- RAM
- 4 GB
- İşlemci
- i3 11
Dün XAMPP açıktı ve saat 00 da BSoD verdi, anlayamadım. RAM'im 4 GB olduğu için vermiş olabilir mi? i3 11.nesil işlemcim var. 4GB RAM, 256 GB SSD.
Kod:
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\052823-10890-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff803`7da00000 PsLoadedModuleList = 0xfffff803`7e613470
Debug session time: Sun May 28 00:14:25.817 2023 (UTC + 3:00)
System Uptime: 2 days 4:20:50.489
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
....................................................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`7de2b8f0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9a0b`cb4c8a20=000000000000000a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffe40396247850, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8037dd137ef, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 483
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 1986
Key : Analysis.IO.Other.Mb
Value: 5
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 30
Key : Analysis.Init.CPU.mSec
Value: 750
Key : Analysis.Init.Elapsed.mSec
Value: 28842
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : Bugcheck.Code.DumpHeader
Value: 0xa
Key : Bugcheck.Code.Register
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
FILE_IN_CAB: 052823-10890-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: ffffe40396247850
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8037dd137ef
WRITE_ADDRESS: fffff8037e71c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffe40396247850
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: msedge.exe
TRAP_FRAME: ffff9a0bcb4c8b60 -- (.trap 0xffff9a0bcb4c8b60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe40396247850
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037dd137ef rsp=ffff9a0bcb4c8cf0 rbp=ffff9a0bcb4c9089
r8=0000000000000000 r9=ffff9a0bcb4c9118 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiAcquireKobjectLockSafe+0xf:
fffff803`7dd137ef f00fba2907 lock bts dword ptr [rcx],7 ds:ffffe403`96247850=00060000
Resetting default scope
STACK_TEXT:
ffff9a0b`cb4c8a18 fffff803`7de40fa9 : 00000000`0000000a ffffe403`96247850 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffff9a0b`cb4c8a20 fffff803`7de3c634 : 00000000`00100000 ffffc009`0bb7e080 ffffc009`0bb7e080 00000000`00000004 : nt!KiBugCheckDispatch+0x69
ffff9a0b`cb4c8b60 fffff803`7dd137ef : ffffd301`979eeb40 00000001`00000400 ffff9a0b`cb4c8dc0 fffff803`7de344db : nt!KiPageFault+0x474
ffff9a0b`cb4c8cf0 fffff803`7dc322fb : ffffc009`02a6e080 ffffe403`96247850 00000000`00000000 fffff803`7de2db11 : nt!KiAcquireKobjectLockSafe+0xf
ffff9a0b`cb4c8d20 fffff803`7df945e2 : 00000000`00000001 ffff9a0b`cb4c9089 00000000`00000000 00000000`00000000 : nt!KeSetEvent+0x6b
ffff9a0b`cb4c8db0 fffff803`7dc13323 : 00000000`00000000 00000000`00000001 ffffc009`02a6e080 ffffe403`98c45910 : nt!PsDispatchIumService+0x96e
ffff9a0b`cb4c9020 fffff803`7e342c07 : 00000001`400000c4 ffffc009`0bb7e080 ffffc009`0bb7e4d8 00000000`00000002 : nt!VslpEnterIumSecureMode+0x287
ffff9a0b`cb4c90f0 fffff803`7df5efb1 : ffffc008`f7ad8060 00000000`000000a0 ffffc008`f7ad8060 ffffc008`f7ad8060 : nt!VslRundownSecureProcess+0x47
ffff9a0b`cb4c91a0 fffff803`7e2f9d67 : ffffffff`ffffffff 00000000`00000001 ffffc009`0bb7e080 fffff803`7e08b150 : nt!KeRundownSecureProcess+0x15
ffff9a0b`cb4c91d0 fffff803`7e0965b4 : ffffc009`0bb7e080 ffffe403`91ebb060 ffffc009`0bb7e080 00000000`00000000 : nt!PspRundownSingleProcess+0x151bbb
ffff9a0b`cb4c9260 fffff803`7e1ad2b2 : 00000000`00000000 ffffc009`0bb7e001 ffffc009`02a6e0f4 00000028`f388b000 : nt!PspExitThread+0x63c
ffff9a0b`cb4c9360 fffff803`7de406e5 : ffffc009`0000547c ffffc009`02a6e080 ffffc009`0bb7e080 ffffc009`0bb7e080 : nt!NtTerminateProcess+0xf2
ffff9a0b`cb4c93e0 00007fff`bcdef1d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000028`f41ff848 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`bcdef1d4
SYMBOL_NAME: nt!KiAcquireKobjectLockSafe+f
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.1702
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: f
FAILURE_BUCKET_ID: AV_nt!KiAcquireKobjectLockSafe
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {87978629-0a82-b7ad-caa7-eb2c5ba684a3}
Followup: MachineOwner
---------
Son düzenleyen: Moderatör: