Delphips
驱动小牛
驱动小牛
  • 注册日期2003-11-10
  • 最后登录2011-02-21
  • 粉丝1
  • 关注1
  • 积分-363分
  • 威望168点
  • 贡献值0点
  • 好评度151点
  • 原创分0分
  • 专家分0分
阅读:1771回复:0

有没有兄弟帮忙分析一下这个 crash dump?

楼主#
更多 发布于:2009-08-28 17:52
 Mini081109-01.rar usb iso传输过程中,在某些机器上出现的。

Microsoft (R) Windows Debugger  Version 6.6.0007.5
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [E:\memory_dump\9665\Mini081109-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*D:\debugsymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6002.18005.amd64fre.lh_sp2rtm.090410-1830
Kernel base = 0xfffff800`01814000 PsLoadedModuleList = 0xfffff800`019d8dd0
Debug session time: Tue Aug 11 17:14:27.430 2009 (GMT+8)
System Uptime: 0 days 12:08:28.868
Loading Kernel Symbols
.......................................................................................................................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {b0, 2, 0, fffffa600221c7cf}

Probably caused by : USBPORT.SYS ( USBPORT!USBPORT_TxCsqFindIrp+eb )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000000000b0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffffa600221c7cf, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001a3b080
 00000000000000b0

CURRENT_IRQL:  2

FAULTING_IP:
USBPORT!USBPORT_TxCsqFindIrp+eb
fffffa60`0221c7cf 488b83b0000000  mov     rax,qword ptr [rbx+0B0h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_RC

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80002ada9b0 -- (.trap fffff80002ada9b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed.
rax=0000000031467854 rbx=fffffa8001d9d370 rcx=fffffa80038b7f80
rdx=000000004f444648 rsi=fffffa80063116f0 rdi=fffffa8070627375
rip=fffffa600221c7cf rsp=fffff80002adab40 rbp=fffffa80036fe1a0
 r8=000000004f444648  r9=fffffa8000000002 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
USBPORT!USBPORT_TxCsqFindIrp+0xeb:
fffffa60`0221c7cf 488b83b0000000  mov     rax,qword ptr [rbx+0B0h] ds:e050:fffffa80`01d9d420=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000186e1ee to fffff8000186e450

STACK_TEXT:  
fffff800`02ada868 fffff800`0186e1ee : 00000000`0000000a 00000000`000000b0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`02ada870 fffff800`0186d0cb : 00000000`00000000 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KiBugCheckDispatch+0x6e
fffff800`02ada9b0 fffffa60`0221c7cf : 00000000`00000000 fffff800`01948268 fffffa80`02c90000 fffff800`01987cf0 : nt!KiPageFault+0x20b
fffff800`02adab40 fffffa60`0221c8be : fffffa80`036fe1a0 fffffa80`036fe050 fffff800`31467854 fffffa80`01c7d010 : USBPORT!USBPORT_TxCsqFindIrp+0xeb
fffff800`02adab80 fffff800`018dd9b5 : 00000000`30527854 00000000`00000000 fffffa80`02984210 fffffa80`01c7d010 : USBPORT!USBPORT_TxCsqRemoveIrp+0xae
fffff800`02adabd0 fffffa60`0222120d : fffffa80`02984002 fffffa80`02984010 00000000`4f444648 fffffa80`036ff088 : nt!IoCsqRemoveIrp+0x45
fffff800`02adac00 fffffa60`0221eb02 : fffffa80`34585043 fffffa80`036fe1a0 fffffa80`036ff088 fffffa80`036fe1a0 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x241
fffff800`02adac70 fffffa60`0220b1a7 : fffffa80`31636f49 fffffa80`036ff088 00000000`00000002 fffffa80`036fe1a0 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0x13a
fffff800`02adacc0 fffff800`01872667 : fffffa80`036ff0a0 00000000`34776478 00000000`00000000 fffff800`0198aa80 : USBPORT!USBPORT_Xdpc_Worker+0x26f
fffff800`02adad10 fffff800`018728e2 : fffffa60`0220af38 fffff800`01987680 00000000`00000000 fffff800`0198cb80 : nt!KiRetireDpcList+0x117
fffff800`02adad80 fffff800`01a3f860 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x62
fffff800`02adadb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!zzz_AsmCodeRange_End+0x4


STACK_COMMAND:  kb

FOLLOWUP_IP:
USBPORT!USBPORT_TxCsqFindIrp+eb
fffffa60`0221c7cf 488b83b0000000  mov     rax,qword ptr [rbx+0B0h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  USBPORT!USBPORT_TxCsqFindIrp+eb

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: USBPORT

IMAGE_NAME:  USBPORT.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  49e02d1b

FAILURE_BUCKET_ID:  X64_0xD1_USBPORT!USBPORT_TxCsqFindIrp+eb

BUCKET_ID:  X64_0xD1_USBPORT!USBPORT_TxCsqFindIrp+eb

Followup: MachineOwner
---------

游客

返回顶部