Windows 10 Blue screen of death (BSOD) after laptop resumed from sleep mode

  • Thread starter Thread starter OktoberRain
  • Start date Start date
O

OktoberRain

Hello,


My Dell G3579 laptop crashed after waking up from sleep mode with the code SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)


Steps that lead to the crash:

- I recently experienced a lot of random blue screen of death crashes. It happened quite randomly so I updated all drivers/firmware to the latest version but it didn't help

- I read that it might be due to video driver so I uninstalled the NVIDIA graphics driver using Display Driver Uninstaller (DDU) tool and let the laptop use Microsoft graphics driver instead.

- Today the BOSD happened again right after I unplugged the external monitor and turned on the laptop from sleep mode.


How could I fix this? Thanks!


WhoCrashed result:

crash dump file: C:\WINDOWS\Minidump\032220-14687-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x76320C)
Bugcheck code: 0x1000007E (0xFFFFFFFFC0000005, 0xFFFFF8054856320C, 0xFFFF82028DCEB1C8, 0xFFFF82028DCEAA10)
Error: SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M
file path: C:\WINDOWS\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that a system thread generated an exception which the error handler did not catch.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.


System Info

Microsoft Windows 10 Home
Version 10.0.18362 Build 18362


[Conflicts/Sharing]
Resource Device
I/O Port 0x00000070-0x00000070 Motherboard resources
I/O Port 0x00000070-0x00000070 System CMOS/real time clock

I/O Port 0x00003000-0x000030FF Realtek PCIe GbE Family Controller
I/O Port 0x00003000-0x000030FF Intel(R) PCI Express Root Port #14 - A335

Memory Address 0x90000000-0x9FFFFFFF NVIDIA GeForce GTX 1050 Ti
Memory Address 0x90000000-0x9FFFFFFF Intel(R) PCIe Controller (x16) - 1901

Memory Address 0xA3000000-0xA3FFFFFF NVIDIA GeForce GTX 1050 Ti
Memory Address 0xA3000000-0xA3FFFFFF Intel(R) PCIe Controller (x16) - 1901

IRQ 16 Intel(R) Serial IO I2C Host Controller - A368
IRQ 16 High Definition Audio Controller
IRQ 16 Intel(R) Dynamic Platform and Thermal Framework Processor Participant

Memory Address 0xA4200000-0xA4203FFF Realtek PCIe GbE Family Controller
Memory Address 0xA4200000-0xA4203FFF Intel(R) PCI Express Root Port #14 - A335


[Display]

Item Value
Name NVIDIA GeForce GTX 1050 Ti
PNP Device ID PCI\VEN_10DE&DEV_1C8C&SUBSYS_086F1028&REV_A1\4&34B8EF37&0&0008
Adapter Type GeForce GTX 1050 Ti, NVIDIA compatible
Adapter Description NVIDIA GeForce GTX 1050 Ti
Adapter RAM (1,048,576) bytes
Installed Drivers C:\WINDOWS\System32\DriverStore\FileRepository\nvdm.inf_amd64_62826989f3c58c07\nvldumdx.dll,C:\WINDOWS\System32\DriverStore\FileRepository\nvdm.inf_amd64_62826989f3c58c07\nvldumdx.dll,C:\WINDOWS\System32\DriverStore\FileRepository\nvdm.inf_amd64_62826989f3c58c07\nvldumdx.dll,C:\WINDOWS\System32\DriverStore\FileRepository\nvdm.inf_amd64_62826989f3c58c07\nvldumdx.dll
Driver Version 25.21.14.2545
INF File oem51.inf (Section029 section)
Color Planes Not Available
Color Table Entries Not Available
Resolution Not Available
Bits/Pixel Not Available
Memory Address 0xA3000000-0xA3FFFFFF
Memory Address 0x90000000-0x9FFFFFFF
Memory Address 0xA0000000-0xA1FFFFFF
IRQ Channel IRQ 4294967288
Driver C:\WINDOWS\SYSTEM32\DRIVERSTORE\FILEREPOSITORY\NVDM.INF_AMD64_62826989F3C58C07\NVLDDMKM.SYS (25.21.14.2545, 19.81 MB (20,773,768 bytes), 2020-03-22 7:03 AM)

