Debug session time: Thu Dec 31 04:10:33.792 2020 (UTC + 1:00)
System Uptime: 0 days 0:29:34.426
BugCheck D1, {ffffffffffffff8c, 2, 1, fffff80521c098bd}
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : hardware ( xboxgip!gipAllocateSendFragment+a9 )
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high.
This is usually caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffffffffffff8c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff80521c098bd, address which referenced memory
WRITE_ADDRESS: fffff80511efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffff8c
CURRENT_IRQL: 2
FAULTING_IP:
xboxgip!gipAllocateSendFragment+a9
fffff805`21c098bd c0488b8f ror byte ptr [rax-75h],8Fh
TRAP_FRAME: fffff8051746c460 -- (.trap 0xfffff8051746c460)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=ffffc60bc0cba290
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80521c098bd rsp=fffff8051746c5f0 rbp=0000000000000671
r8=0000000000000671 r9=ffffc60bc0bf7920 r10=fffff805114ba7c0
r11=fffff8051746c6c8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
xboxgip!gipAllocateSendFragment+0xa9:
fffff805`21c098bd c0488b8f ror byte ptr [rax-75h],8Fh ds:ffffffff`ffffff8c=??
Resetting default scope
MISALIGNED_IP:
xboxgip!gipAllocateSendFragment+a9
fffff805`21c098bd c0488b8f ror byte ptr [rax-75h],8Fh
LAST_CONTROL_TRANSFER: from fffff80511607169 to fffff805115f5210
STACK_TEXT:
fffff805`1746c318 fffff805`11607169 : 00000000`0000000a ffffffff`ffffff8c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff805`1746c320 fffff805`11603469 : 00000000`00000000 00000000`00000000 fffff805`00000000 ffffc60b`c82abbd0 : nt!KiBugCheckDispatch+0x69
fffff805`1746c460 fffff805`21c098bd : fffff805`15dbc701 fffff805`1152953e 00000000`00000000 fffff805`21c09ba2 : nt!KiPageFault+0x469
fffff805`1746c5f0 fffff805`21c09d11 : 00000000`00000658 00000000`00000658 ffffc60b`c0be87c0 fffff805`21c47b68 : xboxgip!gipAllocateSendFragment+0xa9
fffff805`1746c640 fffff805`21c09f50 : fffff805`00000000 00000000`00000060 fffff805`23ae1b23 fffff805`0fffffff : xboxgip!gipConstructSendFragmentForBinding+0x155
fffff805`1746c6d0 fffff805`21c10a6b : fffff805`21c47b68 fffff805`1746c799 00000000`00000000 00000000`00000000 : xboxgip!gipConstructSendFragment+0xb8
fffff805`1746c720 fffff805`21c1115f : fffff805`00000000 fffff805`00000008 fffff805`1746c868 00000000`00000000 : xboxgip!gipSendAudioData+0xeb
fffff805`1746c800 fffff805`21c12259 : 00000000`00000002 fffff805`0f234180 00000000`00000080 fffff805`0f234180 : xboxgip!gipProcessAudioDpc+0x29b
fffff805`1746c8b0 fffff805`114bf682 : fffff805`21c47938 fffff805`0f234180 fffff805`1746cb18 00000000`00000000 : xboxgip!ProcessAudioDpcRoutine+0x9
fffff805`1746c8e0 fffff805`114e4a2d : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00010881 : nt!KiProcessExpiredTimerList+0x172
fffff805`1746c9d0 fffff805`115f8d7e : 00000000`00000000 fffff805`0f234180 fffff805`11f27600 ffffc60b`cccdb080 : nt!KiRetireDpcList+0x5dd
fffff805`1746cc60 00000000`00000000 : fffff805`1746d000 fffff805`17467000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
FOLLOWUP_IP:
xboxgip!gipAllocateSendFragment+a9
fffff805`21c098bd c0488b8f ror byte ptr [rax-75h],8Fh
FAULT_INSTR_CODE: 8f8b48c0
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: xboxgip!gipAllocateSendFragment+a9
IMAGE_NAME: hardware
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED_xboxgip.sys
BUCKET_ID: IP_MISALIGNED_xboxgip.sys
PRIMARY_PROBLEM_CLASS: IP_MISALIGNED_xboxgip.sys
FAILURE_ID_HASH_STRING: km:ip_misaligned_xboxgip.sys
Debug session time: Thu Dec 31 04:11:29.275 2020 (UTC + 1:00)
System Uptime: 0 days 0:00:32.910
BugCheck 1E, {ffffffffc0000005, fffff8064cdb8867, 0, ffffffffffffffff}
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : Wdf01000.sys ( Wdf01000!FxIoQueue::DispatchEvents+427 )
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.
Usually the exception address pinpoints the driver/function that caused the problem.
Always note this address as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8064cdb8867, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
FAULTING_IP:
Wdf01000!FxIoQueue::DispatchEvents+427 [minkernel\wdf\framework\shared\irphandlers\io\fxioqueue.cpp @ 3090]
fffff806`4cdb8867 48874868 xchg rcx,qword ptr [rax+68h]
EXCEPTION_PARAMETER2: ffffffffffffffff
BUGCHECK_STR: 0x1E_c0000005_R
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
BAD_STACK_POINTER: fffff8064e481158
LAST_CONTROL_TRANSFER: from fffff8064a4f451e to fffff8064a3f5210
STACK_TEXT:
fffff806`4e481158 fffff806`4a4f451e : 00000000`0000001e ffffffff`c0000005 fffff806`4cdb8867 00000000`00000000 : nt!KeBugCheckEx
fffff806`4e481160 fffff806`4a3fe0d2 : fffff806`4a4f44fc 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
fffff806`4e4811a0 fffff806`4a252db7 : fffff806`4e481710 00000000`00000000 fffff806`4e46cc60 fffff806`4a3f8d7e : nt!RtlpExecuteHandlerForException+0x12
fffff806`4e4811d0 fffff806`4a2519a6 : fffff806`4e46c0c8 fffff806`4e481e20 fffff806`4e46c0c8 00000000`0000000f : nt!RtlDispatchException+0x297
fffff806`4e4818f0 fffff806`4a3f60a2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
fffff806`4e481fb0 fffff806`4a3f6070 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff806`4e46bf88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
FOLLOWUP_IP:
Wdf01000!FxIoQueue::DispatchEvents+427 [minkernel\wdf\framework\shared\irphandlers\io\fxioqueue.cpp @ 3090]
fffff806`4cdb8867 48874868 xchg rcx,qword ptr [rax+68h]
FAULT_INSTR_CODE: 68488748
FAULTING_SOURCE_LINE: minkernel\wdf\framework\shared\irphandlers\io\fxioqueue.cpp
FAULTING_SOURCE_FILE: minkernel\wdf\framework\shared\irphandlers\io\fxioqueue.cpp
FAULTING_SOURCE_LINE_NUMBER: 3090
SYMBOL_NAME: Wdf01000!FxIoQueue::DispatchEvents+427
MODULE_NAME: Wdf01000
IMAGE_NAME: Wdf01000.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 1.31.19041.423
BUCKET_ID_FUNC_OFFSET: 427
FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_Wdf01000!FxIoQueue::DispatchEvents
BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_Wdf01000!FxIoQueue::DispatchEvents
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_STACKPTR_ERROR_Wdf01000!FxIoQueue::DispatchEvents
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_stackptr_error_wdf01000!fxioqueue::dispatchevents
Debug session time: Thu Dec 31 04:14:19.939 2020 (UTC + 1:00)
System Uptime: 0 days 0:00:35.574
BugCheck D1, {28, 2, 0, fffff8075628304a}
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : USBXHCI.SYS ( USBXHCI!Isoch_RetrieveNextStage+31a )
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high.
This is usually caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8075628304a, address which referenced memory
READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000028
CURRENT_IRQL: 2
FAULTING_IP:
USBXHCI!Isoch_RetrieveNextStage+31a
fffff807`5628304a 488b4828 mov rcx,qword ptr [rax+28h]
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
TRAP_FRAME: fffff8074a46c330 -- (.trap 0xfffff8074a46c330)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000015326828
rdx=0000000000008aea rsi=0000000000000000 rdi=0000000000000000
rip=fffff8075628304a rsp=fffff8074a46c4c0 rbp=0000000000000000
r8=0000000000007e7d r9=ffff808a8060d1c0 r10=ffff808a75e920d0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 ov up ei pl nz na pe cy
USBXHCI!Isoch_RetrieveNextStage+0x31a:
fffff807`5628304a 488b4828 mov rcx,qword ptr [rax+28h] ds:00000000`00000028=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80747607169 to fffff807475f5210
STACK_TEXT:
fffff807`4a46c1e8 fffff807`47607169 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff807`4a46c1f0 fffff807`47603469 : 00000000`00000000 ffff808a`75e90280 ffff808a`7beab000 fffff807`47449799 : nt!KiBugCheckDispatch+0x69
fffff807`4a46c330 fffff807`5628304a : ffff808a`75d12060 00000000`c0000001 ffff808a`8060d020 00000000`00000000 : nt!KiPageFault+0x469
fffff807`4a46c4c0 fffff807`5628219e : fffff807`00000000 ffff808a`8060d1c0 00007f75`7f9f2fd8 ffff808a`8060d1c0 : USBXHCI!Isoch_RetrieveNextStage+0x31a
fffff807`4a46c580 fffff807`56281ef0 : fffff807`4a46c700 fffff807`4a46c701 00000000`00000000 fffff807`00000004 : USBXHCI!Isoch_ProcessTransferEventWithED1+0x28e
fffff807`4a46c660 fffff807`56286570 : 00000000`00000004 fffff807`4a46c738 00000000`00000008 fffff807`4a46c740 : USBXHCI!Isoch_EP_TransferEventHandler+0x10
fffff807`4a46c690 fffff807`562860a5 : 00000000`00000780 00007f75`8a16fd00 ffff808a`78dfe460 ffff808a`79d02850 : USBXHCI!Endpoint_TransferEventHandler+0xb0
fffff807`4a46c6f0 fffff807`56285d7c : ffff808a`79c63328 fffff807`420e5180 00007f75`863d19b8 fffff807`4a46c810 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
fffff807`4a46c7f0 fffff807`48db38f5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff807`4a46c820 fffff807`474e535e : fffff807`420e8240 00000000`00000000 fffff807`4a46cb20 fffff807`420e5180 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa5 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
fffff807`4a46c860 fffff807`474e4644 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff807`4a46c9d0 fffff807`475f8d7e : 00000000`00000000 fffff807`420e5180 fffff807`47f27600 ffff808a`7bf95080 : nt!KiRetireDpcList+0x1f4
fffff807`4a46cc60 00000000`00000000 : fffff807`4a46d000 fffff807`4a467000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
FOLLOWUP_IP:
USBXHCI!Isoch_RetrieveNextStage+31a
fffff807`5628304a 488b4828 mov rcx,qword ptr [rax+28h]
FAULT_INSTR_CODE: 28488b48
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: USBXHCI!Isoch_RetrieveNextStage+31a
MODULE_NAME: USBXHCI
IMAGE_NAME: USBXHCI.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 2e44f1b6
BUCKET_ID_FUNC_OFFSET: 31a
FAILURE_BUCKET_ID: AV_USBXHCI!Isoch_RetrieveNextStage
BUCKET_ID: AV_USBXHCI!Isoch_RetrieveNextStage
PRIMARY_PROBLEM_CLASS: AV_USBXHCI!Isoch_RetrieveNextStage
FAILURE_ID_HASH_STRING: km:av_usbxhci!isoch_retrievenextstage
Debug session time: Thu Dec 31 05:59:15.862 2020 (UTC + 1:00)
System Uptime: 0 days 0:08:17.497
BugCheck EF, {ffffd609d0d32080, 0, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt!PspCatchCriticalBreak+10e )
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffd609d0d32080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
EXCEPTION_CODE: (NTSTATUS) 0xd0d28040 - <Unable to get error code text>
ERROR_CODE: (NTSTATUS) 0xd0d28040 - <Unable to get error code text>
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0xEF
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80178706fb2 to fffff801781f5210
STACK_TEXT:
ffff800a`3e99c938 fffff801`78706fb2 : 00000000`000000ef ffffd609`d0d32080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffff800a`3e99c940 fffff801`785d7e33 : 00000000`00000000 fffff801`78060ec5 00000000`00000002 fffff801`78060def : nt!PspCatchCriticalBreak+0x10e
ffff800a`3e99c9e0 fffff801`7844a9b0 : ffffd609`00000000 00000000`00000000 ffffd609`d0d32080 ffffd609`d0d324b8 : nt!PspTerminateAllThreads+0x1ee427
ffff800a`3e99ca50 fffff801`7844a7ac : ffffd609`d0d32080 00000000`00000000 00000009`5a77f6cc fffff801`7850470a : nt!PspTerminateProcess+0xe0
ffff800a`3e99ca90 fffff801`78206bb8 : ffffd609`d0d32080 ffffd609`d0d28040 ffff800a`3e99cb80 ffffd609`d0d32080 : nt!NtTerminateProcess+0x9c
ffff800a`3e99cb00 00007ffa`99ecc324 : 00007ffa`99f42693 00007ffa`99f71364 00000009`5a77f690 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000009`5a77dde8 00007ffa`99f42693 : 00007ffa`99f71364 00000009`5a77f690 00000000`00000000 00007ffa`99e30000 : 0x00007ffa`99ecc324
00000009`5a77ddf0 00007ffa`99f71364 : 00000009`5a77f690 00000000`00000000 00007ffa`99e30000 00000000`00000004 : 0x00007ffa`99f42693
00000009`5a77ddf8 00000009`5a77f690 : 00000000`00000000 00007ffa`99e30000 00000000`00000004 00007ffa`99ed331d : 0x00007ffa`99f71364
00000009`5a77de00 00000000`00000000 : 00007ffa`99e30000 00000000`00000004 00007ffa`99ed331d 00007ffa`99f71364 : 0x00000009`5a77f690
FOLLOWUP_IP:
nt!PspCatchCriticalBreak+10e
fffff801`78706fb2 cc int 3
FAULT_INSTR_CODE: ed8440cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!PspCatchCriticalBreak+10e
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 64ebcc57
BUCKET_ID_FUNC_OFFSET: 10e
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_d0d28040_nt!PspCatchCriticalBreak
BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_d0d28040_nt!PspCatchCriticalBreak
PRIMARY_PROBLEM_CLASS: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_d0d28040_nt!PspCatchCriticalBreak
FAILURE_ID_HASH_STRING: km:0xef_svchost.exe_bugcheck_critical_process_d0d28040_nt!pspcatchcriticalbreak
Debug session time: Thu Dec 31 09:41:20.447 2020 (UTC + 1:00)
System Uptime: 0 days 3:28:20.671
BugCheck FC, {fffff8063586c120, 890000000656c963, fffff8063586bf90, 0}
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : dc1-controller.sys ( dc1_controller!DccEvtIsoReadComplete+f9 )
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.
The guilty driver is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8063586c120, Virtual address for the attempted execute.
Arg2: 890000000656c963, PTE contents.
Arg3: fffff8063586bf90, (reserved)
Arg4: 0000000000000000, (reserved)
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0xFC
PROCESS_NAME: System
CURRENT_IRQL: 2
TRAP_FRAME: fffff8063586bf90 -- (.trap 0xfffff8063586bf90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000015 rbx=0000000000000000 rcx=ffff848f3a733d20
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8063586c120 rsp=fffff8063586c120 rbp=0000000000000001
r8=fffff8064000d138 r9=ffff848f3a733d20 r10=fffff80631468c00
r11=ffff867949800000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
fffff806`3586c120 203d733a8f84 and byte ptr [fffff805`ba15fb99],bh ds:fffff805`ba15fb99=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8063164f5ae to fffff806315f5210
STACK_TEXT:
fffff806`3586bd58 fffff806`3164f5ae : 00000000`000000fc fffff806`3586c120 89000000`0656c963 fffff806`3586bf90 : nt!KeBugCheckEx
fffff806`3586bd60 fffff806`31641297 : 00000000`00000011 00000000`00000003 00000000`00000000 fffff806`3586beb0 : nt!MiCheckSystemNxFault+0x1ac436
fffff806`3586bda0 fffff806`314ea58f : 89000000`0656c963 00000000`00000011 fffff806`3586c010 00000000`00000000 : nt!MiRaisedIrqlFault+0x1bf48b
fffff806`3586bdf0 fffff806`3160335e : fffff806`00000007 fffff806`3586bff0 00000000`00000000 fffff806`4035e14b : nt!MmAccessFault+0x4ef
