Now I got this again. This time from usb mouse - right? Should I kick that logitech usb mouse and keyboard for ps2 models? Every dump seems to show crash for different cause. Maybe motherboard is bad?
---------------------------------------------------------------------------
Symbol search path is: SRV*c:\symbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 2) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp2_gdr.050301-1519
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700
Debug session time: Sun Mar 11 23:10:22.744 2007 (GMT+2)
System Uptime: 0 days 10:34:05.721
Loading Kernel Symbols
........................................................................................................................
Loading User Symbols
Loading unloaded module list
...............................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000000A, {4, 2, 1, 80526c9d}
Unable to load image LMouFlt2.Sys, Win32 error 2
*** WARNING: Unable to verify timestamp for LMouFlt2.Sys
*** ERROR: Module load completed but symbols could not be loaded for LMouFlt2.Sys
Probably caused by : memory_corruption
Followup: memory_corruption
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000004, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, value 0 = read operation, 1 = write operation
Arg4: 80526c9d, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: 00000004
CURRENT_IRQL: 2
FAULTING_IP:
nt!PopApplyAttributeState+85
80526c9d d223 shl byte ptr [ebx],cl
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0xA
PROCESS_NAME: Idle
LAST_CONTROL_TRANSFER: from 80526d4a to 80526c9d
STACK_TEXT:
80550144 80526d4a 00000004 00000000 80550174 nt!PopApplyAttributeState+0x85
80550154 f1a0cf72 00000004 862ccb04 85acda78 nt!PoSetSystemState+0x22
80550174 f3934522 00000018 862ccaec 862ccb04 mouclass!MouseClassServiceCallback+0x38
WARNING: Stack unwind information not available. Following frames may be wrong.
805501d0 f71ffc26 862ccb04 862ccaec 00000001 LMouFlt2+0x1522
80550204 804f13e2 00000000 011fce28 022cca48 mouhid!MouHid_ReadComplete+0x3f0
80550234 f0effe70 8055023c 8055023c 86492b30 nt!IopfCompleteRequest+0xa2
80550250 f0f00044 02492b18 86476aa0 00000007 HIDCLASS!HidpDistributeInterruptReport+0xae
80550290 804f13e2 00000000 864f4560 86487c2c HIDCLASS!HidpInterruptReadComplete+0x17a
805502c0 f6787ee5 864f4560 8558a008 864eb028 nt!IopfCompleteRequest+0xa2
80550328 f6788b57 8642d870 00000000 864eb7d8 USBPORT!USBPORT_CompleteTransfer+0x373
80550358 f6789754 026e6f44 864eb0e0 864eb0e0 USBPORT!USBPORT_DoneTransfer+0x137
80550390 f678af6a 864eb028 80545aac 864eb230 USBPORT!USBPORT_FlushDoneTransferList+0x16c
805503bc f6798fb0 864eb028 80545aac 864eb028 USBPORT!USBPORT_DpcWorker+0x224
805503f8 f6799128 864eb028 00000001 8055b0a0 USBPORT!USBPORT_IsrDpcWorker+0x37e
80550414 8653d70b 864eb64c 6b755044 00000000 USBPORT!USBPORT_IsrDpc+0x166
80550428 80544e5f 864eb64c 864eb028 00000000 0x8653d70b
80550450 80544d44 00000000 0000000e 00000000 nt!KiRetireDpcList+0x61
80550454 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x28
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
80526c9a - nt!PopApplyAttributeState+82
[ 8b:9b ]
1 error : !nt (80526c9a)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
Followup: memory_corruption
---------