Name Intel(R) UHD Graphics 630
PNP Device ID PCI\VEN_8086&DEV_3E9B&SUBSYS_086F1028&REV_00\3&11583659&0&10
Adapter Type Intel(R) UHD Graphics Family, Intel Corporation compatible
Adapter Description Intel(R) UHD Graphics 630
Adapter RAM 1.00 GB (1,073,741,824 bytes)
Installed Drivers C:\WINDOWS\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_bfcc03e85b242a1f\igdumdim64.dll,C:\WINDOWS\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_bfcc03e85b242a1f\igd10iumd64.dll,C:\WINDOWS\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_bfcc03e85b242a1f\igd10iumd64.dll,C:\WINDOWS\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_bfcc03e85b242a1f\igd12umd64.dll
Driver Version 26.20.100.7262
INF File oem105.inf (iCFL_w10_DS section)
Color Planes Not Available
Color Table Entries 4294967296
Resolution 1920 x 1080 x 60 hertz
Bits/Pixel 32
Memory Address 0xA2000000-0xA2FFFFFF
Memory Address 0x80000000-0x8FFFFFFF
I/O Port 0x00005000-0x0000503F
IRQ Channel IRQ 4294967289
Driver C:\WINDOWS\SYSTEM32\DRIVERSTORE\FILEREPOSITORY\IIGD_DCH.INF_AMD64_BFCC03E85B242A1F\IGDKMD64.SYS (26.20.100.7262, 19.68 MB (20,631,104 bytes), 2020-01-10 6:56 AM)


[SCSI]

Item Value
Name Intel(R) Chipset SATA/PCIe RST Premium Controller
Manufacturer Intel Corporation
Status OK
PNP Device ID PCI\VEN_8086&DEV_282A&SUBSYS_086F1028&REV_10\3&11583659&0&B8
Memory Address 0xA4390000-0xA4397FFF
Memory Address 0xA43AB000-0xA43AB0FF
I/O Port 0x00005090-0x00005097
I/O Port 0x00005080-0x00005083
I/O Port 0x00005060-0x0000507F
Memory Address 0xA4300000-0xA437FFFF
IRQ Channel IRQ 4294967292
Driver C:\WINDOWS\SYSTEM32\DRIVERS\IASTORAC.SYS (17.5.0.1017, 1,009.07 KB (1,033,288 bytes), 2019-05-30 4:29 PM)

Name Microsoft Storage Spaces Controller
Manufacturer Microsoft
Status OK
PNP Device ID ROOT\SPACEPORT\0000
Driver C:\WINDOWS\SYSTEM32\DRIVERS\SPACEPORT.SYS (10.0.18362.449, 642.02 KB (657,424 bytes), 2019-11-14 2:52 AM)



WinDbg log

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8054856320c, The address that the exception occurred at
Arg3: ffff82028dceb1c8, Exception Record Address
Arg4: ffff82028dceaa10, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : AV.Fault
Value: Read


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER: Dell Inc.

SYSTEM_PRODUCT_NAME: G3 3579

SYSTEM_SKU: 086F

BIOS_VENDOR: Dell Inc.

BIOS_VERSION: 1.11.0

BIOS_DATE: 11/18/2019

BASEBOARD_MANUFACTURER: Dell Inc.

BASEBOARD_PRODUCT: 03TF0Y

BASEBOARD_VERSION: A00

DUMP_TYPE: 2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8054856320c

BUGCHECK_P3: ffff82028dceb1c8

BUGCHECK_P4: ffff82028dceaa10

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

FAULTING_IP:
nt!RtlpCopyRangeListEntry+2c
fffff805`4856320c 0f1006 movups xmm0,xmmword ptr [rsi]

EXCEPTION_RECORD: ffff82028dceb1c8 -- (.exr 0xffff82028dceb1c8)
ExceptionAddress: fffff8054856320c (nt!RtlpCopyRangeListEntry+0x000000000000002c)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000fffffffdb
Attempt to read from address 0000000fffffffdb

CONTEXT: ffff82028dceaa10 -- (.cxr 0xffff82028dceaa10)
rax=ffff8d0529dd72e0 rbx=ffff8d0529dd72e0 rcx=0000000000000028
rdx=00000000000006d0 rsi=0000000fffffffdb rdi=ffff8d052015aee0
rip=fffff8054856320c rsp=ffff82028dceb400 rbp=ffff82028dceb540
r8=0000000000000000 r9=0000000000000fff r10=ffffc880a6b80000
r11=ffff82028dceb350 r12=0000000000000001 r13=0000000000000005
r14=ffff82028dceb520 r15=ffff8d05205d0e10
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
nt!RtlpCopyRangeListEntry+0x2c:
fffff805`4856320c 0f1006 movups xmm0,xmmword ptr [rsi] ds:002b:0000000f`ffffffdb=????????????????????????????????
Resetting default scope

CPU_COUNT: c

CPU_MHZ: 8a0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: a

CPU_MICROCODE: 6,9e,a,0 (F,M,S,R) SIG: C6'00000000 (cache) C6'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 0

FOLLOWUP_IP:
nt!RtlpCopyRangeListEntry+2c
fffff805`4856320c 0f1006 movups xmm0,xmmword ptr [rsi]

BUGCHECK_STR: AV

READ_ADDRESS: fffff805483733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000fffffffdb

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: 0000000fffffffdb

ANALYSIS_SESSION_HOST: DELL-G3

ANALYSIS_SESSION_TIME: 03-22-2020 06:43:29.0688

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER: from fffff80548563191 to fffff8054856320c

