SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M hatası

BIOS sürümün eski ama sorun bu olmayabilir. Sorun belleklerde giibi. Memtest yaptın mı? Sonucunu paylaş.

Güncel bir sürümle test yapmana rağmen sorun çıkmadı ise belleklerini sök, kontakt noktasını silgi ile temizle ve geri tak. İşlemcini belirt.

Güncel BIOS: MSI Türkiye

Kod:
Machine ID Information [From Smbios 2.8, DMIVersion 0, Size=2233]
BiosMajorRelease = 5
BiosMinorRelease = 13
BiosVendor = American Megatrends Inc.
BiosVersion = 3.E0
BiosReleaseDate = 01/22/2019
SystemManufacturer = Micro-Star International Co., Ltd
SystemProductName = MS-7B07
SystemFamily = To be filled by O.E.M.
SystemVersion = 1.0
SystemSKU = To be filled by O.E.M.
BaseBoardManufacturer = Micro-Star International Co., Ltd
BaseBoardProduct = A320M PRO-VH PLUS(MS-7B07)
BaseBoardVersion = 1.0


Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff61721828051, Address of the instruction which caused the BugCheck
Arg3: fffffe0fb00deb60, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5265

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 8676

    Key  : Analysis.Init.CPU.mSec
    Value: 734

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3358

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  120321-29359-01.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff61721828051

BUGCHECK_P3: fffffe0fb00deb60

BUGCHECK_P4: 0

CONTEXT:  fffffe0fb00deb60 -- (.cxr 0xfffffe0fb00deb60)
rax=fffff653c0659968 rbx=0000000000000000 rcx=fffffe0fb00df5d0
rdx=0000000000007ffe rsi=0000000000000204 rdi=00000000000000ff
rip=fffff61721828051 rsp=fffffe0fb00df560 rbp=fffff653c06298a0
 r8=00000000000003e8  r9=fffff61721bc7b10 r10=fffff61721828030
r11=ffffcc7a5a200000 r12=0000000000007ffe r13=00000000000003e8
r14=fffff61721a4dae0 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
win32kbase!HMAssignmentLock+0x21:
fffff617`21828051 8b07            mov     eax,dword ptr [rdi] ds:002b:00000000`000000ff=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT: 
fffffe0f`b00df560 fffff617`21b69636     : fffff653`c0659910 00000000`00000000 fffff802`4af25440 00000000`00000000 : win32kbase!HMAssignmentLock+0x21
fffffe0f`b00df590 fffff617`21bea278     : 00000000`00000001 fffffe0f`b00df7c0 00000000`00000000 fffff617`21bc7b10 : win32kfull!InternalSetTimer+0x366
fffffe0f`b00df610 fffff617`21be8c40     : fffff653`c1200040 fffff802`4a4db491 00000000`00000001 00000000`00000010 : win32kfull!SetRITTimer+0x28
fffffe0f`b00df650 fffff617`21be8bcb     : ffff8303`00000000 fffffe0f`00000000 00000000`00000000 ffffcc7a`5a200000 : win32kfull!AdjustRITDelayableTimers+0x2c
fffffe0f`b00df690 fffff617`2188c99f     : ffff8303`aba33608 00000000`00000000 00000000`00000000 00000000`00000000 : win32kfull!SetTimerCoalescingTolerance+0x5b
fffffe0f`b00df6c0 fffff617`2188c5e2     : ffff8303`aba335e0 ffff8303`aba335e0 00000000`00000001 00000000`00000000 : win32kbase!xxxUserPowerCalloutWorker+0x49f
fffffe0f`b00dfa30 fffff617`21b72bd0     : ffff8303`abfa2080 00000000`00000000 00000000`00000025 00000000`00000025 : win32kbase!xxxUserPowerCalloutWorker+0xe2
fffffe0f`b00dfaa0 fffff617`21f3474d     : ffff8303`abfa2080 ffff8303`abfa2080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
fffffe0f`b00dfad0 fffff802`4a608cb8     : ffff8303`00000005 00000000`00000025 00000000`00000000 00000000`00000000 : win32k!NtUserCallNoParam+0x15
fffffe0f`b00dfb00 00007fff`b6b210e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000de`ce27fa88 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`b6b210e4


CHKIMG_EXTENSION: !chkimg -lo 50 -db !win32kbase
211 errors : !win32kbase (fffff61721828040-fffff61721828fb8)
fffff61721828040 *07  48  8b  18  48  89  38  48 *84  db  75  37  48  85  ff  74 .H..H.8H..u7H..t
fffff61721828050 *16  8b  07  0f  b7  c8  0f  af *06  f3  2c  22  00  48  8b  05 ..........,".H..
fffff61721828060 *e6  2c  22  00  f6  44  01  19 *0e  75  3b  f0  ff  47  08  48 .,"..D...u;..G.H
fffff61721828070 *8c  db  75  16  48  8b  c3  48 *8a  5c  24  30  48  83  c4  20 ..u.H..H.\$0H..
fffff61721828080 *53  c3  cc  48  3b  df  75  c4 *e3  ea  b8  ff  ff  ff  ff  f0 S..H;.u.........
fffff61721828090 *04  c1  43  08  83  f8  01  75 *d1  48  8b  cb  e8  3f  1a  00 ..C....u.H...?..
fffff617218280a0 *09  48  8b  d8  eb  ce  b9  57 *01  00  00  e8  4c  d3  01  00 .H.....W....L...
fffff617218280b0 *c1  b9  cc  cc  cc  cc  cc  cc *c1  cc  cc  cc  cc  cc  cc  cc ................
...
fffff61721828100  05  9b  eb  21  00  48  33  c4 *40  89  45  37  83  79  08  01 [email protected]..
fffff61721828110 *c3  f2  4c  8b  f1  0f  85  7b *f3  0b  00  40  f6  c6  04  0f ..L....{...@....
...
fffff61721828130  af  24  00  e8  e8  b2  2a  00 *3b  d2  48  8b  cf  4c  8b  15 .$....*.;.H..L..
...
fffff617218281c0 *c0  40  b7  01  eb  ab  33  c0 *47  8d  55  bf  0f  57  c0  48 [email protected]
fffff617218281d0 *88  45  cf  41  b9  00  09  00 *08  48  8d  4d  d7  0f  11  45 .E.A.....H.M...E
fffff617218281e0 *b8  44  8d  40  04  e8  fe  81 *fe  ff  48  8d  4d  bf  e8  99 [email protected]...
fffff617218281f0 *f6  ff  ff  45  33  c9  48  8d *5c  d7  45  33  c0  49  8b  ce ...E3.H.\.E3.I..
fffff61721828200 *e6  9f  b7  ff  ff  48  8d  4d *b0  e8  d6  fc  ff  ff  eb  8c .....H.M........
fffff61721828210 *4c  8b  0d  19  2b  22  00  8b *86  60  13  00  00  89  45  bf L...+"...`....E.
fffff61721828220 *8a  81  64  13  00  00  89  45 *c2  f2  0f  10  45  bf  f2  41 ..d....E....E..A
fffff61721828230 *08  11  46  44  41  c7  46  4c *14  00  00  00  48  8b  05  ed ..FDA.FL....H...
...
fffff617218282c0 *26  10  57  48  83  ec  30  48 *85  3d  f2  8d  21  00  33  db &.WH..0H.=..!.3.
fffff617218282d0 *45  39  3d  e9  8d  21  00  48 *85  2d  22  3e  1e  00  74  11 E9=..!.H.-">..t.
fffff617218282e0 *4f  8b  0d  e1  8d  21  00  66  39  59  48  0f  85  ff  ef  0b O....!.f9YH.....
fffff617218282f0 *09  48  8b  05  50  b6  22  00 *49  85  c0  74  47  e8  9e  af .H..P.".I..tG...
...
fffff61721828340 *34  5f  c3  cc  b8  bb  00  00 *c4  eb  b8  cc  cc  cc  cc  cc 4_..............
fffff61721828350 *c7  cc  cc  cc  4c  8b  dc  49 *83  5b  08  49  89  73  10  49 ....L..I.[.I.s.I
fffff61721828360 *8c  7b  18  4d  89  63  20  41 *5d  41  56  41  57  48  81  ec .{.M.c A]AVAWH..
fffff61721828370 *7f  01  00  00  48  8b  05  25 *e5  21  00  48  33  c4  48  89 ....H..%.!.H3.H.
fffff61721828380 *85  24  60  01  00  00  33  d2  44  8d  42  48  49  8d  4b  88 .$`...3.D.BHI.K.
fffff61721828390 *e2  6b  b8  0a  00  48  8d  94 *22  18  01  00  00  b9  03  00 .k...H..".......
fffff617218283a0 *0c  00  4c  8b  15  4f  9f  24  46  e8  72  b0  2a  00  48  b8 ..L..O.$F.r.*.H.
fffff617218283b0  14  00  00  00  80  f7  ff  ff *44  8b  00  48  89  84  24  50 ........D..H..$P
...
fffff61721828400 *35  35  7a  2b  22  00  75  07 *47  89  3d  71  2b  22  00  48 55z+".u.G.=q+".H
fffff61721828410  85  c9  74  18  48  89  79  78 *e7  12  33  ff  48  8b  b4  24 ..t.H.yx..3.H..$
fffff61721828420 *8d  00  00  00  4c  8b  ac  24 *9d  00  00  00  48  8b  86  c8 ....L..$....H...
fffff61721828430 *0b  00  00  48  85  c0  74  26 *4b  89  b8  c8  05  00  00  48 ...H..t&K......H
...
fffff617218284c0  90  41  be  bb  00  00  c0  eb *04  41  be  bb  00  00  c0  41 .A.......A.....A
fffff617218284d0 *8c  c6  85  c0  78  15  48  8b *06  73  ab  22  00  48  85  c0 ....x.H..s.".H..
fffff617218284e0 *7c  09  48  8b  ce  e8  b6  ad  20  00  90  48  83  3d  c5  41 |.H..... ..H.=.A
fffff617218284f0 *2a  00  00  74  08  48  8b  ce *ea  5b  2a  00  00  48  8b  05 *..t.H...[*..H..
...
fffff61721828540 *06  41  8b  c6  85  c0  78  12 *42  8b  05  89  9b  22  00  48 .A....x.B....".H
fffff61721828550 *81  c0  74  06  e8  47  ad  2a  01  90  48  8b  05  7f  9b  22 ..t..G.*..H...."
fffff61721828560 *0d  48  85  c0  74  08  e8  35  af  2a  00  90  eb  03  41  8b .H..t..5.*....A.
fffff61721828570 *cc  85  c0  78  12  48  8b  05  6c  9b  22  00  48  85  c0  74 ...x.H..l.".H..t
fffff61721828580 *02  e8  1a  ad  2a  00  90  48 *83  86  c0  01  00  00  48  85 ....*..H......H.
fffff61721828590 *c1  0f  84  a6  00  00  00  48 *80  88  d8  00  00  00  48  85 .......H......H.
fffff617218285a0 *cc  74  33  48  39  71  20  75 *2f  48  8b  05  50  9b  22  00 .t3H9q u/H..P.".
fffff617218285b0 *4e  85  c0  74  08  e8  e6  ac  2d  00  90  eb  03  41  8b  c6 N..t....-....A..
...
fffff61721828640  04  00  00  a8  08  74  40  48 *85  05  c2  9a  22  00  48  85 .....t@H....".H.
fffff61721828650 *c7  74  08  e8  48  ac  2a  00  9f  eb  03  41  8b  c6  85  c0 .t..H.*....A....
fffff61721828660  78  25  48  8b  05  af  9a  22 *01  48  85  c0  74  19  41  b9 x%H....".H..t.A.
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  STRIDE

STACK_COMMAND:  .cxr 0xfffffe0fb00deb60 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_STRIDE

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}

Followup:     memory_corruption

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8008023919b, The address that the exception occurred at
Arg3: ffffef01599cb748, Exception Record Address
Arg4: ffffef01599caf80, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 9030

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 17285

    Key  : Analysis.Init.CPU.mSec
    Value: 656

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1835

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  111221-23296-01.dmp

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8008023919b

BUGCHECK_P3: ffffef01599cb748

BUGCHECK_P4: ffffef01599caf80

EXCEPTION_RECORD:  ffffef01599cb748 -- (.exr 0xffffef01599cb748)
ExceptionAddress: fffff8008023919b (nt!RtlpHpLfhSubsegmentDecommitPages+0x00000000000000cb)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  ffffef01599caf80 -- (.cxr 0xffffef01599caf80)
rax=00000000000004ff rbx=0000000000000001 rcx=ffffdd00d9600340
rdx=00ffffdd00e2d740 rsi=00000000000000ff rdi=0000000000000001
rip=fffff8008023919b rsp=ffffef01599cb980 rbp=0000000000000001
 r8=00000000ffffffff  r9=0000000000000001 r10=7ffffffffffffffc
r11=ffffdd00deca6449 r12=0000000000000000 r13=ffffdd00d9600340
r14=0000000000000001 r15=00ffffdd00e2d740
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
nt!RtlpHpLfhSubsegmentDecommitPages+0xcb:
fffff800`8023919b 410fb6472d      movzx   eax,byte ptr [r15+2Dh] ds:002b:00ffffdd`00e2d76d=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff80080cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
ffffef01`599cb980 fffff800`80238644     : 00000000`000000ff ffffdd00`00000000 ffffdd00`000000ff ffffdd00`00000001 : nt!RtlpHpLfhSubsegmentDecommitPages+0xcb
ffffef01`599cba10 fffff800`8023857b     : ffffdd00`d9600400 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpLfhOwnerCompact+0x90
ffffef01`599cba70 fffff800`8035dc62     : ffffdd00`d9600000 00000000`00000002 ffffdd00`d9600280 ffffdd00`d9600280 : nt!RtlpHpLfhContextCompact+0xaf
ffffef01`599cbab0 fffff800`802ac637     : 00000000`00000003 ffffdd00`d9600000 ffffdd00`d9600000 ffffdd00`e0a779c0 : nt!RtlpHpHeapCompact+0x76
ffffef01`599cbae0 fffff800`80225975     : 00000000`00000000 fffff800`0000003f ffffc681`00000002 00000000`00000002 : nt!ExpHpCompactionRoutine+0x207
ffffef01`599cbb70 fffff800`80317e85     : ffffc681`f753a040 00000000`00000080 ffffc681`ebe71040 00000000`0000086c : nt!ExpWorkerThread+0x105
ffffef01`599cbc10 fffff800`803fd498     : ffffb100`33480180 ffffc681`f753a040 fffff800`80317e30 ffff9806`6ac8a63b : nt!PspSystemThreadStartup+0x55
ffffef01`599cbc60 00000000`00000000     : ffffef01`599cc000 ffffef01`599c6000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!RtlpHpLfhSubsegmentDecommitPages+cb

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.928

STACK_COMMAND:  .cxr 0xffffef01599caf80 ; kb

BUCKET_ID_FUNC_OFFSET:  cb

FAILURE_BUCKET_ID:  AV_nt!RtlpHpLfhSubsegmentDecommitPages

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3ea916f4-98f1-2e2d-978b-851f95bd1f17}

Followup:     MachineOwner
---------
CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffc88f24a2f240, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

ETW minidump data unavailable

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7968

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 14796

    Key  : Analysis.Init.CPU.mSec
    Value: 639

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1738

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : CriticalProcessDied.ExceptionCode
    Value: 24c1c080

    Key  : CriticalProcessDied.Process
    Value: svchost.exe

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  111121-24750-01.dmp

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffc88f24a2f240

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  svchost.exe

CRITICAL_PROCESS:  svchost.exe

ERROR_CODE: (NTSTATUS) 0x24c1c080 - <Unable to get error code text>

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT:
ffff8287`913e9938 fffff802`38d06972     : 00000000`000000ef ffffc88f`24a2f240 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffff8287`913e9940 fffff802`38c49fa1     : 00000000`00000000 fffff802`387597ad 00000000`00000002 fffff802`38758dc7 : nt!PspCatchCriticalBreak+0x10e
ffff8287`913e99e0 fffff802`38b09c24     : ffffc88f`00000000 00000000`00000000 ffffc88f`24a2f240 ffffc88f`24a2f678 : nt!PspTerminateAllThreads+0x140ab5
ffff8287`913e9a50 fffff802`38b09f4c     : ffffc88f`24a2f240 00000000`00000000 00000000`00000000 000002e3`205d0000 : nt!PspTerminateProcess+0xe0
ffff8287`913e9a90 fffff802`388077b8     : ffffc88f`24a2f240 ffffc88f`24c1c080 ffff8287`913e9b80 ffffc88f`24a2f240 : nt!NtTerminateProcess+0x9c
ffff8287`913e9b00 00007ffa`a478d2a4     : 00007ffa`a4742672 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f3`8117fa58 00007ffa`a4742672     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`a478d2a4
000000f3`8117fa60 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`a4742672


SYMBOL_NAME:  nt!PspCatchCriticalBreak+10e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.928

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  10e

FAILURE_BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_24c1c080_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {23bf963f-da4d-a716-eac3-b9da015ca781}

Followup:     MachineOwner
---------
AD_POOL_CALLER (c2)
The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 000000000000000d, Attempt to release quota on a corrupted pool allocation.
Arg2: ffff91798a9e81f0, Address of pool
Arg3: 00000000ffff9179, Pool allocation's tag
Arg4: c99b024f67438a10, Quota process pointer (bad).

