************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.313 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 42
Microsoft (R) Windows Debugger Version 10.0.27668.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidumps\083124-6046-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff805`48400000 PsLoadedModuleList = 0xfffff805`4902a830
Debug session time: Sat Aug 31 12:11:45.130 2024 (UTC + 2:00)
System Uptime: 0 days 0:18:40.803
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`487fe2a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe509`c9428fe0=000000000000000a
1: kd> !analyze -v
*******************************************************************************
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80575c18008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80575b7a738, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2968
Key : Analysis.Elapsed.mSec
Value: 5674
Key : Analysis.IO.Other.Mb
Value: 19
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 38
Key : Analysis.Init.CPU.mSec
Value: 1015
Key : Analysis.Init.Elapsed.mSec
Value: 40066
Key : Analysis.Memory.CommitPeak.Mb
Value: 108
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Bugcheck.Code.TargetModel
Value: 0xd1
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Failure.Bucket
Value: AV_HIDCLASS!HidpInterruptReadComplete
Key : Failure.Hash
Value: {2b771974-23b4-1d80-d7fe-05aff6cb2214}
BUGCHECK_CODE: d1
BUGCHECK_P1: fffff80575c18008
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80575b7a738
FILE_IN_CAB: 083124-6046-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
FAULTING_THREAD: ffff95801340b340
READ_ADDRESS: fffff805490fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff80575c18008
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffe509c9429120 -- (.trap 0xffffe509c9429120)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe509c9429348 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffd18fcd5d7570 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80575b7a738 rsp=ffffe509c94292b0 rbp=ffffe509c94293c9
r8=ffffd18fcd5931f0 r9=0000000000000000 r10=0000fffff80575b7
r11=ffff857b1f000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
HIDCLASS!HidpInterruptReadComplete+0x28:
fffff805`75b7a738 4c392dc9d80900 cmp qword ptr [fffff805`75c18008],r13 ds:fffff805`75c18008=????????????????
Resetting default scope
STACK_TEXT:
ffffe509`c9428fd8 fffff805`48812aa9 : 00000000`0000000a fffff805`75c18008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffe509`c9428fe0 fffff805`4880e478 : 00000000`00000000 ffffd18f`cbdbca70 00000000`00000000 fffff805`486132a9 : nt!KiBugCheckDispatch+0x69
ffffe509`c9429120 fffff805`75b7a738 : ffffd18f`cd5d7570 fffff805`48db70b9 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x478
ffffe509`c94292b0 fffff805`486722d5 : ffffd18f`cd5d7a7b ffffd18f`cd5d7570 ffffe509`c94293c9 ffffd18f`ca70edb0 : HIDCLASS!HidpInterruptReadComplete+0x28
ffffe509`c9429350 fffff805`48672117 : ffffd18f`cd5d7570 00000000`00000000 ffffd18f`cd531a00 00000000`00000002 : nt!IopfCompleteRequest+0x1a5
ffffe509`c9429430 fffff805`4abb81ba : 00000000`00000000 ffffd18f`ca6d4d90 ffffd18f`cd5d7570 ffffe509`c9429510 : nt!IofCompleteRequest+0x17
ffffe509`c9429460 fffff805`4abb5c5f : ffffd18f`d68cb602 ffffd18f`cd535050 ffffd18f`cd5d7570 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
ffffe509`c94294f0 fffff805`5747c1ec : 00000000`ffffff02 ffffd18f`d68cb4f0 ffffd18f`cd531de0 ffffd18f`cd531de0 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
ffffe509`c9429550 fffff805`5747c0b1 : ffffd18f`d68cb690 00000000`00000008 ffffd18f`d68cb720 ffffe509`c9429768 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc8
ffffe509`c94295b0 fffff805`5747bea0 : 00000000`00000004 ffffe509`c9429720 00000000`00000000 ffffd18f`cd531460 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd
ffffe509`c9429660 fffff805`57476910 : 00000000`00000004 ffffe509`c9429738 00000000`00000008 ffffe509`c9429740 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
ffffe509`c9429690 fffff805`57476445 : 00000000`00000780 00002e70`35a1d500 ffffd18f`cacac6d0 ffffd18f`caf430d0 : USBXHCI!Endpoint_TransferEventHandler+0xb0
ffffe509`c94296f0 fffff805`5747611c : ffffd18f`cadec328 ffff9580`13400180 00002e70`354d7788 ffffe509`c9429810 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
ffffe509`c94297f0 fffff805`4abb38f5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
ffffe509`c9429820 fffff805`4861f4de : ffff9580`13403240 00000000`00000000 ffffe509`c9429b20 ffff9580`13400180 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa5 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
ffffe509`c9429860 fffff805`4861e7c4 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
ffffe509`c94299d0 fffff805`48802d9e : ffffffff`00000000 ffff9580`13400180 ffff9580`1340b340 ffffd18f`cd1d2140 : nt!KiRetireDpcList+0x1f4
ffffe509`c9429c60 00000000`00000000 : ffffe509`c942a000 ffffe509`c9424000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: HIDCLASS!HidpInterruptReadComplete+28
MODULE_NAME: HIDCLASS
IMAGE_NAME: HIDCLASS.SYS
IMAGE_VERSION: 10.0.19041.4842
STACK_COMMAND: .process /r /p 0xfffff80549124a00; .thread 0xffff95801340b340 ; kb
BUCKET_ID_FUNC_OFFSET: 28
FAILURE_BUCKET_ID: AV_HIDCLASS!HidpInterruptReadComplete
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2b771974-23b4-1d80-d7fe-05aff6cb2214}
Followup: MachineOwner