==================================================
Dump File : 110111-19999-01.dmp
Crash Time : 01.11.2011 21:42:15
Bug Check String : KMODE_EXCEPTION_NOT_HANDLED
Bug Check Code : 0x0000001e
Parameter 1 : 00000000`00000000
Parameter 2 : 00000000`00000000
Parameter 3 : 00000000`00000000
Parameter 4 : 00000000`00000000
Caused By Driver : ntoskrnl.exe
Caused By Address : ntoskrnl.exe+7cc10
File Des*****ion : NT Kernel & System
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.1.7601.17640 (win7sp1_gdr.110622-1506)
Processor : x64
Crash Address : ntoskrnl.exe+7cc10
Stack Address 1 :
Stack Address 2 :
Stack Address 3 :
Computer Name :
Full Path : C:\Windows\Minidump\110111-19999-01.dmp
Processors Count : 4
Major Version : 15
Minor Version : 7601
Dump File Size : 292.080
==================================================
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - Der Vorgang wurde erfolgreich beendet.
FAULTING_IP:
+3131623361363063
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
BUGCHECK_STR: 0x1E_0
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff880037fd8f8 -- (.exr 0xfffff880037fd8f

ExceptionAddress: fffff88004a0ef32 (usbohci!OHCI_PollIsoEndpoint+0x00000000000000b6)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff880037fd9a0 -- (.trap 0xfffff880037fd9a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8007eb9620
rdx=000000004f444648 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004a0ef32 rsp=fffff880037fdb30 rbp=0000000000000000
r8=000000004f444648 r9=f7fff8800ba6d900 r10=00000000ffffffff
r11=fffffa800ae46e70 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
usbohci!OHCI_PollIsoEndpoint+0xb6:
fffff880`04a0ef32 f0834b2808 lock or dword ptr [rbx+28h],8 ds:0001:00000000`00000028=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800034875fe to fffff8000348fc10
STACK_TEXT:
fffff880`037fc9d8 fffff800`034875fe : fffff880`037fcb68 fffffa80`085aa000 fffff880`037fd150 fffff800`034bb830 : nt!KeBugCheck
fffff880`037fc9e0 fffff800`034bb4fd : fffff800`0369971c fffff800`035d6c30 fffff800`03413000 fffff880`037fd8f8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`037fca10 fffff800`034ba2d5 : fffff800`035da0fc fffff880`037fca88 fffff880`037fd8f8 fffff800`03413000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`037fca40 fffff800`034cb361 : fffff880`037fd8f8 fffff880`037fd150 fffff880`00000000 fffffa80`0ab2dc48 : nt!RtlDispatchException+0x415
fffff880`037fd120 fffff800`0348f2c2 : fffff880`037fd8f8 f7fff880`0ba6d900 fffff880`037fd9a0 fffff880`0ba6d900 : nt!KiDispatchException+0x135
fffff880`037fd7c0 fffff800`0348dbca : fffff880`037d9f40 00000000`00000022 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`037fd9a0 fffff880`04a0ef32 : f7fff880`0ba6d900 fffff880`0ba6d900 fffffa80`07eb21a0 fffffa80`0ab2dc48 : nt!KiGeneralProtectionFault+0x10a
fffff880`037fdb30 fffff880`04a11744 : fffffa80`0ab2dc48 fffffa80`0ab2da00 fffffa80`07eb21a0 00000000`ffffff02 : usbohci!OHCI_PollIsoEndpoint+0xb6
fffff880`037fdb80 fffff880`14567e8b : 00000000`00000002 fffffa80`0ab2da00 fffffa80`07eb21a0 00000000`00000000 : usbohci!OHCI_PollEndpoint+0x4c
fffff880`037fdbb0 fffff880`1456c9d1 : 00000000`00000070 00000000`00000004 fffffa80`0ab2da00 fffffa80`07eb2050 : USBPORT!MPf_PollEndpoint+0x9b
fffff880`037fdbe0 fffff880`14578077 : fffffa80`07eb21a0 00000000`00000070 fffffa80`0000000e 00000000`00000000 : USBPORT!USBPORT_iSetGlobalEndpointStateTx+0x7c1
fffff880`037fdc40 fffff880`14568f89 : fffffa80`07eb2050 00000000`00000000 fffffa80`07eb2a02 fffffa80`07eb2a18 : USBPORT!USBPORT_Core_UsbHcIntDpc_Worker+0x1c3
fffff880`037fdca0 fffff800`0349b0ac : fffff880`037d5180 fffffa80`07eb2a18 fffffa80`07eb2a30 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`037fdcd0 fffff800`0348796a : fffff880`037d5180 fffff880`037dffc0 00000000`00000000 fffff880`14568db0 : nt!KiRetireDpcList+0x1bc
fffff880`037fdd80 00000000`00000000 : fffff880`037fe000 fffff880`037f8000 fffff880`037fdd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
usbohci!OHCI_PollIsoEndpoint+b6
fffff880`04a0ef32 f0834b2808 lock or dword ptr [rbx+28h],8
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: usbohci!OHCI_PollIsoEndpoint+b6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: usbohci
IMAGE_NAME: usbohci.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d8c0bff
FAILURE_BUCKET_ID: X64_0x1E_0_usbohci!OHCI_PollIsoEndpoint+b6
BUCKET_ID: X64_0x1E_0_usbohci!OHCI_PollIsoEndpoint+b6
Followup: MachineOwner
---------