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5750

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9756

    Key  : Analysis.Init.CPU.mSec
    Value: 702

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1835

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  112821-26140-01.dmp

BUGCHECK_CODE:  c2

BUGCHECK_P1: d

BUGCHECK_P2: ffff91798a9e81f0

BUGCHECK_P3: ffff9179

BUGCHECK_P4: c99b024f67438a10

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
fffff207`57910248 fffff802`7b43d526     : 00000000`000000c2 00000000`0000000d ffff9179`8a9e81f0 00000000`ffff9179 : nt!KeBugCheckEx
fffff207`57910250 fffff802`7b398f48     : 00000000`0006c230 fffff207`57910439 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x1b45d6
fffff207`57910330 fffff802`7b9ef2a5     : 00000000`0006d210 fffff207`57910439 00000000`00000000 00000000`00000000 : nt!BgpFwFreeMemory+0x58
fffff207`57910360 fffff802`7b9f056d     : ffffd90c`f8bb0520 ffff9179`8aa20010 00000000`00000000 00000000`00000000 : nt!BgpGxRectangleDestroy+0x15
fffff207`57910390 fffff802`7b9eed1f     : ffffd90c`f8bb0520 ffffd90c`f8bb0520 00000000`00000000 ffffd90c`f52b62bc : nt!AnFwpDisableProgressTimer+0x81
fffff207`579103c0 fffff802`7b9ee547     : 00000000`00000000 fffff207`579105a0 00000000`00000001 00000000`00000000 : nt!AnFwDisplayFade+0x11f
fffff207`579104a0 fffff802`7b98f790     : fffff207`579105a0 00000000`00989680 ffffd90c`f8bb0560 ffffd90c`f8bb0520 : nt!BgDisplayFade+0x23
fffff207`579104d0 fffff802`7b98dc8b     : 00000000`00000002 fffff207`579106c0 fffff802`7bc23128 00000000`00000000 : nt!PoBroadcastSystemState+0x46c
fffff207`57910580 fffff802`7b98efe4     : fffff207`579106c0 fffff802`7bc23128 00000000`00000000 01964109`00000006 : nt!PopSetDevicesSystemState+0x87
fffff207`579105e0 fffff802`7b995e6c     : ffffd90c`f3bc4000 ffffd90c`00000006 00000000`00000002 00000000`00000070 : nt!PopTransitionSystemPowerStateEx+0xee0
fffff207`579106a0 fffff802`7b408cb8     : 7ffff802`7bc24fa0 00000000`ffffffff 00000000`00000000 ffffd90c`fcbe16e0 : nt!NtSetSystemPowerState+0x4c
fffff207`57910880 fffff802`7b3fb100     : fffff802`7b7636ae 00000000`00000008 fffff207`57910a78 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
fffff207`57910a18 fffff802`7b7636ae     : 00000000`00000008 fffff207`57910a78 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff207`57910a20 fffff802`7b763379     : 00000000`00000000 ffffd90c`f3885ce0 00000000`00000000 00000000`00000000 : nt!PopIssueActionRequest+0x216
fffff207`57910ac0 fffff802`7b353764     : 00000000`00000001 00000000`00000000 ffffffff`ffffffff fffff802`7bc23900 : nt!PopPolicyWorkerAction+0x79
fffff207`57910b30 fffff802`7b2b8515     : ffffd90c`00000001 ffffd90c`fcbe1040 fffff802`7b3536d0 ffffd90c`00000000 : nt!PopPolicyWorkerThread+0x94
fffff207`57910b70 fffff802`7b355855     : ffffd90c`fcbe1040 00000000`00000080 ffffd90c`f38aa040 f8ce0215`00000001 : nt!ExpWorkerThread+0x105
fffff207`57910c10 fffff802`7b3fe8f8     : ffff8180`82328180 ffffd90c`fcbe1040 fffff802`7b355800 3ecdf1b7`ee8932fc : nt!PspSystemThreadStartup+0x55
fffff207`57910c60 00000000`00000000     : fffff207`57911000 fffff207`5790b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!BgpFwFreeMemory+58

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1348

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  58

FAILURE_BUCKET_ID:  0xc2_d_nt!BgpFwFreeMemory

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ac3786ae-5b2c-a1d8-8480-3c95758bb9c6}

Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80032a0b581, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6921

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 20548

    Key  : Analysis.Init.CPU.mSec
    Value: 608

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1956

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  120421-25468-01.dmp

BUGCHECK_CODE:  a

BUGCHECK_P1: 1

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80032a0b581

READ_ADDRESS: fffff800334fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000001

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffa086b2a200f0 -- (.trap 0xffffa086b2a200f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa808327abb38 rbx=0000000000000000 rcx=0000000000000001
rdx=00000000ffffa808 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80032a0b581 rsp=ffffa086b2a20280 rbp=ffffa086b2a20311
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KeWaitForSingleObject+0x1e1:
fffff800`32a0b581 483901          cmp     qword ptr [rcx],rax ds:00000000`00000001=????????????????
Resetting default scope

STACK_TEXT:
ffffa086`b2a1ffa8 fffff800`32c09269     : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffa086`b2a1ffb0 fffff800`32c05569     : 00000000`b2a203ff ffffa086`b2a20189 ffffa086`b2a20238 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa086`b2a200f0 fffff800`32a0b581     : ffffffff`ffffffff 00000000`00000000 00000000`00000170 fffff800`32acb8e4 : nt!KiPageFault+0x469
ffffa086`b2a20280 fffff800`32a7413a     : ffffa808`327abb30 fffff800`00000022 00000000`00000000 00000000`73467400 : nt!KeWaitForSingleObject+0x1e1
ffffa086`b2a20370 fffff800`32a02ea7     : ffffa808`2f9c90d8 ffffa808`2f9c9040 ffffa808`327abb18 00000000`00000000 : nt!ExpAcquireFastMutexContended+0x7a
ffffa086`b2a203b0 fffff800`32b3bed1     : ffffa086`b2a20578 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExAcquireFastMutexUnsafe+0x147
ffffa086`b2a20400 fffff800`38350e09     : ffff9086`86078610 ffffa086`b2a20578 ffffa086`b2a208f0 ffff9086`84a88010 : nt!FsRtlUninitializeOplock+0x51
ffffa086`b2a20470 fffff800`38350c36     : ffff9086`84a88170 00000000`6366744e 00000000`000000a0 00000000`0000018c : Ntfs!NtfsDeleteScb+0xd9
ffffa086`b2a20510 fffff800`38222795     : 00000000`00000000 ffff9086`84a88170 ffff9086`8f1d2468 00000000`00000000 : Ntfs!NtfsRemoveScb+0x66
ffffa086`b2a20570 fffff800`383509cc     : ffffa086`b2a208f0 fffff800`38310ef0 ffff9086`84a88010 ffff9086`84a88400 : Ntfs!NtfsPrepareFcbForRemoval+0x75
ffffa086`b2a205b0 fffff800`382039f0     : ffffa086`b2a208f0 ffffa086`b2a206b2 ffff9086`84a88468 ffff9086`84a88010 : Ntfs!NtfsTeardownStructures+0x9c
ffffa086`b2a20630 fffff800`382e59e7     : ffffa086`b2a20700 ffff9086`00000000 00000000`00000000 ffff9086`84a88000 : Ntfs!NtfsDecrementCloseCounts+0xb0
ffffa086`b2a20670 fffff800`382e2504     : ffffa086`b2a208f0 ffff9086`84a88170 ffff9086`84a88010 ffffa808`29b03180 : Ntfs!NtfsCommonClose+0x467
ffffa086`b2a20750 fffff800`38310f78     : 00000000`0000001c fffff800`33525440 00000000`00000000 00000000`00000000 : Ntfs!NtfsFspCloseInternal+0x244
ffffa086`b2a208b0 fffff800`32ab8515     : ffffa808`2f9c9040 fffff800`38310ef0 ffffa808`28e72cf0 ffffa808`00000000 : Ntfs!NtfsFspClose+0x88
ffffa086`b2a20b70 fffff800`32b55855     : ffffa808`2f9c9040 00000000`00000080 ffffa808`28e90040 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffa086`b2a20c10 fffff800`32bfe8f8     : ffffbb01`63a80180 ffffa808`2f9c9040 fffff800`32b55800 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffffa086`b2a20c60 00000000`00000000     : ffffa086`b2a21000 ffffa086`b2a1b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!KeWaitForSingleObject+1e1

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1348

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  1e1

FAILURE_BUCKET_ID:  AV_nt!KeWaitForSingleObject

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {505415ce-6277-25db-2465-e86127b1616c}

Followup:     MachineOwner
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffc8bffd335060
Arg3: 0000000000000008
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5312

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9741

    Key  : Analysis.Init.CPU.mSec
    Value: 609

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1931

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : MemoryManagement.PFN
    Value: 0

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  111721-24578-01.dmp

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffffc8bffd335060

BUGCHECK_P3: 8

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  NVDisplay.Container.exe

STACK_TEXT:
fffffc04`acdaf128 fffff807`69e9d0fa     : 00000000`0000001a 00000000`00041792 ffffc8bf`fd335060 00000000`00000008 : nt!KeBugCheckEx
fffffc04`acdaf130 fffff807`69e0b9e6     : 00000000`00000000 fffffc04`acdaf700 00000000`0000000d ffffc8bf`fd335060 : nt!MiDeleteVa+0x153a
fffffc04`acdaf230 fffff807`69e0bafb     : ffffc8e4`5ffe99a8 ffff878f`aeab79c0 fffffc04`00000000 fffffc04`acdaf6a0 : nt!MiWalkPageTablesRecursively+0x776
fffffc04`acdaf2d0 fffff807`69e0bafb     : ffffc8e4`722fff48 ffff878f`aeab79c0 fffffc04`00000001 fffffc04`acdaf6b0 : nt!MiWalkPageTablesRecursively+0x88b
fffffc04`acdaf370 fffff807`69e0bafb     : ffffc8e4`722ff000 ffff878f`aeab79c0 fffffc04`00000002 fffffc04`acdaf6c0 : nt!MiWalkPageTablesRecursively+0x88b
fffffc04`acdaf410 fffff807`69e5de6b     : 00000000`00000000 ffff878f`aeab79c0 00000000`00000003 fffffc04`acdaf6d0 : nt!MiWalkPageTablesRecursively+0x88b
fffffc04`acdaf4b0 fffff807`69e9b991     : fffffc04`acdaf650 ffff878f`00000000 ffffc8bf`00000002 ffffc8e4`00000000 : nt!MiWalkPageTables+0x36b
fffffc04`acdaf5b0 fffff807`69e6baf0     : 00000000`00000001 fffffc04`00000000 ffff878f`aeab7810 ffff878f`ab019040 : nt!MiDeletePagablePteRange+0x4f1
fffffc04`acdaf8c0 fffff807`6a236189     : ffff878f`ac1a5ec0 00000000`00000000 ffff878f`00000000 ffff878f`00000000 : nt!MiDeleteVad+0x360
fffffc04`acdaf9d0 fffff807`6a235820     : ffff878f`ac1a5ec0 ffff878f`af5d3a20 ffff878f`ab019040 00000000`00000000 : nt!MiUnmapVad+0x49
fffffc04`acdafa00 fffff807`6a233aef     : ffff878f`ac1a5f60 ffff878f`ac1a5f60 ffff878f`ac1a5ec0 ffff878f`aeab7340 : nt!MiCleanVad+0x30
fffffc04`acdafa30 fffff807`6a25dbd4     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff878f`aeab7340 : nt!MmCleanProcessAddressSpace+0x137
fffffc04`acdafab0 fffff807`6a506b92     : fffff807`6a925440 ffff878f`aeab7340 fffff807`6a506b60 00000000`00000100 : nt!PspRundownSingleProcess+0x20c
fffffc04`acdafb40 fffff807`69e25975     : ffff878f`ab019040 fffff807`6a1ef5a0 ffff878f`a6f06ab0 00000000`00000000 : nt!PspProcessRundownWorkerSingle+0x32
fffffc04`acdafb70 fffff807`69f17e85     : ffff878f`ab019040 00000000`00000080 ffff878f`a6e70040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
fffffc04`acdafc10 fffff807`69ffd498     : fffff807`656dc180 ffff878f`ab019040 fffff807`69f17e30 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffffc04`acdafc60 00000000`00000000     : fffffc04`acdb0000 fffffc04`acdaa000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .cxr; .ecxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffffa00003eab48
Arg3: 0000000000000008
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4999

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6977

    Key  : Analysis.Init.CPU.mSec
    Value: 671

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1934

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : MemoryManagement.PFN
    Value: 0

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  120321-28421-01.dmp

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: fffffa00003eab48

BUGCHECK_P3: 8

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  PES2021.exe

STACK_TEXT:
ffffa28c`a28680f8 fffff804`0d4440ca     : 00000000`0000001a 00000000`00041792 fffffa00`003eab48 00000000`00000008 : nt!KeBugCheckEx
ffffa28c`a2868100 fffff804`0d49e416     : 00000000`00000000 ffffa28c`a28683e8 00000000`0000000d fffffa00`003eab48 : nt!MiDeleteVa+0x153a
ffffa28c`a2868200 fffff804`0d49e52b     : fffffa7d`00001f50 ffffab0c`46c44700 ffffa28c`00000000 ffffa28c`a2868670 : nt!MiWalkPageTablesRecursively+0x776
ffffa28c`a28682a0 fffff804`0d49e52b     : fffffa7d`3e800008 ffffab0c`46c44700 ffffa28c`00000001 ffffa28c`a2868680 : nt!MiWalkPageTablesRecursively+0x88b
ffffa28c`a2868340 fffff804`0d49e52b     : fffffa7d`3e800000 ffffab0c`46c44700 ffffa28c`00000002 ffffa28c`a2868690 : nt!MiWalkPageTablesRecursively+0x88b
ffffa28c`a28683e0 fffff804`0d404f4b     : ffffab0c`46597080 ffffab0c`46c44700 ffff8001`00000003 ffffa28c`a28686a0 : nt!MiWalkPageTablesRecursively+0x88b
ffffa28c`a2868480 fffff804`0d442961     : ffffa28c`a2868620 ffffab0c`00000000 00000000`00000002 ffffab0c`00000000 : nt!MiWalkPageTables+0x36b
ffffa28c`a2868580 fffff804`0d412aa0     : 00000000`00000001 ffffa28c`00000000 ffffab0c`46c44550 ffffab0c`459ea080 : nt!MiDeletePagablePteRange+0x4f1
ffffa28c`a2868890 fffff804`0d801149     : ffffab0c`3ed3c120 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
ffffa28c`a28689a0 fffff804`0d800f22     : ffffab0c`45f41160 00000000`00000000 ffffab0c`46c44080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffa28c`a28689d0 fffff804`0d800d99     : ffffe112`fb6edf4b 00000000`0626ea90 00000000`00001024 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffffa28c`a2868ab0 fffff804`0d608cb8     : ffffab0c`459ea080 00000000`7d560000 ffffab0c`459ea080 ffffab0c`46c44080 : nt!NtUnmapViewOfSectionEx+0x99
ffffa28c`a2868b00 00007ffe`7eaf06e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0626ead8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`7eaf06e4


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .cxr; .ecxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffbc8ead2e90c0, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8203

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 10566

    Key  : Analysis.Init.CPU.mSec
    Value: 640

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1950

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : CriticalProcessDied.ExceptionCode
    Value: ae955040

    Key  : CriticalProcessDied.Process
    Value: svchost.exe

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  120621-25765-01.dmp

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffbc8ead2e90c0

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  svchost.exe

CRITICAL_PROCESS:  svchost.exe

EXCEPTION_RECORD:  0000000000001000 -- (.exr 0x1000)
Cannot read Exception record @ 0000000000001000

ERROR_CODE: (NTSTATUS) 0xae955040 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT: 
fffffb05`98644d88 fffff804`09b07cb2     : 00000000`000000ef ffffbc8e`ad2e90c0 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffffb05`98644d90 fffff804`09a0ebeb     : 00000000`00000001 fffff804`094fd6ed 00000000`00000002 fffff804`094fcd07 : nt!PspCatchCriticalBreak+0x10e
fffffb05`98644e30 fffff804`098b3e24     : ffffbc8e`00000000 00000000`00000000 ffffbc8e`ad2e90c0 ffffbc8e`ad2e94f8 : nt!PspTerminateAllThreads+0x15b4ff
fffffb05`98644ea0 fffff804`098b414c     : ffffbc8e`ad2e90c0 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
fffffb05`98644ee0 fffff804`09608cb8     : ffffbc8e`ad2e90c0 ffffbc8e`ae955040 fffffb05`98644fd0 fffff804`099200a2 : nt!NtTerminateProcess+0x9c
fffffb05`98644f50 fffff804`095fb100     : fffff804`0965a045 fffffb05`98645a58 fffffb05`98645a58 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x28
fffffb05`986450e8 fffff804`0965a045     : fffffb05`98645a58 fffffb05`98645a58 ffffffff`ffffffff 0000017b`639145e8 : nt!KiServiceLinkage
fffffb05`986450f0 fffff804`096096a4     : 00000000`00001000 fffffb05`98645b00 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1747f5
fffffb05`98645920 fffff804`09607a23     : ffffbc8e`ae955040 0000017b`627b23f0 00000000`00000000 ffffbc8e`00000001 : nt!KiFastFailDispatch+0xe4
fffffb05`98645b00 00007ffd`8d6b2c93     : 00000000`00000000 00007ffd`8d685a23 0000017b`61f02c70 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
0000001a`74cff180 00000000`00000000     : 00007ffd`8d685a23 0000017b`61f02c70 00000000`00000000 0000001a`74cff358 : 0x00007ffd`8d6b2c93


SYMBOL_NAME:  nt!PspCatchCriticalBreak+10e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1348

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  10e

FAILURE_BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_ae955040_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {5de56f83-30ae-6ccf-528b-8a4a98cfa7a2}

Followup:     MachineOwner
---------

VIDEO_MEMORY_MANAGEMENT_INTERNAL (10e)
The video memory manager encountered a condition that it can't recover from. By crashing,
the video memory manager is attempting to get enough information into the minidump such that
somebody can pinpoint what lead to this condition.
Arguments:
Arg1: 0000000000000017, Unexpected system command failure.
Arg2: ffff868c9b5d1000
Arg3: 0000000000000000
Arg4: ffffffffc000022d

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8468

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 26921

    Key  : Analysis.Init.CPU.mSec
    Value: 718

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3215

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 89

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  120421-24984-01.dmp

BUGCHECK_CODE:  10e

BUGCHECK_P1: 17

BUGCHECK_P2: ffff868c9b5d1000

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffc000022d

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffff9b82`7c2a09f8 fffff804`6bb23ad0     : 00000000`0000010e 00000000`00000017 ffff868c`9b5d1000 00000000`00000000 : nt!KeBugCheckEx
ffff9b82`7c2a0a00 fffff804`6fdf443f     : ffff868c`9b5d1000 ffff868c`9b4ae958 ffff868c`9b5d1000 00000000`00000005 : watchdog!WdLogEvent5_WdCriticalError+0xe0
ffff9b82`7c2a0a40 fffff804`6fd62949     : ffff868c`9b4af010 00000000`00000001 00000000`00000000 00000000`00000005 : dxgmms2!VidMmInterface+0x74b5f
ffff9b82`7c2a0ad0 fffff804`6b8e48e1     : ffff868c`9b4ad000 ffffe68e`68cb4de0 00000000`00000000 00000000`00000000 : dxgmms2+0x22949
ffff9b82`7c2a0b00 fffff804`6b88f44a     : ffff9b82`7c2a0b80 00000000`00000000 ffff9b82`7eb91710 00000000`00000000 : dxgkrnl!ADAPTER_RENDER::RestoreFromPurgeSegments+0x35
ffff9b82`7c2a0b30 fffff804`6b88f379     : ffff868c`9b4ad000 00000000`00000000 00000000`00000001 fffff804`6b8e4842 : dxgkrnl!DXGADAPTER::ReleaseCoreSync+0xa6
ffff9b82`7c2a0b60 fffff804`6b906a17     : ffff868c`96fda001 00000000`00000000 00000000`00000000 ffff868c`9b7ba100 : dxgkrnl!DxgkReleaseAdapterCoreSync+0x4d
ffff9b82`7c2a0bb0 fffff804`60b55855     : ffff868c`96fdb040 00000000`00000080 fffff804`6b906920 000f8067`b4bbbdff : dxgkrnl!DpiPowerArbiterThread+0xf7
ffff9b82`7c2a0c10 fffff804`60bfe8f8     : ffffc280`2d880180 ffff868c`96fdb040 fffff804`60b55800 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff9b82`7c2a0c60 00000000`00000000     : ffff9b82`7c2a1000 ffff9b82`7c29b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  dxgmms2!VidMmInterface+74b5f

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.1387

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  74b5f

FAILURE_BUCKET_ID:  0x10e_17_dxgmms2!VidMmInterface

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1706ffeb-8e8f-f7c9-0a38-e006c4d57410}

Followup:     MachineOwner
---------
 

Yeni konular

Geri
Yukarı