KERNEL_AUTO_BOOST_INVALID_LOCK_RELEASE hatası aldım.
Microsoft (r) Windows debugger version 10.0.20153.1000 AMD64.
Copyright (C) Microsoft corporation. All rights reserved.
Loading dump file [C:\WINDOWS\MEMORY.DMP]
Kernel bitmap dump file: Kernel address space is available, user address space may not be available.
************* Path validation summary **************
Response time (ms) location.
Deferred srv*
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 19041 MP (12 procs) Free X64.
PROduct: Winnt, Suite: Terminalserver singleuserts personal.
Edition Build lab: 19041.1.AMD64fre. VB_RELEASE. 191206-1406.
Machine name:
Kernel base = 0xfffff802`36200000 psloadedmodulelist = 0xfffff802`36e2a310.
Debug session time: Mon jul 27 16:10:38.123 2020 (utc + 3:00)
System uptime: 0 days 0:38:27.757.
Loading kernel symbols.
Loading user symbols.
Peb is paged out (peb. LDR = 00000070'B32D8018). Type ".Hh dbgerr001" for details.
Loading unloaded module list.
For analysis of this file, run! Analyze -v.
Nt! Kebugcheckex:
Fffff802'365DDB60 48894C2408 mov qword PTR [rsp+8],rcx SS:0018:fffff40D'C54985E0=0000000000000162.
1: Kd>! Analyze -v.
*******************************************************************************
* *
* Bugcheck analysis *
* *
*******************************************************************************
KERNEL_AUTO_BOOST_INVALID_LOCK_RELEASE (162)
A lock tracked by autoboost was released by a thread that did not own the lock.
This is typically caused when some thread releases a lock on behalf of another.
Thread (which is not legal with autoboost tracking enabled) or when some thread.
Tries to release a lock it no longer owns.
Arguments:
Arg1: FFFFB4086F2240C0, the address of the thread.
Arg2: FFFFA3807A87C100, the lock address.
Arg3: 00000000FFFFFfff, the session ID of the thread.
Arg4: 0000000000000000, reserved.
Debugging details:
------------------
KEY_VALUES_STRING: 1.
Key: Analysis. CPU. Msec.
Value: 2640.
Key: Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007E on desktop-RP9LE0O.
Key: Analysis. Debugdata.
Value: Createobject.
Key: Analysis. Debugmodel.
Value: Createobject.
Key: Analysis. Elapsed. Msec.
Value: 2659.
Key: Analysis. Memory. Commitpeak. MB.
Value: 78.
Key: Analysis. System.
Value: Createobject.
Key: Wer. OS. Branch.
Value: VB_RELEASE.
Key: Wer. OS. Timestamp.
Value: 2019-12-06T14:06:00Z.
Key: Wer. OS. Version.
Value: 10.0.19041.1.
ADDITIONAL_XML: 1.
OS_BUILD_LAYERS: 1.
BUGCHECK_CODE: 162.
BUGCHECK_P1: FFFFB4086F2240C0.
BUGCHECK_P2: FFFFA3807A87C100.
BUGCHECK_P3: Ffffffff.
BUGCHECK_P4: 0.
Blackboxbsd: 1 (!Blackboxbsd)
Blackboxntfs: 1 (!Blackboxntfs)
Blackboxpnp: 1 (!Blackboxpnp)
Blackboxwınlogon: 1.
PROCESS_NAME: nvcontainer.exe.
STACK_TEXT:
Fffff40D'C54985D8 fffff802'365FAD21: 00000000'00000162 ffffb408'6F2240C0 ffffa380'7A87C100 00000000'ffffffff: Nt! Kebugcheckex.
Fffff40D'C54985E0 fffff802'367F4ABC: Ffffa380'0000003F fffff802'00000000 ffffffff'ffffffff ffffa380'8A7F9310: Nt! Keabpostrelease+0x1D4B01.
Fffff40D'C5498640 fffff802'367FB11C: 00000000'000054C4 00000000'000007FF ffffa380'ffffffff 00000000'00000000: Nt! Obclosehandletableentry+0x19C.
Fffff40D'C5498780 fffff802'365EF478: 00000000'00000000 fffff802'00000000 fffff40D'C5498870 ffffa380'7A000AC0: Nt! Ntclose+0xec.
Fffff40D'C54987F0 fffff802'365E19C0: Fffff802'3689F4B1 00000000'00000000 00000000'00000000 00000000'00000000: Nt! Kisystemservicecopyend+0x28.
Fffff40D'C5498988 fffff802'3689F4B1: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: Nt! Kiservicelinkage.
Fffff40D'C5498990 fffff802'38F192A2: Ffffffff'800054C4 00000000'00000000 ffffb408'64BF18C0 00000000'00000000: Nt! Iogetdeviceobjectpointer+0xe1.
Fffff40D'C5498A20 fffff802'38F190C3: Ffffb408'64BF18C0 ffffb408'6F947BC0 ffffb408'7845C0D0 00000000'00000000: Mountmgr! Mountmgrquerydosvolumepath+0xd2.
Fffff40D'C5498B50 fffff802'36446D45: Fffff40D'C5498CF0 ffffa380'D6BD4540 ffffa380'81DCB5B0 fffff40D'C5498C48: Mountmgr! Mountmgrdevicecontrol+0xb3.
Fffff40D'C5498BB0 fffff802'3689F332: 00000000'00000010 fffff40D'C5498CF0 ffffa380'D6BD4540 00000000'00000000: Nt! Iofcalldriver+0x55.
Fffff40D'C5498BF0 fffff802'3689EB57: B4087601'0050FFFE 00000000'000000C0 ffffa380'D6BD4540 ffffa380'D6BD4540: Nt! Iovolumedevicetodosname+0x232.
Fffff40D'C5498EC0 fffff802'3689EA6E: Ffffb408'7845D200 ffffb408'00000000 fffff40D'C5499001 ffffa380'D6BD4540: Nt! Iopquerynameınternal+0xa3.
Fffff40D'C5498F70 fffff802'3686ECB8: Ffffb408'7845D200 fffff40D'C5499B80 ffffa380'000000D0 0000017E'5F6C9800: Nt! Ioqueryfiledosdevicename+0x5E.
Fffff40D'C5498FC0 fffff802'365EF478: 00000000'00000002 00000000'00000001 00000000'00000000 0000017E'5F5411E4: Nt! Ntqueryınformationprocess+0x968.
Fffff40D'C5499A90 00007FFD'dddeb0b4: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: Nt! Kisystemservicecopyend+0x28.
00000070'B44FF018 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000 : 0x00007ffd`dddeb0b4.
SYMBOL_NAME: Mountmgr! Mountmgrquerydosvolumepath+D2.
MODULE_NAME: Mountmgr.
IMAGE_NAME: mountmgr.sys.
STACK_COMMAND:. Thread;. Cxr; KB.
BUCKET_ID_FUNC_OFFSET: D2.
FAILURE_BUCKET_ID: 0x162_mountmgr!MountMgrQueryDosVolumePath.
OS_VERSION: 10.0.19041.1.
BUILDLAB_STR: VB_RELEASE.
OSPLATFORM_TYPE: X64.
Osname: Windows 10.
FAILURE_ID_HASH: {9924CE1C-A12e-8671-635F-ACC1E09BF450}
Followup: Machineowner.
---------
dumpdosyaları
@Recep Baltaş ATTEMPTED_WRITE_TO_READONLY_MEMORY en son bu hata ile karşılaştım ve.
(nvlddmkm.sys, nvlddmkm.sys+12D550) hatası, amdppm.sys hatası ve ntoskrnl.exe hata ayrıntılarını görmüş olmaktayım ben sorunun ekran kartımdan kaynaklandığını düşünüyorum sizin kadar anlamadığım için yine de size sormak istiyorum sizce hata belleklerden mi ekran kartından mı kaynaklanıyor.
ATTEMPTED_WRITE_TO_READONLY_MEMORY bu hatadan önce de DRIVER_IRQL_NOT_LESS_OR_EQUAL hatası aldım zaten dump dosyalarını paylaştım inceleyebilirsiniz bende windbg Preview dosyaları okumuyor önceden okuyor idi ama şimdi AFK bir şekilde bekliyor.
RAM'ler Memtest 86 ile test edildi bellek tanılamayla test edildi sorun çıkmadı zaten son test etmemden sonra resimleri paylaşmıştım.