Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.10586.567 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Users\Natasha\Desktop\020316-8031-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 10586 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 10586.63.amd64fre.th2_release.160104-1513
- Machine Name:
- Kernel base = 0xfffff802`f7407000 PsLoadedModuleList = 0xfffff802`f76e5c70
- Debug session time: Wed Feb 3 13:48:43.914 2016 (UTC + 0:00)
- System Uptime: 3 days 1:11:01.574
- Loading Kernel Symbols
- .
- Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
- Run !sym noisy before .reload to track down problems loading symbols.
- ..............................................................
- ................................................................
- ..........................................
- Loading User Symbols
- Loading unloaded module list
- ...................
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck A, {10038, 2, 1, fffff802f747a8cc}
- Probably caused by : USBXHCI.SYS ( USBXHCI!Isoch_Transfer_CompleteCancelable+1fd )
- Followup: MachineOwner
- ---------
- 0: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: 0000000000010038, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000001, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff802f747a8cc, address which referenced memory
- Debugging Details:
- ------------------
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 10586.63.amd64fre.th2_release.160104-1513
- SYSTEM_MANUFACTURER: MSI
- SYSTEM_PRODUCT_NAME: MS-7850
- SYSTEM_SKU: To be filled by O.E.M.
- SYSTEM_VERSION: 1.0
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: V2.0
- BIOS_DATE: 05/05/2013
- BASEBOARD_MANUFACTURER: MSI
- BASEBOARD_PRODUCT: B85-G41 PC Mate(MS-7850)
- BASEBOARD_VERSION: 1.0
- DUMP_TYPE: 2
- BUGCHECK_P1: 10038
- BUGCHECK_P2: 2
- BUGCHECK_P3: 1
- BUGCHECK_P4: fffff802f747a8cc
- WRITE_ADDRESS: fffff802f7785520: Unable to get MiVisibleState
- 0000000000010038
- CURRENT_IRQL: 2
- FAULTING_IP:
- nt!KeAcquireSpinLockRaiseToDpc+1c
- fffff802`f747a8cc f0480fba2900 lock bts qword ptr [rcx],0
- CPU_COUNT: 4
- CPU_MHZ: c80
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: AV
- PROCESS_NAME: System
- ANALYSIS_SESSION_HOST: SPROCKET_II
- ANALYSIS_SESSION_TIME: 02-03-2016 14:39:49.0217
- ANALYSIS_VERSION: 10.0.10586.567 amd64fre
- TRAP_FRAME: fffff802f9009290 -- (.trap 0xfffff802f9009290)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000002 rbx=0000000000000000 rcx=0000000000010038
- rdx=ffffe000497db890 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff802f747a8cc rsp=fffff802f9009420 rbp=ffffe000497db890
- r8=ffffe0004a9e5a60 r9=0000000000000000 r10=ffffe0004853ae20
- r11=ffffe00048a07dd0 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- nt!KeAcquireSpinLockRaiseToDpc+0x1c:
- fffff802`f747a8cc f0480fba2900 lock bts qword ptr [rcx],0 ds:00000000`00010038=????????????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff802f75542e9 to fffff802f7549770
- STACK_TEXT:
- fffff802`f9009148 fffff802`f75542e9 : 00000000`0000000a 00000000`00010038 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
- fffff802`f9009150 fffff802`f7552ac7 : 00000000`00000000 ffffe000`4a9e5010 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
- fffff802`f9009290 fffff802`f747a8cc : 00000000`00000001 00000000`00000004 00000000`ffffffff fffff802`f90094f1 : nt!KiPageFault+0x247
- fffff802`f9009420 fffff801`b7206aef : fffffff6`00000002 00000001`ffffffff 00000000`00000006 00000010`00000000 : nt!KeAcquireSpinLockRaiseToDpc+0x1c
- fffff802`f9009450 fffff801`b71f2ebc : ffffe000`497db890 00000000`00000000 00000000`00000002 fffff802`f9009548 : Wdf01000!FxObject::RemoveChildObjectInternal+0x27 [d:\th\minkernel\wdf\framework\shared\object\fxobject.cpp @ 812]
- fffff802`f9009480 fffff801`b71b55f0 : 00000000`ffffffff fffff801`00000002 ffffe000`00000001 ffffe000`4a9e5a60 : Wdf01000!FxRequest::CompleteInternal+0x3b11c [d:\th\minkernel\wdf\framework\shared\core\fxrequest.cpp @ 737]
- fffff802`f9009530 fffff801`ba6019d9 : ffffe000`497dba30 ffffe000`497db890 ffffe000`4f693ec8 ffffe000`4f693e70 : Wdf01000!imp_WdfRequestComplete+0x90 [d:\th\minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
- fffff802`f9009590 fffff801`ba60c8df : 00000000`00000000 ffffe000`497dba30 fffff802`f9009718 ffffe000`4f693e70 : USBXHCI!Isoch_Transfer_CompleteCancelable+0x1fd
- fffff802`f90095f0 fffff801`ba60c352 : ffffe000`497dba30 00000000`00000001 ffffe000`000000c0 00000000`00000001 : USBXHCI!Isoch_Stage_CompleteTD+0x26f
- fffff802`f9009680 fffff801`ba60fbd9 : 00000000`00000000 00000000`00000000 ffffe000`4fbb26c0 00000000`00000000 : USBXHCI!Isoch_ProcessTransferEventWithED1+0x26e
- fffff802`f9009710 fffff801`ba603ed7 : 00000000`00000004 fffff802`f9009818 fffff802`f9009848 00000000`00000000 : USBXHCI!Endpoint_TransferEventHandler+0x49
- fffff802`f9009770 fffff801`ba60aba8 : 00000000`000004c0 ffffe000`4a720e88 00000000`00000009 00000000`00000000 : USBXHCI!UsbDevice_TransferEventHandler+0x87
- fffff802`f90097d0 fffff802`f7450df0 : 00000000`00000000 ffffe000`4a9082f0 fffff802`f90099c0 fffff802`f9000f44 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0x748
- fffff802`f90098c0 fffff802`f7450509 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x270
- fffff802`f9009a10 fffff802`f754c52a : 00000000`00000000 fffff802`f7724180 fffff802`f779a740 ffffe000`4979d480 : nt!KiRetireDpcList+0xe9
- fffff802`f9009c60 00000000`00000000 : fffff802`f900a000 fffff802`f9004000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: e78e32d50226ae81f5e018063b86af3b7b71602d
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 5c211b7ca7ae8d2c1a2b462069b2f45109b5db77
- THREAD_SHA1_HASH_MOD: 11d6b86ce2208e6072c239b4e9710e3746e60803
- FOLLOWUP_IP:
- USBXHCI!Isoch_Transfer_CompleteCancelable+1fd
- fffff801`ba6019d9 488bcd mov rcx,rbp
- FAULT_INSTR_CODE: ffcd8b48
- SYMBOL_STACK_INDEX: 7
- SYMBOL_NAME: USBXHCI!Isoch_Transfer_CompleteCancelable+1fd
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: USBXHCI
- IMAGE_NAME: USBXHCI.SYS
- DEBUG_FLR_IMAGE_TIMESTAMP: 5632d6a0
- IMAGE_VERSION: 10.0.10586.0
- BUCKET_ID_FUNC_OFFSET: 1fd
- FAILURE_BUCKET_ID: AV_USBXHCI!Isoch_Transfer_CompleteCancelable
- BUCKET_ID: AV_USBXHCI!Isoch_Transfer_CompleteCancelable
- PRIMARY_PROBLEM_CLASS: AV_USBXHCI!Isoch_Transfer_CompleteCancelable
- TARGET_TIME: 2016-02-03T13:48:43.000Z
- OSBUILD: 10586
- OSSERVICEPACK: 0
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
- OS_LOCALE:
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2016-01-05 01:28:56
- BUILDDATESTAMP_STR: 160104-1513
- BUILDLAB_STR: th2_release
- BUILDOSVER_STR: 10.0.10586.63.amd64fre.th2_release.160104-1513
- ANALYSIS_SESSION_ELAPSED_TIME: 13b3
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:av_usbxhci!isoch_transfer_completecancelable
- FAILURE_ID_HASH: {b205ee8e-454f-f12c-6eac-d1c0cd90eb1e}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement