I5 10300H GTX 1650 mavi ekran

lyhsteria

Hectopat
Katılım
3 Aralık 2020
Mesajlar
326
Daha fazla  
Cinsiyet
Erkek
Merhaba. Az önce SYSTEM_SERVICE_EXCEPTION mavi ekran aldım. WinDbg Preview ile minidump baktım. Aşağıda paylaşıyorum.


Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************

   ExtensionRepository : Implicit

   UseExperimentalFeatureForNugetShare : false

   AllowNugetExeUpdate : false

   AllowNugetMSCredentialProviderInstall : false

   AllowParallelInitializationOfLocalRepositories : true



   -- Configuring repositories

      ----> Repository : LocalInstalled, Enabled: true

      ----> Repository : UserExtensions, Enabled: true



>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds



************* Waiting for Debugger Extensions Gallery to Initialize **************



>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds

   ----> Repository : UserExtensions, Enabled: true, Packages count: 0

   ----> Repository : LocalInstalled, Enabled: true, Packages count: 36



Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64

Copyright (c) Microsoft Corporation. All rights reserved.





Loading Dump File [C:\Windows\Minidump\062523-26453-01.dmp]

Mini Kernel Dump File: Only registers and stack trace are available



Symbol search path is: srv*

Executable search path is:

Windows 10 Kernel Version 22621 MP (8 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS

Kernel base = 0xfffff804`3a000000 PsLoadedModuleList = 0xfffff804`3ac134b0

Debug session time: Sun Jun 25 02:31:14.649 2023 (UTC + 3:00)

System Uptime: 6 days 14:40:09.572

Loading Kernel Symbols

...............................................................

................................................................

................................................................

...................................................

Loading User Symbols

PEB is paged out (Peb.Ldr = 00000054`512b9018).  Type ".hh dbgerr001" for details

Loading unloaded module list

..................................................

For analysis of this file, run !analyze -v

nt!KeBugCheckEx:

fffff804`3a42c280 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffffe09`bda557c0=000000000000003b

0: kd> !analyze -v

*******************************************************************************

*                                                                             *

*                        Bugcheck Analysis                                    *

*                                                                             *

*******************************************************************************



SYSTEM_SERVICE_EXCEPTION (3b)

An exception happened while executing a system service routine.

Arguments:

Arg1: 00000000c0000005, Exception code that caused the BugCheck

Arg2: ffffa55bc0e77904, Address of the instruction which caused the BugCheck

Arg3: fffffe09bda56110, Address of the context record for the exception that caused the BugCheck

Arg4: 0000000000000000, zero.



Debugging Details:

------------------





KEY_VALUES_STRING: 1



    Key  : Analysis.CPU.mSec

    Value: 1608



    Key  : Analysis.Elapsed.mSec

    Value: 7722



    Key  : Analysis.IO.Other.Mb

    Value: 12



    Key  : Analysis.IO.Read.Mb

    Value: 0



    Key  : Analysis.IO.Write.Mb

    Value: 33



    Key  : Analysis.Init.CPU.mSec

    Value: 467



    Key  : Analysis.Init.Elapsed.mSec

    Value: 26964



    Key  : Analysis.Memory.CommitPeak.Mb

    Value: 106



    Key  : Bugcheck.Code.LegacyAPI

    Value: 0x3b



    Key  : Dump.Attributes.AsUlong

    Value: 808



    Key  : Dump.Attributes.KernelGeneratedTriageDump

    Value: 1



    Key  : Failure.Bucket

    Value: AV_win32kbase!CitpInteractionSummaryEnsure



    Key  : Failure.Hash

    Value: {6a31ec39-6764-7018-8219-ccd342aacbfe}



    Key  : Hypervisor.Enlightenments.ValueHex

    Value: 1417df84



    Key  : Hypervisor.Flags.AnyHypervisorPresent

    Value: 1



    Key  : Hypervisor.Flags.ApicEnlightened

    Value: 0



    Key  : Hypervisor.Flags.ApicVirtualizationAvailable

    Value: 1



    Key  : Hypervisor.Flags.AsyncMemoryHint

    Value: 0



    Key  : Hypervisor.Flags.CoreSchedulerRequested

    Value: 0



    Key  : Hypervisor.Flags.CpuManager

    Value: 1



    Key  : Hypervisor.Flags.DeprecateAutoEoi

    Value: 1



    Key  : Hypervisor.Flags.DynamicCpuDisabled

    Value: 1



    Key  : Hypervisor.Flags.Epf

    Value: 0



    Key  : Hypervisor.Flags.ExtendedProcessorMasks

    Value: 1



    Key  : Hypervisor.Flags.HardwareMbecAvailable

    Value: 1



    Key  : Hypervisor.Flags.MaxBankNumber

    Value: 0



    Key  : Hypervisor.Flags.MemoryZeroingControl

    Value: 0



    Key  : Hypervisor.Flags.NoExtendedRangeFlush

    Value: 0



    Key  : Hypervisor.Flags.NoNonArchCoreSharing

    Value: 1



    Key  : Hypervisor.Flags.Phase0InitDone

    Value: 1



    Key  : Hypervisor.Flags.PowerSchedulerQos

    Value: 0



    Key  : Hypervisor.Flags.RootScheduler

    Value: 0



    Key  : Hypervisor.Flags.SynicAvailable

    Value: 1



    Key  : Hypervisor.Flags.UseQpcBias

    Value: 0



    Key  : Hypervisor.Flags.Value

    Value: 21631230



    Key  : Hypervisor.Flags.ValueHex

    Value: 14a10fe



    Key  : Hypervisor.Flags.VpAssistPage

    Value: 1



    Key  : Hypervisor.Flags.VsmAvailable

    Value: 1



    Key  : Hypervisor.RootFlags.AccessStats

    Value: 1



    Key  : Hypervisor.RootFlags.CrashdumpEnlightened

    Value: 1



    Key  : Hypervisor.RootFlags.CreateVirtualProcessor

    Value: 1



    Key  : Hypervisor.RootFlags.DisableHyperthreading

    Value: 0



    Key  : Hypervisor.RootFlags.HostTimelineSync

    Value: 1



    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled

    Value: 0



    Key  : Hypervisor.RootFlags.IsHyperV

    Value: 1



    Key  : Hypervisor.RootFlags.LivedumpEnlightened

    Value: 1



    Key  : Hypervisor.RootFlags.MapDeviceInterrupt

    Value: 1



    Key  : Hypervisor.RootFlags.MceEnlightened

    Value: 1



    Key  : Hypervisor.RootFlags.Nested

    Value: 0



    Key  : Hypervisor.RootFlags.StartLogicalProcessor

    Value: 1



    Key  : Hypervisor.RootFlags.Value

    Value: 1015



    Key  : Hypervisor.RootFlags.ValueHex

    Value: 3f7





BUGCHECK_CODE:  3b



BUGCHECK_P1: c0000005



BUGCHECK_P2: ffffa55bc0e77904



BUGCHECK_P3: fffffe09bda56110



BUGCHECK_P4: 0



FILE_IN_CAB:  062523-26453-01.dmp



TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b





DUMP_FILE_ATTRIBUTES: 0x808

  Kernel Generated Triage Dump



CONTEXT:  fffffe09bda56110 -- (.cxr 0xfffffe09bda56110)

rax=0000000000000031 rbx=0000000000000000 rcx=ffff80094e30bdc0

rdx=0500000000000501 rsi=0500000000000501 rdi=0000000000000000

rip=ffffa55bc0e77904 rsp=fffffe09bda56b30 rbp=0000000000000001

 r8=0000000000000001  r9=00000000220bf75a r10=ffff80094e30be8c

r11=00000000220bf75a r12=0000000000000001 r13=0000000000000000

r14=0500000000000521 r15=ffff80094e30bdc0

iopl=0         nv up ei pl zr na po nc

cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246

win32kbase!CitpInteractionSummaryEnsure+0x48:

ffffa55b`c0e77904 498b3e          mov     rdi,qword ptr [r14] ds:002b:05000000`00000521=????????????????

Resetting default scope



CUSTOMER_CRASH_COUNT:  1



PROCESS_NAME:  dwm.exe



STACK_TEXT:

fffffe09`bda56b30 ffffa55b`c0f1743f     : ffff8009`4e30bdc0 00000000`00000000 ffff8009`274d7190 00000000`00000000 : win32kbase!CitpInteractionSummaryEnsure+0x48

fffffe09`bda56b90 ffffa55b`c0e77eb8     : 00000000`00000002 ffff8009`220bf75a 00000000`00000000 00000000`00000022 : win32kbase!CitpLastInputUpdate+0x9fa23

fffffe09`bda56be0 ffffa55b`c0e73f94     : 00000000`00000000 fffffe09`bda56d30 fffffe09`bda56d50 fffffe09`bda56d68 : win32kbase!CInputGlobals::UpdateInputGlobals+0x138

fffffe09`bda56c50 ffffa55b`c0e73c66     : ffffbc0c`1b42f140 00000000`00000001 00000000`00000001 00000000`00000000 : win32kbase!CMouseProcessor::processMouseEvent+0x320

fffffe09`bda577e0 ffffa55b`c0eebfd8     : 00000000`00000001 ffff8009`14a8e460 00000000`00000000 ffffa55b`c0e75be1 : win32kbase!ProcessMouseEvent+0x16

fffffe09`bda57810 ffffa55b`c0ec2299     : 00000000`00000002 00000000`00000000 ffff8009`14a8e460 00000000`00000000 : win32kbase!HandleMITWakeSignal+0x18a

fffffe09`bda57850 ffffa55b`c0e75ce6     : ffff8009`14a8e460 fffffe09`bda57a60 00000000`00000000 00000000`00000000 : win32kbase!<lambda_0f9e2a8fc479216b45af02f10e3c5bbd>::<lambda_invoker_cdecl>+0x9

fffffe09`bda57880 ffffa55b`c0e72ddd     : 00000000`00000000 00000000`00000001 00000000`00000002 00000000`00000000 : win32kbase!IOCPDispatcher::HandleThreadDispatcherSignal+0x7e

fffffe09`bda578c0 ffffa55b`c0e75d90     : 00007ffa`6c6c1610 00000000`00000000 ffff8009`48f98d60 00007ffa`6c6c1610 : win32kbase!IOCPDispatcher::Dispatch+0x2d

fffffe09`bda57920 ffffa55b`c0e75e1f     : 00000000`00000000 00007ffa`6c6c1610 00000000`00000002 00007ffa`6c4b4600 : win32kbase!UserDispatchMITCompletion+0x88

fffffe09`bda57980 ffffa55b`c1ac0a56     : ffffbc0b`f5a83080 000001f4`00000000 00000000`0000c800 00000000`00000000 : win32kbase!NtMITDispatchCompletion+0x2f

fffffe09`bda579b0 fffff804`3a440fe5     : ffffbc0b`f5a83080 ffffbc0c`0ea2a8e0 00000000`00000000 ffffbc0b`00000000 : win32k!NtMITDispatchCompletion+0x16

fffffe09`bda579e0 00007ffa`6fe07b94     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25

00000054`5167f318 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`6fe07b94





SYMBOL_NAME:  win32kbase!CitpInteractionSummaryEnsure+48



MODULE_NAME: win32kbase



IMAGE_NAME:  win32kbase.sys



IMAGE_VERSION:  10.0.22621.1848



STACK_COMMAND:  .cxr 0xfffffe09bda56110 ; kb



BUCKET_ID_FUNC_OFFSET:  48



FAILURE_BUCKET_ID:  AV_win32kbase!CitpInteractionSummaryEnsure



OSPLATFORM_TYPE:  x64



OSNAME:  Windows 10



FAILURE_ID_HASH:  {6a31ec39-6764-7018-8219-ccd342aacbfe}



Followup:     MachineOwner

---------

@KojiroHyuga04 hocam bakabilir misiniz müsaitseniz?
 
Son düzenleme:
Sen bakmayacaksın dosyayı burada paylaşacaksın.

 
Sen bakmayacaksın dosyayı burada paylaşacaksın.


Zaten yukarıya WinDbg ile açıp çıkanları eklemişim. Gene de paylaşıyorum dump dosyasını.

 

Technopat Haberler

Yeni konular

Geri
Yukarı