Here is the WinDBG Kernel Debugger's Crash Dump information from just leaving the XDA-2 device attached to Windows 7 x64 for a while. This is a random crash in a driver on a PC that has never NEVER had problems before -- This was the first Blue Screen on this machine ever and it happened right after I loaded the CMedia USB UAC2 driver for the XDA-2. I suspect kernel memory corruption from the CMedia driver.
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1:
ffffffffffffffc0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800034631a2, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036bd100
GetUlongFromAddress: unable to read from fffff800036bd1c0
ffffffffffffffc0
CURRENT_IRQL: 2
FAULTING_IP:
nt!ExpGetLookasideInformation+1c6
fffff800`034631a2 0fb741c0 movzx eax,word ptr [rcx-40h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff880031caf30 -- (.trap 0xfffff880031caf30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8800aaf3bf0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800034631a2 rsp=fffff880031cb0c0 rbp=0000000000000454
r8=0000000000000ff4 r9=fffff8000362b440 r10=0000000000000000
r11=0000fffffffff000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
nt!ExpGetLookasideInformation+0x1c6:
fffff800`034631a2 0fb741c0 movzx eax,word ptr [rcx-40h] ds:ffffffff`ffffffc0=
?
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000348d569 to fffff8000348dfc0
STACK_TEXT:
fffff880`031cade8 fffff800`0348d569 : 00000000`0000000a ffffffff`ffffffc0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`031cadf0 fffff800`0348c1e0 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`0362b430 : nt!KiBugCheckDispatch+0x69
fffff880`031caf30 fffff800`034631a2 : 00000000`00000ff4 00000000`00000000 fffff8a0`103d3170 fffff880`031cb190 : nt!KiPageFault+0x260
fffff880`031cb0c0 fffff800`03793c08 : 00000000`00000000 00000000`00000ff4 fffff880`031cb190 00000000`00000000 : nt!ExpGetLookasideInformation+0x1c6
fffff880`031cb150 fffff800`03794029 : fffff8a0`103d3170 00000000`00000000 00000000`00000004 00000000`00000000 : nt!ExpQuerySystemInformation+0x15e8
fffff880`031cb500 fffff800`0348d253 : fffff8a0`103f0000 fffff800`0348c1fd 00000000`00000041 fffff8a0`103d3000 : nt!NtQuerySystemInformation+0x4d
fffff880`031cb540 fffff800`03489810 : fffff880`0140f244 00000000`00020000 fffff880`031cb704 fffff8a0`103d3148 : nt!KiSystemServiceCopyEnd+0x13
fffff880`031cb6d8 fffff880`0140f244 : 00000000`00020000 fffff880`031cb704 fffff8a0`103d3148 fffff880`031cbcc0 : nt!KiServiceLinkage
fffff880`031cb6e0 fffff880`0140f73d : fffffa80`0630c0f0 fffff800`034955d3 fffffa80`20206f49 fffff8a0`00000000 : cng!GatherRandomKey+0x294
fffff880`031cbaa0 fffff800`0378059d : 00000000`00000001 00000000`00000001 fffffa80`0a0e7270 fffffa80`054feb50 : cng!scavengingWorkItemRoutine+0x3d
fffff880`031cbb40 fffff800`03497641 : fffff800`03760000 fffff880`00ecd801 fffff800`0362b200 fffffa80`054feb50 : nt!IopProcessWorkItem+0x3d
fffff880`031cbb70 fffff800`03724e5a : 00000000`00000000 fffffa80`054feb50 00000000`00000080 fffffa80`054eb890 : nt!ExpWorkerThread+0x111
fffff880`031cbc00 fffff800`0347ed26 : fffff880`02f65180 fffffa80`054feb50 fffff880`02f6ffc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`031cbc40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
cng!GatherRandomKey+294
fffff880`0140f244 85c0 test eax,eax
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: cng!GatherRandomKey+294
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: cng
IMAGE_NAME: cng.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5037a204
FAILURE_BUCKET_ID: X64_0xA_cng!GatherRandomKey+294
BUCKET_ID: X64_0xA_cng!GatherRandomKey+294
Followup: MachineOwner
---------