Hallo zusammen,
mein PC startet neuerdings nach einem BSOD neu, allerdings kommt er völlig random. Manchmal passiert einige Zeit lang gar nichts und gestern Abend konnte ich ohne Probleme zocken. Heute allerdings war es nach einer Stunde so weit.
BSOD: Der Computer wurde nach einem schwerwiegenden Fehler neu gestartet. Der Fehlercode war: 0x00000044 (0xffffde8559aea7e0, 0x0000000000000489, 0x0000000000000000, 0x0000000000000000). Ein volles Abbild wurde gespeichert in: C:\WINDOWS\Minidump\091324-12578-01.dmp. Berichts-ID: fb22f166-e1c8-4b59-b5f8-f378e5e27848.
System: Windows 10
MB: Asus ROG Maximus Z790 Hero
Speicher: Kingston Fury Dimm 32 GB DDR5-6000 Dual-Kit
Kühler: NZXT Kraken Elite WK
GraKa: Gigabyte Nvidia 24 GB D6X RTX 3090 OC 24G
Netzteil ist ein bequiet 850W straight power, Festplatten: WD Black SN 770 NVMe SSD und WD Black SN 750 NVMe SSD. Beide Festplatten sind auf einer Asus Hyper M.2 Karte auf PCIe 4.
Auf Belastungstests (CPU und Graka) hat er überhaupt nicht reagiert und beide liefen problemlos. Memtest hat ebenfalls kein Problem ergeben.
VG
WinDbg zeigt für den Minidump folgendes an:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 42
Microsoft (R) Windows Debugger Version 10.0.27668.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\091324-12578-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (32 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff802`5b206000 PsLoadedModuleList = 0xfffff802`5be194f0
Debug session time: Fri Sep 13 20:40:55.867 2024 (UTC + 2:00)
System Uptime: 0 days 1:00:00.526
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
..................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`5b61c000 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff802`5afb1d20=0000000000000044
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MULTIPLE_IRP_COMPLETE_REQUESTS (44)
A driver has requested that an IRP be completed (IoCompleteRequest()), but
the packet has already been completed. This is a tough bug to find because
the easiest case, a driver actually attempted to complete its own packet
twice, is generally not what happened. Rather, two separate drivers each
believe that they own the packet, and each attempts to complete it. The
first actually works, and the second fails. Tracking down which drivers
in the system actually did this is difficult, generally because the trails
of the first driver have been covered by the second. However, the driver
stack for the current request can be found by examining the DeviceObject
fields in each of the stack locations.
Arguments:
Arg1: ffffde8559aea7e0, Address of the IRP
Arg2: 0000000000000489
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 374
Key : Analysis.Elapsed.mSec
Value: 11228
Key : Analysis.IO.Other.Mb
Value: 5
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 46
Key : Analysis.Init.CPU.mSec
Value: 155
Key : Analysis.Init.Elapsed.mSec
Value: 41661
Key : Analysis.Memory.CommitPeak.Mb
Value: 118
Key : Bugcheck.Code.LegacyAPI
Value: 0x44
Key : Bugcheck.Code.TargetModel
Value: 0x44
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: 0x44_USBXHCI!Control_Transfer_Complete
Key : Failure.Hash
Value: {9bad8ac1-be58-4d6c-7c2e-d372963cb065}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1417df84
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
BUGCHECK_CODE: 44
BUGCHECK_P1: ffffde8559aea7e0
BUGCHECK_P2: 489
BUGCHECK_P3: 0
BUGCHECK_P4: 0
FILE_IN_CAB: 091324-12578-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
FAULTING_THREAD: fffff8025bf53700
IRP_ADDRESS: ffffde8559aea7e0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff802`5afb1d18 fffff802`5bcd03d1 : 00000000`00000044 ffffde85`59aea7e0 00000000`00000489 00000000`00000000 : nt!KeBugCheckEx
fffff802`5afb1d20 fffff802`5bcc452b : ffffde85`59aea7e0 fffff802`5afb1e49 00000000`00000000 ffffde85`4a6bb900 : nt!VerifierBugCheckIfAppropriate+0x14d
fffff802`5afb1dc0 fffff802`5b647f0f : ffffde85`59aea7e0 00000000`00000001 ffffde85`59009b30 00000000`00000004 : nt!IovCompleteRequest+0x9f
fffff802`5afb1eb0 fffff802`5c4c3cc1 : 00000000`00000002 00000000`00000000 00000000`00000000 fffff802`5a8512d3 : nt!IofCompleteRequest+0x1c6c7f
fffff802`5afb1ee0 fffff802`5c4c2031 : ffffde85`59aea7e0 fffff802`00000001 ffffde85`44ba08a0 ffffde85`59009b30 : Wdf01000!FxRequest::CompleteInternal+0x241 [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff802`5afb1f70 fffff802`5c4c1fbf : 00000000`00000000 00000000`00000001 ffffde85`4a6bbd90 00000000`00000000 : Wdf01000!FxRequest::Complete+0x4d [minkernel\wdf\framework\shared\inc\private\common\FxRequest.hpp @ 806]
fffff802`5afb1fd0 fffff80f`cbd45f86 : ffffde85`59009b30 00000000`00000001 ffffde85`4a6bbd90 ffffde85`59009cd0 : Wdf01000!imp_WdfRequestComplete+0x3f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 437]
fffff802`5afb2000 fffff80f`cbd47052 : ffffde85`59009cd0 fffff80f`cbda3460 00000000`00000000 fffff802`5afb2108 : USBXHCI!Control_Transfer_Complete+0x122
fffff802`5afb2080 fffff80f`cbd46c22 : 00000000`00000000 ffffde85`59009cd0 ffffde85`4a6bbd90 fffff802`5afb2268 : USBXHCI!Control_Transfer_CompleteCancelable+0x96
fffff802`5afb20d0 fffff80f`cbd46820 : ffffde85`45a539d0 ffffde85`4a6ba9e0 fffff802`5afb2289 fffff802`5afb2228 : USBXHCI!Control_ProcessTransferEventWithED1+0x3e2
fffff802`5afb2160 fffff80f`cbd49ca9 : 00000000`00000004 fffff802`5afb2238 00000000`00000008 fffff802`5afb2240 : USBXHCI!Control_EP_TransferEventHandler+0x10
fffff802`5afb2190 fffff80f`cbd49318 : ffffde85`4a0c9220 ffffde85`452f9100 ffff9a00`8f8f55b0 ffffde85`4a0c9220 : USBXHCI!Endpoint_TransferEventHandler+0x109
fffff802`5afb21f0 fffff80f`cbd48bcc : 00000000`00000000 00000000`00001388 ffffde85`4a0c9020 fffff802`5b430d27 : USBXHCI!Interrupter_DeferredWorkProcessor+0x738
fffff802`5afb22f0 fffff802`5c4c6d2e : fffff802`5afb2410 00000000`00000006 ffffde85`259dd000 ffffde85`2541da50 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff802`5afb2320 fffff802`5c4c6cd5 : 00000008`6217ebe5 00000000`00000f44 ffffde85`4a0c9020 fffff802`5afb2408 : Wdf01000!FxInterrupt:pcHandler+0x4a [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 79]
fffff802`5afb2350 fffff802`5b45938c : 00000000`00000000 ffff9a00`819cc970 00000008`00000000 00000000`00989680 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0x35 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 410]
fffff802`5afb2390 fffff802`5b458394 : 00000000`00000000 fffff802`5afb29d0 fffff802`58c50180 00000000`0000027e : nt!KiExecuteAllDpcs+0x42c
fffff802`5afb28d0 fffff802`5b62100e : 00000000`00000000 fffff802`58c50180 fffff802`5bf53700 ffffde85`49c33080 : nt!KiRetireDpcList+0x1b4
fffff802`5afb2b80 00000000`00000000 : fffff802`5afb3000 fffff802`5afac000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: USBXHCI!Control_Transfer_Complete+122
MODULE_NAME: USBXHCI
IMAGE_NAME: USBXHCI.SYS
IMAGE_VERSION: 10.0.22621.4034
STACK_COMMAND: .process /r /p 0xfffff8025bf4ff40; .thread 0xfffff8025bf53700 ; kb
BUCKET_ID_FUNC_OFFSET: 122
FAILURE_BUCKET_ID: 0x44_USBXHCI!Control_Transfer_Complete
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9bad8ac1-be58-4d6c-7c2e-d372963cb065}
Followup: MachineOwner
---------
mein PC startet neuerdings nach einem BSOD neu, allerdings kommt er völlig random. Manchmal passiert einige Zeit lang gar nichts und gestern Abend konnte ich ohne Probleme zocken. Heute allerdings war es nach einer Stunde so weit.
BSOD: Der Computer wurde nach einem schwerwiegenden Fehler neu gestartet. Der Fehlercode war: 0x00000044 (0xffffde8559aea7e0, 0x0000000000000489, 0x0000000000000000, 0x0000000000000000). Ein volles Abbild wurde gespeichert in: C:\WINDOWS\Minidump\091324-12578-01.dmp. Berichts-ID: fb22f166-e1c8-4b59-b5f8-f378e5e27848.
System: Windows 10
MB: Asus ROG Maximus Z790 Hero
Speicher: Kingston Fury Dimm 32 GB DDR5-6000 Dual-Kit
Kühler: NZXT Kraken Elite WK
GraKa: Gigabyte Nvidia 24 GB D6X RTX 3090 OC 24G
Netzteil ist ein bequiet 850W straight power, Festplatten: WD Black SN 770 NVMe SSD und WD Black SN 750 NVMe SSD. Beide Festplatten sind auf einer Asus Hyper M.2 Karte auf PCIe 4.
Auf Belastungstests (CPU und Graka) hat er überhaupt nicht reagiert und beide liefen problemlos. Memtest hat ebenfalls kein Problem ergeben.
VG
WinDbg zeigt für den Minidump folgendes an:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 42
Microsoft (R) Windows Debugger Version 10.0.27668.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\091324-12578-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (32 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff802`5b206000 PsLoadedModuleList = 0xfffff802`5be194f0
Debug session time: Fri Sep 13 20:40:55.867 2024 (UTC + 2:00)
System Uptime: 0 days 1:00:00.526
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
..................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`5b61c000 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff802`5afb1d20=0000000000000044
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MULTIPLE_IRP_COMPLETE_REQUESTS (44)
A driver has requested that an IRP be completed (IoCompleteRequest()), but
the packet has already been completed. This is a tough bug to find because
the easiest case, a driver actually attempted to complete its own packet
twice, is generally not what happened. Rather, two separate drivers each
believe that they own the packet, and each attempts to complete it. The
first actually works, and the second fails. Tracking down which drivers
in the system actually did this is difficult, generally because the trails
of the first driver have been covered by the second. However, the driver
stack for the current request can be found by examining the DeviceObject
fields in each of the stack locations.
Arguments:
Arg1: ffffde8559aea7e0, Address of the IRP
Arg2: 0000000000000489
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 374
Key : Analysis.Elapsed.mSec
Value: 11228
Key : Analysis.IO.Other.Mb
Value: 5
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 46
Key : Analysis.Init.CPU.mSec
Value: 155
Key : Analysis.Init.Elapsed.mSec
Value: 41661
Key : Analysis.Memory.CommitPeak.Mb
Value: 118
Key : Bugcheck.Code.LegacyAPI
Value: 0x44
Key : Bugcheck.Code.TargetModel
Value: 0x44
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: 0x44_USBXHCI!Control_Transfer_Complete
Key : Failure.Hash
Value: {9bad8ac1-be58-4d6c-7c2e-d372963cb065}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1417df84
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
BUGCHECK_CODE: 44
BUGCHECK_P1: ffffde8559aea7e0
BUGCHECK_P2: 489
BUGCHECK_P3: 0
BUGCHECK_P4: 0
FILE_IN_CAB: 091324-12578-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
FAULTING_THREAD: fffff8025bf53700
IRP_ADDRESS: ffffde8559aea7e0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff802`5afb1d18 fffff802`5bcd03d1 : 00000000`00000044 ffffde85`59aea7e0 00000000`00000489 00000000`00000000 : nt!KeBugCheckEx
