New
#1
Memory dumps due to bugcheck 0x000000d1
My wife recently moved to a windows 7 system and she has seen 4 system crashes over the past 2 weeks. After today's crash I researched how to look at the dumpfile. Here is what the output of windbg looks like after clicking on the !analyze -v link. Can you point me in the right direction? Will I need to submit the zipped dumpfile? It's 90Mb zipped. Thanks in advance.
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff88003ff1000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff88003ff0ffd, address which referenced memory
Debugging Details:
------------------
Page 5a60a not present in the dump file. Type ".hh dbgerr004" for details
Page 5a60a not present in the dump file. Type ".hh dbgerr004" for details
Page 5b83a not present in the dump file. Type ".hh dbgerr004" for details
PEB is paged out (Peb.Ldr = 00000000`7efdf018). Type ".hh dbgerr001" for details
Page 5a60a not present in the dump file. Type ".hh dbgerr004" for details
Page 5b83a not present in the dump file. Type ".hh dbgerr004" for details
PEB is paged out (Peb.Ldr = 00000000`7efdf018). Type ".hh dbgerr001" for details
READ_ADDRESS: fffff88003ff1000
CURRENT_IRQL: 2
FAULTING_IP:
USBKey64+3ffd
fffff880`03ff0ffd c6460601 mov byte ptr [rsi+6],1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: WavPlayer.exe
TRAP_FRAME: fffff880091ce4f0 -- (.trap 0xfffff880091ce4f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800464b1a8
rdx=fffffa800464b1e0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88003ff0ffd rsp=fffff880091ce680 rbp=fffffa800464b1c8
r8=fffff78000000008 r9=0000000000000000 r10=0000000000000000
r11=fffff80002befe80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
USBKey64+0x3ffd:
fffff880`03ff0ffd c6460601 mov byte ptr [rsi+6],1 ds:0b60:0006=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a76469 to fffff80002a76f00
STACK_TEXT:
fffff880`091ce3a8 fffff800`02a76469 : 00000000`0000000a fffff880`03ff1000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff880`091ce3b0 fffff800`02a750e0 : 00000000`624e4d43 fffffa80`0464a1a0 fffffa80`0464a050 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`091ce4f0 fffff880`03ff0ffd : fffffa80`03001180 fffffa80`00000006 fffffa80`04717510 fffffa80`0464a1a0 : nt!KiPageFault+0x260
fffff880`091ce680 fffff800`02d77477 : 00000000`00000025 fffff800`02d76ed0 fffffa80`0483a610 fffffa80`050c1598 : USBKey64+0x3ffd
fffff880`091ce6e0 fffff800`02d6d764 : fffffa80`0464a050 00000000`00000000 fffffa80`04f0fb10 00000000`00000001 : nt!IopParseDevice+0x5a7
fffff880`091ce870 fffff800`02d72876 : fffffa80`04f0fb10 fffff880`091ce9f0 fffff680`00000040 fffffa80`024bc6d0 : nt!ObpLookupObjectName+0x585
fffff880`091ce970 fffff800`02d79587 : 00000000`00000100 00000000`00000001 fffffa80`02916a01 ffffffff`ffffffff : nt!ObOpenObjectByName+0x306
fffff880`091cea40 fffff800`02d83198 : 00000000`0008e2d8 00000000`c0100080 fffffa80`00000000 00000000`0008e2f0 : nt!IopCreateFile+0x2b7
fffff880`091ceae0 fffff800`02a76153 : 00000000`00000c15 fffffa80`0323d950 00000000`00000000 0000007f`ffffffff : nt!NtCreateFile+0x78
fffff880`091ceb70 00000000`7759040a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0008e268 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7759040a
STACK_COMMAND: kb
FOLLOWUP_IP:
USBKey64+3ffd
fffff880`03ff0ffd c6460601 mov byte ptr [rsi+6],1
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: USBKey64+3ffd
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: USBKey64
IMAGE_NAME: USBKey64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 497f59ea
FAILURE_BUCKET_ID: X64_0xD1_USBKey64+3ffd
BUCKET_ID: X64_0xD1_USBKey64+3ffd
Followup: MachineOwner
---------