Açılışta SYSTEM_SERVICE_EXCEPTION mavi ekran hatası

GGalaxy

Kilopat
Katılım
3 Haziran 2015
Mesajlar
119
Yer
İstanbul
Daha fazla  
Cinsiyet
Erkek
Meslek
Öğrenci (Üniversite)
Merhabalar, bugün bilgisayarımı açtığımda fanlarda kısa süreli bir hızlanma ve gürültülü çalışma durumu oldu (ekran sürekli siyah kaldı.) ancak kısa süre sonra bilgisayar yeniden başlatılarak Windows onarma ekranına geçti, bir takım işlemler yaptı ve açıldı. Sonrasında olay görüntülüyecisini incelediğimde hatanın tam dokümanını buldum ve ''C:\Windows\MEMORY.DMP. Rapor Kimliği: be5cadd5-9053-4f7d-b453-a607b9878814.'' şeklinde bir ibareyle kaydedildiği yer yazıyordu. Bu dosyayı sizlerle paylaşmak istiyorum ve çözüm için yardımlarınızı bekliyorum, ilgilenebileceklere şimdiden teşekkürler...
Memory.DMP ve Minidump dosyaları linkleri:
 
Ekran kartı sürücüsünü DDU ile kaldır tekrar yükle.

Komut satırını(CMD) yönetici olarak başlatın "sfc /scannow" yazın işlemi başlatın, işlem bitince bilgisayarı yeniden başlatın.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80753039c37, Address of the instruction which caused the bugcheck
Arg3: ffffe809d6d36d40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 401

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  MSI

SYSTEM_PRODUCT_NAME:  MS-7978

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  2.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  B.C0

BIOS_DATE:  07/05/2018

BASEBOARD_MANUFACTURER:  MSI

BASEBOARD_PRODUCT:  B150 GAMING M3 (MS-7978)

BASEBOARD_VERSION:  2.0

DUMP_TYPE:  1

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80753039c37

BUGCHECK_P3: ffffe809d6d36d40

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!ExAcquirePushLockExclusiveEx+107
fffff807`53039c37 f0480fba2e00    lock bts qword ptr [rsi],0

CONTEXT:  ffffe809d6d36d40 -- (.cxr 0xffffe809d6d36d40)
rax=0000000000000000 rbx=ffff828d5e50d0d8 rcx=ffff828d5e50d040
rdx=ffefc68fc53294e0 rsi=ffefc68fc53294e0 rdi=ffff828d5e50d360
rip=fffff80753039c37 rsp=ffffe809d6d37730 rbp=0000000000000008
r8=ffffe809d6d37778  r9=0000000000000000 r10=7ffffffffffffffc
r11=ffffe809d6d377b0 r12=ffff828d5e582c00 r13=0000000000000000
r14=ffff828d56ee0c40 r15=0000000000000001
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!ExAcquirePushLockExclusiveEx+0x107:
fffff807`53039c37 f0480fba2e00    lock bts qword ptr [rsi],0 ds:002b:ffefc68f`c53294e0=????????????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 4

CPU_MHZ: c78

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R)  SIG: C6'00000000 (cache) C6'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  taskhostw.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-09-2020 18:31:51.0702

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff80753609e3c to fffff80753039c37

STACK_TEXT:
ffffe809`d6d37730 fffff807`53609e3c : ffefc68f`c53294f0 ffff828d`00000000 ffff828d`00000000 00000000`00000000 : nt!ExAcquirePushLockExclusiveEx+0x107
ffffe809`d6d37770 fffff807`535c2e71 : ffffffff`00000000 ffff828d`00000000 ffff828d`5e582d48 ffff828d`5e582c60 : nt!AlpcpLockForCachedReferenceBlob+0x14
ffffe809`d6d377b0 fffff807`535c222e : ffff828d`5e582c60 ffffe809`d6d37939 ffff828d`5e582c30 ffffe809`d6d37939 : nt!AlpcpSendCloseMessage+0x75
ffffe809`d6d37820 fffff807`535ec408 : ffff828d`5e582c30 00000000`00000000 ffff828d`00000000 ffff828d`5e582c30 : nt!AlpcpClosePort+0x5e
ffffe809`d6d37850 fffff807`535f174e : 00000000`00000158 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObCloseHandleTableEntry+0x278
ffffe809`d6d37990 fffff807`531d2d15 : ffff828d`5e50d040 ffffe809`d6d37a80 ffffe809`d6d37a80 00000000`80210003 : nt!NtClose+0xde
ffffe809`d6d37a00 00007ffd`4215c2a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000036`6e27f908 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`4215c2a4


THREAD_SHA1_HASH_MOD_FUNC:  08287c524a254241f76f464ddb0612ad5398d34a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  ef28ee6ae7ff87b4579814537eb349a8ed406ba7

THREAD_SHA1_HASH_MOD:  30a3e915496deaace47137d5b90c3ecc03746bf6

FOLLOWUP_IP:
nt!ExAcquirePushLockExclusiveEx+107
fffff807`53039c37 f0480fba2e00    lock bts qword ptr [rsi],0

FAULT_INSTR_CODE:  ba0f48f0

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ExAcquirePushLockExclusiveEx+107

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4f6eba0

IMAGE_VERSION:  10.0.18362.592

STACK_COMMAND:  .cxr 0xffffe809d6d36d40 ; kb

BUCKET_ID_FUNC_OFFSET:  107

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ExAcquirePushLockExclusiveEx

BUCKET_ID:  0x3B_c0000005_nt!ExAcquirePushLockExclusiveEx

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_nt!ExAcquirePushLockExclusiveEx

TARGET_TIME:  2020-02-09T14:23:57.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  b47e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_nt!exacquirepushlockexclusiveex

FAILURE_ID_HASH:  {4fe31d77-fb81-4dc1-5992-c924ac6e709a}

Followup:     MachineOwner
---------
 
Ekran kartı sürücüsünü DDU ile kaldır tekrar yükle.

Komut satırını(CMD) yönetici olarak başlatın "sfc /scannow" yazın işlemi başlatın, işlem bitince bilgisayarı yeniden başlatın.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80753039c37, Address of the instruction which caused the bugcheck
Arg3: ffffe809d6d36d40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 401

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  MSI

SYSTEM_PRODUCT_NAME:  MS-7978

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  2.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  B.C0

BIOS_DATE:  07/05/2018

BASEBOARD_MANUFACTURER:  MSI

BASEBOARD_PRODUCT:  B150 GAMING M3 (MS-7978)

BASEBOARD_VERSION:  2.0

DUMP_TYPE:  1

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80753039c37

BUGCHECK_P3: ffffe809d6d36d40

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!ExAcquirePushLockExclusiveEx+107
fffff807`53039c37 f0480fba2e00    lock bts qword ptr [rsi],0

CONTEXT:  ffffe809d6d36d40 -- (.cxr 0xffffe809d6d36d40)
rax=0000000000000000 rbx=ffff828d5e50d0d8 rcx=ffff828d5e50d040
rdx=ffefc68fc53294e0 rsi=ffefc68fc53294e0 rdi=ffff828d5e50d360
rip=fffff80753039c37 rsp=ffffe809d6d37730 rbp=0000000000000008
r8=ffffe809d6d37778  r9=0000000000000000 r10=7ffffffffffffffc
r11=ffffe809d6d377b0 r12=ffff828d5e582c00 r13=0000000000000000
r14=ffff828d56ee0c40 r15=0000000000000001
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!ExAcquirePushLockExclusiveEx+0x107:
fffff807`53039c37 f0480fba2e00    lock bts qword ptr [rsi],0 ds:002b:ffefc68f`c53294e0=????????????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 4

CPU_MHZ: c78

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R)  SIG: C6'00000000 (cache) C6'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  taskhostw.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-09-2020 18:31:51.0702

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff80753609e3c to fffff80753039c37

STACK_TEXT:
ffffe809`d6d37730 fffff807`53609e3c : ffefc68f`c53294f0 ffff828d`00000000 ffff828d`00000000 00000000`00000000 : nt!ExAcquirePushLockExclusiveEx+0x107
ffffe809`d6d37770 fffff807`535c2e71 : ffffffff`00000000 ffff828d`00000000 ffff828d`5e582d48 ffff828d`5e582c60 : nt!AlpcpLockForCachedReferenceBlob+0x14
ffffe809`d6d377b0 fffff807`535c222e : ffff828d`5e582c60 ffffe809`d6d37939 ffff828d`5e582c30 ffffe809`d6d37939 : nt!AlpcpSendCloseMessage+0x75
ffffe809`d6d37820 fffff807`535ec408 : ffff828d`5e582c30 00000000`00000000 ffff828d`00000000 ffff828d`5e582c30 : nt!AlpcpClosePort+0x5e
ffffe809`d6d37850 fffff807`535f174e : 00000000`00000158 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObCloseHandleTableEntry+0x278
ffffe809`d6d37990 fffff807`531d2d15 : ffff828d`5e50d040 ffffe809`d6d37a80 ffffe809`d6d37a80 00000000`80210003 : nt!NtClose+0xde
ffffe809`d6d37a00 00007ffd`4215c2a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000036`6e27f908 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`4215c2a4


THREAD_SHA1_HASH_MOD_FUNC:  08287c524a254241f76f464ddb0612ad5398d34a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  ef28ee6ae7ff87b4579814537eb349a8ed406ba7

THREAD_SHA1_HASH_MOD:  30a3e915496deaace47137d5b90c3ecc03746bf6

FOLLOWUP_IP:
nt!ExAcquirePushLockExclusiveEx+107
fffff807`53039c37 f0480fba2e00    lock bts qword ptr [rsi],0

FAULT_INSTR_CODE:  ba0f48f0

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ExAcquirePushLockExclusiveEx+107

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4f6eba0

IMAGE_VERSION:  10.0.18362.592

STACK_COMMAND:  .cxr 0xffffe809d6d36d40 ; kb

BUCKET_ID_FUNC_OFFSET:  107

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ExAcquirePushLockExclusiveEx

BUCKET_ID:  0x3B_c0000005_nt!ExAcquirePushLockExclusiveEx

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_nt!ExAcquirePushLockExclusiveEx

TARGET_TIME:  2020-02-09T14:23:57.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  b47e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_nt!exacquirepushlockexclusiveex

FAILURE_ID_HASH:  {4fe31d77-fb81-4dc1-5992-c924ac6e709a}

Followup:     MachineOwner
---------
Dediğinizi aynen uygulayacağım birazdan, DDU kullanıyordum bir ara şimdi son versiyonunu indirdim. Bir de ekran kartı sürücülüerinden genellikle opsiyonel olanlar tercihim değildir pek, yalnızca WHQL sürücülerini kuruyorum. Bunun bir sakıncası yoktur herhalde değil mi?
 
Tekrar merhaba, son 1 haftadır yine sıklıkla mavi ekran almaya başladım. Yardımlarınız için minidump klasörünü tekrardan paylaştım. Ekran kartı sürücüsünü de dediğiniz şekilde DDU ile kaldırıp temizce kurdum fakat halen neden mavi ekran alıyorum anlamış değilim.
@MayCrasH
 
1 Pass Memtest86 testi yapar mısın?
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.


Virüs taraması yapar mısın?

Hatalar devam ederse temiz kurulum yap sistem dosyaları bozuk gibi.
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffba8c4b756f10, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffba8c4b756e68, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  MSI

SYSTEM_PRODUCT_NAME:  MS-7978

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  2.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  B.C0

BIOS_DATE:  07/05/2018

BASEBOARD_MANUFACTURER:  MSI

BASEBOARD_PRODUCT:  B150 GAMING M3 (MS-7978)

BASEBOARD_VERSION:  2.0

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffffba8c4b756f10

BUGCHECK_P3: ffffba8c4b756e68

BUGCHECK_P4: 0

TRAP_FRAME:  ffffba8c4b756f10 -- (.trap 0xffffba8c4b756f10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc98d717d6248 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc98d71c95dd8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8027bcad5ed rsp=ffffba8c4b7570a0 rbp=ffff8009eb68c000
r8=0000000001005000  r9=00000000ffffffff r10=fffff80264435470
r11=0000000000000325 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
dxgmms2!VIDMM_GLOBAL::CloseLocalAllocation+0x2c71d:
fffff802`7bcad5ed cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffba8c4b756e68 -- (.exr 0xffffba8c4b756e68)
ExceptionAddress: fffff8027bcad5ed (dxgmms2!VIDMM_GLOBAL::CloseLocalAllocation+0x000000000002c71d)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 4

CPU_MHZ: c78

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R)  SIG: C6'00000000 (cache) C6'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  LogonUI.exe

CURRENT_IRQL:  0

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-26-2020 21:20:23.0557

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff802645d33e9 to fffff802645c1510

STACK_TEXT:
ffffba8c`4b756be8 fffff802`645d33e9 : 00000000`00000139 00000000`00000003 ffffba8c`4b756f10 ffffba8c`4b756e68 : nt!KeBugCheckEx
ffffba8c`4b756bf0 fffff802`645d3810 : 00000000`00000103 00000000`00000001 00000000`fffffffd 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffba8c`4b756d30 fffff802`645d1ba5 : fffff802`60408000 ffffc98d`7212a120 ffffc98d`729982d8 ffffc98d`729982d8 : nt!KiFastFailDispatch+0xd0
ffffba8c`4b756f10 fffff802`7bcad5ed : ffff8009`ed9ad490 ffff8009`00000000 ffffc98d`717d6210 ffffc98d`71c95cb0 : nt!KiRaiseSecurityCheckFailure+0x325
ffffba8c`4b7570a0 fffff802`7bc8141c : ffff8009`ee115b10 00000000`00000001 ffffc98d`71c95cb0 ffffc98d`71c95cb0 : dxgmms2!VIDMM_GLOBAL::CloseLocalAllocation+0x2c71d
ffffba8c`4b7570d0 fffff802`7bc7036b : 00000000`00000083 00000000`00000000 ffff8009`00000000 ffffba8c`4b7573c3 : dxgmms2!VIDMM_GLOBAL::CloseOneAllocation+0x21c
ffffba8c`4b757220 fffff802`7bc935e1 : ffffc98d`7245e6b0 fffff802`7bc703c4 ffffc98d`721c7550 00000000`00000083 : dxgmms2!VIDMM_PAGE_TABLE::DestroyPageTable+0x7f
ffffba8c`4b7572a0 fffff802`7bc93552 : 00000000`00000106 00000000`00010600 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::DestroyPdePageTableData+0x49
ffffba8c`4b7572d0 fffff802`7bc7f03a : 00000000`00000000 00000000`00000000 00000000`00000000 ffffba8c`4b757560 : dxgmms2!VIDMM_PAGE_DIRECTORY::HandleFullPageTableCoverage+0x96
ffffba8c`4b757330 fffff802`7bc7e08c : ffffc98d`721c7550 ffffc98d`72124400 ffffba8c`4b757560 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0xeca
ffffba8c`4b7574d0 fffff802`7bc7317f : 00000000`00000000 00000000`00000000 ffffc98d`72124400 ffffc98d`71679480 : dxgmms2!CVirtualAddressAllocator::UncommitVirtualAddressRange+0x10c
ffffba8c`4b757600 fffff802`7bc73119 : 00000000`00000000 ffffc98d`71679480 ffffc98d`71679401 ffffc98d`729565b0 : dxgmms2!VIDMM_GLOBAL::UncommitVirtualAddressRangeSystemCommand+0x3b
ffffba8c`4b757630 fffff802`7bc7be27 : ffffc98d`71679498 ffffc98d`729565b0 ffffc98d`71679498 ffff8009`ee114810 : dxgmms2!VIDMM_GLOBAL::UncommitVirtualAddressRange+0x6d
ffffba8c`4b7576c0 fffff802`7bc7b890 : 00000000`00000000 ffffba8c`4b757870 ffff8009`eb68c000 00000000`00000001 : dxgmms2!CVirtualAddressAllocator::FreeAllocMappedVaRangeList+0x117
ffffba8c`4b757770 fffff802`7bc981a7 : ffffc98d`6e00c510 fffff802`00000000 00000000`00000001 ffffc98d`6e00c570 : dxgmms2!VIDMM_GLOBAL::ProcessSystemCommand+0xf0
ffffba8c`4b7578e0 fffff802`7bc96ee9 : ffffc98d`6e00c510 ffffe181`a9691101 ffff8009`eb61c600 00000000`00000100 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x12a7
ffffba8c`4b757ae0 fffff802`6452a7b5 : ffff8009`eb61c680 fffff802`7bc96ee0 ffffc98d`6e00c510 000024ef`bd9bbfff : dxgmms2!VidMmWorkerThreadProc+0x9
ffffba8c`4b757b10 fffff802`645c8b5a : ffffe181`a9680180 ffff8009`eb61c680 fffff802`6452a760 455275c0`8500000b : nt!PspSystemThreadStartup+0x55
ffffba8c`4b757b60 00000000`00000000 : ffffba8c`4b758000 ffffba8c`4b751000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  07138b927afd5815e1aca4406d5146ef276b3ad0

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  8cf0e6a2c6f1c1a2552fae1a4c4714c68b69cb8b

THREAD_SHA1_HASH_MOD:  14914db7342ad42db0d5026fc42fca92a942ebd9

FOLLOWUP_IP:
dxgmms2!VIDMM_GLOBAL::CloseLocalAllocation+2c71d
fffff802`7bcad5ed cd29            int     29h

FAULT_INSTR_CODE:  48cc29cd

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  dxgmms2!VIDMM_GLOBAL::CloseLocalAllocation+2c71d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.449

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2c71d

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VIDMM_GLOBAL::CloseLocalAllocation

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VIDMM_GLOBAL::CloseLocalAllocation

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VIDMM_GLOBAL::CloseLocalAllocation

TARGET_TIME:  2020-02-20T13:28:11.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  2cf1

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_dxgmms2!vidmm_global::closelocalallocation

FAILURE_ID_HASH:  {e1c37518-8534-579d-dba4-630a870df059}

Followup:     MachineOwner
---------
 
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Geri
Yukarı