*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffd00096bc0020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803a89f9b3e, address which referenced memory
Debugging Details:
------------------
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff803a8b72138
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffffd00096bc0020
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiAcquireSpinLockInstrumented+12
fffff803`a89f9b3e 65488b1c2520000000 mov rbx,qword ptr gs:[20h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
TRAP_FRAME: ffffd00094bbc020 -- (.trap 0xffffd00094bbc020)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=ffffe0006899c228
rdx=ffffcf81b46ce790 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803a89f9b3e rsp=ffffd00094bbc1b0 rbp=0000000000000000
r8=ffffcf81b46ce860 r9=0000000000000001 r10=00000000000006a0
r11=ffffcf81b46ce790 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiAcquireSpinLockInstrumented+0x12:
fffff803`a89f9b3e 65488b1c2520000000 mov rbx,qword ptr gs:[20h] gs:00000000`00000020=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff803a897d7e9 to fffff803a8971ca0
STACK_TEXT:
ffffd000`94bbbed8 fffff803`a897d7e9 : 00000000`0000000a ffffd000`96bc0020 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd000`94bbbee0 fffff803`a897c03a : 00000000`00000000 ffffe000`6899c220 00000000`00000000 ffffd000`94bbc020 : nt!KiBugCheckDispatch+0x69
ffffd000`94bbc020 fffff803`a89f9b3e : ffffcf81`b46ce790 fffff803`a8e8d2dd ffffe000`68999d20 ffffe000`689e0a90 : nt!KiPageFault+0x23a
ffffd000`94bbc1b0 fffff803`a8e9c4b4 : ffffe000`6899c220 ffffd000`94bbc268 00000000`00000000 ffffe000`66931060 : nt!KiAcquireSpinLockInstrumented+0x12
ffffd000`94bbc200 fffff803`a8e9c57f : ffffcf81`b46ce702 ffffe000`68157740 fffff803`a8eb4800 fffff803`a88ea18d : nt!VfIrpDatabaseEntryAcquireLock+0x2c
ffffd000`94bbc230 fffff803`a8e944ac : ffffcf81`b46cee00 ffffcf81`b46cee02 00000000`00000000 ffffe000`66931060 : nt!VfIrpDatabaseEntryFindAndLock+0xab
ffffd000`94bbc260 fffff803`a8e8826f : 00000000`00000000 ffffcf81`b46ce790 ffffd000`94bbc470 ffffcf81`b46cee00 : nt!VfPendingMoreProcessingRequired+0x2c
ffffd000`94bbc2b0 fffff803`a88a4df8 : ffffcf81`b46ce790 ffffd000`00000000 ffffd000`94bbc3b9 ffffcf81`b46ce790 : nt!IovpLocalCompletionRoutine+0xf7
ffffd000`94bbc310 fffff803`a8e87b6f : 00000000`00000000 ffffcf81`b46ce700 ffffe000`66925900 fffff801`87078082 : nt!IopfCompleteRequest+0x588
ffffd000`94bbc420 fffff801`870698fc : 00000000`ffffffff 00000000`0000000a ffffe000`677de700 ffffe000`677de720 : nt!IovCompleteRequest+0x1d7
ffffd000`94bbc4f0 fffff801`87076364 : ffffe000`677de8a0 00000000`00000000 ffffd000`00000001 ffffe000`677de702 : Wdf01000!FxRequest::CompleteInternal+0x23c
ffffd000`94bbc5b0 fffff801`892e3f16 : ffffe000`677de8a0 ffffd000`94bb0000 ffffe000`677de700 ffffe000`677de700 : Wdf01000!imp_WdfRequestComplete+0x8c
ffffd000`94bbc620 fffff801`892e4e8c : ffffe000`677de8a0 00000000`00000001 ffffe000`677de920 ffffd000`94bbc7a0 : USBXHCI!Bulk_Transfer_CompleteCancelable+0x15a
ffffd000`94bbc680 fffff801`892d202b : 00000000`00000780 ffffe000`6692d210 00000000`00000000 ffffe000`66966050 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x3a8
ffffd000`94bbc730 fffff801`87101c81 : ffffd000`94bc0180 00000000`00000f44 00001fff`996d2fd8 ffffd000`94bc0180 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0x427
ffffd000`94bbc830 fffff803`a8861130 : ffffd000`94bc2f00 ffffd000`94bbcb00 ffffe000`6692d020 fffff803`a8883ae0 : Wdf01000!FxInterrupt::DpcHandler+0xc1
ffffd000`94bbc860 fffff803`a886034b : ffffd000`94bc0180 ffffe000`66afb010 00000000`00000004 fffff803`a89f8628 : nt!KiExecuteAllDpcs+0x1b0
ffffd000`94bbc9b0 fffff803`a89757ea : ffffd000`94bc0180 ffffd000`94bc0180 ffffd000`94bcc3c0 ffffe000`65413080 : nt!KiRetireDpcList+0xdb
ffffd000`94bbcc60 00000000`00000000 : ffffd000`94bbd000 ffffd000`94bb7000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
USBXHCI!Bulk_Transfer_CompleteCancelable+15a
fffff801`892e3f16 488d4d58 lea rcx,[rbp+58h]
SYMBOL_STACK_INDEX: c
SYMBOL_NAME: USBXHCI!Bulk_Transfer_CompleteCancelable+15a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: USBXHCI
IMAGE_NAME: [COLOR=#ff0000]USBXHCI.SYS[/COLOR]
DEBUG_FLR_IMAGE_TIMESTAMP: 530893ef
IMAGE_VERSION: 6.3.9600.17031
BUCKET_ID_FUNC_OFFSET: 15a
FAILURE_BUCKET_ID: AV_USBXHCI!Bulk_Transfer_CompleteCancelable
BUCKET_ID: AV_USBXHCI!Bulk_Transfer_CompleteCancelable
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_usbxhci!bulk_transfer_completecancelable
FAILURE_ID_HASH: {4993a1b5-1810-3a7e-3a43-18068d25fc19}
Followup: MachineOwner
---------