An access violation when open the HCT 11.2 AP

R

roguekid

Dear all,
I do my WHQL test, connect host and device via
USB cable, then open the HCT test manager.
After the HCT scanning the device manager, it
seems caused a access violation exception.
Two test results are as follows.

<Test result I: from WinDbg>
Created Devscan file
LDR: exception c0000005 thrown within function LdrUnloadDll
Exception record: 0006F97C
Context record: 0006F998
Context->Eip = 01117BCB
Context->Ebp = 0006FC68
Context->Esp = 0006FC64
LDR: LdrUnloadDll - exception c0000005 caught while
sending DLL_PROCESS_DETACH
Dll Name: D:\HCT\chkdrv.dll
InitRoutine: 01115480
gdi!GetOutlineTextMetricsInternalA(): unable to determine
size of buffer needed


<Test result II: from Dr. Watson>
Application exception occurred:
App: D:\HCT\testmgr.exe (pid=1840)
When: 2003/10/28 @ 11:34:53.087
Exception number: c0000005 (access violation)

*----> System Information <----*
Computer Name: RS1SW-TESTPC
User Name: RS1SW
Terminal Session Id: 0
Number of Processors: 1
Processor Type: x86 Family 6 Model 7 Stepping 3
Windows Version: 5.1
Current Build: 2600
Service Pack: None
Current Type: Multiprocessor Checked
Registered Organization: BENQ Corp.
Registered Owner: RS1SW

*----> Task List <----*
0 System Process
4 System
328 smss.exe
476 csrss.exe
504 winlogon.exe
552 services.exe
564 lsass.exe
740 svchost.exe
812 svchost.exe
884 svchost.exe
904 svchost.exe
1144 spoolsv.exe
1684 Explorer.EXE
1804 ctfmon.exe
1812 msmsgs.exe
240 wuauclt.exe
344 wpabaln.exe
1840 testmgr.exe
2012 helpctr.exe
820 HelpSvc.exe
2044 wmiprvse.exe
996 drwtsn32.exe
940 drwtsn32.exe

*----> Module List <----*
(0000000001000000 - 0000000001088000: D:\HCT\testmgr.exe
(00000000027a0000 - 00000000027cd000: D:\HCT\devfnd.dll
(00000000027d0000 - 00000000027e3000: D:\HCT\USBLIB.dll
(00000000027f0000 - 00000000027f5000: D:\HCT\DevID.dll
(000000000ffd0000 - 000000000fff2000: C:\WINDOWS\System32
\rsaenh.dll
(000000005f8c0000 - 000000005f8cb000: C:\WINDOWS\System32
\LPK.DLL
(0000000065c90000 - 0000000065c99000: C:\WINDOWS\System32
\HID.DLL
(00000000702c0000 - 00000000703d0000:
C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-
Controls_6595b64144ccf1df_6.0.0.0_x-
ww_1382d70a\comctl32.dll
(0000000070460000 - 000000007046b000: C:\WINDOWS\System32
\WS2HELP.dll
(0000000070470000 - 0000000070495000: C:\WINDOWS\System32
\WS2_32.dll
(00000000705d0000 - 00000000705e2000: C:\WINDOWS\System32
\SAMLIB.dll
(0000000070600000 - 000000007066e000: C:\WINDOWS\System32
\NETAPI32.dll
(0000000071470000 - 0000000071562000: C:\WINDOWS\System32
\MFC42u.DLL
(0000000071ca0000 - 0000000071d11000: C:\WINDOWS\System32
\USP10.dll
(0000000071d20000 - 0000000071d4b000: C:\WINDOWS\System32
\WINSPOOL.DRV
(0000000072120000 - 0000000072125000: C:\WINDOWS\System32
\MSCAT32.dll
(00000000737e0000 - 000000007385f000: C:\WINDOWS\System32
\MSCTF.dll
(0000000074080000 - 0000000074087000: C:\WINDOWS\System32
\CFGMGR32.dll
(0000000074920000 - 0000000074933000: C:\WINDOWS\System32
\Cabinet.dll
(0000000075360000 - 0000000075405000: C:\WINDOWS\system32
\userenv.dll
(0000000075910000 - 000000007592c000: C:\WINDOWS\system32
\appHelp.dll
(0000000075d20000 - 0000000075d30000: C:\WINDOWS\system32
\MSASN1.dll
(0000000075d40000 - 0000000075de7000: C:\WINDOWS\system32
\CRYPT32.dll
(0000000075e00000 - 0000000075e10000: C:\WINDOWS\System32
\WINSTA.dll
(0000000075e30000 - 0000000075e52000: C:\WINDOWS\System32
\IMM32.DLL
(0000000075e60000 - 0000000075ea8000: C:\WINDOWS\system32
\comdlg32.dll
(0000000076170000 - 0000000076262000: C:\WINDOWS\System32
\setupapi.dll
(0000000076770000 - 0000000076785000: C:\WINDOWS\System32
\ATL.DLL
(0000000076790000 - 00000000767ca000: C:\WINDOWS\System32
\WINMM.dll
(00000000768b0000 - 00000000768de000: C:\WINDOWS\System32
\WINTRUST.dll
(0000000076910000 - 0000000076933000: C:\WINDOWS\system32
\IMAGEHLP.dll
(00000000769c0000 - 00000000769c4000: C:\WINDOWS\System32
\WMI.dll
(00000000769d0000 - 00000000769e7000: C:\WINDOWS\System32
\MPRAPI.dll
(00000000769f0000 - 0000000076a08000: C:\WINDOWS\System32
\iphlpapi.dll
(0000000076a10000 - 0000000076a37000: C:\WINDOWS\System32
\DHCPCSVC.DLL
(0000000076a40000 - 0000000076a75000: C:\WINDOWS\System32
\WZCSvc.DLL
(0000000076a80000 - 0000000076ac5000: C:\WINDOWS\System32
\netman.dll
(0000000076ad0000 - 0000000076afb000: C:\WINDOWS\System32
\adsldpc.dll
(0000000076b00000 - 0000000076b3c000: C:\WINDOWS\System32
\ACTIVEDS.dll
(0000000076b40000 - 0000000076b4d000: C:\WINDOWS\System32
\rtutils.dll
(0000000076b50000 - 0000000076b63000: C:\WINDOWS\System32
\rasman.dll
(0000000076b70000 - 0000000076ba0000: C:\WINDOWS\System32
\TAPI32.dll
(0000000076bb0000 - 0000000076bec000: C:\WINDOWS\System32
\RASAPI32.dll
(0000000076bf0000 - 0000000076c2c000: C:\WINDOWS\System32
\DNSAPI.dll
(0000000076c30000 - 0000000076c38000: C:\WINDOWS\System32
\WTSAPI32.dll
(0000000076c40000 - 0000000076c83000: C:\WINDOWS\system32
\WLDAP32.dll
(0000000076c90000 - 0000000076ca3000: C:\WINDOWS\System32
\Secur32.dll
(0000000076e30000 - 0000000076f05000: C:\WINDOWS\system32
\OLEAUT32.dll
(0000000076f10000 - 00000000770f2000: C:\WINDOWS\system32
\ole32.dll
(0000000077100000 - 0000000077195000: C:\WINDOWS\system32
\SHLWAPI.dll
(00000000771a0000 - 000000007724a000: C:\WINDOWS\system32
\COMCTL32.dll
(0000000077250000 - 0000000077b25000: C:\WINDOWS\system32
\SHELL32.dll
(0000000077b60000 - 0000000077b67000: C:\WINDOWS\system32
\VERSION.dll
(0000000077b70000 - 0000000077bc4000: C:\WINDOWS\system32
\msvcrt.dll
(0000000077bd0000 - 0000000077c2c000: C:\WINDOWS\system32
\GDI32.dll
(0000000077c30000 - 0000000077cc6000: C:\WINDOWS\system32
\RPCRT4.dll
(0000000077cd0000 - 0000000077d85000: C:\WINDOWS\system32
\USER32.dll
(0000000077d90000 - 0000000077e31000: C:\WINDOWS\system32
\ADVAPI32.dll
(0000000077e40000 - 0000000077f28000: C:\WINDOWS\system32
\kernel32.dll
(0000000077f30000 - 0000000077fef000: C:\WINDOWS\System32
\ntdll.dll

*----> State Dump for Thread Id 0x734 <----*

eax=c0000000 ebx=00000000 ecx=00000000 edx=00000002
esi=01115ea0 edi=0006fb88
eip=01115ea0 esp=0006fb18 ebp=0006fb40 iopl=0 nv
up ei pl nz na po cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b
gs=0000 efl=00000207

function: <nosymbols>
No prior disassembly possible
01115ea0 ?? ???
01115ea2 ?? ???
01115ea4 ?? ???
01115ea6 ?? ???
01115ea8 ?? ???
01115eaa ?? ???
01115eac ?? ???
01115eae ?? ???
01115eb0 ?? ???
FAULT ->01115ea0 ?? ???
Error 0x00000001
01115ea2 ?? ???
01115ea4 ?? ???
01115ea6 ?? ???
01115ea8 ?? ???
01115eaa ?? ???
01115eac ?? ???
01115eae ?? ???
01115eb0 ?? ???
01115eb2 ?? ???
01115eb4 ?? ???

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to
export symbols for C:\WINDOWS\system32\USER32.dll -
WARNING: Stack unwind information not available. Following
frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to
export symbols for C:\WINDOWS\System32\ntdll.dll -
*** ERROR: Symbol file could not be found. Defaulted to
export symbols for C:\WINDOWS\System32\MFC42u.DLL -
ChildEBP RetAddr Args to Child
0006fb14 77d11b6f 000501f8 0000001f 00000000 0x1115ea0
0006fb40 77d1be30 01115ea0 000501f8 0000001f USER32!
SetWindowPlacement+0x59
0006fbac 77cff3f1 00000000 01115ea0 000501f8 USER32!
DefRawInputProc+0x3ee
0006fbf4 77ce96ff 00000000 0000001f 00000000 USER32!
GetShellWindow+0x5bb
0006fc1c 77f5fc4f 0006fc2c 00000018 00698100 USER32!
TranslateMessageEx+0xc1f
0006fc58 77d17e1c 000501f8 00000000 0006fd54 ntdll!
KiUserCallbackDispatcher+0x13
0006fc74 714de4b5 000501f8 00000000 00000000 USER32!
EnableWindow+0x42
00000000 00000000 00000000 00000000 00000000 MFC42u!
Ordinal2520+0x82

*----> Raw Stack Dump <----*
000000000006fb18 6f 1b d1 77 f8 01 05 00 - 1f 00 00 00 00
00 00 00 o..w............
000000000006fb28 00 00 00 00 a0 5e 11 01 - cd ab ba dc 00
00 00 00 .....^..........
000000000006fb38 88 fb 06 00 a0 5e 11 01 - ac fb 06 00 30
be d1 77 .....^......0..w
000000000006fb48 a0 5e 11 01 f8 01 05 00 - 1f 00 00 00 00
00 00 00 .^..............
000000000006fb58 00 00 00 00 1f 00 00 00 - f8 01 05 00 00
81 69 00 ..............i.
000000000006fb68 28 00 00 00 00 00 00 00 - 00 00 00 00 14
00 00 00 (...............
000000000006fb78 01 00 00 00 00 00 00 00 - 00 00 00 00 10
00 00 00 ................
000000000006fb88 00 00 00 00 00 00 00 00 - 00 00 00 00 5c
fb 06 00 ............\...
000000000006fb98 40 f7 06 00 a0 fd 06 00 - 74 b8 d4 77 80
80 cd 77 @.......t..w...w
000000000006fba8 00 00 00 00 f4 fb 06 00 - f1 f3 cf 77 00
00 00 00 ...........w....
000000000006fbb8 a0 5e 11 01 f8 01 05 00 - 1f 00 00 00 00
00 00 00 .^..............
000000000006fbc8 00 00 00 00 14 81 69 00 - fc fb 06 00 41
0c 00 00 ......i.....A...
000000000006fbd8 80 29 cd 77 f8 01 05 00 - 01 74 7c 02 f0
fb 06 00 .).w.....t|.....
000000000006fbe8 8f 8f ce 77 20 fc 06 00 - f8 01 05 00 1c
fc 06 00 ...w ...........
000000000006fbf8 ff 96 ce 77 00 00 00 00 - 1f 00 00 00 00
00 00 00 ...w............
000000000006fc08 00 00 00 00 01 00 00 00 - 44 fc 06 00 00
00 00 00 ........D.......
000000000006fc18 00 00 00 00 58 fc 06 00 - 4f fc f5 77 2c
fc 06 00 ....X...O..w,...
000000000006fc28 18 00 00 00 00 81 69 00 - 1f 00 00 00 00
00 00 00 ......i.........
000000000006fc38 00 00 00 00 01 00 00 00 - e0 f2 cf 77 3a
d0 ce 77 ...........w:..w
000000000006fc48 4d d0 ce 77 f8 01 05 00 - 00 00 00 00 5f
00 00 00 M..w........_...

*----> State Dump for Thread Id 0x740 <----*

eax=77f778a3 ebx=00000000 ecx=77f3e7dc edx=00000000
esi=77fbbb60 edi=77f3c62b
eip=7ffe0304 esp=0126ff9c ebp=0126ffb4 iopl=0 nv
up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b
gs=0000 efl=00000202

function: <nosymbols>
7ffe02f2 0000 add [eax],al
7ffe02f4 0000 add [eax],al
7ffe02f6 0000 add [eax],al
*SharedUserSystemCall:
7ffe02f8 0000 add [eax],al
7ffe02fa 0000 add [eax],al
7ffe02fc 0000 add [eax],al
7ffe02fe 0000 add [eax],al
7ffe0300 8bd4 mov edx,esp
7ffe0302 0f34 sysenter
7ffe0304 c3 ret
7ffe0305 9c pushfd
7ffe0306 810c2400010000 or dword ptr
[esp],0x100
7ffe030d 9d popfd
7ffe030e c3 ret
7ffe030f 8bd4 mov edx,esp
7ffe0311 0f05 syscall
7ffe0313 c3 ret
7ffe0314 9c pushfd
7ffe0315 810c2400010000 or dword ptr
[esp],0x100
7ffe031c 9d popfd

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to
export symbols for C:\WINDOWS\system32\kernel32.dll -
WARNING: Stack unwind information not available. Following
frames may be wrong.
ChildEBP RetAddr Args to Child
0126ff98 77f3e2ac 77f778fc 00000001 0126ffac
*SharedUserSystemCall+0xc (FPO: [0,0,0])
0126ffb4 77e5a5f9 00000000 77f3c62b 77fbbb60 ntdll!
ZwDelayExecution+0xc
0126ffec 00000000 77f778a3 00000000 00000000 kernel32!
lstrcmpiW+0x9a

*----> Raw Stack Dump <----*
000000000126ff9c ac e2 f3 77 fc 78 f7 77 - 01 00 00 00 ac
ff 26 01 ...w.x.w......&.
000000000126ffac 00 00 00 00 00 00 00 80 - ec ff 26 01 f9
a5 e5 77 ..........&....w
000000000126ffbc 00 00 00 00 2b c6 f3 77 - 60 bb fb 77 00
00 00 00 ....+..w`..w....
000000000126ffcc ff 01 00 00 00 d0 fd 7f - c0 ff 26 01 38
38 00 80 ..........&.88..
000000000126ffdc ff ff ff ff bc d3 ea 77 - a8 44 e4 77 00
00 00 00 .......w.D.w....
000000000126ffec 00 00 00 00 00 00 00 00 - a3 78 f7 77 00
00 00 00 .........x.w....
000000000126fffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
000000000127000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
000000000127001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
000000000127002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
000000000127003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
000000000127004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
000000000127005c 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
000000000127006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
000000000127007c 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
000000000127008c 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
000000000127009c 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012700ac 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012700bc 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012700cc 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................

*----> State Dump for Thread Id 0x744 <----*

eax=77f88817 ebx=00000000 ecx=77f3e7dc edx=00000000
esi=77fbcb40 edi=77fbcb9c
eip=7ffe0304 esp=012aff70 ebp=012affb4 iopl=0 nv
up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b
gs=0000 efl=00000202

function: <nosymbols>
7ffe02f2 0000 add [eax],al
7ffe02f4 0000 add [eax],al
7ffe02f6 0000 add [eax],al
*SharedUserSystemCall:
7ffe02f8 0000 add [eax],al
7ffe02fa 0000 add [eax],al
7ffe02fc 0000 add [eax],al
7ffe02fe 0000 add [eax],al
7ffe0300 8bd4 mov edx,esp
7ffe0302 0f34 sysenter
7ffe0304 c3 ret
7ffe0305 9c pushfd
7ffe0306 810c2400010000 or dword ptr
[esp],0x100
7ffe030d 9d popfd
7ffe030e c3 ret
7ffe030f 8bd4 mov edx,esp
7ffe0311 0f05 syscall
7ffe0313 c3 ret
7ffe0314 9c pushfd
7ffe0315 810c2400010000 or dword ptr
[esp],0x100
7ffe031c 9d popfd

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following
frames may be wrong.
ChildEBP RetAddr Args to Child
012aff6c 77f3eadc 77f88866 000002c8 012affac
*SharedUserSystemCall+0xc (FPO: [0,0,0])
012affb4 77e5a5f9 00000000 00880086 002fbd78 ntdll!
NtRemoveIoCompletion+0xc
012affec 00000000 77f88817 00000000 00000000 kernel32!
lstrcmpiW+0x9a

*----> Raw Stack Dump <----*
00000000012aff70 dc ea f3 77 66 88 f8 77 - c8 02 00 00 ac
ff 2a 01 ...wf..w......*.
00000000012aff80 b0 ff 2a 01 98 ff 2a 01 - a0 ff 2a 01 86
00 88 00 ..*...*...*.....
00000000012aff90 78 bd 2f 00 00 00 00 00 - 00 00 00 00 00
00 00 00 x./.............
00000000012affa0 00 7c 28 e8 ff ff ff ff - 81 ec 58 80 b8
b0 5f 81 .|(.......X..._.
00000000012affb0 ac ea f3 77 ec ff 2a 01 - f9 a5 e5 77 00
00 00 00 ...w..*....w....
00000000012affc0 86 00 88 00 78 bd 2f 00 - 00 00 00 00 ff
01 00 00 ....x./.........
00000000012affd0 00 c0 fd 7f c0 ff 2a 01 - 38 38 00 80 ff
ff ff ff ......*.88......
00000000012affe0 bc d3 ea 77 a8 44 e4 77 - 00 00 00 00 00
00 00 00 ...w.D.w........
00000000012afff0 00 00 00 00 17 88 f8 77 - 00 00 00 00 00
00 00 00 .......w........
00000000012b0000 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012b0010 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012b0020 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012b0030 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012b0040 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012b0050 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012b0060 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012b0070 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012b0080 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012b0090 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012b00a0 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................

*----> State Dump for Thread Id 0x264 <----*

eax=000000c0 ebx=00000001 ecx=77f3e7dc edx=00000000
esi=000000c0 edi=012eff2c
eip=7ffe0304 esp=012efce8 ebp=012effb4 iopl=0 nv
up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b
gs=0000 efl=00000202

function: <nosymbols>
7ffe02f2 0000 add [eax],al
7ffe02f4 0000 add [eax],al
7ffe02f6 0000 add [eax],al
*SharedUserSystemCall:
7ffe02f8 0000 add [eax],al
7ffe02fa 0000 add [eax],al
7ffe02fc 0000 add [eax],al
7ffe02fe 0000 add [eax],al
7ffe0300 8bd4 mov edx,esp
7ffe0302 0f34 sysenter
7ffe0304 c3 ret
7ffe0305 9c pushfd
7ffe0306 810c2400010000 or dword ptr
[esp],0x100
7ffe030d 9d popfd
7ffe030e c3 ret
7ffe030f 8bd4 mov edx,esp
7ffe0311 0f05 syscall
7ffe0313 c3 ret
7ffe0314 9c pushfd
7ffe0315 810c2400010000 or dword ptr
[esp],0x100
7ffe031c 9d popfd

