Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck 1E, {0, 0, 0, 0}
- Probably caused by : HIDCLASS.SYS ( HIDCLASS!HidpProcessInterruptReport+169 )
- Followup: MachineOwner
- ---------
- 6: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- KMODE_EXCEPTION_NOT_HANDLED (1e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Arguments:
- Arg1: 0000000000000000, The exception code that was not handled
- Arg2: 0000000000000000, The address that the exception occurred at
- Arg3: 0000000000000000, Parameter 0 of the exception
- Arg4: 0000000000000000, Parameter 1 of the exception
- Debugging Details:
- ------------------
- EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
- FAULTING_IP:
- +5d1d2faf042bdf30
- 00000000`00000000 ?? ???
- EXCEPTION_PARAMETER1: 0000000000000000
- EXCEPTION_PARAMETER2: 0000000000000000
- ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
- BUGCHECK_STR: 0x1E_0
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
- PROCESS_NAME: System
- CURRENT_IRQL: 2
- EXCEPTION_RECORD: fffff8800331f688 -- (.exr 0xfffff8800331f688)
- ExceptionAddress: fffff880041e9821 (HIDCLASS!HidpProcessInterruptReport+0x0000000000000169)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 2
- Parameter[0]: 0000000000000000
- Parameter[1]: ffffffffffffffff
- Attempt to read from address ffffffffffffffff
- TRAP_FRAME: fffff8800331f730 -- (.trap 0xfffff8800331f730)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=fffefa800d3952d0 rbx=0000000000000000 rcx=fffffa800d1cc4f0
- rdx=fffffffffb8a128c rsi=0000000000000000 rdi=0000000000000000
- rip=fffff880041e9821 rsp=fffff8800331f8c0 rbp=0000000000000041
- r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
- r11=fffffa800d3f28a0 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- HIDCLASS!HidpProcessInterruptReport+0x169:
- fffff880`041e9821 48894808 mov qword ptr [rax+8],rcx ds:9050:fffefa80`0d3952d8=????????????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff80003acd6be to fffff80003ad5cd0
- STACK_TEXT:
- fffff880`0331e768 fffff800`03acd6be : 00000000`00000000 00000000`00000000 fffff880`0331eee0 fffff800`03b01890 : nt!KeBugCheck
- fffff880`0331e770 fffff800`03b0155d : fffff800`03cdc968 fffff800`03c19cbc fffff800`03a56000 fffff880`0331f688 : nt!KiKernelCalloutExceptionHandler+0xe
- fffff880`0331e7a0 fffff800`03b00335 : fffff800`03c1d0fc fffff880`0331e818 fffff880`0331f688 fffff800`03a56000 : nt!RtlpExecuteHandlerForException+0xd
- fffff880`0331e7d0 fffff800`03b113b1 : fffff880`0331f688 fffff880`0331eee0 fffff880`00000000 fffffa80`0d1cc4d0 : nt!RtlDispatchException+0x415
- fffff880`0331eeb0 fffff800`03ad5382 : fffff880`0331f688 00000000`00000000 fffff880`0331f730 fffffa80`0a7e39d0 : nt!KiDispatchException+0x135
- fffff880`0331f550 fffff800`03ad3c8a : fffffa80`05a30b88 fffff880`0f26e4ed 00000000`dfeb4700 00000000`00000001 : nt!KiExceptionDispatch+0xc2
- fffff880`0331f730 fffff880`041e9821 : fffffa80`0611aec0 00000000`00000000 fffffa80`0d1cc4d0 00000000`000007ff : nt!KiGeneralProtectionFault+0x10a
- fffff880`0331f8c0 fffff880`041e9927 : fffffa80`0d1cc500 fffff880`03ea3f99 fffffa80`061edc00 fffffa80`06119f20 : HIDCLASS!HidpProcessInterruptReport+0x169
- fffff880`0331f920 fffff880`041e9c2d : fffffa80`06119f02 fffffa80`06119f20 fffffa80`061edca0 00000000`00000040 : HIDCLASS!HidpDistributeInterruptReport+0x93
- fffff880`0331f9b0 fffff800`03ad9091 : fffffa80`06201e53 00000000`00000000 fffffa80`061edb01 fffffa80`06201c60 : HIDCLASS!HidpInterruptReadComplete+0x235
- fffff880`0331fa40 fffff880`03eb1631 : fffffa80`05ab9050 fffffa80`0d4e5500 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x3b1
- fffff880`0331fb20 fffff880`03eb1b0f : fffffa80`0d49f602 fffffa80`06201c60 00000000`ffffffff fffffa80`05ab9eb0 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa15
- fffff880`0331fc00 fffff880`03eaf66f : fffffa80`05ab9eb0 fffffa80`05ab91a0 fffffa80`05aba050 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
- fffff880`0331fc60 fffff880`03ea0f89 : fffffa80`05ab9050 00000000`00000000 fffffa80`05ab9e02 fffffa80`05ab9eb0 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
- fffff880`0331fca0 fffff800`03ae110c : fffff880`032f7180 fffffa80`05ab9eb0 fffffa80`05ab9ec8 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
- fffff880`0331fcd0 fffff800`03acda2a : fffff880`032f7180 fffff880`033020c0 00000000`00000000 fffff880`03ea0db0 : nt!KiRetireDpcList+0x1bc
- fffff880`0331fd80 00000000`00000000 : fffff880`03320000 fffff880`0331a000 fffff880`0331fd40 00000000`00000000 : nt!KiIdleLoop+0x5a
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- HIDCLASS!HidpProcessInterruptReport+169
- fffff880`041e9821 48894808 mov qword ptr [rax+8],rcx
- SYMBOL_STACK_INDEX: 7
- SYMBOL_NAME: HIDCLASS!HidpProcessInterruptReport+169
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: HIDCLASS
- IMAGE_NAME: HIDCLASS.SYS
- DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7a665
- FAILURE_BUCKET_ID: X64_0x1E_0_HIDCLASS!HidpProcessInterruptReport+169
- BUCKET_ID: X64_0x1E_0_HIDCLASS!HidpProcessInterruptReport+169
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement