Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\richc46\AppData\Local\Temp\Temp1_Windows_NT6_BSOD_jcgriff2MINIDUMPINFO[1].zip\Windows_NT6_BSOD_jcgriff2\Mini082810-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6002.18267.amd64fre.vistasp2_gdr.100608-0458
Machine Name:
Kernel base = 0xfffff800`0204b000 PsLoadedModuleList = 0xfffff800`0220fdd0
Debug session time: Sat Aug 28 00:34:05.429 2010 (GMT-4)
System Uptime: 0 days 0:09:27.947
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 8, 0}
Unable to load image \SystemRoot\system32\DRIVERS\usbfilter.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for usbfilter.sys
*** ERROR: Module load completed but symbols could not be loaded for usbfilter.sys
Probably caused by : usbfilter.sys ( usbfilter+1acb )
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002272080
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
+0
00000000`00000000 ?? ???
PROCESS_NAME: System
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
TRAP_FRAME: fffffa600a7d47b0 -- (.trap 0xfffffa600a7d47b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa6001981aa0 rbx=0000000000000000 rcx=fffff800021be680
rdx=000000000000001f rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=fffffa600a7d4948 rbp=0000000000000002
r8=0000000000000065 r9=0000000000000000 r10=0000000000000000
r11=fffffa600a7d4580 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
00000000`00000000 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800020a526e to fffff800020a54d0
FAILED_INSTRUCTION_ADDRESS:
+0
00000000`00000000 ?? ???
STACK_TEXT:
fffffa60`0a7d4948 fffffa60`023f1acb : fffffa80`09d8b348 00000000`00000002 fffffa60`023f5a60 00000000`000006b7 : 0x0
fffffa60`0a7d4950 fffffa80`09d8b348 : 00000000`00000002 fffffa60`023f5a60 00000000`000006b7 fffffa80`09d94d40 : usbfilter+0x1acb
fffffa60`0a7d4958 00000000`00000002 : fffffa60`023f5a60 00000000`000006b7 fffffa80`09d94d40 fffffa80`08695700 : 0xfffffa80`09d8b348
fffffa60`0a7d4960 fffffa60`023f5a60 : 00000000`000006b7 fffffa80`09d94d40 fffffa80`08695700 fffffa80`0809b788 : 0x2
fffffa60`0a7d4968 00000000`000006b7 : fffffa80`09d94d40 fffffa80`08695700 fffffa80`0809b788 fffffa60`023f15cb : usbfilter+0x5a60
fffffa60`0a7d4970 fffffa80`09d94d40 : fffffa80`08695700 fffffa80`0809b788 fffffa60`023f15cb fffffa80`09649020 : 0x6b7
fffffa60`0a7d4978 fffffa80`08695700 : fffffa80`0809b788 fffffa60`023f15cb fffffa80`09649020 ffffffff`fff0bdc0 : 0xfffffa80`09d94d40
fffffa60`0a7d4980 fffffa80`0809b788 : fffffa60`023f15cb fffffa80`09649020 ffffffff`fff0bdc0 00000000`00000000 : 0xfffffa80`08695700
fffffa60`0a7d4988 fffffa60`023f15cb : fffffa80`09649020 ffffffff`fff0bdc0 00000000`00000000 fffffa80`0809b870 : 0xfffffa80`0809b788
fffffa60`0a7d4990 fffffa80`09649020 : ffffffff`fff0bdc0 00000000`00000000 fffffa80`0809b870 00000100`00000600 : usbfilter+0x15cb
fffffa60`0a7d4998 ffffffff`fff0bdc0 : 00000000`00000000 fffffa80`0809b870 00000100`00000600 fffffa80`0809b701 : 0xfffffa80`09649020
fffffa60`0a7d49a0 00000000`00000000 : fffffa80`0809b870 00000100`00000600 fffffa80`0809b701 00000000`00000000 : 0xffffffff`fff0bdc0
STACK_COMMAND: .trap 0xfffffa600a7d47b0 ; kb
FOLLOWUP_IP:
usbfilter+1acb
fffffa60`023f1acb ?? ???
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: usbfilter+1acb
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: usbfilter
IMAGE_NAME: usbfilter.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4acc46c8
FAILURE_BUCKET_ID: X64_0xD1_CODE_AV_NULL_IP_usbfilter+1acb
BUCKET_ID: X64_0xD1_CODE_AV_NULL_IP_usbfilter+1acb
Followup: MachineOwner
---------