Need help with minidump

G

Gary Roach

I've got a crash dump and I can't figure out from dumpchk where the problem
is. It's from a system running XP Home SP2. Here's the output from
dumpchk.exe. Thanks for any help.


----- 32 bit Kernel Mini Dump Analysis

DUMP_HEADER32:
MajorVersion 0000000f
MinorVersion 00000a28
DirectoryTableBase 00039000
PfnDataBase 80c00000
PsLoadedModuleList 8055ab20
PsActiveProcessHead 80560bd8
MachineImageType 0000014c
NumberProcessors 00000001
BugCheckCode 1000007f
BugCheckParameter1 00000008
BugCheckParameter2 80042000
BugCheckParameter3 00000000
BugCheckParameter4 00000000
PaeEnabled 00000000
KdDebuggerDataBlock 8054c760
MiniDumpFields 00000dff

TRIAGE_DUMP32:
ServicePackBuild 00000200
SizeOfDump 00010000
ValidOffset 0000fffc
ContextOffset 00000320
ExceptionOffset 000007d0
MmOffset 00001068
UnloadedDriversOffset 000010a0
PrcbOffset 00001878
ProcessOffset 000024c8
ThreadOffset 00002728
CallStackOffset 00002980
SizeOfCallStack 00003fff
DriverListOffset 00006c10
DriverCount 0000005d
StringPoolOffset 000087b0
StringPoolSize 00000ca0
BrokenDriverOffset 00000000
TriageOptions 00000041
TopOfStack f77cb000
DebuggerDataOffset 00006980
DebuggerDataSize 00000290
DataBlocksOffset 00009450
DataBlocksCount 00000002


Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055ab20
Debug session time: Wed May 07 21:07:59 2008
System Uptime: 0 days 0:00:22
start end module name
804d7000 806eb780 nt Checksum: 002160C9 Timestamp: Wed Aug 04
02:19:48 2004 (41108004)

Unloaded modules:
fa214000 fa219000 Cdaudio.SYS Timestamp: unavailable (00000000)
f9ca7000 f9caa000 Sfloppy.SYS Timestamp: unavailable (00000000)

Finished dump check
 
P

philo

Gary Roach said:
I've got a crash dump and I can't figure out from dumpchk where the problem
is. It's from a system running XP Home SP2. Here's the output from
dumpchk.exe. Thanks for any help.


----- 32 bit Kernel Mini Dump Analysis

DUMP_HEADER32:
MajorVersion 0000000f
MinorVersion 00000a28
DirectoryTableBase 00039000
PfnDataBase 80c00000
PsLoadedModuleList 8055ab20
PsActiveProcessHead 80560bd8
MachineImageType 0000014c
NumberProcessors 00000001
BugCheckCode 1000007f
BugCheckParameter1 00000008
BugCheckParameter2 80042000
BugCheckParameter3 00000000
BugCheckParameter4 00000000
PaeEnabled 00000000
KdDebuggerDataBlock 8054c760
MiniDumpFields 00000dff

TRIAGE_DUMP32:
ServicePackBuild 00000200
SizeOfDump 00010000
ValidOffset 0000fffc
ContextOffset 00000320
ExceptionOffset 000007d0
MmOffset 00001068
UnloadedDriversOffset 000010a0
PrcbOffset 00001878
ProcessOffset 000024c8
ThreadOffset 00002728
CallStackOffset 00002980
SizeOfCallStack 00003fff
DriverListOffset 00006c10
DriverCount 0000005d
StringPoolOffset 000087b0
StringPoolSize 00000ca0
BrokenDriverOffset 00000000
TriageOptions 00000041
TopOfStack f77cb000
DebuggerDataOffset 00006980
DebuggerDataSize 00000290
DataBlocksOffset 00009450
DataBlocksCount 00000002


Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055ab20
Debug session time: Wed May 07 21:07:59 2008
System Uptime: 0 days 0:00:22
start end module name
804d7000 806eb780 nt Checksum: 002160C9 Timestamp: Wed Aug 04
02:19:48 2004 (41108004)

Unloaded modules:
fa214000 fa219000 Cdaudio.SYS Timestamp: unavailable (00000000)
f9ca7000 f9caa000 Sfloppy.SYS Timestamp: unavailable (00000000)

Finished dump check


http://support.microsoft.com/kb/315263


also check : event viewer
 
R

Rey Santos

Bug Check Code 1000007F: UNEXPECTED_KERNEL_MODE_TRAP_M
The UNEXPECTED_KERNEL_MODE_TRAP_M bug check has a value of 0x1000007F. This
indicates that a trap was generated by the Intel CPU and the kernel failed to
catch this trap.

Bug check 0x1000007F has the same meaning and parameters as bug check 0x7F
(UNEXPECTED_KERNEL_MODE_TRAP).
http://msdn.microsoft.com/en-us/library/ms795478.aspx

Bug check 0x7F typically occurs after you install a faulty or mismatched
hardware (especially memory) or if installed hardware fails.

Following the philo's post the possible problem device could be found. In
the debug result/log look for the MODULE_NAME and IMAGE_NAME headings. This
is the program that caused the error. Sometimes when it's a device driver it
means that that device is causing the BSOD and by disabling it or updating
the driver your system will run stable. If you don't know what device that
name relates to then Google it.
 
G

Gary Roach

Thanks for the reply. I ran windbg and kd from the Windows Debugging Tools
on the dump file but I'm at a loss to interpret the output. The parameters
of the BugCheck suggest that the address 0x80042000 should figure in the
location of the offending module but this is just a guess on my part because
I can't find any documentation that describes anything but the first
parameter. The page you gave
(http://msdn.microsoft.com/en-us/library/ms795478.aspx) gives instructions
as to how to look at the call stack for the thread. I've done this as well
as lmk in kd and included the output here in case you can shed some light
the results. Any help is greatly appreciated.

ld script:

lmk
!thread
kb 100
q


------------------------------- RESULTS ---------------------------


Microsoft (R) Windows Debugger Version 6.6.0007.5
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [p:\Mini050708-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is:
srv*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: c:\windows\i386
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 2600.xpsp_sp2_rtm.040803-2158
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055ab20
Debug session time: Wed May 7 21:07:59.092 2008 (GMT-4)
System Uptime: 0 days 0:00:22.662
Loading Kernel Symbols
.............................................................................................
Loading User Symbols
Loading unloaded module list
...
ERROR: FindPlugIns 8007007b
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007F, {8, 80042000, 0, 0}

Probably caused by : ntoskrnl.exe ( nt!KiTrap0E+23 )

Followup: MachineOwner
---------

kd> lmk
start end module name
804d7000 806eb780 nt (pdb symbols)
c:\symbols\ntoskrnl.pdb\8592B6763F34476B9BB560395A383F962\ntoskrnl.pdb
806ec000 806ffd80 hal (deferred)
bf800000 bf9c0380 win32k (deferred)
bf9c1000 bf9d2580 dxg (deferred)
bf9d3000 bfa33f00 s3gnb (deferred)
f302e000 f3031280 ndisuio (deferred)
f7857000 f786e480 dump_atapi (deferred)
f786f000 f78dd380 mrxsmb (deferred)
f78de000 f7909180 rdbss (deferred)
f790a000 f792bd00 afd (deferred)
f7954000 f7974f00 ipnat (deferred)
f7975000 f799cc00 netbt (deferred)
f799d000 f79f4a80 tcpip (deferred)
f79f5000 f7a07400 ipsec (deferred)
f7a92000 f7a94900 Dxapi (deferred)
f9b86000 f9bb9200 update (deferred)
f9bba000 f9bcae00 psched (deferred)
f9bcb000 f9be1680 ndiswan (deferred)
f9be2000 f9bf5900 parport (deferred)
f9bf6000 f9c19980 portcls (deferred)
f9c1a000 f9c2c100 viaudio (deferred)
f9c2d000 f9c4f680 ks (deferred)
f9c50000 f9c72e80 USBPORT (deferred)
f9c73000 f9c86780 VIDEOPRT (deferred)
f9c9f000 f9ca1280 rasacd (deferred)
f9caf000 f9cd7c00 s3gnbm (deferred)
f9cf8000 f9d12580 Mup (deferred)
f9d13000 f9d3fa80 NDIS (deferred)
f9d40000 f9dcc480 Ntfs (deferred)
f9dcd000 f9de3780 KSecDD (deferred)
f9de4000 f9df5f00 sr (deferred)
f9df6000 f9e14780 fltMgr (deferred)
f9e15000 f9e2c480 atapi (deferred)
f9e2d000 f9e4b880 ftdisk (deferred)
f9e4c000 f9e5ca80 pci (deferred)
f9e5d000 f9e8ad80 ACPI (deferred)
f9eac000 f9eb4c00 isapnp (deferred)
f9ebc000 f9ec6500 MountMgr (deferred)
f9ecc000 f9ed8c80 VolSnap (deferred)
f9edc000 f9ee4e00 disk (deferred)
f9eec000 f9ef8200 CLASSPNP (deferred)
f9efc000 f9f06500 viaagp (deferred)
f9f2c000 f9f34d00 intelppm (deferred)
f9f3c000 f9f48e00 i8042prt (deferred)
f9f4c000 f9f56380 imapi (deferred)
f9f5c000 f9f68180 cdrom (deferred)
f9f6c000 f9f7a080 redbook (deferred)
f9f7c000 f9f8ab80 drmk (deferred)
f9f8c000 f9f9bd80 serial (deferred)
f9f9c000 f9fa8880 rasl2tp (deferred)
f9fac000 f9fb6200 raspppoe (deferred)
f9fbc000 f9fc7d00 raspptp (deferred)
f9fcc000 f9fd4900 msgpc (deferred)
f9fdc000 f9fe5f00 termdd (deferred)
f9ffc000 fa005480 NDProxy (deferred)
fa00c000 fa01a100 usbhub (deferred)
fa04c000 fa054700 wanarp (deferred)
fa05c000 fa064700 netbios (deferred)
fa06c000 fa074880 Fips (deferred)
fa08c000 fa09b900 Cdfs (deferred)
fa12c000 fa132200 PCIIDEX (deferred)
fa134000 fa138900 PartMgr (deferred)
fa154000 fa159000 usbuhci (deferred)
fa15c000 fa162800 usbehci (deferred)
fa164000 fa16a000 kbdclass (deferred)
fa18c000 fa192a00 fetnd5 (deferred)
fa19c000 fa1a2b00 fdc (deferred)
fa1c4000 fa1c8880 TDI (deferred)
fa1d4000 fa1d8580 ptilink (deferred)
fa1e4000 fa1e8080 raspti (deferred)
fa1ec000 fa1f1a00 mouclass (deferred)
fa204000 fa209000 flpydisk (deferred)
fa21c000 fa221200 vga (deferred)
fa22c000 fa230a80 Msfs (deferred)
fa23c000 fa243880 Npfs (deferred)
fa274000 fa278500 watchdog (deferred)
fa2bc000 fa2bf000 BOOTVID (deferred)
fa350000 fa353c80 serenum (deferred)
fa35c000 fa35e580 ndistapi (deferred)
fa374000 fa377c80 mssmbios (deferred)
fa3ac000 fa3adb80 kdcom (deferred)
fa3ae000 fa3af100 WMILIB (deferred)
fa3b0000 fa3b1500 viaide (deferred)
fa3b8000 fa3b9100 swenum (deferred)
fa3be000 fa3bf280 USBD (deferred)
fa3c2000 fa3c3f00 Fs_Rec (deferred)
fa3c6000 fa3c7080 Beep (deferred)
fa3ca000 fa3cb080 mnmdd (deferred)
fa3ce000 fa3cf080 RDPCDD (deferred)
fa3d4000 fa3d5100 dump_WMILIB (deferred)
fa503000 fa503c00 audstub (deferred)
fa527000 fa527b80 Null (deferred)
fa59f000 fa59fd00 dxgthk (deferred)

Unloaded modules:
fa214000 fa219000 Cdaudio.SYS
f9ca7000 f9caa000 Sfloppy.SYS
kd> !thread
GetPointerFromAddress: unable to read from 8055f534
THREAD ffbd7620 Cid 025c.0280 Teb: 7ffda000 Win32Thread: e160fca0 RUNNING
on processor 0
Not impersonating
GetUlongFromAddress: unable to read from 8055f544
Owning Process 80d61da0 Image: winlogon.exe
ffdf0000: Unable to get shared data
Wait Start TickCount 2260
Context Switch Count 58 LargeStack
ReadMemory error: Cannot get nt!KeMaximumIncrement value.
UserTime 00:00:00.0000
KernelTime 00:00:00.0000
Win32 Start Address 0x7c910760
Start Address 0x7c810856
Stack Init f77cf000 Current f77ce768 Base f77cf000 Limit f77cb000 Call 0
Priority 15 BasePriority 13 PriorityDecrement 2 DecrementCount 16
ChildEBP RetAddr Args to Child
f77cb038 804e1f7c badb0d00 00070608 0030001a nt!KiTrap0E+0x23 (FPO: [0,0]
TrapFrame @ f77cb038)
f77cb0ac 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cb0ac)
f77cb120 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cb120)
f77cb194 804e1f7c badb0d00 00070608 805577c0 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cb194)
f77cb208 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cb208)
f77cb27c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cb27c)
f77cb2f0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cb2f0)
f77cb364 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cb364)
f77cb3d8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cb3d8)
f77cb44c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cb44c)
f77cb4c0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cb4c0)
f77cb534 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cb534)
f77cb5a8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cb5a8)
f77cb61c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cb61c)
f77cb690 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cb690)
f77cb704 804e1f7c badb0d00 00070608 00000100 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cb704)
f77cb778 804e1f7c badb0d00 00070608 e160c7d0 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cb778)
f77cb7ec 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cb7ec)
f77cb860 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cb860)
f77cb8d4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cb8d4)
f77cb948 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cb948)
f77cb9bc 804e1f7c badb0d00 00070608 805577c0 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cb9bc)
f77cba30 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cba30)
f77cbaa4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cbaa4)
f77cbb18 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cbb18)
f77cbb8c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cbb8c)
f77cbc00 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cbc00)
f77cbc74 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cbc74)
f77cbce8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cbce8)
f77cbd5c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cbd5c)
f77cbdd0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cbdd0)
f77cbe44 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cbe44)
f77cbeb8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cbeb8)
f77cbf2c 804e1f7c badb0d00 00070608 00000100 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cbf2c)
f77cbfa0 804e1f7c badb0d00 00070608 805577c0 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cbfa0)
f77cc014 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cc014)
f77cc088 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cc088)
f77cc0fc 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cc0fc)
f77cc170 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cc170)
f77cc1e4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57 (FPO: [0,0]
TrapFrame @ f77cc1e4)

kd> kb 100
ChildEBP RetAddr Args to Child
f77cb038 804e1f7c badb0d00 00070608 0030001a nt!KiTrap0E+0x23
f77cb0ac 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb120 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb194 804e1f7c badb0d00 00070608 805577c0 nt!KiTrap0E+0x57
f77cb208 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb27c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb2f0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb364 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb3d8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb44c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb4c0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb534 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb5a8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb61c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb690 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb704 804e1f7c badb0d00 00070608 00000100 nt!KiTrap0E+0x57
f77cb778 804e1f7c badb0d00 00070608 e160c7d0 nt!KiTrap0E+0x57
f77cb7ec 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb860 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb8d4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb948 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb9bc 804e1f7c badb0d00 00070608 805577c0 nt!KiTrap0E+0x57
f77cba30 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbaa4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbb18 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbb8c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbc00 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbc74 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbce8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbd5c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbdd0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbe44 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbeb8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbf2c 804e1f7c badb0d00 00070608 00000100 nt!KiTrap0E+0x57
f77cbfa0 804e1f7c badb0d00 00070608 805577c0 nt!KiTrap0E+0x57
f77cc014 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc088 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc0fc 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc170 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc1e4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc258 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc2cc 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc340 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc3b4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc428 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc49c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc510 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc584 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc5f8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc66c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc6e0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc754 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc7c8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc83c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc8b0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc924 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc998 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cca0c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cca80 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccaf4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccb68 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccbdc 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccc50 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cccc4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccd38 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccdac 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cce20 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cce94 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccf08 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccf7c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccff0 804e1f7c badb0d00 00070608 00000038 nt!KiTrap0E+0x57
f77cd064 804e1f7c badb0d00 00070608 00000001 nt!KiTrap0E+0x57
f77cd0d8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cd14c 804e1f7c badb0d00 00070608 805577c0 nt!KiTrap0E+0x57
f77cd1c0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cd234 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cd2a8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cd31c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cd390 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cd404 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cd478 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cd4ec 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cd560 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cd5d4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cd648 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cd6bc 804e1f7c badb0d00 00070608 00000100 nt!KiTrap0E+0x57
f77cd730 804e1f7c badb0d00 00070608 e160c788 nt!KiTrap0E+0x57
f77cd7a4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cd818 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cd88c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cd900 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cd974 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cd9e8 804e1f7c badb0d00 00070608 80ed0738 nt!KiTrap0E+0x57
f77cda5c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cdad0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cdb44 804e1f7c badb0d00 00070608 80ef6540 nt!KiTrap0E+0x57
f77cdbb8 804e1f7c badb0d00 00070608 80eff008 nt!KiTrap0E+0x57
f77cdc2c 804e1f7c badb0d00 00070608 00000001 nt!KiTrap0E+0x57
f77cdca0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cdd14 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cdd88 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cddfc 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cde70 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cdee4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cdf58 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cdfcc 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ce040 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ce0b4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ce128 804e1f7c badb0d00 00070608 f77ce16c nt!KiTrap0E+0x57
f77ce19c 804e1f7c badb0d00 00070608 f77ce1f4 nt!KiTrap0E+0x57
f77ce210 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ce284 804e1f7c badb0d00 00070608 f9e18193 nt!KiTrap0E+0x57
f77ce2f8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ce36c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ce3e0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ce454 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ce4c8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ce53c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ce5b0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ce624 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ce698 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ce70c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ce780 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ce7f4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ce868 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ce8dc 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ce950 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ce9c4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cea38 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ceaac 804e1f7c badb0d00 00070608 00b1e778 nt!KiTrap0E+0x57
f77ceb20 804e1f7c badb0d00 00070608 00000001 nt!KiTrap0E+0x57
f77ceb94 804e1f7c badb0d00 00070608 804e80dc nt!KiTrap0E+0x57
f77cec08 804e1f7c badb0d00 00070608 e182b000 nt!KiTrap0E+0x57
f77cec7c 804e1f7c badb0d00 00070608 00000001 nt!KiTrap0E+0x57
f77cecf0 804e1f7c badb0d00 00070608 f77ced50 nt!KiTrap0E+0x57
f77ced64 7c910466 badb0d00 00070608 f8c0c404 nt!KiTrap0E+0x57
WARNING: Frame IP not in any known module. Following frames may be wrong.
00b1e76c 00000000 00000000 00000000 00000000 0x7c910466
kd> q
quit:


----------------------------- END OF RESULTS --------------------
 
R

Rey Santos

I don't know why you have an ERROR: FindPlugIns 8007007b maybe you're not
connected to the internet for the symbols. The path for the symbls is
http://msdl.microsoft.com/download/symbols -i

Below are what I typed in the command prompt for my Minidump analysis:

cd c:\program files\debugging tools for windows

Press Enter

windbg -y srv*c:\symbols*http://msdl.microsoft.com/download/symbols -i
c:\windows\i386 -z c:\windows\minidump\Your Minidump file.dmp

Replace the last entry with your minidump file (MiniMMDDYY-01.dmp)

Press Enter

(You can use copy and paste to be sure of the characters entered)

Windebug will open
Command window results/log below:

___My Results___

Microsoft (R) Windows Debugger Version 6.8.0004.0 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [c:\windows\minidump\mini041808-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is:
srv*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: c:\windows\i386
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 2600.xpsp_sp2_gdr.070227-2254
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055a620
Debug session time: Fri Apr 18 20:42:56.078 2008 (GMT+8)
System Uptime: 0 days 8:06:07.788
Loading Kernel Symbol
........................................................................................................................................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
*
*
* Bugcheck Analysis
*
*

*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007F, {d, 0, 0, 0}


Probably caused by : usbhub.sys ( usbhub!USBH_PdoRemoveDevice+41 )

Followup: MachineOwner
---------


kd> !analyze -
*******************************************************************************
*
*
* Bugcheck Analysis
*
*

*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000d, EXCEPTION_GP_FAULT
Arg2: 00000000
Arg3: 00000000
Arg4: 00000000

Debugging Details:
------------------




BUGCHECK_STR: 0x7f_d

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

PROCESS_NAME: System

LAST_CONTROL_TRANSFER: from f78da6ff to c4000009

STACK_TEXT:
WARNING: Frame IP not in any known module. Following frames may be wrong.
f7ce5b80 f78da6ff 00430039 68627375 70646f52 0xc4000009
f7ce5bb1 e8f78e16 80835d8d 08836c86 088377f0 usbhub!USBH_PdoRemoveDevice+0x41
f7ce5bc1 a08377f0 80835d8e f4836c86 52f7ce5b 0xe8f78e16
f7ce5bc5 80835d8e f4836c86 52f7ce5b a0f78da9 0xa08377f0
f7ce5bc9 f4836c86 52f7ce5b a0f78da9 08835d8e 0x80835d8e
f7ce5bcd 52f7ce5b a0f78da9 08835d8e 028377f0 0xf4836c86
f7ce5bd1 a0f78da9 08835d8e 028377f0 ff000000 0x52f7ce5b
f7ce5bd5 08835d8e 028377f0 ff000000 07f7ce5b 0xa0f78da9
f7ce5bd9 028377f0 ff000000 07f7ce5b 108054aa 0x8835d8e
f7ce5bdd ff000000 07f7ce5b 108054aa 0083c46b 0x28377f0
f7ce5be1 07f7ce5b 108054aa 0083c46b 04000000 0xff000000
f7ce5be5 108054aa 0083c46b 04000000 d8f7ce5c 0x7f7ce5b
f7ce5be9 0083c46b 04000000 d8f7ce5c a0f78d81 0x108054aa
f7ce5bed 04000000 d8f7ce5c a0f78d81 08015d8e 0x83c46b
f7ce5bf1 d8f7ce5c a0f78d81 08015d8e 288377f0 0x4000000
f7ce5bf5 a0f78d81 08015d8e 288377f0 f7f7ce5c 0xd8f7ce5c
f7ce5bf9 08015d8e 288377f0 f7f7ce5c e8804e37 0xa0f78d81
f7ce5bfd 288377f0 f7f7ce5c e8804e37 08835d8d 0x8015d8e
f7ce5c01 f7f7ce5c e8804e37 08835d8d 808377f0 0x288377f0
f7ce5c05 e8804e37 08835d8d 808377f0 b483767c 0xf7f7ce5c
f7ce5c09 08835d8d 808377f0 b483767c c8f7bc8d 0xe8804e37
f7ce5c0d 808377f0 b483767c c8f7bc8d 8083767b 0x8835d8d
f7ce5c11 b483767c c8f7bc8d 8083767b 0883767c 0x808377f0
f7ce5c15 c8f7bc8d 8083767b 0883767c 408377f0 0xb483767c
f7ce5c19 8083767b 0883767c 408377f0 80f7ce5c 0xc8f7bc8d
f7ce5c1d 0883767c 408377f0 80f7ce5c c8f7bca9 0x8083767b
f7ce5c21 408377f0 80f7ce5c c8f7bca9 0883767b 0x883767c
f7ce5c25 80f7ce5c c8f7bca9 0883767b 088377f0 0x408377f0
f7ce5c29 c8f7bca9 0883767b 088377f0 108377f1 0x80f7ce5c
f7ce5c2d 0883767b 088377f0 108377f1 7c83c41b 0xc8f7bca9
f7ce5c31 088377f0 108377f1 7c83c41b f7f7ce5c 0x883767b
f7ce5c35 108377f1 7c83c41b f7f7ce5c c8804e37 0x88377f0
f7ce5c39 7c83c41b f7f7ce5c c8804e37 0883767b 0x108377f1
f7ce5c3d f7f7ce5c c8804e37 0883767b cc8377f0 0x7c83c41b
f7ce5c41 c8804e37 0883767b cc8377f0 fff7ce5c 0xf7f7ce5c
f7ce5c45 0883767b cc8377f0 fff7ce5c e8805dc5 0xc8804e37
f7ce5c49 cc8377f0 fff7ce5c e8805dc5 e8835d8d 0x883767b
f7ce5c4d fff7ce5c e8805dc5 e8835d8d 02835d8d 0xcc8377f0
f7ce5c51 e8805dc5 e8835d8d 02835d8d 01000000 0xfff7ce5c
f7ce5c55 e8835d8d 02835d8d 01000000 00830406 0xe8805dc5
f7ce5c59 02835d8d 01000000 00830406 6c000000 0xe8835d8d
f7ce5c5d 01000000 00830406 6c000000 6cf7ce5c 0x2835d8d
f7ce5c61 00830406 6c000000 6cf7ce5c bbf7ce5c 0x1000000
f7ce5c65 6c000000 6cf7ce5c bbf7ce5c 00c00000 0x830406
f7ce5c69 6cf7ce5c bbf7ce5c 00c00000 d0000000 0x6c000000
f7ce5c6d bbf7ce5c 00c00000 d0000000 4ef7ce5c 0x6cf7ce5c
f7ce5c71 00c00000 d0000000 4ef7ce5c c88061a9 0xbbf7ce5c
f7ce5c75 d0000000 4ef7ce5c c88061a9 a883767b 0xc00000
f7ce5c79 4ef7ce5c c88061a9 a883767b 00f7ce5c 0xd0000000
f7ce5c7d c88061a9 a883767b 00f7ce5c a4000000 0x4ef7ce5c
f7ce5c81 a883767b 00f7ce5c a4000000 00e6211b 0xc88061a9
f7ce5c85 00f7ce5c a4000000 00e6211b 30000000 0xa883767b
f7ce5c89 a4000000 00e6211b 30000000 0083d5fd 0xf7ce5c
f7ce5c8d 00e6211b 30000000 0083d5fd 99000000 0xa4000000
f7ce5c91 30000000 0083d5fd 99000000 00805311 0xe6211b
f7ce5c95 0083d5fd 99000000 00805311 1b006454 0x30000000
f7ce5c99 99000000 00805311 1b006454 00000002 0x83d5fd
f7ce5c9d 00805311 1b006454 00000002 00000000 0x99000000
f7ce5ca1 1b006454 00000002 00000000 00000000 0x805311
f7ce5ca5 00000000 00000000 00000000 00000000 0x1b006454


STACK_COMMAND: kb

FOLLOWUP_IP:
usbhub!USBH_PdoRemoveDevice+41
f78da6ff 83bfa800000001 cmp dword ptr [edi+0A8h],1

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: usbhub!USBH_PdoRemoveDevice+41

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: usbhub

IMAGE_NAME: usbhub.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 41107d68

FAILURE_BUCKET_ID: 0x7f_d_usbhub!USBH_PdoRemoveDevice+41

BUCKET_ID: 0x7f_d_usbhub!USBH_PdoRemoveDevice+41

Followup: MachineOwner
 
G

Gary Roach

Okay, I ran the command line. I've included the results below. What I'm
getting is that the kernel has caused some problem. I get:

MODULE_NAME: nt

IMAGE_NAME: ntoskrnl.exe

Here's the output:

----------------------------------------------------------------------------


Microsoft (R) Windows Debugger Version 6.6.0007.5
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [p:\Mini050708-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is:
srv*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: c:\windows\i386
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 2600.xpsp_sp2_rtm.040803-2158
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055ab20
Debug session time: Wed May 7 21:07:59.092 2008 (GMT-4)
System Uptime: 0 days 0:00:22.662
Loading Kernel Symbols
.............................................................................................
Loading User Symbols
Loading unloaded module list
...
ERROR: FindPlugIns 8007007b
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007F, {8, 80042000, 0, 0}

Probably caused by : ntoskrnl.exe ( nt!KiTrap0E+23 )

Followup: MachineOwner
---------

kd> !analyze -v
ERROR: FindPlugIns 8007007b
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
Arg2: 80042000
Arg3: 00000000
Arg4: 00000000

Debugging Details:
------------------


BUGCHECK_STR: 0x7f_8

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: INTEL_CPU_MICROCODE_ZERO

PROCESS_NAME: winlogon.exe

TRAP_FRAME: f77cb194 -- (.trap fffffffff77cb194)
ErrCode = 00000000
eax=00b10023 ebx=f77cb27c ecx=00b1e7c8 edx=00070608 esi=01c8c960
edi=804e1f7c
eip=804e1f7c esp=f77cb208 ebp=f77cb208 iopl=0 nv up di pl zr na pe
nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000
efl=00010046
nt!KiTrap0E+0x57:
804e1f7c f60550f0dfffff test byte ptr ds:[0FFDFF050h],0FFh
ds:0023:ffdff050=??
Resetting default scope

LAST_CONTROL_TRANSFER: from 804e1f7c to 804e1f48

STACK_TEXT:
f77cb038 804e1f7c badb0d00 00070608 0030001a nt!KiTrap0E+0x23
f77cb0ac 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb120 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb194 804e1f7c badb0d00 00070608 805577c0 nt!KiTrap0E+0x57
f77cb208 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb27c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb2f0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb364 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb3d8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb44c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb4c0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb534 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb5a8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb61c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb690 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb704 804e1f7c badb0d00 00070608 00000100 nt!KiTrap0E+0x57
f77cb778 804e1f7c badb0d00 00070608 e160c7d0 nt!KiTrap0E+0x57
f77cb7ec 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb860 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb8d4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb948 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb9bc 804e1f7c badb0d00 00070608 805577c0 nt!KiTrap0E+0x57
f77cba30 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbaa4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbb18 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbb8c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbc00 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbc74 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbce8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbd5c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbdd0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbe44 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbeb8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbf2c 804e1f7c badb0d00 00070608 00000100 nt!KiTrap0E+0x57
f77cbfa0 804e1f7c badb0d00 00070608 805577c0 nt!KiTrap0E+0x57
f77cc014 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc088 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc0fc 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc170 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc1e4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc258 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc2cc 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc340 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc3b4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc428 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc49c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc510 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc584 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc5f8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc66c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc6e0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc754 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc7c8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc83c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc8b0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc924 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc998 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cca0c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cca80 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccaf4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccb68 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccbdc 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccc50 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cccc4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccd38 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccdac 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cce20 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cce94 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccf08 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccf7c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccff0 804e1f7c badb0d00 00070608 00000038 nt!KiTrap0E+0x57
f77cd064 804e1f7c badb0d00 00070608 00000001 nt!KiTrap0E+0x57
f77cd0d8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cd14c 804e1f7c badb0d00 00070608 805577c0 nt!KiTrap0E+0x57
f77cd1c0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57


STACK_COMMAND: kb

MODULE_NAME: nt

IMAGE_NAME: ntoskrnl.exe

FOLLOWUP_NAME: MachineOwner

DEBUG_FLR_IMAGE_TIMESTAMP: 41108004

FOLLOWUP_IP:
nt!KiTrap0E+23
804e1f48 1e push ds

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!KiTrap0E+23

FAILURE_BUCKET_ID: TRAP_FRAME_RECURSION

BUCKET_ID: TRAP_FRAME_RECURSION

Followup: MachineOwner
---------



Rey Santos said:
I don't know why you have an ERROR: FindPlugIns 8007007b maybe you're not
connected to the internet for the symbols. The path for the symbls is
http://msdl.microsoft.com/download/symbols -i

Below are what I typed in the command prompt for my Minidump analysis:

cd c:\program files\debugging tools for windows

Press Enter

windbg -y srv*c:\symbols*http://msdl.microsoft.com/download/symbols -i
c:\windows\i386 -z c:\windows\minidump\Your Minidump file.dmp

Replace the last entry with your minidump file (MiniMMDDYY-01.dmp)

Press Enter

(You can use copy and paste to be sure of the characters entered)

Windebug will open
Command window results/log below:

___My Results___

Microsoft (R) Windows Debugger Version 6.8.0004.0 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [c:\windows\minidump\mini041808-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is:
srv*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: c:\windows\i386
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 2600.xpsp_sp2_gdr.070227-2254
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055a620
Debug session time: Fri Apr 18 20:42:56.078 2008 (GMT+8)
System Uptime: 0 days 8:06:07.788
Loading Kernel Symbols
.......................................................................................................................................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007F, {d, 0, 0, 0}


Probably caused by : usbhub.sys ( usbhub!USBH_PdoRemoveDevice+41 )

Followup: MachineOwner
---------


kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000d, EXCEPTION_GP_FAULT
Arg2: 00000000
Arg3: 00000000
Arg4: 00000000

Debugging Details:
------------------




BUGCHECK_STR: 0x7f_d

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

PROCESS_NAME: System

LAST_CONTROL_TRANSFER: from f78da6ff to c4000009

STACK_TEXT:
WARNING: Frame IP not in any known module. Following frames may be wrong.
f7ce5b80 f78da6ff 00430039 68627375 70646f52 0xc4000009
f7ce5bb1 e8f78e16 80835d8d 08836c86 088377f0
usbhub!USBH_PdoRemoveDevice+0x41
f7ce5bc1 a08377f0 80835d8e f4836c86 52f7ce5b 0xe8f78e16
f7ce5bc5 80835d8e f4836c86 52f7ce5b a0f78da9 0xa08377f0
f7ce5bc9 f4836c86 52f7ce5b a0f78da9 08835d8e 0x80835d8e
f7ce5bcd 52f7ce5b a0f78da9 08835d8e 028377f0 0xf4836c86
f7ce5bd1 a0f78da9 08835d8e 028377f0 ff000000 0x52f7ce5b
f7ce5bd5 08835d8e 028377f0 ff000000 07f7ce5b 0xa0f78da9
f7ce5bd9 028377f0 ff000000 07f7ce5b 108054aa 0x8835d8e
f7ce5bdd ff000000 07f7ce5b 108054aa 0083c46b 0x28377f0
f7ce5be1 07f7ce5b 108054aa 0083c46b 04000000 0xff000000
f7ce5be5 108054aa 0083c46b 04000000 d8f7ce5c 0x7f7ce5b
f7ce5be9 0083c46b 04000000 d8f7ce5c a0f78d81 0x108054aa
f7ce5bed 04000000 d8f7ce5c a0f78d81 08015d8e 0x83c46b
f7ce5bf1 d8f7ce5c a0f78d81 08015d8e 288377f0 0x4000000
f7ce5bf5 a0f78d81 08015d8e 288377f0 f7f7ce5c 0xd8f7ce5c
f7ce5bf9 08015d8e 288377f0 f7f7ce5c e8804e37 0xa0f78d81
f7ce5bfd 288377f0 f7f7ce5c e8804e37 08835d8d 0x8015d8e
f7ce5c01 f7f7ce5c e8804e37 08835d8d 808377f0 0x288377f0
f7ce5c05 e8804e37 08835d8d 808377f0 b483767c 0xf7f7ce5c
f7ce5c09 08835d8d 808377f0 b483767c c8f7bc8d 0xe8804e37
f7ce5c0d 808377f0 b483767c c8f7bc8d 8083767b 0x8835d8d
f7ce5c11 b483767c c8f7bc8d 8083767b 0883767c 0x808377f0
f7ce5c15 c8f7bc8d 8083767b 0883767c 408377f0 0xb483767c
f7ce5c19 8083767b 0883767c 408377f0 80f7ce5c 0xc8f7bc8d
f7ce5c1d 0883767c 408377f0 80f7ce5c c8f7bca9 0x8083767b
f7ce5c21 408377f0 80f7ce5c c8f7bca9 0883767b 0x883767c
f7ce5c25 80f7ce5c c8f7bca9 0883767b 088377f0 0x408377f0
f7ce5c29 c8f7bca9 0883767b 088377f0 108377f1 0x80f7ce5c
f7ce5c2d 0883767b 088377f0 108377f1 7c83c41b 0xc8f7bca9
f7ce5c31 088377f0 108377f1 7c83c41b f7f7ce5c 0x883767b
f7ce5c35 108377f1 7c83c41b f7f7ce5c c8804e37 0x88377f0
f7ce5c39 7c83c41b f7f7ce5c c8804e37 0883767b 0x108377f1
f7ce5c3d f7f7ce5c c8804e37 0883767b cc8377f0 0x7c83c41b
f7ce5c41 c8804e37 0883767b cc8377f0 fff7ce5c 0xf7f7ce5c
f7ce5c45 0883767b cc8377f0 fff7ce5c e8805dc5 0xc8804e37
f7ce5c49 cc8377f0 fff7ce5c e8805dc5 e8835d8d 0x883767b
f7ce5c4d fff7ce5c e8805dc5 e8835d8d 02835d8d 0xcc8377f0
f7ce5c51 e8805dc5 e8835d8d 02835d8d 01000000 0xfff7ce5c
f7ce5c55 e8835d8d 02835d8d 01000000 00830406 0xe8805dc5
f7ce5c59 02835d8d 01000000 00830406 6c000000 0xe8835d8d
f7ce5c5d 01000000 00830406 6c000000 6cf7ce5c 0x2835d8d
f7ce5c61 00830406 6c000000 6cf7ce5c bbf7ce5c 0x1000000
f7ce5c65 6c000000 6cf7ce5c bbf7ce5c 00c00000 0x830406
f7ce5c69 6cf7ce5c bbf7ce5c 00c00000 d0000000 0x6c000000
f7ce5c6d bbf7ce5c 00c00000 d0000000 4ef7ce5c 0x6cf7ce5c
f7ce5c71 00c00000 d0000000 4ef7ce5c c88061a9 0xbbf7ce5c
f7ce5c75 d0000000 4ef7ce5c c88061a9 a883767b 0xc00000
f7ce5c79 4ef7ce5c c88061a9 a883767b 00f7ce5c 0xd0000000
f7ce5c7d c88061a9 a883767b 00f7ce5c a4000000 0x4ef7ce5c
f7ce5c81 a883767b 00f7ce5c a4000000 00e6211b 0xc88061a9
f7ce5c85 00f7ce5c a4000000 00e6211b 30000000 0xa883767b
f7ce5c89 a4000000 00e6211b 30000000 0083d5fd 0xf7ce5c
f7ce5c8d 00e6211b 30000000 0083d5fd 99000000 0xa4000000
f7ce5c91 30000000 0083d5fd 99000000 00805311 0xe6211b
f7ce5c95 0083d5fd 99000000 00805311 1b006454 0x30000000
f7ce5c99 99000000 00805311 1b006454 00000002 0x83d5fd
f7ce5c9d 00805311 1b006454 00000002 00000000 0x99000000
f7ce5ca1 1b006454 00000002 00000000 00000000 0x805311
f7ce5ca5 00000000 00000000 00000000 00000000 0x1b006454


STACK_COMMAND: kb

FOLLOWUP_IP:
usbhub!USBH_PdoRemoveDevice+41
f78da6ff 83bfa800000001 cmp dword ptr [edi+0A8h],1

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: usbhub!USBH_PdoRemoveDevice+41

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: usbhub

IMAGE_NAME: usbhub.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 41107d68

FAILURE_BUCKET_ID: 0x7f_d_usbhub!USBH_PdoRemoveDevice+41

BUCKET_ID: 0x7f_d_usbhub!USBH_PdoRemoveDevice+41

Followup: MachineOwner
 
R

Rey Santos

There is still this ERROR: FindPlugIns 8007007b
The minidump was dated May 7. Were you able to recreate it?, or did it just
happen the one time? What are your symptoms. I was expecting some sys files
appearing as problems.
--
Rey


Gary Roach said:
Okay, I ran the command line. I've included the results below. What I'm
getting is that the kernel has caused some problem. I get:

MODULE_NAME: nt

IMAGE_NAME: ntoskrnl.exe

Here's the output:

----------------------------------------------------------------------------


Microsoft (R) Windows Debugger Version 6.6.0007.5
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [p:\Mini050708-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is:
srv*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: c:\windows\i386
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 2600.xpsp_sp2_rtm.040803-2158
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055ab20
Debug session time: Wed May 7 21:07:59.092 2008 (GMT-4)
System Uptime: 0 days 0:00:22.662
Loading Kernel Symbols
.............................................................................................
Loading User Symbols
Loading unloaded module list
...
ERROR: FindPlugIns 8007007b
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007F, {8, 80042000, 0, 0}

Probably caused by : ntoskrnl.exe ( nt!KiTrap0E+23 )

Followup: MachineOwner
---------

kd> !analyze -v
ERROR: FindPlugIns 8007007b
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
Arg2: 80042000
Arg3: 00000000
Arg4: 00000000

Debugging Details:
------------------


BUGCHECK_STR: 0x7f_8

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: INTEL_CPU_MICROCODE_ZERO

PROCESS_NAME: winlogon.exe

TRAP_FRAME: f77cb194 -- (.trap fffffffff77cb194)
ErrCode = 00000000
eax=00b10023 ebx=f77cb27c ecx=00b1e7c8 edx=00070608 esi=01c8c960
edi=804e1f7c
eip=804e1f7c esp=f77cb208 ebp=f77cb208 iopl=0 nv up di pl zr na pe
nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000
efl=00010046
nt!KiTrap0E+0x57:
804e1f7c f60550f0dfffff test byte ptr ds:[0FFDFF050h],0FFh
ds:0023:ffdff050=??
Resetting default scope

LAST_CONTROL_TRANSFER: from 804e1f7c to 804e1f48

STACK_TEXT:
f77cb038 804e1f7c badb0d00 00070608 0030001a nt!KiTrap0E+0x23
f77cb0ac 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb120 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb194 804e1f7c badb0d00 00070608 805577c0 nt!KiTrap0E+0x57
f77cb208 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb27c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb2f0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb364 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb3d8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb44c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb4c0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb534 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb5a8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb61c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb690 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb704 804e1f7c badb0d00 00070608 00000100 nt!KiTrap0E+0x57
f77cb778 804e1f7c badb0d00 00070608 e160c7d0 nt!KiTrap0E+0x57
f77cb7ec 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb860 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb8d4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb948 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb9bc 804e1f7c badb0d00 00070608 805577c0 nt!KiTrap0E+0x57
f77cba30 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbaa4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbb18 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbb8c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbc00 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbc74 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbce8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbd5c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbdd0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbe44 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbeb8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbf2c 804e1f7c badb0d00 00070608 00000100 nt!KiTrap0E+0x57
f77cbfa0 804e1f7c badb0d00 00070608 805577c0 nt!KiTrap0E+0x57
f77cc014 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc088 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc0fc 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc170 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc1e4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc258 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc2cc 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc340 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc3b4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc428 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc49c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc510 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc584 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc5f8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc66c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc6e0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc754 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc7c8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc83c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc8b0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc924 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc998 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cca0c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cca80 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccaf4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccb68 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccbdc 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccc50 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cccc4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccd38 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccdac 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cce20 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cce94 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccf08 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccf7c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccff0 804e1f7c badb0d00 00070608 00000038 nt!KiTrap0E+0x57
f77cd064 804e1f7c badb0d00 00070608 00000001 nt!KiTrap0E+0x57
f77cd0d8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cd14c 804e1f7c badb0d00 00070608 805577c0 nt!KiTrap0E+0x57
f77cd1c0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57


STACK_COMMAND: kb

MODULE_NAME: nt

IMAGE_NAME: ntoskrnl.exe

FOLLOWUP_NAME: MachineOwner

DEBUG_FLR_IMAGE_TIMESTAMP: 41108004

FOLLOWUP_IP:
nt!KiTrap0E+23
804e1f48 1e push ds

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!KiTrap0E+23

FAILURE_BUCKET_ID: TRAP_FRAME_RECURSION

BUCKET_ID: TRAP_FRAME_RECURSION

Followup: MachineOwner
---------



Rey Santos said:
I don't know why you have an ERROR: FindPlugIns 8007007b maybe you're not
connected to the internet for the symbols. The path for the symbls is
http://msdl.microsoft.com/download/symbols -i

Below are what I typed in the command prompt for my Minidump analysis:

cd c:\program files\debugging tools for windows

Press Enter

windbg -y srv*c:\symbols*http://msdl.microsoft.com/download/symbols -i
c:\windows\i386 -z c:\windows\minidump\Your Minidump file.dmp

Replace the last entry with your minidump file (MiniMMDDYY-01.dmp)

Press Enter

(You can use copy and paste to be sure of the characters entered)

Windebug will open
Command window results/log below:

___My Results___

Microsoft (R) Windows Debugger Version 6.8.0004.0 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [c:\windows\minidump\mini041808-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is:
srv*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: c:\windows\i386
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 2600.xpsp_sp2_gdr.070227-2254
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055a620
Debug session time: Fri Apr 18 20:42:56.078 2008 (GMT+8)
System Uptime: 0 days 8:06:07.788
Loading Kernel Symbols
.......................................................................................................................................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007F, {d, 0, 0, 0}


Probably caused by : usbhub.sys ( usbhub!USBH_PdoRemoveDevice+41 )

Followup: MachineOwner
---------
Note the line Probably caused by: usbhub.sys (
usbhub!USBH_PdoRemoveDevice+41 )
Now click the blue !analyze -v to get detailed debugging information.
My results below: On the result the lines: (last parts)
MODULE_NAME: usbhub
IMAGE_NAME: usbhub.sys
SYMBOL_NAME: usbhub!USBH_PdoRemoveDevice+41
the usbhub noted on the first part of the log are related to these
headings.The usbhub.sys is the problem file that should uninstalled,
reinstalled or updated. Use Google to search for yourproblem file.
Remove/uninstall the related hardware or prograam.


kd> !analyze -v
*******************************************************************************
*
*
 
G

Gary Roach

It's a customer's machine and there is only one minidump file. I'm
investigating another problem involving USB ports and I want to make sure
this problem isn't related. I'm analyzing the minidump on a different
computer. Could that cause the FindPlugIns error?


Rey Santos said:
There is still this ERROR: FindPlugIns 8007007b
The minidump was dated May 7. Were you able to recreate it?, or did it
just
happen the one time? What are your symptoms. I was expecting some sys
files
appearing as problems.
--
Rey


Gary Roach said:
Okay, I ran the command line. I've included the results below. What I'm
getting is that the kernel has caused some problem. I get:

MODULE_NAME: nt

IMAGE_NAME: ntoskrnl.exe

Here's the output:

----------------------------------------------------------------------------


Microsoft (R) Windows Debugger Version 6.6.0007.5
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [p:\Mini050708-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is:
srv*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: c:\windows\i386
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 2600.xpsp_sp2_rtm.040803-2158
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055ab20
Debug session time: Wed May 7 21:07:59.092 2008 (GMT-4)
System Uptime: 0 days 0:00:22.662
Loading Kernel Symbols
.............................................................................................
Loading User Symbols
Loading unloaded module list
...
ERROR: FindPlugIns 8007007b
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007F, {8, 80042000, 0, 0}

Probably caused by : ntoskrnl.exe ( nt!KiTrap0E+23 )

Followup: MachineOwner
---------

kd> !analyze -v
ERROR: FindPlugIns 8007007b
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure
KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
Arg2: 80042000
Arg3: 00000000
Arg4: 00000000

Debugging Details:
------------------


BUGCHECK_STR: 0x7f_8

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: INTEL_CPU_MICROCODE_ZERO

PROCESS_NAME: winlogon.exe

TRAP_FRAME: f77cb194 -- (.trap fffffffff77cb194)
ErrCode = 00000000
eax=00b10023 ebx=f77cb27c ecx=00b1e7c8 edx=00070608 esi=01c8c960
edi=804e1f7c
eip=804e1f7c esp=f77cb208 ebp=f77cb208 iopl=0 nv up di pl zr na
pe
nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000
efl=00010046
nt!KiTrap0E+0x57:
804e1f7c f60550f0dfffff test byte ptr ds:[0FFDFF050h],0FFh
ds:0023:ffdff050=??
Resetting default scope

LAST_CONTROL_TRANSFER: from 804e1f7c to 804e1f48

STACK_TEXT:
f77cb038 804e1f7c badb0d00 00070608 0030001a nt!KiTrap0E+0x23
f77cb0ac 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb120 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb194 804e1f7c badb0d00 00070608 805577c0 nt!KiTrap0E+0x57
f77cb208 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb27c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb2f0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb364 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb3d8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb44c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb4c0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb534 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb5a8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb61c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb690 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb704 804e1f7c badb0d00 00070608 00000100 nt!KiTrap0E+0x57
f77cb778 804e1f7c badb0d00 00070608 e160c7d0 nt!KiTrap0E+0x57
f77cb7ec 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb860 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb8d4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb948 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cb9bc 804e1f7c badb0d00 00070608 805577c0 nt!KiTrap0E+0x57
f77cba30 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbaa4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbb18 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbb8c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbc00 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbc74 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbce8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbd5c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbdd0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbe44 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbeb8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cbf2c 804e1f7c badb0d00 00070608 00000100 nt!KiTrap0E+0x57
f77cbfa0 804e1f7c badb0d00 00070608 805577c0 nt!KiTrap0E+0x57
f77cc014 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc088 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc0fc 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc170 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc1e4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc258 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc2cc 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc340 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc3b4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc428 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc49c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc510 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc584 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc5f8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc66c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc6e0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc754 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc7c8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc83c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc8b0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc924 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cc998 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cca0c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cca80 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccaf4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccb68 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccbdc 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccc50 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cccc4 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccd38 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccdac 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cce20 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cce94 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccf08 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccf7c 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77ccff0 804e1f7c badb0d00 00070608 00000038 nt!KiTrap0E+0x57
f77cd064 804e1f7c badb0d00 00070608 00000001 nt!KiTrap0E+0x57
f77cd0d8 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57
f77cd14c 804e1f7c badb0d00 00070608 805577c0 nt!KiTrap0E+0x57
f77cd1c0 804e1f7c badb0d00 00070608 00000000 nt!KiTrap0E+0x57


STACK_COMMAND: kb

MODULE_NAME: nt

IMAGE_NAME: ntoskrnl.exe

FOLLOWUP_NAME: MachineOwner

DEBUG_FLR_IMAGE_TIMESTAMP: 41108004

FOLLOWUP_IP:
nt!KiTrap0E+23
804e1f48 1e push ds

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!KiTrap0E+23

FAILURE_BUCKET_ID: TRAP_FRAME_RECURSION

BUCKET_ID: TRAP_FRAME_RECURSION

Followup: MachineOwner
---------



Rey Santos said:
I don't know why you have an ERROR: FindPlugIns 8007007b maybe you're
not
connected to the internet for the symbols. The path for the symbls is
http://msdl.microsoft.com/download/symbols -i

Below are what I typed in the command prompt for my Minidump analysis:

cd c:\program files\debugging tools for windows

Press Enter

windbg -y srv*c:\symbols*http://msdl.microsoft.com/download/symbols -i
c:\windows\i386 -z c:\windows\minidump\Your Minidump file.dmp

Replace the last entry with your minidump file (MiniMMDDYY-01.dmp)

Press Enter

(You can use copy and paste to be sure of the characters entered)

Windebug will open
Command window results/log below:

___My Results___

Microsoft (R) Windows Debugger Version 6.8.0004.0 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [c:\windows\minidump\mini041808-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is:
srv*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: c:\windows\i386
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 2600.xpsp_sp2_gdr.070227-2254
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055a620
Debug session time: Fri Apr 18 20:42:56.078 2008 (GMT+8)
System Uptime: 0 days 8:06:07.788
Loading Kernel Symbols
.......................................................................................................................................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007F, {d, 0, 0, 0}


Probably caused by : usbhub.sys ( usbhub!USBH_PdoRemoveDevice+41 )

Followup: MachineOwner
---------

Note the line Probably caused by: usbhub.sys (
usbhub!USBH_PdoRemoveDevice+41 )
Now click the blue !analyze -v to get detailed debugging
information.
My results below: On the result the lines: (last parts)
MODULE_NAME: usbhub
IMAGE_NAME: usbhub.sys
SYMBOL_NAME: usbhub!USBH_PdoRemoveDevice+41
the usbhub noted on the first part of the log are related to these
headings.The usbhub.sys is the problem file that should
uninstalled,
reinstalled or updated. Use Google to search for yourproblem file.
Remove/uninstall the related hardware or prograam.


kd> !analyze -v
*******************************************************************************
*
*
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top