.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {94b4128, 2, 0, fffff880045e9f58}
Probably caused by : usbohci.sys ( usbohci!OHCI_PollIsoEndpoint+dc )
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000094b4128, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880045e9f58, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ca90e0
00000000094b4128
CURRENT_IRQL: 2
FAULTING_IP:
usbohci!OHCI_PollIsoEndpoint+dc
fffff880`045e9f58 8b4228 mov eax,dword ptr [rdx+28h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880030af9a0 -- (.trap 0xfffff880030af9a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880094b4080 rbx=0000000000000000 rcx=fffffa800518eec0
rdx=00000000094b4100 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880045e9f58 rsp=fffff880030afb30 rbp=0000000000000000
r8=000000004f444648 r9=fffff880094b4a80 r10=00000000ffffffff
r11=fffffa8006fa5e40 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
usbohci!OHCI_PollIsoEndpoint+0xdc:
fffff880`045e9f58 8b4228 mov eax,dword ptr [rdx+28h] ds:00000000`094b4128=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a70c69 to fffff80002a71700
STACK_TEXT:
fffff880`030af858 fffff800`02a70c69 : 00000000`0000000a 00000000`094b4128 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`030af860 fffff800`02a6f8e0 : fffffa80`058d0000 00000000`00000001 fffffa80`04f4bb98 fffff880`044025c2 : nt!KiBugCheckDispatch+0x69
fffff880`030af9a0 fffff880`045e9f58 : 00000000`cfe8da80 fffff880`094b4a80 fffffa80`04f4b1a0 fffffa80`08228250 : nt!KiPageFault+0x260
fffff880`030afb30 fffff880`045ec744 : fffffa80`08228250 fffffa80`08228010 fffffa80`04f4b1a0 fffffa80`04f4b1a0 : usbohci!OHCI_PollIsoEndpoint+0xdc
fffff880`030afb80 fffff880`04401e8b : 00000000`00000002 fffffa80`08228010 fffffa80`04f4b1a0 00000000`00000000 : usbohci!OHCI_PollEndpoint+0x4c
fffff880`030afbb0 fffff880`044069b1 : 00000000`00000000 00000000`00000004 fffffa80`08228010 fffffa80`04f4b050 : USBPORT!MPf_PollEndpoint+0x9b
fffff880`030afbe0 fffff880`04412043 : fffffa80`04f4b1a0 00000000`00000000 fffffa80`0000000e 00000000`00000000 : USBPORT!USBPORT_iSetGlobalEndpointStateTx+0x7c1
fffff880`030afc40 fffff880`04402f89 : fffffa80`04f4b050 00000000`00000000 fffffa80`04f4ba02 fffffa80`04f4ba10 : USBPORT!USBPORT_Core_UsbHcIntDpc_Worker+0x1af
fffff880`030afca0 fffff800`02a7cc0c : fffff880`03087180 fffffa80`04f4ba10 fffffa80`04f4ba28 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`030afcd0 fffff800`02a79eea : fffff880`03087180 fffff880`03092040 00000000`00000000 fffff880`04402db0 : nt!KiRetireDpcList+0x1bc
fffff880`030afd80 00000000`00000000 : fffff880`030b0000 fffff880`030aa000 fffff880`030afd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
usbohci!OHCI_PollIsoEndpoint+dc
fffff880`045e9f58 8b4228 mov eax,dword ptr [rdx+28h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: usbohci!OHCI_PollIsoEndpoint+dc
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: usbohci
IMAGE_NAME: usbohci.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc06
FAILURE_BUCKET_ID: X64_0xD1_usbohci!OHCI_PollIsoEndpoint+dc
BUCKET_ID: X64_0xD1_usbohci!OHCI_PollIsoEndpoint+dc
Followup: MachineOwner
---------
5: kd> lmvm usbohci
start end module name
fffff880`045e8000 fffff880`045f3000 usbohci (pdb symbols) c:\symbols\usbohci.pdb\E503D4CE218541B3BAFF734DA3580FAA1\usbohci.pdb
Loaded symbol image file: usbohci.sys
Mapped memory image file: C:\symbols\usbohci.sys\4A5BCC06b000\usbohci.sys
Image path: usbohci.sys
Image name: usbohci.sys
Timestamp: Tue Jul 14 02:06:30 2009 (4A5BCC06)
CheckSum: 0000E008
ImageSize: 0000B000
File version: 6.1.7600.16385
Product version: 6.1.7600.16385
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 2.0 Dll
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: USBOHCI.sys
OriginalFilename: USBOHCI.sys
ProductVersion: 6.1.7600.16385
FileVersion: 6.1.7600.16385 (win7_rtm.090713-1255)
FileDescription: OHCI USB Miniport Driver
LegalCopyright: © Microsoft Corporation. All rights reserved.
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {964b128, 2, 0, fffff8800538ef58}
Probably caused by : usbohci.sys ( usbohci!OHCI_PollIsoEndpoint+dc )
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000964b128, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800538ef58, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cab0e0
000000000964b128
CURRENT_IRQL: 2
FAULTING_IP:
usbohci!OHCI_PollIsoEndpoint+dc
fffff880`0538ef58 8b4228 mov eax,dword ptr [rdx+28h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880030b09a0 -- (.trap 0xfffff880030b09a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8800964b080 rbx=0000000000000000 rcx=fffffa800518db80
rdx=000000000964b100 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800538ef58 rsp=fffff880030b0b30 rbp=0000000000000000
r8=000000004f444648 r9=fffff8800964bb00 r10=00000000ffffffff
r11=fffffa80066909b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
usbohci!OHCI_PollIsoEndpoint+0xdc:
fffff880`0538ef58 8b4228 mov eax,dword ptr [rdx+28h] ds:1f60:00000000`0964b128=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a72c69 to fffff80002a73700
STACK_TEXT:
fffff880`030b0858 fffff800`02a72c69 : 00000000`0000000a 00000000`0964b128 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`030b0860 fffff800`02a718e0 : 00000000`00008ff4 00000000`00000001 fffff880`03088180 fffff800`02a80618 : nt!KiBugCheckDispatch+0x69
fffff880`030b09a0 fffff880`0538ef58 : 00000000`cfe8ab00 fffff880`0964bb00 fffffa80`050ab1a0 fffffa80`03b68250 : nt!KiPageFault+0x260
fffff880`030b0b30 fffff880`05391744 : fffffa80`03b68250 fffffa80`03b68010 fffffa80`050ab1a0 fffffa80`050ab1a0 : usbohci!OHCI_PollIsoEndpoint+0xdc
fffff880`030b0b80 fffff880`05399e8b : 00000000`00000002 fffffa80`03b68010 fffffa80`050ab1a0 00000000`00000000 : usbohci!OHCI_PollEndpoint+0x4c
fffff880`030b0bb0 fffff880`0539e9b1 : 00000000`00000060 00000000`00000004 fffffa80`03b68010 fffffa80`050ab050 : USBPORT!MPf_PollEndpoint+0x9b
fffff880`030b0be0 fffff880`053aa043 : fffffa80`050ab1a0 00000000`00000060 fffffa80`0000000e 00000000`00000000 : USBPORT!USBPORT_iSetGlobalEndpointStateTx+0x7c1
fffff880`030b0c40 fffff880`0539af89 : fffffa80`050ab050 00000000`00000000 fffffa80`050aba02 fffffa80`050aba10 : USBPORT!USBPORT_Core_UsbHcIntDpc_Worker+0x1af
fffff880`030b0ca0 fffff800`02a7ec0c : fffff880`03088180 fffffa80`050aba10 fffffa80`050aba28 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`030b0cd0 fffff800`02a7beea : fffff880`03088180 fffff880`03093040 00000000`00000000 fffff880`0539adb0 : nt!KiRetireDpcList+0x1bc
fffff880`030b0d80 00000000`00000000 : fffff880`030b1000 fffff880`030ab000 fffff880`030b0d40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
usbohci!OHCI_PollIsoEndpoint+dc
fffff880`0538ef58 8b4228 mov eax,dword ptr [rdx+28h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: usbohci!OHCI_PollIsoEndpoint+dc
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: usbohci
IMAGE_NAME: usbohci.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc06
FAILURE_BUCKET_ID: X64_0xD1_usbohci!OHCI_PollIsoEndpoint+dc
BUCKET_ID: X64_0xD1_usbohci!OHCI_PollIsoEndpoint+dc
Followup: MachineOwner
---------