Advertisement
Guest User

Untitled

a guest
Dec 7th, 2019
122
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 10.79 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.18362.1 X86
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\Minidump\120719-6484-01.dmp]
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8.  
  9. Symbol search path is: srv*
  10. Executable search path is:
  11. Windows 10 Kernel Version 18362 MP (12 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS
  13. Built by: 18362.1.amd64fre.19h1_release.190318-1202
  14. Machine Name:
  15. Kernel base = 0xfffff807`1ce00000 PsLoadedModuleList = 0xfffff807`1d248170
  16. Debug session time: Sat Dec 7 15:15:56.816 2019 (UTC + 1:00)
  17. System Uptime: 0 days 0:00:10.499
  18. Loading Kernel Symbols
  19. ...............................................................
  20. ................................................................
  21. ..........................................
  22. Loading User Symbols
  23. Loading unloaded module list
  24. ......
  25. For analysis of this file, run !analyze -v
  26. 0: kd> !analyze -v
  27. *******************************************************************************
  28. * *
  29. * Bugcheck Analysis *
  30. * *
  31. *******************************************************************************
  32.  
  33. DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
  34. An attempt was made to access a pageable (or completely invalid) address at an
  35. interrupt request level (IRQL) that is too high. This is usually
  36. caused by drivers using improper addresses.
  37. If kernel debugger is available get stack backtrace.
  38. Arguments:
  39. Arg1: fffff80736a69fe0, memory referenced
  40. Arg2: 0000000000000002, IRQL
  41. Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
  42. Arg4: fffff807211a80a4, address which referenced memory
  43.  
  44. Debugging Details:
  45. ------------------
  46.  
  47. *** WARNING: Unable to verify timestamp for win32k.sys
  48.  
  49. KEY_VALUES_STRING: 1
  50.  
  51.  
  52. PROCESSES_ANALYSIS: 1
  53.  
  54. SERVICE_ANALYSIS: 1
  55.  
  56. STACKHASH_ANALYSIS: 1
  57.  
  58. TIMELINE_ANALYSIS: 1
  59.  
  60.  
  61. DUMP_CLASS: 1
  62.  
  63. DUMP_QUALIFIER: 400
  64.  
  65. BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
  66.  
  67. SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd
  68.  
  69. SYSTEM_PRODUCT_NAME: MS-7C02
  70.  
  71. SYSTEM_SKU: To be filled by O.E.M.
  72.  
  73. SYSTEM_VERSION: 1.0
  74.  
  75. BIOS_VENDOR: American Megatrends Inc.
  76.  
  77. BIOS_VERSION: 3.51
  78.  
  79. BIOS_DATE: 11/06/2019
  80.  
  81. BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd
  82.  
  83. BASEBOARD_PRODUCT: B450 TOMAHAWK MAX (MS-7C02)
  84.  
  85. BASEBOARD_VERSION: 1.0
  86.  
  87. DUMP_TYPE: 2
  88.  
  89. BUGCHECK_P1: fffff80736a69fe0
  90.  
  91. BUGCHECK_P2: 2
  92.  
  93. BUGCHECK_P3: 0
  94.  
  95. BUGCHECK_P4: fffff807211a80a4
  96.  
  97. READ_ADDRESS: fffff8071d3733b8: Unable to get MiVisibleState
  98. Unable to get NonPagedPoolStart
  99. Unable to get NonPagedPoolEnd
  100. Unable to get PagedPoolStart
  101. Unable to get PagedPoolEnd
  102. fffff80736a69fe0
  103.  
  104. CURRENT_IRQL: 2
  105.  
  106. FAULTING_IP:
  107. Wdf01000!FxObject::DeleteObject+1a4 [minkernel\wdf\framework\shared\object\fxobjectstatemachine.cpp @ 124]
  108. fffff807`211a80a4 4c8bac2490000000 mov r13,qword ptr [rsp+90h]
  109.  
  110. CPU_COUNT: c
  111.  
  112. CPU_MHZ: ed8
  113.  
  114. CPU_VENDOR: AuthenticAMD
  115.  
  116. CPU_FAMILY: 17
  117.  
  118. CPU_MODEL: 71
  119.  
  120. CPU_STEPPING: 0
  121.  
  122. BLACKBOXBSD: 1 (!blackboxbsd)
  123.  
  124.  
  125. BLACKBOXNTFS: 1 (!blackboxntfs)
  126.  
  127.  
  128. BLACKBOXWINLOGON: 1
  129.  
  130. CUSTOMER_CRASH_COUNT: 1
  131.  
  132. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  133.  
  134. BUGCHECK_STR: AV
  135.  
  136. PROCESS_NAME: System
  137.  
  138. ANALYSIS_SESSION_HOST: DESKTOP-HFCH8DI
  139.  
  140. ANALYSIS_SESSION_TIME: 12-07-2019 15:36:02.0090
  141.  
  142. ANALYSIS_VERSION: 10.0.18362.1 x86fre
  143.  
  144. TRAP_FRAME: fffff80722a66dc0 -- (.trap 0xfffff80722a66dc0)
  145. NOTE: The trap frame does not contain all registers.
  146. Some register values may be zeroed or incorrect.
  147. rax=0000000000000001 rbx=0000000000000000 rcx=ffffd609628d2060
  148. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
  149. rip=fffff807211a80a4 rsp=fffff80722a66f50 rbp=fffff80722a67090
  150. r8=00000000000004de r9=fffff8072123ca60 r10=0000fffff807211a
  151. r11=ffff7d7c35c00000 r12=0000000000000000 r13=0000000000000000
  152. r14=0000000000000000 r15=0000000000000000
  153. iopl=0 nv up ei ng nz na pe nc
  154. Wdf01000!FxObject::DeleteObject+0x1a4:
  155. fffff807`211a80a4 4c8bac2490000000 mov r13,qword ptr [rsp+90h] ss:0018:fffff807`22a66fe0=fffff80722a671d8
  156. Resetting default scope
  157.  
  158. LAST_CONTROL_TRANSFER: from fffff8071cfd32e9 to fffff8071cfc14e0
  159.  
  160. STACK_TEXT:
  161. fffff807`22a66c78 fffff807`1cfd32e9 : 00000000`0000000a fffff807`36a69fe0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
  162. fffff807`22a66c80 fffff807`1cfcf62b : ffffd609`5bf32a01 fffff807`1ad52180 fffff807`22a66e89 fffff807`1ce47bdb : nt!KiBugCheckDispatch+0x69
  163. fffff807`22a66dc0 fffff807`211a80a4 : ffffd609`628d2060 ffffd609`628d2080 ffffd609`628d2080 00000000`00000000 : nt!KiPageFault+0x46b
  164. fffff807`22a66f50 fffff807`211f4b44 : ffffd609`5ecae8a0 00000000`00000000 fffff807`22a671d8 ffffd609`627079d0 : Wdf01000!FxObject::DeleteObject+0x1a4 [minkernel\wdf\framework\shared\object\fxobjectstatemachine.cpp @ 124]
  165. fffff807`22a66fd0 fffff807`2120f3bd : 00000000`00000000 fffff807`2b82ea6c ffffd609`5ee10820 ffffd609`62707420 : Wdf01000!FxMemoryObject::Delete+0x14 [minkernel\wdf\framework\shared\inc\private\common\fxmemoryobject.hpp @ 155]
  166. fffff807`22a67000 fffff807`2120f677 : 00000000`00000002 fffff807`211ec502 ffffd609`5e910b00 ffffd609`5e910b00 : Wdf01000!FxUsbPipeContinuousReader::DeleteMemory+0x25 [minkernel\wdf\framework\shared\inc\private\common\fxusbpipe.hpp @ 284]
  167. fffff807`22a67030 fffff807`2121042b : ffffd609`628d20e1 ffffd609`626f8b10 ffffd609`627e6dd0 00000000`00000400 : Wdf01000!FxUsbPipeContinuousReader::FormatRepeater+0x3f [minkernel\wdf\framework\shared\targets\usb\fxusbpipe.cpp @ 709]
  168. fffff807`22a670c0 fffff807`21210a9b : ffffd609`626f8b70 ffffd609`626f8b70 ffffd609`627e6dd0 00000000`73556f49 : Wdf01000!FxUsbPipeContinuousReader::ResubmitRepeater+0x2f [minkernel\wdf\framework\shared\targets\usb\fxusbpipe.cpp @ 154]
  169. fffff807`22a67140 fffff807`211a7425 : ffffd609`5ecae8a0 00000000`00000001 00000000`000000c0 fffff807`00000000 : Wdf01000!FxUsbPipeContinuousReader::_FxUsbPipeRequestComplete+0x7b [minkernel\wdf\framework\shared\targets\usb\fxusbpipe.cpp @ 302]
