BSOD issue in windows10

vgogh

Prominent
May 7, 2017
10
0
510
Hello
Recently,I got BSOD issue and still can't find exact solution for it.
I formated and reinstalled my windows10, update MOBO related driver, GPU driver, update windows itself. And after few hours I got another BSOD below.
If anyone got thought on this or suggestion it will be really appreciate and take any advice.

This is actual my Dump file :https://1drv.ms/u/s!AkYCtVvVpgjggyn4lW9Y7ZIUKjEu
Here's Windbg !analze -v result

Bugcheck Analysis

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000000, A stack-based buffer has been overrun.
Arg2: 0000000000000000, Address of the trap frame for the exception that caused the bugcheck
Arg3: 0000000000000000, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


DUMP_CLASS: 1

DUMP_QUALIFIER: 401

BUILD_VERSION_STRING: 15063.0.amd64fre.rs2_release.170317-1834

SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.

SYSTEM_SKU: To Be Filled By O.E.M.

SYSTEM_VERSION: To Be Filled By O.E.M.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: P7.10

BIOS_DATE: 11/30/2016

BASEBOARD_MANUFACTURER: ASRock

BASEBOARD_PRODUCT: B150M Pro4

BASEBOARD_VERSION:

DUMP_TYPE: 1

BUGCHECK_P1: 0

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

TRAP_FRAME: 0000000000000000 -- (.trap 0x0)

EXCEPTION_RECORD: 0000000000000000 -- (.exr 0x0)
Cannot read Exception record @ 0000000000000000

CPU_COUNT: 4

CPU_MHZ: cf0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 76'00000000 (cache) 76'00000000 (init)

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: 0x139

PROCESS_NAME: System

CURRENT_IRQL: 0

ANALYSIS_SESSION_HOST: DESKTOP-JI76LND

ANALYSIS_SESSION_TIME: 05-09-2017 22:18:28.0048

ANALYSIS_VERSION: 10.0.15063.137 amd64fre

LAST_CONTROL_TRANSFER: from fffff802a1b7337b to fffff802a1b6cfd0

STACK_TEXT:
ffffb781`3d1ae7d8 fffff802`a1b7337b : 00000000`00000139 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffb781`3d1ae7e0 fffff802`a1a58dfc : 00000000`00000009 00000000`00000000 00000000`00000000 ffffb781`3d180180 : nt!guard_icall_bugcheck+0x1b
ffffb781`3d1ae810 fffff802`a1a58473 : 00000000`00000003 00000000`00000002 ffffcb8d`00000001 01d2c8be`fd2bd112 : nt!PpmIdleExecuteTransition+0x7fc
ffffb781`3d1aea80 fffff802`a1b7004c : 00000000`00000000 ffffb781`3d180180 ffffb781`3d18cc80 ffffcb8d`5bb9c080 : nt!PoIdle+0x343
ffffb781`3d1aebe0 00000000`00000000 : ffffb781`3d1af000 ffffb781`3d1a8000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x2c


STACK_COMMAND: kb

THREAD_SHA1_HASH_MOD_FUNC: f06ebeca07a777df9d9c06cecbde213a56816d42

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6ca2b2eb9f11341bafe05412062bfdff4c267833

THREAD_SHA1_HASH_MOD: f08ac56120cad14894587db086f77ce277bfae84

FOLLOWUP_IP:
nt!guard_icall_bugcheck+1b
fffff802`a1b7337b 90 nop

FAULT_INSTR_CODE: ccccc390

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nt!guard_icall_bugcheck+1b

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 58ccba4c

BUCKET_ID_FUNC_OFFSET: 1b

FAILURE_BUCKET_ID: 0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck

BUCKET_ID: 0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck

PRIMARY_PROBLEM_CLASS: 0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck

TARGET_TIME: 2017-05-09T12:22:56.000Z

OSBUILD: 15063

OSSERVICEPACK: 0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2017-03-18 13:40:44

