Advertisement
Guest User

bsod#5

a guest
Sep 5th, 2013
67
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.11 KB | None | 0 0
  1. *******************************************************************************
  2. * *
  3. * Bugcheck Analysis *
  4. * *
  5. *******************************************************************************
  6.  
  7. Use !analyze -v to get detailed debugging information.
  8.  
  9. BugCheck 1E, {0, 0, 0, 0}
  10.  
  11. Probably caused by : HIDCLASS.SYS ( HIDCLASS!HidpProcessInterruptReport+169 )
  12.  
  13. Followup: MachineOwner
  14. ---------
  15. 6: kd> !analyze -v
  16. *******************************************************************************
  17. * *
  18. * Bugcheck Analysis *
  19. * *
  20. *******************************************************************************
  21.  
  22. KMODE_EXCEPTION_NOT_HANDLED (1e)
  23. This is a very common bugcheck. Usually the exception address pinpoints
  24. the driver/function that caused the problem. Always note this address
  25. as well as the link date of the driver/image that contains this address.
  26. Arguments:
  27. Arg1: 0000000000000000, The exception code that was not handled
  28. Arg2: 0000000000000000, The address that the exception occurred at
  29. Arg3: 0000000000000000, Parameter 0 of the exception
  30. Arg4: 0000000000000000, Parameter 1 of the exception
  31.  
  32. Debugging Details:
  33. ------------------
  34.  
  35.  
  36. EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
  37.  
  38. FAULTING_IP:
  39. +5d1d2faf042bdf30
  40. 00000000`00000000 ?? ???
  41.  
  42. EXCEPTION_PARAMETER1: 0000000000000000
  43.  
  44. EXCEPTION_PARAMETER2: 0000000000000000
  45.  
  46. ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
  47.  
  48. BUGCHECK_STR: 0x1E_0
  49.  
  50. CUSTOMER_CRASH_COUNT: 1
  51.  
  52. DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
  53.  
  54. PROCESS_NAME: System
  55.  
  56. CURRENT_IRQL: 2
  57.  
  58. EXCEPTION_RECORD: fffff8800331f688 -- (.exr 0xfffff8800331f688)
  59. ExceptionAddress: fffff880041e9821 (HIDCLASS!HidpProcessInterruptReport+0x0000000000000169)
  60. ExceptionCode: c0000005 (Access violation)
  61. ExceptionFlags: 00000000
  62. NumberParameters: 2
  63. Parameter[0]: 0000000000000000
  64. Parameter[1]: ffffffffffffffff
  65. Attempt to read from address ffffffffffffffff
  66.  
  67. TRAP_FRAME: fffff8800331f730 -- (.trap 0xfffff8800331f730)
  68. NOTE: The trap frame does not contain all registers.
  69. Some register values may be zeroed or incorrect.
  70. rax=fffefa800d3952d0 rbx=0000000000000000 rcx=fffffa800d1cc4f0
  71. rdx=fffffffffb8a128c rsi=0000000000000000 rdi=0000000000000000
  72. rip=fffff880041e9821 rsp=fffff8800331f8c0 rbp=0000000000000041
  73. r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
  74. r11=fffffa800d3f28a0 r12=0000000000000000 r13=0000000000000000
  75. r14=0000000000000000 r15=0000000000000000
  76. iopl=0 nv up ei pl zr na po nc
  77. HIDCLASS!HidpProcessInterruptReport+0x169:
  78. fffff880`041e9821 48894808 mov qword ptr [rax+8],rcx ds:9050:fffefa80`0d3952d8=????????????????
  79. Resetting default scope
  80.  
  81. LAST_CONTROL_TRANSFER: from fffff80003acd6be to fffff80003ad5cd0
  82.  
  83. STACK_TEXT:
  84. fffff880`0331e768 fffff800`03acd6be : 00000000`00000000 00000000`00000000 fffff880`0331eee0 fffff800`03b01890 : nt!KeBugCheck
  85. fffff880`0331e770 fffff800`03b0155d : fffff800`03cdc968 fffff800`03c19cbc fffff800`03a56000 fffff880`0331f688 : nt!KiKernelCalloutExceptionHandler+0xe
  86. fffff880`0331e7a0 fffff800`03b00335 : fffff800`03c1d0fc fffff880`0331e818 fffff880`0331f688 fffff800`03a56000 : nt!RtlpExecuteHandlerForException+0xd
  87. fffff880`0331e7d0 fffff800`03b113b1 : fffff880`0331f688 fffff880`0331eee0 fffff880`00000000 fffffa80`0d1cc4d0 : nt!RtlDispatchException+0x415
  88. fffff880`0331eeb0 fffff800`03ad5382 : fffff880`0331f688 00000000`00000000 fffff880`0331f730 fffffa80`0a7e39d0 : nt!KiDispatchException+0x135
  89. fffff880`0331f550 fffff800`03ad3c8a : fffffa80`05a30b88 fffff880`0f26e4ed 00000000`dfeb4700 00000000`00000001 : nt!KiExceptionDispatch+0xc2
  90. fffff880`0331f730 fffff880`041e9821 : fffffa80`0611aec0 00000000`00000000 fffffa80`0d1cc4d0 00000000`000007ff : nt!KiGeneralProtectionFault+0x10a
  91. fffff880`0331f8c0 fffff880`041e9927 : fffffa80`0d1cc500 fffff880`03ea3f99 fffffa80`061edc00 fffffa80`06119f20 : HIDCLASS!HidpProcessInterruptReport+0x169
  92. fffff880`0331f920 fffff880`041e9c2d : fffffa80`06119f02 fffffa80`06119f20 fffffa80`061edca0 00000000`00000040 : HIDCLASS!HidpDistributeInterruptReport+0x93
  93. fffff880`0331f9b0 fffff800`03ad9091 : fffffa80`06201e53 00000000`00000000 fffffa80`061edb01 fffffa80`06201c60 : HIDCLASS!HidpInterruptReadComplete+0x235
  94. fffff880`0331fa40 fffff880`03eb1631 : fffffa80`05ab9050 fffffa80`0d4e5500 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x3b1
  95. fffff880`0331fb20 fffff880`03eb1b0f : fffffa80`0d49f602 fffffa80`06201c60 00000000`ffffffff fffffa80`05ab9eb0 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa15
  96. fffff880`0331fc00 fffff880`03eaf66f : fffffa80`05ab9eb0 fffffa80`05ab91a0 fffffa80`05aba050 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
  97. fffff880`0331fc60 fffff880`03ea0f89 : fffffa80`05ab9050 00000000`00000000 fffffa80`05ab9e02 fffffa80`05ab9eb0 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
  98. fffff880`0331fca0 fffff800`03ae110c : fffff880`032f7180 fffffa80`05ab9eb0 fffffa80`05ab9ec8 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
  99. fffff880`0331fcd0 fffff800`03acda2a : fffff880`032f7180 fffff880`033020c0 00000000`00000000 fffff880`03ea0db0 : nt!KiRetireDpcList+0x1bc
  100. fffff880`0331fd80 00000000`00000000 : fffff880`03320000 fffff880`0331a000 fffff880`0331fd40 00000000`00000000 : nt!KiIdleLoop+0x5a
  101.  
  102.  
  103. STACK_COMMAND: kb
  104.  
  105. FOLLOWUP_IP:
  106. HIDCLASS!HidpProcessInterruptReport+169
  107. fffff880`041e9821 48894808 mov qword ptr [rax+8],rcx
  108.  
  109. SYMBOL_STACK_INDEX: 7
  110.  
  111. SYMBOL_NAME: HIDCLASS!HidpProcessInterruptReport+169
  112.  
  113. FOLLOWUP_NAME: MachineOwner
  114.  
  115. MODULE_NAME: HIDCLASS
  116.  
  117. IMAGE_NAME: HIDCLASS.SYS
  118.  
  119. DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7a665
  120.  
  121. FAILURE_BUCKET_ID: X64_0x1E_0_HIDCLASS!HidpProcessInterruptReport+169
  122.  
  123. BUCKET_ID: X64_0x1E_0_HIDCLASS!HidpProcessInterruptReport+169
  124.  
  125. Followup: MachineOwner
  126. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement