....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 0, fffffa8004a8b050}
[COLOR=#B22222][U][B]Probably caused by : USBPORT.SYS [/B][/U][/COLOR]( USBPORT!USBPORT_Core_ProcessScatterGatherList+5b2 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffffa8004a8b050, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b0e0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
+3038313630643062
fffffa80`04a8b050 0300 add eax,dword ptr [rax]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9c7c0 -- (.trap 0xfffff80000b9c7c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8004a8b1a0
rdx=fffffa8004a8d280 rsi=0000000000000000 rdi=0000000000000000
rip=fffffa8004a8b050 rsp=fffff80000b9c958 rbp=0000000000000000
r8=fffffa8005bca610 r9=00000000ffffffff r10=0000000000000008
r11=fffff80000b9c930 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
fffffa80`04a8b050 0300 add eax,dword ptr [rax] ds:0007:00000000`00000000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800028d5ca9 to fffff800028d6740
STACK_TEXT:
fffff800`00b9c678 fffff800`028d5ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9c680 fffff800`028d4920 : fffffa80`05bca9a8 fffffa80`05bca610 fffffa80`0516cf30 fffff880`03e26876 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c7c0 fffffa80`04a8b050 : fffff880`03e4508e fffffa80`00000000 fffffa80`05bca610 00000000`00000000 : nt!KiPageFault+0x260
fffff800`00b9c958 fffff880`03e4508e : fffffa80`00000000 fffffa80`05bca610 00000000`00000000 fffffa80`05168770 : 0xfffffa80`04a8b050
fffff800`00b9c960 fffff800`028219ce : fffffa80`04f3d5b8 fffff800`0281efb9 00000000`00000002 00000000`de686e08 : USBPORT!USBPORT_Core_ProcessScatterGatherList+0x5b2
fffff800`00b9ca10 fffff800`0282213d : fffffa80`04a8b050 fffffa80`04c68040 fffffa80`0467fe00 00000000`00000000 : hal!HalpAllocateAdapterCallback+0x146
fffff800`00b9cab0 fffff800`0282171f : fffffa80`04f3d570 00000000`00000008 fffffa80`04c68040 fffffa80`05481160 : hal!HalAllocateAdapterChannel+0x101
fffff800`00b9caf0 fffff800`02821420 : fffffa80`04a8b050 00000000`00000008 fffffa80`000000a0 fffff880`03e46dd7 : hal!HalBuildScatterGatherList+0x2f3
fffff800`00b9cb60 fffff880`03e4552e : fffffa80`04a8b050 00000000`00000000 fffffa80`04a8bd20 fffffa80`05bca610 : hal!HalGetScatterGatherList+0x44
fffff800`00b9cbc0 fffff880`03e42e86 : fffffa80`052a23e0 fffffa80`04a8b050 fffff800`028213dc fffffa80`04a8b1a0 : USBPORT!USBPORT_Core_iMapTransfer+0x24a
fffff800`00b9cc40 fffff880`03e33f89 : fffffa80`04a8b050 00000000`00000000 fffffa80`04a8bd02 fffffa80`04a8bd20 : USBPORT!USBPORT_Core_UsbMapDpc_Worker+0x296
fffff800`00b9cca0 fffff800`028e1bfc : fffff800`02a50e80 fffffa80`04a8bd20 fffffa80`04a8bd38 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff800`00b9ccd0 fffff800`028deeea : fffff800`02a50e80 fffff800`02a5ec40 00000000`00000000 fffff880`03e33db0 : nt!KiRetireDpcList+0x1bc
fffff800`00b9cd80 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
USBPORT!USBPORT_Core_ProcessScatterGatherList+5b2
fffff880`03e4508e 8be8 mov ebp,eax
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: USBPORT!USBPORT_Core_ProcessScatterGatherList+5b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: USBPORT
IMAGE_NAME: USBPORT.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc07
FAILURE_BUCKET_ID: X64_0xD1_USBPORT!USBPORT_Core_ProcessScatterGatherList+5b2
BUCKET_ID: X64_0xD1_USBPORT!USBPORT_Core_ProcessScatterGatherList+5b2
Followup: MachineOwner