K
karol_333
After installing March 2021 update I get bsod every 10-15 minutes. Mini dump file: 032221-8156-01.dmp
How to check what driver/program causes problem?
[COLOR=rgba(30, 30, 30, 1)]For analysis of this file, run [/COLOR][COLOR=rgba(0, 0, 255, 1)]!analyze -v
[/COLOR][COLOR=rgba(30, 30, 30, 1)]nt!KeBugCheckEx:
fffff806`5eff5c50 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff806`640a2160=000000000000001e
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000094, The exception code that was not handled
Arg2: fffff8065eee8616, The address that the exception occurred at
Arg3: ffff9e8ddeaff190, Parameter 0 of the exception
Arg4: 000000000000005a, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4030
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 12717
Key : Analysis.Init.CPU.mSec
Value: 812
Key : Analysis.Init.Elapsed.mSec
Value: 36004
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000094
BUGCHECK_P2: fffff8065eee8616
BUGCHECK_P3: ffff9e8ddeaff190
BUGCHECK_P4: 5a
EXCEPTION_PARAMETER1: ffff9e8ddeaff190
EXCEPTION_PARAMETER2: 000000000000005a
BLACKBOXBSD: 1 ([/COLOR][COLOR=rgba(0, 0, 255, 1)]!blackboxbsd[/COLOR][COLOR=rgba(30, 30, 30, 1)])
BLACKBOXNTFS: 1 ([/COLOR][COLOR=rgba(0, 0, 255, 1)]!blackboxntfs[/COLOR][COLOR=rgba(30, 30, 30, 1)])
BLACKBOXPNP: 1 ([/COLOR][COLOR=rgba(0, 0, 255, 1)]!blackboxpnp[/COLOR][COLOR=rgba(30, 30, 30, 1)])
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: SearchIndexer.exe
STACK_TEXT:
fffff806`640a2158 fffff806`5f0f507e : 00000000`0000001e ffffffff`c0000094 fffff806`5eee8616 ffff9e8d`deaff190 : nt!KeBugCheckEx
fffff806`640a2160 fffff806`5effeb12 : fffff806`5f0f505c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
fffff806`640a21a0 fffff806`5ef2bff7 : fffff806`640a2710 00000000`00000000 fffff806`64094fb0 fffff806`5effcc95 : nt!RtlpExecuteHandlerForException+0x12
fffff806`640a21d0 fffff806`5ef2abe6 : fffff806`640947b8 fffff806`640a2e20 fffff806`640947b8 00000000`00000064 : nt!RtlDispatchException+0x297
fffff806`640a28f0 fffff806`5eff6ae2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
fffff806`640a2fb0 fffff806`5eff6ab0 : fffff806`5f007ca5 00000000`00000000 ffff9e8d`e22d02f0 0000a001`00000001 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff806`64094678 fffff806`5f007ca5 : 00000000`00000000 ffff9e8d`e22d02f0 0000a001`00000001 ffff9e8d`e22c9000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff806`64094680 fffff806`5f00090a : 00000000`00000001 ffffffff`ffffffff 00000000`00000000 ffff9e8d`e68daa70 : nt!KiExceptionDispatch+0x125
fffff806`64094860 fffff806`5eee8616 : fffff806`5b34e2e8 fffff806`64094aa9 fffff806`5f81eea8 00000000`00000000 : nt!KiDivideErrorFault+0x30a
fffff806`640949f0 fffff806`5eee843e : 0000017c`8bef0800 00000000`00000001 fffff806`5f8fc4e0 ffff9e8d`e0d0d920 : nt!PpmPerfSelectProcessorState+0x1a6
fffff806`64094b10 fffff806`5ee78610 : fffff806`5b349240 fffff806`64094e80 fffff806`64094cb0 fffff806`64094e80 : nt!PpmPerfSelectProcessorStates+0x5e
fffff806`64094b40 fffff806`5ee0781e : fffff806`5b349240 ffff9e8d`dcde7000 fffff806`64094ec0 fffff806`00000002 : nt!PpmCheckRun+0x40
fffff806`64094bb0 fffff806`5ee06b04 : fffff806`5b346180 00000000`00000000 00000000`00000008 00000000`00004401 : nt!KiExecuteAllDpcs+0x30e
fffff806`64094d20 fffff806`5effcc95 : 00000000`00000000 fffff806`5b346180 00000000`00000000 000001d6`5bb72a1c : nt!KiRetireDpcList+0x1f4
fffff806`64094fb0 fffff806`5effca80 : 00000000`00000000 00000000`0000005a 1e000000`00000000 6a8b2262`701c0008 : nt!KxRetireDpcList+0x5
ffff820a`783dbad0 fffff806`5effc14e : 00000000`00001917 000001d6`00000000 ffff9e8d`e0121af0 00000000`00000001 : nt!KiDispatchInterruptContinue
ffff820a`783dbb00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0x2ee
SYMBOL_NAME: nt!PpmPerfSelectProcessorState+1a6
MODULE_NAME: [/COLOR][COLOR=rgba(0, 0, 255, 1)]nt
[/COLOR][COLOR=rgba(30, 30, 30, 1)]IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.870
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1a6
FAILURE_BUCKET_ID: 0x1E_c0000094_nt!PpmPerfSelectProcessorState
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {bde8e2c9-df0d-be8a-6751-181f4d2268d0}
Followup: MachineOwner
---------[/COLOR]
Continue reading...
How to check what driver/program causes problem?
[COLOR=rgba(30, 30, 30, 1)]For analysis of this file, run [/COLOR][COLOR=rgba(0, 0, 255, 1)]!analyze -v
[/COLOR][COLOR=rgba(30, 30, 30, 1)]nt!KeBugCheckEx:
fffff806`5eff5c50 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff806`640a2160=000000000000001e
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000094, The exception code that was not handled
Arg2: fffff8065eee8616, The address that the exception occurred at
Arg3: ffff9e8ddeaff190, Parameter 0 of the exception
Arg4: 000000000000005a, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4030
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 12717
Key : Analysis.Init.CPU.mSec
Value: 812
Key : Analysis.Init.Elapsed.mSec
Value: 36004
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000094
BUGCHECK_P2: fffff8065eee8616
BUGCHECK_P3: ffff9e8ddeaff190
BUGCHECK_P4: 5a
EXCEPTION_PARAMETER1: ffff9e8ddeaff190
EXCEPTION_PARAMETER2: 000000000000005a
BLACKBOXBSD: 1 ([/COLOR][COLOR=rgba(0, 0, 255, 1)]!blackboxbsd[/COLOR][COLOR=rgba(30, 30, 30, 1)])
BLACKBOXNTFS: 1 ([/COLOR][COLOR=rgba(0, 0, 255, 1)]!blackboxntfs[/COLOR][COLOR=rgba(30, 30, 30, 1)])
BLACKBOXPNP: 1 ([/COLOR][COLOR=rgba(0, 0, 255, 1)]!blackboxpnp[/COLOR][COLOR=rgba(30, 30, 30, 1)])
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: SearchIndexer.exe
STACK_TEXT:
fffff806`640a2158 fffff806`5f0f507e : 00000000`0000001e ffffffff`c0000094 fffff806`5eee8616 ffff9e8d`deaff190 : nt!KeBugCheckEx
fffff806`640a2160 fffff806`5effeb12 : fffff806`5f0f505c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
fffff806`640a21a0 fffff806`5ef2bff7 : fffff806`640a2710 00000000`00000000 fffff806`64094fb0 fffff806`5effcc95 : nt!RtlpExecuteHandlerForException+0x12
fffff806`640a21d0 fffff806`5ef2abe6 : fffff806`640947b8 fffff806`640a2e20 fffff806`640947b8 00000000`00000064 : nt!RtlDispatchException+0x297
fffff806`640a28f0 fffff806`5eff6ae2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
fffff806`640a2fb0 fffff806`5eff6ab0 : fffff806`5f007ca5 00000000`00000000 ffff9e8d`e22d02f0 0000a001`00000001 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff806`64094678 fffff806`5f007ca5 : 00000000`00000000 ffff9e8d`e22d02f0 0000a001`00000001 ffff9e8d`e22c9000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff806`64094680 fffff806`5f00090a : 00000000`00000001 ffffffff`ffffffff 00000000`00000000 ffff9e8d`e68daa70 : nt!KiExceptionDispatch+0x125
fffff806`64094860 fffff806`5eee8616 : fffff806`5b34e2e8 fffff806`64094aa9 fffff806`5f81eea8 00000000`00000000 : nt!KiDivideErrorFault+0x30a
fffff806`640949f0 fffff806`5eee843e : 0000017c`8bef0800 00000000`00000001 fffff806`5f8fc4e0 ffff9e8d`e0d0d920 : nt!PpmPerfSelectProcessorState+0x1a6
fffff806`64094b10 fffff806`5ee78610 : fffff806`5b349240 fffff806`64094e80 fffff806`64094cb0 fffff806`64094e80 : nt!PpmPerfSelectProcessorStates+0x5e
fffff806`64094b40 fffff806`5ee0781e : fffff806`5b349240 ffff9e8d`dcde7000 fffff806`64094ec0 fffff806`00000002 : nt!PpmCheckRun+0x40
fffff806`64094bb0 fffff806`5ee06b04 : fffff806`5b346180 00000000`00000000 00000000`00000008 00000000`00004401 : nt!KiExecuteAllDpcs+0x30e
fffff806`64094d20 fffff806`5effcc95 : 00000000`00000000 fffff806`5b346180 00000000`00000000 000001d6`5bb72a1c : nt!KiRetireDpcList+0x1f4
fffff806`64094fb0 fffff806`5effca80 : 00000000`00000000 00000000`0000005a 1e000000`00000000 6a8b2262`701c0008 : nt!KxRetireDpcList+0x5
ffff820a`783dbad0 fffff806`5effc14e : 00000000`00001917 000001d6`00000000 ffff9e8d`e0121af0 00000000`00000001 : nt!KiDispatchInterruptContinue
ffff820a`783dbb00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0x2ee
SYMBOL_NAME: nt!PpmPerfSelectProcessorState+1a6
MODULE_NAME: [/COLOR][COLOR=rgba(0, 0, 255, 1)]nt
[/COLOR][COLOR=rgba(30, 30, 30, 1)]IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.870
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1a6
FAILURE_BUCKET_ID: 0x1E_c0000094_nt!PpmPerfSelectProcessorState
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {bde8e2c9-df0d-be8a-6751-181f4d2268d0}
Followup: MachineOwner
---------[/COLOR]
Continue reading...