fffff802`5afb1d20 fffff802`5bcc452b : ffffde85`59aea7e0 fffff802`5afb1e49 00000000`00000000 ffffde85`4a6bb900 : nt!VerifierBugCheckIfAppropriate+0x14d
fffff802`5afb1dc0 fffff802`5b647f0f : ffffde85`59aea7e0 00000000`00000001 ffffde85`59009b30 00000000`00000004 : nt!IovCompleteRequest+0x9f
fffff802`5afb1eb0 fffff802`5c4c3cc1 : 00000000`00000002 00000000`00000000 00000000`00000000 fffff802`5a8512d3 : nt!IofCompleteRequest+0x1c6c7f
fffff802`5afb1ee0 fffff802`5c4c2031 : ffffde85`59aea7e0 fffff802`00000001 ffffde85`44ba08a0 ffffde85`59009b30 : Wdf01000!FxRequest::CompleteInternal+0x241 [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff802`5afb1f70 fffff802`5c4c1fbf : 00000000`00000000 00000000`00000001 ffffde85`4a6bbd90 00000000`00000000 : Wdf01000!FxRequest::Complete+0x4d [minkernel\wdf\framework\shared\inc\private\common\FxRequest.hpp @ 806]
fffff802`5afb1fd0 fffff80f`cbd45f86 : ffffde85`59009b30 00000000`00000001 ffffde85`4a6bbd90 ffffde85`59009cd0 : Wdf01000!imp_WdfRequestComplete+0x3f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 437]
fffff802`5afb2000 fffff80f`cbd47052 : ffffde85`59009cd0 fffff80f`cbda3460 00000000`00000000 fffff802`5afb2108 : USBXHCI!Control_Transfer_Complete+0x122
fffff802`5afb2080 fffff80f`cbd46c22 : 00000000`00000000 ffffde85`59009cd0 ffffde85`4a6bbd90 fffff802`5afb2268 : USBXHCI!Control_Transfer_CompleteCancelable+0x96
fffff802`5afb20d0 fffff80f`cbd46820 : ffffde85`45a539d0 ffffde85`4a6ba9e0 fffff802`5afb2289 fffff802`5afb2228 : USBXHCI!Control_ProcessTransferEventWithED1+0x3e2
fffff802`5afb2160 fffff80f`cbd49ca9 : 00000000`00000004 fffff802`5afb2238 00000000`00000008 fffff802`5afb2240 : USBXHCI!Control_EP_TransferEventHandler+0x10
fffff802`5afb2190 fffff80f`cbd49318 : ffffde85`4a0c9220 ffffde85`452f9100 ffff9a00`8f8f55b0 ffffde85`4a0c9220 : USBXHCI!Endpoint_TransferEventHandler+0x109
fffff802`5afb21f0 fffff80f`cbd48bcc : 00000000`00000000 00000000`00001388 ffffde85`4a0c9020 fffff802`5b430d27 : USBXHCI!Interrupter_DeferredWorkProcessor+0x738
fffff802`5afb22f0 fffff802`5c4c6d2e : fffff802`5afb2410 00000000`00000006 ffffde85`259dd000 ffffde85`2541da50 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff802`5afb2320 fffff802`5c4c6cd5 : 00000008`6217ebe5 00000000`00000f44 ffffde85`4a0c9020 fffff802`5afb2408 : Wdf01000!FxInterrupt:pcHandler+0x4a [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 79]
fffff802`5afb2350 fffff802`5b45938c : 00000000`00000000 ffff9a00`819cc970 00000008`00000000 00000000`00989680 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0x35 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 410]
fffff802`5afb2390 fffff802`5b458394 : 00000000`00000000 fffff802`5afb29d0 fffff802`58c50180 00000000`0000027e : nt!KiExecuteAllDpcs+0x42c
fffff802`5afb28d0 fffff802`5b62100e : 00000000`00000000 fffff802`58c50180 fffff802`5bf53700 ffffde85`49c33080 : nt!KiRetireDpcList+0x1b4
fffff802`5afb2b80 00000000`00000000 : fffff802`5afb3000 fffff802`5afac000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: USBXHCI!Control_Transfer_Complete+122
MODULE_NAME: USBXHCI
IMAGE_NAME: USBXHCI.SYS
IMAGE_VERSION: 10.0.22621.4034
STACK_COMMAND: .process /r /p 0xfffff8025bf4ff40; .thread 0xfffff8025bf53700 ; kb
BUCKET_ID_FUNC_OFFSET: 122
FAILURE_BUCKET_ID: 0x44_USBXHCI!Control_Transfer_Complete
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9bad8ac1-be58-4d6c-7c2e-d372963cb065}
Followup: MachineOwner
---------