About Windows Crash

  • Thread starter Thread starter Nerxcet
  • Start date Start date
N

Nerxcet

Guest
Hey guys,these days my Windows crashes a lot . can anyone help me?



Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64

Copyright (c) Microsoft Corporation. All rights reserved.





Loading Dump File [C:\Windows\Minidump\121920-10234-01.dmp]

Mini Kernel Dump File: Only registers and stack trace are available



Symbol search path is: srv*

Executable search path is:

Windows 10 Kernel Version 19041 MP (16 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS Personal

Machine Name:

Kernel base = 0xfffff804`4ba00000 PsLoadedModuleList = 0xfffff804`4c62a2b0

Debug session time: Sat Dec 19 18:46:12.534 2020 (UTC + 8:00)

System Uptime: 1 days 3:54:46.953

Loading Kernel Symbols

..



Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.

Run !sym noisy before .reload to track down problems loading symbols.



.............................................................

................................................................

................................................................

..............................................

Loading User Symbols

Loading unloaded module list

...............

For analysis of this file, run !analyze -v

nt!KeBugCheckEx:

fffff804`4bdf5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8b01`5756be20=0000000000000133

13: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************



DPC_WATCHDOG_VIOLATION (133)

The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL

or above.

Arguments:

Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending

component can usually be identified with a stack trace.

Arg2: 0000000000000501, The DPC time count (in ticks).

Arg3: 0000000000000500, The DPC time allotment (in ticks).

Arg4: fffff8044c6fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains

additional information regarding this single DPC timeout



Debugging Details:

------------------



*** WARNING: Unable to verify timestamp for iaStorAC.sys

*************************************************************************

*** ***

*** ***

*** Either you specified an unqualified symbol, or your debugger ***

*** doesn't have full symbol information. Unqualified symbol ***

*** resolution is turned off by default. Please either specify a ***

*** fully qualified symbol module!symbolname, or enable resolution ***

*** of unqualified symbols by typing ".symopt- 100". Note that ***

*** enabling unqualified symbol resolution with network symbol ***

*** server shares in the symbol path may cause the debugger to ***

*** appear to hang for long periods of time when an incorrect ***

*** symbol name is typed or the network symbol server is down. ***

*** ***

*** For some commands to work properly, your symbol path ***

*** must point to .pdb files that have full type information. ***

*** ***

*** Certain .pdb files (such as the public OS symbols) do not ***

*** contain the required information. Contact the group that ***

*** provided you with these symbols if you need this command to ***

*** work. ***

*** ***

*** Type referenced: TickPeriods ***

*** ***

*************************************************************************



KEY_VALUES_STRING: 1



Key : Analysis.CPU.mSec

Value: 2436



Key : Analysis.DebugAnalysisProvider.CPP

Value: Create: 8007007e on NERXCET



Key : Analysis.DebugData

Value: CreateObject



Key : Analysis.DebugModel

Value: CreateObject



Key : Analysis.Elapsed.mSec

Value: 66366



Key : Analysis.Memory.CommitPeak.Mb

Value: 82



Key : Analysis.System

Value: CreateObject





ADDITIONAL_XML: 1



OS_BUILD_LAYERS: 1



DUMP_FILE_ATTRIBUTES: 0x8

Kernel Generated Triage Dump



BUGCHECK_CODE: 133



BUGCHECK_P1: 0



BUGCHECK_P2: 501



BUGCHECK_P3: 500



BUGCHECK_P4: fffff8044c6fa320



DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED



CUSTOMER_CRASH_COUNT: 1



PROCESS_NAME: System



STACK_TEXT:

ffff8b01`5756be18 fffff804`4be3a988 : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx

ffff8b01`5756be20 fffff804`4bc6f9a3 : 00004cf6`3c75c2a3 ffff8b01`57552180 00000000`00000000 ffff8b01`57552180 : nt!KeAccumulateTicks+0x1c8788

ffff8b01`5756be80 fffff804`4bc6f48a : ffffe387`e3d1c900 ffff8605`4b0f6e20 00000000`00000200 00000000`000070c8 : nt!KeClockInterruptNotify+0x453

ffff8b01`5756bf30 fffff804`4bd27ef5 : ffffe387`e3d1c900 00000000`00000000 00000000`00000000 ffff94b0`7eb42d07 : nt!HalpTimerClockIpiRoutine+0x1a

ffff8b01`5756bf60 fffff804`4bdf722a : ffff8605`4b0f6e20 ffffe387`e3d1c900 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5

ffff8b01`5756bfb0 fffff804`4bdf7797 : 00000000`00000000 00001f80`002002b0 000000e9`f6e1d418 fffff804`502062b0 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa

ffff8605`4b0f6da0 fffff804`50136110 : fffff804`50150035 000000e9`fcd7b518 ffffe388`023aefb0 ffff8605`4b0f7028 : nt!KiInterruptDispatchNoLockNoEtw+0x37

ffff8605`4b0f6f38 fffff804`50150035 : 000000e9`fcd7b518 ffffe388`023aefb0 ffff8605`4b0f7028 fffff804`4bd3baed : iaStorAC+0xb6110

ffff8605`4b0f6f40 000000e9`fcd7b518 : ffffe388`023aefb0 ffff8605`4b0f7028 fffff804`4bd3baed 00000000`00000000 : iaStorAC+0xd0035

ffff8605`4b0f6f48 ffffe388`023aefb0 : ffff8605`4b0f7028 fffff804`4bd3baed 00000000`00000000 ffffe387`e89c61a0 : 0x000000e9`fcd7b518

ffff8605`4b0f6f50 ffff8605`4b0f7028 : fffff804`4bd3baed 00000000`00000000 ffffe387`e89c61a0 00000004`00000019 : 0xffffe388`023aefb0

ffff8605`4b0f6f58 fffff804`4bd3baed : 00000000`00000000 ffffe387`e89c61a0 00000004`00000019 000000e9`f6e43672 : 0xffff8605`4b0f7028

ffff8605`4b0f6f60 ffffe388`02593fe8 : 00000000`00000002 ffffe387`00000001 00000000`00000000 fffff804`501b2020 : nt!MmGetPhysicalAddress+0x1d

ffff8605`4b0f6f90 00000000`00000002 : ffffe387`00000001 00000000`00000000 fffff804`501b2020 00000000`00000001 : 0xffffe388`02593fe8

ffff8605`4b0f6f98 ffffe387`00000001 : 00000000`00000000 fffff804`501b2020 00000000`00000001 fffff804`501b2020 : 0x2

ffff8605`4b0f6fa0 00000000`00000000 : fffff804`501b2020 00000000`00000001 fffff804`501b2020 ffff8605`4b0f70a0 : 0xffffe387`00000001





SYMBOL_NAME: iaStorAC+b6110



MODULE_NAME: iaStorAC



IMAGE_NAME: iaStorAC.sys



STACK_COMMAND: .thread ; .cxr ; kb



BUCKET_ID_FUNC_OFFSET: b6110



FAILURE_BUCKET_ID: 0x133_DPC_iaStorAC!unknown_function



OSPLATFORM_TYPE: x64



OSNAME: Windows 10



FAILURE_ID_HASH: {6959f419-2954-fbde-7328-35f9ba64ee7a}



Followup: MachineOwner

---------



13: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************



DPC_WATCHDOG_VIOLATION (133)

The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL

or above.

Arguments:

Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending

component can usually be identified with a stack trace.

Arg2: 0000000000000501, The DPC time count (in ticks).

Arg3: 0000000000000500, The DPC time allotment (in ticks).

Arg4: fffff8044c6fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains

additional information regarding this single DPC timeout



Debugging Details:

------------------



*************************************************************************

*** ***

*** ***

*** Either you specified an unqualified symbol, or your debugger ***

*** doesn't have full symbol information. Unqualified symbol ***

*** resolution is turned off by default. Please either specify a ***

*** fully qualified symbol module!symbolname, or enable resolution ***

*** of unqualified symbols by typing ".symopt- 100". Note that ***

*** enabling unqualified symbol resolution with network symbol ***

*** server shares in the symbol path may cause the debugger to ***

*** appear to hang for long periods of time when an incorrect ***

*** symbol name is typed or the network symbol server is down. ***

*** ***

*** For some commands to work properly, your symbol path ***

*** must point to .pdb files that have full type information. ***

*** ***

*** Certain .pdb files (such as the public OS symbols) do not ***

*** contain the required information. Contact the group that ***

*** provided you with these symbols if you need this command to ***

*** work. ***

*** ***

*** Type referenced: TickPeriods ***

*** ***

*************************************************************************



KEY_VALUES_STRING: 1



Key : Analysis.CPU.mSec

Value: 2000



Key : Analysis.DebugAnalysisProvider.CPP

Value: Create: 8007007e on NERXCET



Key : Analysis.DebugData

Value: CreateObject



Key : Analysis.DebugModel

Value: CreateObject



Key : Analysis.Elapsed.mSec

Value: 1996



Key : Analysis.Memory.CommitPeak.Mb

Value: 82



Key : Analysis.System

Value: CreateObject





ADDITIONAL_XML: 1



OS_BUILD_LAYERS: 1



DUMP_FILE_ATTRIBUTES: 0x8

Kernel Generated Triage Dump



BUGCHECK_CODE: 133



BUGCHECK_P1: 0



BUGCHECK_P2: 501



BUGCHECK_P3: 500



BUGCHECK_P4: fffff8044c6fa320



DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED



CUSTOMER_CRASH_COUNT: 1



PROCESS_NAME: System



STACK_TEXT:

ffff8b01`5756be18 fffff804`4be3a988 : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx

ffff8b01`5756be20 fffff804`4bc6f9a3 : 00004cf6`3c75c2a3 ffff8b01`57552180 00000000`00000000 ffff8b01`57552180 : nt!KeAccumulateTicks+0x1c8788

ffff8b01`5756be80 fffff804`4bc6f48a : ffffe387`e3d1c900 ffff8605`4b0f6e20 00000000`00000200 00000000`000070c8 : nt!KeClockInterruptNotify+0x453

ffff8b01`5756bf30 fffff804`4bd27ef5 : ffffe387`e3d1c900 00000000`00000000 00000000`00000000 ffff94b0`7eb42d07 : nt!HalpTimerClockIpiRoutine+0x1a

ffff8b01`5756bf60 fffff804`4bdf722a : ffff8605`4b0f6e20 ffffe387`e3d1c900 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5

ffff8b01`5756bfb0 fffff804`4bdf7797 : 00000000`00000000 00001f80`002002b0 000000e9`f6e1d418 fffff804`502062b0 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa

ffff8605`4b0f6da0 fffff804`50136110 : fffff804`50150035 000000e9`fcd7b518 ffffe388`023aefb0 ffff8605`4b0f7028 : nt!KiInterruptDispatchNoLockNoEtw+0x37

ffff8605`4b0f6f38 fffff804`50150035 : 000000e9`fcd7b518 ffffe388`023aefb0 ffff8605`4b0f7028 fffff804`4bd3baed : iaStorAC+0xb6110

ffff8605`4b0f6f40 000000e9`fcd7b518 : ffffe388`023aefb0 ffff8605`4b0f7028 fffff804`4bd3baed 00000000`00000000 : iaStorAC+0xd0035

ffff8605`4b0f6f48 ffffe388`023aefb0 : ffff8605`4b0f7028 fffff804`4bd3baed 00000000`00000000 ffffe387`e89c61a0 : 0x000000e9`fcd7b518

ffff8605`4b0f6f50 ffff8605`4b0f7028 : fffff804`4bd3baed 00000000`00000000 ffffe387`e89c61a0 00000004`00000019 : 0xffffe388`023aefb0

ffff8605`4b0f6f58 fffff804`4bd3baed : 00000000`00000000 ffffe387`e89c61a0 00000004`00000019 000000e9`f6e43672 : 0xffff8605`4b0f7028

ffff8605`4b0f6f60 ffffe388`02593fe8 : 00000000`00000002 ffffe387`00000001 00000000`00000000 fffff804`501b2020 : nt!MmGetPhysicalAddress+0x1d

ffff8605`4b0f6f90 00000000`00000002 : ffffe387`00000001 00000000`00000000 fffff804`501b2020 00000000`00000001 : 0xffffe388`02593fe8

ffff8605`4b0f6f98 ffffe387`00000001 : 00000000`00000000 fffff804`501b2020 00000000`00000001 fffff804`501b2020 : 0x2

ffff8605`4b0f6fa0 00000000`00000000 : fffff804`501b2020 00000000`00000001 fffff804`501b2020 ffff8605`4b0f70a0 : 0xffffe387`00000001





SYMBOL_NAME: iaStorAC+b6110



MODULE_NAME: iaStorAC



IMAGE_NAME: iaStorAC.sys



STACK_COMMAND: .thread ; .cxr ; kb



BUCKET_ID_FUNC_OFFSET: b6110



FAILURE_BUCKET_ID: 0x133_DPC_iaStorAC!unknown_function



OSPLATFORM_TYPE: x64



OSNAME: Windows 10



FAILURE_ID_HASH: {6959f419-2954-fbde-7328-35f9ba64ee7a}



Followup: MachineOwner

---------



another crash:

Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\122620-13093-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff800`41c00000 PsLoadedModuleList = 0xfffff800`4282a2b0
Debug session time: Sat Dec 26 18:39:21.048 2020 (UTC + 8:00)
System Uptime: 6 days 18:47:12.977
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
................................................................
....................................................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run
!analyze -v
nt!KeBugCheckEx:
fffff800`41ff5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff606`2e856b90=000000000000000a
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000000000d0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8004795d5b5, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3562

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on NERXCET

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 111740

Key : Analysis.Memory.CommitPeak.Mb
Value: 81

Key : Analysis.System
Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

BUGCHECK_CODE: d1

BUGCHECK_P1: d0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8004795d5b5

READ_ADDRESS: fffff800428fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8004280f330: Unable to get Flags value from nt!KdVersionBlock
fffff8004280f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
00000000000000d0

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

DPC_STACK_BASE: FFFFF6062E857FB0

TRAP_FRAME: fffff6062e856cd0 --
(.trap 0xfffff6062e856cd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000001e8 rbx=0000000000000000 rcx=ffffac83bdcc1c20
rdx=fffff606358d77f0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8004795d5b5 rsp=fffff6062e856e60 rbp=ffffac83bdcc1b50
r8=ffffac83bfc90008 r9=fffff6062e856f10 r10=fffff606358d75c0
r11=fffff6062e856e10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe cy
iaStorAC+0xdd5b5:
fffff800`4795d5b5 488b86d0000000 mov rax,qword ptr [rsi+0D0h] ds:00000000`000000d0=????????????????
Resetting default scope

STACK_TEXT:
fffff606`2e856b88 fffff800`42007769 : 00000000`0000000a 00000000`000000d0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff606`2e856b90 fffff800`42003a69 : 00000000`0000002a 00000000`00000000 00000000`00000034 00000000`0000000c : nt!KiBugCheckDispatch+0x69
fffff606`2e856cd0 fffff800`4795d5b5 : fffff606`2e856eb0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
fffff606`2e856e60 fffff606`2e856eb0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : iaStorAC+0xdd5b5
fffff606`2e856e68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`478859e2 : 0xfffff606`2e856eb0


SYMBOL_NAME: iaStorAC+dd5b5

MODULE_NAME:
iaStorAC

IMAGE_NAME: iaStorAC.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: dd5b5

FAILURE_BUCKET_ID: AV_iaStorAC!unknown_function

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {2c48c538-0bdc-1937-76bb-851b68345fca}

Followup: MachineOwner
---------


Continue reading...
 

Similar threads

Back
Top