fffff880`0331b870 fffff880`101e9786 : fffff880`101ec0c8 00000000`00000001 fffff880`0458a4e4 fffffa80`044d19c0 : nt!KiGeneralProtectionFault+0x10a
  115. fffff880`0331ba08 fffff880`101ec0c8 : 00000000`00000001 fffff880`0458a4e4 fffffa80`044d19c0 fffff880`0458984c : usbehci!EHCI_RemoveQueueHeadFromHWAsyncList+0x3a
  116. fffff880`0331ba10 fffff880`101e9f46 : fffffa80`07785f98 fffff880`032c0180 fffffa80`06cf6c20 fffff880`101ea95c : usbehci!EHCI_DecPendingTransfer+0x3c
  117. fffff880`0331ba40 fffff880`101ead24 : fffff880`032c0080 fffffa80`00000000 fffffa80`06cf68d0 fffffa80`07785d60 : usbehci!EHCI_ProcessDoneAsyncTd+0x1c2
  118. fffff880`0331bab0 fffff880`101f011b : fffffa80`06cf6b18 fffffa80`0683d6e0 00000000`00000000 00000000`00000000 : usbehci!EHCI_PollControlEndpoint+0xe8
  119. fffff880`0331bb30 fffff880`0455de6b : 00000000`00000002 fffffa80`06cf68d0 fffffa80`0683c1a0 00000000`ffffff02 : usbehci!EHCI_PollEndpoint+0x63
  120. fffff880`0331bb70 fffff880`04562bc1 : 00000000`00000030 00000000`00000004 fffffa80`06cf68d0 fffffa80`0683c050 : USBPORT!MPf_PollEndpoint+0x9b
  121. fffff880`0331bba0 fffff880`0456e303 : fffffa80`0683c1a0 00000000`00000030 fffffa80`0000000e 00000000`00000000 : USBPORT!USBPORT_iSetGlobalEndpointStateTx+0x7c1
  122. fffff880`0331bc00 fffff880`0455ef69 : fffffa80`0683c050 00000000`00000000 fffffa80`0683ca02 fffffa80`0683ca18 : USBPORT!USBPORT_Core_UsbHcIntDpc_Worker+0x1c3
  123. fffff880`0331bc60 fffff800`02cdc06c : fffff880`009ea180 fffffa80`0683ca18 fffffa80`0683ca30 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
  124. fffff880`0331bc90 fffff800`02cc908a : fffff880`009ea180 fffff880`009f4f40 00000000`00000000 fffff880`0455ed90 : nt!KiRetireDpcList+0x1bc
  125. fffff880`0331bd40 00000000`00000000 : fffff880`0331c000 fffff880`03316000 fffff880`0331bd00 00000000`00000000 : nt!KiIdleLoop+0x5a
  126.  
  127.  
  128. STACK_COMMAND: kb
  129.  
  130. FOLLOWUP_IP:
  131. usbehci!EHCI_RemoveQueueHeadFromHWAsyncList+3a
  132. fffff880`101e9786 4d894160 mov qword ptr [r9+60h],r8
  133.  
  134. SYMBOL_STACK_INDEX: 7
  135.  
  136. SYMBOL_NAME: usbehci!EHCI_RemoveQueueHeadFromHWAsyncList+3a
  137.  
  138. FOLLOWUP_NAME: MachineOwner
  139.  
  140. MODULE_NAME: usbehci
  141.  
  142. IMAGE_NAME: usbehci.sys
  143.  
  144. DEBUG_FLR_IMAGE_TIMESTAMP: 53829d14
  145.  
  146. FAILURE_BUCKET_ID: X64_0x1E_0_usbehci!EHCI_RemoveQueueHeadFromHWAsyncList+3a
  147.  
  148. BUCKET_ID: X64_0x1E_0_usbehci!EHCI_RemoveQueueHeadFromHWAsyncList+3a
  149.  
  150. Followup: MachineOwner
  151. ---------
  152.  
  153. 1: kd> lmvm usbehci
  154. start end module name
  155. fffff880`101e5000 fffff880`101f7000 usbehci (pdb symbols) c:\symbols\usbehci.pdb\6731B9AB236647A69FFF2B6A1FB6F8B91\usbehci.pdb
  156. Loaded symbol image file: usbehci.sys
  157. Image path: \SystemRoot\system32\DRIVERS\usbehci.sys
  158. Image name: usbehci.sys
  159. Timestamp: Mon May 26 03:47:00 2014 (53829D14)
  160. CheckSum: 000187F0
  161. ImageSize: 00012000
  162. Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Advertisement
Add Comment
Please, Sign In to add comment