阅读:1831回复:0
有没有兄弟帮忙分析一下这个 crash dump?
Mini081109-01.rar usb iso传输过程中,在某些机器上出现的。
Microsoft (R) Windows Debugger Version 6.6.0007.5 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [E:\memory_dump\9665\Mini081109-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*D:\debugsymbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 6002.18005.amd64fre.lh_sp2rtm.090410-1830 Kernel base = 0xfffff800`01814000 PsLoadedModuleList = 0xfffff800`019d8dd0 Debug session time: Tue Aug 11 17:14:27.430 2009 (GMT+8) System Uptime: 0 days 12:08:28.868 Loading Kernel Symbols ....................................................................................................................................... Loading User Symbols Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck D1, {b0, 2, 0, fffffa600221c7cf} Probably caused by : USBPORT.SYS ( USBPORT!USBPORT_TxCsqFindIrp+eb ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 00000000000000b0, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffffa600221c7cf, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001a3b080 00000000000000b0 CURRENT_IRQL: 2 FAULTING_IP: USBPORT!USBPORT_TxCsqFindIrp+eb fffffa60`0221c7cf 488b83b0000000 mov rax,qword ptr [rbx+0B0h] CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_RC BUGCHECK_STR: 0xD1 PROCESS_NAME: System TRAP_FRAME: fffff80002ada9b0 -- (.trap fffff80002ada9b0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed. rax=0000000031467854 rbx=fffffa8001d9d370 rcx=fffffa80038b7f80 rdx=000000004f444648 rsi=fffffa80063116f0 rdi=fffffa8070627375 rip=fffffa600221c7cf rsp=fffff80002adab40 rbp=fffffa80036fe1a0 r8=000000004f444648 r9=fffffa8000000002 r10=0000000000000000 r11=0000000000000002 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc USBPORT!USBPORT_TxCsqFindIrp+0xeb: fffffa60`0221c7cf 488b83b0000000 mov rax,qword ptr [rbx+0B0h] ds:e050:fffffa80`01d9d420=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff8000186e1ee to fffff8000186e450 STACK_TEXT: fffff800`02ada868 fffff800`0186e1ee : 00000000`0000000a 00000000`000000b0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff800`02ada870 fffff800`0186d0cb : 00000000`00000000 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KiBugCheckDispatch+0x6e fffff800`02ada9b0 fffffa60`0221c7cf : 00000000`00000000 fffff800`01948268 fffffa80`02c90000 fffff800`01987cf0 : nt!KiPageFault+0x20b fffff800`02adab40 fffffa60`0221c8be : fffffa80`036fe1a0 fffffa80`036fe050 fffff800`31467854 fffffa80`01c7d010 : USBPORT!USBPORT_TxCsqFindIrp+0xeb fffff800`02adab80 fffff800`018dd9b5 : 00000000`30527854 00000000`00000000 fffffa80`02984210 fffffa80`01c7d010 : USBPORT!USBPORT_TxCsqRemoveIrp+0xae fffff800`02adabd0 fffffa60`0222120d : fffffa80`02984002 fffffa80`02984010 00000000`4f444648 fffffa80`036ff088 : nt!IoCsqRemoveIrp+0x45 fffff800`02adac00 fffffa60`0221eb02 : fffffa80`34585043 fffffa80`036fe1a0 fffffa80`036ff088 fffffa80`036fe1a0 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x241 fffff800`02adac70 fffffa60`0220b1a7 : fffffa80`31636f49 fffffa80`036ff088 00000000`00000002 fffffa80`036fe1a0 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0x13a fffff800`02adacc0 fffff800`01872667 : fffffa80`036ff0a0 00000000`34776478 00000000`00000000 fffff800`0198aa80 : USBPORT!USBPORT_Xdpc_Worker+0x26f fffff800`02adad10 fffff800`018728e2 : fffffa60`0220af38 fffff800`01987680 00000000`00000000 fffff800`0198cb80 : nt!KiRetireDpcList+0x117 fffff800`02adad80 fffff800`01a3f860 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x62 fffff800`02adadb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!zzz_AsmCodeRange_End+0x4 STACK_COMMAND: kb FOLLOWUP_IP: USBPORT!USBPORT_TxCsqFindIrp+eb fffffa60`0221c7cf 488b83b0000000 mov rax,qword ptr [rbx+0B0h] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: USBPORT!USBPORT_TxCsqFindIrp+eb FOLLOWUP_NAME: MachineOwner MODULE_NAME: USBPORT IMAGE_NAME: USBPORT.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 49e02d1b FAILURE_BUCKET_ID: X64_0xD1_USBPORT!USBPORT_TxCsqFindIrp+eb BUCKET_ID: X64_0xD1_USBPORT!USBPORT_TxCsqFindIrp+eb Followup: MachineOwner --------- |
|