klaviqula
Megapat
- Katılım
- 2 Eylül 2015
- Mesajlar
- 30
- Çözümler
- 1
Daha fazla
- Cinsiyet
- Erkek
Uzun zamandır tekrarlayan mavi ekran hataları alıyorum.
Sistemim: Orijinal Windows 10 Pro, sürüm 2004, 64 Bit.
Yardımlar için şimdiden teşekkürler.
5 adet minidump dosyası
Sistemim: Orijinal Windows 10 Pro, sürüm 2004, 64 Bit.
- İşlemci: i5 2500.
- RAM: 16 GB(4x4) Memtest'te problem çıkmadı, test amaçlı 2'ye düşsem de mavi ekran hatası devam etti.
- Ekran kartı: GTX 950.
- Anakart: P8Z68-V LX.
Yardımlar için şimdiden teşekkürler.
5 adet minidump dosyası
Kod:
Microsoft (r) Windows debugger version 10.0.20153.1000 AMD64.
Copyright (C) Microsoft corporation. All rights reserved.
Loading dump file [C:\WINDOWS\MEMORY.DMP]
Kernel bitmap dump file: Kernel address space is available, user address space may not be available.
************* Path validation summary **************
Response time (ms) location.
Deferred srv*
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 19041 MP (4 procs) Free X64.
PROduct: Winnt, Suite: Terminalserver singleuserts.
Edition Build lab: 19041.1.AMD64fre. VB_RELEASE. 191206-1406.
Machine name:
Kernel base = 0xfffff801`52c00000 psloadedmodulelist = 0xfffff801`5382a310.
Debug session time: Mon nov 9 11:08:27.184 2020 (utc + 3:00)
System uptime: 0 days 0:02:26.876.
Loading kernel symbols.
Loading user symbols.
Peb is paged out (peb. LDR = 00000096'D383D018). Type ".Hh dbgerr001" for details.
Loading unloaded module list.
For analysis of this file, run! Analyze -v.
Nt! Kebugcheckex:
Fffff801'52FF45A0 48894C2408 mov qword PTR [rsp+8],rcx SS:0018:FFFF840C'80770AE0=000000000000003B.
1: Kd>! Analyze -v.
*******************************************************************************
* *
* Bugcheck analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a System service routine.
Arguments:
Arg1: 00000000C0000005, exception code that caused the bugcheck.
Arg2: FFFFF801610C1091, address of the instruction which caused the bugcheck.
Arg3: FFFF840C807713E0, address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, Zero.
Debugging details:
------------------
KEY_VALUES_STRING: 1.
Key: Analysis. CPU. Msec.
Value: 4608.
Key: Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007E on desktop-NU7LM5P.
Key: Analysis. Debugdata.
Value: Createobject.
Key: Analysis. Debugmodel.
Value: Createobject.
Key: Analysis. Elapsed. Msec.
Value: 4740.
Key: Analysis. Memory. Commitpeak. MB.
Value: 77.
Key: Analysis. System.
Value: Createobject.
Key: Wer. OS. Branch.
Value: VB_RELEASE.
Key: Wer. OS. Timestamp.
Value: 2019-12-06T14:06:00Z.
Key: Wer. OS. Version.
Value: 10.0.19041.1.
ADDITIONAL_XML: 1.
OS_BUILD_LAYERS: 1.
BUGCHECK_CODE: 3B.
BUGCHECK_P1: C0000005.
BUGCHECK_P2: FFFFF801610C1091.
BUGCHECK_P3: FFFF840C807713E0.
BUGCHECK_P4: 0.
Context: FFFF840C807713E0 -- (.Cxr 0xffff840c807713e0)
Rax=0000000F87600002 rbx=0000000000000000 rcx=FFFF9B8420EBB710.
Rdx=FFFF9B842116E4A0 rsi=FFFF9B841FAEB0F8 rdi=0000000000000000.
Rip=FFFFF801610C1091 rsp=FFFF840C80771DE0 rbp=0000000000000000.
R8=FFFF9B841FAEB0F8 R9=FFFF840C80772020 R10=FFFFF80152E15020.
R11=FFFF840C80772238 R12=0000000000000000 R13=FFFF9B842116E4A0.
R14=0000000000000000 R15=FFFF840C80772020.
İopl=0 NV up ei PL zr na po NC.
CS=0010 SS=0018 DS=002B es=002B fs=0053 GS=002B efl=00010246.
Bindflt! Bfgetmappingcontexts+0x81:
Fffff801'610C1091 488B4808 mov rcx, qword PTR [rax+8] DS:002b:0000000F'8760000A=?
Resetting default scope.
Blackboxbsd: 1 (!Blackboxbsd)
Blackboxntfs: 1 (!Blackboxntfs)
Blackboxpnp: 1 (!Blackboxpnp)
Blackboxwınlogon: 1.
PROCESS_NAME: mscorsvw.exe.
STACK_TEXT:
FFFF840C'80771DE0 fffff801'610D8B13: 00000000'00000000 FFFF840C'80771FA0 00000000'00000000 FFFF9B84'1faeb0F8: Bindflt! Bfgetmappingcontexts+0x81.
FFFF840C'80771EA0 fffff801'5093608B: 00000000'00000000 fffff801'00000000 FFFF9B84'1faeB010 FFFF9B84'16F97750: Bindflt! Bfprecreate+0x263.
FFFF840C'80772240 fffff801'50935B37: FFFF840C'80772300 fffff801'50937800 00000000'00000000 fffff801'00000000: Fltmgr! Fltpperformprecallbacksworker+0x36B.
FFFF840C'80772360 fffff801'5096BBC0: FFFF840C'80773000 FFFF840C'8076D000 FFFF9B84'13C87040 00000000'00000000: Fltmgr! Fltppassthroughınternal+0xc7.
FFFF840C'807723B0 fffff801'52ECD805: 00000000'00000000 FFFF9B84'13C5B860 00000000'00000000 00000000'00000000: Fltmgr! Fltpcreate+0x310.
FFFF840C'80772460 fffff801'52ecedf4: 00000000'00000003 FFFF9B84'20E3C710 FFFF9B84'6D4E6F49 fffff801'52ECEA23: Nt! Iofcalldriver+0x55.
FFFF840C'807724A0 fffff801'532C3C3D: FFFF840C'80772760 FFFF9B84'13C5B860 FFFF9B84'20EBB7A8 00000000'00000000: Nt! Iocalldriverwithtracing+0x34.
FFFF840C'807724F0 fffff801'532EC3AE: FFFF9B84'13C5B860 00000000'000000B8 FFFF9B84'211F7AE0 FFFF9B84'211F7A01: Nt! Iopparsedevice+0x117D.
FFFF840C'80772660 fffff801'532F566A: FFFF9B84'211F7A00 FFFF840C'807728C8 00000221'00000040 FFFF9B84'1315C7A0: Nt! Obplookupobjectname+0x3FE.
FFFF840C'80772830 fffff801'531FF52F: 00000000'00000000 00000096'D37DC018 00000000'00000000 00000000'00000001: Nt! Obopenobjectbynameex+0x1FA.
FFFF840C'80772960 fffff801'531FF078: 00000096'D37dbfa0 00000000'00000000 00000096'D37DC018 00000096'D37DC008: Nt! Iopcreatefile+0x40F.
FFFF840C'80772A00 fffff801'53005FB8: 00000000'00000000 00000000'00000000 00000000'00000000 00000096'D37DC4D0: Nt! Ntopenfile+0x58.
FFFF840C'80772A90 00007FFF'72D2C3F4: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: Nt! Kisystemservicecopyend+0x28.
00000096'D37DBF48 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000 : 0x00007fff`72d2c3f4.
SYMBOL_NAME: Bindflt! Bfgetmappingcontexts+81.
MODULE_NAME: Bindflt.
IMAGE_NAME: bindflt.sys.
STACK_COMMAND:. Cxr 0xffff840c807713e0; KB.
BUCKET_ID_FUNC_OFFSET: 81.
FAILURE_BUCKET_ID: 0x3B_c0000005_bindflt!BfGetMappingContexts.
OS_VERSION: 10.0.19041.1.
BUILDLAB_STR: VB_RELEASE.
OSPLATFORM_TYPE: X64.
Osname: Windows 10.
FAILURE_ID_HASH: {6E73D533-F9F7-AD2B-A769-E88508CED6D2}
Followup: Machineowner.
---------
Son düzenleyen: Moderatör: