*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {5251, 2, 1, fffff88004e2d7cf}
Unable to load image \SystemRoot\system32\DRIVERS\WUSB54Gv4x64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for WUSB54Gv4x64.sys
*** ERROR: Module load completed but symbols could not be loaded for WUSB54Gv4x64.sys
Probably caused by : WUSB54Gv4x64.sys ( WUSB54Gv4x64+2d7cf )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000005251, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88004e2d7cf, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002efb0e0
0000000000005251
CURRENT_IRQL: 2
FAULTING_IP:
WUSB54Gv4x64+2d7cf
fffff880`04e2d7cf c6401801 mov byte ptr [rax+18h],1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: chrome.exe
TRAP_FRAME: fffff80000ba27f0 -- (.trap 0xfffff80000ba27f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000005239 rbx=0000000000000000 rcx=fffffa8005065ff0
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004e2d7cf rsp=fffff80000ba2980 rbp=0000000000000000
r8=fffffa80062e0e00 r9=0000000000000000 r10=fffffa800503aa80
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
WUSB54Gv4x64+0x2d7cf:
fffff880`04e2d7cf c6401801 mov byte ptr [rax+18h],1 ds:fe00:00000000`00005251=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cc4469 to fffff80002cc4f00
STACK_TEXT:
fffff800`00ba26a8 fffff800`02cc4469 : 00000000`0000000a 00000000`00005251 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00ba26b0 fffff800`02cc30e0 : fffffa80`04919b60 fffffa80`059d3e70 fffffa80`049196e0 fffff800`02cd0326 : nt!KiBugCheckDispatch+0x69
fffff800`00ba27f0 fffff880`04e2d7cf : fffffa80`05066000 fffffa80`04b751a0 fffffa80`0503aa80 fffffa80`059d3e70 : nt!KiPageFault+0x260
fffff800`00ba2980 fffffa80`05066000 : fffffa80`04b751a0 fffffa80`0503aa80 fffffa80`059d3e70 fffffa80`05066000 : WUSB54Gv4x64+0x2d7cf
fffff800`00ba2988 fffffa80`04b751a0 : fffffa80`0503aa80 fffffa80`059d3e70 fffffa80`05066000 fffff880`03c01f4e : 0xfffffa80`05066000
fffff800`00ba2990 fffffa80`0503aa80 : fffffa80`059d3e70 fffffa80`05066000 fffff880`03c01f4e fffffa80`04fe3cf0 : 0xfffffa80`04b751a0
fffff800`00ba2998 fffffa80`059d3e70 : fffffa80`05066000 fffff880`03c01f4e fffffa80`04fe3cf0 00000000`00005239 : 0xfffffa80`0503aa80
fffff800`00ba29a0 fffffa80`05066000 : fffff880`03c01f4e fffffa80`04fe3cf0 00000000`00005239 fffffa80`051c0050 : 0xfffffa80`059d3e70
fffff800`00ba29a8 fffff880`03c01f4e : fffffa80`04fe3cf0 00000000`00005239 fffffa80`051c0050 fffff880`04e2da1a : 0xfffffa80`05066000
fffff800`00ba29b0 fffff880`04e2d96a : fffffa80`05052000 fffffa80`059d2b90 fffffa80`04fe3cf0 fffff880`04f8448f : USBPORT!MPf_SubmitTransfer+0x96
fffff800`00ba2a00 fffffa80`05052000 : fffffa80`059d2b90 fffffa80`04fe3cf0 fffff880`04f8448f fffffa80`062e0f50 : WUSB54Gv4x64+0x2d96a
fffff800`00ba2a08 fffffa80`059d2b90 : fffffa80`04fe3cf0 fffff880`04f8448f fffffa80`062e0f50 fffffa80`059d2b90 : 0xfffffa80`05052000
fffff800`00ba2a10 fffffa80`04fe3cf0 : fffff880`04f8448f fffffa80`062e0f50 fffffa80`059d2b90 00000000`00000008 : 0xfffffa80`059d2b90
fffff800`00ba2a18 fffff880`04f8448f : fffffa80`062e0f50 fffffa80`059d2b90 00000000`00000008 fffffa80`051c0050 : 0xfffffa80`04fe3cf0
fffff800`00ba2a20 fffffa80`04fe3cf0 : 00000000`00000000 fffff880`00ed922b 0000057f`fa62c188 0000057f`fa6c0ad8 : hidusb!HumReadReport+0x13f
fffff800`00ba2a70 00000000`00000000 : fffff880`00ed922b 0000057f`fa62c188 0000057f`fa6c0ad8 fffffa80`062e0ef8 : 0xfffffa80`04fe3cf0
STACK_COMMAND: kb
FOLLOWUP_IP:
WUSB54Gv4x64+2d7cf
fffff880`04e2d7cf c6401801 mov byte ptr [rax+18h],1
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: WUSB54Gv4x64+2d7cf
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: WUSB54Gv4x64
IMAGE_NAME: WUSB54Gv4x64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 45923fcb
FAILURE_BUCKET_ID: X64_0xD1_WUSB54Gv4x64+2d7cf
BUCKET_ID: X64_0xD1_WUSB54Gv4x64+2d7cf
Followup: MachineOwner
---------
0: kd> lmvm WUSB54Gv4x64
start end module name
fffff880`04e00000 fffff880`04e52000 WUSB54Gv4x64 T (no symbols)
Loaded symbol image file: WUSB54Gv4x64.sys
Image path: \SystemRoot\system32\DRIVERS\WUSB54Gv4x64.sys
Image name: WUSB54Gv4x64.sys
Timestamp: Wed Dec 27 09:41:31 2006 (45923FCB)
CheckSum: 00053254
ImageSize: 00052000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4