Windows 10 randomly crashes and show bsod

  • Thread starter Thread starter alessioric
  • Start date Start date
A

alessioric

Guest
hey everyone,

I'm facing some problem with my Dell XPS 15 9560,


Sometimes happens that the laptop crashes at boot up and then when it restarts it just works fine for a while and then it crashes again.

it gives many errors like ACPI.sys, wdf01000.sys ecc..


I tried two times to re-install windows 10 but without any result..


hope someone could help me.

thanks!


here is the dump:

Microsoft (R) Windows Debugger Version 10.0.19041.1 AMD64

Copyright (c) Microsoft Corporation. All rights reserved.





Loading Dump File [C:\Windows\MEMORY.DMP]

Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.



Symbol search path is: srv*

Executable search path is:

Windows 10 Kernel Version 19041 MP (8 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS

Built by: 19041.1.amd64fre.vb_release.191206-1406

Machine Name:

Kernel base = 0xfffff804`23800000 PsLoadedModuleList = 0xfffff804`2442a310

Debug session time: Fri Aug 7 18:48:38.458 2020 (UTC + 1:00)

System Uptime: 0 days 0:00:07.295

Loading Kernel Symbols

...............................................................

................................................................

.................................................

Loading User Symbols



Loading unloaded module list

..........

For analysis of this file, run !analyze -v

0: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************



DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)

An attempt was made to access a pageable (or completely invalid) address at an

interrupt request level (IRQL) that is too high. This is usually

caused by drivers using improper addresses.

If kernel debugger is available get stack backtrace.

Arguments:

Arg1: 00000000000003c0, memory referenced

Arg2: 0000000000000002, IRQL

Arg3: 0000000000000000, value 0 = read operation, 1 = write operation

Arg4: fffff80425af6216, address which referenced memory



Debugging Details:

------------------





KEY_VALUES_STRING: 1



Key : Analysis.CPU.Sec

Value: 5



Key : Analysis.DebugAnalysisProvider.CPP

Value: Create: 8007007e on DESKTOP-OIG5U93



Key : Analysis.DebugData

Value: CreateObject



Key : Analysis.DebugModel

Value: CreateObject



Key : Analysis.Elapsed.Sec

Value: 29



Key : Analysis.Memory.CommitPeak.Mb

Value: 72



Key : Analysis.System

Value: CreateObject





BUGCHECK_CODE: d1



BUGCHECK_P1: 3c0



BUGCHECK_P2: 2



BUGCHECK_P3: 0



BUGCHECK_P4: fffff80425af6216



READ_ADDRESS: 00000000000003c0



BLACKBOXBSD: 1 (!blackboxbsd)





BLACKBOXNTFS: 1 (!blackboxntfs)





BLACKBOXPNP: 1 (!blackboxpnp)





PROCESS_NAME: System



TRAP_FRAME: ffffe308b8da72b0 -- (.trap 0xffffe308b8da72b0)

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=ffffba0a595fda40 rbx=0000000000000000 rcx=0000000500000000

rdx=ffffba0a5c3166d0 rsi=0000000000000000 rdi=0000000000000000

rip=fffff80425af6216 rsp=ffffe308b8da7440 rbp=ffffba0a7166c300

r8=0000000000000000 r9=0000000000000000 r10=0000000000000010

r11=ffffe308b8da74f8 r12=0000000000000000 r13=0000000000000000

r14=0000000000000000 r15=0000000000000000

iopl=0 nv up ei pl zr na po nc

ACPI!ACPIWakeRemoveDevicesAndUpdate+0xee:

fffff804`25af6216 48858bc0030000 test qword ptr [rbx+3C0h],rcx ds:00000000`000003c0=????????????????

