询问者
同款电脑win10系统出现多次蓝屏报错,需要帮助,谢谢。

问题
-
各位技术大神好,近期同型号的电脑出现蓝屏报错,通过代码找寻不到确切的解决办法,求帮助。感谢。
相关参数如下:电脑品牌:dell 笔记本 系统win10企业版
错误信息1:
错误检测信息:SYSTEM_SERVICE_EXCEPTION
错误检测码:0x0000003b
参数1:00000000`c0000005
参数2:ffff9613`34884f3c
参数3:fffffe03`97496d80
参数4:00000000`00000000
导致崩溃的驱动程序:win32kfull.sys
导致崩溃的代码地址:win32kfull.sys+84f3c
崩溃地址:ntoskrnl.exe+175820
错误2:
错误检测信息:SYSTEM_SERVICE_EXCEPTION
错误检测码:0x0000003b
参数1:00000000`80000003
参数2:fffff800`d234ee45
参数3:ffff9386`3cd3d660
参数4:00000000`00000000
导致崩溃的驱动程序:ntoskrnl.exe
导致崩溃的代码地址:ntoskrnl.exe+17e310
崩溃地址:ntoskrnl.exe+17e310
全部回复
-
你好,
根据你提供的信息,无论是win32kfull.sys还是ntoskrnl.exe,都指向的是Windows系统内核文件,它们是导致蓝屏的直接原因,但不并不是根本原因。
我们需要分析蓝屏时产生的minidump文件来确定真正导致蓝屏问题的因素。
考虑到是同一型号的电脑出现蓝屏,建议先将该型号电脑的显示适配器卸载,禁用所有启动项,重启。到Dell官网搜索该型号笔记本的Win10显卡驱动,安装。
观察一段时间看是否蓝屏。
此外,关闭自动下载制造商应用设置。
将系统更新到最新版本。
如果认为回帖者的回答有所帮助,请将之标记为答复,这样可以帮助更多的用户获取有效信息。- 已编辑 Teemo TangMicrosoft contingent staff 2018年7月18日 6:45
-
我这边用WinDbg分析出来的结果和你是一样的。还是先试试重装显卡驱动和更新系统吧。
另外,为了避免因软件冲突导致的蓝屏,请执行干净启动。
Loading User Symbols Loading unloaded module list .................................................. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, ffff961334884f3c, fffffe0397496d80, 0} Probably caused by : win32kfull.sys ( win32kfull!GrePatBltLockedDC+328 ) Followup: MachineOwner --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: ffff961334884f3c, Address of the instruction which caused the bugcheck Arg3: fffffe0397496d80, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 16299.431.amd64fre.rs3_release_svc_escrow.180502-1908 SYSTEM_MANUFACTURER: Dell Inc. SYSTEM_PRODUCT_NAME: Inspiron 13-7378 SYSTEM_SKU: 0741 BIOS_VENDOR: Dell Inc. BIOS_VERSION: 1.6.1 BIOS_DATE: 02/13/2017 BASEBOARD_MANUFACTURER: Dell Inc. BASEBOARD_PRODUCT: 0NY20N BASEBOARD_VERSION: A00 DUMP_TYPE: 2 BUGCHECK_P1: c0000005 BUGCHECK_P2: ffff961334884f3c BUGCHECK_P3: fffffe0397496d80 BUGCHECK_P4: 0 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s. FAULTING_IP: win32kfull!GrePatBltLockedDC+328 ffff9613`34884f3c 488b80200b0000 mov rax,qword ptr [rax+0B20h] CONTEXT: fffffe0397496d80 -- (.cxr 0xfffffe0397496d80) rax=0000000000000000 rbx=0000000000000001 rcx=ffff965f86168c38 rdx=ffff965f86168600 rsi=000000000000f0f0 rdi=0000000000ffffff rip=ffff961334884f3c rsp=fffffe0397497770 rbp=0000000000ffffff r8=0000000000000000 r9=0000000000000000 r10=000000007fffffff r11=000000000000ff00 r12=fffffe03974979f0 r13=ffff965f86168c40 r14=ffff965f8a652500 r15=fffffe0397497940 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 win32kfull!GrePatBltLockedDC+0x328: ffff9613`34884f3c 488b80200b0000 mov rax,qword ptr [rax+0B20h] ds:002b:00000000`00000b20=???????????????? Resetting default scope CPU_COUNT: 4 CPU_MHZ: a98 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 8e CPU_STEPPING: 9 CPU_MICROCODE: 6,8e,9,0 (F,M,S,R) SIG: 62'00000000 (cache) 62'00000000 (init) BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXPNP: 1 (!blackboxpnp) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: UniAccessAgentTray.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: VLIUTA35VM ANALYSIS_SESSION_TIME: 07-19-2018 09:24:33.0020 ANALYSIS_VERSION: 10.0.17134.12 amd64fre LAST_CONTROL_TRANSFER: from ffff961334884acf to ffff961334884f3c STACK_TEXT: fffffe03`97497770 ffff9613`34884acf : 00000000`00000000 00000000`00000000 00000000`00900010 ffff965f`0000f0f0 : win32kfull!GrePatBltLockedDC+0x328 fffffe03`97497820 ffff9613`34885b62 : 00000000`00000000 ffff9613`34bc671e ffff965f`00000001 00003635`00000001 : win32kfull!GrePolyPatBltInternal+0x29f fffffe03`974979a0 ffff9613`34886ae0 : ffff965f`80c07a20 ffff965f`80c07a20 00000000`00100075 ffff9613`34886d05 : win32kfull!GrePolyPatBlt+0x76 fffffe03`97497a10 ffff9613`34886c21 : ffff965f`80c07a20 ffff965f`80c07a20 00000000`00100075 fffffe03`97497b21 : win32kfull!FillRect+0x54 fffffe03`97497a70 ffff9613`34886d9a : 00000000`00000000 ffff965f`80c07a20 00000000`00100075 00000000`14014ab9 : win32kfull!xxxPaintRect+0x95 fffffe03`97497aa0 ffff9613`3488a716 : fffff7b7`00001ed0 ffffaf0c`8aa6a001 ffffc181`e3e83180 00000000`00000000 : win32kfull!xxxFillWindow+0x66 fffffe03`97497b20 ffff9613`34836944 : 00000000`00000000 fffffe03`97497c60 fffff800`46d2fe00 ffffaf0c`8db84aa0 : win32kfull!xxxDWP_EraseBkgnd+0x3e fffffe03`97497b50 ffff9613`3483631a : 00000000`14014ab9 00000000`00000000 00000000`14014ab9 00000000`00000000 : win32kfull!xxxRealDefWindowProc+0x504 fffffe03`97497ce0 ffff9613`3483c57e : ffff965f`80c07a20 00000000`0000029e 00000000`0015a3f8 00000000`00000014 : win32kfull!xxxWrapRealDefWindowProc+0x5a fffffe03`97497d50 fffff800`46d91e43 : ffffaf0c`94d84700 fffffe03`97497ec0 00000000`0015a3f8 00000000`00077670 : win32kfull!NtUserMessageCall+0xfe fffffe03`97497dd0 00007ffe`0fc41164 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0015a3d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`0fc41164 THREAD_SHA1_HASH_MOD_FUNC: df694f7ca6860a19daaa17cc16632676b48c7254 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 295d6e635acd7359df2ad4d0627b951c7ebe7943 THREAD_SHA1_HASH_MOD: 9bfbef1fcb9b58b998709416e6cd6a5af30384fd FOLLOWUP_IP: win32kfull!GrePatBltLockedDC+328 ffff9613`34884f3c 488b80200b0000 mov rax,qword ptr [rax+0B20h] FAULT_INSTR_CODE: 20808b48 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: win32kfull!GrePatBltLockedDC+328 FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32kfull IMAGE_NAME: win32kfull.sys DEBUG_FLR_IMAGE_TIMESTAMP: 2d1f174e IMAGE_VERSION: 10.0.16299.492 STACK_COMMAND: .cxr 0xfffffe0397496d80 ; kb BUCKET_ID_FUNC_OFFSET: 328 FAILURE_BUCKET_ID: 0x3B_win32kfull!GrePatBltLockedDC BUCKET_ID: 0x3B_win32kfull!GrePatBltLockedDC PRIMARY_PROBLEM_CLASS: 0x3B_win32kfull!GrePatBltLockedDC TARGET_TIME: 2018-07-04T07:34:45.000Z OSBUILD: 16299 OSSERVICEPACK: 492 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2018-06-08 13:54:42 BUILDDATESTAMP_STR: 180502-1908 BUILDLAB_STR: rs3_release_svc_escrow BUILDOSVER_STR: 10.0.16299.431.amd64fre.rs3_release_svc_escrow.180502-1908 ANALYSIS_SESSION_ELAPSED_TIME: 1ff3 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x3b_win32kfull!grepatbltlockeddc FAILURE_ID_HASH: {0c7332fc-7f90-3752-04a2-1a633e747eac} Followup: MachineOwner --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: ffff961334884f3c, Address of the instruction which caused the bugcheck Arg3: fffffe0397496d80, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 16299.431.amd64fre.rs3_release_svc_escrow.180502-1908 SYSTEM_MANUFACTURER: Dell Inc. SYSTEM_PRODUCT_NAME: Inspiron 13-7378 SYSTEM_SKU: 0741 BIOS_VENDOR: Dell Inc. BIOS_VERSION: 1.6.1 BIOS_DATE: 02/13/2017 BASEBOARD_MANUFACTURER: Dell Inc. BASEBOARD_PRODUCT: 0NY20N BASEBOARD_VERSION: A00 DUMP_TYPE: 2 BUGCHECK_P1: c0000005 BUGCHECK_P2: ffff961334884f3c BUGCHECK_P3: fffffe0397496d80 BUGCHECK_P4: 0 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s. FAULTING_IP: win32kfull!GrePatBltLockedDC+328 ffff9613`34884f3c 488b80200b0000 mov rax,qword ptr [rax+0B20h] CONTEXT: fffffe0397496d80 -- (.cxr 0xfffffe0397496d80) rax=0000000000000000 rbx=0000000000000001 rcx=ffff965f86168c38 rdx=ffff965f86168600 rsi=000000000000f0f0 rdi=0000000000ffffff rip=ffff961334884f3c rsp=fffffe0397497770 rbp=0000000000ffffff r8=0000000000000000 r9=0000000000000000 r10=000000007fffffff r11=000000000000ff00 r12=fffffe03974979f0 r13=ffff965f86168c40 r14=ffff965f8a652500 r15=fffffe0397497940 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 win32kfull!GrePatBltLockedDC+0x328: ffff9613`34884f3c 488b80200b0000 mov rax,qword ptr [rax+0B20h] ds:002b:00000000`00000b20=???????????????? Resetting default scope CPU_COUNT: 4 CPU_MHZ: a98 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 8e CPU_STEPPING: 9 CPU_MICROCODE: 6,8e,9,0 (F,M,S,R) SIG: 62'00000000 (cache) 62'00000000 (init) BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXPNP: 1 (!blackboxpnp) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: UniAccessAgentTray.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: VLIUTA35VM ANALYSIS_SESSION_TIME: 07-19-2018 09:24:41.0219 ANALYSIS_VERSION: 10.0.17134.12 amd64fre LAST_CONTROL_TRANSFER: from ffff961334884acf to ffff961334884f3c STACK_TEXT: fffffe03`97497770 ffff9613`34884acf : 00000000`00000000 00000000`00000000 00000000`00900010 ffff965f`0000f0f0 : win32kfull!GrePatBltLockedDC+0x328 fffffe03`97497820 ffff9613`34885b62 : 00000000`00000000 ffff9613`34bc671e ffff965f`00000001 00003635`00000001 : win32kfull!GrePolyPatBltInternal+0x29f fffffe03`974979a0 ffff9613`34886ae0 : ffff965f`80c07a20 ffff965f`80c07a20 00000000`00100075 ffff9613`34886d05 : win32kfull!GrePolyPatBlt+0x76 fffffe03`97497a10 ffff9613`34886c21 : ffff965f`80c07a20 ffff965f`80c07a20 00000000`00100075 fffffe03`97497b21 : win32kfull!FillRect+0x54 fffffe03`97497a70 ffff9613`34886d9a : 00000000`00000000 ffff965f`80c07a20 00000000`00100075 00000000`14014ab9 : win32kfull!xxxPaintRect+0x95 fffffe03`97497aa0 ffff9613`3488a716 : fffff7b7`00001ed0 ffffaf0c`8aa6a001 ffffc181`e3e83180 00000000`00000000 : win32kfull!xxxFillWindow+0x66 fffffe03`97497b20 ffff9613`34836944 : 00000000`00000000 fffffe03`97497c60 fffff800`46d2fe00 ffffaf0c`8db84aa0 : win32kfull!xxxDWP_EraseBkgnd+0x3e fffffe03`97497b50 ffff9613`3483631a : 00000000`14014ab9 00000000`00000000 00000000`14014ab9 00000000`00000000 : win32kfull!xxxRealDefWindowProc+0x504 fffffe03`97497ce0 ffff9613`3483c57e : ffff965f`80c07a20 00000000`0000029e 00000000`0015a3f8 00000000`00000014 : win32kfull!xxxWrapRealDefWindowProc+0x5a fffffe03`97497d50 fffff800`46d91e43 : ffffaf0c`94d84700 fffffe03`97497ec0 00000000`0015a3f8 00000000`00077670 : win32kfull!NtUserMessageCall+0xfe fffffe03`97497dd0 00007ffe`0fc41164 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0015a3d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`0fc41164 THREAD_SHA1_HASH_MOD_FUNC: df694f7ca6860a19daaa17cc16632676b48c7254 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 295d6e635acd7359df2ad4d0627b951c7ebe7943 THREAD_SHA1_HASH_MOD: 9bfbef1fcb9b58b998709416e6cd6a5af30384fd FOLLOWUP_IP: win32kfull!GrePatBltLockedDC+328 ffff9613`34884f3c 488b80200b0000 mov rax,qword ptr [rax+0B20h] FAULT_INSTR_CODE: 20808b48 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: win32kfull!GrePatBltLockedDC+328 FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32kfull IMAGE_NAME: win32kfull.sys DEBUG_FLR_IMAGE_TIMESTAMP: 2d1f174e IMAGE_VERSION: 10.0.16299.492 STACK_COMMAND: .cxr 0xfffffe0397496d80 ; kb BUCKET_ID_FUNC_OFFSET: 328 FAILURE_BUCKET_ID: 0x3B_win32kfull!GrePatBltLockedDC BUCKET_ID: 0x3B_win32kfull!GrePatBltLockedDC PRIMARY_PROBLEM_CLASS: 0x3B_win32kfull!GrePatBltLockedDC TARGET_TIME: 2018-07-04T07:34:45.000Z OSBUILD: 16299 OSSERVICEPACK: 492 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2018-06-08 13:54:42 BUILDDATESTAMP_STR: 180502-1908 BUILDLAB_STR: rs3_release_svc_escrow BUILDOSVER_STR: 10.0.16299.431.amd64fre.rs3_release_svc_escrow.180502-1908 ANALYSIS_SESSION_ELAPSED_TIME: 1f9a ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x3b_win32kfull!grepatbltlockeddc FAILURE_ID_HASH: {0c7332fc-7f90-3752-04a2-1a633e747eac} Followup: MachineOwner --------- ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {80000003, fffff800d234ee45, ffff93863cd3d660, 0} Probably caused by : ntkrnlmp.exe ( nt!KeCheckStackAndTargetAddress+45 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 0000000080000003, Exception code that caused the bugcheck Arg2: fffff800d234ee45, Address of the instruction which caused the bugcheck Arg3: ffff93863cd3d660, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 16299.431.amd64fre.rs3_release_svc_escrow.180502-1908 SYSTEM_MANUFACTURER: Dell Inc. SYSTEM_PRODUCT_NAME: Inspiron 13-7378 SYSTEM_SKU: 0741 BIOS_VENDOR: Dell Inc. BIOS_VERSION: 1.6.1 BIOS_DATE: 02/13/2017 BASEBOARD_MANUFACTURER: Dell Inc. BASEBOARD_PRODUCT: 0NY20N BASEBOARD_VERSION: A00 DUMP_TYPE: 2 BUGCHECK_P1: 80000003 BUGCHECK_P2: fffff800d234ee45 BUGCHECK_P3: ffff93863cd3d660 BUGCHECK_P4: 0 EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more arguments are invalid FAULTING_IP: nt!KeCheckStackAndTargetAddress+45 fffff800`d234ee45 cc int 3 CONTEXT: ffff93863cd3d660 -- (.cxr 0xffff93863cd3d660) rax=ffff93863cd3e078 rbx=ffff93863cd3f268 rcx=0000000000000000 rdx=ffff93863cd3f268 rsi=ffff93863cd3f390 rdi=0000000000000000 rip=fffff800d234ee45 rsp=ffff93863cd3e050 rbp=ffff93863cd3f028 r8=ffff93863cd3e870 r9=ffff93863cd3e1f0 r10=ffff93863cd3f390 r11=0000000000000188 r12=ffff93863cd3f390 r13=ffff93863cd3f028 r14=ffff93863cd3e1f0 r15=ffff93863cd3e710 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000246 nt!KeCheckStackAndTargetAddress+0x45: fffff800`d234ee45 cc int 3 Resetting default scope CPU_COUNT: 4 CPU_MHZ: a98 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 8e CPU_STEPPING: 9 CPU_MICROCODE: 6,8e,9,0 (F,M,S,R) SIG: 62'00000000 (cache) 62'00000000 (init) BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXPNP: 1 (!blackboxpnp) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: LvaNac.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: VLIUTA35VM ANALYSIS_SESSION_TIME: 07-19-2018 09:11:14.0753 ANALYSIS_VERSION: 10.0.17134.12 amd64fre LAST_CONTROL_TRANSFER: from fffff800d23ee90b to fffff800d234ee45 STACK_TEXT: ffff9386`3cd3e050 fffff800`d23ee90b : ffffa987`27cd24c8 fffff800`d257d340 00000000`00000000 ffff9386`3cd3e210 : nt!KeCheckStackAndTargetAddress+0x45 ffff9386`3cd3e080 fffff800`d240d612 : fffff800`d257d340 ffff9386`3cd3f028 ffff9386`3cd3f390 fffff800`d2741508 : nt!_C_specific_handler+0x3b ffff9386`3cd3e0f0 fffff800`d2419bbd : 00000000`00000000 ffff9386`3cd3e250 ffff9386`3cd3f028 00000000`00000000 : nt!_GSHandlerCheck_SEH+0x6a ffff9386`3cd3e120 fffff800`d234e930 : 00000000`00000003 ffff9386`3cd3f028 00000000`00000003 00000000`00000000 : nt!RtlpExecuteHandlerForException+0xd ffff9386`3cd3e150 fffff800`d234f563 : ffff9386`3cd3f028 ffff9386`3cd3ed70 ffff9386`3cd3f028 ffffbe83`b524d048 : nt!RtlDispatchException+0x430 ffff9386`3cd3e840 fffff800`d2421f42 : 00000000`00000000 fffff800`d231ce63 00000000`c0000005 ffffbe83`afd60a80 : nt!KiDispatchException+0x1f3 ffff9386`3cd3eef0 fffff800`d241eabf : 00000000`00000000 ffffbe83`b52c5098 ffffbe83`b7b7d3f8 00000000`00000000 : nt!KiExceptionDispatch+0xc2 ffff9386`3cd3f0d0 00000000`00000000 : fffff80f`64cecd5f ffffbe83`00000000 ffffbe83`b524d000 ffffbe83`b487f330 : nt!KiPageFault+0x3ff THREAD_SHA1_HASH_MOD_FUNC: 66fa37f718723b37eb0151da7b22088cf61f746a THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f3ba44f218d058b54b0b53837f870f719b6343b8 THREAD_SHA1_HASH_MOD: cb5f414824c2521bcc505eaa03e92fa10922dad8 FOLLOWUP_IP: nt!KeCheckStackAndTargetAddress+45 fffff800`d234ee45 cc int 3 FAULT_INSTR_CODE: cf8b48cc SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!KeCheckStackAndTargetAddress+45 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 5b35e5e4 IMAGE_VERSION: 10.0.16299.547 STACK_COMMAND: .cxr 0xffff93863cd3d660 ; kb BUCKET_ID_FUNC_OFFSET: 45 FAILURE_BUCKET_ID: 0x3B_nt!KeCheckStackAndTargetAddress BUCKET_ID: 0x3B_nt!KeCheckStackAndTargetAddress PRIMARY_PROBLEM_CLASS: 0x3B_nt!KeCheckStackAndTargetAddress TARGET_TIME: 2018-07-13T06:11:57.000Z OSBUILD: 16299 OSSERVICEPACK: 547 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2018-06-29 15:55:16 BUILDDATESTAMP_STR: 180502-1908 BUILDLAB_STR: rs3_release_svc_escrow BUILDOSVER_STR: 10.0.16299.431.amd64fre.rs3_release_svc_escrow.180502-1908 ANALYSIS_SESSION_ELAPSED_TIME: 165f ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x3b_nt!kecheckstackandtargetaddress FAILURE_ID_HASH: {7b47a54f-db49-e8c8-beda-460d748ae99a} Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 0000000080000003, Exception code that caused the bugcheck Arg2: fffff800d234ee45, Address of the instruction which caused the bugcheck Arg3: ffff93863cd3d660, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 16299.431.amd64fre.rs3_release_svc_escrow.180502-1908 SYSTEM_MANUFACTURER: Dell Inc. SYSTEM_PRODUCT_NAME: Inspiron 13-7378 SYSTEM_SKU: 0741 BIOS_VENDOR: Dell Inc. BIOS_VERSION: 1.6.1 BIOS_DATE: 02/13/2017 BASEBOARD_MANUFACTURER: Dell Inc. BASEBOARD_PRODUCT: 0NY20N BASEBOARD_VERSION: A00 DUMP_TYPE: 2 BUGCHECK_P1: 80000003 BUGCHECK_P2: fffff800d234ee45 BUGCHECK_P3: ffff93863cd3d660 BUGCHECK_P4: 0 EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more arguments are invalid FAULTING_IP: nt!KeCheckStackAndTargetAddress+45 fffff800`d234ee45 cc int 3 CONTEXT: ffff93863cd3d660 -- (.cxr 0xffff93863cd3d660) rax=ffff93863cd3e078 rbx=ffff93863cd3f268 rcx=0000000000000000 rdx=ffff93863cd3f268 rsi=ffff93863cd3f390 rdi=0000000000000000 rip=fffff800d234ee45 rsp=ffff93863cd3e050 rbp=ffff93863cd3f028 r8=ffff93863cd3e870 r9=ffff93863cd3e1f0 r10=ffff93863cd3f390 r11=0000000000000188 r12=ffff93863cd3f390 r13=ffff93863cd3f028 r14=ffff93863cd3e1f0 r15=ffff93863cd3e710 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000246 nt!KeCheckStackAndTargetAddress+0x45: fffff800`d234ee45 cc int 3 Resetting default scope CPU_COUNT: 4 CPU_MHZ: a98 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 8e CPU_STEPPING: 9 CPU_MICROCODE: 6,8e,9,0 (F,M,S,R) SIG: 62'00000000 (cache) 62'00000000 (init) BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXPNP: 1 (!blackboxpnp) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: LvaNac.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: VLIUTA35VM ANALYSIS_SESSION_TIME: 07-19-2018 09:11:20.0497 ANALYSIS_VERSION: 10.0.17134.12 amd64fre LAST_CONTROL_TRANSFER: from fffff800d23ee90b to fffff800d234ee45 STACK_TEXT: ffff9386`3cd3e050 fffff800`d23ee90b : ffffa987`27cd24c8 fffff800`d257d340 00000000`00000000 ffff9386`3cd3e210 : nt!KeCheckStackAndTargetAddress+0x45 ffff9386`3cd3e080 fffff800`d240d612 : fffff800`d257d340 ffff9386`3cd3f028 ffff9386`3cd3f390 fffff800`d2741508 : nt!_C_specific_handler+0x3b ffff9386`3cd3e0f0 fffff800`d2419bbd : 00000000`00000000 ffff9386`3cd3e250 ffff9386`3cd3f028 00000000`00000000 : nt!_GSHandlerCheck_SEH+0x6a ffff9386`3cd3e120 fffff800`d234e930 : 00000000`00000003 ffff9386`3cd3f028 00000000`00000003 00000000`00000000 : nt!RtlpExecuteHandlerForException+0xd ffff9386`3cd3e150 fffff800`d234f563 : ffff9386`3cd3f028 ffff9386`3cd3ed70 ffff9386`3cd3f028 ffffbe83`b524d048 : nt!RtlDispatchException+0x430 ffff9386`3cd3e840 fffff800`d2421f42 : 00000000`00000000 fffff800`d231ce63 00000000`c0000005 ffffbe83`afd60a80 : nt!KiDispatchException+0x1f3 ffff9386`3cd3eef0 fffff800`d241eabf : 00000000`00000000 ffffbe83`b52c5098 ffffbe83`b7b7d3f8 00000000`00000000 : nt!KiExceptionDispatch+0xc2 ffff9386`3cd3f0d0 00000000`00000000 : fffff80f`64cecd5f ffffbe83`00000000 ffffbe83`b524d000 ffffbe83`b487f330 : nt!KiPageFault+0x3ff THREAD_SHA1_HASH_MOD_FUNC: 66fa37f718723b37eb0151da7b22088cf61f746a THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f3ba44f218d058b54b0b53837f870f719b6343b8 THREAD_SHA1_HASH_MOD: cb5f414824c2521bcc505eaa03e92fa10922dad8 FOLLOWUP_IP: nt!KeCheckStackAndTargetAddress+45 fffff800`d234ee45 cc int 3 FAULT_INSTR_CODE: cf8b48cc SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!KeCheckStackAndTargetAddress+45 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 5b35e5e4 IMAGE_VERSION: 10.0.16299.547 STACK_COMMAND: .cxr 0xffff93863cd3d660 ; kb BUCKET_ID_FUNC_OFFSET: 45 FAILURE_BUCKET_ID: 0x3B_nt!KeCheckStackAndTargetAddress BUCKET_ID: 0x3B_nt!KeCheckStackAndTargetAddress PRIMARY_PROBLEM_CLASS: 0x3B_nt!KeCheckStackAndTargetAddress TARGET_TIME: 2018-07-13T06:11:57.000Z OSBUILD: 16299 OSSERVICEPACK: 547 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2018-06-29 15:55:16 BUILDDATESTAMP_STR: 180502-1908 BUILDLAB_STR: rs3_release_svc_escrow BUILDOSVER_STR: 10.0.16299.431.amd64fre.rs3_release_svc_escrow.180502-1908 ANALYSIS_SESSION_ELAPSED_TIME: 1653 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x3b_nt!kecheckstackandtargetaddress FAILURE_ID_HASH: {7b47a54f-db49-e8c8-beda-460d748ae99a} Followup: MachineOwner ---------
Please remember to mark the replies as answers if they help.
If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com.