ardaalmynk
Femtopat
- Katılım
- 16 Mayıs 2025
- Mesajlar
- 24
- Çözümler
- 1
Daha fazla
- Cinsiyet
- Erkek
Bilgisayar boşta olsun ya da olmasın 2 saatte bir mavi ekran veriyor.
BIOS ve NVIDIA driveri günceldir.
Minidump kodu:
BIOS ve NVIDIA driveri günceldir.
Minidump kodu:
Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 45
Microsoft (R) Windows Debugger Version 10.0.27920.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\ardaalmynk\Desktop\092825-6984-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff804`39400000 PsLoadedModuleList = 0xfffff804`3a02a930
Debug session time: Sun Sep 28 22:02:47.232 2025 (UTC + 3:00)
System Uptime: 0 days 0:22:59.915
Loading Kernel Symbols
...............................................................
................................................................
...................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000041`71c9f018). Type ".hh dbgerr001" for details
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`397fd570 48894c2408 mov qword ptr [rsp+8],rcx ss:ffff8300`3d8a7d30=000000000000007f
6: kd> !analyze -v
Loading Kernel Symbols
...............................................................
................................................................
...................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000041`71c9f018). Type ".hh dbgerr001" for details
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
BugCheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffff83003d8a7e70
Arg3: ffffbc84f5c8cfe0
Arg4: fffff8043973f5fc
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1890
Key : Analysis.Elapsed.mSec
Value: 7952
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 484
Key : Analysis.Init.Elapsed.mSec
Value: 2257
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Analysis.Version.DbgEng
Value: 10.0.27920.1001
Key : Analysis.Version.Description
Value: 10.2506.23.01 amd64fre
Key : Analysis.Version.Ext
Value: 1.2506.23.1
Key : Bugcheck.Code.LegacyAPI
Value: 0x7f
Key : Bugcheck.Code.TargetModel
Value: 0x7f
Key : Failure.Bucket
Value: 0x7f_8_nt!KiDoubleFaultAbort
Key : Failure.Hash
Value: {d1f8395a-8c58-45da-6ebf-e8bb4aad2fc5}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
Key : WER.System.BIOSRevision
Value: 5.17.0.0
BUGCHECK_CODE: 7f
BUGCHECK_P1: 8
BUGCHECK_P2: ffff83003d8a7e70
BUGCHECK_P3: ffffbc84f5c8cfe0
BUGCHECK_P4: fffff8043973f5fc
FILE_IN_CAB: 092825-6984-01.dmp
FAULTING_THREAD: ffffe60af3e4b080
TRAP_FRAME: ffff83003d8a7e70 -- (.trap 0xffff83003d8a7e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbc84f5c8d018 rbx=0000000000000000 rcx=000000000010001f
rdx=ffffbc84f5c8d004 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043973f5fc rsp=ffffbc84f5c8cfe0 rbp=ffffbc84f5c8d050
r8=0000000000000000 r9=ffffe60af3e4b080 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlGetExtendedContextLength2+0x2c:
fffff804`3973f5fc e83f070000 call nt!RtlpValidateContextFlags (fffff804`3973fd40)
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1 (!blackboxwinlogon)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: cs2.exe
STACK_TEXT:
ffff8300`3d8a7d28 fffff804`39811da9 : 00000000`0000007f 00000000`00000008 ffff8300`3d8a7e70 ffffbc84`f5c8cfe0 : nt!KeBugCheckEx
ffff8300`3d8a7d30 fffff804`3980c252 : 45c0220f`44c6b60f 3feb1075`8d45ed33 41000004`70878b48 48006286`a1e8ca8b : nt!KiBugCheckDispatch+0x69
ffff8300`3d8a7e70 fffff804`3973f5fc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2d2
ffffbc84`f5c8cfe0 fffff804`3973c3fd : ffffbc84`f5c8d318 000004ce`82d87680 000004cf`5a938c00 fffff804`00000000 : nt!RtlGetExtendedContextLength2+0x2c
ffffbc84`f5c8d020 fffff804`39811eec : ffffbc84`f5c8d420 000004cf`3b090d00 000004ce`82d87680 ffffbc84`f5c8d378 : nt!KiDispatchException+0xcd
ffffbc84`f5c8d1e0 fffff804`3980b978 : 000004ce`00000000 ffffe60a`f3e4b080 00000000`00000000 00000000`00000002 : nt!KiExceptionDispatch+0x12c
ffffbc84`f5c8d3c0 fffff804`3973c417 : f8043973`c417c395 00000000`0010ffff 00000005`02820000 bc84f5c8`d5860000 : nt!KiInvalidOpcodeFault+0x338
ffffbc84`f5c8d556 fffff804`39811eec : 4357f800`4357f800 4357f800`4357f800 00000000`3f800000 00000000`00000000 : nt!KiDispatchException+0xe7
ffffbc84`f5c8d210 00001f80`0180b978 : 00000000`00000506 00000000`0010001f ffffbc84`f5c8d068 00000000`000004f7 : nt!KiExceptionDispatch+0x12c
ffffbc84`f5c8d3f0 00000000`00000506 : 00000000`0010001f ffffbc84`f5c8d068 00000000`000004f7 00000000`000004d0 : 0x00001f80`0180b978
ffffbc84`f5c8d3f8 00000000`0010001f : ffffbc84`f5c8d068 00000000`000004f7 00000000`000004d0 00000000`00000000 : 0x506
ffffbc84`f5c8d400 ffffbc84`f5c8d068 : 00000000`000004f7 00000000`000004d0 00000000`00000000 00000000`00000002 : 0x10001f
ffffbc84`f5c8d408 00000000`000004f7 : 00000000`000004d0 00000000`00000000 00000000`00000002 00000000`0010001f : 0xffffbc84`f5c8d068
ffffbc84`f5c8d410 00000000`000004d0 : 00000000`00000000 00000000`00000002 00000000`0010001f 00000000`00000000 : 0x4f7
ffffbc84`f5c8d418 00000000`00000000 : 00000000`00000002 00000000`0010001f 00000000`00000000 00000000`00000000 : 0x4d0
SYMBOL_NAME: nt!KiDoubleFaultAbort+2d2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.6328
STACK_COMMAND: .process /r /p 0xffffe60b04fa8080; .thread 0xffffe60af3e4b080 ; kb
BUCKET_ID_FUNC_OFFSET: 2d2
FAILURE_BUCKET_ID: 0x7f_8_nt!KiDoubleFaultAbort
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d1f8395a-8c58-45da-6ebf-e8bb4aad2fc5}
Followup: MachineOwner
---------