Resetting default scope



STACK_TEXT:

ffffe308`b8da7168 fffff804`23befa29 : 00000000`0000000a 00000000`000003c0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx

ffffe308`b8da7170 fffff804`23bebd29 : 00000000`00000000 00000000`00000005 00000000`00000008 00000000`00000000 : nt!KiBugCheckDispatch+0x69

ffffe308`b8da72b0 fffff804`25af6216 : fffff804`25b72c40 00000000`00000a9d 00000000`00000002 ffffba0a`709770f0 : nt!KiPageFault+0x469

ffffe308`b8da7440 fffff804`25af55ac : ffffba0a`592bbbe0 ffffba0a`7166c3d0 ffffba0a`7166c530 00000000`00000002 : ACPI!ACPIWakeRemoveDevicesAndUpdate+0xee

ffffe308`b8da74c0 fffff804`25ad13a0 : ffffba0a`592bbbe0 ffffba0a`7166c300 ffffba0a`7166c530 00000000`00000000 : ACPI!ACPIWakeEmptyRequestQueue+0x50

ffffe308`b8da7500 fffff804`23a46d45 : 00000000`00000007 ffffba0a`70958248 ffffba0a`70958060 ffffba0a`7166c3d0 : ACPI!ACPIDispatchIrp+0x390

ffffe308`b8da7580 fffff804`3a5d802a : ffffba0a`70958248 ffffba0a`70958060 ffffba0a`7166c3d0 ffffba0a`709581b0 : nt!IofCallDriver+0x55

ffffe308`b8da75c0 fffff804`3a5d6636 : ffffba0a`70958060 ffffba0a`7166c530 ffffba0a`709581b0 fffff804`3a5efa00 : RtsPer+0x9802a

ffffe308`b8da7610 fffff804`23a46d45 : ffffba0a`70958060 00000000`00000000 ffffe308`b8da7750 00000000`69706e04 : RtsPer+0x96636

ffffe308`b8da7660 fffff804`23ea64cc : 00000000`00000000 ffffba0a`70958060 ffffe308`b8da7750 00000000`00000000 : nt!IofCallDriver+0x55

ffffe308`b8da76a0 fffff804`23f38d11 : ffffba0a`5c320060 ffffba0a`5c320060 ffffba0a`5c3554a0 00000000`00000017 : nt!IopSynchronousCall+0xf8

ffffe308`b8da7710 fffff804`23f3b2e0 : ffffe60a`cf68a150 00000000`00000000 00000000`0000030a 00000000`00000308 : nt!IopRemoveDevice+0x105

ffffe308`b8da77c0 fffff804`23f38914 : ffffba0a`5c3554a0 00000000`00000000 00000000`00000000 fffff804`23f3885b : nt!PnpSurpriseRemoveLockedDeviceNode+0xb0

ffffe308`b8da7820 fffff804`23f3860f : ffffba0a`5c3554a0 ffffe308`b8da78a0 00000000`00000000 fffff804`23f382a9 : nt!PnpDeleteLockedDeviceNode+0x88

ffffe308`b8da7860 fffff804`23f37332 : ffffba0a`5c320060 00000001`00000002 00000000`00000000 00000000`00000000 : nt!PnpDeleteLockedDeviceNodes+0xf7

ffffe308`b8da78e0 fffff804`23f35447 : ffffe308`b8da7a20 ffffba0a`5c355400 ffffe308`b8da7a00 ffffe60a`00000001 : nt!PnpProcessQueryRemoveAndEject+0x1da

ffffe308`b8da79c0 fffff804`23ed3f3e : ffffe60a`cf68a150 ffffe60a`d1b960f0 ffffba0a`592ad000 00000000`00000000 : nt!PnpProcessTargetDeviceEvent+0xeb

ffffe308`b8da79f0 fffff804`23a33f45 : ffffba0a`703f4040 ffffba0a`703f4040 ffffba0a`592ad010 ffffba0a`7097d190 : nt!PnpDeviceEventWorker+0x2ce

ffffe308`b8da7a70 fffff804`23b46735 : ffffba0a`703f4040 00000000`00000080 ffffba0a`592c2040 000fa46f`b19bbfff : nt!ExpWorkerThread+0x105

ffffe308`b8da7b10 fffff804`23be51b8 : fffff804`1e735180 ffffba0a`703f4040 fffff804`23b466e0 00000000`00000000 : nt!PspSystemThreadStartup+0x55

ffffe308`b8da7b60 00000000`00000000 : ffffe308`b8da8000 ffffe308`b8da1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28





SYMBOL_NAME: RtsPer+9802a



MODULE_NAME: RtsPer



IMAGE_NAME: RtsPer.sys



STACK_COMMAND: .thread ; .cxr ; kb



BUCKET_ID_FUNC_OFFSET: 9802a



FAILURE_BUCKET_ID: AV_RtsPer!unknown_function



OS_VERSION: 10.0.19041.1



BUILDLAB_STR: vb_release



OSPLATFORM_TYPE: x64



OSNAME: Windows 10



FAILURE_ID_HASH: {5972166a-a6f4-1eee-ba85-d5534a099133}



Followup: MachineOwner

---------



0: kd>



it crashed again and I did another dump:



Microsoft (R) Windows Debugger Version 10.0.19041.1 AMD64

Copyright (c) Microsoft Corporation. All rights reserved.





Loading Dump File [C:\Windows\MEMORY.DMP]

Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.



Symbol search path is: srv*

Executable search path is:

Windows 10 Kernel Version 19041 MP (8 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS

Built by: 19041.1.amd64fre.vb_release.191206-1406

Machine Name:

Kernel base = 0xfffff801`0b400000 PsLoadedModuleList = 0xfffff801`0c02a310

Debug session time: Fri Aug 7 19:45:09.602 2020 (UTC + 1:00)

System Uptime: 0 days 0:01:03.440

Loading Kernel Symbols

...............................................................

................................................................

................................................................

..................................

Loading User Symbols



Loading unloaded module list

...............

For analysis of this file, run !analyze -v

0: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************



SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)

This is a very common bugcheck. Usually the exception address pinpoints

the driver/function that caused the problem. Always note this address

as well as the link date of the driver/image that contains this address.

Arguments:

Arg1: ffffffffc0000005, The exception code that was not handled

Arg2: fffff8010e9dbe51, The address that the exception occurred at

Arg3: fffffa8a2f777128, Exception Record Address

Arg4: fffffa8a2f776960, Context Record Address



Debugging Details:

------------------





KEY_VALUES_STRING: 1



Key : AV.Dereference

Value: NullClassPtr



Key : AV.Fault

Value: Read



Key : Analysis.CPU.Sec

Value: 4



Key : Analysis.DebugAnalysisProvider.CPP

Value: Create: 8007007e on DESKTOP-OIG5U93



Key : Analysis.DebugData

Value: CreateObject



Key : Analysis.DebugModel

Value: CreateObject



Key : Analysis.Elapsed.Sec

Value: 19



Key : Analysis.Memory.CommitPeak.Mb

Value: 86



Key : Analysis.System

Value: CreateObject





BUGCHECK_CODE: 7e



BUGCHECK_P1: ffffffffc0000005



BUGCHECK_P2: fffff8010e9dbe51



BUGCHECK_P3: fffffa8a2f777128



BUGCHECK_P4: fffffa8a2f776960



EXCEPTION_RECORD: fffffa8a2f777128 -- (.exr 0xfffffa8a2f777128)

ExceptionAddress: fffff8010e9dbe51 (Wdf01000!FxObjectHandleGetPtrQI+0x0000000000000023)

ExceptionCode: c0000005 (Access violation)

ExceptionFlags: 00000000

NumberParameters: 2

Parameter[0]: 0000000000000000

Parameter[1]: 0000000000000028

Attempt to read from address 0000000000000028



CONTEXT: fffffa8a2f776960 -- (.cxr 0xfffffa8a2f776960)

rax=0000000000000000 rbx=ffffdc0bcecfcda0 rcx=ffffdc0bcecfcda0

rdx=fffffa8a2f7773b0 rsi=0000000000001025 rdi=000023f431303258

rip=fffff8010e9dbe51 rsp=fffffa8a2f777360 rbp=0000000000000000

r8=0000000000001025 r9=fffffa8a2f777420 r10=fffff8010b622930

r11=fffff780000003b0 r12=fffff80110d00460 r13=fffff80110cf26f0

r14=0000000000000001 r15=0000000000000000

iopl=0 nv up ei pl zr na po nc

cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246

Wdf01000!FxObjectHandleGetPtrQI+0x23 [inlined in Wdf01000!FxObjectHandleGetPtr+0x71]:

fffff801`0e9dbe51 488b4028 mov rax,qword ptr [rax+28h] ds:002b:00000000`00000028=????????????????

Resetting default scope



BLACKBOXBSD: 1 (!blackboxbsd)





BLACKBOXNTFS: 1 (!blackboxntfs)





BLACKBOXPNP: 1 (!blackboxpnp)





BLACKBOXWINLOGON: 1



PROCESS_NAME: System



READ_ADDRESS: 0000000000000028



ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.



EXCEPTION_CODE_STR: c0000005



EXCEPTION_PARAMETER1: 0000000000000000



EXCEPTION_PARAMETER2: 0000000000000028



EXCEPTION_STR: 0xc0000005



STACK_TEXT:

fffffa8a`2f777360 fffff801`0e9e8863 : ffffdc0b`cedd9f50 00000000`00000004 00000000`00000004 00000000`00000000 : Wdf01000!FxObjectHandleGetPtr+0x71 [minkernel\wdf\framework\shared\inc\private\common\fxhandle.h @ 345]

fffffa8a`2f7773d0 fffff801`10ca986e : 00000000`00000000 00000000`00000000 00000000`00000004 ffffdc0b`e4c68960 : Wdf01000!imp_WdfWorkItemFlush+0x23 [minkernel\wdf\framework\shared\core\fxworkitemapi.cpp @ 256]

fffffa8a`2f777420 fffff801`0e9e8a0f : ffffdc0b`e4c59e28 fffffa8a`2f777600 00000000`00000004 00000000`00000001 : USBXHCI!Controller_WdfEvtDeviceD0Exit+0x1ce

fffffa8a`2f777480 fffff801`0e9e0b71 : ffffdc0b`e4c59e28 fffffa8a`2f777600 00000000`00000000 00000000`00000001 : Wdf01000!FxPnpDeviceD0Exit::InvokeClient+0x2f [minkernel\wdf\framework\shared\irphandlers\pnp\pnpcallbacks.cpp @ 285]

fffffa8a`2f7774e0 fffff801`0e9ec115 : 00000000`00000000 00000000`00000000 00000000`00000004 ffffdc0b`e4c598b0 : Wdf01000!FxPrePostCallback::InvokeStateless+0x2d [minkernel\wdf\framework\shared\irphandlers\pnp\cxpnppowercallbacks.cpp @ 408]

fffffa8a`2f777510 fffff801`0e9e12eb : 00000000`00000000 fffffa8a`2f7776b0 00000000`00000380 00000000`00000000 : Wdf01000!FxPkgPnp::PowerGotoDxIoStoppedCommon+0x169 [minkernel\wdf\framework\shared\irphandlers\pnp\powerstatemachine.cpp @ 3100]

fffffa8a`2f777580 fffff801`0e9e2546 : 00000000`0000031c 00000000`00000b20 ffffdc0b`e4c598b0 00000000`00000359 : Wdf01000!FxPkgPnp::PowerGotoDNotZeroIoStopped+0xb [minkernel\wdf\framework\shared\irphandlers\pnp\powerstatemachine.cpp @ 2842]

fffffa8a`2f7775b0 fffff801`0e9e22fa : 00000000`00000002 ffffdc0b`e4c598b0 ffffdc0b`e4c598b0 00000000`00000000 : Wdf01000!FxPkgPnp::PowerEnterNewState+0x156 [minkernel\wdf\framework\shared\irphandlers\pnp\powerstatemachine.cpp @ 1699]

fffffa8a`2f777710 fffff801`0e9e1861 : ffffdc0b`e4c598b0 00000000`00000000 00000000`00000002 00000000`00000000 : Wdf01000!FxPkgPnp::PowerProcessEventInner+0xea [minkernel\wdf\framework\shared\irphandlers\pnp\powerstatemachine.cpp @ 1615]

fffffa8a`2f777790 fffff801`0e9e1085 : 00000000`00000000 fffffa8a`2f777910 ffffdc0b`e4c598b0 ffffdc0b`e4c6bd10 : Wdf01000!FxPkgPnp::PowerProcessEvent+0x1d1 [minkernel\wdf\framework\shared\irphandlers\pnp\powerstatemachine.cpp @ 1394]

fffffa8a`2f777820 fffff801`0e9e1005 : ffffdc0b`e4c598b0 fffffa8a`2f7778e8 00000000`00000004 00000000`00000000 : Wdf01000!FxPkgFdo::DispatchDeviceSetPower+0x75 [minkernel\wdf\framework\shared\irphandlers\pnp\fdopower.cpp @ 350]

fffffa8a`2f777870 fffff801`0e9dcbb0 : ffffdc0b`e4c598b0 ffffdc0b`e4c6bba0 00000000`00000001 ffffdc0b`ed04b140 : Wdf01000!FxPkgFdo::_DispatchSetPower+0x25 [minkernel\wdf\framework\shared\irphandlers\pnp\fdopower.cpp @ 120]

fffffa8a`2f7778a0 fffff801`0e9e3674 : ffffdc0b`ce4e7ad0 ffffdc0b`e4c6bd10 fffff801`10d00460 00000000`00000002 : Wdf01000!FxPkgPnp::Dispatch+0xb0 [minkernel\wdf\framework\shared\irphandlers\pnp\fxpkgpnp.cpp @ 765]

fffffa8a`2f777910 fffff801`0e9e3604 : ffffdc0b`ce4e7ad0 ffffdc0b`e4c6bd10 ffffdc0b`e4c6bba0 fffff801`0c023340 : Wdf01000!DispatchWorker+0x54 [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1592]

fffffa8a`2f777940 fffff801`0e9e3785 : ffffdc0b`e4c6ccc0 000023f4`1b394458 ffffdc0b`ce4e7ad0 fffff801`0b78aafb : Wdf01000!FxDevice::DispatchPreprocessedIrp+0x88 [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1654]

fffffa8a`2f777980 fffff801`10caaa2a : ffffdc0b`e4c6bba0 ffffdc0b`e4c68960 ffffdc0b`e4c6be90 fffffa8a`2f777b10 : Wdf01000!imp_WdfDeviceWdmDispatchPreprocessedIrp+0x65 [minkernel\wdf\framework\shared\core\km\fxdeviceapikm.cpp @ 258]

fffffa8a`2f7779c0 fffff801`0e9da977 : ffffdc0b`ce4e7ad0 00000000`00000016 ffffdc0b`e4c6bba0 fffff801`0c023360 : USBXHCI!Controller_WdfEvtPreprocessSetPowerIrp+0x13a

fffffa8a`2f777a10 fffff801`0b78a529 : fffffa8a`2f777b10 00000000`00000000 00000000`00000000 ffffdc0b`ed04b040 : Wdf01000!FxDevice::DispatchWithLock+0x267 [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1447]

fffffa8a`2f777a70 fffff801`0b746735 : ffffffff`fa0a1f00 fffff801`0b78a350 ffffdc0b`e8efd0f0 00000000`00000093 : nt!PopIrpWorker+0x1d9

fffffa8a`2f777b10 fffff801`0b7e51b8 : ffffaa81`d7e00180 ffffdc0b`ed04b040 fffff801`0b7466e0 00000000`00000000 : nt!PspSystemThreadStartup+0x55

fffffa8a`2f777b60 00000000`00000000 : fffffa8a`2f778000 fffffa8a`2f771000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28





SYMBOL_NAME: USBXHCI!Controller_WdfEvtDeviceD0Exit+1ce



MODULE_NAME: USBXHCI



IMAGE_NAME: USBXHCI.SYS



IMAGE_VERSION: 10.0.19041.329



STACK_COMMAND: .cxr 0xfffffa8a2f776960 ; kb



BUCKET_ID_FUNC_OFFSET: 1ce



FAILURE_BUCKET_ID: AV_USBXHCI!Controller_WdfEvtDeviceD0Exit



OS_VERSION: 10.0.19041.1



BUILDLAB_STR: vb_release



OSPLATFORM_TYPE: x64



OSNAME: Windows 10



FAILURE_ID_HASH: {6550ad7c-1fed-4319-a23c-733314fa35a4}



Followup: MachineOwner

---------

Continue reading...
 

Similar threads

Back
Top