STACK_TEXT:
ffff8202`8dceb400 fffff805`48563191 : ffff8d05`2015afa0 0000000f`ffffffdb ffff8d05`2015aee0 ffff8d05`205f5890 : nt!RtlpCopyRangeListEntry+0x2c
ffff8202`8dceb430 fffff805`485624d8 : fffff805`48262060 00000000`00000000 ffff8d05`4a219604 00000000`00000005 : nt!RtlCopyRangeList+0x41
ffff8202`8dceb460 fffff805`4857a378 : fffff805`48262060 ffff8202`8dceb540 00000000`00000000 00000000`00000000 : nt!ArbTestAllocation+0x38
ffff8202`8dceb4b0 fffff805`48554862 : ffff8d05`205723d0 00000000`00000000 00000000`00000000 00000000`00000001 : nt!ArbArbiterHandler+0x68
ffff8202`8dceb4f0 fffff805`48552d42 : ffffa087`0ad429a0 ffffa087`312f5660 ffff8d05`4a219600 ffff8202`8dceb680 : nt!IopCallArbiter+0xd6
ffff8202`8dceb550 fffff805`48551e46 : 00000000`00000000 ffffa087`00000001 00000000`00000000 ffffa087`312f5660 : nt!PnpReleaseResourcesInternal+0x122
ffff8202`8dceb620 fffff805`48551c60 : fffff805`48262800 00000000`00000004 00000000`00000000 ffffa087`2b4e1000 : nt!IopReleaseResources+0xe
ffff8202`8dceb650 fffff805`48531090 : ffff8202`ffffffff ffffa087`0acade10 ffffa087`312f5660 00000000`00000000 : nt!IopLegacyResourceAllocation+0xb0
ffff8202`8dceb710 fffff805`48530da2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopReleaseDeviceResources+0x80
ffff8202`8dceb7a0 fffff805`48530b4b : ffffa087`312f5660 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PnpSurpriseRemoveLockedDeviceNode+0xce
ffff8202`8dceb800 fffff805`4853081a : ffffa087`312f5660 ffff8202`8dceb880 00000000`00000000 ffff8202`8dceb890 : nt!PnpDeleteLockedDeviceNode+0x57
ffff8202`8dceb840 fffff805`4852f017 : ffffa087`37c88060 ffff8202`00000002 00000000`00000002 ffff8d05`55a54000 : nt!PnpDeleteLockedDeviceNodes+0x76
ffff8202`8dceb8c0 fffff805`4850860e : ffff8202`8dceba10 ffffa087`312f5600 ffff8202`8dceba00 ffff8d05`00000002 : nt!PnpProcessQueryRemoveAndEject+0x1ef
ffff8202`8dceb9b0 fffff805`483d6748 : ffff8d05`54c17e90 ffff8d05`51188da0 ffff8d05`51188da0 00000000`00000000 : nt!PnpProcessTargetDeviceEvent+0xea
ffff8202`8dceb9e0 fffff805`47ef43c5 : ffffa087`0ac8da20 ffffa087`2a4f3040 ffffa087`0ac8da20 ffffa087`0b345e40 : nt!PnpDeviceEventWorker+0x2d8
ffff8202`8dceba70 fffff805`47e6bce5 : ffffa087`2a4f3040 00000000`00000080 ffffa087`0acaf280 00000000`00000000 : nt!ExpWorkerThread+0x105
ffff8202`8dcebb10 fffff805`47fc99ca : ffffc880`a6c00180 ffffa087`2a4f3040 fffff805`47e6bc90 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffff8202`8dcebb60 00000000`00000000 : ffff8202`8dcec000 ffff8202`8dce5000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC: 43280c87ddef2c6db6f22d1edad4f2286a140d89

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: b0c495aa914761c829e6544e0ac02a762a4a8cfa

THREAD_SHA1_HASH_MOD: 82d14546c43bd06881f781d6d197c4c7f7ceb9cb

FAULT_INSTR_CODE: f06100f

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!RtlpCopyRangeListEntry+2c

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 0

IMAGE_VERSION: 10.0.18362.720

STACK_COMMAND: .cxr 0xffff82028dceaa10 ; kb

BUCKET_ID_FUNC_OFFSET: 2c

FAILURE_BUCKET_ID: AV_nt!RtlpCopyRangeListEntry

BUCKET_ID: AV_nt!RtlpCopyRangeListEntry

PRIMARY_PROBLEM_CLASS: AV_nt!RtlpCopyRangeListEntry

TARGET_TIME: 2020-03-22T13:19:09.000Z

OSBUILD: 18362

OSSERVICEPACK: 720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 784

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: unknown_date

BUILDDATESTAMP_STR: 190318-1202

BUILDLAB_STR: 19h1_release

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME: 6cc1

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:av_nt!rtlpcopyrangelistentry

FAILURE_ID_HASH: {85eeb152-7b61-2f76-d730-13cf3c82e111}

Continue reading...
 
Back
Top