BUILDDATESTAMP_STR: 170317-1834

BUILDLAB_STR: rs2_release

BUILDOSVER_STR: 10.0.15063.0.amd64fre.rs2_release.170317-1834

ANALYSIS_SESSION_ELAPSED_TIME: 3f4

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x139_0_legacy_gs_violation_nt!guard_icall_bugcheck

FAILURE_ID_HASH: {9bee41a7-2ef9-07ca-7e59-7d5a0c6e2d05}

Followup: MachineOwner
---------

*** ERROR: Module load completed but symbols could not be loaded for intelppm.sys
0: kd> kpn 200
# Child-SP RetAddr Call Site
00 fffff802`a3d3a7d8 fffff80d`83931360 intelppm+0x1388
01 fffff802`a3d3a7e0 fffff802`a1a58c19 intelppm+0x1360
02 fffff802`a3d3a810 fffff802`a1a58473 nt!PpmIdleExecuteTransition+0x619
03 fffff802`a3d3aa80 fffff802`a1b7004c nt!PoIdle+0x343
04 fffff802`a3d3abe0 00000000`00000000 nt!KiIdleLoop+0x2c
0: kd> kb
# RetAddr : Args to Child : Call Site
00 fffff80d`83931360 : 00000000`00000000 00000000`00000000 ffffcb8d`58bf8000 fffff802`a0e07180 : intelppm+0x1388
01 fffff802`a1a58c19 : 00000000`00000000 00000000`0000006d 00000000`00000000 00000000`0000000e : intelppm+0x1360
02 fffff802`a1a58473 : 00000000`00000003 00000000`00000002 ffffcb8d`58bf8000 00000000`00000000 : nt!PpmIdleExecuteTransition+0x619
03 fffff802`a1b7004c : 00000000`00000000 fffff802`a0e07180 fffff802`a1dfaa40 ffffcb8d`5d5c9080 : nt!PoIdle+0x343
04 00000000`00000000 : fffff802`a3d3b000 fffff802`a3d34000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x2c
 

vgogh

Prominent
May 7, 2017
10
0
510
So I ran Driver verifier agian and got this.



On Tue 2017-05-09 오후 11:24:01 your computer crashed
crash dump file: C:\Windows\Minidump\050917-9078-01.dmp
This was probably caused by the following module: rtkvhd64.sys (RTKVHD64+0x2A38)
Bugcheck code: 0xC4 (0x2002, 0xFFFFF80571162A38, 0x20, 0x0)
Error: DRIVER_VERIFIER_DETECTED_VIOLATION
Bug check description: This is the general bug check code for fatal errors found by Driver Verifier.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
A third party driver was identified as the probable root cause of this system error. It is suggested you look for an update for the following driver: rtkvhd64.sys .
Google query: rtkvhd64.sys DRIVER_VERIFIER_DETECTED_VIOLATION



After got this result, I googled and found it realted to my Realtek audio driver. So I thoght this driver causing my BSOD, so uninstalled Realtek aduio driver and Now I have High Definition audio device provided by window 10, and Nvidia HD audio also.
Few hours later I got another BSOD called PAGE FAULT IN NONPAGED AREA (dxgkrnl.sys) which is exactly same BSOD before I reinstall window.
This is actual dump file link.
http://1drv.ms/u/s!AkYCtVvVpgjggyyXalfIDOgeRxSc

Here's Windbg result
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffd289c3fc8f74, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80b9a394fda, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


DUMP_CLASS: 1

DUMP_QUALIFIER: 401

BUILD_VERSION_STRING: 15063.0.amd64fre.rs2_release.170317-1834

SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.

SYSTEM_SKU: To Be Filled By O.E.M.

SYSTEM_VERSION: To Be Filled By O.E.M.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: P7.10

BIOS_DATE: 11/30/2016

BASEBOARD_MANUFACTURER: ASRock

BASEBOARD_PRODUCT: B150M Pro4

BASEBOARD_VERSION:

DUMP_TYPE: 1

BUGCHECK_P1: ffffd289c3fc8f74

BUGCHECK_P2: 0

BUGCHECK_P3: fffff80b9a394fda

BUGCHECK_P4: 2

READ_ADDRESS: ffffd289c3fc8f74 Paged pool

FAULTING_IP:
dxgkrnl!memcpy+21a
fffff80b`9a394fda f30f6f4402f0 movdqu xmm0,xmmword ptr [rdx+rax-10h]

MM_INTERNAL_CODE: 2

IMAGE_NAME: dxgkrnl.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 0

MODULE_NAME: dxgkrnl

FAULTING_MODULE: fffff80b9a380000 dxgkrnl

CPU_COUNT: 4

CPU_MHZ: cf0

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 76'00000000 (cache) 76'00000000 (init)

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: AV

PROCESS_NAME: csrss.exe

CURRENT_IRQL: 0

ANALYSIS_SESSION_HOST: SJ

ANALYSIS_SESSION_TIME: 05-10-2017 18:10:39.0949

ANALYSIS_VERSION: 10.0.15063.137 amd64fre

TRAP_FRAME: ffffb18112844e50 -- (.trap 0xffffb18112844e50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd289c4008f84 rbx=0000000000000000 rcx=fffffffffffffffc
rdx=fffffffffffc0000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80b9a394fda rsp=ffffb18112844fe8 rbp=ffffd2895aeb9000
r8=000000006910ff80 r9=0000000000000000 r10=0000000000000000
r11=ffffd2895aef9000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
dxgkrnl!memcpy+0x21a:
fffff80b`9a394fda f30f6f4402f0 movdqu xmm0,xmmword ptr [rdx+rax-10h] ds:ffffd289`c3fc8f74=????????????????????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff802e542bf86 to fffff802e53fcfd0

STACK_TEXT:
ffffb181`12844bb8 fffff802`e542bf86 : 00000000`00000050 ffffd289`c3fc8f74 00000000`00000000 ffffb181`12844e50 : nt!KeBugCheckEx
ffffb181`12844bc0 fffff802`e52ff766 : 00000000`00000000 ffffd289`c3fc8f74 ffffb181`12844e50 ffffe582`723f3080 : nt!MiSystemFault+0x12e9c6
ffffb181`12844c60 fffff802`e5406872 : ffffb181`12844ee0 fffff802`e54069a0 ffffa5d2`fe02e690 ffffa5fc`05cd2900 : nt!MmAccessFault+0xae6
ffffb181`12844e50 fffff80b`9a394fda : fffff80b`9a5210df ffffe582`722b2bf0 ffffe582`722b2ce0 ffffe582`7236f318 : nt!KiPageFault+0x132
ffffb181`12844fe8 fffff80b`9a5210df : ffffe582`722b2bf0 ffffe582`722b2ce0 ffffe582`7236f318 00000000`00000000 : dxgkrnl!memcpy+0x21a
ffffb181`12844ff0 fffff80b`9a4d68ac : ffffe582`00000000 ffffe582`00000000 ffffb181`12845178 ffffe582`7236f008 : dxgkrnl!ClipCurrentCursor+0x4ab
ffffb181`12845080 fffff80b`9a459879 : ffffe582`72534080 ffffd289`5cd13ea0 00000000`00000000 ffffd289`4d002280 : dxgkrnl!DxgkSetPointerPosition+0x7d014
ffffb181`128451d0 ffffac14`bf7d1991 : ffffac5b`8001c450 ffffac5b`800c4028 00000000`00000000 00000000`00180d1a : dxgkrnl!DxgkCddSetPointerPosition+0x39
ffffb181`12845200 ffffac14`bf7d1904 : ffffac5b`80014002 ffffac14`bf5e47df 00000000`00000139 00000000`00000037 : cdd!MovePointerInternal+0x7d
ffffb181`12845260 ffffac14`bf288071 : ffffac5b`80014010 ffffac14`bf5e485c ffffe582`724b7650 ffffb181`12845310 : cdd!DrvMovePointerEx+0x14
ffffb181`12845290 ffffac14`bf2874b1 : 00000000`00000000 ffffb181`12845310 ffffac5b`800e95b0 ffffac5b`80014010 : win32kfull!vMovePointer+0x79
ffffb181`128452d0 ffffac14`bf2aa586 : ffffac5b`80014010 00000139`00000000 ffffb181`128453e1 00000000`0000000d : win32kfull!GreMovePointer+0x101
ffffb181`12845350 ffffac14`bf2a879a : ffffac14`bf7074f8 ffffe582`724ff070 ffffac5b`800c8458 ffffac5b`800c84c8 : win32kfull!xxxMoveEventAbsolute+0x24e
ffffb181`12845430 ffffac14`bf63554d : ffffb181`12845688 ffffb181`12845540 00000000`00000000 ffffe582`724ff328 : win32kfull!EditionCommitMousePosAndMove+0x7a
ffffb181`12845490 ffffac14`bf5ffe28 : ffffb181`12845670 ffffb181`12845570 ffffac5b`800eb380 ffffb181`128455d8 : win32kbase!ApiSetEditionCommitMousePosAndMove+0x75
ffffb181`128454f0 ffffac14`bf6002f8 : ffffb181`12845650 fffff802`e56fa178 ffffe582`72772740 ffffe582`72534080 : win32kbase!CMouseProcessor::CommitMousePosAndMoveCursor+0xc4
ffffb181`12845590 ffffac14`bf67e09e : 00000139`00000036 0000c195`00003e04 ffffac14`bf7055c0 00000000`00000000 : win32kbase!CMouseProcessor::processMouseInputData+0x68
ffffb181`128455d0 ffffac14`bf641ecf : ffffac5b`800068e0 00000000`00000018 ffffac5b`80006900 ffffac5b`800068e0 : win32kbase!CCompositionToken::`vector deleting destructor'+0x31b5e
ffffb181`12845710 ffffac14`bf6424d3 : ffffac5b`800068e0 ffffb181`128459a0 ffffac5b`80006930 00000000`12845860 : win32kbase!CMouseSensor::processInput+0x6f
ffffb181`12845760 ffffac14`bf5afcc7 : 00000000`00000000 ffffb181`128459a0 00000000`00000001 ffffac5b`800068e0 : win32kbase!CBaseInput::OnReadNotification+0x53
ffffb181`128457a0 ffffac14`bf61cb26 : ffffac5b`800e92a0 ffffb181`128459a0 00000000`00000003 00000000`00000000 : win32kbase!CBaseInput::OnDispatcherObjectSignaled+0x7f
ffffb181`128457f0 ffffac14`bf29a9b6 : 00000000`00000003 ffffb181`12845902 ffffac5b`800e95b0 00000000`00000000 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0xa6
ffffb181`12845840 ffffac14`bf29a72b : 00000000`00000000 00000000`00000001 ffffac14`bf731a90 00000000`0000ffff : win32kfull!xxxDesktopThreadWaiter+0xc6
ffffb181`128458a0 ffffac14`bf61a64e : 00000000`00000000 ffffe582`72534080 00000000`00000000 00000000`00000005 : win32kfull!xxxDesktopThread+0x31b
ffffb181`12845a10 ffffac14`bf264eff : ffffe582`00000001 ffffac14`bf731a90 ffffe582`72534080 00000000`00000000 : win32kbase!xxxCreateSystemThreads+0x6e
ffffb181`12845a50 fffff802`e5407f13 : ffffe582`72534080 00000000`00000005 00000208`46504380 00000000`00000390 : win32kfull!NtUserCallNoParam+0x2f
ffffb181`12845a80 00007ffd`64191124 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000081`dc2ffcd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`64191124


STACK_COMMAND: kb

THREAD_SHA1_HASH_MOD_FUNC: 1904a4ed7ce299ff06602253c3748d7f26d1ae27

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 053eba3750397858e497acc5db6fe0ff28f1d97a

THREAD_SHA1_HASH_MOD: 4438a2475c4ee1be750a84d0acb780abc7cba2e5

FOLLOWUP_IP:
dxgkrnl!memcpy+21a
fffff80b`9a394fda f30f6f4402f0 movdqu xmm0,xmmword ptr [rdx+rax-10h]

FAULT_INSTR_CODE: 446f0ff3

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: dxgkrnl!memcpy+21a

FOLLOWUP_NAME: MachineOwner

BUCKET_ID_FUNC_OFFSET: 21a

FAILURE_BUCKET_ID: AV_R_INVALID_dxgkrnl!memcpy

BUCKET_ID: AV_R_INVALID_dxgkrnl!memcpy

PRIMARY_PROBLEM_CLASS: AV_R_INVALID_dxgkrnl!memcpy

TARGET_TIME: 2017-05-10T05:43:48.000Z

OSBUILD: 15063

OSSERVICEPACK: 0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2017-04-19 15:01:43

BUILDDATESTAMP_STR: 170317-1834

BUILDLAB_STR: rs2_release

BUILDOSVER_STR: 10.0.15063.0.amd64fre.rs2_release.170317-1834

ANALYSIS_SESSION_ELAPSED_TIME: 9b6

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:av_r_invalid_dxgkrnl!memcpy

FAILURE_ID_HASH: {049ac625-e12d-92a2-b32c-7e59d3b6c49c}

Followup: MachineOwner
---------

3: kd> kb
# RetAddr : Args to Child : Call Site
00 fffff802`e542bf86 : 00000000`00000050 ffffd289`c3fc8f74 00000000`00000000 ffffb181`12844e50 : nt!KeBugCheckEx
01 fffff802`e52ff766 : 00000000`00000000 ffffd289`c3fc8f74 ffffb181`12844e50 ffffe582`723f3080 : nt!MiSystemFault+0x12e9c6
02 fffff802`e5406872 : ffffb181`12844ee0 fffff802`e54069a0 ffffa5d2`fe02e690 ffffa5fc`05cd2900 : nt!MmAccessFault+0xae6
03 fffff80b`9a394fda : fffff80b`9a5210df ffffe582`722b2bf0 ffffe582`722b2ce0 ffffe582`7236f318 : nt!KiPageFault+0x132
04 fffff80b`9a5210df : ffffe582`722b2bf0 ffffe582`722b2ce0 ffffe582`7236f318 00000000`00000000 : dxgkrnl!memcpy+0x21a
05 fffff80b`9a4d68ac : ffffe582`00000000 ffffe582`00000000 ffffb181`12845178 ffffe582`7236f008 : dxgkrnl!ClipCurrentCursor+0x4ab
06 fffff80b`9a459879 : ffffe582`72534080 ffffd289`5cd13ea0 00000000`00000000 ffffd289`4d002280 : dxgkrnl!DxgkSetPointerPosition+0x7d014
07 ffffac14`bf7d1991 : ffffac5b`8001c450 ffffac5b`800c4028 00000000`00000000 00000000`00180d1a : dxgkrnl!DxgkCddSetPointerPosition+0x39
08 ffffac14`bf7d1904 : ffffac5b`80014002 ffffac14`bf5e47df 00000000`00000139 00000000`00000037 : cdd!MovePointerInternal+0x7d
09 ffffac14`bf288071 : ffffac5b`80014010 ffffac14`bf5e485c ffffe582`724b7650 ffffb181`12845310 : cdd!DrvMovePointerEx+0x14
0a ffffac14`bf2874b1 : 00000000`00000000 ffffb181`12845310 ffffac5b`800e95b0 ffffac5b`80014010 : win32kfull!vMovePointer+0x79
0b ffffac14`bf2aa586 : ffffac5b`80014010 00000139`00000000 ffffb181`128453e1 00000000`0000000d : win32kfull!GreMovePointer+0x101
0c ffffac14`bf2a879a : ffffac14`bf7074f8 ffffe582`724ff070 ffffac5b`800c8458 ffffac5b`800c84c8 : win32kfull!xxxMoveEventAbsolute+0x24e
0d ffffac14`bf63554d : ffffb181`12845688 ffffb181`12845540 00000000`00000000 ffffe582`724ff328 : win32kfull!EditionCommitMousePosAndMove+0x7a
0e ffffac14`bf5ffe28 : ffffb181`12845670 ffffb181`12845570 ffffac5b`800eb380 ffffb181`128455d8 : win32kbase!ApiSetEditionCommitMousePosAndMove+0x75
0f ffffac14`bf6002f8 : ffffb181`12845650 fffff802`e56fa178 ffffe582`72772740 ffffe582`72534080 : win32kbase!CMouseProcessor::CommitMousePosAndMoveCursor+0xc4
10 ffffac14`bf67e09e : 00000139`00000036 0000c195`00003e04 ffffac14`bf7055c0 00000000`00000000 : win32kbase!CMouseProcessor::processMouseInputData+0x68
11 ffffac14`bf641ecf : ffffac5b`800068e0 00000000`00000018 ffffac5b`80006900 ffffac5b`800068e0 : win32kbase!CCompositionToken::`vector deleting destructor'+0x31b5e
12 ffffac14`bf6424d3 : ffffac5b`800068e0 ffffb181`128459a0 ffffac5b`80006930 00000000`12845860 : win32kbase!CMouseSensor::processInput+0x6f
13 ffffac14`bf5afcc7 : 00000000`00000000 ffffb181`128459a0 00000000`00000001 ffffac5b`800068e0 : win32kbase!CBaseInput::OnReadNotification+0x53
14 ffffac14`bf61cb26 : ffffac5b`800e92a0 ffffb181`128459a0 00000000`00000003 00000000`00000000 : win32kbase!CBaseInput::OnDispatcherObjectSignaled+0x7f
15 ffffac14`bf29a9b6 : 00000000`00000003 ffffb181`12845902 ffffac5b`800e95b0 00000000`00000000 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0xa6
16 ffffac14`bf29a72b : 00000000`00000000 00000000`00000001 ffffac14`bf731a90 00000000`0000ffff : win32kfull!xxxDesktopThreadWaiter+0xc6
17 ffffac14`bf61a64e : 00000000`00000000 ffffe582`72534080 00000000`00000000 00000000`00000005 : win32kfull!xxxDesktopThread+0x31b
18 ffffac14`bf264eff : ffffe582`00000001 ffffac14`bf731a90 ffffe582`72534080 00000000`00000000 : win32kbase!xxxCreateSystemThreads+0x6e
19 fffff802`e5407f13 : ffffe582`72534080 00000000`00000005 00000208`46504380 00000000`00000390 : win32kfull!NtUserCallNoParam+0x2f
1a 00007ffd`64191124 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
1b 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`64191124
3: kd> lmvm dxgkrnl
Browse full module list
start end module name
fffff80b`9a380000 fffff80b`9a5da000 dxgkrnl (pdb symbols) c:\symbols\dxgkrnl.pdb\5DBBBDEE054A47A80F13EE2AD8E081CC1\dxgkrnl.pdb
Loaded symbol image file: dxgkrnl.sys
Image path: \SystemRoot\System32\drivers\dxgkrnl.sys
Image name: dxgkrnl.sys
Browse all global symbols functions data
Timestamp: ***** Invalid (E86E41C4)
CheckSum: 0025F6EC
ImageSize: 0025A000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4


Really desperate to find solution to fix this problem. Any help would really appreciated and hope this BSOD end.
 
Jun 3, 2018
3
0
10
It's a hardware issue, my computer has the exact same thing, although I have no idea what exactly is causing it, but after deleting my drive partitions and re partitioning them and reinstalling windows (Multiple times), I am getting very similar BSOD's , after endless weeks and months of googling (because i don't wanna pay over £100 for it to be something stupid etc... ) the results are the same, drivers or hardware, if you create another partition or re-partition your drives and a fresh install of windows and the problem is persisting, then it is most definitely a hardware issue.