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following
frames may be wrong.
ChildEBP RetAddr Args to Child
012efce4 77f3efdc 77f84376 00000015 012efd2c
*SharedUserSystemCall+0xc (FPO: [0,0,0])
012effb4 77e5a5f9 00000000 00000020 00880086 ntdll!
NtWaitForMultipleObjects+0xc
012effec 00000000 77f8421a 00000000 00000000 kernel32!
lstrcmpiW+0x9a

*----> Raw Stack Dump <----*
00000000012efce8 dc ef f3 77 76 43 f8 77 - 15 00 00 00 2c
fd 2e 01 ...wvC.w....,...
00000000012efcf8 01 00 00 00 01 00 00 00 - 00 00 00 00 20
00 00 00 ............ ...
00000000012efd08 86 00 88 00 00 00 00 00 - c0 cb fb 77 c0
cb fb 77 ...........w...w
00000000012efd18 d4 02 00 00 64 02 00 00 - 15 00 00 00 15
00 00 00 ....d...........
00000000012efd28 14 00 00 00 d0 02 00 00 - b4 02 00 00 7c
04 00 00 ............|...
00000000012efd38 b8 06 00 00 e8 06 00 00 - 20 07 00 00 04
01 00 00 ........ .......
00000000012efd48 14 01 00 00 48 01 00 00 - 64 01 00 00 a4
01 00 00 ....H...d.......
00000000012efd58 cc 01 00 00 ec 01 00 00 - 04 02 00 00 24
02 00 00 ............$...
00000000012efd68 88 02 00 00 9c 02 00 00 - bc 03 00 00 88
03 00 00 ................
00000000012efd78 f4 03 00 00 70 04 00 00 - 00 05 00 00 00
00 00 00 ....p...........
00000000012efd88 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012efd98 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012efda8 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012efdb8 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012efdc8 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012efdd8 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012efde8 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012efdf8 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012efe08 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012efe18 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................

*----> State Dump for Thread Id 0x764 <----*

eax=00000000 ebx=0188ff14 ecx=ffffffff edx=00000000
esi=00000000 edi=7ffdf000
eip=7ffe0304 esp=0188fecc ebp=0188ff68 iopl=0 nv
up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b
gs=0000 efl=00000202

function: <nosymbols>
7ffe02f2 0000 add [eax],al
7ffe02f4 0000 add [eax],al
7ffe02f6 0000 add [eax],al
*SharedUserSystemCall:
7ffe02f8 0000 add [eax],al
7ffe02fa 0000 add [eax],al
7ffe02fc 0000 add [eax],al
7ffe02fe 0000 add [eax],al
7ffe0300 8bd4 mov edx,esp
7ffe0302 0f34 sysenter
7ffe0304 c3 ret
7ffe0305 9c pushfd
7ffe0306 810c2400010000 or dword ptr
[esp],0x100
7ffe030d 9d popfd
7ffe030e c3 ret
7ffe030f 8bd4 mov edx,esp
7ffe0311 0f05 syscall
7ffe0313 c3 ret
7ffe0314 9c pushfd
7ffe0315 810c2400010000 or dword ptr
[esp],0x100
7ffe031c 9d popfd

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following
frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to
export symbols for C:\WINDOWS\system32\userenv.dll -
ChildEBP RetAddr Args to Child
0188fec8 77f3efdc 77e7c3d2 00000003 0188ff14
*SharedUserSystemCall+0xc (FPO: [0,0,0])
0188ff68 77e7c9a1 00000003 753f3cac 00000000 ntdll!
NtWaitForMultipleObjects+0xc
0188ff84 753d8da0 00000003 753f3cac 00000000 kernel32!
WaitForMultipleObjects+0x16
0188ffb4 77e5a5f9 00000000 77f86e62 0006d358 userenv!
UnregisterGPNotification+0x101
0188ffec 00000000 753d8d22 00000000 00000000 kernel32!
lstrcmpiW+0x9a

*----> Raw Stack Dump <----*
000000000188fecc dc ef f3 77 d2 c3 e7 77 - 03 00 00 00 14
ff 88 01 ...w...w........
000000000188fedc 01 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
000000000188feec 90 3c 3f 75 4f 72 e5 77 - 6c 01 00 00 6c
01 00 00 .<?uOr.wl...l...
000000000188fefc 00 00 00 00 ec ef f3 77 - 12 12 f5 77 03
00 00 00 .......w...w....
000000000188ff0c 00 f0 fd 7f 00 90 fd 7f - 00 01 00 00 dc
00 00 00 ................
000000000188ff1c 68 01 00 00 00 00 08 00 - 00 00 00 00 57
18 e7 77 h...........W..w
000000000188ff2c 00 00 00 00 58 d3 06 00 - 14 ff 88 01 90
dc 71 81 ....X.........q.
000000000188ff3c 14 00 00 00 01 00 00 00 - 00 00 00 00 00
00 00 00 ................
000000000188ff4c 10 00 00 00 e8 fe 88 01 - 00 00 00 00 dc
ff 88 01 ................
000000000188ff5c bc d3 ea 77 88 46 e4 77 - 00 00 00 00 84
ff 88 01 ...w.F.w........
000000000188ff6c a1 c9 e7 77 03 00 00 00 - ac 3c 3f 75 00
00 00 00 ...w.....<?u....
000000000188ff7c ff ff ff ff 00 00 00 00 - b4 ff 88 01 a0
8d 3d 75 ..............=u
000000000188ff8c 03 00 00 00 ac 3c 3f 75 - 00 00 00 00 ff
ff ff ff .....<?u........
000000000188ff9c 62 6e f8 77 58 d3 06 00 - 00 00 00 00 00
00 36 75 bn.wX.........6u
000000000188ffac 03 00 00 00 00 00 00 00 - ec ff 88 01 f9
a5 e5 77 ...............w
000000000188ffbc 00 00 00 00 62 6e f8 77 - 58 d3 06 00 00
00 00 00 ....bn.wX.......
000000000188ffcc ff 01 00 00 00 90 fd 7f - c0 ff 88 01 38
38 00 80 ............88..
000000000188ffdc ff ff ff ff bc d3 ea 77 - a8 44 e4 77 00
00 00 00 .......w.D.w....
000000000188ffec 00 00 00 00 00 00 00 00 - 22 8d 3d 75 00
00 00 00 ........".=u....
000000000188fffc 00 00 00 00 4e 65 74 77 - 00 00 00 00 00
00 00 00 ....Netw........

*----> Symbol Table <----*
Error 0x80004005
 
L

Loren Mikola [MSFT]

Which version of the HCT are you running? Also, what operating system is
used and is a driver installed?



roguekid said:
Dear all,
I do my WHQL test, connect host and device via
USB cable, then open the HCT test manager.
After the HCT scanning the device manager, it
seems caused a access violation exception.
Two test results are as follows.

<Test result I: from WinDbg>
Created Devscan file
LDR: exception c0000005 thrown within function LdrUnloadDll
Exception record: 0006F97C
Context record: 0006F998
Context->Eip = 01117BCB
Context->Ebp = 0006FC68
Context->Esp = 0006FC64
LDR: LdrUnloadDll - exception c0000005 caught while
sending DLL_PROCESS_DETACH
Dll Name: D:\HCT\chkdrv.dll
InitRoutine: 01115480
gdi!GetOutlineTextMetricsInternalA(): unable to determine
size of buffer needed


<Test result II: from Dr. Watson>
Application exception occurred:
App: D:\HCT\testmgr.exe (pid=1840)
When: 2003/10/28 @ 11:34:53.087
Exception number: c0000005 (access violation)

*----> System Information <----*
Computer Name: RS1SW-TESTPC
User Name: RS1SW
Terminal Session Id: 0
Number of Processors: 1
Processor Type: x86 Family 6 Model 7 Stepping 3
Windows Version: 5.1
Current Build: 2600
Service Pack: None
Current Type: Multiprocessor Checked
Registered Organization: BENQ Corp.
Registered Owner: RS1SW

*----> Task List <----*
0 System Process
4 System
328 smss.exe
476 csrss.exe
504 winlogon.exe
552 services.exe
564 lsass.exe
740 svchost.exe
812 svchost.exe
884 svchost.exe
904 svchost.exe
1144 spoolsv.exe
1684 Explorer.EXE
1804 ctfmon.exe
1812 msmsgs.exe
240 wuauclt.exe
344 wpabaln.exe
1840 testmgr.exe
2012 helpctr.exe
820 HelpSvc.exe
2044 wmiprvse.exe
996 drwtsn32.exe
940 drwtsn32.exe

*----> Module List <----*
(0000000001000000 - 0000000001088000: D:\HCT\testmgr.exe
(00000000027a0000 - 00000000027cd000: D:\HCT\devfnd.dll
(00000000027d0000 - 00000000027e3000: D:\HCT\USBLIB.dll
(00000000027f0000 - 00000000027f5000: D:\HCT\DevID.dll
(000000000ffd0000 - 000000000fff2000: C:\WINDOWS\System32
\rsaenh.dll
(000000005f8c0000 - 000000005f8cb000: C:\WINDOWS\System32
\LPK.DLL
(0000000065c90000 - 0000000065c99000: C:\WINDOWS\System32
\HID.DLL
(00000000702c0000 - 00000000703d0000:
C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-
Controls_6595b64144ccf1df_6.0.0.0_x-
ww_1382d70a\comctl32.dll
(0000000070460000 - 000000007046b000: C:\WINDOWS\System32
\WS2HELP.dll
(0000000070470000 - 0000000070495000: C:\WINDOWS\System32
\WS2_32.dll
(00000000705d0000 - 00000000705e2000: C:\WINDOWS\System32
\SAMLIB.dll
(0000000070600000 - 000000007066e000: C:\WINDOWS\System32
\NETAPI32.dll
(0000000071470000 - 0000000071562000: C:\WINDOWS\System32
\MFC42u.DLL
(0000000071ca0000 - 0000000071d11000: C:\WINDOWS\System32
\USP10.dll
(0000000071d20000 - 0000000071d4b000: C:\WINDOWS\System32
\WINSPOOL.DRV
(0000000072120000 - 0000000072125000: C:\WINDOWS\System32
\MSCAT32.dll
(00000000737e0000 - 000000007385f000: C:\WINDOWS\System32
\MSCTF.dll
(0000000074080000 - 0000000074087000: C:\WINDOWS\System32
\CFGMGR32.dll
(0000000074920000 - 0000000074933000: C:\WINDOWS\System32
\Cabinet.dll
(0000000075360000 - 0000000075405000: C:\WINDOWS\system32
\userenv.dll
(0000000075910000 - 000000007592c000: C:\WINDOWS\system32
\appHelp.dll
(0000000075d20000 - 0000000075d30000: C:\WINDOWS\system32
\MSASN1.dll
(0000000075d40000 - 0000000075de7000: C:\WINDOWS\system32
\CRYPT32.dll
(0000000075e00000 - 0000000075e10000: C:\WINDOWS\System32
\WINSTA.dll
(0000000075e30000 - 0000000075e52000: C:\WINDOWS\System32
\IMM32.DLL
(0000000075e60000 - 0000000075ea8000: C:\WINDOWS\system32
\comdlg32.dll
(0000000076170000 - 0000000076262000: C:\WINDOWS\System32
\setupapi.dll
(0000000076770000 - 0000000076785000: C:\WINDOWS\System32
\ATL.DLL
(0000000076790000 - 00000000767ca000: C:\WINDOWS\System32
\WINMM.dll
(00000000768b0000 - 00000000768de000: C:\WINDOWS\System32
\WINTRUST.dll
(0000000076910000 - 0000000076933000: C:\WINDOWS\system32
\IMAGEHLP.dll
(00000000769c0000 - 00000000769c4000: C:\WINDOWS\System32
\WMI.dll
(00000000769d0000 - 00000000769e7000: C:\WINDOWS\System32
\MPRAPI.dll
(00000000769f0000 - 0000000076a08000: C:\WINDOWS\System32
\iphlpapi.dll
(0000000076a10000 - 0000000076a37000: C:\WINDOWS\System32
\DHCPCSVC.DLL
(0000000076a40000 - 0000000076a75000: C:\WINDOWS\System32
\WZCSvc.DLL
(0000000076a80000 - 0000000076ac5000: C:\WINDOWS\System32
\netman.dll
(0000000076ad0000 - 0000000076afb000: C:\WINDOWS\System32
\adsldpc.dll
(0000000076b00000 - 0000000076b3c000: C:\WINDOWS\System32
\ACTIVEDS.dll
(0000000076b40000 - 0000000076b4d000: C:\WINDOWS\System32
\rtutils.dll
(0000000076b50000 - 0000000076b63000: C:\WINDOWS\System32
\rasman.dll
(0000000076b70000 - 0000000076ba0000: C:\WINDOWS\System32
\TAPI32.dll
(0000000076bb0000 - 0000000076bec000: C:\WINDOWS\System32
\RASAPI32.dll
(0000000076bf0000 - 0000000076c2c000: C:\WINDOWS\System32
\DNSAPI.dll
(0000000076c30000 - 0000000076c38000: C:\WINDOWS\System32
\WTSAPI32.dll
(0000000076c40000 - 0000000076c83000: C:\WINDOWS\system32
\WLDAP32.dll
(0000000076c90000 - 0000000076ca3000: C:\WINDOWS\System32
\Secur32.dll
(0000000076e30000 - 0000000076f05000: C:\WINDOWS\system32
\OLEAUT32.dll
(0000000076f10000 - 00000000770f2000: C:\WINDOWS\system32
\ole32.dll
(0000000077100000 - 0000000077195000: C:\WINDOWS\system32
\SHLWAPI.dll
(00000000771a0000 - 000000007724a000: C:\WINDOWS\system32
\COMCTL32.dll
(0000000077250000 - 0000000077b25000: C:\WINDOWS\system32
\SHELL32.dll
(0000000077b60000 - 0000000077b67000: C:\WINDOWS\system32
\VERSION.dll
(0000000077b70000 - 0000000077bc4000: C:\WINDOWS\system32
\msvcrt.dll
(0000000077bd0000 - 0000000077c2c000: C:\WINDOWS\system32
\GDI32.dll
(0000000077c30000 - 0000000077cc6000: C:\WINDOWS\system32
\RPCRT4.dll
(0000000077cd0000 - 0000000077d85000: C:\WINDOWS\system32
\USER32.dll
(0000000077d90000 - 0000000077e31000: C:\WINDOWS\system32
\ADVAPI32.dll
(0000000077e40000 - 0000000077f28000: C:\WINDOWS\system32
\kernel32.dll
(0000000077f30000 - 0000000077fef000: C:\WINDOWS\System32
\ntdll.dll

*----> State Dump for Thread Id 0x734 <----*

eax=c0000000 ebx=00000000 ecx=00000000 edx=00000002
esi=01115ea0 edi=0006fb88
eip=01115ea0 esp=0006fb18 ebp=0006fb40 iopl=0 nv
up ei pl nz na po cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b
gs=0000 efl=00000207

function: <nosymbols>
No prior disassembly possible
01115ea0 ?? ???
01115ea2 ?? ???
01115ea4 ?? ???
01115ea6 ?? ???
01115ea8 ?? ???
01115eaa ?? ???
01115eac ?? ???
01115eae ?? ???
01115eb0 ?? ???
FAULT ->01115ea0 ?? ???
Error 0x00000001
01115ea2 ?? ???
01115ea4 ?? ???
01115ea6 ?? ???
01115ea8 ?? ???
01115eaa ?? ???
01115eac ?? ???
01115eae ?? ???
01115eb0 ?? ???
01115eb2 ?? ???
01115eb4 ?? ???

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to
export symbols for C:\WINDOWS\system32\USER32.dll -
WARNING: Stack unwind information not available. Following
frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to
export symbols for C:\WINDOWS\System32\ntdll.dll -
*** ERROR: Symbol file could not be found. Defaulted to
export symbols for C:\WINDOWS\System32\MFC42u.DLL -
ChildEBP RetAddr Args to Child
0006fb14 77d11b6f 000501f8 0000001f 00000000 0x1115ea0
0006fb40 77d1be30 01115ea0 000501f8 0000001f USER32!
SetWindowPlacement+0x59
0006fbac 77cff3f1 00000000 01115ea0 000501f8 USER32!
DefRawInputProc+0x3ee
0006fbf4 77ce96ff 00000000 0000001f 00000000 USER32!
GetShellWindow+0x5bb
0006fc1c 77f5fc4f 0006fc2c 00000018 00698100 USER32!
TranslateMessageEx+0xc1f
0006fc58 77d17e1c 000501f8 00000000 0006fd54 ntdll!
KiUserCallbackDispatcher+0x13
0006fc74 714de4b5 000501f8 00000000 00000000 USER32!
EnableWindow+0x42
00000000 00000000 00000000 00000000 00000000 MFC42u!
Ordinal2520+0x82

*----> Raw Stack Dump <----*
000000000006fb18 6f 1b d1 77 f8 01 05 00 - 1f 00 00 00 00
00 00 00 o..w............
000000000006fb28 00 00 00 00 a0 5e 11 01 - cd ab ba dc 00
00 00 00 .....^..........
000000000006fb38 88 fb 06 00 a0 5e 11 01 - ac fb 06 00 30
be d1 77 .....^......0..w
000000000006fb48 a0 5e 11 01 f8 01 05 00 - 1f 00 00 00 00
00 00 00 .^..............
000000000006fb58 00 00 00 00 1f 00 00 00 - f8 01 05 00 00
81 69 00 ..............i.
000000000006fb68 28 00 00 00 00 00 00 00 - 00 00 00 00 14
00 00 00 (...............
000000000006fb78 01 00 00 00 00 00 00 00 - 00 00 00 00 10
00 00 00 ................
000000000006fb88 00 00 00 00 00 00 00 00 - 00 00 00 00 5c
fb 06 00 ............\...
000000000006fb98 40 f7 06 00 a0 fd 06 00 - 74 b8 d4 77 80
80 cd 77 @.......t..w...w
000000000006fba8 00 00 00 00 f4 fb 06 00 - f1 f3 cf 77 00
00 00 00 ...........w....
000000000006fbb8 a0 5e 11 01 f8 01 05 00 - 1f 00 00 00 00
00 00 00 .^..............
000000000006fbc8 00 00 00 00 14 81 69 00 - fc fb 06 00 41
0c 00 00 ......i.....A...
000000000006fbd8 80 29 cd 77 f8 01 05 00 - 01 74 7c 02 f0
fb 06 00 .).w.....t|.....
000000000006fbe8 8f 8f ce 77 20 fc 06 00 - f8 01 05 00 1c
fc 06 00 ...w ...........
000000000006fbf8 ff 96 ce 77 00 00 00 00 - 1f 00 00 00 00
00 00 00 ...w............
000000000006fc08 00 00 00 00 01 00 00 00 - 44 fc 06 00 00
00 00 00 ........D.......
000000000006fc18 00 00 00 00 58 fc 06 00 - 4f fc f5 77 2c
fc 06 00 ....X...O..w,...
000000000006fc28 18 00 00 00 00 81 69 00 - 1f 00 00 00 00
00 00 00 ......i.........
000000000006fc38 00 00 00 00 01 00 00 00 - e0 f2 cf 77 3a
d0 ce 77 ...........w:..w
000000000006fc48 4d d0 ce 77 f8 01 05 00 - 00 00 00 00 5f
00 00 00 M..w........_...

*----> State Dump for Thread Id 0x740 <----*

eax=77f778a3 ebx=00000000 ecx=77f3e7dc edx=00000000
esi=77fbbb60 edi=77f3c62b
eip=7ffe0304 esp=0126ff9c ebp=0126ffb4 iopl=0 nv
up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b
gs=0000 efl=00000202

function: <nosymbols>
7ffe02f2 0000 add [eax],al
7ffe02f4 0000 add [eax],al
7ffe02f6 0000 add [eax],al
*SharedUserSystemCall:
7ffe02f8 0000 add [eax],al
7ffe02fa 0000 add [eax],al
7ffe02fc 0000 add [eax],al
7ffe02fe 0000 add [eax],al
7ffe0300 8bd4 mov edx,esp
7ffe0302 0f34 sysenter
7ffe0304 c3 ret
7ffe0305 9c pushfd
7ffe0306 810c2400010000 or dword ptr
[esp],0x100
7ffe030d 9d popfd
7ffe030e c3 ret
7ffe030f 8bd4 mov edx,esp
7ffe0311 0f05 syscall
7ffe0313 c3 ret
7ffe0314 9c pushfd
7ffe0315 810c2400010000 or dword ptr
[esp],0x100
7ffe031c 9d popfd

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to
export symbols for C:\WINDOWS\system32\kernel32.dll -
WARNING: Stack unwind information not available. Following
frames may be wrong.
ChildEBP RetAddr Args to Child
0126ff98 77f3e2ac 77f778fc 00000001 0126ffac
*SharedUserSystemCall+0xc (FPO: [0,0,0])
0126ffb4 77e5a5f9 00000000 77f3c62b 77fbbb60 ntdll!
ZwDelayExecution+0xc
0126ffec 00000000 77f778a3 00000000 00000000 kernel32!
lstrcmpiW+0x9a

*----> Raw Stack Dump <----*
000000000126ff9c ac e2 f3 77 fc 78 f7 77 - 01 00 00 00 ac
ff 26 01 ...w.x.w......&.
000000000126ffac 00 00 00 00 00 00 00 80 - ec ff 26 01 f9
a5 e5 77 ..........&....w
000000000126ffbc 00 00 00 00 2b c6 f3 77 - 60 bb fb 77 00
00 00 00 ....+..w`..w....
000000000126ffcc ff 01 00 00 00 d0 fd 7f - c0 ff 26 01 38
38 00 80 ..........&.88..
000000000126ffdc ff ff ff ff bc d3 ea 77 - a8 44 e4 77 00
00 00 00 .......w.D.w....
000000000126ffec 00 00 00 00 00 00 00 00 - a3 78 f7 77 00
00 00 00 .........x.w....
000000000126fffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
000000000127000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
000000000127001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
000000000127002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
000000000127003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
000000000127004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
000000000127005c 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
000000000127006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
000000000127007c 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
000000000127008c 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
000000000127009c 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012700ac 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012700bc 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012700cc 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................

*----> State Dump for Thread Id 0x744 <----*

eax=77f88817 ebx=00000000 ecx=77f3e7dc edx=00000000
esi=77fbcb40 edi=77fbcb9c
eip=7ffe0304 esp=012aff70 ebp=012affb4 iopl=0 nv
up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b
gs=0000 efl=00000202

function: <nosymbols>
7ffe02f2 0000 add [eax],al
7ffe02f4 0000 add [eax],al
7ffe02f6 0000 add [eax],al
*SharedUserSystemCall:
7ffe02f8 0000 add [eax],al
7ffe02fa 0000 add [eax],al
7ffe02fc 0000 add [eax],al
7ffe02fe 0000 add [eax],al
7ffe0300 8bd4 mov edx,esp
7ffe0302 0f34 sysenter
7ffe0304 c3 ret
7ffe0305 9c pushfd
7ffe0306 810c2400010000 or dword ptr
[esp],0x100
7ffe030d 9d popfd
7ffe030e c3 ret
7ffe030f 8bd4 mov edx,esp
7ffe0311 0f05 syscall
7ffe0313 c3 ret
7ffe0314 9c pushfd
7ffe0315 810c2400010000 or dword ptr
[esp],0x100
7ffe031c 9d popfd

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following
frames may be wrong.
ChildEBP RetAddr Args to Child
012aff6c 77f3eadc 77f88866 000002c8 012affac
*SharedUserSystemCall+0xc (FPO: [0,0,0])
012affb4 77e5a5f9 00000000 00880086 002fbd78 ntdll!
NtRemoveIoCompletion+0xc
012affec 00000000 77f88817 00000000 00000000 kernel32!
lstrcmpiW+0x9a

*----> Raw Stack Dump <----*
00000000012aff70 dc ea f3 77 66 88 f8 77 - c8 02 00 00 ac
ff 2a 01 ...wf..w......*.
00000000012aff80 b0 ff 2a 01 98 ff 2a 01 - a0 ff 2a 01 86
00 88 00 ..*...*...*.....
00000000012aff90 78 bd 2f 00 00 00 00 00 - 00 00 00 00 00
00 00 00 x./.............
00000000012affa0 00 7c 28 e8 ff ff ff ff - 81 ec 58 80 b8
b0 5f 81 .|(.......X..._.
00000000012affb0 ac ea f3 77 ec ff 2a 01 - f9 a5 e5 77 00
00 00 00 ...w..*....w....
00000000012affc0 86 00 88 00 78 bd 2f 00 - 00 00 00 00 ff
01 00 00 ....x./.........
00000000012affd0 00 c0 fd 7f c0 ff 2a 01 - 38 38 00 80 ff
ff ff ff ......*.88......
00000000012affe0 bc d3 ea 77 a8 44 e4 77 - 00 00 00 00 00
00 00 00 ...w.D.w........
00000000012afff0 00 00 00 00 17 88 f8 77 - 00 00 00 00 00
00 00 00 .......w........
00000000012b0000 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012b0010 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012b0020 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012b0030 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012b0040 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012b0050 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012b0060 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012b0070 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012b0080 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012b0090 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012b00a0 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................

*----> State Dump for Thread Id 0x264 <----*

eax=000000c0 ebx=00000001 ecx=77f3e7dc edx=00000000
esi=000000c0 edi=012eff2c
eip=7ffe0304 esp=012efce8 ebp=012effb4 iopl=0 nv
up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b
gs=0000 efl=00000202

function: <nosymbols>
7ffe02f2 0000 add [eax],al
7ffe02f4 0000 add [eax],al
7ffe02f6 0000 add [eax],al
*SharedUserSystemCall:
7ffe02f8 0000 add [eax],al
7ffe02fa 0000 add [eax],al
7ffe02fc 0000 add [eax],al
7ffe02fe 0000 add [eax],al
7ffe0300 8bd4 mov edx,esp
7ffe0302 0f34 sysenter
7ffe0304 c3 ret
7ffe0305 9c pushfd
7ffe0306 810c2400010000 or dword ptr
[esp],0x100
7ffe030d 9d popfd
7ffe030e c3 ret
7ffe030f 8bd4 mov edx,esp
7ffe0311 0f05 syscall
7ffe0313 c3 ret
7ffe0314 9c pushfd
7ffe0315 810c2400010000 or dword ptr
[esp],0x100
7ffe031c 9d popfd

