mfs1907
Attopat
- Katılım
- 27 Mayıs 2021
- Mesajlar
- 4
- Çözümler
- 1
Daha fazla
- Cinsiyet
- Erkek
Merhaba; Legion Y520-15IKBM Laptop (Lenovo) - Type 80YY bilgisayarımda bir haftadır devam eden ve giderek sıklaşan mavi ekran hataları almaya başladım. Bunlardan en sık olanı CRITICAL_PROCESS_DIED hatası. FAT_FILE_SYSTEM ve UNEXPECTED_STORE_EXCEPTION hataları da aldım. Minidump dosyalarını da buraya ekliyorum fakat bunlardan iki tanesini sıkıştırmama sistem izin vermediği için kod olarak ekledim. Avast ve McAfee vardı sildim, Malverebytes kurup taradım sadece 1 şüpheli dosya buldu. HD Tune ve HD Sentinel'de de bir sorun bulunmadı. Memtest86 için USB-Boot yazılımı yüklerken image failed hatası aldım ve mavi ekran verdi. Sonrasında USB bellek neredeyse kullanılmaz hale geldiği için korkup başka bir USB denemedim. Yorumlarınızı endişeyle bekliyorum. 
drive.google.com
[CODE title="minidump"]
Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\LENOVO\Desktop\dump\052621-527921-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`71a00000 PsLoadedModuleList = 0xfffff806`7262a1b0
Debug session time: Wed May 26 12:40:11.140 2021 (UTC + 3:00)
System Uptime: 0 days 1:57:00.883
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..................................................
Loading User Symbols
Loading unloaded module list
..............................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`71df6cf0 48894c2408 mov qword ptr [rsp+8],rcx ss:ffffaf01`36c7c5c0=0000000000000023
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
FAT_FILE_SYSTEM (23)
If you see FatExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000000e0121
Arg2: ffffaf0136c7d5e8
Arg3: ffffaf0136c7ce20
Arg4: fffff80673def403
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullClassPtr
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 6937
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 38215
Key : Analysis.Init.CPU.mSec
Value: 546
Key : Analysis.Init.Elapsed.mSec
Value: 10509
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 23
BUGCHECK_P1: e0121
BUGCHECK_P2: ffffaf0136c7d5e8
BUGCHECK_P3: ffffaf0136c7ce20
BUGCHECK_P4: fffff80673def403
EXCEPTION_RECORD: ffffaf0136c7d5e8 -- (.exr 0xffffaf0136c7d5e8)
ExceptionAddress: fffff80673def403 (volmgr!VmpQueryUniqueIdInternal+0x0000000000000037)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000040
Attempt to read from address 0000000000000040
CONTEXT: ffffaf0136c7ce20 -- (.cxr 0xffffaf0136c7ce20)
rax=0000000000000000 rbx=ffff9c88bcac9840 rcx=ffff9c88bcac9800
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80673def403 rsp=ffffaf0136c7d820 rbp=ffffaf0136c7d8d9
r8=ffffaf0136c7d8d2 r9=ffff9c88bcac9840 r10=0000000000000000
r11=ffffffffffffffff r12=0000000000000001 r13=0000000000000000
r14=ffffaf0136c7d8d0 r15=ffffaf0136c7d8d2
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050246
volmgr!VmpQueryUniqueIdInternal+0x37:
fffff806`73def403 488b5040 mov rdx,qword ptr [rax+40h] ds:002b:00000000`00000040=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
READ_ADDRESS: fffff806726fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000040
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000040
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffaf01`36c7d820 fffff806`73defe7e : ffff9c88`bcac9840 00000000`00000000 ffff9c88`c43ac780 00000000`00100000 : volmgr!VmpQueryUniqueIdInternal+0x37
ffffaf01`36c7d850 fffff806`73df08fa : ffff9c88`d69e7010 ffff9c88`bcac9840 ffff9c88`d69e7010 00000000`00000072 : volmgr!VmpSetPartitionInformation+0x2d6a
ffffaf01`36c7d940 fffff806`73de17be : ffff9c88`bcac9840 ffffaf01`36c7d9c0 ffff9c88`d69e7010 ffff9c88`d69e7638 : volmgr!VmpGetPartitionInfoEx+0x47ce
ffffaf01`36c7d980 fffff806`71d185b5 : ffff9c88`d69e7010 ffff9c88`d69e7010 ffffffff`ffffffff fffff806`759cf000 : volmgr!VmDeviceControl+0x24e
ffffaf01`36c7d9e0 fffff806`71cec00e : ffff9c88`95e08800 ffffaf01`000000a0 00000000`00000000 ffff9c88`d69e7000 : nt!IofCallDriver+0x55
ffffaf01`36c7da20 fffff806`720a6f11 : ffffaf01`36c7db30 00000000`00000000 00000000`00000000 ffff9c88`95e02000 : nt!IoSynchronousCallDriver+0x4e
ffffaf01`36c7da80 fffff806`75a12082 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff806`71d15841 : nt!IoForwardIrpSynchronously+0x41
ffffaf01`36c7dab0 fffff806`759b3212 : ffff9c88`d69e7010 ffffaf01`36c7e101 ffff9c88`c9c1f180 00000000`00000000 : fvevol!IoctlDiskQuery+0x7a
ffffaf01`36c7dba0 fffff806`71d185b5 : ffff9c88`965477a0 fffff806`720e70ad ffffaf01`36c7e179 ffff9c88`c5ed19f0 : fvevol!FveFilterDeviceControl+0x202
ffffaf01`36c7dca0 fffff806`75a71033 : ffffaf01`36c7def0 fffff806`71d065ff 00000000`00070048 ffff9c88`d69e7010 : nt!IofCallDriver+0x55
ffffaf01`36c7dce0 fffff806`71d185b5 : ffffaf01`36c7df10 fffff806`00000090 ffff9c88`b72bd000 ffffaf01`36c7ddb0 : volume!VolumePassThrough+0x23
ffffaf01`36c7dd10 fffff806`89db1e53 : 00000000`00000000 fffff806`71ff373c ffff9c88`965477a0 00000000`00000001 : nt!IofCallDriver+0x55
ffffaf01`36c7dd50 fffff806`89dc248a : ffff9c88`c2631908 00000000`00000090 00000000`00000000 00000000`00000000 : fastfat!FatPerformDevIoCtrl+0xc7
ffffaf01`36c7dde0 fffff806`89dc2277 : 00000000`00000000 fffff806`733b7ac8 ffff9c88`00000001 00000000`00000000 : fastfat!FatMountVolume+0x1de
ffffaf01`36c7e060 fffff806`89dc21c2 : ffff9c88`c2631250 ffff9c88`bdc2be01 ffff9c88`bdc2be01 ffff9c88`b1bf0d01 : fastfat!FatCommonFileSystemControl+0x57
ffffaf01`36c7e090 fffff806`71d185b5 : 00000000`00000000 ffff9c88`c2631250 ffff9c88`c2631201 ffff9c88`bdc2be80 : fastfat!FatFsdFileSystemControl+0xb2
ffffaf01`36c7e0d0 fffff806`733ef8b2 : ffff9c88`b7d72050 ffff9c88`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x55
ffffaf01`36c7e110 fffff806`733ecb0d : ffff9c88`b1addbb0 ffff9c88`00000000 ffff9c88`b1bf0dc0 ffff9c88`c9bf8db0 : FLTMGR!FltpFsControlMountVolume+0x1e6
ffffaf01`36c7e1e0 fffff806`71d185b5 : ffffaf01`36c7e331 ffff9c88`b1addbb0 ffffaf01`36c7e331 fffff806`726458c0 : FLTMGR!FltpFsControl+0x11d
ffffaf01`36c7e240 fffff806`72034b99 : fffff806`726458d0 ffff9c88`bcac96f0 ffff9c88`b1addbb0 ffff9c88`cc0f7a40 : nt!IofCallDriver+0x55
ffffaf01`36c7e280 fffff806`71d19da5 : ffff9c88`c8b35f30 ffff9c88`c8b35f30 00000000`00000000 00000000`00000000 : nt!IopMountVolume+0x371
ffffaf01`36c7e390 fffff806`720e35f2 : 00000000`0012019f 00000000`00000000 ffffaf01`36c7e660 00000000`bcac9625 : nt!IopCheckVpbMounted+0x1b5
ffffaf01`36c7e3f0 fffff806`71ff23ce : ffff9c88`bcac96f0 00000000`00000000 ffff9c88`cc0f7a20 ffff9c88`cc0f7a01 : nt!IopParseDevice+0x942
ffffaf01`36c7e560 fffff806`7210147a : ffff9c88`cc0f7a00 ffffaf01`36c7e7c8 ffff9c88`00000040 ffff9c88`96548ae0 : nt!ObpLookupObjectName+0x3fe
ffffaf01`36c7e730 fffff806`72015c5f : 00000000`00000000 0000003a`8a6ff218 00000000`00000000 00000000`00000001 : nt!ObOpenObjectByNameEx+0x1fa
ffffaf01`36c7e860 fffff806`72015839 : 0000003a`8a6ff1d8 ffffaf01`00501802 0000003a`8a6ff218 0000003a`8a6ff1e0 : nt!IopCreateFile+0x40f
ffffaf01`36c7e900 fffff806`71e08bee : 00000168`63c98980 fffff806`71fa5270 00000000`00000000 00000000`00000000 : nt!NtCreateFile+0x79
ffffaf01`36c7e990 00007ff9`36e0d8c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2b9
0000003a`8a6ff158 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`36e0d8c4
SYMBOL_NAME: volmgr!VmpQueryUniqueIdInternal+37
MODULE_NAME: volmgr
IMAGE_NAME: volmgr.sys
IMAGE_VERSION: 10.0.19041.1023
STACK_COMMAND: .cxr 0xffffaf0136c7ce20 ; kb
BUCKET_ID_FUNC_OFFSET: 37
FAILURE_BUCKET_ID: 0x23_volmgr!VmpQueryUniqueIdInternal
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d0e2cbbb-f6c9-659f-dade-4145ab43ee0a}
Followup: MachineOwner
---------
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\LENOVO\Desktop\dump\052721-194859-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`59600000 PsLoadedModuleList = 0xfffff803`5a22a1b0
Debug session time: Thu May 27 07:55:20.660 2021 (UTC + 3:00)
System Uptime: 0 days 19:09:49.681
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...................................................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`599f6cf0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffa8e`cb973520=000000000000001e
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000006, The exception code that was not handled
Arg2: fffff80359d0cbdf, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 000002699a1dc008, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5530
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 72243
Key : Analysis.Init.CPU.mSec
Value: 484
Key : Analysis.Init.Elapsed.mSec
Value: 2684
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000006
BUGCHECK_P2: fffff80359d0cbdf
BUGCHECK_P3: 0
BUGCHECK_P4: 2699a1dc008
EXCEPTION_PARAMETER2: 000002699a1dc008
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
STACK_TEXT:
fffffa8e`cb973518 fffff803`59a3b84b : 00000000`0000001e ffffffff`c0000006 fffff803`59d0cbdf 00000000`00000000 : nt!KeBugCheckEx
fffffa8e`cb973520 fffff803`59a08dac : 00000000`00000000 fffff803`59898826 00000000`00008000 fffff803`59928041 : nt!KiDispatchException+0x1b589b
fffffa8e`cb973be0 fffff803`59a04f43 : 00000000`00000000 fffff803`5df133c0 00000000`00000000 00000000`000000b6 : nt!KiExceptionDispatch+0x12c
fffffa8e`cb973dc0 fffff803`59d0cbdf : 00000000`00000000 00000000`ffffffff 00000000`003c0000 ffffa804`de0a2000 : nt!KiPageFault+0x443
fffffa8e`cb973f50 fffff803`59d0c4be : 00000000`000001b0 00000000`003c0000 00000000`00043997 ffffa804`de0a2000 : nt!HvpFindFreeCellInBin+0xf
fffffa8e`cb973f80 fffff803`59d0be51 : ffffa804`de0a2050 fffffa8e`0000481c 00000000`00000258 ffffa804`0481b000 : nt!HvpFindFreeCell+0x126
fffffa8e`cb974000 fffff803`59d0a86c : ffffa804`00000002 00000000`00000200 ffffa804`de0a2000 fffffa8e`cb9740d0 : nt!HvpDoAllocateCell+0x7d
fffffa8e`cb974090 fffff803`59be103f : 00000000`00000000 ffffa804`de0a2000 00000269`99f5bcd4 fffffa8e`cb974160 : nt!HvReallocateCell+0xec
fffffa8e`cb974110 fffff803`59be4438 : 01d752b4`61841512 00000000`00000000 ffffa804`dbac03a0 00000000`00000003 : nt!CmpSetValueKeyExisting+0x233
fffffa8e`cb974190 fffff803`59be3c78 : fffffa8e`00000001 fffffa8e`cb974420 00000000`00000000 00000000`00000201 : nt!CmSetValueKey+0x508
fffffa8e`cb974330 fffff803`59a08bee : 00000000`ffffffff fffff803`5992512a fffffa8e`cb974640 00000000`00000000 : nt!NtSetValueKey+0x648
fffffa8e`cb974510 fffff803`599fab50 : fffff803`59c220f1 00000000`00000000 fffffa8e`cb974a80 ffffa804`f0c491b0 : nt!KiSystemServiceExitPico+0x2b9
fffffa8e`cb974718 fffff803`59c220f1 : 00000000`00000000 fffffa8e`cb974a80 ffffa804`f0c491b0 fffff803`00000000 : nt!KiServiceLinkage
fffffa8e`cb974720 fffff803`59c22619 : 00000000`0000024c 00000000`00000000 fffffa8e`cb974a80 00000000`0000024c : nt!ExpWnfWriteStateData+0x171
fffffa8e`cb974820 fffff803`59c2238e : ffffcf8c`66b63080 00000000`00000000 ffff3b79`3c750f34 00000000`00501802 : nt!ExpNtUpdateWnfStateData+0x27d
fffffa8e`cb974940 fffff803`59a08bee : ffffcf8c`66b63080 00000000`00000001 00000000`0000068e fffffa8e`cb974a80 : nt!NtUpdateWnfStateData+0x2e
fffffa8e`cb974990 00007ffc`6f6f07d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2b9
00000000`106be4b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`6f6f07d4
SYMBOL_NAME: nt!HvpFindFreeCellInBin+f
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.985
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: f
FAILURE_BUCKET_ID: 0x1E_c0000006_nt!HvpFindFreeCellInBin
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5224d302-b884-490d-f136-e34dc204733d}
Followup: MachineOwner
---------
[/CODE]
minidump.rar
drive.google.com
[CODE title="minidump"]
Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\LENOVO\Desktop\dump\052621-527921-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`71a00000 PsLoadedModuleList = 0xfffff806`7262a1b0
Debug session time: Wed May 26 12:40:11.140 2021 (UTC + 3:00)
System Uptime: 0 days 1:57:00.883
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..................................................
Loading User Symbols
Loading unloaded module list
..............................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`71df6cf0 48894c2408 mov qword ptr [rsp+8],rcx ss:ffffaf01`36c7c5c0=0000000000000023
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
FAT_FILE_SYSTEM (23)
If you see FatExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000000e0121
Arg2: ffffaf0136c7d5e8
Arg3: ffffaf0136c7ce20
Arg4: fffff80673def403
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullClassPtr
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 6937
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 38215
Key : Analysis.Init.CPU.mSec
Value: 546
Key : Analysis.Init.Elapsed.mSec
Value: 10509
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 23
BUGCHECK_P1: e0121
BUGCHECK_P2: ffffaf0136c7d5e8
BUGCHECK_P3: ffffaf0136c7ce20
BUGCHECK_P4: fffff80673def403
EXCEPTION_RECORD: ffffaf0136c7d5e8 -- (.exr 0xffffaf0136c7d5e8)
ExceptionAddress: fffff80673def403 (volmgr!VmpQueryUniqueIdInternal+0x0000000000000037)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000040
Attempt to read from address 0000000000000040
CONTEXT: ffffaf0136c7ce20 -- (.cxr 0xffffaf0136c7ce20)
rax=0000000000000000 rbx=ffff9c88bcac9840 rcx=ffff9c88bcac9800
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80673def403 rsp=ffffaf0136c7d820 rbp=ffffaf0136c7d8d9
r8=ffffaf0136c7d8d2 r9=ffff9c88bcac9840 r10=0000000000000000
r11=ffffffffffffffff r12=0000000000000001 r13=0000000000000000
r14=ffffaf0136c7d8d0 r15=ffffaf0136c7d8d2
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050246
volmgr!VmpQueryUniqueIdInternal+0x37:
fffff806`73def403 488b5040 mov rdx,qword ptr [rax+40h] ds:002b:00000000`00000040=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
READ_ADDRESS: fffff806726fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000040
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000040
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffaf01`36c7d820 fffff806`73defe7e : ffff9c88`bcac9840 00000000`00000000 ffff9c88`c43ac780 00000000`00100000 : volmgr!VmpQueryUniqueIdInternal+0x37
ffffaf01`36c7d850 fffff806`73df08fa : ffff9c88`d69e7010 ffff9c88`bcac9840 ffff9c88`d69e7010 00000000`00000072 : volmgr!VmpSetPartitionInformation+0x2d6a
ffffaf01`36c7d940 fffff806`73de17be : ffff9c88`bcac9840 ffffaf01`36c7d9c0 ffff9c88`d69e7010 ffff9c88`d69e7638 : volmgr!VmpGetPartitionInfoEx+0x47ce
ffffaf01`36c7d980 fffff806`71d185b5 : ffff9c88`d69e7010 ffff9c88`d69e7010 ffffffff`ffffffff fffff806`759cf000 : volmgr!VmDeviceControl+0x24e
ffffaf01`36c7d9e0 fffff806`71cec00e : ffff9c88`95e08800 ffffaf01`000000a0 00000000`00000000 ffff9c88`d69e7000 : nt!IofCallDriver+0x55
ffffaf01`36c7da20 fffff806`720a6f11 : ffffaf01`36c7db30 00000000`00000000 00000000`00000000 ffff9c88`95e02000 : nt!IoSynchronousCallDriver+0x4e
ffffaf01`36c7da80 fffff806`75a12082 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff806`71d15841 : nt!IoForwardIrpSynchronously+0x41
ffffaf01`36c7dab0 fffff806`759b3212 : ffff9c88`d69e7010 ffffaf01`36c7e101 ffff9c88`c9c1f180 00000000`00000000 : fvevol!IoctlDiskQuery+0x7a
ffffaf01`36c7dba0 fffff806`71d185b5 : ffff9c88`965477a0 fffff806`720e70ad ffffaf01`36c7e179 ffff9c88`c5ed19f0 : fvevol!FveFilterDeviceControl+0x202
ffffaf01`36c7dca0 fffff806`75a71033 : ffffaf01`36c7def0 fffff806`71d065ff 00000000`00070048 ffff9c88`d69e7010 : nt!IofCallDriver+0x55
ffffaf01`36c7dce0 fffff806`71d185b5 : ffffaf01`36c7df10 fffff806`00000090 ffff9c88`b72bd000 ffffaf01`36c7ddb0 : volume!VolumePassThrough+0x23
ffffaf01`36c7dd10 fffff806`89db1e53 : 00000000`00000000 fffff806`71ff373c ffff9c88`965477a0 00000000`00000001 : nt!IofCallDriver+0x55
ffffaf01`36c7dd50 fffff806`89dc248a : ffff9c88`c2631908 00000000`00000090 00000000`00000000 00000000`00000000 : fastfat!FatPerformDevIoCtrl+0xc7
ffffaf01`36c7dde0 fffff806`89dc2277 : 00000000`00000000 fffff806`733b7ac8 ffff9c88`00000001 00000000`00000000 : fastfat!FatMountVolume+0x1de
ffffaf01`36c7e060 fffff806`89dc21c2 : ffff9c88`c2631250 ffff9c88`bdc2be01 ffff9c88`bdc2be01 ffff9c88`b1bf0d01 : fastfat!FatCommonFileSystemControl+0x57
ffffaf01`36c7e090 fffff806`71d185b5 : 00000000`00000000 ffff9c88`c2631250 ffff9c88`c2631201 ffff9c88`bdc2be80 : fastfat!FatFsdFileSystemControl+0xb2
ffffaf01`36c7e0d0 fffff806`733ef8b2 : ffff9c88`b7d72050 ffff9c88`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x55
ffffaf01`36c7e110 fffff806`733ecb0d : ffff9c88`b1addbb0 ffff9c88`00000000 ffff9c88`b1bf0dc0 ffff9c88`c9bf8db0 : FLTMGR!FltpFsControlMountVolume+0x1e6
ffffaf01`36c7e1e0 fffff806`71d185b5 : ffffaf01`36c7e331 ffff9c88`b1addbb0 ffffaf01`36c7e331 fffff806`726458c0 : FLTMGR!FltpFsControl+0x11d
ffffaf01`36c7e240 fffff806`72034b99 : fffff806`726458d0 ffff9c88`bcac96f0 ffff9c88`b1addbb0 ffff9c88`cc0f7a40 : nt!IofCallDriver+0x55
ffffaf01`36c7e280 fffff806`71d19da5 : ffff9c88`c8b35f30 ffff9c88`c8b35f30 00000000`00000000 00000000`00000000 : nt!IopMountVolume+0x371
ffffaf01`36c7e390 fffff806`720e35f2 : 00000000`0012019f 00000000`00000000 ffffaf01`36c7e660 00000000`bcac9625 : nt!IopCheckVpbMounted+0x1b5
ffffaf01`36c7e3f0 fffff806`71ff23ce : ffff9c88`bcac96f0 00000000`00000000 ffff9c88`cc0f7a20 ffff9c88`cc0f7a01 : nt!IopParseDevice+0x942
ffffaf01`36c7e560 fffff806`7210147a : ffff9c88`cc0f7a00 ffffaf01`36c7e7c8 ffff9c88`00000040 ffff9c88`96548ae0 : nt!ObpLookupObjectName+0x3fe
ffffaf01`36c7e730 fffff806`72015c5f : 00000000`00000000 0000003a`8a6ff218 00000000`00000000 00000000`00000001 : nt!ObOpenObjectByNameEx+0x1fa
ffffaf01`36c7e860 fffff806`72015839 : 0000003a`8a6ff1d8 ffffaf01`00501802 0000003a`8a6ff218 0000003a`8a6ff1e0 : nt!IopCreateFile+0x40f
ffffaf01`36c7e900 fffff806`71e08bee : 00000168`63c98980 fffff806`71fa5270 00000000`00000000 00000000`00000000 : nt!NtCreateFile+0x79
ffffaf01`36c7e990 00007ff9`36e0d8c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2b9
0000003a`8a6ff158 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`36e0d8c4
SYMBOL_NAME: volmgr!VmpQueryUniqueIdInternal+37
MODULE_NAME: volmgr
IMAGE_NAME: volmgr.sys
IMAGE_VERSION: 10.0.19041.1023
STACK_COMMAND: .cxr 0xffffaf0136c7ce20 ; kb
BUCKET_ID_FUNC_OFFSET: 37
FAILURE_BUCKET_ID: 0x23_volmgr!VmpQueryUniqueIdInternal
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d0e2cbbb-f6c9-659f-dade-4145ab43ee0a}
Followup: MachineOwner
---------
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2104.13002.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\LENOVO\Desktop\dump\052721-194859-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`59600000 PsLoadedModuleList = 0xfffff803`5a22a1b0
Debug session time: Thu May 27 07:55:20.660 2021 (UTC + 3:00)
System Uptime: 0 days 19:09:49.681
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...................................................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`599f6cf0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffa8e`cb973520=000000000000001e
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000006, The exception code that was not handled
Arg2: fffff80359d0cbdf, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 000002699a1dc008, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5530
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 72243
Key : Analysis.Init.CPU.mSec
Value: 484
Key : Analysis.Init.Elapsed.mSec
Value: 2684
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000006
BUGCHECK_P2: fffff80359d0cbdf
BUGCHECK_P3: 0
BUGCHECK_P4: 2699a1dc008
EXCEPTION_PARAMETER2: 000002699a1dc008
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
STACK_TEXT:
fffffa8e`cb973518 fffff803`59a3b84b : 00000000`0000001e ffffffff`c0000006 fffff803`59d0cbdf 00000000`00000000 : nt!KeBugCheckEx
fffffa8e`cb973520 fffff803`59a08dac : 00000000`00000000 fffff803`59898826 00000000`00008000 fffff803`59928041 : nt!KiDispatchException+0x1b589b
fffffa8e`cb973be0 fffff803`59a04f43 : 00000000`00000000 fffff803`5df133c0 00000000`00000000 00000000`000000b6 : nt!KiExceptionDispatch+0x12c
fffffa8e`cb973dc0 fffff803`59d0cbdf : 00000000`00000000 00000000`ffffffff 00000000`003c0000 ffffa804`de0a2000 : nt!KiPageFault+0x443
fffffa8e`cb973f50 fffff803`59d0c4be : 00000000`000001b0 00000000`003c0000 00000000`00043997 ffffa804`de0a2000 : nt!HvpFindFreeCellInBin+0xf
fffffa8e`cb973f80 fffff803`59d0be51 : ffffa804`de0a2050 fffffa8e`0000481c 00000000`00000258 ffffa804`0481b000 : nt!HvpFindFreeCell+0x126
fffffa8e`cb974000 fffff803`59d0a86c : ffffa804`00000002 00000000`00000200 ffffa804`de0a2000 fffffa8e`cb9740d0 : nt!HvpDoAllocateCell+0x7d
fffffa8e`cb974090 fffff803`59be103f : 00000000`00000000 ffffa804`de0a2000 00000269`99f5bcd4 fffffa8e`cb974160 : nt!HvReallocateCell+0xec
fffffa8e`cb974110 fffff803`59be4438 : 01d752b4`61841512 00000000`00000000 ffffa804`dbac03a0 00000000`00000003 : nt!CmpSetValueKeyExisting+0x233
fffffa8e`cb974190 fffff803`59be3c78 : fffffa8e`00000001 fffffa8e`cb974420 00000000`00000000 00000000`00000201 : nt!CmSetValueKey+0x508
fffffa8e`cb974330 fffff803`59a08bee : 00000000`ffffffff fffff803`5992512a fffffa8e`cb974640 00000000`00000000 : nt!NtSetValueKey+0x648
fffffa8e`cb974510 fffff803`599fab50 : fffff803`59c220f1 00000000`00000000 fffffa8e`cb974a80 ffffa804`f0c491b0 : nt!KiSystemServiceExitPico+0x2b9
fffffa8e`cb974718 fffff803`59c220f1 : 00000000`00000000 fffffa8e`cb974a80 ffffa804`f0c491b0 fffff803`00000000 : nt!KiServiceLinkage
fffffa8e`cb974720 fffff803`59c22619 : 00000000`0000024c 00000000`00000000 fffffa8e`cb974a80 00000000`0000024c : nt!ExpWnfWriteStateData+0x171
fffffa8e`cb974820 fffff803`59c2238e : ffffcf8c`66b63080 00000000`00000000 ffff3b79`3c750f34 00000000`00501802 : nt!ExpNtUpdateWnfStateData+0x27d
fffffa8e`cb974940 fffff803`59a08bee : ffffcf8c`66b63080 00000000`00000001 00000000`0000068e fffffa8e`cb974a80 : nt!NtUpdateWnfStateData+0x2e
fffffa8e`cb974990 00007ffc`6f6f07d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2b9
00000000`106be4b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`6f6f07d4
SYMBOL_NAME: nt!HvpFindFreeCellInBin+f
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.985
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: f
FAILURE_BUCKET_ID: 0x1E_c0000006_nt!HvpFindFreeCellInBin
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5224d302-b884-490d-f136-e34dc204733d}
Followup: MachineOwner
---------
[/CODE]
Son düzenleyen: Moderatör: