Like the title say, windows 8 BSOD after wake up from S3. The following is the dumpfile ( Sorry, I did not have dump file now.) I just Wonder the meaning of the "AV"
BUGCHECK_STR: AV
PROCESS_NAME: System
The dump file show the possible root cause is HIDCLASS.sys. Could someone explain the detail of fail reason? How to solve the problem?
Thanks first.
BUGCHECK_STR: AV
PROCESS_NAME: System
The dump file show the possible root cause is HIDCLASS.sys. Could someone explain the detail of fail reason? How to solve the problem?
Microsoft (R) Windows Debugger Version 6.2.9200.16384 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [E:\MEMORY.DMP]
Kernel Bitmap Dump File: Full address space is available
Symbol search path is: SRV*D:\WinDebug\SRV*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9200 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9200.16461.amd64fre.win8_gdr.121119-1606
Machine Name:
Kernel base = 0xfffff803`86c14000 PsLoadedModuleList = 0xfffff803`86edea80
Debug session time: Wed Apr 24 08:17:28.072 2013 (UTC + 8:00)
System Uptime: 0 days 21:31:04.173
Loading Kernel Symbols
...............................................................
................................................................
.....................................................
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffffffffffffff7, 0, fffff80386cedcfb, 0}
Probably caused by : HIDCLASS.SYS ( HIDCLASS!HidpIdleTimeWorker+6d )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffffffffffff7, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80386cedcfb, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
READ_ADDRESS: fffffffffffffff7
FAULTING_IP:
nt!IoReuseIrp+2b
fffff803`86cedcfb 0fb67147 movzx esi,byte ptr [rcx+47h]
MM_INTERNAL_CODE: 0
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff8801aa37880 -- (.trap 0xfffff8801aa37880)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff6c9a15d4b110 rbx=0000000000000000 rcx=ffffffffffffffb0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80386cedcfb rsp=fffff8801aa37a10 rbp=fffffa800bc80440
r8=0000000000000000 r9=0000000000000000 r10=0000000000000062
r11=fffff8801aa37aa8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!IoReuseIrp+0x2b:
fffff803`86cedcfb 0fb67147 movzx esi,byte ptr [rcx+47h] ds:ffffffff`fffffff7=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80386dfcbe1 to fffff80386c8f340
STACK_TEXT:
fffff880`1aa37698 fffff803`86dfcbe1 : 00000000`00000050 ffffffff`fffffff7 00000000`00000000 fffff880`1aa37880 : nt!KeBugCheckEx
fffff880`1aa376a0 fffff803`86cc9cef : 00000000`00000000 ffffffff`fffffff7 fffffa80`0e895040 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x32321
fffff880`1aa37740 fffff803`86c8cdee : 00000000`00000000 fffff880`05666440 00000000`00000000 fffff880`1aa37880 : nt!MmAccessFault+0x54f
fffff880`1aa37880 fffff803`86cedcfb : 45ad6cbf`00000001 00000000`00000000 00000000`00000003 fffff803`86cba1bb : nt!KiPageFault+0x16e
fffff880`1aa37a10 fffff880`05664e69 : 00000000`00000000 fffff880`05666440 fffffa80`0bc80440 ffffffff`ffffffb0 : nt!IoReuseIrp+0x2b
fffff880`1aa37ab0 fffff803`86c7a413 : fffffa80`0bd35930 00000000`00000000 fffff880`05664dfc fffffa80`0bc80440 : HIDCLASS!HidpIdleTimeWorker+0x6d
fffff880`1aa37b10 fffff803`86cc7511 : fffff803`86e98110 fffffa80`0e895040 fffff803`86c7a3b4 fffff803`86eabd00 : nt!IopProcessWorkItem+0x5f
fffff880`1aa37b80 fffff803`86c36551 : fffffa80`06712810 00000000`00000080 fffff803`86cc73d0 fffffa80`0e895040 : nt!ExpWorkerThread+0x142
fffff880`1aa37c10 fffff803`86c74dd6 : fffff803`86f0a180 fffffa80`0e895040 fffffa80`071efb00 fffffa80`0671b940 : nt!PspSystemThreadStartup+0x59
fffff880`1aa37c60 00000000`00000000 : fffff880`1aa38000 fffff880`1aa32000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
HIDCLASS!HidpIdleTimeWorker+6d
fffff880`05664e69 4885f6 test rsi,rsi
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: HIDCLASS!HidpIdleTimeWorker+6d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: HIDCLASS
IMAGE_NAME: HIDCLASS.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 50ab0d6a
BUCKET_ID_FUNC_OFFSET: 6d
FAILURE_BUCKET_ID: AV_HIDCLASS!HidpIdleTimeWorker
BUCKET_ID: AV_HIDCLASS!HidpIdleTimeWorker
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffffffffffff7, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80386cedcfb, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
READ_ADDRESS: fffffffffffffff7
FAULTING_IP:
nt!IoReuseIrp+2b
fffff803`86cedcfb 0fb67147 movzx esi,byte ptr [rcx+47h]
MM_INTERNAL_CODE: 0
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff8801aa37880 -- (.trap 0xfffff8801aa37880)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff6c9a15d4b110 rbx=0000000000000000 rcx=ffffffffffffffb0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80386cedcfb rsp=fffff8801aa37a10 rbp=fffffa800bc80440
r8=0000000000000000 r9=0000000000000000 r10=0000000000000062
r11=fffff8801aa37aa8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!IoReuseIrp+0x2b:
fffff803`86cedcfb 0fb67147 movzx esi,byte ptr [rcx+47h] ds:ffffffff`fffffff7=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80386dfcbe1 to fffff80386c8f340
STACK_TEXT:
fffff880`1aa37698 fffff803`86dfcbe1 : 00000000`00000050 ffffffff`fffffff7 00000000`00000000 fffff880`1aa37880 : nt!KeBugCheckEx
fffff880`1aa376a0 fffff803`86cc9cef : 00000000`00000000 ffffffff`fffffff7 fffffa80`0e895040 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x32321
fffff880`1aa37740 fffff803`86c8cdee : 00000000`00000000 fffff880`05666440 00000000`00000000 fffff880`1aa37880 : nt!MmAccessFault+0x54f
fffff880`1aa37880 fffff803`86cedcfb : 45ad6cbf`00000001 00000000`00000000 00000000`00000003 fffff803`86cba1bb : nt!KiPageFault+0x16e
fffff880`1aa37a10 fffff880`05664e69 : 00000000`00000000 fffff880`05666440 fffffa80`0bc80440 ffffffff`ffffffb0 : nt!IoReuseIrp+0x2b
fffff880`1aa37ab0 fffff803`86c7a413 : fffffa80`0bd35930 00000000`00000000 fffff880`05664dfc fffffa80`0bc80440 : HIDCLASS!HidpIdleTimeWorker+0x6d
fffff880`1aa37b10 fffff803`86cc7511 : fffff803`86e98110 fffffa80`0e895040 fffff803`86c7a3b4 fffff803`86eabd00 : nt!IopProcessWorkItem+0x5f
fffff880`1aa37b80 fffff803`86c36551 : fffffa80`06712810 00000000`00000080 fffff803`86cc73d0 fffffa80`0e895040 : nt!ExpWorkerThread+0x142
fffff880`1aa37c10 fffff803`86c74dd6 : fffff803`86f0a180 fffffa80`0e895040 fffffa80`071efb00 fffffa80`0671b940 : nt!PspSystemThreadStartup+0x59
fffff880`1aa37c60 00000000`00000000 : fffff880`1aa38000 fffff880`1aa32000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
HIDCLASS!HidpIdleTimeWorker+6d
fffff880`05664e69 4885f6 test rsi,rsi
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: HIDCLASS!HidpIdleTimeWorker+6d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: HIDCLASS
IMAGE_NAME: HIDCLASS.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 50ab0d6a
BUCKET_ID_FUNC_OFFSET: 6d
FAILURE_BUCKET_ID: AV_HIDCLASS!HidpIdleTimeWorker
BUCKET_ID: AV_HIDCLASS!HidpIdleTimeWorker
Followup: MachineOwner
---------
1: kd> lmvm HIDCLASS
start end module name
fffff880`05658000 fffff880`05673000 HIDCLASS (pdb symbols) d:\windebug\srv\hidclass.pdb\CEC5F9DA80B2429B8D741A9437FAED8A2\hidclass.pdb
Loaded symbol image file: HIDCLASS.SYS
Image path: \SystemRoot\System32\drivers\HIDCLASS.SYS
Image name: HIDCLASS.SYS
Timestamp: Tue Nov 20 12:56:10 2012 (50AB0D6A)
CheckSum: 00016912
ImageSize: 0001B000
File version: 6.2.9200.16461
Product version: 6.2.9200.16461
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 2.0 Dll
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft? Windows? Operating System
InternalName: hidclass.sys
OriginalFilename: hidclass.sys
ProductVersion: 6.2.9200.16461
FileVersion: 6.2.9200.16461 (win8_gdr.121119-1606)
FileDescription: Hid Class Library
LegalCopyright: ? Microsoft Corporation. All rights reserved.
Thanks first.
My Computer
System One
-
- OS
- windows 8