A
alessioric
Guest
hey everyone,
I'm facing some problem with my Dell XPS 15 9560,
Sometimes happens that the laptop crashes at boot up and then when it restarts it just works fine for a while and then it crashes again.
it gives many errors like ACPI.sys, wdf01000.sys ecc..
I tried two times to re-install windows 10 but without any result..
hope someone could help me.
thanks!
here is the dump:
Microsoft (R) Windows Debugger Version 10.0.19041.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`23800000 PsLoadedModuleList = 0xfffff804`2442a310
Debug session time: Fri Aug 7 18:48:38.458 2020 (UTC + 1:00)
System Uptime: 0 days 0:00:07.295
Loading Kernel Symbols
...............................................................
................................................................
.................................................
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000000003c0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80425af6216, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 5
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-OIG5U93
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 29
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: d1
BUGCHECK_P1: 3c0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80425af6216
READ_ADDRESS: 00000000000003c0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
PROCESS_NAME: System
TRAP_FRAME: ffffe308b8da72b0 -- (.trap 0xffffe308b8da72b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffba0a595fda40 rbx=0000000000000000 rcx=0000000500000000
rdx=ffffba0a5c3166d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80425af6216 rsp=ffffe308b8da7440 rbp=ffffba0a7166c300
r8=0000000000000000 r9=0000000000000000 r10=0000000000000010
r11=ffffe308b8da74f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
ACPI!ACPIWakeRemoveDevicesAndUpdate+0xee:
fffff804`25af6216 48858bc0030000 test qword ptr [rbx+3C0h],rcx ds:00000000`000003c0=????????????????
Resetting default scope
STACK_TEXT:
ffffe308`b8da7168 fffff804`23befa29 : 00000000`0000000a 00000000`000003c0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffe308`b8da7170 fffff804`23bebd29 : 00000000`00000000 00000000`00000005 00000000`00000008 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffe308`b8da72b0 fffff804`25af6216 : fffff804`25b72c40 00000000`00000a9d 00000000`00000002 ffffba0a`709770f0 : nt!KiPageFault+0x469
ffffe308`b8da7440 fffff804`25af55ac : ffffba0a`592bbbe0 ffffba0a`7166c3d0 ffffba0a`7166c530 00000000`00000002 : ACPI!ACPIWakeRemoveDevicesAndUpdate+0xee
ffffe308`b8da74c0 fffff804`25ad13a0 : ffffba0a`592bbbe0 ffffba0a`7166c300 ffffba0a`7166c530 00000000`00000000 : ACPI!ACPIWakeEmptyRequestQueue+0x50
ffffe308`b8da7500 fffff804`23a46d45 : 00000000`00000007 ffffba0a`70958248 ffffba0a`70958060 ffffba0a`7166c3d0 : ACPI!ACPIDispatchIrp+0x390
ffffe308`b8da7580 fffff804`3a5d802a : ffffba0a`70958248 ffffba0a`70958060 ffffba0a`7166c3d0 ffffba0a`709581b0 : nt!IofCallDriver+0x55
ffffe308`b8da75c0 fffff804`3a5d6636 : ffffba0a`70958060 ffffba0a`7166c530 ffffba0a`709581b0 fffff804`3a5efa00 : RtsPer+0x9802a
ffffe308`b8da7610 fffff804`23a46d45 : ffffba0a`70958060 00000000`00000000 ffffe308`b8da7750 00000000`69706e04 : RtsPer+0x96636
ffffe308`b8da7660 fffff804`23ea64cc : 00000000`00000000 ffffba0a`70958060 ffffe308`b8da7750 00000000`00000000 : nt!IofCallDriver+0x55
ffffe308`b8da76a0 fffff804`23f38d11 : ffffba0a`5c320060 ffffba0a`5c320060 ffffba0a`5c3554a0 00000000`00000017 : nt!IopSynchronousCall+0xf8
ffffe308`b8da7710 fffff804`23f3b2e0 : ffffe60a`cf68a150 00000000`00000000 00000000`0000030a 00000000`00000308 : nt!IopRemoveDevice+0x105
ffffe308`b8da77c0 fffff804`23f38914 : ffffba0a`5c3554a0 00000000`00000000 00000000`00000000 fffff804`23f3885b : nt!PnpSurpriseRemoveLockedDeviceNode+0xb0
ffffe308`b8da7820 fffff804`23f3860f : ffffba0a`5c3554a0 ffffe308`b8da78a0 00000000`00000000 fffff804`23f382a9 : nt!PnpDeleteLockedDeviceNode+0x88
ffffe308`b8da7860 fffff804`23f37332 : ffffba0a`5c320060 00000001`00000002 00000000`00000000 00000000`00000000 : nt!PnpDeleteLockedDeviceNodes+0xf7
ffffe308`b8da78e0 fffff804`23f35447 : ffffe308`b8da7a20 ffffba0a`5c355400 ffffe308`b8da7a00 ffffe60a`00000001 : nt!PnpProcessQueryRemoveAndEject+0x1da
ffffe308`b8da79c0 fffff804`23ed3f3e : ffffe60a`cf68a150 ffffe60a`d1b960f0 ffffba0a`592ad000 00000000`00000000 : nt!PnpProcessTargetDeviceEvent+0xeb
ffffe308`b8da79f0 fffff804`23a33f45 : ffffba0a`703f4040 ffffba0a`703f4040 ffffba0a`592ad010 ffffba0a`7097d190 : nt!PnpDeviceEventWorker+0x2ce
ffffe308`b8da7a70 fffff804`23b46735 : ffffba0a`703f4040 00000000`00000080 ffffba0a`592c2040 000fa46f`b19bbfff : nt!ExpWorkerThread+0x105
ffffe308`b8da7b10 fffff804`23be51b8 : fffff804`1e735180 ffffba0a`703f4040 fffff804`23b466e0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffe308`b8da7b60 00000000`00000000 : ffffe308`b8da8000 ffffe308`b8da1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: RtsPer+9802a
MODULE_NAME: RtsPer
IMAGE_NAME: RtsPer.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9802a
FAILURE_BUCKET_ID: AV_RtsPer!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5972166a-a6f4-1eee-ba85-d5534a099133}
Followup: MachineOwner
---------
0: kd>
it crashed again and I did another dump:
Microsoft (R) Windows Debugger Version 10.0.19041.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`0b400000 PsLoadedModuleList = 0xfffff801`0c02a310
Debug session time: Fri Aug 7 19:45:09.602 2020 (UTC + 1:00)
System Uptime: 0 days 0:01:03.440
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
...............
For analysis of this file, run !analyze -v
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8010e9dbe51, The address that the exception occurred at
Arg3: fffffa8a2f777128, Exception Record Address
Arg4: fffffa8a2f776960, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullClassPtr
Key : AV.Fault
Value: Read
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-OIG5U93
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 19
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8010e9dbe51
BUGCHECK_P3: fffffa8a2f777128
BUGCHECK_P4: fffffa8a2f776960
EXCEPTION_RECORD: fffffa8a2f777128 -- (.exr 0xfffffa8a2f777128)
ExceptionAddress: fffff8010e9dbe51 (Wdf01000!FxObjectHandleGetPtrQI+0x0000000000000023)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000028
Attempt to read from address 0000000000000028
CONTEXT: fffffa8a2f776960 -- (.cxr 0xfffffa8a2f776960)
rax=0000000000000000 rbx=ffffdc0bcecfcda0 rcx=ffffdc0bcecfcda0
rdx=fffffa8a2f7773b0 rsi=0000000000001025 rdi=000023f431303258
rip=fffff8010e9dbe51 rsp=fffffa8a2f777360 rbp=0000000000000000
r8=0000000000001025 r9=fffffa8a2f777420 r10=fffff8010b622930
r11=fffff780000003b0 r12=fffff80110d00460 r13=fffff80110cf26f0
r14=0000000000000001 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
Wdf01000!FxObjectHandleGetPtrQI+0x23 [inlined in Wdf01000!FxObjectHandleGetPtr+0x71]:
fffff801`0e9dbe51 488b4028 mov rax,qword ptr [rax+28h] ds:002b:00000000`00000028=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
READ_ADDRESS: 0000000000000028
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000028
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffffa8a`2f777360 fffff801`0e9e8863 : ffffdc0b`cedd9f50 00000000`00000004 00000000`00000004 00000000`00000000 : Wdf01000!FxObjectHandleGetPtr+0x71 [minkernel\wdf\framework\shared\inc\private\common\fxhandle.h @ 345]
fffffa8a`2f7773d0 fffff801`10ca986e : 00000000`00000000 00000000`00000000 00000000`00000004 ffffdc0b`e4c68960 : Wdf01000!imp_WdfWorkItemFlush+0x23 [minkernel\wdf\framework\shared\core\fxworkitemapi.cpp @ 256]
fffffa8a`2f777420 fffff801`0e9e8a0f : ffffdc0b`e4c59e28 fffffa8a`2f777600 00000000`00000004 00000000`00000001 : USBXHCI!Controller_WdfEvtDeviceD0Exit+0x1ce
fffffa8a`2f777480 fffff801`0e9e0b71 : ffffdc0b`e4c59e28 fffffa8a`2f777600 00000000`00000000 00000000`00000001 : Wdf01000!FxPnpDeviceD0Exit::InvokeClient+0x2f [minkernel\wdf\framework\shared\irphandlers\pnp\pnpcallbacks.cpp @ 285]
fffffa8a`2f7774e0 fffff801`0e9ec115 : 00000000`00000000 00000000`00000000 00000000`00000004 ffffdc0b`e4c598b0 : Wdf01000!FxPrePostCallback::InvokeStateless+0x2d [minkernel\wdf\framework\shared\irphandlers\pnp\cxpnppowercallbacks.cpp @ 408]
fffffa8a`2f777510 fffff801`0e9e12eb : 00000000`00000000 fffffa8a`2f7776b0 00000000`00000380 00000000`00000000 : Wdf01000!FxPkgPnp:owerGotoDxIoStoppedCommon+0x169 [minkernel\wdf\framework\shared\irphandlers\pnp\powerstatemachine.cpp @ 3100]
fffffa8a`2f777580 fffff801`0e9e2546 : 00000000`0000031c 00000000`00000b20 ffffdc0b`e4c598b0 00000000`00000359 : Wdf01000!FxPkgPnp:owerGotoDNotZeroIoStopped+0xb [minkernel\wdf\framework\shared\irphandlers\pnp\powerstatemachine.cpp @ 2842]
fffffa8a`2f7775b0 fffff801`0e9e22fa : 00000000`00000002 ffffdc0b`e4c598b0 ffffdc0b`e4c598b0 00000000`00000000 : Wdf01000!FxPkgPnp:owerEnterNewState+0x156 [minkernel\wdf\framework\shared\irphandlers\pnp\powerstatemachine.cpp @ 1699]
fffffa8a`2f777710 fffff801`0e9e1861 : ffffdc0b`e4c598b0 00000000`00000000 00000000`00000002 00000000`00000000 : Wdf01000!FxPkgPnp:owerProcessEventInner+0xea [minkernel\wdf\framework\shared\irphandlers\pnp\powerstatemachine.cpp @ 1615]
fffffa8a`2f777790 fffff801`0e9e1085 : 00000000`00000000 fffffa8a`2f777910 ffffdc0b`e4c598b0 ffffdc0b`e4c6bd10 : Wdf01000!FxPkgPnp:owerProcessEvent+0x1d1 [minkernel\wdf\framework\shared\irphandlers\pnp\powerstatemachine.cpp @ 1394]
fffffa8a`2f777820 fffff801`0e9e1005 : ffffdc0b`e4c598b0 fffffa8a`2f7778e8 00000000`00000004 00000000`00000000 : Wdf01000!FxPkgFdo:ispatchDeviceSetPower+0x75 [minkernel\wdf\framework\shared\irphandlers\pnp\fdopower.cpp @ 350]
fffffa8a`2f777870 fffff801`0e9dcbb0 : ffffdc0b`e4c598b0 ffffdc0b`e4c6bba0 00000000`00000001 ffffdc0b`ed04b140 : Wdf01000!FxPkgFdo::_DispatchSetPower+0x25 [minkernel\wdf\framework\shared\irphandlers\pnp\fdopower.cpp @ 120]
fffffa8a`2f7778a0 fffff801`0e9e3674 : ffffdc0b`ce4e7ad0 ffffdc0b`e4c6bd10 fffff801`10d00460 00000000`00000002 : Wdf01000!FxPkgPnp:ispatch+0xb0 [minkernel\wdf\framework\shared\irphandlers\pnp\fxpkgpnp.cpp @ 765]
fffffa8a`2f777910 fffff801`0e9e3604 : ffffdc0b`ce4e7ad0 ffffdc0b`e4c6bd10 ffffdc0b`e4c6bba0 fffff801`0c023340 : Wdf01000!DispatchWorker+0x54 [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1592]
fffffa8a`2f777940 fffff801`0e9e3785 : ffffdc0b`e4c6ccc0 000023f4`1b394458 ffffdc0b`ce4e7ad0 fffff801`0b78aafb : Wdf01000!FxDevice:ispatchPreprocessedIrp+0x88 [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1654]
fffffa8a`2f777980 fffff801`10caaa2a : ffffdc0b`e4c6bba0 ffffdc0b`e4c68960 ffffdc0b`e4c6be90 fffffa8a`2f777b10 : Wdf01000!imp_WdfDeviceWdmDispatchPreprocessedIrp+0x65 [minkernel\wdf\framework\shared\core\km\fxdeviceapikm.cpp @ 258]
fffffa8a`2f7779c0 fffff801`0e9da977 : ffffdc0b`ce4e7ad0 00000000`00000016 ffffdc0b`e4c6bba0 fffff801`0c023360 : USBXHCI!Controller_WdfEvtPreprocessSetPowerIrp+0x13a
fffffa8a`2f777a10 fffff801`0b78a529 : fffffa8a`2f777b10 00000000`00000000 00000000`00000000 ffffdc0b`ed04b040 : Wdf01000!FxDevice:ispatchWithLock+0x267 [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1447]
fffffa8a`2f777a70 fffff801`0b746735 : ffffffff`fa0a1f00 fffff801`0b78a350 ffffdc0b`e8efd0f0 00000000`00000093 : nt!PopIrpWorker+0x1d9
fffffa8a`2f777b10 fffff801`0b7e51b8 : ffffaa81`d7e00180 ffffdc0b`ed04b040 fffff801`0b7466e0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffffa8a`2f777b60 00000000`00000000 : fffffa8a`2f778000 fffffa8a`2f771000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: USBXHCI!Controller_WdfEvtDeviceD0Exit+1ce
MODULE_NAME: USBXHCI
IMAGE_NAME: USBXHCI.SYS
IMAGE_VERSION: 10.0.19041.329
STACK_COMMAND: .cxr 0xfffffa8a2f776960 ; kb
BUCKET_ID_FUNC_OFFSET: 1ce
FAILURE_BUCKET_ID: AV_USBXHCI!Controller_WdfEvtDeviceD0Exit
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6550ad7c-1fed-4319-a23c-733314fa35a4}
Followup: MachineOwner
---------
Continue reading...
I'm facing some problem with my Dell XPS 15 9560,
Sometimes happens that the laptop crashes at boot up and then when it restarts it just works fine for a while and then it crashes again.
it gives many errors like ACPI.sys, wdf01000.sys ecc..
I tried two times to re-install windows 10 but without any result..
hope someone could help me.
thanks!
here is the dump:
Microsoft (R) Windows Debugger Version 10.0.19041.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`23800000 PsLoadedModuleList = 0xfffff804`2442a310
Debug session time: Fri Aug 7 18:48:38.458 2020 (UTC + 1:00)
System Uptime: 0 days 0:00:07.295
Loading Kernel Symbols
...............................................................
................................................................
.................................................
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000000003c0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80425af6216, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 5
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-OIG5U93
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 29
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: d1
BUGCHECK_P1: 3c0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80425af6216
READ_ADDRESS: 00000000000003c0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
PROCESS_NAME: System
TRAP_FRAME: ffffe308b8da72b0 -- (.trap 0xffffe308b8da72b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffba0a595fda40 rbx=0000000000000000 rcx=0000000500000000
rdx=ffffba0a5c3166d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80425af6216 rsp=ffffe308b8da7440 rbp=ffffba0a7166c300
r8=0000000000000000 r9=0000000000000000 r10=0000000000000010
r11=ffffe308b8da74f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
ACPI!ACPIWakeRemoveDevicesAndUpdate+0xee:
fffff804`25af6216 48858bc0030000 test qword ptr [rbx+3C0h],rcx ds:00000000`000003c0=????????????????
Resetting default scope
STACK_TEXT:
ffffe308`b8da7168 fffff804`23befa29 : 00000000`0000000a 00000000`000003c0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffe308`b8da7170 fffff804`23bebd29 : 00000000`00000000 00000000`00000005 00000000`00000008 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffe308`b8da72b0 fffff804`25af6216 : fffff804`25b72c40 00000000`00000a9d 00000000`00000002 ffffba0a`709770f0 : nt!KiPageFault+0x469
ffffe308`b8da7440 fffff804`25af55ac : ffffba0a`592bbbe0 ffffba0a`7166c3d0 ffffba0a`7166c530 00000000`00000002 : ACPI!ACPIWakeRemoveDevicesAndUpdate+0xee
ffffe308`b8da74c0 fffff804`25ad13a0 : ffffba0a`592bbbe0 ffffba0a`7166c300 ffffba0a`7166c530 00000000`00000000 : ACPI!ACPIWakeEmptyRequestQueue+0x50
ffffe308`b8da7500 fffff804`23a46d45 : 00000000`00000007 ffffba0a`70958248 ffffba0a`70958060 ffffba0a`7166c3d0 : ACPI!ACPIDispatchIrp+0x390
ffffe308`b8da7580 fffff804`3a5d802a : ffffba0a`70958248 ffffba0a`70958060 ffffba0a`7166c3d0 ffffba0a`709581b0 : nt!IofCallDriver+0x55
ffffe308`b8da75c0 fffff804`3a5d6636 : ffffba0a`70958060 ffffba0a`7166c530 ffffba0a`709581b0 fffff804`3a5efa00 : RtsPer+0x9802a
ffffe308`b8da7610 fffff804`23a46d45 : ffffba0a`70958060 00000000`00000000 ffffe308`b8da7750 00000000`69706e04 : RtsPer+0x96636
ffffe308`b8da7660 fffff804`23ea64cc : 00000000`00000000 ffffba0a`70958060 ffffe308`b8da7750 00000000`00000000 : nt!IofCallDriver+0x55
ffffe308`b8da76a0 fffff804`23f38d11 : ffffba0a`5c320060 ffffba0a`5c320060 ffffba0a`5c3554a0 00000000`00000017 : nt!IopSynchronousCall+0xf8
ffffe308`b8da7710 fffff804`23f3b2e0 : ffffe60a`cf68a150 00000000`00000000 00000000`0000030a 00000000`00000308 : nt!IopRemoveDevice+0x105
ffffe308`b8da77c0 fffff804`23f38914 : ffffba0a`5c3554a0 00000000`00000000 00000000`00000000 fffff804`23f3885b : nt!PnpSurpriseRemoveLockedDeviceNode+0xb0
ffffe308`b8da7820 fffff804`23f3860f : ffffba0a`5c3554a0 ffffe308`b8da78a0 00000000`00000000 fffff804`23f382a9 : nt!PnpDeleteLockedDeviceNode+0x88
ffffe308`b8da7860 fffff804`23f37332 : ffffba0a`5c320060 00000001`00000002 00000000`00000000 00000000`00000000 : nt!PnpDeleteLockedDeviceNodes+0xf7
ffffe308`b8da78e0 fffff804`23f35447 : ffffe308`b8da7a20 ffffba0a`5c355400 ffffe308`b8da7a00 ffffe60a`00000001 : nt!PnpProcessQueryRemoveAndEject+0x1da
ffffe308`b8da79c0 fffff804`23ed3f3e : ffffe60a`cf68a150 ffffe60a`d1b960f0 ffffba0a`592ad000 00000000`00000000 : nt!PnpProcessTargetDeviceEvent+0xeb
ffffe308`b8da79f0 fffff804`23a33f45 : ffffba0a`703f4040 ffffba0a`703f4040 ffffba0a`592ad010 ffffba0a`7097d190 : nt!PnpDeviceEventWorker+0x2ce
ffffe308`b8da7a70 fffff804`23b46735 : ffffba0a`703f4040 00000000`00000080 ffffba0a`592c2040 000fa46f`b19bbfff : nt!ExpWorkerThread+0x105
ffffe308`b8da7b10 fffff804`23be51b8 : fffff804`1e735180 ffffba0a`703f4040 fffff804`23b466e0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffe308`b8da7b60 00000000`00000000 : ffffe308`b8da8000 ffffe308`b8da1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: RtsPer+9802a
MODULE_NAME: RtsPer
IMAGE_NAME: RtsPer.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9802a
FAILURE_BUCKET_ID: AV_RtsPer!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5972166a-a6f4-1eee-ba85-d5534a099133}
Followup: MachineOwner
---------
0: kd>
it crashed again and I did another dump:
Microsoft (R) Windows Debugger Version 10.0.19041.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`0b400000 PsLoadedModuleList = 0xfffff801`0c02a310
Debug session time: Fri Aug 7 19:45:09.602 2020 (UTC + 1:00)
System Uptime: 0 days 0:01:03.440
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
...............
For analysis of this file, run !analyze -v
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8010e9dbe51, The address that the exception occurred at
Arg3: fffffa8a2f777128, Exception Record Address
Arg4: fffffa8a2f776960, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullClassPtr
Key : AV.Fault
Value: Read
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-OIG5U93
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 19
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8010e9dbe51
BUGCHECK_P3: fffffa8a2f777128
BUGCHECK_P4: fffffa8a2f776960
EXCEPTION_RECORD: fffffa8a2f777128 -- (.exr 0xfffffa8a2f777128)
ExceptionAddress: fffff8010e9dbe51 (Wdf01000!FxObjectHandleGetPtrQI+0x0000000000000023)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000028
Attempt to read from address 0000000000000028
CONTEXT: fffffa8a2f776960 -- (.cxr 0xfffffa8a2f776960)
rax=0000000000000000 rbx=ffffdc0bcecfcda0 rcx=ffffdc0bcecfcda0
rdx=fffffa8a2f7773b0 rsi=0000000000001025 rdi=000023f431303258
rip=fffff8010e9dbe51 rsp=fffffa8a2f777360 rbp=0000000000000000
r8=0000000000001025 r9=fffffa8a2f777420 r10=fffff8010b622930
r11=fffff780000003b0 r12=fffff80110d00460 r13=fffff80110cf26f0
r14=0000000000000001 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
Wdf01000!FxObjectHandleGetPtrQI+0x23 [inlined in Wdf01000!FxObjectHandleGetPtr+0x71]:
fffff801`0e9dbe51 488b4028 mov rax,qword ptr [rax+28h] ds:002b:00000000`00000028=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
READ_ADDRESS: 0000000000000028
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000028
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffffa8a`2f777360 fffff801`0e9e8863 : ffffdc0b`cedd9f50 00000000`00000004 00000000`00000004 00000000`00000000 : Wdf01000!FxObjectHandleGetPtr+0x71 [minkernel\wdf\framework\shared\inc\private\common\fxhandle.h @ 345]
fffffa8a`2f7773d0 fffff801`10ca986e : 00000000`00000000 00000000`00000000 00000000`00000004 ffffdc0b`e4c68960 : Wdf01000!imp_WdfWorkItemFlush+0x23 [minkernel\wdf\framework\shared\core\fxworkitemapi.cpp @ 256]
fffffa8a`2f777420 fffff801`0e9e8a0f : ffffdc0b`e4c59e28 fffffa8a`2f777600 00000000`00000004 00000000`00000001 : USBXHCI!Controller_WdfEvtDeviceD0Exit+0x1ce
fffffa8a`2f777480 fffff801`0e9e0b71 : ffffdc0b`e4c59e28 fffffa8a`2f777600 00000000`00000000 00000000`00000001 : Wdf01000!FxPnpDeviceD0Exit::InvokeClient+0x2f [minkernel\wdf\framework\shared\irphandlers\pnp\pnpcallbacks.cpp @ 285]
fffffa8a`2f7774e0 fffff801`0e9ec115 : 00000000`00000000 00000000`00000000 00000000`00000004 ffffdc0b`e4c598b0 : Wdf01000!FxPrePostCallback::InvokeStateless+0x2d [minkernel\wdf\framework\shared\irphandlers\pnp\cxpnppowercallbacks.cpp @ 408]
fffffa8a`2f777510 fffff801`0e9e12eb : 00000000`00000000 fffffa8a`2f7776b0 00000000`00000380 00000000`00000000 : Wdf01000!FxPkgPnp:owerGotoDxIoStoppedCommon+0x169 [minkernel\wdf\framework\shared\irphandlers\pnp\powerstatemachine.cpp @ 3100]
fffffa8a`2f777580 fffff801`0e9e2546 : 00000000`0000031c 00000000`00000b20 ffffdc0b`e4c598b0 00000000`00000359 : Wdf01000!FxPkgPnp:owerGotoDNotZeroIoStopped+0xb [minkernel\wdf\framework\shared\irphandlers\pnp\powerstatemachine.cpp @ 2842]
fffffa8a`2f7775b0 fffff801`0e9e22fa : 00000000`00000002 ffffdc0b`e4c598b0 ffffdc0b`e4c598b0 00000000`00000000 : Wdf01000!FxPkgPnp:owerEnterNewState+0x156 [minkernel\wdf\framework\shared\irphandlers\pnp\powerstatemachine.cpp @ 1699]
fffffa8a`2f777710 fffff801`0e9e1861 : ffffdc0b`e4c598b0 00000000`00000000 00000000`00000002 00000000`00000000 : Wdf01000!FxPkgPnp:owerProcessEventInner+0xea [minkernel\wdf\framework\shared\irphandlers\pnp\powerstatemachine.cpp @ 1615]
fffffa8a`2f777790 fffff801`0e9e1085 : 00000000`00000000 fffffa8a`2f777910 ffffdc0b`e4c598b0 ffffdc0b`e4c6bd10 : Wdf01000!FxPkgPnp:owerProcessEvent+0x1d1 [minkernel\wdf\framework\shared\irphandlers\pnp\powerstatemachine.cpp @ 1394]
fffffa8a`2f777820 fffff801`0e9e1005 : ffffdc0b`e4c598b0 fffffa8a`2f7778e8 00000000`00000004 00000000`00000000 : Wdf01000!FxPkgFdo:ispatchDeviceSetPower+0x75 [minkernel\wdf\framework\shared\irphandlers\pnp\fdopower.cpp @ 350]
fffffa8a`2f777870 fffff801`0e9dcbb0 : ffffdc0b`e4c598b0 ffffdc0b`e4c6bba0 00000000`00000001 ffffdc0b`ed04b140 : Wdf01000!FxPkgFdo::_DispatchSetPower+0x25 [minkernel\wdf\framework\shared\irphandlers\pnp\fdopower.cpp @ 120]
fffffa8a`2f7778a0 fffff801`0e9e3674 : ffffdc0b`ce4e7ad0 ffffdc0b`e4c6bd10 fffff801`10d00460 00000000`00000002 : Wdf01000!FxPkgPnp:ispatch+0xb0 [minkernel\wdf\framework\shared\irphandlers\pnp\fxpkgpnp.cpp @ 765]
fffffa8a`2f777910 fffff801`0e9e3604 : ffffdc0b`ce4e7ad0 ffffdc0b`e4c6bd10 ffffdc0b`e4c6bba0 fffff801`0c023340 : Wdf01000!DispatchWorker+0x54 [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1592]
fffffa8a`2f777940 fffff801`0e9e3785 : ffffdc0b`e4c6ccc0 000023f4`1b394458 ffffdc0b`ce4e7ad0 fffff801`0b78aafb : Wdf01000!FxDevice:ispatchPreprocessedIrp+0x88 [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1654]
fffffa8a`2f777980 fffff801`10caaa2a : ffffdc0b`e4c6bba0 ffffdc0b`e4c68960 ffffdc0b`e4c6be90 fffffa8a`2f777b10 : Wdf01000!imp_WdfDeviceWdmDispatchPreprocessedIrp+0x65 [minkernel\wdf\framework\shared\core\km\fxdeviceapikm.cpp @ 258]
fffffa8a`2f7779c0 fffff801`0e9da977 : ffffdc0b`ce4e7ad0 00000000`00000016 ffffdc0b`e4c6bba0 fffff801`0c023360 : USBXHCI!Controller_WdfEvtPreprocessSetPowerIrp+0x13a
fffffa8a`2f777a10 fffff801`0b78a529 : fffffa8a`2f777b10 00000000`00000000 00000000`00000000 ffffdc0b`ed04b040 : Wdf01000!FxDevice:ispatchWithLock+0x267 [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1447]
fffffa8a`2f777a70 fffff801`0b746735 : ffffffff`fa0a1f00 fffff801`0b78a350 ffffdc0b`e8efd0f0 00000000`00000093 : nt!PopIrpWorker+0x1d9
fffffa8a`2f777b10 fffff801`0b7e51b8 : ffffaa81`d7e00180 ffffdc0b`ed04b040 fffff801`0b7466e0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffffa8a`2f777b60 00000000`00000000 : fffffa8a`2f778000 fffffa8a`2f771000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: USBXHCI!Controller_WdfEvtDeviceD0Exit+1ce
MODULE_NAME: USBXHCI
IMAGE_NAME: USBXHCI.SYS
IMAGE_VERSION: 10.0.19041.329
STACK_COMMAND: .cxr 0xfffffa8a2f776960 ; kb
BUCKET_ID_FUNC_OFFSET: 1ce
FAILURE_BUCKET_ID: AV_USBXHCI!Controller_WdfEvtDeviceD0Exit
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6550ad7c-1fed-4319-a23c-733314fa35a4}
Followup: MachineOwner
---------
Continue reading...