Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 6.2.9200.20512 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\Minidump\021214-13078-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols
- Executable search path is:
- Windows 8 Kernel Version 9200 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 9200.16628.amd64fre.win8_gdr.130531-1504
- Machine Name:
- Kernel base = 0xfffff800`da00b000 PsLoadedModuleList = 0xfffff800`da2d7a20
- Debug session time: Wed Feb 12 17:52:20.120 2014 (UTC - 6:00)
- System Uptime: 0 days 0:08:11.745
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ...........................................................
- Loading User Symbols
- Loading unloaded module list
- .............
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck D1, {18, 2, 0, fffff8800562773e}
- Probably caused by : USBXHCI.SYS ( USBXHCI!TransferRing_StagingDataFind+36 )
- Followup: MachineOwner
- ---------
- 0: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If kernel debugger is available get stack backtrace.
- Arguments:
- Arg1: 0000000000000018, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
- Arg4: fffff8800562773e, address which referenced memory
- Debugging Details:
- ------------------
- READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800da363168
- GetUlongFromAddress: unable to read from fffff800da3631f8
- 0000000000000018 Nonpaged pool
- CURRENT_IRQL: 2
- FAULTING_IP:
- USBXHCI!TransferRing_StagingDataFind+36
- fffff880`0562773e 4c035018 add r10,qword ptr [rax+18h]
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: AV
- PROCESS_NAME: System
- TAG_NOT_DEFINED_c000000f: FFFFF800D9F77FB0
- TRAP_FRAME: fffff800d9f71500 -- (.trap 0xfffff800d9f71500)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800754a3d0
- rdx=0000000226c309c0 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8800562773e rsp=fffff800d9f71690 rbp=0000000000ffffff
- r8=fffff800d9f71788 r9=fffff800d9f71798 r10=00000000000001e0
- r11=fffff800d9f7170c r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na pe nc
- USBXHCI!TransferRing_StagingDataFind+0x36:
- fffff880`0562773e 4c035018 add r10,qword ptr [rax+18h] ds:00000000`00000018=????????????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff800da064769 to fffff800da065440
- STACK_TEXT:
- fffff800`d9f713b8 fffff800`da064769 : 00000000`0000000a 00000000`00000018 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
- fffff800`d9f713c0 fffff800`da062fe0 : 00000000`00000000 00000000`00000000 fffffa80`0828ab00 fffff800`d9f71500 : nt!KiBugCheckDispatch+0x69
- fffff800`d9f71500 fffff880`0562773e : 00000000`00000004 fffff800`d9f71748 00000000`00000004 fffff800`d9f71750 : nt!KiPageFault+0x260
- fffff800`d9f71690 fffff880`056281c5 : 00000000`00000000 00000002`26c309c0 fffff800`d9f71788 fffff800`d9f71798 : USBXHCI!TransferRing_StagingDataFind+0x36
- fffff800`d9f71720 fffff880`05619205 : fffffa80`08948ab0 fffffa80`08948ab0 ffffffff`ffd0dc00 00000000`00002702 : USBXHCI!TransferRing_TransferEventHandler+0x6c5
- fffff800`d9f717e0 fffff880`05631750 : 00000000`00000004 fffffa80`08948ab0 00000000`00000780 00000000`00000000 : USBXHCI!Endpoint_TransferEventHandler+0x5d
- fffff800`d9f71860 fffff880`0561bf5e : 00000000`000004c0 fffffa80`08948ab0 fffff800`00000003 00000000`00000002 : USBXHCI!UsbDevice_TransferEventHandler+0x7c
- fffff800`d9f718b0 fffff880`010bf6d3 : fffff800`da29eb00 fffff800`da1468fd 0000057f`f79f8298 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0x40e
- fffff800`d9f71980 fffff800`da08dca1 : fffff800`d9f71ab0 fffff800`da305f00 fffffa80`08607df8 00000196`a6b96e73 : Wdf01000!FxInterrupt::DpcHandler+0xc3
- fffff800`d9f719b0 fffff800`da08d8e0 : fffff880`01030ed0 00001f80`00300080 00000000`00000000 00000000`00000002 : nt!KiExecuteAllDpcs+0x191
- fffff800`d9f71af0 fffff800`da08e9ba : fffff800`da303180 fffff800`da303180 00000000`00183de0 fffff800`da35d880 : nt!KiRetireDpcList+0xd0
- fffff800`d9f71c60 00000000`00000000 : fffff800`d9f72000 fffff800`d9f6c000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- USBXHCI!TransferRing_StagingDataFind+36
- fffff880`0562773e 4c035018 add r10,qword ptr [rax+18h]
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: USBXHCI!TransferRing_StagingDataFind+36
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: USBXHCI
- IMAGE_NAME: USBXHCI.SYS
- DEBUG_FLR_IMAGE_TIMESTAMP: 51ce4eef
- BUCKET_ID_FUNC_OFFSET: 36
- FAILURE_BUCKET_ID: AV_USBXHCI!TransferRing_StagingDataFind
- BUCKET_ID: AV_USBXHCI!TransferRing_StagingDataFind
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement