CRITICAL_PROCESS_DIED Mavi Ekran Hatası

İşletim sistemi
Windows 10

KaganBro

Femtopat
Katılım
23 Kasım 2020
Mesajlar
1
Daha fazla  
Cinsiyet
Erkek
Arkadaşlari mavi ekran hatasını uzun zamandır yaşıyorum. Bana yardım edebilecek birileri var mı? Mavi ekran hatasının neden olduğunuda bilmiyorum.

DMP dosyalarım:

 
Son düzenleyen: Moderatör:
Öncelikle belleklere test yapın. Anakartınızın rev sürümü nedir?
Yapılmamış Windows güncellemelerini de yapın.

Ekran kartınızın sürücülerini DDU ile kaldırıp güncelleyin. Ağ sürücülerinizi de güncelleyin, Wi-Fi adaptörü kullanıyorsanız belirtin.

Kod:
CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffa304c4c63180, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6249

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 42791

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffa304c4c63180

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  system32.exe

CRITICAL_PROCESS:  system32.exe

ERROR_CODE: (NTSTATUS) 0xc9455080 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT: 
fffff583`867b1938 fffff802`692c9a49     : 00000000`000000ef ffffa304`c4c63180 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff583`867b1940 fffff802`691da501     : ffffa304`c4c63180 fffff802`68b20d35 ffffa304`c4c63180 fffff802`68ae9438 : nt!PspCatchCriticalBreak+0x115
fffff583`867b19e0 fffff802`69072898     : ffffa304`00000000 00000000`00000000 ffffa304`c4c63180 ffffa304`c4c63180 : nt!PspTerminateAllThreads+0x165a35
fffff583`867b1a50 fffff802`690d6db9     : ffffffff`ffffffff fffff583`867b1b80 ffffa304`c4c63180 fffff802`6904c601 : nt!PspTerminateProcess+0xe0
fffff583`867b1a90 fffff802`68bd5358     : ffffa304`00000abc ffffa304`c9455080 ffffa304`c4c63180 00000000`77012840 : nt!NtTerminateProcess+0xa9
fffff583`867b1b00 00000000`76f61cbc     : 00000000`76f61c7b 00000000`76fe74f9 00000000`00000023 00000000`00000282 : nt!KiSystemServiceCopyEnd+0x28
00000000`0341f038 00000000`76f61c7b     : 00000000`76fe74f9 00000000`00000023 00000000`00000282 00000000`0783e294 : 0x76f61cbc
00000000`0341f040 00000000`76fe74f9     : 00000000`00000023 00000000`00000282 00000000`0783e294 00000000`0000002b : 0x76f61c7b
00000000`0341f048 00000000`00000023     : 00000000`00000282 00000000`0783e294 00000000`0000002b 00000000`07e85ad8 : 0x76fe74f9
00000000`0341f050 00000000`00000282     : 00000000`0783e294 00000000`0000002b 00000000`07e85ad8 00000000`0000002c : 0x23
00000000`0341f058 00000000`0783e294     : 00000000`0000002b 00000000`07e85ad8 00000000`0000002c 00000000`00000000 : 0x282
00000000`0341f060 00000000`0000002b     : 00000000`07e85ad8 00000000`0000002c 00000000`00000000 00000000`00000000 : 0x783e294
00000000`0341f068 00000000`07e85ad8     : 00000000`0000002c 00000000`00000000 00000000`00000000 00000000`00000000 : 0x2b
00000000`0341f070 00000000`0000002c     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000002c : 0x7e85ad8
00000000`0341f078 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`0000002c 00000000`0783cb20 : 0x2c


SYMBOL_NAME:  nt!PspCatchCriticalBreak+115

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.1198

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  115

FAILURE_BUCKET_ID:  0xEF_system32.exe_BUGCHECK_CRITICAL_PROCESS_c9455080_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dadbeb56-a635-5ee0-131b-a3c4bc8b6bd6}

Followup:     MachineOwner
---------


SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8016412a07b, The address that the exception occurred at
Arg3: ffffb601812e6488, Exception Record Address
Arg4: ffffb601812e5cd0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 6656

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 76390

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8016412a07b

BUGCHECK_P3: ffffb601812e6488

BUGCHECK_P4: ffffb601812e5cd0

EXCEPTION_RECORD:  ffffb601812e6488 -- (.exr 0xffffb601812e6488)
ExceptionAddress: fffff8016412a07b (dxgmms1!VIDMM_GLOBAL::EvictAllocation+0x000000000000006b)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  ffffb601812e5cd0 -- (.cxr 0xffffb601812e5cd0)
rax=0000000000002000 rbx=ffff82857ba3bec8 rcx=8ffe6c368e320000
rdx=ffdf82857d068c18 rsi=ffff82857ba3bdb0 rdi=ffdf82857d068c48
rip=fffff8016412a07b rsp=ffffb601812e66c0 rbp=ffffbe831d9c4000
 r8=0000000000000001  r9=0000000000000000 r10=0000000000000000
r11=ffffbe8313148ba0 r12=ffff82857e083f38 r13=ffff828598558870
r14=ffff82857ba3bec8 r15=ffff82857d068c48
iopl=0         nv up ei ng nz na po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010287
dxgmms1!VIDMM_GLOBAL::EvictAllocation+0x6b:
fffff801`6412a07b 488b3f          mov     rdi,qword ptr [rdi] ds:002b:ffdf8285`7d068c48=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff8015bf713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8015be283b8: Unable to get Flags value from nt!KdVersionBlock
fffff8015be283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
ffffb601`812e66c0 fffff801`6412a313     : ffffbe83`1859d410 ffffbe83`1859d390 ffff8285`7e083f38 00000000`00000008 : dxgmms1!VIDMM_GLOBAL::EvictAllocation+0x6b
ffffb601`812e6700 fffff801`64120cde     : 00000000`00000002 00000000`c01e0101 00000000`00000000 ffff8285`8208ede0 : dxgmms1!VIDMM_SEGMENT::UnusedPass+0x14b
ffffb601`812e6760 fffff801`6411efeb     : 00000000`00000000 ffff8285`8a625610 00000000`00000000 ffffbe83`245fb320 : dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0x50e
ffffb601`812e68a0 fffff801`641347d5     : ffffbe83`271369a0 ffffbe83`00000000 ffffbe83`189a1500 ffffbe83`00000c40 : dxgmms1!VidSchiSubmitRenderCommand+0x1fb
ffffb601`812e6b80 fffff801`64134713     : ffffbe83`1be31000 00000000`00000080 fffff801`64134660 ffffbe83`1be31000 : dxgmms1!VidSchiRun_PriorityTable+0xb5
ffffb601`812e6bd0 fffff801`5bb33585     : ffffbe83`1bf9b0c0 fffff801`64134660 ffffbe83`1be31000 00000405`b59bbfff : dxgmms1!VidSchiWorkerThread+0xb3
ffffb601`812e6c10 fffff801`5bbcb128     : fffff801`5995e180 ffffbe83`1bf9b0c0 fffff801`5bb33530 41d3af0f`4101568d : nt!PspSystemThreadStartup+0x55
ffffb601`812e6c60 00000000`00000000     : ffffb601`812e7000 ffffb601`812e1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  dxgmms1!VIDMM_GLOBAL::EvictAllocation+6b

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

IMAGE_VERSION:  10.0.18362.1082

STACK_COMMAND:  .cxr 0xffffb601812e5cd0 ; kb

BUCKET_ID_FUNC_OFFSET:  6b

FAILURE_BUCKET_ID:  AV_dxgmms1!VIDMM_GLOBAL::EvictAllocation

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {992228a6-30aa-b12b-b436-05de95e4ea8d}

Followup:     MachineOwner
---------


KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffffb28a647460c0, The address of the thread.
Arg2: ffffa28088bc8748, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6687

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11640

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  192

BUGCHECK_P1: ffffb28a647460c0

BUGCHECK_P2: ffffa28088bc8748

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffff8006`d10ae1b8 fffff804`7843f077     : 00000000`00000192 ffffb28a`647460c0 ffffa280`88bc8748 00000000`00000000 : nt!KeBugCheckEx
ffff8006`d10ae1c0 fffff804`7843e3c6     : ffffa280`88bc8700 ffff9080`00000000 00000000`00000010 ffffb28a`5ab6b5a0 : nt!ExAcquirePushLockSharedEx+0x147
ffff8006`d10ae200 fffff804`79737ccc     : ffffb28a`666143c0 ffff8006`d10ae400 ffffb28a`5ab6b5a0 00000000`00000010 : nt!FsRtlLookupPerStreamContextInternal+0x46
ffff8006`d10ae230 fffff804`79737b39     : ffffb28a`5ab6b5a0 ffffb28a`5a227320 00000000`00000010 ffffb28a`5a9dd8a0 : FLTMGR!FltpGetStreamListCtrl+0x6c
ffff8006`d10ae2a0 fffff804`73f9604c     : 00000000`00000000 ffffb28a`727b90f8 ffff8006`d10ae370 00000000`00000010 : FLTMGR!FltGetStreamHandleContext+0x29
ffff8006`d10ae2e0 fffff804`73f961b3     : ffffb28a`727b90f8 00000000`00000000 ffff8006`d10ae419 ffffb28a`727b9010 : bindflt!BfCheckAndSwitchTarget+0x44
ffff8006`d10ae340 fffff804`79734a8c     : ffffb28a`727b9010 ffffb28a`727b9198 ffff8006`d10ae419 ffffb28a`727b9010 : bindflt!BfPreReadWrite+0x43
ffff8006`d10ae370 fffff804`797345d0     : ffff8006`d10ae550 00000000`00000000 ffffb28a`727b4904 00000000`00060a00 : FLTMGR!FltpPerformPreCallbacks+0x2fc
ffff8006`d10ae480 fffff804`79734142     : 00000000`00000000 ffff8006`d10ae550 ffffb28a`727b49a0 ffff8006`d10ae560 : FLTMGR!FltpPassThroughInternal+0x90
ffff8006`d10ae4b0 fffff804`79733f2e     : ffffb28a`647460c0 fffff804`7843fa5d 00000000`00000000 ffffb28a`66614440 : FLTMGR!FltpPassThrough+0x162
ffff8006`d10ae530 fffff804`78437159     : ffffb28a`727b49a0 00000000`00000001 00000000`00000001 ffffb28a`666143c0 : FLTMGR!FltpDispatch+0x9e
ffff8006`d10ae590 fffff804`789f2a95     : 00000000`00000001 ffffb28a`666143c0 ffffb28a`727b4e18 ffffb28a`666143c0 : nt!IofCallDriver+0x59
ffff8006`d10ae5d0 fffff804`78a297d6     : ffffb28a`00000000 ffffb28a`5a9668d0 ffffb28a`666143c0 ffff8006`d10ae860 : nt!IopSynchronousServiceTail+0x1a5
ffff8006`d10ae670 fffff804`785d5358     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x676
ffff8006`d10ae770 fffff804`785c7940     : fffff804`78aba096 00000000`00000000 ffff8006`d10aea21 ffffb28a`647460c0 : nt!KiSystemServiceCopyEnd+0x28
ffff8006`d10ae978 fffff804`78aba096     : 00000000`00000000 ffff8006`d10aea21 ffffb28a`647460c0 fffff804`78440025 : nt!KiServiceLinkage
ffff8006`d10ae980 fffff804`78a2fd5a     : ffffb28a`6468aa00 00000000`00000000 00000000`c0000001 00000000`c0000001 : nt!EtwpFlushBufferToLogfile+0xa6
ffff8006`d10ae9f0 fffff804`789c525a     : 00000000`00000000 00000000`00000000 ffffb28a`6468aa00 ffffb28a`64df0000 : nt!EtwpFlushBuffer+0x9a
ffff8006`d10aea20 fffff804`78ab7869     : ffffb28a`6468aa00 ffffb28a`6468aa00 00000000`00000000 ffffffff`fffffffd : nt!EtwpFlushActiveBuffers+0x242
ffff8006`d10aeb90 fffff804`78533585     : ffffffff`fffffffd ffffb28a`647460c0 00000000`00000080 fffff804`78ab76b0 : nt!EtwpLogger+0x1b9
ffff8006`d10aec10 fffff804`785cb128     : ffff9080`c5781180 ffffb28a`647460c0 fffff804`78533530 00000000`00000007 : nt!PspSystemThreadStartup+0x55
ffff8006`d10aec60 00000000`00000000     : ffff8006`d10af000 ffff8006`d10a9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff8047843e9fe - nt!ExReleaseCacheAwarePushLockSharedEx+6e
    [ fe:de ]
1 error : !nt (fffff8047843e9fe)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------



CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffc508104dc080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 9437

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 53528

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffc508104dc080

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  system32.exe

CRITICAL_PROCESS:  system32.exe

ERROR_CODE: (NTSTATUS) 0x1b3e50c0 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT: 
fffffd8f`9bb3a938 fffff807`66ac9a59     : 00000000`000000ef ffffc508`104dc080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffffd8f`9bb3a940 fffff807`669a380f     : ffffc508`104dc080 fffff807`66208599 ffffc508`104dc080 fffff807`662086b4 : nt!PspCatchCriticalBreak+0x115
fffffd8f`9bb3a9e0 fffff807`667bd144     : ffffc508`00000000 00000000`00000000 ffffc508`104dc080 ffffc508`104dc080 : nt!PspTerminateAllThreads+0x1e4773
fffffd8f`9bb3aa50 fffff807`667bbe69     : ffffffff`ffffffff fffffd8f`9bb3ab80 ffffc508`104dc080 fffff807`6686ad01 : nt!PspTerminateProcess+0xe0
fffffd8f`9bb3aa90 fffff807`663d4558     : ffffc508`00000b20 ffffc508`1b3e50c0 ffffc508`104dc080 00000000`77c729d4 : nt!NtTerminateProcess+0xa9
fffffd8f`9bb3ab00 00000000`77bc1cbc     : 00000000`77bc1c7b 00000000`77c46409 00000000`00000023 00000000`00000206 : nt!KiSystemServiceCopyEnd+0x28
00000000`0340f068 00000000`77bc1c7b     : 00000000`77c46409 00000000`00000023 00000000`00000206 00000000`0708e6d4 : 0x77bc1cbc
00000000`0340f070 00000000`77c46409     : 00000000`00000023 00000000`00000206 00000000`0708e6d4 00000000`0000002b : 0x77bc1c7b
00000000`0340f078 00000000`00000023     : 00000000`00000206 00000000`0708e6d4 00000000`0000002b 00000000`032bdbf8 : 0x77c46409
00000000`0340f080 00000000`00000206     : 00000000`0708e6d4 00000000`0000002b 00000000`032bdbf8 00000000`0000002c : 0x23
00000000`0340f088 00000000`0708e6d4     : 00000000`0000002b 00000000`032bdbf8 00000000`0000002c 00000000`00000000 : 0x206
00000000`0340f090 00000000`0000002b     : 00000000`032bdbf8 00000000`0000002c 00000000`00000000 00000000`00000000 : 0x708e6d4
00000000`0340f098 00000000`032bdbf8     : 00000000`0000002c 00000000`00000000 00000000`00000000 00000000`00000000 : 0x2b
00000000`0340f0a0 00000000`0000002c     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000002c : 0x32bdbf8
00000000`0340f0a8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`0000002c 00000000`0708cf60 : 0x2c


SYMBOL_NAME:  nt!PspCatchCriticalBreak+115

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.1139

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  115

FAILURE_BUCKET_ID:  0xEF_system32.exe_BUGCHECK_CRITICAL_PROCESS_1b3e50c0_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1cb67859-e205-484b-ac0b-36ae7908dab8}

Followup:     MachineOwner
---------


SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80131a5cab9, Address of the instruction which caused the bugcheck
Arg3: ffffeb02e24f8e80, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 10061

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11998

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80131a5cab9

BUGCHECK_P3: ffffeb02e24f8e80

BUGCHECK_P4: 0

CONTEXT:  ffffeb02e24f8e80 -- (.cxr 0xffffeb02e24f8e80)
rax=000000be2517f9a0 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000001 rdi=ffff9989b2eb9ed0
rip=fffff80131a5cab9 rsp=ffffeb02e24f9870 rbp=ffffeb02e24f9b80
 r8=0000000000000000  r9=0000000000000000 r10=fffff80131a335b0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000008
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!KeSetEvent+0x9:
fffff801`31a5cab9 f6017f          test    byte ptr [rcx],7Fh ds:002b:00000000`00000000=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  audiodg.exe

STACK_TEXT: 
ffffeb02`e24f9870 fffff801`31fd145c     : 00000000`00000000 fffff801`2f93a350 ffff9989`b2eb9ed0 00000000`00000000 : nt!KeSetEvent+0x9
ffffeb02`e24f9900 fffff801`31fd0c36     : ffff9989`b28dffe0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x80c
ffffeb02`e24f9a20 fffff801`31bd4558     : 00000000`00000000 ffffeb02`e24f9b80 ffff9989`b1af02e0 fffff801`320a9bfd : nt!NtDeviceIoControlFile+0x56
ffffeb02`e24f9a90 00007ffa`f899c1a4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000be`2517f948 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`f899c1a4


SYMBOL_NAME:  nt!KeSetEvent+9

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.1139

STACK_COMMAND:  .cxr 0xffffeb02e24f8e80 ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!KeSetEvent

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e21bfbf7-638e-bdcd-11e1-157958eb9932}

Followup:     MachineOwner
---------
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı