Bora55
Hectopat
- Katılım
- 20 Ocak 2021
- Mesajlar
- 162
- Çözümler
- 3
Daha fazla
- Sistem Özellikleri
- Hp Victus 16 | i7 14700HX | RTX4070 | 16Gb Ram
CPU: Fx-6300
GPU: Rx580 8Gb
RAM: 4+8 Gb Ram
PSU: SilverStone 1200W
Anakart: A960m-m3
- Cinsiyet
- Erkek
- Meslek
- Öğrenci
- Minidump Rapor Linki
- https://drive.google.com/file/d/1AIEVGyFPoE7_AXCXvMzpUP8DAWQKODXB/view?usp=sharing
- RAM
- SK Hynix 16 (8x2) GB 5600MHz
- SSD veya HDD modeli
- KIOXIA-EXCERIA G2 SSD 1TB
- Ekran kartı
- RTX4070
- Anakart
- HP 8C99
- İşlemci
- i7 14700HX
Aldığım hata kayıtlarını WinDbg ile 3 tanesinini analiz edip alta ekledim. Minidump dosyalarını da paylaştım. Birbirleriyle çok alakası olmayan uygulamaların hatalara sebep olmaları sebebiyle sorunun RAM'de olduğunu düşünüp, Memtest86 ile uzun süre RAM'lerimi test ettim ancak hiçbir hata bulamadı.
Onun dışında mavi ekranlara sebep olabileceğini düşündüğüm birkaç etkeni sıralamak istiyorum:
Öncelikle laptopumu çantamla beraber düşürdüm. Çanta ile birlikte çapraz bir şekilde yaklaşık 1-1, 5 metre yükseklikten düştü. Kasa dışında bir kırılma olmadı ancak içteki bir vidanın tutunduğu yer kırılmıştı. Düşmeden önce mavi ekran yememiştim.
Diğer bir sebep ise Windows 24H2 yüklemem olmamdan olabileceğini düşünüyorum. Çünkü yükledikten sonra olmaya başladı diyebilirim.
Diğer bir sebep ise de CPU'ya uyguladığım undervolt. Şu anda -0.150 voltta. Ancak şöyle bir durum var yanlış hatırlamıyorsam hataların birisinde hata aldığım zaman undervolt yoktu.
Sorun direkt düşmeye bağlı olabilir evet ancak bir ümit olmama ihtimalinden dolayı anlattım yukardakileri. Umarım ondan dolayı kaynaklanmıyordur
Onun dışında mavi ekranlara sebep olabileceğini düşündüğüm birkaç etkeni sıralamak istiyorum:
Öncelikle laptopumu çantamla beraber düşürdüm. Çanta ile birlikte çapraz bir şekilde yaklaşık 1-1, 5 metre yükseklikten düştü. Kasa dışında bir kırılma olmadı ancak içteki bir vidanın tutunduğu yer kırılmıştı. Düşmeden önce mavi ekran yememiştim.
Diğer bir sebep ise Windows 24H2 yüklemem olmamdan olabileceğini düşünüyorum. Çünkü yükledikten sonra olmaya başladı diyebilirim.
Diğer bir sebep ise de CPU'ya uyguladığım undervolt. Şu anda -0.150 voltta. Ancak şöyle bir durum var yanlış hatırlamıyorsam hataların birisinde hata aldığım zaman undervolt yoktu.
Sorun direkt düşmeye bağlı olabilir evet ancak bir ümit olmama ihtimalinden dolayı anlattım yukardakileri. Umarım ondan dolayı kaynaklanmıyordur
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffffffffffff8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802e9c7e9e4, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1109
Key : Analysis.Elapsed.mSec
Value: 4005
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 250
Key : Analysis.Init.Elapsed.mSec
Value: 13109
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : Analysis.Version.DbgEng
Value: 10.0.27725.1000
Key : Analysis.Version.Description
Value: 10.2408.27.01 amd64fre
Key : Analysis.Version.Ext
Value: 1.2408.27.1
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Bugcheck.Code.TargetModel
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 21808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_igdkmdn64!unknown_function
Key : Failure.Hash
Value: {12102b79-db74-3949-6de5-0951c15a29fa}
Key : Hypervisor.Enlightenments.ValueHex
Value: 7417df84
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 55185662
Key : Hypervisor.Flags.ValueHex
Value: 34a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
BUGCHECK_CODE: a
BUGCHECK_P1: fffffffffffffff8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff802e9c7e9e4
FILE_IN_CAB: 010925-15406-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x21808
Kernel Generated Triage Dump
FAULTING_THREAD: ffffd7813bfdf0c0
READ_ADDRESS: fffff802ea9c34b0: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffffffffffffff8
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: NVIDIA Overlay
TRAP_FRAME: ffffc188ba156450 -- (.trap 0xffffc188ba156450)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffffffffffff8 rbx=0000000000000000 rcx=0000000000060000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802e9c7e9e4 rsp=ffffc188ba1565e0 rbp=ffffc188ba1568b9
r8=ecfe0f790e6329a9 r9=0000000000000000 r10=ffffd7812f6eee98
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlpHpVsChunkSplit+0x6f4:
fffff802`e9c7e9e4 3300 xor eax,dword ptr [rax] ds:ffffffff`fffffff8=????????
Resetting default scope
STACK_TEXT:
ffffc188`ba156308 fffff802`ea08dce9 : 00000000`0000000a ffffffff`fffffff8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffc188`ba156310 fffff802`ea088fa8 : 00000001`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc188`ba156450 fffff802`e9c7e9e4 : 00000000`00000000 ffffd781`1c1002c0 ffffd781`3ced8f80 ffffd781`1c1002c0 : nt!KiPageFault+0x468
ffffc188`ba1565e0 fffff802`e9c7f326 : 00000006`00000000 00000000`00000000 00000000`00000000 00000000`00000024 : nt!RtlpHpVsChunkSplit+0x6f4
ffffc188`ba156690 fffff802`e9c0b1d9 : 00000000`00000040 ffffc188`00000230 00000000`00000019 00000000`00000002 : nt!RtlpHpVsContextAllocateInternal+0x3f6
ffffc188`ba156710 fffff802`e9c0a2dd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpVsContextAllocate+0x39
ffffc188`ba156770 fffff802`e9c08a0a : ffffd781`1c100000 00000000`00000000 ffff9583`dbd7deb0 fffff802`ea5380d1 : nt!RtlpHpAllocateHeap+0x31d
ffffc188`ba1567f0 fffff802`e9c08492 : ffffd781`1c783230 00000000`00004bf4 00000000`20444440 00000000`00000000 : nt!ExAllocateHeapPool+0x50a
ffffc188`ba156920 fffff802`ea537189 : 00000000`00000040 00000000`00000220 00000000`00000000 00000000`00000190 : nt!ExpAllocatePoolWithTagFromNode+0x52
ffffc188`ba156960 fffff802`ea5370b7 : ffffd781`1c100000 00000000`00000600 00000000`00000178 00000000`00000190 : nt!ExAllocatePool2+0x99
ffffc188`ba156a10 fffff802`98f74fed : 00000000`00000000 fffff802`98ba08ca 00000000`00000040 0000000b`00000028 : nt!ExAllocatePoolWithTag+0xa7
ffffc188`ba156a50 00000000`00000000 : fffff802`98ba08ca 00000000`00000040 0000000b`00000028 00000000`00000000 : igdkmdn64+0x404fed
SYMBOL_NAME: igdkmdn64+404fed
MODULE_NAME: igdkmdn64
IMAGE_NAME: igdkmdn64.sys
STACK_COMMAND: .process /r /p 0xffffd78137f99080; .thread 0xffffd7813bfdf0c0 ; kb
BUCKET_ID_FUNC_OFFSET: 404fed
FAILURE_BUCKET_ID: AV_igdkmdn64!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {12102b79-db74-3949-6de5-0951c15a29fa}
Followup: MachineOwner
---------
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff8022ce30657, memory referenced.
Arg2: 0000000000000010, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff802ace30657, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Execute
Key : Analysis.CPU.mSec
Value: 968
Key : Analysis.Elapsed.mSec
Value: 2017
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 250
Key : Analysis.Init.Elapsed.mSec
Value: 3399
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : Analysis.Version.DbgEng
Value: 10.0.27725.1000
Key : Analysis.Version.Description
Value: 10.2408.27.01 amd64fre
Key : Analysis.Version.Ext
Value: 1.2408.27.1
Key : Bugcheck.Code.LegacyAPI
Value: 0x50
Key : Bugcheck.Code.TargetModel
Value: 0x50
Key : Dump.Attributes.AsUlong
Value: 21808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_X_(null)_nvlddmkm!unknown_function
Key : Failure.Hash
Value: {5f48bb9b-8a89-18cd-162e-b7b2ef18a1e8}
Key : Hypervisor.Enlightenments.ValueHex
Value: 7417df84
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 55185662
Key : Hypervisor.Flags.ValueHex
Value: 34a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
BUGCHECK_CODE: 50
BUGCHECK_P1: fffff8022ce30657
BUGCHECK_P2: 10
BUGCHECK_P3: fffff802ace30657
BUGCHECK_P4: 2
FILE_IN_CAB: 012825-15953-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x21808
Kernel Generated Triage Dump
FAULTING_THREAD: ffffdc05548680c0
READ_ADDRESS: fffff802adbc34b0: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff8022ce30657
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: nvcontainer.ex
TRAP_FRAME: fffffa0d4841d460 -- (.trap 0xfffffa0d4841d460)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa0d4841e820 rbx=0000000000000000 rcx=0000000000000017
rdx=fffffa0d4841e8d8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802ace30657 rsp=fffffa0d4841d5f0 rbp=fffffa0d4841dcc0
r8=0000000000000006 r9=00007ffffffeffff r10=0000000000000000
r11=fffff80257dbd7fc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe nc
nt!RtlpUnwindPrologue+0x627:
fffff802`ace30657 488b06 mov rax,qword ptr [rsi] ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
fffffa0d`4841d1f8 fffff802`aced3c85 : 00000000`00000050 fffff802`2ce30657 00000000`00000010 fffffa0d`4841d460 : nt!KeBugCheckEx
fffffa0d`4841d200 fffff802`ace7a51f : fffff802`2ce30657 00000000`00001000 00000000`00000002 fffff802`acc00000 : nt!MiSystemFault+0x735
fffffa0d`4841d2f0 fffff802`ad288ecb : 00000000`00000000 00000000`00000001 00000000`00000000 fffff802`ace11cec : nt!MmAccessFault+0x2ff
fffffa0d`4841d460 fffff802`ace30657 : 00000000`00000000 00000000`00000000 00000000`00000068 ffffdc05`4e121840 : nt!KiPageFault+0x38b
fffffa0d`4841d5f0 fffff802`ace2f556 : fffff802`56f30000 fffff802`57c291d9 fffffa0d`4841e820 fffff802`581a7b54 : nt!RtlpUnwindPrologue+0x627
fffffa0d`4841d6a0 fffff802`ace2e232 : fffffa0d`4841e820 fffff802`56f30000 fffff802`57c291d9 fffff802`581a7b54 : nt!RtlpxVirtualUnwind+0x146
fffffa0d`4841d760 fffff802`ace6b664 : 00000000`00000001 00000000`0000000d 00000000`00000000 00000000`00000000 : nt!RtlpWalkFrameChain+0x3a2
fffffa0d`4841de50 fffff802`ace6b572 : 00000000`0000000c fffffa0d`4841def0 00000000`00000004 fffffa0d`48419000 : nt!RtlWalkFrameChain+0x94
fffffa0d`4841dea0 fffff802`57019547 : 00000000`00000008 00000000`00000000 fffffa0d`4841e008 fffff802`ace6434c : nt!RtlCaptureStackBackTrace+0x42
fffffa0d`4841ded0 00000000`00000008 : 00000000`00000000 fffffa0d`4841e008 fffff802`ace6434c fffff802`57c291d9 : nvlddmkm+0xe9547
fffffa0d`4841ded8 00000000`00000000 : fffffa0d`4841e008 fffff802`ace6434c fffff802`57c291d9 ffff5b81`07496d81 : 0x8
SYMBOL_NAME: nvlddmkm+e9547
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .process /r /p 0xffffdc0552bce0c0; .thread 0xffffdc05548680c0 ; kb
BUCKET_ID_FUNC_OFFSET: e9547
FAILURE_BUCKET_ID: AV_X_(null)_nvlddmkm!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5f48bb9b-8a89-18cd-162e-b7b2ef18a1e8}
Followup: MachineOwner
---------
Kod:
*******************************************************************************
[LIST]
[*]*
[*]Bugcheck Analysis *
[*]*
[/LIST]
*******************************************************************************
REGISTRY_FILTER_DRIVER_EXCEPTION (135)
This BugCheck is caused by an unhandled exception in a registry filtering driver.
This BugCheck indicates that a registry filtering driver didn't handle exception inside
its notification routine. One can identify the driver by the 3rd parameter.
Arguments:
Arg1: ffffffffc0000005, ExceptionCode
Arg2: ffffaa0aa4cc6370, Address of the context record for the exception that caused the BugCheck
Arg3: fffff806bc03a2f0, The driver's callback routine address
Arg4: ffff850862ab6160, Internal
Debugging Details:
------------------
*************************************************************************
[B]* *
* *
* Either you specified an unqualified symbol, or your debugger *
* doesn't have full symbol information. Unqualified symbol *
* resolution is turned off by default. Please either specify a *
* fully qualified symbol module!symbolname, or enable resolution *
* of unqualified symbols by typing ".symopt- 100". Note that *
* enabling unqualified symbol resolution with network symbol *
* server shares in the symbol path may cause the debugger to *
* appear to hang for long periods of time when an incorrect *
* symbol name is typed or the network symbol server is down. *
* *
* For some commands to work properly, your symbol path *
* must point to .pdb files that have full type information. *
* *
* Certain .pdb files (such as the public OS symbols) do not *
* contain the required information. Contact the group that *
* provided you with these symbols if you need this command to *
* work. *
* *
* Type referenced: ExceptionRecord *
* *[/B]
*************************************************************************
*************************************************************************
[B]* *
* *
* Either you specified an unqualified symbol, or your debugger *
* doesn't have full symbol information. Unqualified symbol *
* resolution is turned off by default. Please either specify a *
* fully qualified symbol module!symbolname, or enable resolution *
* of unqualified symbols by typing ".symopt- 100". Note that *
* enabling unqualified symbol resolution with network symbol *
* server shares in the symbol path may cause the debugger to *
* appear to hang for long periods of time when an incorrect *
* symbol name is typed or the network symbol server is down. *
* *
* For some commands to work properly, your symbol path *
* must point to .pdb files that have full type information. *
* *
* Certain .pdb files (such as the public OS symbols) do not *
* contain the required information. Contact the group that *
* provided you with these symbols if you need this command to *
* work. *
* *
* Type referenced: ExceptionRecord *
* *[/B]
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1218
Key : Analysis.Elapsed.mSec
Value: 1221
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 1515
Key : Analysis.Init.Elapsed.mSec
Value: 37863
Key : Analysis.Memory.CommitPeak.Mb
Value: 90
Key : Analysis.Version.DbgEng
Value: 10.0.27725.1000
Key : Analysis.Version.Description
Value: 10.2408.27.01 amd64fre
Key : Analysis.Version.Ext
Value: 1.2408.27.1
Key : Bugcheck.Code.LegacyAPI
Value: 0x135
Key : Bugcheck.Code.TargetModel
Value: 0x135
Key : Dump.Attributes.AsUlong
Value: 21808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_nt!CmpCallbackFatalFilter
Key : Failure.Hash
Value: {dd3b265b-0c69-30be-c82d-951d2a1daaff}
Key : Hypervisor.Enlightenments.ValueHex
Value: 7417df84
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 55185662
Key : Hypervisor.Flags.ValueHex
Value: 34a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
BUGCHECK_CODE: 135
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: ffffaa0aa4cc6370
BUGCHECK_P3: fffff806bc03a2f0
BUGCHECK_P4: ffff850862ab6160
FILE_IN_CAB: 013025-15046-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x21808
Kernel Generated Triage Dump
FAULTING_THREAD: ffffd28cf0cfa080
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: HP.Omen.OmenCo
TRAP_FRAME: ffff8508676a0590 -- (.trap 0xffff8508676a0590)
Unable to read trap frame at ffff8508`676a0590
Resetting default scope
STACK_TEXT:
ffffaa0a`a4cc5ac8 fffff806`bbfb0558 : 00000000`00000135 ffffffff`c0000005 ffffaa0a`a4cc6370 fffff806`bc03a2f0 : nt!KeBugCheckEx
ffffaa0a`a4cc5ad0 fffff806`bc2b5d79 : ffffaa0a`a4cc6140 fffff806`bc0396e5 ffffaa0a`a4cc6dc8 fffff806`bc0396e5 : nt!CmpCallbackFatalFilter+0x24
ffffaa0a`a4cc5b10 fffff806`bbcb841c : ffffaa0a`00000003 ffffaa0a`a4cc6b88 ffffaa0a`a4cc1000 ffffaa0a`a4cc8000 : nt!CmpCallCallBacksEx$filt$1+0x19
ffffaa0a`a4cc5b40 fffff806`bbe8332f : ffffaa0a`a4cc6b88 ffffaa0a`a4cc6140 00000000`00000000 00000000`00000000 : nt!_C_specific_handler+0x9c
ffffaa0a`a4cc5bb0 fffff806`bbb8d432 : ffffaa0a`a4cc5c40 fffff806`bb800000 fffff806`bc0396e5 fffff806`bb91f990 : nt!RtlpExecuteHandlerForException+0xf
ffffaa0a`a4cc5be0 fffff806`bbb8e599 : ffffaa0a`a4cc6c30 ffffaa0a`a4cc6870 ffffaa0a`a4cc6c30 ffffaa0a`a4cc6370 : nt!RtlDispatchException+0x2d2
ffffaa0a`a4cc6340 fffff806`bbe8de45 : 00000000`00000000 00000000`00000000 ffff8508`676a0590 fffff806`bc03d443 : nt!KiDispatchException+0xac9
ffffaa0a`a4cc6a50 fffff806`bbe88b25 : 00000000`00000fff ffff8508`52000380 ffff8508`52004440 fffff806`bba0a315 : nt!KiExceptionDispatch+0x145
ffffaa0a`a4cc6c30 fffff806`bc0f53d0 : ffff8508`65f0e694 ffff8508`66f84710 ffff8508`62ac0978 ffffaa0a`a4cc6ed0 : nt!KiGeneralProtectionFault+0x365
ffffaa0a`a4cc6dc8 ffffaa0a`a4cc7030 : fffff806`bc288e89 ffff8508`66f84710 ffff8508`62a72740 ffffaa0a`a4cc00ea : nt!VrpTranslatePath+0x5c0
ffffaa0a`a4cc6f28 fffff806`bc288e89 : ffff8508`66f84710 ffff8508`62a72740 ffffaa0a`a4cc00ea ffffaa0a`a4cc6f98 : 0xffffaa0a`a4cc7030
ffffaa0a`a4cc6f30 fffff806`bc03a395 : 00000000`0000001c ffffaa0a`a4cc7109 00000000`0000001c ffffd28c`f0cfa080 : nt!VrpPreOpenOrCreate+0x269
ffffaa0a`a4cc7090 fffff806`bc0396e5 : ffff8508`5acc8350 ffffaa0a`a4cc7380 00000000`00000001 00000000`00000001 : nt!VrpRegistryCallback+0xa5
ffffaa0a`a4cc7170 fffff806`bc06b5d4 : 00000000`0000001c ffffaa0a`a4cc7370 ffffaa0a`a4cc7300 00000000`00000101 : nt!CmpCallCallBacksEx+0x6d5
ffffaa0a`a4cc7280 fffff806`bc0699c1 : fffff806`bc06b200 ffffd28c`00000000 ffffd28c`e1343810 00000000`00000001 : nt!CmpParseKey+0x2e4
ffffaa0a`a4cc7470 fffff806`bc0682b1 : ffffd28c`e1343801 ffffaa0a`a4cc76b8 ffffd28c`00000040 ffffd28c`ca7830d0 : nt!ObpLookupObjectName+0x3f1
ffffaa0a`a4cc7630 fffff806`bc06758c : ffffaa0a`00000000 ffffd28c`ca7830d0 ffffd28c`ca7830d0 fffff806`bba76499 : nt!ObOpenObjectByNameEx+0x201
ffffaa0a`a4cc7780 fffff806`bc0671a8 : 0000006c`072f85f0 0000006c`072f8a64 00000000`00000000 00000000`00001e3a : nt!CmOpenKey+0x2ac
ffffaa0a`a4cc79d0 fffff806`bbe8d355 : ffffd28c`f0cfa000 00000000`00000000 ffffd28c`f0cfa080 00000000`02000000 : nt!NtOpenKeyEx+0x48
ffffaa0a`a4cc7a20 00007ff8`79021c74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000006c`072f8698 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`79021c74
SYMBOL_NAME: nt!CmpCallbackFatalFilter+24
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.26100.2894
STACK_COMMAND: .process /r /p 0xffffd28cdec77080; .thread 0xffffd28cf0cfa080 ; kb
BUCKET_ID_FUNC_OFFSET: 24
FAILURE_BUCKET_ID: AV_nt!CmpCallbackFatalFilter
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dd3b265b-0c69-30be-c82d-951d2a1daaff}
Followup: MachineOwner