*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {478, 2, 1, fffff800030cbb75}
Unable to load image BthAvrcp.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for BthAvrcp.sys
*** ERROR: Module load completed but symbols could not be loaded for BthAvrcp.sys
Probably caused by : bthport.sys ( bthport!HCI_StopInquiryEx+29 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000478, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800030cbb75, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032f90e0
0000000000000478
CURRENT_IRQL: 2
FAULTING_IP:
nt!KeAcquireSpinLockRaiseToDpc+55
fffff800`030cbb75 f0480fba2900 lock bts qword ptr [rcx],0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff88008606d20 -- (.trap 0xfffff88008606d20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=0000000000000478
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030cbb75 rsp=fffff88008606eb0 rbp=0000000000000478
r8=0000000000000000 r9=0000000000000000 r10=0000000000000024
r11=fffff88008606f90 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KeAcquireSpinLockRaiseToDpc+0x55:
fffff800`030cbb75 f0480fba2900 lock bts qword ptr [rcx],0 ds:f010:00000000`00000478=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030c2469 to fffff800030c2f00
STACK_TEXT:
fffff880`08606bd8 fffff800`030c2469 : 00000000`0000000a 00000000`00000478 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`08606be0 fffff800`030c10e0 : 00000000`8000000f 00000000`00000000 fffffa80`08919c10 fffff880`068fc1ad : nt!KiBugCheckDispatch+0x69
fffff880`08606d20 fffff800`030cbb75 : 00000000`000007ff 00000000`00000310 fffffa80`06b617c0 fffff880`08606f50 : nt!KiPageFault+0x260
fffff880`08606eb0 fffff880`06921591 : fffffa80`08abf010 fffff880`08606f70 fffff880`06956a00 00000000`00000000 : nt!KeAcquireSpinLockRaiseToDpc+0x55
fffff880`08606f00 fffff880`0691552c : 00000000`0000001c fffffa80`06b614c0 fffff880`06956ba0 fffffa80`08abf010 : bthport!HCI_StopInquiryEx+0x29
fffff880`08606f60 fffff880`0692be08 : fffff880`08607030 fffff880`06956ba0 fffffa80`08abf010 fffff880`06956aa0 : bthport!HCI_CxnSendConnectRequest+0x14
fffff880`08606fb0 fffff880`06913d1f : fffffa80`06e087f0 fffffa80`08abf4c0 fffffa80`06e087f0 fffffa80`06e08701 : bthport!HCI_ProcessNextConnectRequest+0x2f4
fffff880`086070b0 fffff880`0691414f : fffff880`06954b50 fffffa80`09100620 fffff880`08607320 fffffa80`06e087f0 : bthport!Hci_CxnPostConnectMultiStepComplete+0x19f
fffff880`08607180 fffff880`0691457e : 00000000`00000000 00000000`00000001 fffffa80`06e087f0 fffffa80`06e087f0 : bthport!HCI_HandleConnectComplete+0x3a3
fffff880`086072c0 fffff880`0690be79 : fffffa80`098218e0 00000000`00000060 00000000`00000000 00000000`000000ff : bthport!Fn_EVENT_ConnectionComplete+0x38e
fffff880`08607370 fffff880`0690cd28 : 00000000`8000000f fffff880`8000000f 00000000`00000000 fffff880`00000003 : bthport!HCI_DoCmdCompletion+0x3d1
fffff880`08607450 fffff880`069155bb : fffffa80`06e087f0 fffffa80`00000004 00000000`00000000 00000000`00000000 : bthport!HCI_SendCommandEx+0x324
fffff880`08607520 fffff880`06916fb3 : 00000000`00000001 00000000`00000000 00000000`00000006 00000026`6967cb68 : bthport!HCI_CxnSendConnectRequest+0xa3
fffff880`08607570 fffff880`06934505 : fffff880`00000001 00000026`6967cb68 fffff880`06954b50 fffffa80`0982e010 : bthport!HCI_CreateConnection+0x13b
fffff880`08607600 fffff880`0693c769 : fffffa80`06a103e0 fffff880`0693d753 00000000`c000000d 00000000`00001020 : bthport!L2CA_ConnectReq+0x11
fffff880`08607630 fffff880`0693cb87 : fffffa80`08951c10 fffffa80`08951c10 00000026`6967cb00 fffffa80`06a103e0 : bthport!L2CapCon_ProcessNextSignalRequest+0x1f5
fffff880`086076b0 fffff880`068fbc66 : fffffa80`089339e0 fffffa80`08951c10 fffffa80`06a103e0 00000000`00000000 : bthport!L2CapInt_HandleSignalRequest+0x123
fffff880`08607740 fffff880`068faeb7 : fffffa80`08951c10 00000000`00000000 00000000`00000000 fffffa80`06a60000 : bthport!BthDispatchBrb+0x406
fffff880`086077c0 fffff880`069cabd9 : 00000000`00000001 fffffa80`08951c10 fffff880`045c5a88 fffffa80`08951c10 : bthport!BthDispatchInternalControl+0x147
fffff880`08607820 fffff880`045c7de3 : fffffa80`08951c10 fffffa80`06a103e0 fffff880`045c5a88 fffffa80`06a103e0 : BthEnum!BthEnumInternalIoctl+0x91
fffff880`08607850 fffffa80`08951c10 : fffffa80`06a103e0 fffff880`045c5a88 fffffa80`06a103e0 00000000`00000020 : BthAvrcp+0x4de3
fffff880`08607858 fffffa80`06a103e0 : fffff880`045c5a88 fffffa80`06a103e0 00000000`00000020 00000000`00000001 : 0xfffffa80`08951c10
fffff880`08607860 fffff880`045c5a88 : fffffa80`06a103e0 00000000`00000020 00000000`00000001 00000000`00000001 : 0xfffffa80`06a103e0
fffff880`08607868 fffffa80`06a103e0 : 00000000`00000020 00000000`00000001 00000000`00000001 fffff880`045c5d48 : BthAvrcp+0x2a88
fffff880`08607870 00000000`00000020 : 00000000`00000001 00000000`00000001 fffff880`045c5d48 fffffa80`08ae2420 : 0xfffffa80`06a103e0
fffff880`08607878 00000000`00000001 : 00000000`00000001 fffff880`045c5d48 fffffa80`08ae2420 fffffa80`0981b300 : 0x20
fffff880`08607880 00000000`00000001 : fffff880`045c5d48 fffffa80`08ae2420 fffffa80`0981b300 00000000`00000000 : 0x1
fffff880`08607888 fffff880`045c5d48 : fffffa80`08ae2420 fffffa80`0981b300 00000000`00000000 fffffa80`06a103e0 : 0x1
fffff880`08607890 fffffa80`08ae2420 : fffffa80`0981b300 00000000`00000000 fffffa80`06a103e0 fffffa80`08ae2420 : BthAvrcp+0x2d48
fffff880`08607898 fffffa80`0981b300 : 00000000`00000000 fffffa80`06a103e0 fffffa80`08ae2420 00000000`00000000 : 0xfffffa80`08ae2420
fffff880`086078a0 00000000`00000000 : fffffa80`06a103e0 fffffa80`08ae2420 00000000`00000000 fffffa80`06a0d001 : 0xfffffa80`0981b300
STACK_COMMAND: kb
FOLLOWUP_IP:
bthport!HCI_StopInquiryEx+29
fffff880`06921591 4038bb38080000 cmp byte ptr [rbx+838h],dil
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: bthport!HCI_StopInquiryEx+29
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: bthport
IMAGE_NAME: bthport.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc20
FAILURE_BUCKET_ID: X64_0xA_bthport!HCI_StopInquiryEx+29
BUCKET_ID: X64_0xA_bthport!HCI_StopInquiryEx+29
Followup: MachineOwner
---------