I'm having similar troubles, but it appears yours may be more straight forward. Here is the analysis of one of your dump files:
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Josh\Household\PC Build\Troubleshooting\021610-28626-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02c07000 PsLoadedModuleList = 0xfffff800`02e44e50
Debug session time: Mon Feb 15 15:33:21.616 2010 (GMT-6)
System Uptime: 0 days 2:29:42.005
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {1f, 2, 1, fffff8800433c7e4}
Probably caused by : usbehci.sys ( usbehci!EHCI_sMode_Transfer+2c8 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000001f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8800433c7e4, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eaf0e0
000000000000001f
CURRENT_IRQL: 2
FAULTING_IP:
usbehci!EHCI_sMode_Transfer+2c8
fffff880`0433c7e4 448b4e14 mov r9d,dword ptr [rsi+14h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9c6a0 -- (.trap 0xfffff80000b9c6a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000001f rbx=0000000000000000 rcx=fffffa80042df5a0
rdx=000000004f444648 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800433c7e4 rsp=fffff80000b9c830 rbp=fffffa80042b26a0
r8=000000004f444648 r9=000000000000001f r10=0000000000000001
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
usbehci!EHCI_sMode_Transfer+0x2c8:
fffff880`0433c7e4 448b4e14 mov r9d,dword ptr [rsi+14h] ds:1c98:00000000`00000014=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c78469 to fffff80002c78f00
STACK_TEXT:
fffff800`00b9c558 fffff800`02c78469 : 00000000`0000000a 00000000`0000001f 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9c560 fffff800`02c770e0 : 00000000`00000000 fffffa80`04c9cdc0 fffff800`02c60ab4 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c6a0 fffff880`0433c7e4 : 00000000`00000000 fffffa80`00000200 fffffa80`05dbc080 00000000`00000000 : nt!KiPageFault+0x260
fffff800`00b9c830 fffff880`04340e24 : fffffa80`03036bd8 00000000`0000001f fffff880`00000001 00000000`00000080 : usbehci!EHCI_sMode_Transfer+0x2c8
fffff800`00b9c8c0 fffff880`042e1f3c : 00000000`00000002 fffffa80`04c9ca10 00000000`00000005 fffffa80`042b1050 : usbehci!EHCI_SubmitTransfer+0xbc
fffff800`00b9c900 fffff880`042e69f8 : 00000000`00000000 00000000`00000004 fffffa80`04c9ca10 fffffa80`04c98d88 : USBPORT!MPf_SubmitTransfer+0x84
fffff800`00b9c950 fffff880`042f491d : fffffa80`042b11a0 00000000`00000000 00000000`00000010 fffffa80`03036840 : USBPORT!USBPORT_iSetGlobalEndpointStateTx+0x808
fffff800`00b9c9b0 fffff880`042f408e : fffffa80`030196f0 fffffa80`03036840 00000000`00000000 fffffa80`206c6148 : USBPORT!USBPORT_Core_iSubmitTransferToMiniport+0x115
fffff800`00b9ca40 fffff800`031e862f : 00000000`00000000 00000000`0000001f 00000000`00000002 00000000`cd847d07 : USBPORT!USBPORT_Core_ProcessScatterGatherList+0x5b2
fffff800`00b9caf0 fffff800`031e8420 : fffffa80`042b1050 00000000`0000001f fffffa80`00000028 fffff880`042f5dd7 : hal!HalBuildScatterGatherList+0x203
fffff800`00b9cb60 fffff880`042f452e : fffffa80`042b1050 00000000`00000000 fffffa80`042b1d20 fffffa80`03036840 : hal!HalGetScatterGatherList+0x44
fffff800`00b9cbc0 fffff880`042f1e86 : fffffa80`04c47c48 fffffa80`042b1050 fffff800`031e83dc fffffa80`042b11a0 : USBPORT!USBPORT_Core_iMapTransfer+0x24a
fffff800`00b9cc40 fffff880`042e2f89 : fffffa80`042b1050 00000000`00000000 fffffa80`042b1d02 fffffa80`042b1d20 : USBPORT!USBPORT_Core_UsbMapDpc_Worker+0x296
fffff800`00b9cca0 fffff800`02c845dc : fffff800`02df1e80 fffffa80`042b1d20 fffffa80`042b1d38 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff800`00b9ccd0 fffff800`02c816fa : fffff800`02df1e80 fffff800`02dffc40 00000000`00000000 fffff880`042e2db0 : nt!KiRetireDpcList+0x1bc
fffff800`00b9cd80 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
usbehci!EHCI_sMode_Transfer+2c8
fffff880`0433c7e4 448b4e14 mov r9d,dword ptr [rsi+14h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: usbehci!EHCI_sMode_Transfer+2c8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: usbehci
IMAGE_NAME: usbehci.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc06
FAILURE_BUCKET_ID: X64_0xD1_usbehci!EHCI_sMode_Transfer+2c8
BUCKET_ID: X64_0xD1_usbehci!EHCI_sMode_Transfer+2c8
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000001f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8800433c7e4, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: 000000000000001f
CURRENT_IRQL: 2
FAULTING_IP:
usbehci!EHCI_sMode_Transfer+2c8
fffff880`0433c7e4 448b4e14 mov r9d,dword ptr [rsi+14h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9c6a0 -- (.trap 0xfffff80000b9c6a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000001f rbx=0000000000000000 rcx=fffffa80042df5a0
rdx=000000004f444648 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800433c7e4 rsp=fffff80000b9c830 rbp=fffffa80042b26a0
r8=000000004f444648 r9=000000000000001f r10=0000000000000001
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
usbehci!EHCI_sMode_Transfer+0x2c8:
fffff880`0433c7e4 448b4e14 mov r9d,dword ptr [rsi+14h] ds:1c98:00000000`00000014=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c78469 to fffff80002c78f00
STACK_TEXT:
fffff800`00b9c558 fffff800`02c78469 : 00000000`0000000a 00000000`0000001f 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9c560 fffff800`02c770e0 : 00000000`00000000 fffffa80`04c9cdc0 fffff800`02c60ab4 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c6a0 fffff880`0433c7e4 : 00000000`00000000 fffffa80`00000200 fffffa80`05dbc080 00000000`00000000 : nt!KiPageFault+0x260
fffff800`00b9c830 fffff880`04340e24 : fffffa80`03036bd8 00000000`0000001f fffff880`00000001 00000000`00000080 : usbehci!EHCI_sMode_Transfer+0x2c8
fffff800`00b9c8c0 fffff880`042e1f3c : 00000000`00000002 fffffa80`04c9ca10 00000000`00000005 fffffa80`042b1050 : usbehci!EHCI_SubmitTransfer+0xbc
fffff800`00b9c900 fffff880`042e69f8 : 00000000`00000000 00000000`00000004 fffffa80`04c9ca10 fffffa80`04c98d88 : USBPORT!MPf_SubmitTransfer+0x84
fffff800`00b9c950 fffff880`042f491d : fffffa80`042b11a0 00000000`00000000 00000000`00000010 fffffa80`03036840 : USBPORT!USBPORT_iSetGlobalEndpointStateTx+0x808
fffff800`00b9c9b0 fffff880`042f408e : fffffa80`030196f0 fffffa80`03036840 00000000`00000000 fffffa80`206c6148 : USBPORT!USBPORT_Core_iSubmitTransferToMiniport+0x115
fffff800`00b9ca40 fffff800`031e862f : 00000000`00000000 00000000`0000001f 00000000`00000002 00000000`cd847d07 : USBPORT!USBPORT_Core_ProcessScatterGatherList+0x5b2
fffff800`00b9caf0 fffff800`031e8420 : fffffa80`042b1050 00000000`0000001f fffffa80`00000028 fffff880`042f5dd7 : hal!HalBuildScatterGatherList+0x203
fffff800`00b9cb60 fffff880`042f452e : fffffa80`042b1050 00000000`00000000 fffffa80`042b1d20 fffffa80`03036840 : hal!HalGetScatterGatherList+0x44
fffff800`00b9cbc0 fffff880`042f1e86 : fffffa80`04c47c48 fffffa80`042b1050 fffff800`031e83dc fffffa80`042b11a0 : USBPORT!USBPORT_Core_iMapTransfer+0x24a
fffff800`00b9cc40 fffff880`042e2f89 : fffffa80`042b1050 00000000`00000000 fffffa80`042b1d02 fffffa80`042b1d20 : USBPORT!USBPORT_Core_UsbMapDpc_Worker+0x296
fffff800`00b9cca0 fffff800`02c845dc : fffff800`02df1e80 fffffa80`042b1d20 fffffa80`042b1d38 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff800`00b9ccd0 fffff800`02c816fa : fffff800`02df1e80 fffff800`02dffc40 00000000`00000000 fffff880`042e2db0 : nt!KiRetireDpcList+0x1bc
fffff800`00b9cd80 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
usbehci!EHCI_sMode_Transfer+2c8
fffff880`0433c7e4 448b4e14 mov r9d,dword ptr [rsi+14h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: usbehci!EHCI_sMode_Transfer+2c8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: usbehci
IMAGE_NAME: usbehci.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc06
FAILURE_BUCKET_ID: X64_0xD1_usbehci!EHCI_sMode_Transfer+2c8
BUCKET_ID: X64_0xD1_usbehci!EHCI_sMode_Transfer+2c8
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000001f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8800433c7e4, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: 000000000000001f
CURRENT_IRQL: 2
FAULTING_IP:
usbehci!EHCI_sMode_Transfer+2c8
fffff880`0433c7e4 448b4e14 mov r9d,dword ptr [rsi+14h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9c6a0 -- (.trap 0xfffff80000b9c6a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000001f rbx=0000000000000000 rcx=fffffa80042df5a0
rdx=000000004f444648 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800433c7e4 rsp=fffff80000b9c830 rbp=fffffa80042b26a0
r8=000000004f444648 r9=000000000000001f r10=0000000000000001
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
usbehci!EHCI_sMode_Transfer+0x2c8:
fffff880`0433c7e4 448b4e14 mov r9d,dword ptr [rsi+14h] ds:1c98:00000000`00000014=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c78469 to fffff80002c78f00
STACK_TEXT:
fffff800`00b9c558 fffff800`02c78469 : 00000000`0000000a 00000000`0000001f 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9c560 fffff800`02c770e0 : 00000000`00000000 fffffa80`04c9cdc0 fffff800`02c60ab4 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c6a0 fffff880`0433c7e4 : 00000000`00000000 fffffa80`00000200 fffffa80`05dbc080 00000000`00000000 : nt!KiPageFault+0x260
fffff800`00b9c830 fffff880`04340e24 : fffffa80`03036bd8 00000000`0000001f fffff880`00000001 00000000`00000080 : usbehci!EHCI_sMode_Transfer+0x2c8
fffff800`00b9c8c0 fffff880`042e1f3c : 00000000`00000002 fffffa80`04c9ca10 00000000`00000005 fffffa80`042b1050 : usbehci!EHCI_SubmitTransfer+0xbc
fffff800`00b9c900 fffff880`042e69f8 : 00000000`00000000 00000000`00000004 fffffa80`04c9ca10 fffffa80`04c98d88 : USBPORT!MPf_SubmitTransfer+0x84
fffff800`00b9c950 fffff880`042f491d : fffffa80`042b11a0 00000000`00000000 00000000`00000010 fffffa80`03036840 : USBPORT!USBPORT_iSetGlobalEndpointStateTx+0x808
fffff800`00b9c9b0 fffff880`042f408e : fffffa80`030196f0 fffffa80`03036840 00000000`00000000 fffffa80`206c6148 : USBPORT!USBPORT_Core_iSubmitTransferToMiniport+0x115
fffff800`00b9ca40 fffff800`031e862f : 00000000`00000000 00000000`0000001f 00000000`00000002 00000000`cd847d07 : USBPORT!USBPORT_Core_ProcessScatterGatherList+0x5b2
fffff800`00b9caf0 fffff800`031e8420 : fffffa80`042b1050 00000000`0000001f fffffa80`00000028 fffff880`042f5dd7 : hal!HalBuildScatterGatherList+0x203
fffff800`00b9cb60 fffff880`042f452e : fffffa80`042b1050 00000000`00000000 fffffa80`042b1d20 fffffa80`03036840 : hal!HalGetScatterGatherList+0x44
fffff800`00b9cbc0 fffff880`042f1e86 : fffffa80`04c47c48 fffffa80`042b1050 fffff800`031e83dc fffffa80`042b11a0 : USBPORT!USBPORT_Core_iMapTransfer+0x24a
fffff800`00b9cc40 fffff880`042e2f89 : fffffa80`042b1050 00000000`00000000 fffffa80`042b1d02 fffffa80`042b1d20 : USBPORT!USBPORT_Core_UsbMapDpc_Worker+0x296
fffff800`00b9cca0 fffff800`02c845dc : fffff800`02df1e80 fffffa80`042b1d20 fffffa80`042b1d38 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff800`00b9ccd0 fffff800`02c816fa : fffff800`02df1e80 fffff800`02dffc40 00000000`00000000 fffff880`042e2db0 : nt!KiRetireDpcList+0x1bc
fffff800`00b9cd80 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
usbehci!EHCI_sMode_Transfer+2c8
fffff880`0433c7e4 448b4e14 mov r9d,dword ptr [rsi+14h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: usbehci!EHCI_sMode_Transfer+2c8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: usbehci
IMAGE_NAME: usbehci.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc06
FAILURE_BUCKET_ID: X64_0xD1_usbehci!EHCI_sMode_Transfer+2c8
BUCKET_ID: X64_0xD1_usbehci!EHCI_sMode_Transfer+2c8
Followup: MachineOwner
---------
0: kd> lmvm usbehci
start end module name
fffff880`04336000 fffff880`04347000 usbehci (pdb symbols) c:\websymbols\usbehci.pdb\85DFE88B18374AE5BC1F292492C09CAA1\usbehci.pdb
Loaded symbol image file: usbehci.sys
Mapped memory image file: c:\websymbols\usbehci.sys\4A5BCC0611000\usbehci.sys
Image path: \SystemRoot\system32\DRIVERS\usbehci.sys
Image name: usbehci.sys
Timestamp: Mon Jul 13 19:06:30 2009 (4A5BCC06)
CheckSum: 000105CD
ImageSize: 00011000
File version: 6.1.7600.16385
Product version: 6.1.7600.16385
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 2.0 Dll
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: USBEHCI.sys
OriginalFilename: USBEHCI.sys
ProductVersion: 6.1.7600.16385
FileVersion: 6.1.7600.16385 (win7_rtm.090713-1255)
FileDescription: EHCI eUSB Miniport Driver
LegalCopyright: © Microsoft Corporation. All rights reserved.
Looks like an issue with your EHCI eUSB Miniport Driver. See if you can update this driver or check your USB devices and the connectivity to your motherboard. See if that helps.
Good luck!