fffff806`3586bf90 fffff806`3586c120 : ffff848f`3a733d20 fffff806`400036f9 ffff848f`3a733d20 00000000`00989680 : nt!KiPageFault+0x35e
fffff806`3586c120 ffff848f`3a733d20 : fffff806`400036f9 ffff848f`3a733d20 00000000`00989680 00000000`00000000 : 0xfffff806`3586c120
fffff806`3586c128 fffff806`400036f9 : ffff848f`3a733d20 00000000`00989680 00000000`00000000 ffff848f`3a733d20 : 0xffff848f`3a733d20
fffff806`3586c130 fffff806`341b9248 : ffff848f`40ef5000 fffff806`40003600 00000000`00000000 00000000`00989680 : dc1_controller!DccEvtIsoReadComplete+0xf9
fffff806`3586c180 fffff806`341bc854 : 00007b70`bf10aff8 ffff848f`40ef5000 ffff848f`40ef5000 00000000`00000000 : Wdf01000!FxRequestBase::CompleteSubmitted+0xe8 [minkernel\wdf\framework\shared\core\fxrequestbase.cpp @ 530]
fffff806`3586c210 fffff806`314a1ad6 : ffff848f`3a883de0 ffff848f`40ef2402 ffff848f`40ef24e0 ffff848f`40ef24e0 : Wdf01000!FxIoTarget::_RequestCompletionRoutine+0xe4 [minkernel\wdf\framework\shared\targets\general\fxiotarget.cpp @ 2448]
fffff806`3586c280 fffff806`314c2fce : ffff848f`40ef24e0 fffff806`3586c339 00000000`00000000 ffff848f`40ef2913 : nt!IopUnloadSafeCompletion+0x56
fffff806`3586c2b0 fffff806`314c2e97 : 00000000`00000001 00000000`00000000 ffff848f`40ef4020 00000000`00000002 : nt!IopfCompleteRequest+0x11e
fffff806`3586c3a0 fffff806`341b811a : 00000000`00000000 ffff848f`39339db0 ffff848f`40ef24e0 ffff848f`40ef14e0 : nt!IofCompleteRequest+0x17
fffff806`3586c3d0 fffff806`341b5bbf : 00000000`00000002 fffff806`3586c508 ffff848f`40ef24e0 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff806`3586c460 fffff806`41a8265e : ffff848f`40f3f3a0 ffff848f`40f3f200 00000000`00000002 ffff848f`40ef4400 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffff806`3586c4c0 fffff806`41a820e6 : fffff806`3586c768 ffff848f`40ef4400 fffff806`00000040 00000000`00000001 : USBXHCI!Isoch_Stage_CompleteTD+0x47e
fffff806`3586c580 fffff806`41a81ef0 : fffff806`3586c700 fffff806`3586c700 00000000`00000000 fffff806`00000000 : USBXHCI!Isoch_ProcessTransferEventWithED1+0x1d6
fffff806`3586c660 fffff806`41a86570 : 00000000`00000004 fffff806`3586c738 00000000`00000008 fffff806`3586c740 : USBXHCI!Isoch_EP_TransferEventHandler+0x10
fffff806`3586c690 fffff806`41a860a5 : 00000000`00000780 00007b70`c6ba4400 ffff848f`388475f0 ffff848f`393428e0 : USBXHCI!Endpoint_TransferEventHandler+0xb0
fffff806`3586c6f0 fffff806`41a85d7c : ffff848f`3a5f2328 fffff806`2d4f7180 00007b70`c6ebb978 fffff806`3586c810 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
fffff806`3586c7f0 fffff806`341b38f5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff806`3586c820 fffff806`314e535e : fffff806`2d4fa240 00000000`00000000 fffff806`3586cb20 fffff806`2d4f7180 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa5 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
fffff806`3586c860 fffff806`314e4644 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff806`3586c9d0 fffff806`315f8d7e : 00000000`00000000 fffff806`2d4f7180 fffff806`31f27600 ffff848f`35b7c040 : nt!KiRetireDpcList+0x1f4
fffff806`3586cc60 00000000`00000000 : fffff806`3586d000 fffff806`35867000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
FOLLOWUP_IP:
dc1_controller!DccEvtIsoReadComplete+f9
fffff806`400036f9 488b5c2450 mov rbx,qword ptr [rsp+50h]
FAULT_INSTR_CODE: 245c8b48
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: dc1_controller!DccEvtIsoReadComplete+f9
MODULE_NAME: dc1_controller
IMAGE_NAME: dc1-controller.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 1.0.0.1
BUCKET_ID_FUNC_OFFSET: f9
FAILURE_BUCKET_ID: 0xFC_dc1_controller!DccEvtIsoReadComplete
BUCKET_ID: 0xFC_dc1_controller!DccEvtIsoReadComplete
PRIMARY_PROBLEM_CLASS: 0xFC_dc1_controller!DccEvtIsoReadComplete
FAILURE_ID_HASH_STRING: km:0xfc_dc1_controller!dccevtisoreadcomplete