  170. fffff807`22a671c0 fffff807`211aafe8 : ffffd609`5e968d90 000029f6`a1351758 ffffd609`5ecae8a0 00000000`00000000 : Wdf01000!FxRequestBase::CompleteSubmitted+0xe5 [minkernel\wdf\framework\shared\core\fxrequestbase.cpp @ 511]
  171. fffff807`22a67250 fffff807`1cf2b1b6 : ffffd609`6274a040 ffffd609`69cf8402 ffffd609`69cf85e0 ffffd609`627d8a70 : Wdf01000!FxIoTarget::_RequestCompletionRoutine+0xe8 [minkernel\wdf\framework\shared\targets\general\fxiotarget.cpp @ 2448]
  172. fffff807`22a672c0 fffff807`1ce477d9 : ffffd609`627d8a70 fffff807`22a67399 00000000`00000000 ffffd609`627d8ea3 : nt!IopUnloadSafeCompletion+0x56
  173. fffff807`22a672f0 fffff807`1ce476a7 : ffffd609`6292d6d0 fffff807`2b488f00 00000000`00000001 00000000`00000001 : nt!IopfCompleteRequest+0x119
  174. fffff807`22a67400 fffff807`211a83fd : 00000000`00000000 ffffd609`629be4f0 00000000`00000002 fffff807`2b479700 : nt!IofCompleteRequest+0x17
  175. fffff807`22a67430 fffff807`211a7ecb : ffffd609`629be602 fffff807`22a67551 ffffd609`627d8a70 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x22d [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
  176. fffff807`22a674c0 fffff807`2b487e7f : 00000000`ffffff02 ffffd609`629be4f0 ffffd609`629a0400 ffffd609`629a0400 : Wdf01000!imp_WdfRequestComplete+0x8b [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
  177. fffff807`22a67520 fffff807`2b485cf4 : ffffd609`629be690 ffffd609`629a0460 ffffd609`629be720 fffff807`22a677f8 : USBXHCI!Bulk_Transfer_CompleteCancelable+0x19b
  178. fffff807`22a67580 fffff807`2b484460 : fffff807`211a15d0 fffff807`2f717324 00000000`00000000 fffff807`20fb208d : USBXHCI!Bulk_ProcessTransferEventWithED1+0x464
  179. fffff807`22a67640 fffff807`2b4798d2 : ffffd609`5e968d90 fffff807`2f6521d0 000029f6`008000c0 fffff807`22a67770 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
  180. fffff807`22a67670 fffff807`2b46ba4f : 00000000`0000002b fffff807`22a67761 ffffd609`5ec06460 fffff807`2b4534b9 : USBXHCI!TR_TransferEventHandler+0x16
  181. fffff807`22a676a0 fffff807`2b48c2be : fffff807`22a677f8 fffff807`22a677c8 00000000`00000000 fffff807`22a677d0 : USBXHCI!Endpoint_TransferEventHandler+0x167
  182. fffff807`22a67720 fffff807`2b46ea3c : ffffd609`5ee92ee0 fffff807`22a67819 00000000`00000000 ffffd609`5efff020 : USBXHCI!UsbDevice_TransferEventHandler+0xa6
  183. fffff807`22a67780 fffff807`2b46f55c : 00000000`00000000 00000000`00000001 00000000`00000000 ffffd609`5ee92ce0 : USBXHCI!Interrupter_DeferredWorkProcessor+0x578
  184. fffff807`22a67880 fffff807`211a26ac : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
  185. fffff807`22a678b0 fffff807`1ce6ae95 : fffff807`1ad52180 00000000`00000001 fffff807`22a678a8 00000000`00000000 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0x9c [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
  186. fffff807`22a678f0 fffff807`1ce6a4ef : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x305
  187. fffff807`22a67a30 fffff807`1cfc5024 : 00000000`00000000 fffff807`1ad52180 fffff807`1d391400 ffffd609`625d0040 : nt!KiRetireDpcList+0x1ef
  188. fffff807`22a67c60 00000000`00000000 : fffff807`22a68000 fffff807`22a62000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84
  189.  
  190.  
  191. THREAD_SHA1_HASH_MOD_FUNC: 25c8a1919d0d0f077881820836856e60655da0bc
  192.  
  193. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 50ac7b746e999e9689ef6c67401ae9376399500c
  194.  
  195. THREAD_SHA1_HASH_MOD: acdff280a0b096aa0e41846fc59bec472da8c7ff
  196.  
  197. FOLLOWUP_IP:
  198. USBXHCI!Bulk_Transfer_CompleteCancelable+19b
  199. fffff807`2b487e7f 90 nop
  200.  
  201. FAULT_INSTR_CODE: 4ccb8a90
  202.  
  203. SYMBOL_STACK_INDEX: 10
  204.  
  205. SYMBOL_NAME: USBXHCI!Bulk_Transfer_CompleteCancelable+19b
  206.  
  207. FOLLOWUP_NAME: MachineOwner
  208.  
  209. MODULE_NAME: USBXHCI
  210.  
  211. IMAGE_NAME: USBXHCI.SYS
  212.  
  213. DEBUG_FLR_IMAGE_TIMESTAMP: 0
  214.  
  215. IMAGE_VERSION: 10.0.18362.476
  216.  
  217. STACK_COMMAND: .thread ; .cxr ; kb
  218.  
  219. BUCKET_ID_FUNC_OFFSET: 19b
  220.  
  221. FAILURE_BUCKET_ID: AV_USBXHCI!Bulk_Transfer_CompleteCancelable
  222.  
  223. BUCKET_ID: AV_USBXHCI!Bulk_Transfer_CompleteCancelable
  224.  
  225. PRIMARY_PROBLEM_CLASS: AV_USBXHCI!Bulk_Transfer_CompleteCancelable
  226.  
  227. TARGET_TIME: 2019-12-07T14:15:56.000Z
  228.  
  229. OSBUILD: 18362
  230.  
  231. OSSERVICEPACK: 476
  232.  
  233. SERVICEPACK_NUMBER: 0
  234.  
  235. OS_REVISION: 0
  236.  
  237. SUITE_MASK: 272
  238.  
  239. PRODUCT_TYPE: 1
  240.  
  241. OSPLATFORM_TYPE: x64
  242.  
  243. OSNAME: Windows 10
  244.  
  245. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
  246.  
  247. OS_LOCALE:
  248.  
  249. USER_LCID: 0
  250.  
  251. OSBUILD_TIMESTAMP: 2011-12-30 00:28:41
  252.  
  253. BUILDDATESTAMP_STR: 190318-1202
  254.  
  255. BUILDLAB_STR: 19h1_release
  256.  
  257. BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
  258.  
  259. ANALYSIS_SESSION_ELAPSED_TIME: 6982
  260.  
  261. ANALYSIS_SOURCE: KM
  262.  
  263. FAILURE_ID_HASH_STRING: km:av_usbxhci!bulk_transfer_completecancelable
  264.  
  265. FAILURE_ID_HASH: {4993a1b5-1810-3a7e-3a43-18068d25fc19}
  266.  
  267. Followup: MachineOwner
  268. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement