I5 10300H GTX 1650 mavi ekran

lyhsteria

Hectopat
Katılım
3 Aralık 2020
Mesajlar
326
Daha fazla  
Cinsiyet
Erkek
Merhaba. Az önce SYSTEM_SERVICE_EXCEPTION mavi ekran aldım. WinDbg Preview ile minidump baktım. Aşağıda paylaşıyorum.


Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************

   ExtensionRepository : Implicit

   UseExperimentalFeatureForNugetShare : false

   AllowNugetExeUpdate : false

   AllowNugetMSCredentialProviderInstall : false

   AllowParallelInitializationOfLocalRepositories : true



   -- Configuring repositories

      ----> Repository : LocalInstalled, Enabled: true

      ----> Repository : UserExtensions, Enabled: true



>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds



************* Waiting for Debugger Extensions Gallery to Initialize **************



>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds

   ----> Repository : UserExtensions, Enabled: true, Packages count: 0

   ----> Repository : LocalInstalled, Enabled: true, Packages count: 36



Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64

Copyright (c) Microsoft Corporation. All rights reserved.





Loading Dump File [C:\Windows\Minidump\062523-26453-01.dmp]

Mini Kernel Dump File: Only registers and stack trace are available



Symbol search path is: srv*

Executable search path is:

Windows 10 Kernel Version 22621 MP (8 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS

Kernel base = 0xfffff804`3a000000 PsLoadedModuleList = 0xfffff804`3ac134b0

Debug session time: Sun Jun 25 02:31:14.649 2023 (UTC + 3:00)

System Uptime: 6 days 14:40:09.572

Loading Kernel Symbols

...............................................................

................................................................

................................................................

...................................................

Loading User Symbols

PEB is paged out (Peb.Ldr = 00000054`512b9018).  Type ".hh dbgerr001" for details

Loading unloaded module list

..................................................

For analysis of this file, run !analyze -v

nt!KeBugCheckEx:

fffff804`3a42c280 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffffe09`bda557c0=000000000000003b

0: kd> !analyze -v

*******************************************************************************

*                                                                             *

*                        Bugcheck Analysis                                    *

*                                                                             *

*******************************************************************************



SYSTEM_SERVICE_EXCEPTION (3b)

An exception happened while executing a system service routine.

Arguments:

Arg1: 00000000c0000005, Exception code that caused the BugCheck

Arg2: ffffa55bc0e77904, Address of the instruction which caused the BugCheck

Arg3: fffffe09bda56110, Address of the context record for the exception that caused the BugCheck

Arg4: 0000000000000000, zero.



Debugging Details:

------------------





KEY_VALUES_STRING: 1



    Key  : Analysis.CPU.mSec

    Value: 1608



    Key  : Analysis.Elapsed.mSec

    Value: 7722



    Key  : Analysis.IO.Other.Mb

    Value: 12



    Key  : Analysis.IO.Read.Mb

    Value: 0



    Key  : Analysis.IO.Write.Mb

    Value: 33



    Key  : Analysis.Init.CPU.mSec

    Value: 467



    Key  : Analysis.Init.Elapsed.mSec

    Value: 26964



    Key  : Analysis.Memory.CommitPeak.Mb

    Value: 106



    Key  : Bugcheck.Code.LegacyAPI

    Value: 0x3b



    Key  : Dump.Attributes.AsUlong

    Value: 808



    Key  : Dump.Attributes.KernelGeneratedTriageDump

    Value: 1



    Key  : Failure.Bucket

    Value: AV_win32kbase!CitpInteractionSummaryEnsure



    Key  : Failure.Hash

    Value: {6a31ec39-6764-7018-8219-ccd342aacbfe}



    Key  : Hypervisor.Enlightenments.ValueHex

    Value: 1417df84



    Key  : Hypervisor.Flags.AnyHypervisorPresent

    Value: 1



    Key  : Hypervisor.Flags.ApicEnlightened

    Value: 0



    Key  : Hypervisor.Flags.ApicVirtualizationAvailable

    Value: 1



    Key  : Hypervisor.Flags.AsyncMemoryHint

    Value: 0



    Key  : Hypervisor.Flags.CoreSchedulerRequested

    Value: 0



    Key  : Hypervisor.Flags.CpuManager

    Value: 1



    Key  : Hypervisor.Flags.DeprecateAutoEoi

    Value: 1



    Key  : Hypervisor.Flags.DynamicCpuDisabled

    Value: 1



    Key  : Hypervisor.Flags.Epf

    Value: 0



    Key  : Hypervisor.Flags.ExtendedProcessorMasks

    Value: 1



    Key  : Hypervisor.Flags.HardwareMbecAvailable

    Value: 1



    Key  : Hypervisor.Flags.MaxBankNumber

    Value: 0



    Key  : Hypervisor.Flags.MemoryZeroingControl

    Value: 0



    Key  : Hypervisor.Flags.NoExtendedRangeFlush

    Value: 0



    Key  : Hypervisor.Flags.NoNonArchCoreSharing

    Value: 1



    Key  : Hypervisor.Flags.Phase0InitDone

    Value: 1



    Key  : Hypervisor.Flags.PowerSchedulerQos

    Value: 0



    Key  : Hypervisor.Flags.RootScheduler

    Value: 0



    Key  : Hypervisor.Flags.SynicAvailable

    Value: 1



    Key  : Hypervisor.Flags.UseQpcBias

    Value: 0



    Key  : Hypervisor.Flags.Value

    Value: 21631230



    Key  : Hypervisor.Flags.ValueHex

    Value: 14a10fe



    Key  : Hypervisor.Flags.VpAssistPage

    Value: 1



    Key  : Hypervisor.Flags.VsmAvailable

    Value: 1



    Key  : Hypervisor.RootFlags.AccessStats

    Value: 1



    Key  : Hypervisor.RootFlags.CrashdumpEnlightened

    Value: 1



    Key  : Hypervisor.RootFlags.CreateVirtualProcessor

    Value: 1



    Key  : Hypervisor.RootFlags.DisableHyperthreading

    Value: 0



    Key  : Hypervisor.RootFlags.HostTimelineSync

    Value: 1



    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled

    Value: 0



    Key  : Hypervisor.RootFlags.IsHyperV

    Value: 1



    Key  : Hypervisor.RootFlags.LivedumpEnlightened

    Value: 1



    Key  : Hypervisor.RootFlags.MapDeviceInterrupt

    Value: 1



    Key  : Hypervisor.RootFlags.MceEnlightened

    Value: 1



    Key  : Hypervisor.RootFlags.Nested

    Value: 0



    Key  : Hypervisor.RootFlags.StartLogicalProcessor

    Value: 1



    Key  : Hypervisor.RootFlags.Value

    Value: 1015



    Key  : Hypervisor.RootFlags.ValueHex

    Value: 3f7





BUGCHECK_CODE:  3b



BUGCHECK_P1: c0000005



BUGCHECK_P2: ffffa55bc0e77904



BUGCHECK_P3: fffffe09bda56110



BUGCHECK_P4: 0



FILE_IN_CAB:  062523-26453-01.dmp



TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b





DUMP_FILE_ATTRIBUTES: 0x808

  Kernel Generated Triage Dump



CONTEXT:  fffffe09bda56110 -- (.cxr 0xfffffe09bda56110)

rax=0000000000000031 rbx=0000000000000000 rcx=ffff80094e30bdc0

rdx=0500000000000501 rsi=0500000000000501 rdi=0000000000000000

rip=ffffa55bc0e77904 rsp=fffffe09bda56b30 rbp=0000000000000001

 r8=0000000000000001  r9=00000000220bf75a r10=ffff80094e30be8c

r11=00000000220bf75a r12=0000000000000001 r13=0000000000000000

r14=0500000000000521 r15=ffff80094e30bdc0

iopl=0         nv up ei pl zr na po nc

cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246

win32kbase!CitpInteractionSummaryEnsure+0x48:

ffffa55b`c0e77904 498b3e          mov     rdi,qword ptr [r14] ds:002b:05000000`00000521=????????????????

Resetting default scope



CUSTOMER_CRASH_COUNT:  1



PROCESS_NAME:  dwm.exe



STACK_TEXT:

fffffe09`bda56b30 ffffa55b`c0f1743f     : ffff8009`4e30bdc0 00000000`00000000 ffff8009`274d7190 00000000`00000000 : win32kbase!CitpInteractionSummaryEnsure+0x48

fffffe09`bda56b90 ffffa55b`c0e77eb8     : 00000000`00000002 ffff8009`220bf75a 00000000`00000000 00000000`00000022 : win32kbase!CitpLastInputUpdate+0x9fa23

fffffe09`bda56be0 ffffa55b`c0e73f94     : 00000000`00000000 fffffe09`bda56d30 fffffe09`bda56d50 fffffe09`bda56d68 : win32kbase!CInputGlobals::UpdateInputGlobals+0x138

fffffe09`bda56c50 ffffa55b`c0e73c66     : ffffbc0c`1b42f140 00000000`00000001 00000000`00000001 00000000`00000000 : win32kbase!CMouseProcessor::processMouseEvent+0x320

fffffe09`bda577e0 ffffa55b`c0eebfd8     : 00000000`00000001 ffff8009`14a8e460 00000000`00000000 ffffa55b`c0e75be1 : win32kbase!ProcessMouseEvent+0x16

fffffe09`bda57810 ffffa55b`c0ec2299     : 00000000`00000002 00000000`00000000 ffff8009`14a8e460 00000000`00000000 : win32kbase!HandleMITWakeSignal+0x18a

fffffe09`bda57850 ffffa55b`c0e75ce6     : ffff8009`14a8e460 fffffe09`bda57a60 00000000`00000000 00000000`00000000 : win32kbase!<lambda_0f9e2a8fc479216b45af02f10e3c5bbd>::<lambda_invoker_cdecl>+0x9

fffffe09`bda57880 ffffa55b`c0e72ddd     : 00000000`00000000 00000000`00000001 00000000`00000002 00000000`00000000 : win32kbase!IOCPDispatcher::HandleThreadDispatcherSignal+0x7e

fffffe09`bda578c0 ffffa55b`c0e75d90     : 00007ffa`6c6c1610 00000000`00000000 ffff8009`48f98d60 00007ffa`6c6c1610 : win32kbase!IOCPDispatcher::Dispatch+0x2d

fffffe09`bda57920 ffffa55b`c0e75e1f     : 00000000`00000000 00007ffa`6c6c1610 00000000`00000002 00007ffa`6c4b4600 : win32kbase!UserDispatchMITCompletion+0x88

fffffe09`bda57980 ffffa55b`c1ac0a56     : ffffbc0b`f5a83080 000001f4`00000000 00000000`0000c800 00000000`00000000 : win32kbase!NtMITDispatchCompletion+0x2f

fffffe09`bda579b0 fffff804`3a440fe5     : ffffbc0b`f5a83080 ffffbc0c`0ea2a8e0 00000000`00000000 ffffbc0b`00000000 : win32k!NtMITDispatchCompletion+0x16

fffffe09`bda579e0 00007ffa`6fe07b94     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25

00000054`5167f318 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`6fe07b94





SYMBOL_NAME:  win32kbase!CitpInteractionSummaryEnsure+48



MODULE_NAME: win32kbase



IMAGE_NAME:  win32kbase.sys



IMAGE_VERSION:  10.0.22621.1848



STACK_COMMAND:  .cxr 0xfffffe09bda56110 ; kb



BUCKET_ID_FUNC_OFFSET:  48



FAILURE_BUCKET_ID:  AV_win32kbase!CitpInteractionSummaryEnsure



OSPLATFORM_TYPE:  x64



OSNAME:  Windows 10



FAILURE_ID_HASH:  {6a31ec39-6764-7018-8219-ccd342aacbfe}



Followup:     MachineOwner

---------

@KojiroHyuga04 hocam bakabilir misiniz müsaitseniz?
 
Son düzenleme:
Sen bakmayacaksın dosyayı burada paylaşacaksın.

 

Zaten yukarıya WinDbg ile açıp çıkanları eklemişim. Gene de paylaşıyorum dump dosyasını.

 
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…