Microsoft (R) Windows Debugger Version 6.2.8400.0 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Tom\Documents\Minidump\Mini072912-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6002.18607.amd64fre.vistasp2_gdr.120402-0336
Machine Name:
Kernel base = 0xfffff800`0220d000 PsLoadedModuleList = 0xfffff800`023d1dd0
Debug session time: Mon Jul 30 01:19:45.381 2012 (UTC + 1:00)
System Uptime: 0 days 22:58:48.697
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {ffffd8000b50f58b, c, 1, fffff8000226de73}
Probably caused by : hardware ( mouclass!MouseClassServiceCallback+1ee )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffd8000b50f58b, memory referenced
Arg2: 000000000000000c, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000226de73, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002434080
GetUlongFromAddress: unable to read from fffff80002434160
ffffd8000b50f58b Nonpaged pool
CURRENT_IRQL: c
FAULTING_IP:
nt!IopfCompleteRequest+5b3
fffff800`0226de73 004c894b add byte ptr [rcx+rcx*4+4Bh],cl
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff800032f85a0 -- (.trap 0xfffff800032f85a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80002380cf0 rbx=0000000000000000 rcx=fffff80002436440
rdx=fffff80002380680 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000226de73 rsp=fffff800032f8730 rbp=00000000a000000c
r8=fffffa8007433c10 r9=fffff80002279c30 r10=0000000000000000
r11=fffff800032f87d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!IopfCompleteRequest+0x5b3:
fffff800`0226de73 004c894b add byte ptr [rcx+rcx*4+4Bh],cl ds:ffffd800`0b50f58b=??
Resetting default scope
MISALIGNED_IP:
nt!IopfCompleteRequest+5b3
fffff800`0226de73 004c894b add byte ptr [rcx+rcx*4+4Bh],cl
LAST_CONTROL_TRANSFER: from fffff8000226486e to fffff80002264ad0
STACK_TEXT:
fffff800`032f8458 fffff800`0226486e : 00000000`0000000a ffffd800`0b50f58b 00000000`0000000c 00000000`00000001 : nt!KeBugCheckEx
fffff800`032f8460 fffff800`0226374b : 00000000`00000001 fffffa80`06d7d000 fffff800`032f8660 fffffa80`07047478 : nt!KiBugCheckDispatch+0x6e
fffff800`032f85a0 fffff800`0226de73 : 00000000`a0000003 00000000`00000000 fffffa80`07047478 fffff800`022feefd : nt!KiPageFault+0x20b
fffff800`032f8730 fffffa60`036cac66 : fffff800`032f0100 fffffa60`046ee106 fffffa80`06c78020 fffffa60`046ed937 : nt!IopfCompleteRequest+0x5b3
fffff800`032f87e0 fffffa60`049b4b17 : 00000000`00000002 fffffa80`06c76e00 fffffa80`06c7b250 fffffa80`06c7b300 : mouclass!MouseClassServiceCallback+0x1ee
fffff800`032f8840 fffff800`0226dbc2 : fffffa80`06c8a010 fffff800`00000000 fffff800`00000000 fffff800`00000001 : mouhid!MouHid_ReadComplete+0x637
fffff800`032f88c0 fffffa60`0499945d : fffffa80`06c8a010 fffffa80`075a0106 fffffa80`06c8a290 fffffa80`06c7d1d0 : nt!IopfCompleteRequest+0x302
fffff800`032f8970 fffffa60`0499963e : fffffa80`06c7e002 fffffa80`06b81b30 00000000`00000006 00000000`00000000 : HIDCLASS!HidpDistributeInterruptReport+0x245
fffff800`032f8a00 fffff800`0226dbc2 : fffffa80`06ba28b0 fffffa80`06c7d060 fffffa80`0768f401 fffffa80`05089950 : HIDCLASS!HidpInterruptReadComplete+0x1ba
fffff800`032f8a70 fffffa60`0139fe27 : fffffa80`04e47050 fffffa80`04e47000 fffffa80`04e471a0 fffffa80`04e47050 : nt!IopfCompleteRequest+0x302
fffff800`032f8b20 fffffa60`013a04e0 : fffffa80`54546b63 fffffa80`06ba28b0 fffffa80`04e471a0 fffffa80`00000000 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0x8d7
fffff800`032f8c00 fffffa60`0139db02 : fffffa80`39585043 fffffa80`04e471a0 fffffa80`04e48088 fffffa80`04e471a0 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x514
fffff800`032f8c70 fffffa60`0138a1a7 : fffffa80`31636f49 fffffa80`04e48088 00000000`00000002 fffffa80`04e471a0 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0x13a
fffff800`032f8cc0 fffff800`022684e7 : fffffa80`04e480a0 00000000`34776478 00000000`00000000 fffff800`02383a80 : USBPORT!USBPORT_Xdpc_Worker+0x26f
fffff800`032f8d10 fffff800`02268ed2 : fffffa60`01389f38 fffff800`02380680 00000000`00000000 fffff800`02385b80 : nt!KiRetireDpcList+0x117
fffff800`032f8d80 fffff800`02438860 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x62
fffff800`032f8db0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!zzz_AsmCodeRange_End+0x4
STACK_COMMAND: kb
FOLLOWUP_IP:
mouclass!MouseClassServiceCallback+1ee
fffffa60`036cac66 488d4e20 lea rcx,[rsi+20h]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: mouclass!MouseClassServiceCallback+1ee
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: X64_IP_MISALIGNED
BUCKET_ID: X64_IP_MISALIGNED
Followup: MachineOwner
---------