Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031911-15350-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e14000 PsLoadedModuleList = 0xfffff800`03051e50
Debug session time: Sat Mar 19 03:50:38.657 2011 (UTC - 4:00)
System Uptime: 0 days 0:05:59.000
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck DA, {504, fffff6fc40022800, 1, 4500}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+b43b )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_PTE_MISUSE (da)
The stack trace identifies the guilty driver.
Arguments:
Arg1: 0000000000000504, Type of error.
Arg2: fffff6fc40022800
Arg3: 0000000000000001
Arg4: 0000000000004500
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xDA
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002edce11 to fffff80002e84740
STACK_TEXT:
fffff880`02fe69d8 fffff800`02edce11 : 00000000`000000da 00000000`00000504 fffff6fc`40022800 00000000`00000001 : nt!KeBugCheckEx
fffff880`02fe69e0 fffff800`02e945e4 : 00000000`00000003 fffff800`03039720 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0xb43b
fffff880`02fe6af0 fffff800`02e97df5 : fffffa80`06a0a040 00000000`00000008 00004500`0002eb84 00000000`00000001 : nt!MiEmptyPteBins+0x10d
fffff880`02fe6b40 fffff800`02e98eb4 : 00000000`00000008 00000000`00000001 fffffa80`06a0a040 fffff800`02e980cb : nt!MiAdjustPteBins+0x29
fffff880`02fe6b80 fffff800`02e99173 : 00000000`00000008 fffff880`02fe6c10 00000000`00000001 fffffa80`00000000 : nt!MmWorkingSetManager+0x40
fffff880`02fe6bd0 fffff800`031277c6 : fffffa80`06a23680 00000000`00000080 fffffa80`06a0a040 00000000`00000001 : nt!KeBalanceSetManager+0x1c3
fffff880`02fe6d40 fffff800`02e62c26 : fffff880`02d64180 fffffa80`06a23680 fffff880`02d6f040 85119485`33665533 : nt!PspSystemThreadStartup+0x5a
fffff880`02fe6d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+b43b
fffff800`02edce11 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+b43b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
FAILURE_BUCKET_ID: X64_0xDA_nt!_??_::FNODOBFM::_string_+b43b
BUCKET_ID: X64_0xDA_nt!_??_::FNODOBFM::_string_+b43b
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031811-15834-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e1a000 PsLoadedModuleList = 0xfffff800`03057e50
Debug session time: Fri Mar 18 22:18:28.078 2011 (UTC - 4:00)
System Uptime: 0 days 4:09:07.420
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
Unable to load image \SystemRoot\system32\DRIVERS\atikmdag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for atikmdag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffff80000003, The exception code that was not handled
Arg2: fffff880050516b8, The address that the exception occurred at
Arg3: fffff8800570b338, Exception Record Address
Arg4: fffff8800570aba0, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more arguments are invalid
FAULTING_IP:
atikmdag+8026b8
fffff880`050516b8 cc int 3
EXCEPTION_RECORD: fffff8800570b338 -- (.exr 0xfffff8800570b338)
ExceptionAddress: fffff880050516b8 (atikmdag+0x00000000008026b8)
ExceptionCode: 80000003 (Break instruction exception)
ExceptionFlags: 00000000
NumberParameters: 1
Parameter[0]: 0000000000000000
CONTEXT: fffff8800570aba0 -- (.cxr 0xfffff8800570aba0)
rax=fffff88005082330 rbx=fffff88005082370 rcx=0000000000000002
rdx=0000000000000001 rsi=fffffa8007478970 rdi=0000000000000000
rip=fffff880050516b8 rsp=fffff8800570b570 rbp=0000000000000000
r8=0000000000000000 r9=fffff88004b55cc4 r10=fffff8800570b640
r11=fffff88004b55be4 r12=0000000000000001 r13=0000000000000001
r14=fffffa8008b4a000 r15=0000000000000001
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000286
atikmdag+0x8026b8:
fffff880`050516b8 cc int 3
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x7E
PROCESS_NAME: System
CURRENT_IRQL: 1
ERROR_CODE: (NTSTATUS) 0x80000003 - {EXCEPTION} Breakpoint A breakpoint has been reached.
EXCEPTION_PARAMETER1: 0000000000000000
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff880050516b8
STACK_TEXT:
fffff880`0570b570 00000000`00000000 : fffff880`04b58658 00000000`00000002 00000000`00000000 fffff880`0570b5e0 : atikmdag+0x8026b8
FOLLOWUP_IP:
atikmdag+8026b8
fffff880`050516b8 cc int 3
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: atikmdag+8026b8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: atikmdag
IMAGE_NAME: atikmdag.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d40a4bc
STACK_COMMAND: .cxr 0xfffff8800570aba0 ; kb
FAILURE_BUCKET_ID: X64_0x7E_atikmdag+8026b8
BUCKET_ID: X64_0x7E_atikmdag+8026b8
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031911-14601-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e5e000 PsLoadedModuleList = 0xfffff800`0309be50
Debug session time: Sun Mar 20 01:19:30.020 2011 (UTC - 4:00)
System Uptime: 0 days 3:31:55.002
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffff88085658140, 2, 0, fffff88004249d42}
Unable to load image \SystemRoot\system32\DRIVERS\usbehci.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for usbehci.sys
*** ERROR: Module load completed but symbols could not be loaded for usbehci.sys
Probably caused by : usbehci.sys ( usbehci+5d42 )
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff88085658140, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88004249d42, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800031060e0
fffff88085658140
CURRENT_IRQL: 2
FAULTING_IP:
usbehci+5d42
fffff880`04249d42 8b4140 mov eax,dword ptr [rcx+40h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880030b08c0 -- (.trap 0xfffff880030b08c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880057271b4 rbx=0000000000000000 rcx=fffff88085658100
rdx=fffff88005727180 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004249d42 rsp=fffff880030b0a58 rbp=fffffa80078216a0
r8=fffffa800872cf00 r9=0000000000000001 r10=fffffa800872cc50
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
usbehci+0x5d42:
fffff880`04249d42 8b4140 mov eax,dword ptr [rcx+40h] ds:fffff880`85658140=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ecdca9 to fffff80002ece740
STACK_TEXT:
fffff880`030b0778 fffff800`02ecdca9 : 00000000`0000000a fffff880`85658140 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`030b0780 fffff800`02ecc920 : fffffa80`07820050 fffffa80`0872cee0 fffffa80`08712410 fffffa80`0872ca10 : nt!KiBugCheckDispatch+0x69
fffff880`030b08c0 fffff880`04249d42 : fffff880`0424a4ca 00000000`00000012 fffff880`05727180 fffffa80`0872cee0 : nt!KiPageFault+0x260
fffff880`030b0a58 fffff880`0424a4ca : 00000000`00000012 fffff880`05727180 fffffa80`0872cee0 00000000`00000000 : usbehci+0x5d42
fffff880`030b0a60 00000000`00000012 : fffff880`05727180 fffffa80`0872cee0 00000000`00000000 fffffa80`087127a8 : usbehci+0x64ca
fffff880`030b0a68 fffff880`05727180 : fffffa80`0872cee0 00000000`00000000 fffffa80`087127a8 00000000`00000012 : 0x12
fffff880`030b0a70 fffffa80`0872cee0 : 00000000`00000000 fffffa80`087127a8 00000000`00000012 fffffa80`0872cf00 : 0xfffff880`05727180
fffff880`030b0a78 00000000`00000000 : fffffa80`087127a8 00000000`00000012 fffffa80`0872cf00 fffffa80`08712540 : 0xfffffa80`0872cee0
STACK_COMMAND: kb
FOLLOWUP_IP:
usbehci+5d42
fffff880`04249d42 8b4140 mov eax,dword ptr [rcx+40h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: usbehci+5d42
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: usbehci
IMAGE_NAME: usbehci.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ae28235
FAILURE_BUCKET_ID: X64_0xD1_usbehci+5d42
BUCKET_ID: X64_0xD1_usbehci+5d42
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032011-16863-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e0a000 PsLoadedModuleList = 0xfffff800`03047e50
Debug session time: Sun Mar 20 04:15:53.698 2011 (UTC - 4:00)
System Uptime: 0 days 0:11:03.041
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {28, 2, 1, fffff880051c5d29}
Probably caused by : usbohci.sys ( usbohci!OHCI_PollAsyncEndpoint+37d )
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff880051c5d29, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b20e0
0000000000000028
CURRENT_IRQL: 2
FAULTING_IP:
usbohci!OHCI_PollAsyncEndpoint+37d
fffff880`051c5d29 f0834b2808 lock or dword ptr [rbx+28h],8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880030b0990 -- (.trap 0xfffff880030b0990)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8008109c20
rdx=000000004f444648 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880051c5d29 rsp=fffff880030b0b20 rbp=fffff88005727000
r8=000000004f444648 r9=0000000000000000 r10=00000000ffffffff
r11=00000000bf23d002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
usbohci!OHCI_PollAsyncEndpoint+0x37d:
fffff880`051c5d29 f0834b2808 lock or dword ptr [rbx+28h],8 ds:0022:00000000`00000028=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e79ca9 to fffff80002e7a740
STACK_TEXT:
fffff880`030b0848 fffff800`02e79ca9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`030b0850 fffff800`02e78920 : fffffa80`07ff3000 00000000`00000000 fffffa80`089eb000 fffffa80`089eb000 : nt!KiBugCheckDispatch+0x69
fffff880`030b0990 fffff880`051c5d29 : 00000000`00000000 fffffa80`0872cb28 00000000`00000000 fffff880`05727000 : nt!KiPageFault+0x260
fffff880`030b0b20 fffff880`051c7737 : fffffa80`0872caa0 fffffa80`0872c860 00000000`00000000 fffffa80`080e61a0 : usbohci!OHCI_PollAsyncEndpoint+0x37d
fffff880`030b0b80 fffff880`0414de8b : 00000000`00000002 fffffa80`0872c860 fffffa80`080e61a0 00000000`00000000 : usbohci!OHCI_PollEndpoint+0x3f
fffff880`030b0bb0 fffff880`041529b1 : 00000000`00000030 00000000`00000004 fffffa80`0872c860 fffffa80`080e6050 : USBPORT!MPf_PollEndpoint+0x9b
fffff880`030b0be0 fffff880`0415e043 : fffffa80`080e61a0 00000000`00000030 fffffa80`0000000e 00000000`00000000 : USBPORT!USBPORT_iSetGlobalEndpointStateTx+0x7c1
fffff880`030b0c40 fffff880`0414ef89 : fffffa80`080e6050 00000000`00000000 fffffa80`080e6a02 fffffa80`080e6a10 : USBPORT!USBPORT_Core_UsbHcIntDpc_Worker+0x1af
fffff880`030b0ca0 fffff800`02e85bfc : fffff880`03088180 fffffa80`080e6a10 fffffa80`080e6a28 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`030b0cd0 fffff800`02e82eea : fffff880`03088180 fffff880`03093040 00000000`00000000 fffff880`0414edb0 : nt!KiRetireDpcList+0x1bc
fffff880`030b0d80 00000000`00000000 : fffff880`030b1000 fffff880`030ab000 fffff880`030b0d40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
usbohci!OHCI_PollAsyncEndpoint+37d
fffff880`051c5d29 f0834b2808 lock or dword ptr [rbx+28h],8
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: usbohci!OHCI_PollAsyncEndpoint+37d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: usbohci
IMAGE_NAME: usbohci.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc06
FAILURE_BUCKET_ID: X64_0xD1_usbohci!OHCI_PollAsyncEndpoint+37d
BUCKET_ID: X64_0xD1_usbohci!OHCI_PollAsyncEndpoint+37d
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032011-18704-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e5f000 PsLoadedModuleList = 0xfffff800`0309ce50
Debug session time: Sun Mar 20 21:34:37.587 2011 (UTC - 4:00)
System Uptime: 0 days 1:10:36.569
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck FE, {5, fffffa80080651a0, 10024398, fffffa80087daf60}
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: usbport!_DEVICE_EXTENSION ***
*** ***
*************************************************************************
Probably caused by : usbohci.sys ( usbohci!OHCI_PollAsyncEndpoint+99 )
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BUGCODE_USB_DRIVER (fe)
USB Driver bugcheck, first parameter is USB bugcheck code.
Arguments:
Arg1: 0000000000000005, USBBUGCODE_INVALID_PHYSICAL_ADDRESS The host controller is
using a physical memory address that was not allocated by
the USBport driver.
Arg2: fffffa80080651a0, Device extension pointer of the host controller
Arg3: 0000000010024398, PCI Vendor,Product id for the controller
Arg4: fffffa80087daf60, Pointer to Endpoint data structure
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: usbport!_DEVICE_EXTENSION ***
*** ***
*************************************************************************
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xFE
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff8800402de4e to fffff80002ecf740
STACK_TEXT:
fffff880`030b0ad8 fffff880`0402de4e : 00000000`000000fe 00000000`00000005 fffffa80`080651a0 00000000`10024398 : nt!KeBugCheckEx
fffff880`030b0ae0 fffff880`051c3a45 : 00000000`00000001 fffffa80`087dad20 00000000`00000000 fffff880`06897000 : USBPORT!USBPORTSVC_MapHwPhysicalToVirtual+0x18a
fffff880`030b0b20 fffff880`051c5737 : fffffa80`087daf60 fffffa80`087dad20 00000000`00000000 fffffa80`080651a0 : usbohci!OHCI_PollAsyncEndpoint+0x99
fffff880`030b0b80 fffff880`04001e8b : 00000000`00000002 fffffa80`087dad20 fffffa80`080651a0 00000000`00000000 : usbohci!OHCI_PollEndpoint+0x3f
fffff880`030b0bb0 fffff880`040069b1 : 00000000`00000050 00000000`00000004 fffffa80`087dad20 fffffa80`08065050 : USBPORT!MPf_PollEndpoint+0x9b
fffff880`030b0be0 fffff880`04012043 : fffffa80`080651a0 00000000`00000050 fffffa80`0000000e 00000000`00000000 : USBPORT!USBPORT_iSetGlobalEndpointStateTx+0x7c1
fffff880`030b0c40 fffff880`04002f89 : fffffa80`08065050 00000000`00000000 fffffa80`08065a02 fffffa80`08065a10 : USBPORT!USBPORT_Core_UsbHcIntDpc_Worker+0x1af
fffff880`030b0ca0 fffff800`02edabfc : fffff880`03088180 fffffa80`08065a10 fffffa80`08065a28 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`030b0cd0 fffff800`02ed7eea : fffff880`03088180 fffff880`03093040 00000000`00000000 fffff880`04002db0 : nt!KiRetireDpcList+0x1bc
fffff880`030b0d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
usbohci!OHCI_PollAsyncEndpoint+99
fffff880`051c3a45 8bd3 mov edx,ebx
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: usbohci!OHCI_PollAsyncEndpoint+99
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: usbohci
IMAGE_NAME: usbohci.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc06
FAILURE_BUCKET_ID: X64_0xFE_INVALID_PHYSICAL_ADDR_usbohci!OHCI_PollAsyncEndpoint+99
BUCKET_ID: X64_0xFE_INVALID_PHYSICAL_ADDR_usbohci!OHCI_PollAsyncEndpoint+99
Followup: MachineOwner
---------