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following
frames may be wrong.
ChildEBP RetAddr Args to Child
012efce4 77f3efdc 77f84376 00000015 012efd2c
*SharedUserSystemCall+0xc (FPO: [0,0,0])
012effb4 77e5a5f9 00000000 00000020 00880086 ntdll!
NtWaitForMultipleObjects+0xc
012effec 00000000 77f8421a 00000000 00000000 kernel32!
lstrcmpiW+0x9a

*----> Raw Stack Dump <----*
00000000012efce8 dc ef f3 77 76 43 f8 77 - 15 00 00 00 2c
fd 2e 01 ...wvC.w....,...
00000000012efcf8 01 00 00 00 01 00 00 00 - 00 00 00 00 20
00 00 00 ............ ...
00000000012efd08 86 00 88 00 00 00 00 00 - c0 cb fb 77 c0
cb fb 77 ...........w...w
00000000012efd18 d4 02 00 00 64 02 00 00 - 15 00 00 00 15
00 00 00 ....d...........
00000000012efd28 14 00 00 00 d0 02 00 00 - b4 02 00 00 7c
04 00 00 ............|...
00000000012efd38 b8 06 00 00 e8 06 00 00 - 20 07 00 00 04
01 00 00 ........ .......
00000000012efd48 14 01 00 00 48 01 00 00 - 64 01 00 00 a4
01 00 00 ....H...d.......
00000000012efd58 cc 01 00 00 ec 01 00 00 - 04 02 00 00 24
02 00 00 ............$...
00000000012efd68 88 02 00 00 9c 02 00 00 - bc 03 00 00 88
03 00 00 ................
00000000012efd78 f4 03 00 00 70 04 00 00 - 00 05 00 00 00
00 00 00 ....p...........
00000000012efd88 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012efd98 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012efda8 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012efdb8 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012efdc8 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012efdd8 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012efde8 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012efdf8 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012efe08 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
00000000012efe18 00 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................

*----> State Dump for Thread Id 0x764 <----*

eax=00000000 ebx=0188ff14 ecx=ffffffff edx=00000000
esi=00000000 edi=7ffdf000
eip=7ffe0304 esp=0188fecc ebp=0188ff68 iopl=0 nv
up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b
gs=0000 efl=00000202

function: <nosymbols>
7ffe02f2 0000 add [eax],al
7ffe02f4 0000 add [eax],al
7ffe02f6 0000 add [eax],al
*SharedUserSystemCall:
7ffe02f8 0000 add [eax],al
7ffe02fa 0000 add [eax],al
7ffe02fc 0000 add [eax],al
7ffe02fe 0000 add [eax],al
7ffe0300 8bd4 mov edx,esp
7ffe0302 0f34 sysenter
7ffe0304 c3 ret
7ffe0305 9c pushfd
7ffe0306 810c2400010000 or dword ptr
[esp],0x100
7ffe030d 9d popfd
7ffe030e c3 ret
7ffe030f 8bd4 mov edx,esp
7ffe0311 0f05 syscall
7ffe0313 c3 ret
7ffe0314 9c pushfd
7ffe0315 810c2400010000 or dword ptr
[esp],0x100
7ffe031c 9d popfd

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following
frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to
export symbols for C:\WINDOWS\system32\userenv.dll -
ChildEBP RetAddr Args to Child
0188fec8 77f3efdc 77e7c3d2 00000003 0188ff14
*SharedUserSystemCall+0xc (FPO: [0,0,0])
0188ff68 77e7c9a1 00000003 753f3cac 00000000 ntdll!
NtWaitForMultipleObjects+0xc
0188ff84 753d8da0 00000003 753f3cac 00000000 kernel32!
WaitForMultipleObjects+0x16
0188ffb4 77e5a5f9 00000000 77f86e62 0006d358 userenv!
UnregisterGPNotification+0x101
0188ffec 00000000 753d8d22 00000000 00000000 kernel32!
lstrcmpiW+0x9a

*----> Raw Stack Dump <----*
000000000188fecc dc ef f3 77 d2 c3 e7 77 - 03 00 00 00 14
ff 88 01 ...w...w........
000000000188fedc 01 00 00 00 00 00 00 00 - 00 00 00 00 00
00 00 00 ................
000000000188feec 90 3c 3f 75 4f 72 e5 77 - 6c 01 00 00 6c
01 00 00 .<?uOr.wl...l...
000000000188fefc 00 00 00 00 ec ef f3 77 - 12 12 f5 77 03
00 00 00 .......w...w....
000000000188ff0c 00 f0 fd 7f 00 90 fd 7f - 00 01 00 00 dc
00 00 00 ................
000000000188ff1c 68 01 00 00 00 00 08 00 - 00 00 00 00 57
18 e7 77 h...........W..w
000000000188ff2c 00 00 00 00 58 d3 06 00 - 14 ff 88 01 90
dc 71 81 ....X.........q.
000000000188ff3c 14 00 00 00 01 00 00 00 - 00 00 00 00 00
00 00 00 ................
000000000188ff4c 10 00 00 00 e8 fe 88 01 - 00 00 00 00 dc
ff 88 01 ................
000000000188ff5c bc d3 ea 77 88 46 e4 77 - 00 00 00 00 84
ff 88 01 ...w.F.w........
000000000188ff6c a1 c9 e7 77 03 00 00 00 - ac 3c 3f 75 00
00 00 00 ...w.....<?u....
000000000188ff7c ff ff ff ff 00 00 00 00 - b4 ff 88 01 a0
8d 3d 75 ..............=u
000000000188ff8c 03 00 00 00 ac 3c 3f 75 - 00 00 00 00 ff
ff ff ff .....<?u........
000000000188ff9c 62 6e f8 77 58 d3 06 00 - 00 00 00 00 00
00 36 75 bn.wX.........6u
000000000188ffac 03 00 00 00 00 00 00 00 - ec ff 88 01 f9
a5 e5 77 ...............w
000000000188ffbc 00 00 00 00 62 6e f8 77 - 58 d3 06 00 00
00 00 00 ....bn.wX.......
000000000188ffcc ff 01 00 00 00 90 fd 7f - c0 ff 88 01 38
38 00 80 ............88..
000000000188ffdc ff ff ff ff bc d3 ea 77 - a8 44 e4 77 00
00 00 00 .......w.D.w....
000000000188ffec 00 00 00 00 00 00 00 00 - 22 8d 3d 75 00
00 00 00 ........".=u....
000000000188fffc 00 00 00 00 4e 65 74 77 - 00 00 00 00 00
00 00 00 ....Netw........

*----> Symbol Table <----*
Error 0x80004005
 
R

roguekid

Hi lorenm,
I use the HCT 11.2 to do WHQL test, and my
testing platform is the Windows XP SP1 build 2600.
I installed my driver and connect the device and host via
USB cable, then open the HCT 11.2. After it scanned the
device manager, an access violation was happened.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top