windows 10 蓝屏 SYSTEM_SERVICE_EXCEPTION 0x0000003b ntoskrnl.exe

qiwang tan 0 信誉分
2024-10-11T07:57:35.9733333+00:00

windows 10 蓝屏 SYSTEM_SERVICE_EXCEPTION 0x0000003b ntoskrnl.exe

************* Preparing the environment for Debugger Extensions Gallery repositories **************

ExtensionRepository : Implicit

UseExperimentalFeatureForNugetShare : true

AllowNugetExeUpdate : true

NonInteractiveNuget : true

AllowNugetMSCredentialProviderInstall : true

AllowParallelInitializationOfLocalRepositories : true

EnableRedirectToChakraJsProvider : false

-- Configuring repositories

  ----> Repository : LocalInstalled, Enabled: true

  ----> Repository : UserExtensions, Enabled: true

Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds

----> Repository : UserExtensions, Enabled: true, Packages count: 0

----> Repository : LocalInstalled, Enabled: true, Packages count: 42

Microsoft (R) Windows Debugger Version 10.0.27668.1000 AMD64

Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [D:\Users\qiwang_tan\Desktop\F3-1F生产电脑蓝屏\10.163.35.186\MEMORY\MEMORY.DMP]

Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

************* Path validation summary **************

Response Time (ms) Location

Deferred srv*

Symbol search path is: srv*

Executable search path is:

Windows 10 Kernel Version 19041 MP (8 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS

Edition build lab: 19041.1.amd64fre.vb_release.191206-1406

Kernel base = 0xfffff8041f800000 PsLoadedModuleList = 0xfffff8042042a290

Debug session time: Thu Sep 26 16:03:32.590 2024 (UTC + 8:00)

System Uptime: 26 days 23:48:10.015

Loading Kernel Symbols

...............................................................

.....Page 8455fc not present in the dump file. Type ".hh dbgerr004" for details

...........................................................

................................................................

......

Loading User Symbols

PEB address is NULL !

Loading unloaded module list

..................................................

For analysis of this file, run !analyze -v

nt!KeBugCheckEx:

fffff8041fbf8fa0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb90f43278ac0=000000000000003b

2: kd> !analyze -v


  •                                                                         *
    
  •                    Bugcheck Analysis                                    *
    
  •                                                                         *
    

SYSTEM_SERVICE_EXCEPTION (3b)

An exception happened while executing a system service routine.

Arguments:

Arg1: 00000000c0000005, Exception code that caused the BugCheck

Arg2: fffff8041fea0978, Address of the instruction which caused the BugCheck

Arg3: ffffb90f432793c0, Address of the context record for the exception that caused the BugCheck

Arg4: 0000000000000000, zero.

Debugging Details:


KEY_VALUES_STRING: 1

Key  : Analysis.CPU.mSec

Value: 3249

Key  : Analysis.Elapsed.mSec

Value: 3428

Key  : Analysis.IO.Other.Mb

Value: 0

Key  : Analysis.IO.Read.Mb

Value: 1

Key  : Analysis.IO.Write.Mb

Value: 0

Key  : Analysis.Init.CPU.mSec

Value: 1452

Key  : Analysis.Init.Elapsed.mSec

Value: 4908

Key  : Analysis.Memory.CommitPeak.Mb

Value: 91

Key  : Bugcheck.Code.KiBugCheckData

Value: 0x3b

Key  : Bugcheck.Code.LegacyAPI

Value: 0x3b

Key  : Bugcheck.Code.TargetModel

Value: 0x3b

Key  : Failure.Bucket

Value: AV_nt!HvpGetCellPaged

Key  : Failure.Hash

Value: {90e145c3-c04a-f304-4254-781be6862dc9}

Key  : Hypervisor.Enlightenments.Value

Value: 0

Key  : Hypervisor.Enlightenments.ValueHex

Value: 0

Key  : Hypervisor.Flags.AnyHypervisorPresent

Value: 0

Key  : Hypervisor.Flags.ApicEnlightened

Value: 0

Key  : Hypervisor.Flags.ApicVirtualizationAvailable

Value: 0

Key  : Hypervisor.Flags.AsyncMemoryHint

Value: 0

Key  : Hypervisor.Flags.CoreSchedulerRequested

Value: 0

Key  : Hypervisor.Flags.CpuManager

Value: 0

Key  : Hypervisor.Flags.DeprecateAutoEoi

Value: 0

Key  : Hypervisor.Flags.DynamicCpuDisabled

Value: 0

Key  : Hypervisor.Flags.Epf

Value: 0

Key  : Hypervisor.Flags.ExtendedProcessorMasks

Value: 0

Key  : Hypervisor.Flags.HardwareMbecAvailable

Value: 1

Key  : Hypervisor.Flags.MaxBankNumber

Value: 0

Key  : Hypervisor.Flags.MemoryZeroingControl

Value: 0

Key  : Hypervisor.Flags.NoExtendedRangeFlush

Value: 0

Key  : Hypervisor.Flags.NoNonArchCoreSharing

Value: 0

Key  : Hypervisor.Flags.Phase0InitDone

Value: 0

Key  : Hypervisor.Flags.PowerSchedulerQos

Value: 0

Key  : Hypervisor.Flags.RootScheduler

Value: 0

Key  : Hypervisor.Flags.SynicAvailable

Value: 0

Key  : Hypervisor.Flags.UseQpcBias

Value: 0

Key  : Hypervisor.Flags.Value

Value: 131072

Key  : Hypervisor.Flags.ValueHex

Value: 20000

Key  : Hypervisor.Flags.VpAssistPage

Value: 0

Key  : Hypervisor.Flags.VsmAvailable

Value: 0

Key  : Hypervisor.RootFlags.AccessStats

Value: 0

Key  : Hypervisor.RootFlags.CrashdumpEnlightened

Value: 0

Key  : Hypervisor.RootFlags.CreateVirtualProcessor

Value: 0

Key  : Hypervisor.RootFlags.DisableHyperthreading

Value: 0

Key  : Hypervisor.RootFlags.HostTimelineSync

Value: 0

Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled

Value: 0

Key  : Hypervisor.RootFlags.IsHyperV

Value: 0

Key  : Hypervisor.RootFlags.LivedumpEnlightened

Value: 0

Key  : Hypervisor.RootFlags.MapDeviceInterrupt

Value: 0

Key  : Hypervisor.RootFlags.MceEnlightened

Value: 0

Key  : Hypervisor.RootFlags.Nested

Value: 0

Key  : Hypervisor.RootFlags.StartLogicalProcessor

Value: 0

Key  : Hypervisor.RootFlags.Value

Value: 0

Key  : Hypervisor.RootFlags.ValueHex

Value: 0

Key  : SecureKernel.HalpHvciEnabled

Value: 0

Key  : WER.OS.Branch

Value: vb_release

Key  : WER.OS.Version

Value: 10.0.19041.1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8041fea0978

BUGCHECK_P3: ffffb90f432793c0

BUGCHECK_P4: 0

FILE_IN_CAB: MEMORY.DMP

FAULTING_THREAD: ffffa58192ecb0c0

CONTEXT: ffffb90f432793c0 -- (.cxr 0xffffb90f432793c0)

rax=0000000000002fe8 rbx=ffffb90f43279e20 rcx=00000000000005fd

rdx=00000000ffffffe0 rsi=ffff81004270b000 rdi=ffff81004270b000

rip=fffff8041fea0978 rsp=ffffb90f43279dc8 rbp=ffff81004270b000

r8=ffff81004270b398 r9=00000000000003ff r10=0000000000000fe0

r11=0000000000000fe0 r12=ffffb90f43279f2c r13=ffffb90f4327a1a0

r14=ffff81004270b000 r15=ffffb90f43279f2c

iopl=0 nv up ei pl nz na pe nc

cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202

nt!HvpGetCellPaged+0x68:

fffff8041fea0978 488b4808 mov rcx,qword ptr [rax+8] ds:002b:0000000000002ff0=????????????????

Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

PROCESS_NAME: Registry

STACK_TEXT:

ffffb90f43279dc8 fffff8041fdf38ef : 0000026b1c80469c ffffb90f4327a1a0 ffffa58192ecb0c0 0000000000000000 : nt!HvpGetCellPaged+0x68

ffffb90f43279dd0 fffff8041fdf3191 : 00000000ffffffff 0000026b1d09680c ffff81004270b000 ffff81004270b000 : nt!CmpDoCompareKeyName+0x2f

ffffb90f43279e20 fffff8041fdf2c11 : 0000026b1c80469c 0000000000000001 ffff81004270b000 fffff8041fa0e61b : nt!CmpCompareInIndex+0xc1

ffffb90f43279e60 fffff8041fdf9773 : 00000001003c6020 0000026b1c80469c 00000000e0d9e6c5 0000000000000000 : nt!CmpFindSubKeyInRoot+0x1f5

ffffb90f43279ed0 fffff8041fdfc949 : ffff810042683b00 0000000000000001 ffffb90f4327a0d0 ffffb90f4327a150 : nt!CmpWalkOneLevel+0x743

ffffb90f43279fd0 fffff8041fdfb233 : 000000000000001c ffffb90f4327a320 ffffb90f4327a2d8 ffffa58197602ae0 : nt!CmpDoParseKey+0x849

ffffb90f4327a270 fffff8041fdff2fe : fffff8041fdfaf01 0000000000000000 ffffa58197602ae0 0000000000000001 : nt!CmpParseKey+0x2c3

ffffb90f4327a410 fffff8041fe28b2a : ffffa58197602a00 ffffb90f4327a678 0000000000000040 ffffa5817c7f6e80 : nt!ObpLookupObjectName+0x3fe

ffffb90f4327a5e0 fffff8041fe2890c : 0000000000000000 0000000000000000 0000000000000000 ffffa5817c7f6e80 : nt!ObOpenObjectByNameEx+0x1fa

ffffb90f4327a710 fffff8041fe28431 : 00000000440ad478 ffffb90f4327aa80 0000000000000001 fffff8041fa0eb2e : nt!ObOpenObjectByName+0x5c

ffffb90f4327a760 fffff8041fe2815f : 00000000440ad7d8 00000000466bb060 000000000000136c 00000000440ad7d4 : nt!CmOpenKey+0x2c1

ffffb90f4327a9c0 fffff8041fc0a9b5 : ffffa58192ecb000 0000000000000000 ffffb90f4327aa80 ffffa581924f9b50 : nt!NtOpenKeyEx+0xf

ffffb90f4327aa00 00007ffeaef0f3f4 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : nt!KiSystemServiceCopyEnd+0x25

00000000440ad398 0000000000000000 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : 0x00007ffe`aef0f3f4

SYMBOL_NAME: nt!HvpGetCellPaged+68

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

STACK_COMMAND: .cxr 0xffffb90f432793c0 ; kb

BUCKET_ID_FUNC_OFFSET: 68

FAILURE_BUCKET_ID: AV_nt!HvpGetCellPaged

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {90e145c3-c04a-f304-4254-781be6862dc9}

Followup: MachineOwner


Windows 商业版 适用于 IT 专业人员的 Windows 客户端 用户体验 其他
0 个注释 无注释
{count} 票

1 个答案

排序依据: 非常有帮助
  1. 匿名
    2024-10-14T06:47:14.9033333+00:00

    你好。

    Bug Check 0x3B SYSTEM_SERVICE_EXCEPTION - Windows drivers | Microsoft Learn

    可以考虑以下步骤:

    更新驱动程序:确保所有设备驱动程序(尤其是图形驱动程序)都是最新的。您可以使用设备管理器更新驱动程序或直接访问硬件制造商的网站。

    运行系统文件检查器 (SFC):使用 SFC 实用程序扫描并修复损坏的系统文件。打开提升的命令提示符(具有管理权限)并输入命令:sfc /scannow

    检查 Windows 更新:确保您的系统具有最新的 Windows 补丁。

    运行内存测试:使用 Windows 内存诊断工具检查 RAM 问题。通过在“运行”对话框 (Win + R) 中键入 mdsched.exe 来访问它,然后按照说明执行测试。


    如果答案有帮助,请点击”接受答案“并点赞。

    0 个注释 无注释

你的答案

问题作者可以将答案标记为“接受的答案”,这有助于用户了解已解决作者问题的答案。